Latest strategy publications
Organisations must think carefully about how they purchase cloud services and how they set up their infrastructure accordingly to prevent vendor lock-in and high costs.
Come to the cloud, they said. Come one and come all and enjoy the multifarious models, functions and extensions that cloud computing offers with an infinite promise of agility, mobility and flexibility. Well yes, that’s the opening sales gambit. But as many of us know, the reality is somewhat less agile, rather lower down the mobility scale and inherently less flexible.
David Bisson says Trusted Compute Pools are key to understanding NIST’s Prototype for addressing a key IaaS security challenge.
In order to make sure that you have a strong cyber security strategy that matches your digital transformation, follow these tips.
Calculating cybersecurity ROI helps CISOs determine the value of an offering for their unique security environment. Here are four ways security leaders can crunch the numbers.