Digital Transformation Shifting Left: How to Align Dev, IT, and Cyber in 2025 and Beyond On the latest CXO Secrets podcast, Darren Humphries, Acora’s Group CISO, and Arron Thundercliffe, Cyber Defence & Threat Intelligence at Google Cloud, share the shift in aligning Dev, IT and Cyber Security today, grounded insights into what it takes to... Watch now
Data & AI Rethinking IT Strategy In The Age Of GenAI Reframing IT Strategy With AI With the acceleration of Generative AI (GenAI) capabilities and raising customer expectations to a new high, businesses are required to reshape their IT strategies and operational frameworks like never before. This change isn’t just a... Read now
Gated Content Service Desk Outsourcing Deciding whether to outsource all or part of the IT support function, such as the IT service desk, is a common consideration amongst organisations of all sizes. In our outsourcing considerations, we’ve highlighted some of the key areas to consider when evaluating the option of service desk outsourcing. Read now
Gated Content Forward Thinking with Data Insights Implementing applications can be daunting, but it doesn’t have to be. Working with trusted partners to plan, deliver and maintain business solutions is the practical way forward. Evolve your decision making by using data intelligence. Read now
Cyber Security The Identity Shift Identity has become a primary target, with 𝟴𝟮% of data breaches and ransomware attacks being tied to compromised credentials. In today’s hybrid environments, legacy systems and IT infrastructure struggle to support modern security controls such as Multi-Factor Authentication (MFA) and... Listen now
CIO Report 2021 Building on the success of 2020’s inaugural survey and Covid-19 naturally shaping both our survey questions and the results, we’ve attempted to look beyond the pandemic at the longer-term changes that will affect the CIO role in the future. Read now
Cyber Security Building Layered Security & Proactive Threat Detection Build Layered Security & Proactively Manage Threat Detection Cyber threats can be categorised into opportunistic, material, and targeted attacks, each requiring different levels of preparedness. Opportunistic Attacks Random, large-scale attacks such as phishing emails that aim to exploit vulnerabilities without... Read now
Data & AI How To Measure The Business Impact Of AI Services With competition ramping up and businesses always thinking about what’s next, nothing seems to move quickly enough. There is always a pressing urgency to get things done and meet ever-more ambitious targets. Integrating AI into processes can be daunting, but... Read now