Research into vendor capabilities in AIOps and Hybrid Infrastructure Management has revealed interesting insights in to what differentiates various solutions.
Cyber Security maturity stagnates because CISOs are structurally prevented from looking beyond day-to-day firefighting
Clarity of roles and responsibilities across Security and IT, and a clear approach putting People and Process first ahead of ready-made Technology solutions, form the only basis on which cyber security maturity can grow, across any organisation, large or small.
A secure cloud platform may make sense – but only in the context of holistic business continuity. Bloor’s David Norfolk explores in his new blog.
As we look towards the next decade, the industry must pivot towards a clearer execution focus: Security cannot be seen any more JUST as a matter of risk appetite or as a box-checking exercise
In this blog, I want to look at how a poor data culture can impact on staff in your organization. Most of the articles I write focus on what you need to do to implement data governance, but I had such a great response to my post on why the data governance business...
Cyber insurance is becoming an essential part of achieving data and information security and should be part of any business resilience plan.
Nobody can be reasonably expected to be GENUINELY and EFFECTIVELY credible from the board down, across all managerial and technical layers of the enterprise, and transversally across all its silos, from HR to Legal, Procurement or Compliance – and of course across all geographies and cultures for global firms.This profile simple does not exist
There is a lot of confusion about the difference between critical data and master data, so in this article Nicola Askham, The Data Governance Coach, explains what each is and the differences between them.
I just walked into a lamp post…why didn’t you warn me?! – Predict, don’t react to avoid IT infrastructure issues
It is clear that the increasing reliance on IT and the complexity of underlying infrastructures makes the use of automation a must for IT Ops departments.
The new Open Cybersecurity Alliance (OCA) aims to improve integration and interoperability among security tools.