i-SCOOP reports on digital transformation, Industry 4.0, IoT and other emerging technologies across industries.
Succeed in connecting the dots between digital business, transformation, processes, value, & purpose.
Smart manufacturing transformation priorities and challenges 2022 report
A look at the 2022 ISG Global Smart Manufacturing Pulse Survey and how the adoption of smart manufacturing evolves, including priorities and challenges.
Over the...
Digital transformation strategy: the bridges to build
Digital transformation requires a digital transformation strategy that, as any strategy, looks at the goals, current situation and how to move forward on a...
Smart sensors and the evolution of the global sensor market
Sensors have become ubiquitous. They have existed since long before the advent of the Internet and certainly before the Internet of Things or IoT....
The ransomware readiness gap and mitigation strategy challenge
Reports of ransomware attacks continue to occur in rapid succession. While organizations are more concerned than ever about software supply chain security threats and...
Why and how to adopt a project data strategy in construction
Better data strategies might have saved the global construction industry $1.85 trillion (€1.58) in 2020, with less safety incidents, change orders, project delays, budget...
Trending
Integrated Risk Management and the role of IRM software
Digital transformation and digitalization offer enormous opportunities. But they also bring many risks. The same...
Hybrid working and the physical workplace environment
The future of work is here, and it’s predominantly about hybrid work, impacting the physical...
What is DataOps and how can it solve your data challenges?
Part one of an introduction to and exploration of DataOps, including the background, definitions, evolutions,...
What is cybersecurity? Exploring an evolving reality and practice
Cybersecurity is the protection of IT systems and assets, their users, and other potential victims...
Security and risk management as an inherent part of business
Cybersecurity has been defined as the strategy and practice of protecting computer systems, networks, applications,...
Edge computing – the what, how and where of the edge
There isn't a single day that goes by without an article, paper, webinar, or even...
The CIA triad of confidentiality, integrity and availability
Confidentiality, integrity, and availability are known as the three essential goals, attributes, or qualities of...
Supply chain attacks and security: state and outlook
Software supply chain attacks are a growing cybersecurity challenge. They become increasingly frequent and can...
Cybersecurity – security, cybercrime and cyberattacks in flux
Cybercrime and cyberattacks continue to rise with ever more data breaches and crippling ransomware attacks....
Penetration testing in an increasingly complex digital world
Penetration testing is a security method whereby ethical hackers are asked to break into predefined...