News Feed

Actionable advice from senior IT leaders sharing digital transformation strategies that drive value, grow the business, and improve efficiencies through the implementation of enterprise applications.

Episode Cover Image
Episode Cover Image

Eliminating Blind Spots – Nailing The IPv6 Transition

With many organisations moving to IPv6, there could be monitoring issues and consequences for those that still use IPv4

Episode Cover Image
Episode Cover Image

Contractor Quaffed His Way Through Y2K Compliance While The Client Scowled

Easter means today is a holiday in much of the Reg-reading world, but that won't stop us from delivering another instalment of On Call - the reader contributed column that shares your tech support stories. To mark the occasion, The Register has revisited our mailbag of holiday-adjacent stories to tell the tale of a reader we'll Regomize as "Marcus," who told us he worked as a contractor for a "very large, very blue, blue-chip company" in the Netherlands and helped it prepare for Y2K.

Episode Cover Image
Episode Cover Image

Security Contractor Blew The Whistle On Support Crew’s Viral Indifference

Who, Me? It's the reader-contributed column in which you share stories of things you did at work that had interesting consequences. This week, meet a reader we'll Regomize as "Brad" who once worked as a security contractor.

Episode Cover Image
Episode Cover Image

The Company’s Biggest Security Hole Lived In The Breakroom

Welcome to Pwned, The Register's new column, where we highlight the worst infosec own goals so you can, hopefully, protect against them. Caffeine is an essential tool for most IT defenders, so, on balance, we're sure it has protected against a lot more exploits than it has caused. But in this case, the desire for everyone's favorite stimulant led to a massive breach.

Episode Cover Image
Episode Cover Image

The Quantum Clock Is Ticking And Your Encryption Is Running Out Of Time

Data is absolutely sacrosanct, and cryptographic systems are the beating heart of data security. Encryption protects financial transactions, secures corporate networks and safeguards healthcare records. Encryption is considered fundamentally reliable, but a technological shift is challenging this assumption.

Episode Cover Image
Episode Cover Image

Breaking The Trade-Off: Full Email Security Without Deployment Friction

For many years, organizations have had to accept a compromise in email security: They've had to balance speed versus depth.

Episode Cover Image
Episode Cover Image

Email Authentication In 2026: What Every Organization Still Gets Wrong

Despite decades of efforts to the contrary, email remains one of the primary means of entry for cyberattacks, with vectors ranging from phishing to business email compromise (BEC). Verizon's 2025 Data Breach Investigations Report shows that most breaches still involve a human element, such as account credentials stolen through phishing.

Episode Cover Image
Episode Cover Image

Email Deliverability Testing: From Single Checks To Continuous Monitoring

Email deliverability is often reduced to a simple question: Did the email send?

Episode Cover Image
Episode Cover Image

Five Tips For Phishing Email Analysis

Phishing emails are no longer easy to spot by bad grammar or obvious fake links. Modern attacks are carefully crafted to pass basic security checks and blend into everyday business communication. This makes phishing email analysis less about instinct and more about understanding the technical details hidden inside an email.

Episode Cover Image
Episode Cover Image

DMARC Troubleshooting Checklist For Enterprise

DMARC failures are usually traceable. The problem is rarely DMARC alone. In most cases, the failure is due to an issue regarding DNS, SPF, DKIM, domain alignment, forwarding, or sender setup. DMARC then exposes that problem because it evaluates whether SPF and/or DKIM passed and aligned with the visible 'From' domain.

Episode Cover Image
Episode Cover Image

The Internal Developer Platform (IDP) Paradox: Why Your IDP Needs a ‘Java-First’ Strategy

The promise of Platform Engineering is seductive: Build an Internal Developer Platform (IDP), abstract away the 'spaghetti' of Kubernetes manifests and CI/CD pipelines, and watch developer productivity soar.

Episode Cover Image
Episode Cover Image

Platform Engineering Drives Merger of Env Zero and CloudQuery

The merger of env zero, a provider of an infrastructure as code (IaC) management platform, and CloudQuery, a provider of a cloud asset management platform, is being driven by an effort to create a platform engineering solution that will make it simpler to programmatically manage IT environments on an end-to-end basis.

Episode Cover Image
Episode Cover Image

How Platform Engineers Should Think About SOC 2 Compliance

Platform engineers should view System and Organization Controls (SOC) 2 compliance as an engineering framework rather than merely a checklist to follow.

Episode Cover Image
Episode Cover Image

World Back Up Day 2026 – What Are The Takeaways?

World Backup Day is often seen as a simple reminder to save your data, but this year, security leaders say backup strategies must evolve into fully tested, secure, and recovery-focused resilience plans.

Episode Cover Image
Episode Cover Image

World Backup Day 2026: Expert Insights From The Field

Solutions Review's Executive Editor Tim King compiled this roundup of World Backup Day quotes from experts for 2026, part of our ongoing coverage of the enterprise storage and data protection market. These insights originally appeared in Insight Jam, a community focused on the human impact of AI and the future of work and learning.

Episode Cover Image
Episode Cover Image

Linux Kernel 7.0 Is Coming Mid-April-Here’s Everything You Need To Know

Kernel version numbers in Linux are famously arbitrary. Linus Torvalds changes the major digit when the minor number feels too big. However, version 7.0 is shaping up to be a substantial release, solving some decade-old annoyances and making the kernel future-ready. Here's a quick look at everything you should know about Linux kernel 7.0.

Episode Cover Image
Episode Cover Image

Top Cybersecurity Programming Languages To Learn In 2026

Build a Future-Proof Career in Cybersecurity by Learning the Most in-Demand Programming Languages of 2026

Episode Cover Image
Episode Cover Image

Database Design Errors: 10 Mistakes And How To Avoid Them

Database Design Mistakes: Critical Errors That Hurt Performance and Scalability

QR Code