Latest Advisory
Considerations for Disaster Recovery in the Cloud
Why would you choose to create a disaster recovery (DR) in the Cloud if your production system is on-premise or a hybrid? What could possibly go wrong!
Considerations for Disaster Recovery in the Cloud
Why would you choose to create a disaster recovery (DR) in the Cloud if your production system is on-premise or a hybrid? What could possibly go wrong!
VENDORiQ: Beware Doppelgänger Vendors: Australian Cyber Security Centre Encourages Authenticity of IT Purchases
The Australian Cyber Security Centre (ACSC) requests IT buyers to review the authenticity and integrity of their purchases. IBRS looks into the relevance of such guidance.
ITSM Maturity Assessment Webinar
How can you measure your ITSM maturity in such a way as to discover the activities that will bring the biggest benefits?
Sourcing Monthly September 2022
IBRS Sourcing Monthly brings you the latest news and deals in the Australian IT world.
Maturity Models – Implementing for Impact
Maturity models are a highly effective tool for structuring, tracking and reporting the improvement in important process areas of an IT organisation. But how do you begin the journey, and how do you succeed in demonstrating reward for your efforts?
This article addresses how to implement maturity models. A previous article described what maturity models are and why they should be used.
Cyber Security Metrics – What Are You Tracking?
You are investing in cyber security, but are you tracking your efforts with metrics and KPIs?
Developing a Managed Identity and Access Management (MIAM) Services Roadmap: What Are the Benefits?
In the first of this two-part series, IBRS discusses what benefits managed services for identity and access management (IAM) can deliver to enterprises and how these advantages can help them attain more consistent security compliance measures.