Cyber

silhouette of man standing

Why graph data platform is the answer to combatting fraud and financial crime

Synthetic ID fraud and sophisticated layering techniques for money-laundering make it immensely challenging for investigators to follow the money trail. Graph data technology can unlock the answers ... Read More
selective focus photography of lens

The turning tide against surveillance capitalism

With the delicate balance between customer data and privacy in the spotlight, every organisation needs to be aware of new standards and business models ... Read More
person wearing mask

Why SMEs need a cybersecurity ambassador

All organisations are vulnerable to cybercrime, but SMEs typically have far fewer resources to protect themselves. Many SMEs are on a knife-edge right now and even a small cyber attack ... Read More
gray metal chain in close up photography

Securing your business against cyber threats post-COVID-19

Humans are the “weak link in the chain” when it comes to defending against cybercrime. Human error causes 90% of data breaches ... Read More
5 keys to reducing the risk of your cloud migration

5 keys to reducing the risk of your cloud migration

Time is your enemy when it comes to cloud migration. When scheduling the migration, there are five key things that every cloud architect should keep in mind ... Read More
gray steel chain locked on gate

How businesses can secure themselves in a post-COVID world

Cyber criminals have been taking advantage of the anxiety over the COVID-19 pandemic with a host of new scams. Remote working has created new attack vectors such as insecure home ... Read More
How to protect your business from cyber threats

How to protect your business from cyber threats

The internet is not getting any safer and cyber threats are evolving every year, making it even more difficult for businesses to navigate. Effective cybersecurity requires a three-pronged approach ... Read More
Are e-wallets a threat to society?

Are e-wallets a threat to society?

While the smartphone is today akin to a ‘new-age cash register’, it has proven to be a handy vehicle for criminals. Mobile security threats have evolved ever since the first ... Read More
Safeguarding against AI-based cyber-attacks

Safeguarding against AI-based cyber-attacks

We've now seen the advent of artificial intelligence being used for cybercrime. Fraudsters using AI to mimic voices is just an evolution in technology. But how can you protect against ... Read More
Top 5 Futuristic Technologies That Will Transform The World

Top 5 Futuristic Technologies That Will Transform The World

Forecasters in the 1950s predicted that airborne robots and flying cars would be part of everyday life by the 2000s. Instead, social media networks, smartphones, and live streaming have dominated ... Read More
Where are you in your cloud maturity journey?

Where are you in your cloud maturity journey?

For many enterprises, finding success in the cloud is still a daunting challenge. Too often, organisations set overly high expectations for the benefits of the cloud while underestimating the amount ... Read More
3 common mistakes companies make when adopting cloud

3 common mistakes companies make when adopting cloud

There are many mistakes that companies new to the cloud make when they begin looking into cloud adoption, that can impact the success or failure of cloud migration ... Read More
Blockchain is ready for prime time despite its critics

Blockchain is ready for prime time despite its critics

Over the last few years the hype around Blockchain has been brought to the forefront via mass entry into cryptocurrencies. How should we reconcile our expectations versus the reality? ... Read More
AI and the cloud: Separating fact from fiction

AI and the cloud: Separating fact from fiction

From virtual assistants to chatbots and deep learning, AI is taking up increasing space in the cloud. If you believe the hype, the advent of artificial intelligence is destined to ... Read More
Why the cloud isn't Colditz

Why the cloud isn’t Colditz

Being "in the cloud" can lull companies into a false sense of security. Cloud doesn't mean that someone is taking care of everything for you. Any company still has many ... Read More
Chatbots: Opportunity and threat

Chatbots: Opportunity and threat

In the first six months after Facebook introduced a bot API for Messenger, around 34,000 chatbots were created. They’re being used for a range of purposes, from engaging at the pre-sales point ... Read More
serverless

The rise of serverless architecture

Serverless architecture has become a buzzword, with more and more people using it. But should they be? While there are some situations where serverless offers many benefits, there are also ... Read More
Studies find CEOs more confident about cyber security than CIOs

Studies find CEOs more confident about cyber security than CIOs

Following an increasing number of high-profile breaches and ongoing pressure from governments and regulatory bodies, cyber security is increasingly taking centre stage on most board agendas. Board members are becoming ... Read More