Posted on 21 August 2012 by Thales
As a child, I often wondered whether my thoughts were visible to others in a cloud above my head. (I had obviously been reading too many comics where dialogue and monologues are depicted as such.) Thankfully the wisdom of age has shown this not to be true, but such an invasion of your privacy is […]
Posted on 24 July 2012 by Thales
In the latest of our posts looking at results of our recent CIO Research project we’re focusing the debate of security versus convenience. Many still consider the two to be mutually exclusive, but does this necessarily need to be the case? I blogged on this topic back in March, following a similar article by Per […]
Posted on 20 November 2012 by Anvay Lonkar
What springs to mind when you think of McDonalds? Happy meals? Brightly colored fast-food chains? Sponsorship of the 2012 Olympics? Vegetarian-only restaurants in India? How about Machine-2-Machinecommunication? Surprised? McDonalds has pioneered a key business concept – extended enterprise – which is going to be the cornerstone of future M2M Communications. What is an extended enterprise? […]
Posted on 21 September 2011 by Thales
We’re shortly going to be researching CIOs globally on their views on security and authentication. What their concerns and pressure points are, what the barriers to implementing stronger security seem to be and where responsibility for security sits within an organization. However, we’d like YOU to pose the questions.
What would you ask?
Posted on 17 August 2012 by Thales
As part of our recent look at CIOs’ views on all things security, we asked the world’s IT leaders for their views on virtualization. As one of the most successful technologies of recent years, virtualization was simply too big a subject to ignore. It is commonly accepted that virtualization brings with it some element of […]
Posted on 09 July 2012 by Thales
Chief Information Officers are always faced with the same balancing act when it comes to security. On the one hand, they must maintain sufficient control over their IT resources to protect assets and sensitive data, while on the other hand, they must ensure controls are not so stringent that employees are discouraged from embracing IT and technological innovation, or attempt to bypass them completely.