Search
  Advanced Search
Results
Total: 256 results found.
Refine your search by section:  Content (251)  Tags (3)  Menus (2)
Order by
  
Display
Conclusion: IT security strategies are an invaluable resource as a means of coordinating security efforts and in improving funding approval for security projects – because they can be shown to be following a coherent consistent strategy. The process to create them is an overlooked source of value for the information that it uncovers. An IT security ...
Section: Content | Category: Security Leadership | Date: Wednesday, 28 March 2012 | Hits: 797
Conclusion: As cloud services - typically Software as a Service - become increasingly accepted, the IT industry is gaining valuable experience in the actual risks of putting data in the cloud. Most of these risks centre around data confidentiality. Knowing the actual risks, rather than the fear, uncertainty and doubt that vendors and security consultants ...
Section: Content | Category: Security Leadership | Date: Saturday, 28 January 2012 | Hits: 961
Conclusion: Ticketing and other forms of transactions are essential elements to make other forms of non-cash and mobile financial transaction become habitual to customer behaviour. The familiarity of using the mobile device in such a way, with guaranteed security and convenience, is fundamental to user acceptance. It will help encourage all trust-based ...
Section: Content | Category: Operations & Service Delivery | Date: Wednesday, 24 October 2012 | Hits: 701
Conclusion: The Standard Operating Environment (SOE) desktop has long been considered a best practice and is widely used. However, in recent years consumer IT has dramatically changed users’ expectations resulting in frequent complaints that the SOE desktop is inflexible and a hindrance to doing business. With corporate supplied desktop continuing ...
Section: Content | Category: Infrastructure | Date: Saturday, 28 June 2014 | Hits: 753
Conclusion: Driving value from Infrastructure as a Service (IaaS) requires more than just a technical evaluation. IT Organisations must get clear understanding of the features and benefits of the billing model and how these are aligned to, and can be used to drive, the business’ objectives (e.g. faster time to solution, rapid scale-up and down, infrastructure ...
Section: Content | Category: Operations & Service Delivery | Date: Saturday, 31 August 2013 | Hits: 757
Conclusion: As much as the industry should not blame the victims of cyberattacks, the industry must also learn from these crimes. There are important lessons that must be drawn out from these breaches, because most organisations would be equally vulnerable to similar attacks. Three key lessons are: look for indicators of compromise and be sufficiently ...
Section: Content | Category: Security Leadership | Date: Friday, 02 January 2015 | Hits: 563
Conclusion: Cloud infrastructure and platforms have started to alter the landscape of data storage and data processing. Software as a Service (SaaS) Customer Relationship Management (CRM) functionality such as Salesforce.com is considered best of breed, and even traditional vendors such as SAP are transitioning customers to SaaS solutions. The recent ...
Section: Content | Category: Operations & Service Delivery | Date: Sunday, 30 June 2013 | Hits: 726
Conclusion: Based on recent survey data and interviews conducted by IBRS, the position of Windows 8 in Australian enterprises is likely to be limited to specific use-cases and tablets / hybrid devices, or those with security policies that mandate N-2 versions of the desktop OS. As predicted, Windows 7 will dominate the enterprise and it is our prediction ...
Section: Content | Category: Operations & Service Delivery | Date: Thursday, 31 January 2013 | Hits: 720
Conclusion: To improve the digital maturity of an organisation the CIO must encourage a team effort from business and technical areas within their organisation as well as strategic partners in the IT industry. Laggard IT vendors should be dropped in favour of digital leaders. The CIO will also need to convince their organisation to make early investments ...
Section: Content | Category: Governance & Planning | Date: Friday, 02 October 2015 | Hits: 288
This month, there has been a lot of discussion regarding security and ICT systems. These discussions have ranged between risks, new product offerings, need for greater awareness, specialist security company expansions and security responses. This has been interesting in relation to outsourcing as the discussions have adopted a more holistic approach, ...
Section: Content | Category: Sourcing & Staffing | Date: Thursday, 23 May 2013 | Hits: 679