Insight Search

Sort by:
  • Blogs

    June 18, 2024
    In the consumer products and retail sectors, the burdens of legacy systems and manual processes pose significant challenges for organisations across the value chain from store or online purchases to overall operations. Disconnected applications, error-prone tasks, technical debt and a lack of insight and intelligence can hinder efficiency and innovation. To address these pressing issues, a…
  • Blogs

    February 9, 2023
    Organisations have grown more productive by embracing the scalability and performance of cloud computing. As they’ve become more sensitive to matters of sustainability, however, organisations will place greater focus on the sustainability of cloud computing models from an overall environmental, social and governance (ESG) standpoint. This is true globally, whether ESG goals are driven by…
  • Whitepaper

    November 18, 2022
    In this issue of the Credit Pulse, we look at credit risk considering the macroeconomic and geopolitical trends likely to shape the financial services industry over the next six months. First, we focus on critical considerations for loan servicers in the post-pandemic era. Then, we discuss risk management practices for non-financial organizations that extend trade credit and institutions that…
  • Flash Report

    December 13, 2023
    On December 8th, after two and a half years of negotiation, the Council of the EU and the EU Parliament finally reached a provisional agreement on the EU AI Act, which was first proposed by the European Commission in 2021. The agreement creates legislation that introduces harmonised rules and definitions for those using AI systems and putting those systems into service and bans certain types of…
  • Blogs

    May 17, 2024
    An SAP S/4HANA transformation project has many risks that need to be managed and often, it is difficult for the project team operating day to day on detailed tasks to “see the forest for the trees.” The PMO has intimate knowledge of the key processes and risks associated with the project and, as such, is in an ideal position to develop mitigation strategies in collaboration with the system…
  • Blogs

    July 31, 2023
    For security teams looking to implement and design smart contracts, there are many intricacies and nuances that can be overwhelming. Using established standards for the secure development of smart contracts/decentralised applications (dApps) is instrumental to effectively launch smart contracts. In an earlier blog, I introduced the basics of smart contracts; today, I’m diving into existing…
  • Flash Report

    June 3, 2022
    Three months ago, the U.S. Securities and Exchange Commission (SEC) proposed amendments to its rules on cybersecurity risk management, strategy, governance and incident reporting by public companies subject to the reporting requirements of the Securities Exchange Act of 1934. The SEC’s view is that cybersecurity threats and incidents pose an ongoing threat to public companies, investors and…
  • Blogs

    May 17, 2024
    Anyone who wins business via competitive bid may have noticed that requests for proposals (RFPs) increasingly feature instructions to adopt inclusive language in responses. Over the past several years, more and more potential customers are seeking cybersecurity partners whose values in the areas of diversity, equity and inclusion (DEI) correspond with their own. Sometimes, enterprises will…
  • Blogs

    February 23, 2024
    In today’s interconnected world, where adversaries seem to always be one step ahead, companies face an increasingly complex threat landscape. One of the most challenging and often overlooked threats is the dark web, an intentionally hidden part of the internet where threat actors can operate with a greater sense of anonymity. To adequately protect assets, companies need to do more than merely…
  • Blogs

    January 31, 2024
    Segregation of duties (SoD) is a well-known term among auditors and anyone who has ever been audited. SoD is the understanding that no user should have access to two conflicting business functions that would allow a user to commit fraud or error (e.g., the ability to create a vendor record, then process a payment to that vendor). The idea can be intimidating and overwhelming to those who do not…
Loading...