Insight Search

Sort by:
  • Blogs

    March 8, 2024
    We often hear our clients ask what steps to take to develop a Software as a Service (SaaS) strategy for IT environments. Both the CIO and business owners recognise the benefits of SaaS solutions, which are readily available and often focused on a particular business need. SaaS products are becoming more popular, and usage is expected to grow at a double-digit rate in the coming years, driven by…
  • Podcast

    November 29, 2023
    We’ve done plenty of episodes where there is a piece of software or cloud platform users can try, usually for the purposes of making coding or algorithmic development easier. Coding naturally seems to be the quickest way to get involved in quantum computing, but we’ve never discussed actually building quantum hardware at home! Find out how to start learning the engineering side of quantum…
  • Podcast Transcript

    November 28, 2023
    We’ve done plenty of episodes where there is a piece of software or cloud platform users can try, usually for the purposes of making coding or algorithmic development easier. Coding naturally seems to be the quickest way to get involved in quantum computing, but we’ve never discussed actually building quantum hardware at home! Find out how to start learning the engineering side of quantum…
  • Whitepaper

    April 21, 2022
    DSS 4.0 addresses rapidly evolving threat environment and provides flexibility for how organisations can achieve compliance On March 31, 2022, the PCI Security Standards Council (PCI SSC) released a new version of the PCI Data Security Standard (DSS). PCI DSS 4.0 is the first revision to the DSS in almost four years. It represents a major update to the standard as the payments industry faces an…
  • Blogs

    January 11, 2023
    Five years ago, we wrote a post called “The 8 Character Password is Dead,” which was an in-depth look at password cracking in 2017 and how eight-character passwords do not adequately protect organisations. In that analysis, we broke down the math and how quickly hardware purchased for under $5,000 could make an eight-character length irrelevant. Unfortunately, in just five years’ time, the…
  • Whitepaper

    October 22, 2020
    Contrary to popular belief, criminals — insiders or outsiders — are not the most common cause of major operational failures. Technology is the biggest culprit. The rapid adoption of artificial intelligence (AI), blockchain, robotic process automation (RPA), cloud computing and other technologies continues to transform finance. It has created a mix of technological risks that frequently disrupt…
  • Newsletter

    March 14, 2024
    Geopolitical risk seems higher than at any point in recent memory. Managing this risk effectively should be a core competency for all businesses — and the board should lead the way.After decades of globalisation shaping the world order, businesses are now forced to accept a new reality. Geopolitical risk is an ever-growing threat with far-reaching potential consequences. This risk arises from a…
  • Blogs

    June 30, 2023
    When leaders consider how technology has enabled transformation of business models over the past several years, few would disagree that the world has changed dramatically. Retail, entertainment, music and banking have largely moved online. It’s a familiar story: Netflix beat Blockbuster; Amazon beat Borders. More recently, Tesla has transformed the experience of buying, owning and driving a car.
  • Whitepaper

    September 2, 2022
    Plan for the Unexpected. Build Resiliency. Instill your organisation with the advantage to endure company disruptions and consistently meet business goals with reduced financial, operational, cybersecurity, and efficiency losses. Assess your areas of risk and develop, enhance, as well as maintain plans to enable resilience, regardless of the circumstance.  Flashing back to 2020, the world was…
  • Flash Report

    April 28, 2022
    Cybersecurity threats are growing exponentially as companies introduce an increasing number of Internet of Things (IoT) devices into operations and collect and store an ever- escalating amount of data. This technology and data sprawl is providing bad actors with more entry points into networks and systems. Too often, organisations have failed to make commensurate investments in data protection,…
Loading...