Insight Search

Sort by:
  • Client Story

    June 16, 2023
    This global leader in software for designers, builders, engineers and others has worked to provide a solid platform across a multitude of industries. However, recent changes in FedRamp compliance requirements drove them to develop a new instance of its product platform, hardening their infrastructure for customers in the public sector.
  • Newsletter

    July 28, 2020
    La Corte di giustizia europea dichiara invalido il Privacy Shield. Come trasferire i dati negli USA e al di fuori dell’UE? Mercoledì 15 luglio la Corte di Giustizia dell'Unione Europea (CGUE) ha emesso la sentenza sul caso "Schrems II" (causa C-311/18 - Data Protection Commissioner v Facebook Ireland e Maximillian Schrems). Pur concludendo che le Standard Contractual Clauses (SCC) emesse dalla…
  • Whitepaper

    March 21, 2023
    The Financial Action Task Force (FATF) has long warned that criminals leverage virtual assets not only for predicate or money-laundering offenses but also to evade financial sanctions and raise funds to support terrorism. Even so, the number of recent headlines about criminal activity and sanctions evasion in the crypto industry is alarming. Cryptocurrency-based crime hit an all-time high of $20.…
  • Survey

    March 29, 2023
    Technology leaders are exploring new ways to drive innovation and maximise the value of IT in a changing world driven by disruption and a need for acceleration Executive Summary Innovation is the name of the game in today’s global market. Recognising this new reality, CIOs, CTOs, CISOs and other technology executives and leaders are exploring new ways to fuel innovation throughout their…
  • Newsletter

    February 12, 2021
    Like any enterprisewide organisational change, implementing an operational resilience programme across an organisation requires a careful and collaborative effort to be successful. Whether implementation has been in the works for several years or is just beginning, turning the resilience programme from concept to reality is hard work. Except for the most dynamic and change-oriented organisations…
  • Survey

    October 2, 2018
    GDPR: qual è il grado di maturità delle aziende italiane? A questa domanda intende rispondere la survey condotta da Oracle Community for Security insieme a Protiviti, Clusit, AUSED ed Europrivacy nel periodo compreso tra marzo e giugno 2018 e rivolta a 239 aziende operanti per lo più nei settori dell’Information Technology, Manifatturiero, Bancario e Finanziario, Utilities, Servizi e Professioni…
  • Flash Report

    May 21, 2019
    Il 25 febbraio 2019, a seguito del processo di consultazione avviato il 22 giugno 2018 e conclusosi nel settembre 2018, l’EBA ha pubblicato la versione definitiva delle “Guidelines on outsourcing arrangements” in materia di esternalizzazione di funzioni e attività aziendali, applicabile a tutte le istituzioni finanziarie. Tra le principali finalità sottese all’emanazione delle Linee Guida si…
  • Whitepaper

    October 22, 2020
    Contrary to popular belief, criminals — insiders or outsiders — are not the most common cause of major operational failures. Technology is the biggest culprit. The rapid adoption of artificial intelligence (AI), blockchain, robotic process automation (RPA), cloud computing and other technologies continues to transform finance. It has created a mix of technological risks that frequently disrupt…
  • Client Story

    April 9, 2021
    Data privacy has become a strategic priority as companies adapt to comply with rapidly proliferating data privacy laws. Recent years have seen the adoption of the European Union’s General Data Protection Regulation (GDPR), the more recent California Consumer Protection Act (CCPA), and similar regulations. These safeguards require companies to document the types of protected personal data used in…
  • Whitepaper

    August 1, 2022
    The purpose of security analytics in an organisation Security metrics and the analysis of security information can be challenging concepts even for leading organisations. As information security professionals, most of us have been taught that in order to have a mature information security function we must both document and measure the organisation’s security capabilities. If policies are the…
Loading...