Many organizations are seeking to reduce their legacy IT spend and re-invest the savings into digital enabling technologies like cloud co...
This blog post discusses a new study into boardroom attitudes of cybersecurity conducted by CGI in the UK in conjunction with the Centre...
Representing up to 40% of information systems volume, unused lines of source code, also known as “technical debt,” create higher operatin...
As technology changes, so do customer behaviors, and so must our business processes. (I use the term customer loosely here to represent t...
Financial institutions in the U.S. are well aware of the business risks related to cybersecurity but there are an increasing number of re...
Almost every insurance company is currently working on providing pay-as-you-drive insurance. Some already have succeeded in launching it,...
Passwords remain the single most common user authentication technology, but they are also the least secure. Here are a few things you can...