The pandemic has accelerated change in every part of the real world and the digital world including the CIO ecosystem. Top CIOs at FITS 2020 look at fundamental questions including how has
Innovation, disruption, and transformation are the three key pillars on which an organisation needs to build its digital transformation roadmap. Post COVID, digital transformation has taken on a slightly different meaning; transform everything
The retail sector has been one of the worst affected by the pandemic crisis. It has significantly impacted how retailers need to think about surviving the pandemic and importantly being resilient as
Engaging effectively with business, grooming IT leadership team, motivating remote working teams, selecting right solutions, are part of CIOs new balancing act. How CIOs can manage their remote workforce Be considerate, use
Global CIO Forum and RosettaNet Singapore GS1, announced launch of their partnership driving global research into digital transformation and technology adoption trends in May 2020. Technology Research Insight 2020, uses a technology
No organisation producing physical goods can shy away from acknowledging the importance of logistics management. The two most important pillars of logistics are transparency and efficiency. Transparency is what every business aspires, but
The whole world is suffering with Covid-19 and we are no different. It has been a great reset for all countries, organisations and individuals. As IT professionals, business continuity and disaster recovery
The fifth virtual summit in theunfolded on November 16. Titled Role of Vendors In Reviving Channel Through Training And Incentives VirtualSummit, it focused on leading vendors and channel players in the region
It is 7am, and ten minutes into the morning you have already dismissed the first round of notifications littering your screen. Respond, dismiss, delete, save, and keep going. It is impossible to
The MITRE ATT&CK framework is being used in more and more areas of cyber security, including the identification of threat actors, their techniques and behaviour. Companies need a knowledge base to identify