Stories by Peter Fuller
![Story image](../../../../../uploads/story/2022/03/08/preview_GettyImages-1293808248.webp)
Using technology in business to reach sustainability goals
Tue, 8th Mar 2022
#
datacentre infrastructure
#
hyperscale
#
dc
Organisations can look to their technology architecture for ways to save energy and reduce their impact in an effort to reach net-zero carbon emissions.
![Story image](../../../../../uploads/story/2022/02/25/preview_GettyImages-1244482898.webp)
Cybersecurity and corporate IT predictions for 2022
Fri, 25th Feb 2022
#
devops
#
supply chain systems
#
apm
The cyberattacks seen in 2021 demonstrated the dire consequences of falling short of appropriate levels of cyber resilience.
![Story image](../../../../../uploads/story/2021/08/24/preview_GettyImages-1290087573.webp)
Reducing the risk of implementing innovative technology
Tue, 24th Aug 2021
#
digital transformation
#
micro focus
#
partners
Here are five core requirements to reduce risk when implementing innovative technology, according to Micro Focus managing director Peter Fuller.
![Story image](../../../../../uploads/story/2021/02/16/preview_digital_globe3.webp)
Eight digital transformation trends for 2021
Wed, 17th Feb 2021
#
digital transformation
#
risk & compliance
#
trend micro
Some organisations are kicking-off new DX initiatives now, and many others are accelerating investments they had already planned for 2022 and beyond.
![Story image](../../../../../uploads/story/2020/11/03/preview_digital_globe9.webp)
Smart transformation: business resilience in an ever-changing world
Wed, 4th Nov 2020
#
malware
#
ai
#
cybersecurity
Business resilience is crucial for success in 2020 and beyond. Embracing digital technologies and building key capabilities is key.
![Story image](../../../../../uploads/story/2017/08/30/preview_ThinkstockPhotos-186211211.webp)
Enterprise security: The hidden perils of ‘unguarded talk’
Wed, 30th Aug 2017
#
micro focus
#
enterprise security
#
identity governance
Some users will share information that seems innocuous, yet can be used by attackers in social engineering attacks. Here are some common examples.