skip to Main Content
Cover for Managing Cyber Business Risk - with Content Assurance and Cyber Insurance

Managing Cyber Business Risk - with Content Assurance and Cyber Insurance
Published: 28th April 2014 | By:
Over the past few years risks associated with technology and the internet have created a whole new sub-genre called cyber business risk. Whilst there are...

Cover for Big data and the mainframe

Big data and the mainframe
Published: 24th March 2014 | By:
We discuss some of the issues surrounding big data deployments and how they might be resolved within the context of a mainframe environment.

Cover for Managing indicators of compromise - taking a more proactive stance on security breach remediation

Managing indicators of compromise - taking a more proactive stance on security breach remediation
Published: 11th October 2013 | By:
This document introduces the concept of IOCs and explains how organisations can use them for their benefit.

Cover for Tools for Data Migration

Tools for Data Migration
Published: 12th September 2013 | By:
This paper discusses the various types of tools that may or should be used to support successful data migrations.

Cover for The importance of performance to DevOps

The importance of performance to DevOps
Published: 18th July 2013 | By:
Production performance is not normally a functional requirement for application development projects but, in our minds, it should be.

Cover for Identity management services - bringing external services into the mix

Identity management services - bringing external services into the mix
Published: 26th March 2013 | By:
In the past four to five years, identity and access management technologies and services have seen considerable evolution and innovation.

Cover for Data Masking

Data Masking
Published: 3rd October 2012 | By:
In this paper we shall discuss why it is important, why you should consider using a tool, and what features you should look for.

Cover for People-Centric Security - adapt to the real-world needs of
workers, partners and customers

People-Centric Security - adapt to the real-world needs of workers, partners and customers
Published: 2nd May 2012 | By:
Taking a people-centric view of security allows controls to be placed around an individual's data.

Cover for Where is the Business? - Business intelligence empowered by location

Where is the Business? - Business intelligence empowered by location
Published: 23rd February 2012 | By:
Business intelligence supports decision-making but location shows you 'Where is the Business?'

Cover for Where is the Business? - Business intelligence empowered by location

Where is the Business? - Business intelligence empowered by location
Published: 22nd August 2011 | By:
Business intelligence supports decision-making but location shows you 'Where is the Business?'

Back To Top