Latest Advisory
Measure your Information Security Culture to Supercharge Organisational Cyber Resilience
Employees have long been the most common vector for information security breaches. By measuring to improve information security culture, organisations can super-charge their information security resilience.
Measure your Information Security Culture to Supercharge Organisational Cyber Resilience
Employees have long been the most common vector for information security breaches. By measuring to improve information security culture, organisations can super-charge their information security resilience.
Three Step Model to Drive Strong End-User Adoption of New Technology – Webinar And Presentation Kit
Explore the importance of effective change management planning and
execution to drive positive and successful staff adoption of new platforms,
new ways of working and new digital tools.
The Future of Software Teams in the Era of AI
The integration of AI and low-code tools into software development has raised speculations about the demand for software engineers. What impact does AI and AI-powered low-code have on the future of coding professionals? How will the landscape of software development change?
Building IT Asset Management (ITAM) Capabilities
Mature ITAM capabilities, especially for end-of-life (EOL) devices, are critical for maintaining a secure IT environment and optimising financial resources. IBRS looks into the best practices to improve ITAM maturity.
Data Centres and Energy Efficient Technology
With data centres growing consumption of energy, how can industries contribute to decreasing power usage through green technology? IBRS looks into some of the ways that enterprises can help bring about the needed transformation.
Serverless Computing – Revolutionise Application Architecture
The key to unlocking the power of serverless computing lies in implementing better practices. It’s important to start with a solid foundation, careful design and strategic choice of the Cloud provider. Are you ready to revolutionise application architecture? Let’s embark on this exciting journey together.
VENDORiQ: Austrian Government Uses YubiKey Support to its Digital Identification System
YubiKeys remains a highly effective and secure form of authentication and is now being used by the Austrian government. Will this influence other countries to follow suit?