Should Data be Masked?
The prospect of losing personal information (PI) should terrify most organisations. But PI is essential to success. Here are several mitigation strategies.
Should Data be Masked? Read More »
The prospect of losing personal information (PI) should terrify most organisations. But PI is essential to success. Here are several mitigation strategies.
Should Data be Masked? Read More »
Having a cyber incident response plan is not enough. The plan needs to be backed up with tools and processes to ensure it is well-executed and secure, even while other parts of the business are being hacked. In this IBRS Radar, IBRS explores Cydarm, a unique Australian vendor with a planning and collaboration platform developed solely to support cyber incidents.
IBRS Radar: Cydarm’s Cyber Incident Response Platform Read More »
An IT service management strategy built without artificial intelligence as a centrepiece is no longer modern.
Is AI Knowingly Embedded in Your ITSM Strategy? Read More »
The CIO handbook is designed to assist new CIOs in understanding their role, and experienced CIOs to consider whether doing things differently would be of benefit.
CIO Handbook Part 5: Business Impact Analysis Read More »
Organisations can better cater to the content authoring needs of their staff, regardless of their staff’s technical background, through hybrid and headless CMS. With DevOps, software developers and content authors can better optimise the platform. IBRS looks into DevOps’ crucial role in new forms of content management delivery.
Hybrid CMS: The Role of DevOps Read More »
Transforming an organisation into a digital-first enterprise involves solving problems differently. IBRS explores how design thinking principles can be applied to multidimensional problems and provides a flexible approach to creating solutions that make a difference.
Design Thinking for Digital Transformation Read More »
Organisations are finally getting serious about cyber crime. But this is only one type of criminal activity, and IT departments must be equally vigilant against other types of crime.
Not All Technology Crime is Cyber Read More »
Informed operational implementation of the core, shared and local systems’ classification structure establishes a powerful tool for assured IT management, and empowers IT teams to maximise their impact against the investment of money, time and effort.
Core, Shared and Local Systems – Effective Usage Read More »