The dynamic transformation of enterprise fraud management ecosystems
With the ongoing advancements in technology, new regulatory mandates and the changing tactics of fraudsters, Enterprise Fraud Management (EFM) is always trying to stay ahead of the curve. The last few years have shown this trio of trends can align to create a perfect storm within the EFM landscape. Legacy EFM ecosystems no longer stand […]
How can organisations stay secure in the face of increasingly powerful AI attacks?
It’s almost impossible to escape the hype around artificial intelligence (AI) and generative AI. The application of these tools is powerful. Text-based tools such as OpenAI’s ChatGPT and Google’s Bard can help people land jobs, significantly cut down the amount of time it takes to build apps and websites, and add much-needed context by analysing […]
The tension between the CDO and the CISO: The balancing act of data exploitation versus protection
Data is the most valuable resource for the global enterprise. For any company wanting to remain relevant in today’s competitive business landscape, data needs to be at the centre of every business decision, allowing the C-suite to review initiatives, make real-time decisions and if necessary reverse actions. A quick response fuelled by real data insights […]
SD-WAN and SASE: Evolving Network Security Alongside Cloud Adoption
Cloud computing has brought widespread change to the business world, creating global virtual networks of an unprecedented scale. Nevertheless, as business networks become larger, more complex and more cloud-centric with multiple applications, services and devices, they also become more susceptible to vulnerabilities. Enterprises need to ensure that their network security can keep up with the […]
Expensive aftermath – $6.75 million fine after a successful ransomware attack
The software company Blackbaud from South Carolina in the USA was fined $6.75 million after a ransomware attack in 2020. According to the Attorney General, the company grossly violated common IT security practices and attempted to deceive the public about the true extent of the damage. After the Solarwinds breach, another case that points to […]
How to block bad actors and become more cyber resilient
As a wise man once said, a failure to plan is a plan to fail. This is especially true in the world of cybersecurity, where it is all but inevitable that an organisation will face a security incident. According to the 2024 Data Protection Trends report from Veeam, ransomware is the leading type of cyber crime, due […]
Why Identity is the Cornerstone of a Zero Trust Architecture
As organisations continue to embrace digital transformation to gain access to the cloud’s many benefits, this means that computing environments are evolving into borderless IT ecosystems. Digital identities are also evolving at pace and identity security is now a crucial aspect of cybersecurity. As we continue to digitally transform organisations, so the importance of secure and […]
Quantum computing: The data security conundrum
One of the biggest challenges of digital technology today is around security systems and data. In response to this, sophisticated algorithms have been designed to encrypt data and protect it through frameworks known as symmetric cryptography. While this has proven successful, advancements in quantum computing – which utilises quantum mechanics to solve complex problems faster […]
You Can’t Win: Learning to Live with Security Pessimism
Cybersecurity can, at times, feel like a thankless and invisible task. The punishment for a mistake is immediate and ruthless, the reward for success next to non-existent, because how do you recognise the absence of a breach? But this isn’t a new scenario; the IT industry has dealt with this outlook for decades. The job […]
Cybersecurity trends to expect in 2023
We’ve come to the end of another year characterised by heightened cybersecurity risk within an environment defined by rising political, social and economic challenges As such, it’s time once again to look forward and take stock of the future trends that are expected to shape the cybersecurity landscape in the year ahead so that organisations […]