Insight Search Search Submit Sort by: Relevance Date Search Sort by RelevanceDate Order AscDesc Whitepaper September 19, 2023 The 5G Effect As the world advances into a more digitised and connected future, what can be learned from organisations that are successfully deploying 5G technology to enable business processes and efficiency. Where is 5G making the biggest difference in the real world? Blogs June 19, 2023 A Guide to pen testing and red teaming: What to know now Penetration testing and red teaming are essential cybersecurity practices that bolster an organisation’s security posture by uncovering vulnerabilities within their systems, networks, and people or business processes. These methodologies have distinct objectives, scopes, approaches and technologies employed. Whitepaper October 10, 2023 Success With Generative AI Requires Balancing Risk With Reward When ChatGPT launched in November 2022, it took just two months to garner a record 100 million users and capture broad market attention. Business leaders are eager to realise the enormous potential that ChatGPT as well as other generative AI models can offer. Blogs July 31, 2023 Riding on 5G, fixed wireless access technology continues to make huge waves Financial reports released by the world’s largest mobile carriers in the first quarter show significant growth in fixed wireless access (FWA) customers – the clearest signal yet that 5G, which allows homes and businesses to connect to the internet through radio frequencies instead of cables, is gaining serious momentum. Blogs December 15, 2023 Protiviti-Oxford study: Execs see cashless future, expect big disruption from digital currency An overwhelming majority of global business leaders—85%—expect their home country to be “cashless” within a decade, and nearly a third expect it will happen within the next five years, according to findings of the Protiviti-Oxford survey, “Executive Outlook on the Future of Money, 2033 and Beyond.” Newsletter October 22, 2021 'Times Are A-Changin' — Shifting Risks and Priorities in the Private Equity Landscape From geopolitical, regulatory and policy risks to disruptive technology and cyberattacks to fraud, workplace violence and lawsuits, today’s private equity firms must have embedded capabilities to address threats that vary in scope and severity and are emerging at ever-increasing speed. They must be adept at addressing risks far beyond unpredictable business cycles and volatile markets. Blogs June 30, 2023 How to Incubate a winning innovation program When leaders consider how technology has enabled transformation of business models over the past several years, few would disagree that the world has changed dramatically. Retail, entertainment, music and banking have largely moved online. It’s a familiar story: Netflix beat Blockbuster; Amazon beat Borders. More recently, Tesla has transformed the experience of buying, owning and driving a car. Blogs July 8, 2024 Microsoft SharePoint Premium simplifies content management and governance Content management involves the creation, organisation, storage and distribution of digital content within an organisation, ranging from documents and images to videos and web pages. One of the biggest problems businesses face with content management is the quantity of unstructured content, which is growing exponentially, making it incredibly hard to find good or accurate data. Survey December 12, 2023 2024 Top Risks in the Technology, Media and Telecommunications Industry TMT executives were asked to identify the biggest threats they anticipate over the next 12 months and a decade ahead. Many of the risks cited correlate in many ways and can be categorised under two broad themes: foundational risks, which are essentially challenges that leaders must address to keep their business thriving, and risks that are essential for continued growth and expansion. Whitepaper February 8, 2023 Building Sustainable Data Governance Programmes with Agile Concepts The digital revolution has led to an explosive growth in the amount of data created and collected, driving businesses to seek new ways to manage and discover value in the data they hold. In turn, the growth of stored data has been a longstanding management problem, which if not addressed can lead to potential vulnerabilities, data misuse, and possible data loss. Load More