Insights

Securing connections in the cloud and across IoT devices

As today’s highly competitive and hyper-connected digital marketplace is driving new trends in networking and security, including the rapid adoption of cloud services and IoT devices, Jonathan Nguyen-Duy, Vice P...

Five steps to putting your people at the heart of the public sector’s data s...

In order to drive efficiency within a company’s business strategy, it must operate with a strong data-literate culture. Jordan Morrow, Global Head of Data Literacy, Qlik, explores the steps that public sector...

Subex expert on the cyberthreats facing manufacturers

Attacks on manufacturing organisations can be particularly disruptive and, with the ongoing convergence of IT and OT systems, it’s critical that CIOs take steps to secure their critical infrastructure. Vinod Kumar, C...

Successful HR from the home office

Tips and learnings from the Coronavirus crisis by Glyn Yates, Country Manager IMEA, Matrix42. The upheavals caused by the Coronavirus crisis show us what the future of work could look like and how important...

Cultivating a successful risk management strategy for secure operations

Assessing and addressing risk is essential to the role of a CISO as well as being a core factor in minimising disruption to business operations. Martin Redmond assists CIOs and CISOs with implementing relative...

Seven ways cyber criminals steal your passwords

One way or another, passwords are always in the news. They’re either being stolen in data breaches, or mocked for being too simple; derided as pointless, or lamented for being technologically backward. However, one t...

Browse our latest issue

Intelligent CIO APAC

View Magazine Archive