Nobody really knows what the “new normal” will be like and when – and how – the dust will settle. But it is hard not to see tech, security and privacy coming out stronger.
BMC has just acquired Compuware, which complements BMC’s mainframe management capabilities with Compuware’s mainframe DevOps capabilities.
Expert Contributor and Data Governance Coach, Nicola Askham walks us through how to implement a Data Governance tool in the business. From technical to people considerations, this article covers the essentials.
Data Governance Coach Nicola Askham speaks with Neil Storkey – a Data stalwart, having worked in this field for some of the biggest global companies. In true Nicola Askham form, the conversation is focused and detailed and includes more about Data Governance challenges, career advice, resources, than you would expect.
CIO WaterCooler member Andre Simm, an Interim IT Director, Transformation and Turnaround Specialist with a wealth of experience in IT services shares his best practices for managed services. Andre goes into great detail about the dynamic of the relationship between customer and vendor, and what value looks like. As many IT leaders are taking the route which sees their teams doing more of the “fun” and creative IT work, while outsourcing the BAU items, this article provides excellent advice for how to establish principles for an effective managed services approach.
David Norfolk reviews “The Chaos Factory” by Adam Wasserman, an excellent historical guide to how IT got the way it is today.
While this is better than doing nothing or relying blindly on the security of cloud providers, those externalised, part-time services – often delivered remotely – are rarely the magic bullet they pretend to be…
David Norfolk from Bloor Research provides some perspective on IBM’s Think Conference being hosted online this year. David also shares some of the key developments coming from IBM including advances in edge computing and 5G, with hybrid multi-cloud offerings that bring together Red Hat OpenShift.
The ability to infiltrate networks and remain undetected is a key capability for attackers to gain access to systems, hence the need for threat hunting.
It does not make sense to oppose maturity-based approaches and risk-based approaches to cyber security: They are just different ways of managing, driving and measuring action around cyber security in different situations and different firms. One does not have to be superior to the other.