Jan 29, 2013

Audit concerns over cybersecurity threats

cyber crime

Concerns abound on quality of information

Regulars

Blackberry Z10
Has it been worth the long wait?
– Paul Taylor
Richard Archdeacon, of HP on how businesses are having to tackle a wider range of threats, Quentyn Taylor of Canon about protecting customer data and biometric experts, Mark Crego and Cyrille Bataller, of Accenture whether that security technology is now ready for busines
– Stephen Pritchard
Tech comment and analysis
– FT Reporters
Eric Openshaw Feb 5, 2013

Trends that drive corporate IT spending

Guest column: Deloitte authors explain why, despite an uncertain economic outlook, enterprise IT spending is rising

Shane Spillers Jan 23, 2013

Mobility on the menu

Case study: Dallas restaurant chain uses mobile app to manage labour costs and sees big savings, writes Jane Bird

Gold bars ingots Jan 28, 2013

The future of wealth management services

Guest Column: Booz and Company on how digitisation can help wealth management companies make money again

illustration for cybersecurity using the Space Invaders theme From WORLD Feb 7, 2013

Europe proposes companies disclose hacking

Watchdog advocates companies report cybercrimes

From COMPANIES Feb 7, 2013

Magazine sales suffer from the hard cell

Shoppers on mobiles ignore the titles beside the checkout

Marios Schwab Catwalk ©PA From COMPANIES Feb 7, 2013

Online clothes sales reach ‘critical mass’

Americans buy more than 10% of their wardrobe on the web

A boy playing a video game From MARKETS Feb 4, 2013

TriOptima uses gaming to measure risk

Regulatory demands create new application for graphics chips

Roger Faxon, former CEO of EMI at his New York's apartment. ©Pascal Perich The Monday Interview Feb 3, 2013

A manager of creative disruption

Roger Faxon, former EMI chief, explains why media companies misunderstand their consumers

An illustration depicting security of mobile devices ©FT Graphic Jan 22, 2013

Bank security study highlights vulnerabilities

DDoS attacks are one of the ‘most severe’ security risks