NZ tech spending to reach $13.9 billion in 2020 - Gartner
Gartner says complex geopolitical environment and cloud adoption are impacting ICT investment decisions.
Gartner says complex geopolitical environment and cloud adoption are impacting ICT investment decisions.
Selects Infor CloudSuite EAM for standard compliance and asset optimisation
As the US government’s first CISO and now president of Cyxtera Federal Group, retired Brig Gen Gregory Touhill says, not in jest, the cybersecurity sphere can benefit from the principles espoused by organising guru Marie Kondo
New survey shows particularly elevated concern among executives from banking, financial services, technology and telecommunications, and food, beverage and consumer goods sectors
The 28-country European Union adopted the landmark General Data Protection Regulation (GDPR) about a year ago, giving Europeans more control over their online information and privacy enforcers the power to impose hefty fines
The British regulator has fired the first shot across the bow of foreign companies processing European personal data, writes Frith Tweedie of EY
Jason Delamore of Auckland Airport explains why his combined role works well in a highly complex, fast moving environment
The time to prepare for a data-driven future is before it arrives— not after, reports ISACA.
Highlights of the Reckon survey on issues impacting businesses on the lead up to election.
Regulators are focusing more and more on data and records, resulting in a myriad of regulations that businesses are required to comply with when creating, storing and using data, writes Paul Bruton of Hitachi Data Systems
Would you step into an old but functioning lift that is no longer getting maintenance support from its manufacturer? That’s the question CIOs should also ask themselves when looking at IT inventory that is obsolete but still working, according to Arun Ulagaratchagan, general manager, cloud and enterprise group, Microsoft Asia Pacific.
A survey of IT executives and IT pros paints a disturbing picture of BYOD. That picture includes a lack of confidence in compliance with federally mandated regulations, a fear that sensitive data is at risk and uncertainty about the overall effectiveness of BYOD.
The ability to effectively and efficiently audit IT security has never been more important. Whether internal or external, financial or operational, business or regulatory, audits are increasingly performed of IT controls and IT security. This increase is driven by the need of the business and auditors to rely on internal controls, the requirement to effectively manage risk, along with the role of the auditor in assessing compliance with regulations, policies and standards.
IT auditors often leverage manual procedures, scripts and network vulnerability scanners when auditing technical IT security. Unfortunately, these are fraught with challenges and limitations and often create an undue burden on the auditor.
They are cheap, widely used, highly effective, and dangerous if not used under proper supervision.
Spreadsheets, starting in the 1980s with the humble Lotus 123, have evolved into formidable analytical engines, and are heavily used for planning and forecasting in businesses and for drawing up statutory accounts and reports.