Latest Advisory
Considerations for Disaster Recovery in the Cloud
Why would you choose to create a disaster recovery (DR) in the Cloud if your production system is on-premise or a hybrid? What could possibly go wrong!
Considerations for Disaster Recovery in the Cloud
Why would you choose to create a disaster recovery (DR) in the Cloud if your production system is on-premise or a hybrid? What could possibly go wrong!
Core, Shared, or Local – Know Your System
Clarity around which are core, shared, and local IT systems, and the implications that follow from this, empowers IT teams to maximise their impact against money, time, and effort.
Cyber Security Update for Executives and Boards – Presentation Kit
In the aftermath of the Optus breach, organisations are likely to see increased regulation and penalties in cases where private information in their possession has not been adequately protected.
Modernising Enterprise Learning: Fundamentals (Part 1)
Just because staff members remember something, does not mean they will act upon it. Successful task-oriented instruction can only be realised if learners have the opportunity to immediately apply it to their day-to-day work, and receive timely, staged feedback.
Hybrid CMS: Traditional Meets Headless CMS (Part 1 of 2)
While a pure headless content management system (CMS) has several advantages over traditional CMS, enterprises may be better served by a more traditional CMS that has some aspects of headless added, i.e., a hybrid CMS. IBRS explores how such a hybrid CMS can provide many of the benefits of headless, without the complexity, to support future digital content delivery strategies.
Voice Biometrics as a Component of Multi-Factor Authentication (MFA)
As many enterprises recognise the advantages of biometric authentication over traditional call centre verification methods, biometric voice recognition is increasing in popularity as a secondary source of identification due to its speed and user-friendliness.
The Customer Identity and Access Management (CIAM) Guide for the Enterprise: Consumer Trends (Part 1 of 4)
Digital customer convenience remains a top priority among users even if consumers acknowledge the necessity of defending their personal information against malicious actors. How have customer perceptions evolved to what they are today, and what can be done to influence better identity and access management practices among enterprises?