Should Data be Masked?
The prospect of losing personal information (PI) should terrify most organisations. But PI is essential to success. Here are several mitigation strategies.
The prospect of losing personal information (PI) should terrify most organisations. But PI is essential to success. Here are several mitigation strategies.
Having a cyber incident response plan is not enough. The plan needs to be backed up with tools and processes to ensure it is well-executed and secure, even while other parts of the business are being hacked. In this IBRS Radar, IBRS explores Cydarm, a unique Australian vendor with a planning and collaboration platform developed solely to support cyber incidents.
An IT service management strategy built without artificial intelligence as a centrepiece is no longer modern.
The CIO handbook is designed to assist new CIOs in understanding their role, and experienced CIOs to consider whether doing things differently would be of benefit.
Organisations can better cater to the content authoring needs of their staff, regardless of their staff’s technical background, through hybrid and headless CMS. With DevOps, software developers and content authors can better optimise the platform. IBRS looks into DevOps’ crucial role in new forms of content management delivery.
Transforming an organisation into a digital-first enterprise involves solving problems differently. IBRS explores how design thinking principles can be applied to multidimensional problems and provides a flexible approach to creating solutions that make a difference.
Organisations are finally getting serious about cyber crime. But this is only one type of criminal activity, and IT departments must be equally vigilant against other types of crime.
Informed operational implementation of the core, shared and local systems’ classification structure establishes a powerful tool for assured IT management, and empowers IT teams to maximise their impact against the investment of money, time and effort.