technology

Image for If we want more women in cyber security roles, we need to start at school

Technology

If we want more women in cyber security roles, we need to start at school

Image for How to make a website?

How To

How to make a website?

Image for Is Your Small Business At Risk of Cyber Attacks?

Technology

Is Your Small Business At Risk of Cyber Attacks?

Image for How Zero Trust Architecture is creating a passwordless society

Technology

How Zero Trust Architecture is creating a passwordless society

Image for HSBC Counterparty Credit Risk and Valuation Adjustments on Google Cloud Case Study

HSBC Counterparty Credit Risk and Valuation Adjustments on Google Cloud Case Study

Date: April 6, 2022

HSBC: Driving breakthrough compute capacity and speed with Dataflow running on Google Cloud HSBC delivers new counterparty credit risk (CCR) and derivative valuation adjustment (XVA) engine with in-house built analytics library NOLA 2.0, powered by Google Cloud. The cloud-native risk management solution boosts calculation speed 10x by combining Graph Theory from Mathematics and Dataflow Elastic...

Image for Does endpoint security matter?

Does endpoint security matter?

Date: April 5, 2022

Protecting your business against cybercrime has never been more vital. 2021 saw 50% more cyber attacks per week on corporate networks compared to 2020 and more and more businesses are making cybersecurity a top priority. It’s becoming increasingly common to seek help from an expert cybersecurity consultancy firm. However, with the rise in remote working and the blurring...

Image for Security Ecosystems: A cyber security approach to call your own

Security Ecosystems: A cyber security approach to call your own

Date: April 4, 2022

By Adam Louca, Chief Technologist for Security, Softcat Organisations are rapidly adapting to deliver new digital platforms and services for their customers and staff, creating an IT environment that is constantly in flux. But your security strategy doesn’t have to be. When it comes to cyber security, it’s all about balance. Balancing board-level expectations, infrastructure...

Image for Visibility is vital if we are to improve safety and trust in open source

Visibility is vital if we are to improve safety and trust in open source

Date: April 4, 2022

When it comes to securing open source, visibility and transparency are vital writes Vivian Dufour, CEO of Meterian, and when a vulnerability is discovered, the ability to respond fast saves time, resource and reputations. Recent high profile cyber security incidents have reinforced the importance of cleaning up the open-source software supply chain. From Heartbleed to...

Image for Banking on IT

Banking on IT

Date: April 4, 2022

By Rémy Bertot, CTO, Passbolt Banks are particularly vulnerable to cyber attacks for obvious reasons. Scammers have now built tools that automate the process to scale attacks that previously took a lot of human effort from the fraudster’s side, for example, intercepting one-time pins or one-time passwords (OTPs), achieving an 85% hit rate of people...

Image for How Embedded Finance is enabling Fintechs to become more customer-focused

How Embedded Finance is enabling Fintechs to become more customer-focused

Date: April 4, 2022

By Alistair Cotton, Co-Founder at Integrated Finance There’s never been a better time to build a Fintech platform. Software has driven the unbundling of banking services into a defined stack of providers, which means assembling a Fintech today is made possible by picking the best-in-class vendors at each level of the payments stack and re-bundling...