
The state of data analytics - Key challenges in a strict security and privacy environment
Published: 7th December 2022 | By: Fran Howarth
Read this report to understand the current state of data provisioning and analytics, including the goals and challenges for organisations.

MDR: a path to outcome-based security - Keys to defining and deriving value
Published: 13th November 2020 | By: Fran Howarth
By taking into account the considerations in this eBook, organisations will be better informed as to what they need from an MDR service provider.

GRC realities - what are organisations really doing?
Published: 8th February 2019 | By: Fran Howarth
Every organisation faces risk, uncertainty and security threats, yet must comply with a host of regulations. GRC helps to manage those issues to keep an organisation on track.

Project Social - Why is it essential for Workforce Wellness?
Published: 5th February 2019 | By: David Norfolk
OpusView enables collaborative workforce wellness.

State of Industrial and OT Security Report 2018
Published: 18th December 2018 | By: Fran Howarth
Bloor Research undertook a survey of 370 industrial organisations to ascertain what security measures they are taking to secure their operational technology (OT) networks.

From Insight to Action - How Decision-Making Platforms are Changing the Game
Published: 20th June 2018 | By: David Norris
A look at how by combining CPM and BI capability, Board International offers insight that separate technologies cannot match.

Overcoming GDPR compliance challenges - steps to take and the pitfalls to avoid
Published: 11th April 2018 | By: Fran Howarth and David Norfolk
The challenges and pitfalls involved in GDPR compliance and how to overcome them.

Overcoming the complexity gap - the role of automation in optimising network performance and security
Published: 10th July 2017 | By: Fran Howarth
This document describes how the complexity gap has come about and how it is impacting organisations. It then describes how automation of network security ...

Evolving uses of the kill chain framework - using threat lifecycle management to defeat insider threats and ransomware
Published: 10th July 2017 | By: Fran Howarth
The use of a threat lifecycle management technology will provide organisations with the visibility that they need throughout all
stages of the cyber kill chain

Uniface: A low-code development disruptor - a modern visual development platform with provenance
Published: 28th November 2016 | By: David Norfolk
Uniface is a different kind of disruptor on the increasingly popular low-code development platform space.