skip to Main Content
Log In | Register
TwitterFacebookLinkedIn
Bloor Research
  • Why Bloor?
    • About Us
    • Our Customers
    • Research Methodology
    • Join The Team
    • People at Bloor
  • Services
    • Research and Analysis
    • Bloor Navigators
    • Vendor Support
  • Mutable
  • Expertise
    • Infrastructure
      • Cloud
      • Cloud Management
      • Edge Computing
      • Mainframe 3.0
    • Data
      • Data in Motion
      • Data at Rest
      • Data as an Asset
      • Data Discovery and Catalogues
      • Data Fabric
      • Data Governance
      • Data Integration
      • Data Quality
      • Data Warehousing
      • Graph Databases
      • MDM
      • Spreadsheet Governance
      • Streaming Analytics Platforms
    • Action
      • AI
      • Analytics
      • Application Assurance
      • Data Masking
      • Outcome Automation
      • Right Insight
      • Test Data Management
      • Test Design Automation
    • Trust
      • Data Security
      • GRC
      • Identity and Trust
      • Threat Detection and Response
  • Research
    • Research Library
    • Vendor Database
  • Analysts
  • Contact
    • Briefing Request
    • Mailing List
Open Mobile Menu

Trust (Technology-Opinion)

Home » Trust (Technology-Opinion) » Page 3

Digital transformation and trust - Kevin Borley looks at a Chief Information Officer's PoV

  • 27th June 2017
  • Kevin Borley
A CIO must have the authority to challenge the thinking of his/her colleagues (even at Board level), as to the feasibility of delivering disruptive change.

Blockchain as a TRUST enabler. - It's at the start of its hype curve, but IBM and others are betting on business Blockchain

  • 16th May 2017
  • David Norfolk
One of my takeaways from IBM Interconnect 2017 is that IBM is taking Blockchain, as a business technology, very seriously.

IT Security Analyst & CISO Forum 2015

  • 29th June 2015
  • David Norfolk
A forum report.

Innovate at speed at Developer Connect 2014

  • 7th January 2015
  • David Norfolk
Report from IBM's Developer Connect 2014 conference in London.

Tag those assets!

  • 4th November 2014
  • David Norfolk
Software ID tagging is an idea whose time is come

What you see shouldn’t necessarily be what you get.

  • 7th October 2014
  • David Norfolk
What you see of is not necessarily what you need

Sharing information – key to fraud-proofing eCommerce

  • 6th October 2014
  • David Norfolk
Organisations need to share information, in order to make life difficult for fraudsters

Fraud insights from the iSMG summit

  • 29th September 2014
  • David Norfolk
Don't let fraud controls make you spoil the user experience for honest customers.

IBM’s take on IoT

  • 23rd September 2014
  • David Norfolk
A virtual round table hosted by Bret Greenstein and IBM's systems engineering leadership team.

Mobile security – from careless to cantankerous, 5 insights

  • 8th August 2014
  • David Norfolk
A survey raises some thoughts.
  • Previous
  • Page 1
  • Page 2
  • Page 3
  • Page 4
  • Next
About Bloor

Bloor is an independent research and analyst house focused on the idea that Evolution is Essential to business success and ultimately survival. For nearly 30 years we have enabled businesses to understand the potential offered by technology and choose the optimal solutions for their needs.

Useful Links
  • Bloor Mailing List
  • Request an Analyst Briefing
  • Bloor Navigators
  • Site Map
  • Terms & Conditions
  • Privacy & Cookie Policy
Copyright © Bloor 2025. All Rights Reserved.
  • Why Bloor?
    • Our Customers
    • Research Methodology
    • Join The Team
    • People at Bloor
  • Services
    • Research and Analysis
    • Bloor Navigators
    • Vendor Support
  • Mutable Business™ Explained
  • Expertise
  • Research
    • Research Library
    • Vendor Database
  • Analysts
  • Request an Analyst Briefing
  • Bloor Mailing List
  • Contact
Back To Top
We use third-party cookies, including Google Analytics, to ensure that we give you the best possible experience on our website.I AcceptNo, thanksRead our Privacy Policy