Insight Search

Sort by:
  • Podcast

    November 29, 2023
    We’ve done plenty of episodes where there is a piece of software or cloud platform users can try, usually for the purposes of making coding or algorithmic development easier. Coding naturally seems to be the quickest way to get involved in quantum computing, but we’ve never discussed actually building quantum hardware at home! Find out how to start learning the engineering side of quantum…
  • Blogs

    January 11, 2023
    Five years ago, we wrote a post called “The 8 Character Password is Dead,” which was an in-depth look at password cracking in 2017 and how eight-character passwords do not adequately protect organisations. In that analysis, we broke down the math and how quickly hardware purchased for under $5,000 could make an eight-character length irrelevant. Unfortunately, in just five years’ time, the…
  • Whitepaper

    October 22, 2020
    Contrary to popular belief, criminals — insiders or outsiders — are not the most common cause of major operational failures. Technology is the biggest culprit. The rapid adoption of artificial intelligence (AI), blockchain, robotic process automation (RPA), cloud computing and other technologies continues to transform finance. It has created a mix of technological risks that frequently disrupt…
  • Whitepaper

    April 21, 2022
    DSS 4.0 addresses rapidly evolving threat environment and provides flexibility for how organisations can achieve compliance On March 31, 2022, the PCI Security Standards Council (PCI SSC) released a new version of the PCI Data Security Standard (DSS). PCI DSS 4.0 is the first revision to the DSS in almost four years. It represents a major update to the standard as the payments industry faces an…
  • Blogs

    June 30, 2023
    When leaders consider how technology has enabled transformation of business models over the past several years, few would disagree that the world has changed dramatically. Retail, entertainment, music and banking have largely moved online. It’s a familiar story: Netflix beat Blockbuster; Amazon beat Borders. More recently, Tesla has transformed the experience of buying, owning and driving a car.
  • Whitepaper

    September 2, 2022
    Plan for the Unexpected. Build Resiliency. Instill your organisation with the advantage to endure company disruptions and consistently meet business goals with reduced financial, operational, cybersecurity, and efficiency losses. Assess your areas of risk and develop, enhance, as well as maintain plans to enable resilience, regardless of the circumstance.  Flashing back to 2020, the world…
  • Blogs

    August 10, 2023
    Technical debt consumes nearly one-third of technology budgets and more than one-fifth of technology professionals’ time; 70% of CIOs and technology leaders view technical debt as a major drag on their organisation’s ability to innovate.
  • Flash Report

    April 28, 2022
    Cybersecurity threats are growing exponentially as companies introduce an increasing number of Internet of Things (IoT) devices into operations and collect and store an ever- escalating amount of data. This technology and data sprawl is providing bad actors with more entry points into networks and systems. Too often, organisations have failed to make commensurate investments in data protection,…
  • Newsletter

    April 20, 2020
    Your monthly compliance news roundupOCC Reinforces Third-Party Risk Management ExpectationsRegulatory expectations related to third-party relationships have evolved considerably since 2013, when the Federal Reserve Board and Office of the Comptroller of the Currency (OCC) issued prescriptive guidances SR 13-19 and OCC 2013-29, respectively. To account for this evolution, the OCC…
  • Flash Report

    March 9, 2023
    The White House recently released a comprehensive national cybersecurity strategy that is sure to have a major impact on government agencies as well as private businesses. The Biden-Harris Administration has been percolating a comprehensive cybersecurity strategy for some time and in early March released the aptly named “National Cybersecurity Strategy.” The 35-page document was created to help…
Loading...