TRPC
Latest about TRPC

NIS2: the GDPR of cybersecurity
By Mitun Zavery published
The NIS2 Directive enforces tough cybersecurity standards to reinforce software supply chain security globally.

As the ‘age of AI’ beckons, it’s time to get serious about data resilience
By Rick Vanover published
Before we start our AI engines, organizations must put processes in place to power data resilience.

Removing software supply chain blind spots that put public sector organizations at risk
By Paul Webber published
Do you regularly assess the security posture of your software providers? For IT leaders it’s an increasingly familiar concern.

Tackling social media fraud with graph databases
By Jim Webber published
Revealing connections between data to investigate and reveal misinformation, fraud and scams.

Transforming meetings: how technology is bridging the engagement gap
By Milton Rivera published
Milton Rivera, Global Vice President of The Experience Studio at Amex GBT, discusses how technology can unite teams and propel businesses.

Network complexity: a hidden tax on business
By David Brown published
Think of security risks as a byproduct of increased network complexity. Unfortunately, modern business growth is producing ever more complex networks.

Tackling the UK's cybersecurity skills shortage
By Calum Baird published
The importance of closing the skills gap to keep up with the evolving threats.

How sites are falsely blaming ad blockers for site breakdowns
By Andrey Meshkov published
Some websites mislead users by blaming ad blockers for layout issues caused by ad recovery tools.
Get daily insight, inspiration and deals in your inbox
Sign up for breaking news, reviews, opinion, top tech deals, and more.