Insights

Five steps to putting your people at the heart of the public sector’s data s...

In order to drive efficiency within a company’s business strategy, it must operate with a strong data-literate culture. Jordan Morrow, Global Head of Data Literacy, Qlik, explores the steps that public sector...

Subex expert on the cyberthreats facing manufacturers

Attacks on manufacturing organisations can be particularly disruptive and, with the ongoing convergence of IT and OT systems, it’s critical that CIOs take steps to secure their critical infrastructure. Vinod...

Successful HR from the home office

Tips and learnings from the Coronavirus crisis by Glyn Yates, Country Manager IMEA, Matrix42. The upheavals caused by the Coronavirus crisis show us what the future of work could look like and how important...

Cultivating a successful risk management strategy for secure operations

Assessing and addressing risk is essential to the role of a CISO as well as being a core factor in minimising disruption to business operations. Martin Redmond assists CIOs and CISOs with implementing relative...

Seven ways cyber criminals steal your passwords

One way or another, passwords are always in the news. They’re either being stolen in data breaches, or mocked for being too simple; derided as pointless, or lamented for being technologically backward. However,...

Quest Software expert on the insider threat to the education sector

Cybercrime is a growing problem globally and the higher education sector is not immune to this threat, argues Colin Truran, Principal Technology Strategist, Quest Software. As today’s modern campus relies on...

Browse our latest issue

Intelligent CIO APAC

View Magazine Archive