Switch_board.jpg

BTA Blog

The 3 Variants of Cloud Security Explained

Posted by Sarah Andrews on 28 January 2016

Security is still perceived as a concern for Cloud computing. Despite the ability of the Cloud to free the limitations of infrastructure and logistics, a recent survey found that an overwhelming 90% of organisations are still worried about Cloud security.

0 Comments
Continue reading

Machine Learning is About to Change Everything

Posted by Scott Bartlett on 27 January 2016

Artificial intelligence exists all around us in subtle ways, embedded in our daily activities thanks to the rise of machine learning.

0 Comments
Continue reading

The Human Factor: Top 4 Ways Data Security is Breached Every Day

Posted by Ben Anin-Boateng on 14 January 2016

It is hard to believe but true: 95% of all corporate security incidents involve human error. Whether deliberate or accidental, humans are the weakest link in information security. 

0 Comments
Continue reading

Google to Kill the Password

Posted by Sarah Andrews on 07 January 2016

Google is testing an interesting new authentication idea. In a bid to get rid of the password, Google may switch to phone authentication. Under this scheme you would simply enter your email address. Then, like magic, a notification would appear on your mobile device that asks if you are trying to log in. You would just press yes if you were.

0 Comments
Continue reading