In December 2013, Target became a target itself as the victim of the biggest retail hack in US history. Attackers planted point-of-sale malware and intercepted approximately 110 million records worth...
Why CIOs need to embrace shadow IT
Back in 2011, industry experts warned of an increase in unauthorised IT systems within organisations as IT departments failed to keep pace with employees’ technology demands and the consumerisation...
Tags CIO, Digital Transformation, Security, data security, IT Department, IT security, Shadow IT
4 reasons your organisation needs a business-centric security model
Cloud computing, despite drastically reducing IT complexity, is adding complexity to the security model. Modern networks have transcended traditional walls and organisations have essentially become...
Tags CIO, digital strategy, Digital Transformation, Security, IT security, internet of things, IoT, SMAC
Top Tips for Secure Hybrid Cloud Networking
If, as many enterprises do, you choose a hybrid cloud strategy for your organisation, there are some key issues of which you should be aware, to ensure your public cloud services are secure, simple...
Tags hybrid cloud, Digital Transformation, Cloud, Security, cloud security, networking