CIO Handbook Part 8 – Steps to Assure Data Integrity
Assurance of data integrity is the key to surviving a cyber incident. How do you increase your probability of success?
Assurance of data integrity is the key to surviving a cyber incident. How do you increase your probability of success?
Software-as-a-Service (SaaS) platforms are stretching their capability, so how do you take advantage of the new features?
There are frequent calls for yet another ICT policy, often overlapping existing ones. A holistic view – an ICT policy framework – can reduce the effort to create and maintain policies, and deliver benefits through increased compliance.
IBRS Sourcing Monthly brings you the latest news and deals in the Australian IT world.
ServiceNow plans to enhance its Now Platform with G2K’s intelligent IoT technology once it completes its acquisition of the latter. How can industries, particularly in retail, take advantage of this?
IBM Watson was the first functional AI to gain broad public awareness. Unfortunately, implementing Watson required significant effort to first clean and format organisational data, and then train the AI model. IBM has now launched IBM watsonx, which alleviates much of the training challenges. IBRS looks into how enterprises can benefit from the surge in AI development and integrations in enterprise platforms.
IBRS advisor Joseph Sweeney was recently featured in an exclusive article discussing a cyber security report released by SailPoint.
Executing the organisation’s digital strategy to move from on-premise to the Cloud entails choosing and adopting a specific Cloud computing approach. IBRS investigates the concept of serverless computing, which allows developers to concentrate on functionality instead of infrastructure.
What makes Tim Berners-Lee’s Solid project capable of bringing changes in the way we interact with the internet? IBRS explores how this affects control over personal information and its implications for organisations.