Smart centralised insights shape modern global supply chain
With blockchain, a supply chain can move beyond the limitations of a peer-to-peer network and transform into a transparent network that effortlessly connects many to many.
Opinion piece: Cloud readiness is all about simplification
The growing trend towards multi-cloud strategies is driving a symbiotic discussion about data management, migration and security too.
Responsibility in terms of the Financial Intelligence Act
Perpetrators of financial crimes include organised criminals, business leaders, corrupt heads of state, corporate and state employees at all levels, suppliers and corporate customers.
Thrive in chaos: Predicting future of Brexit and UK economy
Intelligence and AI technologies can assist in building financial models to enable leaders to understand variables, potential impacts on the business.
Regulating cryptocurrency: Commodity, currency or security
While the price volatility of cryptocurrency is generally impractical for a currency, the stability of its price is not a requirement.
UNGA 2019: No room for coal in Africa’s renewable future
“We need to link climate change to a new model of development – fair globalisation – with less suffering, more justice, and harmony between people and the planet.” ~ UN secretary-general Antonio Guterres
Identity management: How sure are you of that?
Addressing the process and or policy portion of the age-old security triad of people, process and technology is a vital start to mitigating attacks.
Sandboxing: The agility of a start-up, the muscle of big business
Sandboxing has proven to be incredibly beneficial. One example is the successful use by global non-profit organisation the Make-a-Wish foundation to develop a crowd-funding application
Cloud is key to democratising education in digital age
In line with the skills needs of tomorrow, technology-enabled cybergogy is likely to be the intuitive, natural fit for the digital-native generation.
How to feed the board a diet of low-risk cyber security
The threat environment is a lot more complex today than ever before as attacks come from inside and outside the network.
New workforce segments help to address talent shortages
Traditional solutions alone can no longer fill the gaps – it will take creative ways of problem solving.
Hack the human: Effective security relies on culture, not just IT
The goal isn’t to turn every person in your company into a security specialist but to rather give them the level of understanding they need to apply the rules and remain secure.
No Results Found
The page you requested could not be found. Try refining your search, or use the navigation above to locate the post.