Skip to main content
  • Services
    colleagues standing around a table

    Alliances

    Explore CGI's partner ecosystem to find solutions to today's challenges
    • End-to-end services
      • Business consulting
      • Systems integration
      • Managed IT services
      • Application services
      • Infrastructure services
      • Business process services
    • Key Topics
      • Artificial intelligence (AI)
      • Cloud & hybrid IT
      • Cybersecurity
      • Data analytics
      • Supply chain ecosystems
      • Sustainability
    • Solutions
      • CGI Credit Studio
      • CGI Trade360
      • CGI OpenGrid360
      • CGI All Payments
      • CGI Retail Suite
      • CGI Wealth360
  • Industries
    Illustration of group meeting discussing business

    2025 CGI Voice of Our Clients

    The CGI Voice of Our Clients shares findings from our ...
    • Banking & capital markets
    • Communications & media
    • Energy & utilities
    • Oil & gas
    • Utilities
    • Government
    • Health
    • Insurance
    • Life sciences
    • Manufacturing
    • Retail, consumer & services
    • Space
    • Transportation & logistics
  • Insights
    Insights you can act on
    Illustration of group meeting discussing business

    2025 CGI Voice of Our Clients

    The CGI Voice of Our Clients shares findings from our ...
    • Insights you can act on
      • Global blogs
      • Industry impact stories
      • Resource center
      • CGI experts
    • CGI Voice of Our Clients
      • Industry insights
      • Digital leader attributes
      • Benchmarking opportunities
    • Featured insights
      • AI blog series
      • Consulting blog series
      • CGI Partner careers blog
      • Voice of Our Clients blog
  • Careers
    Consultant looking out a window

    Careers

    Join a company rooted in ownership, teamwork, respect and belonging. ...
    • Careers Homepage
      • Career opportunities
      • Career stories
      • Top roles
      • FAQ
    • Life at CGI
      • Be an owner
      • Be creative
      • Be supported
  • Alliances
  • Investors
Contact
Global
  • EN
  • FR

CGI blogs

Advice and commentary from our experts

CGI blogs
Next-generation connected cars require a solid security foundation
Cybersecurity

Connected cars demand the same level of attention as any other feature of a company’s network. In the past, a car’s electronic control...

Next-generation connected cars require a solid security foundation
Read the blog
Cybersecurity in the boardroom: 7 steps to improve cyber governance
Cybersecurity

This blog post discusses a new study into boardroom attitudes of cybersecurity conducted by CGI in the UK in conjunction with the Centre...

Cybersecurity in the boardroom: 7 steps to improve cyber governance
Read the blog
Managing the regulatory risks of cybersecurity: An evolving regulatory landscape
Cybersecurity

Financial institutions in the U.S. are well aware of the business risks related to cybersecurity but there are an increasing number of...

Managing the regulatory risks of cybersecurity: An evolving…
Read the blog
Improving passwords to protect systems, while preserving user convenience
Cybersecurity

Passwords remain the single most common user authentication technology, but they are also the least secure. Here are a few things you can...

Improving passwords to protect systems, while preserving user…
Read the blog
What successful chief information security officers are doing right
Cybersecurity

The role of the chief information security officer (CISO) has become increasingly mainstream and strategic in recent years. While...

What successful chief information security officers are doing right
Read the blog
How to prioritize your resources from a risk management perspective
Cybersecurity

As published in the new CGI-Governing Institute “Guide to Cybersecurity as Risk Management,” too often, a compliance-based approach to...

How to prioritize your resources from a risk management perspective
Read the blog
Best practices for building strong mobile biometric authentication
Cybersecurity

Strong authentication of mobile users is an increasingly important issue for enterprises and commercial entities. While it is likely...

Best practices for building strong mobile biometric authentication
Read the blog
insider threat
Cybersecurity

This post describes the critical steps to include in an active insider threat risk management program.

Managing the insider threat is a critical part of enterprise…
Read the blog

Pagination

  • First page « First
  • Previous page ‹ Previous
  • Page 1
  • Page 2
  • Current page 3
  • Page 4
  • Next page Next ›
  • Last page Last »

How can we help?

Contact

Insights you can act on

Founded in 1976, CGI is among the largest IT and business consulting services firms in the world. We are insights-driven and outcomes-focused to help accelerate returns on your investments.

Learn more about CGI

© 2025 CGI Inc.

Company

  • About us
  • Alliances
  • Country sites
  • ESG
  • Locations
  • Mergers
  • Newsroom

Resource center

  • Articles
  • Blogs
  • Case studies
  • Events
  • Podcasts
  • Viewpoints
  • See more

Support

  • Accessibility
  • Privacy
  • Terms of use
  • Careers FAQ

Discover more about CGI

Keeping you informed

Subscribe

Follow us

  • LinkedIn
  • Twitter
  • Youtube
  • Facebook