Cyber Security

data center

Should Data be Masked?

The prospect of losing personal information (PI) should terrify most organisations. But PI is essential to success. Here are several mitigation strategies.

Read More »
Cyber Security Access Control

An Executive’s Guide to Identity and Access Management. An IBRS Special Report

The limited exposure of non-technical staff to the basics of identity and access management (IAM) can result in serious consequences for the organisation’s exposure to security breaches. This guide aims to bridge the knowledge gap in best practices for enterprises that need to develop a business case for IAM, and to realise its organisation-wide impacts.

Read More »
Sourcing Monthly

Sourcing Monthly October 2022

Some great outsourcing news this month, as well as a few indications government agencies are really looking to alter their IT procurement and oversight frameworks. The developments in this area in the coming months are likely to be interesting and hopefully beneficial for everyone in the industry.

Read More »

Search