• cloud-banner.jpg
    The 4 Phases of Cloud Migration
  • blog-banner-roadmap.jpg
    The Three Components of
    a Digital Transformation Roadmap

How did this week’s Ransomware outbreak affect us Globally?

Ransomware is just one incarnation of the threat landscape in which our businesses and public agencies operate today.

The recent outbreak illustrates some key facts and principles that assist...

Continue Reading ››

Tags CIO Leadership, IT infrastructure, Security, data security, Technical

State of information security in Australia: where are organisations going wrong?

A data breach can be the biggest kind of crisis a CIO will have to face, and according to new research from PwC, it’s one that more and more IT leaders will be facing this year, particularly here...

Continue Reading ››

Tags CIO, CIO Leadership, Security, cyber security, data security, IT security, PWC, data breach, IDC

It’s only a matter of time: Tips for CIOs on planning for a security breach

Today’s threat landscape is nothing like it was 10 years ago – simple attacks that caused containable damage have given way to modern cybercrime operations that are sophisticated, well funded, and...

Continue Reading ››

Tags CIO, CIO Leadership, Security, data, data security, IT leadership, IT security

What a business-centric security model looks like

The traditional concept of having a perimeter to defend is rapidly losing all relevance. Today’s enterprise is effectively ‘borderless’; customers and suppliers transact from anywhere in the...

Continue Reading ››

Tags Digital Transformation, Cloud, Security, BYOD, cloud services, data security, featured, IT security, BYOD policy, Shadow IT

1 2 3


Align your business strategies with the business goals