Beth Hood is a former advisor to the government on protective security. She now runs Verosa – a leadership development consultancy specialising in employee engagement.
Read MoreWhen budgets shrink, spending scrutiny grows — every penny is expected to fuel the highest possible return. So it makes sense that, after the first investment standstill since 2012, marketers are increasingly adopting technologies that can optimise targeting precision and impact, none more so than the customer data platform (CDP). By Lindsay McEwan, VP and Managing Director EMEA, Tealium.
Read MoreThe Cloud Security Alliance (CSA) has released a survey which discusses who should be taking responsibility for breaches in the cloud. It’s a good question. The advent of Hybrid IT, among other things, has done much to destroy our traditional notions of the perimeter, with its siloed networks and fortress-like mentality. By Scott Gordon (CSSP), CMO, Pulse Secure.
Read MoreAs organizations digitally transform, critical systems and sensitive information can be accessed by more users in an organisation than ever before. With the added pressure of GDPR, organisations have to ensure that strong security practices are implemented in the systems that people use to access data. This is where Identity Access Management (IAM) and Data Access Governance (DAG) comes in, giving granular access to the systems and data individuals use. Like with any security implementation...
Read MoreEnterprises are increasingly recognising the benefits of embracing a cloud infrastructure to support on-premise networks, but often create complicated network environments in the process. By Justin Calmus, Chief Security Officer at OneLogin.
Read MoreMark Humphries, Managing Consultant for Civica Digital, explores the importance of data structure and governance for insights-driven councils and public bodies.
Read More