fbpx

Latest strategy publications


When will cloud computing become a true utility?

Organisations must think carefully about how they purchase cloud services and how they set up their infrastructure accordingly to prevent vendor lock-in and high costs.


The myth of cloud mobility and a recipe for real agility

Come to the cloud, they said. Come one and come all and enjoy the multifarious models, functions and extensions that cloud computing offers with an infinite promise of agility, mobility and flexibility. Well yes, that’s the opening sales gambit. But as many of us know, the reality is somewhat less agile, rather lower down the mobility scale and inherently less flexible.


Unpacked: NIST’s prototype for securing container apps in shared cloud environments

David Bisson says Trusted Compute Pools are key to understanding NIST’s Prototype for addressing a key IaaS security challenge.


How to align cyber security to your digital transformation strategy

In order to make sure that you have a strong cyber security strategy that matches your digital transformation, follow these tips.


Measuring ROI of cyber security Investments

Calculating cybersecurity ROI helps CISOs determine the value of an offering for their unique security environment. Here are four ways security leaders can crunch the numbers.