As published in the new CGI-Governing Institute “Guide to Cybersecurity as Risk Management,” too often, a compliance-based approach to cy...
The Internet of Things (IoT) is set to generate vast amounts of new data, with some predictions citing that over 100 billion “things” wil...
Strong authentication of mobile users is an increasingly important issue for enterprises and commercial entities. While it is likely impo...
As the failure of large information and communications technology (ICT) projects has become a matter of public discussion in several coun...
Last year, CGI’s data science team from Prague had the great honor of winning the Kaggle purchase prediction challenge sponsored by Allst...
This post describes the critical steps to include in an active insider threat risk management program.
CGI a récemment créé un partenariat avec Pierre Audoin Consultants (PAC) en vue d’étudier les tendances en cybersécurité au Royaume-Uni. ...