by Nicola Askham | Oct 30, 2019 | Chief Data Officer, Collaboration, Feature
In a recent blog, I looked at why you should prioritise your data and identify the data that is the most critical or material to your organisation, so you can focus your data governance efforts on that data. In response to that blog, I had a number of people...
by Paul Bevan | Oct 29, 2019 | Knowledge Bank
I have just spent the last few weeks pulling together a survey on the functionality of vendor solutions in the hybrid IT infrastructure management and monitoring space. The results have been incorporated into a White Paper that looks at the importance of knowing how...
by Fran Howarth | Oct 22, 2019 | CISO WaterCooler, Information Security>Cloud Security, Information Security>Cyber Security, Information Security>Data Security, Information Security>End-point Security, Information Security>Network Security, Information Security>Threat Intelligence
The Open Cybersecurity Alliance (OCA) is a new initiative being established by technology vendors and software publishers under the auspices of the OASIS information technology standards consortium. Its aim is to develop open code, standards and tools that can connect...
by Jean-Christophe Gaillard | Oct 16, 2019 | Digital Transformation, Feature, Information Security, Internet of Things
Bake it in from the start: “Moving fast and breaking things” will become a thing of the past as customers and investors take security and privacy more and more seriously It seems that security is still – at best – an afterthought for most start-ups as they go about...
by Paul Bevan | Oct 4, 2019 | Knowledge Bank
Bloor’s mutable business model is built on a constant, dynamic interchange of three strands – technology, business models and people. In this article, Bloor CEO Tim Connolly begins to share some thoughts on the implications for people strategies of ever-increasing...