Corporate writing
Thought leadership and marketing content


HP Enterprise
A guide to Composable Infrastructure


Microsoft
Truly consistent hybrid cloud with Microsoft Azure (edit)
Digital Transformation & the Hybrid Cloud (infographic)


PricewaterhouseCoopers
Annual surveys
Bold steps to manage geopolitical threats
Moving forward with cybersecurity and privacy
Toward new possibilities in threat management
Uncovering the potential of the Internet of Things
Progress stalled: Key findings from the 2015 US State of Cybercrime Survey

Thought leadership
How cloud-enabled cybersecurity will transform your business
The right response to the SAP security flaw
The convergence of everything digital
Why you should adopt the NIST Cybersecurity Framework
From compliance to risk management
Retail & Consumer Insights: Building value by addressing the impact of climate change
A winning field mobility deployment approach
Embedding cyber security into the energy ecosystem
Transforming IT with better business processes
Managing security in a mobile world
Bring your own device
Navigating security in the cloud
Security for social networking
The next generation of cloud computing
The power of the Net Generation
Collaborative technology for managing today's talent

Ghost-written blog posts and bylined articles
Managing security risks from the Internet of Things
Advancing the ranks of women in cybersecurity
How CFOs can budget to boost cybersecurity
Survey finds that cybersecurity incidents rise as supply chain risks broaden
Why Businesses Should Adopt PAM to Protect Privileged User Accounts
How businesses are transforming revenue models by monetizing—and protecting—customer data
Why Obama’s executive order on cybersecurity information sharing is on the mark

Videos
GSISS: The Internet of Things
GSISS Geopolitical cyber-risks
New ways of thinking about cybersecurity and privacy
PwC’s Secure Terrain

Website text
PwC cybersecurity and privacy website
PwC Global State of Information Security Survey 2017 website


Economist Intelligence Unit
The personalisation challenge: Business culture and mobile security
How mobile risks are pushing companies towards better security
The personalised workplace of the future
The mobile security patch problem
Big brother or big risk? The clash over privacy

Oracle
A role-based approach to automating provisioning
Practical considerations for evaluating an Oracle R12 upgrade

Infinity Info Systems
How a phased CRM implementation can trim costs and increase efficiencies
CRM for life sciences
Why metrics matter
CRM: A business imperative during the economic downturn