Insight Search

Sort by:
  • Podcast

    November 1, 2022
    It’s hard to improve the purity of an atom. Identical and easy to find, atoms such as those in ytterbium can make flawless qubits. We only need to be able to trap and control them. Can using trapped ions as qubits therefore yield the most powerful quantum computers on the planet? How scalable is this approach on the road to quantum advantage? Join host Konstantinos Karagiannis for a chat about…
  • Whitepaper

    March 21, 2023
    The Financial Action Task Force (FATF) has long warned that criminals leverage virtual assets not only for predicate or money-laundering offenses but also to evade financial sanctions and raise funds to support terrorism. Even so, the number of recent headlines about criminal activity and sanctions evasion in the crypto industry is alarming. Cryptocurrency-based crime hit an all-time high of $20.…
  • Whitepaper

    May 28, 2024
    The Digital Operational Resilience Act (DORA), or more formally known as Regulation (EU) 2022/2554, took effect on 16 January 2023, with final industry compliance required by 17 January 2025. The regulation underscores the importance of digital operational resilience in today’s increasingly interconnected and digitized landscape and seeks to expand the reach of European regulators incorporating…
  • Podcast Transcript

    June 1, 2022
    Quantum computing via cloud access feels global, but there are reasons to have these machines located in a particular region. Oxford Quantum Circuits released a quantum computer named Lucy on Amazon Braket that not only helps customers with regulatory concerns, but also brings an exciting new type of transmon technology to the industry. Join host Konstantinos Karagiannis for a chat on the coaxmon…
  • Podcast

    June 1, 2022
    Quantum computing via cloud access feels global, but there are reasons to have these machines located in a particular region. Oxford Quantum Circuits released a quantum computer named Lucy on Amazon Braket that not only helps customers with regulatory concerns, but also brings an exciting new type of transmon technology to the industry. Join host Konstantinos Karagiannis for a chat on the coaxmon…
  • Whitepaper

    October 22, 2020
    Contrary to popular belief, criminals — insiders or outsiders — are not the most common cause of major operational failures. Technology is the biggest culprit. The rapid adoption of artificial intelligence (AI), blockchain, robotic process automation (RPA), cloud computing and other technologies continues to transform finance. It has created a mix of technological risks that frequently disrupt…
  • Whitepaper

    August 1, 2022
    The purpose of security analytics in an organisationSecurity metrics and the analysis of security information can be challenging concepts even for leading organisations. As information security professionals, most of us have been taught that in order to have a mature information security function we must both document and measure the organisation’s security capabilities. If policies are the…
  • Flash Report

    December 18, 2020
    The news of the cyber attacks being experienced by government agencies and an expanding list of organisations continues to grow and change on almost an hourly basis. This is proving to be potentially one of the most significant cyber breaches in recent times. Following up on our December 14, 2020, Flash Report on the CISA advisory, and in response to numerous questions and inquiries we continue…
  • Flash Report

    December 14, 2020
    On December 13, 2020, the Cybersecurity & Infrastructure Security Agency (CISA) issued an emergency directive detailing required action for federal agencies to mitigate the threat of the recently discovered compromise involving SolarWinds® Orion® Network Management products that are currently being exploited by malicious actors. (Read the SolarWinds Security Advisory here.) Given the nature…
  • Whitepaper

    June 20, 2017
    Die Nutzung individueller Datenverarbeitungs-Anwendungen mit Excel, Access, Crystal Reports o.ä. kann negative Auswirkungen auf die Vertraulichkeit, Integrität, Verfügbarkeit sowie Nachvollziehbarkeit wichtiger Daten haben. Wir helfen Ihnen dabei geeignete Maßnahmen und Kontrollmechanismen zu definieren und zu implementieren.
Loading...