CIO Report 2021 Building on the success of 2020’s inaugural survey and Covid-19 naturally shaping both our survey questions and the results, we’ve attempted to look beyond the pandemic at the longer-term changes that will affect the CIO role in the future. Read now
Gated Content Our Group CTO’s 2025 AI Predictions Could Your AI Model Be Your Biggest Security Risk? Our Group CTO Richard Conway shares his own AI predictions for the year ahead. As businesses rapidly understand how they can adopt AI, the risk of intellectual property theft is skyrocketing.... Watch now
CIO Report 2022 Building on the success of the 2021 survey, we reached out to CIOs and other IT leaders in organisations across the UK to get a sense of the challenges they’re facing such as hybrid working, and how they see things developing over the coming months. Read now
Cyber Security Onzichtbare Cloud-lekken: 5 veelvoorkomende misconfiguraties binnen financiële instellingen Cloudmigratie is voor financiële instellingen geen experiment meer. De druk wél. DORA, NIS2 en steeds scherper toezicht dwingen je om elke keuze voor de publieke cloud direct audit-proof te maken. CIO’s en CISO’s stellen me steeds vaker dezelfde vraag: “Waar... Explore Resource
Gated Content CIO Report 2023 As CIOs and IT and Security leaders’ roles rapidly become more diverse, evidence from our report expressed that cutting through the noise is a shared challenge for many professionals in the IT and Cyber space. Continuing to build on the priorities and shared challenges of the UK mid-market, explore our yearly report below. Read now
Cyber Security Building Layered Security and Proactive Threat Detection Build Layered Security & Proactively Manage Threat Detection Cyber threats can be categorised into opportunistic, material, and targeted attacks, each requiring different levels of preparedness. Opportunistic Attacks Random, large-scale attacks such as phishing emails that aim to exploit vulnerabilities without specific... Read now
Gated Content Successful IT & Cyber Projects Guide Cyber Security and IT projects often fail due to unclear objectives, unrealistic schedules, inadequate resources, poor project management, and stakeholder disengagement. With 75% of business and IT executives thinking their software projects will fail, we dissect why so many projects are at risk of failing and how to overcome these alarmingly high stats. Read now
Cyber Security The Identity Shift Identity has become a primary target, with 𝟴𝟮% of data breaches and ransomware attacks being tied to compromised credentials. In today’s hybrid environments, legacy systems and IT infrastructure struggle to support modern security controls such as Multi-Factor Authentication (MFA) and... Listen now