The metaverse: Realism and Reality Business Intelligence The metaverse: Realism and Reality The metaverse isn’t a new idea, it’s just one that finally has the technology legs…Turrito Networks27th September 2022
The Metaverse is here, and you’re invited. But who’s in charge? Business Intelligence The Metaverse is here, and you’re invited. But who’s in charge? Colin Thornton, Chief Commercial Officer at Turrito unpacks the essential considerations that have to govern…Turrito Networks27th September 2022
The mind boggling bewilderance of cybersecurity Security The mind boggling bewilderance of cybersecurity Keeping pace with all the tools and technologies that provide protection from the cybersecurity onslaught…Turrito Networks27th September 2022
Service Desk Transformation MSP Service Desk Transformation The modern service desk has to evolve alongside its customers, offering agility and flexibility and…Turrito Networks27th September 2022
The changing shape of the service provider landscape MSP The changing shape of the service provider landscape Louis Jardim, Chief Operations Officer at Turrito takes a long look at the evolving role…Turrito Networks27th September 2022
Design. Align. Execute. Business Intelligence Design. Align. Execute. Decision intelligence is the evolution of data, analytics, and insights that drives smarter business decisions…Turrito Networks27th September 2022
The high walls of data security Security The high walls of data security Privacy, data security, digital identity – walled security gardens are becoming increasingly important tools for…Turrito Networks27th September 2022
‘Digital Transformation’ is so pre-Covid… Cloud ‘Digital Transformation’ is so pre-Covid… If you haven’t experienced ‘digital transformation’ by now, you’re in trouble and the next goals…Turrito Networks18th July 2022
A low ‘dwell time’ reflects a high-speed security landscape Security A low ‘dwell time’ reflects a high-speed security landscape A report from the cybersecurity firm Mandiant showed a continued decline in an intrusion figure…Turrito Networks27th May 2022
This sneaky hacking group hid inside networks for 18 months without being detected Security This sneaky hacking group hid inside networks for 18 months without being detected Group exploits IoT vulnerabilities and legitimate Windows functions to snoop on emails and servers, say,…Turrito Networks27th May 2022
Q&A: DRaaS offers help in a complex cloud Cloud Q&A: DRaaS offers help in a complex cloud In March 2021, a fire took down a data centre belonging to OVHcloud, a major…Turrito Networks27th May 2022
Hiding in event logs and memory, fileless malware avoids AV Security Hiding in event logs and memory, fileless malware avoids AV “Please find attached the Payments Report for 04/27/2022,” read an email recently found by Fortinet Fortiguard…Turrito Networks27th May 2022