As my many IT customers get more sophisticated and are improving the identification and response to breaches many manufacturing companies…
In today’s world awash with affordable data storage and processing, “Big Data” has emerged as a powerful approach to optimize…
This article gives an overview of the importance of data, what happens when we use data incorrectly and discusses how…
When I began asking CIOs what problem they were solving by hiring a security professional, the answers didn’t surprise me.…
Shamane Tan shares her story in this exclusive reveal. Given that this is a special women’s edition, what better way…
Magda Lilia Chelly is a CISO On Demand. Magda’ latest two projects covered the roles of a Regional ISO Lead…
Give a man a fish and you feed him for a day; teach a man to fish and you feed…
The modern cyber battlespace now includes schools. In recent times there has been a trend towards cyber-attacks on softer targets,…
This article aims to present how a Japanese company, Nippon Telegraph and Telephone (NTT) Corporation, is now willing to share…
This article will shed some light on my personal journey into the workforce. Here I share my experiences, things I…