Latest Advisory

Iren’s $15b Microsoft Mega-Deal Sign of an AI Surge that Won’t Stop – AFR Nov 4 2025
The AI industry is experiencing an unprecedented surge, with neo-cloud firms like Iren playing a pivotal role in reshaping the AI infrastructure market.

Iren’s $15b Microsoft Mega-Deal Sign of an AI Surge that Won’t Stop – AFR Nov 4 2025
The AI industry is experiencing an unprecedented surge, with neo-cloud firms like Iren playing a pivotal role in reshaping the AI infrastructure market.

Developing a Managed Identity and Access Management (MIAM) Services Roadmap: What Are the Benefits?
In the first of this two-part series, IBRS discusses what benefits managed services for identity and access management (IAM) can deliver to enterprises and how these advantages can help them attain more consistent security compliance measures.

Developing Cloud Maturity: Challenges in Areas of Excellence (Part 1 of 4)
Organisations can better transition to a higher level of Cloud maturity if they take measures to understand the risks involved in adoption. In this first of a four-part series, IBRS provides specific recommendations on how enterprises can better take action with a strategic approach.

Can the Cyber Security Industry Solve Customer Problems?
Will open-source finally link security tools effectively? Vendors are now driving integration of information.

Cloud Maturity Benchmarking – Stepping Up Through Better Practices
Align the Cloud Centre of Excellence with better practices to step up your Cloud maturity.

CIO Handbook Part 3
The CIO handbook is designed to assist new CIOs in understanding their role, and older CIOs to consider whether they could do things differently.

Microsoft Teams Collaboration Part 3: Recommended Security Practices
With the growth of enterprises that have adopted Microsoft Teams as their online collaboration platform, potential security risks associated with the solution have likewise sprawled within organisations and those admitted as guest or external users. What should IT security teams implement in their governance measures to control the risk of data loss and the spread of malware entering through the platform?