• Architects of Change Perspective

It’s only a matter of time: Tips for CIOs on planning for a security breach

Today’s threat landscape is nothing like it was 10 years ago – simple attacks that caused containable damage have given way to modern cybercrime operations that are sophisticated, well funded, and...

Continue Reading ››

Tags CIO, CIO Leadership, Security, data, data security, IT leadership, IT security

What a business-centric security model looks like

The traditional concept of having a perimeter to defend is rapidly losing all relevance. Today’s enterprise is effectively ‘borderless’; customers and suppliers transact from anywhere in the world,...

Continue Reading ››

Tags Digital Transformation, Cloud, Security, BYOD, cloud services, data security, featured, IT security, BYOD policy, Shadow IT

How to prevent a data breach: lessons from the Target hack

In December 2013, Target became a target itself as the victim of the biggest retail hack in US history. Attackers planted point-of-sale malware and intercepted approximately 110 million records worth...

Continue Reading ››

Tags Digital Transformation, Security, data security, IT security

Why CIOs need to embrace shadow IT

Back in 2011, industry experts warned of an increase in unauthorised IT systems within organisations as IT departments failed to keep pace with employees’ technology demands and the consumerisation...

Continue Reading ››

Tags CIO, Digital Transformation, Security, data security, IT Department, IT security, Shadow IT

«
1 2 3
»

Like to learn more? Contact us today.

Align your business strategies with the business goals