News

Effective cyber security requires context, vision, discipline, says Sasol boss By Christopher Tredger, Portals editorJohannesburg, 23 May 2025Lungile Mginqi, group CIO at Sasol. A good cyber security ...
New laws demand provable cybersecurity programs. Learn how CIS Controls and tools help meet legal, scalable standards.
XChange LATAM 2025 in Argentina brought together vendors and solution providers looking to forge strategic alliances, share ...
Rio Tinto’s head of technology platforms outlines the mining giant’s move to an IT platform model designed to escape a ...
Over 300,000 US government Defense Industrial Base (DIB) subcontractors will soon be affected by the Cybersecurity Maturity Model Certification (CMMC ... and certify a wide range of new security ...
In every example of a maturity model I have seen ... CIOs and chief information security officers look at it as a way of closing the gap between the boardroom and deployments.
The Data Resilience Maturity Model (DRMM), introduced at VeeamON 2025, provides a structured method for evaluating an organisation’s preparedness against cyber threats and IT disruptions, aiming to ...
Second, we’re introducing our Agentic Maturity Model. It’s an in-house framework we use with customers to help them understand where they are today and where they want to be with autonomous ...
The workplace digital transformation (DX) maturity model was built based on workplace indicators (digital tools and processes) and employee performance indicators (productivity, collaboration, and ...