Corix Partners black banner

1 October 2015 / Architecture and Design / Neil Cordell

Why are so many technology solutions not secure? Many IT projects encounter serious issues when they run into delays too close to the implementation “go live” date because they are considered to be “not secure enough”. It seems incredible that the situ… Read more »

Read More

24 September 2015 / Leadership Development / Corix Partners

In this article we explore the profile of the CIO – providing advice to junior IT professionals wishing to develop into the role. As well as discussing the CIO’s roles and responsibilities, we also highlight the key qualities recruiters look for – and… Read more »

Read More

17 September 2015 / Neil's Column / Neil Cordell

One of the common problems in Information Security is the belief that a technology solution will be able to resolve all the security problems that an organisation faces. As a consequence, Information Security professionals have the tendency to dive str… Read more »

Read More

10 September 2015 / Strategy and Governance / JC Gaillard

The current cyber security situation in many large organisations is dominated by significant blockers. Cybersecurity is still broadly perceived as an IT discipline, built around technical solutions and projects – you only have to open any industry maga… Read more »

Read More

3 September 2015 / Leadership Development, Strategy and Governance / JC Gaillard

This article is a summary of the series “The CIO Guide to a successful Information Security Practice – 8 Key Management pitfalls to avoid” published on our blog in May and June 2015. The series deconstructs eight commonly held views on Information Secu… Read more »

Read More

1 September 2015 / Guest Blog / François Gratiolet

Handling an information security (InfoSec) budget is not an easy task. Most InfoSec departments operate under very tight budget constraints. The challenge is to find the right balance between overspending and underspending. Budgeting for InfoSec is a h… Read more »

Read More

27 August 2015 / Strategy and Governance / Neil Cordell

Given the vast number of IoT devices, a staggering volume of data is continuously being generated – and this is increasing exponentially. Until the advent of BigData, it was extremely complex, expensive and time consuming to analyse data from different… Read more »

Read More

20 August 2015 / Strategy and Governance / Neil Cordell

What is the Internet of Things? Essentially, more and more devices are being connected to the Internet and are collecting data. Like many technology hypes, IoT is not really new – and there are many existing control systems which have been reliant on a… Read more »

Read More

13 August 2015 / Strategy and Governance / JC Gaillard

The Board of Directors must ensure that a long-term Cyber Security roadmap is in place – and stick to it.

Read More

6 August 2015 / Strategy and Governance / JC Gaillard

Over recent years, the GRC (Governance, Risk and Compliance) acronym has become very common in the Information Security community.

Read More


Previous Page 28 of 31 Next