Blogs

Beyond paper: Post-audit vs clearance e-invoicing models explained 

Missed payments, errors and lost paperwork plague traditional invoicing. E-invoicing offers a secure and efficient solution, streamlining workflows and boosting tax compliance. It shouldn’t come as a surprise that e...

Four tips for getting your IT and security teams back on the same page

Linh Lam, CIO, Jamf, says there must be a shift in mindset so that IT and security teams regard each other as partners. IT and security have long been the frenemies of the corporate world. While the two departments...

The three Cs of cybersecurity

Strong cybersecurity is the backbone of every organisation. Check Point Software agrees, outlining the three C’s methodology below and why should they be central to an organisation’s strategy moving forward. Cyb...

Banking and financial firms must get a grip on data – or face the c...

In the banking, finance and insurance sectors, legacy systems are the anchor that keeps the business rooted to the past. Sheena Chin, Managing Director of Asean, Cohesity, tells us: “They are a major reason why b...

IT is challenged but will emerge stronger than ever

Jacqui Guichelaar, Senior Vice President and Chief Information Officer at Cisco, discusses the recent Cisco survey in which CIOs reveal their fears, strengths and strategies for coping with the pandemic. In my position as...

No silver bullet to deal with cyberattacks

Yaniv Hoffman, Vice President Technologies, Radware, tells Intelligent CIO APAC, how the attack surface has expanded in recent times. The pandemic threatening our global economy, has impacted significantly online...

Browse our latest issue

Intelligent CIO APAC

View Magazine Archive