
4 Tips for CIOs to Deal Efficiently with Shadow IT
Dealing with Shadow IT embodies the evolution of the role of the CIO, from being…
thedigitaltransformationpeople.com
Dealing with Shadow IT embodies the evolution of the role of the CIO, from being…
thedigitaltransformationpeople.com
I've got a bee in my bonnet and I feel compelled to write about this.…
thedigitaltransformationpeople.com
Just recently both the UK and the USA have imposed a ban on laptops being…
thedigitaltransformationpeople.com
Researchers from Israeli Cyber Security Company Cybellum have discovered a zero day bug that impacts…
thedigitaltransformationpeople.com
For companies getting serious about cybersecurity, a typical first recommended step is to obtain a…
thedigitaltransformationpeople.com
On Tuesday 7th of March 2017, WikiLeaks began its new series of leaks on the…
thedigitaltransformationpeople.com
Governance will always mean different things to different people. In small organisations, Governance tends to…
thedigitaltransformationpeople.com
7 real-life tips for cyber security practitioners and senior executives who want to look beyond…
thedigitaltransformationpeople.com
Working in cyber security for the last 19-years has been an amazing experience. Watching the…
thedigitaltransformationpeople.com
A Physical-Presence-on-the-Internet (Cyber PPI) access model is the first step to cyber security. Until this…
thedigitaltransformationpeople.com
As surely as the sun rising in the east, the state of cyber security can…
thedigitaltransformationpeople.com