Featured Article

CSC Cybersecurity

The Weakest Link in the Room, Part I

By Stephen Brennan, CSC Cybersecurity In the last two decades I have seen cyber defenses revolutionized by advances in processes and technologies. Advances that have made protecting and defending our most critical data, systems and infrastructure seem almost routine. So when unexpected events occur and become incidents, the weakest link in the room is often […]

Latest Posts

Losing App-etite – The Perils of Mobile Pablum

Will native apps die a slow death ? There have been some interesting debates among mobile strategy pundits on whether native apps might be losing some of their original glitter. The debate centers … [Continue Reading]

The Regulatory Combo Platter: Grouping, Worksharing and Bundling

After much delay, the much improved Module 1 Update for FDA electronic drug applications in eCTD format (version 2.3)  is about to go live. They have just put out a request for volunteers to send … [Continue Reading]

The Weakest Link in the Room, Part I

By Stephen Brennan, CSC Cybersecurity In the last two decades I have seen cyber defenses revolutionized by advances in processes and technologies. Advances that have made protecting and … [Continue Reading]

Smart city technologies and the “return on citizen investment”

The United Nations estimates that by 2050, 66% of the world’s population will be living in cities, up from the 54% in urban areas today. This migration has already been realized in a major way in such … [Continue Reading]

Enter the new CIO: The Content Information Officer?

I can hear the groans after reading of yet another way of bastardizing the CIO title while adding another C-Title to the already crowded management matrix. I’ve been on the record as a longtime … [Continue Reading]

More Posts from this Category

Follow

Get every new post delivered to your Inbox.

Join 2,455 other followers