<img src="https://secure.leadforensics.com/99430.png" alt="" style="display:none;">

Blog

blog-overlay-web-saved

Container Security - The Benefits and Challenges

Cloud, cognitive capabilities, and containers are 3 critical technologies that will drive Digital ...

What will 5G mean for Next Generation Wireless and the Enterprise?

In this post, TV Tech Expert David McClelland and CANCOM’s Enterprise Architect, Jason Normanton ...

What will be the biggest Tech Trends of 2019 in Enterprise IT? – Part 2

Welcome to Part 2 of my Tech Trends 2019 video blog. Now I couldn't do one of these videos without ...

What will be the biggest Tech Trends of 2019 in Enterprise IT? – Part 1

Hi, I’m Mark Skelton, I’m the CTO here at OCSL (A CANCOM Company) and welcome to Part 1 of my ...

Tech Trends 2019: The Year of “Why” in IT

We are entering a truly exciting time in IT. The industry is really starting to focus on driving ...

How can Blockchain Create Greater Trust for the Enterprise?

In this second exert from our latest White Paper: Why Emerging Technologies Really Matter, TV Tech ...

Emerging Tech Doesn’t Need to be High Risk

If you haven’t read it, I’d recommend downloading our White Paper here. One of my key takeaways is ...

Still on Citrix XenApp 6.5? It’s time to upgrade

In case you weren’t aware, as of June this year, Citrix XenApp 6.5 is now end of life and Citrix ...

Busting common myths about passwords!

Passwords are becoming increasingly important. Lots of tech companies are developing ways to make ...

How to De-Risk IoT/ IIoT with Microsoft

"Nearly 88% of C-level management said they view IoT (Internet of Things) and IIoT (Industrial ...

Getting Inside the Mind of a Hacker

In this fictitious account of a hack on Waze Banking, Security expert and Ethical Hacker, Callum ...

Stay informed

Stay updated and subscribe to our regular communications.