Helping the Financial Sector Deliver Secure and Modern Infrastructure through Regulation
In 2024, ransomware continues to be the most prevalent form of cyber-attack, affecting three out of four organisations, according to Veeam. The increasing frequency and sophistication of these attacks are driven by easy access to ransomware kits on the dark web and the significant profits cybercriminals generate through extortion schemes. For today’s businesses, data is more […]
Zero Trust Architecture: The Key to Securing Hybrid Environments
Hybrid environments have emerged as the new standard for today’s businesses, enabling them to retain agility and a start-up mindset as they expand and grow. According to Allied Market Research, the cloud-native applications market is expected to grow from $5.3 million in 2022 to a staggering $48.7 million by 2032. The same research tells us that […]
Quantum Computing: Navigating the path to Q-Day through standards
The UK Government recently announced that it plans to invest £100 million in boosting quantum development, with the aim of delivering breakthroughs in pivotal areas including cybersecurity. The push for quantum technology development is something of an arms race: cybersecurity experts are anticipating ‘Q-Day’, the day on which quantum computing advances to the point that […]
Why the Gig economy is a key target for API attacks
The gig economy is thriving but it owes its success to the digital ecosystem it is built upon and Application Programming Interfaces (APIs) in particular. The real-time services we associate with platforms such as Uber, Lyft, and Fiverr all use APIs to enable seamless interactions between users, gig workers, and service providers. But APIs are […]
Guarding against AI’s internal threats
The rapid proliferation of Large Language Models (LLMs) across industries is evident, with many companies developing proprietary LLMs for Generative AI applications. A recent survey by Gartner, Inc. revealed that 55% of corporations are currently testing or deploying LLM projects, a figure projected to grow swiftly. However, organisations should exercise caution and carefully evaluate the associated risks […]
Root and stem: Eliminating vulnerabilities at the source with code auditing
The development security operations employed by most organisations are no longer as effective or efficient as they need to be. Too many of the current solutions used are still resulting in vulnerabilities slipping through the net and being shipped as part of final products. While most can be remedied with post-launch patches and updates, by […]
AIOps: Taking IT estates from complexity to clarity
Organisations around the world are gearing up to roll out AI initiatives. So much so, that a recent Riverbed survey reveals that 94% of organisations view it as a strategic priority. These businesses have a balancing act on their hands, tasked with delivering seamless digital employee experiences (DEX) while managing increasingly complex IT estates – […]
ChatGPT turns two: How AI will reshape the future workforce
As ChatGPT turns two, it’s clear that the artificial intelligence revolution it sparked is not fizzling out, but gathering pace, and it’s set to change both the skills young people need in the future job market and the way they learn in school and in higher education. Investment in AI hit $25.2 billion in 2023, […]
The Problem With Third-Party Breaches: A Data Protection Dilemma
Time and time again, organisations face an escalating threat to their data: Third-party breaches. As businesses increasingly rely on external vendors and partners for various services, the security of sensitive information becomes more vulnerable. This poses the question: Are traditional security measures still effective or obsolete in protecting vital information? There has been a notable […]
Your IT team isn’t ready for Change Enablement if they can’t answer these 3 questions
Change Management takes substantial work and it has real world impact when it goes wrong. This year alone, some of our biggest retailers Tesco and Sainsburys fell foul of this, as did Greggs and McDonald’s. If IT systems fail to do what they need to do, as they did in these instances, it’s all too […]