Recent incidents have shown that cyber security is critical to the operation of companies. It matters more than ever how operations and data can be secured. The zero trust paradigm is now a must as it defines how companies’ security is built. Following the idea that every network access request to a system or to data should be verified, it depends on a company’s individual IT architecture and workflows. In general, it is not easy to implement, but this Expert View makes some recommendations on how to approach this.
SHARE :
Are global capability centers (GCCs) a transformation engine or just a conduit for accessing cheaper talent? The answer to that question often ...
Event Date : June 16, 2025
This document provides market volumes, growth rates and forecasts for the Big Data market in EMEA (Europe, Middle East & Africa) for the 2022-2028 ...
Event Date : August 28, 2024
This document contains the detailed findings for Switzerland from PAC’s SITSI® CxO Investment Priorities Survey 2024/25, in which IT ...
Event Date : May 05, 2025
Automated valet parking (AVP) technology allows to maneuver vehicles automatically through specific areas, such as a parking garage. PAC noticed that ...
Event Date : March 25, 2024
This document provides market volumes, growth rates and forecasts for Cloud Ecosystem Services in Mexico for the 2022-2028 period.
Event Date : February 13, 2024
Digital Business Models in Manufacturing – Latest Customer Examples and Trends – InBrief Analysis
Market Reports October 31, 2025
Mapping the Software & IT Services Opportunities in UK Defence – InBrief Analysis
Market Reports October 31, 2025
Expert View: Fusion Gets Smarter: Oracle’s AI Agent Studio
Market Reports October 31, 2025
The Future of Work with Agentic AI – Redefining Roles, Teams, and Leadership – InBrief Analysis
Market Reports October 30, 2025
TCS (Tata Consultancy Services) - Figures - Sweden - FY 31-Mar-2025
Datamart October 30, 2025
Atos: Cause for Optimism, Despite the Headlines
Blog Post February 05, 2024
Hitachi Digital Services builds the bridges to cross the Agentic AI chasm
Blog Post October 31, 2025
PAC Horizons London 2025: Insights, Innovation, and Industry Connections
Blog Post October 31, 2025
Part 5: Designing for Security – Architecture Principles for Protecting Data and Applications
Blog Post October 28, 2025
Atos Group: a strategic transformation in the cybersecurity market (part 2)
Blog Post October 22, 2025
ServiceNow’s CRM Vision & Midmarket Momentum
Blog Post October 21, 2025