Connect with us


Organisations must embrace technology skills development or fall behind



Making the cut: will today’s finance skills meet rising demand in a talent short market?

By Sean Farrington, Senior Vice President, EMEIA, Pluralsight

Digital transformation is increasingly becoming a top priority for CEOs around the globe–and rightly so.

More and more CEOs are realising if they don’t embrace digital transformation and incorporate technology into the core strategy of the companies they lead, they risk being left behind.

For enterprises sitting on the fence, they need only consider the closure of UK high street heavyweights BHS and Maplin as well as U.S.-based behemoth Toys ‘R’ Us to see the impact of failing to embrace modernisation programmes in time.

Despite these unfortunate stories, many businesses are finding new ways to embrace technology and stand out from the competition. Be it through automating manual processes which British Gas is doing by transitioning traditional gas readings with smart meters or by championing convenience such as online supermarket Ocado. These are effective product strategies, but to be truly successful in the long-term, a company’s entire business proposition must be underpinned by technology. This means that digital transformation cannot be seen solely as a management and investor initiative but engrained across the entire workforce. It’s crucial that employees learn and engage with the latest technologies always with the goal of delivering new innovations to market.

Sean Farrington

Sean Farrington

McKinsey suggests that the demand for new skills will dramatically increase by 2030, requiring a 55% rise in the supply of equipped workers. Filling these positions, however, is not going to be enough as there are not enough developers to fill all the open jobs. Further compounding the problem is the fact that because technology moves so fast, today’s engineers, coders and developers are constantly behind the curve, which leaves a global technology skills gap. In fact, according to the Economist Intelligence Unit 94% of executives say there is a digital skills gap in their businesses and 59% of IT employees worry that their current skills will become obsolete.

The challenge is massive, but our ability to meet it head on is achievable. To do so will require an almost complete reskilling of the workforce. However, the last time there was such a significant shift was the industrial revolution—so, as a society, we’re a little out of practice. To fully realise the potential opportunity, businesses must rethink how to develop technology skills within their organisations in order to deliver on their business objectives.

The need for continuous technology skill development

First and foremost, businesses should adopt a culture of learning to confront this new demand for skilled workers. According to a recent report from Deloitte, organisations with a strong learning culture are 56% more likely to be first to market. They will also outperform the profitability of their peers by 17%.

Aside from just being a smart business strategy, fostering a culture of ongoing technology skill development is the only way to keep pace with the speed of technological innovation and digital transformation. Decades ago, there were two software languages. Today, there are more than 250 languages and they’re constantly being updated, sometimes more than eight times per year. In fact, Java had 5 updates in the last year and PHP had 20.

McKinsey finds that IT, programming and data analytics will become the most sought-after skills over the next three years. You can add to the list, cloud, security and mobile. And you can bet new skills will keep emerging that companies need to identify and stay ahead of to remain competitive. And so, developing the needed technology skills has never been so important to meet demand for these skills and ensure future business success.

Finding alternative routes to technology skills development

In-person classroom learning has been a staple to teach engineers and developers the latest technologies for decades, but it is outdated, expensive and ineffective. Leaders will find it’s very costly, both in terms of time and money, and it doesn’t scale. It’s also inflexible, as it assumes a one-size-fits-all approach without taking into consideration the individual skill levels of team members.

Employees learn best in a comfortable and supportive environment. They want to understand where their current skill level is, have a clear idea of progression, and personalisation for their development and goals. They also want to be empowered with the freedom to venture out and learn new technologies, frameworks, and tools that, while not necessarily assigned to their role, could unlock possibilities for their organisations in the future.

To take full advantage of this opportunity, employers need to look towards digital on-demand technology learning platforms to provide the type of learning enrichment employees need. These platforms combine skill assessments, course libraries, personalised earning paths and analytics to ensure that learners have access to the courses they need and want. They are easily scalable too, with courses taught by world-renowned subject matter experts and on-demand accessibility to learn anytime, anywhere on any device.

While there are obvious direct benefits to employees to hone their existing skills and skill up in new ones, importantly, on-demand technology learning supports company goals as well. Through personalised measurement tools, employers can understand their organisation’s skills gap and benchmark their workforce against industry standards, addressing learning needs in an efficient and targeted manner. As a result, a digital technology learning platform can help companies identify the latest technologies and then train their workforce with the right skills to keep pace with innovation and execute on their core objectives. This in turn better positions companies for profitability and competitive advantage.

Embracing change

We’ve entered an age where your technology strategy is your company strategy—it’s no longer a nice to have but a need to have. By adapting their business proposition to one grounded in technology, organisations can deliver innovation at scale and better meet customer needs. But in order to do so, they need technology teams that are equipped with the right technology skills to deliver against these goals.

Hiring new talent is a challenging avenue to pursue, and the well-documented skills shortage means that it’s more competitive than ever to recruit and retain technology professionals. Companies can overcome this obstacle by first embracing a model of continuous learning and then deploying technology learning platforms to ensure their existing teams have all the skills they need to thrive in their roles. Employees can be taught in bite-sized chunks, learn a new skill and put it into practice before going back to learn more skills, supporting talent mobility programs to shift and deploy team members strategically. By embracing a twenty-first century approach to developing technology skills and empowering teams with access to on demand technology learning platforms, CEOs can successfully navigate the skills mismatch and keep themselves at the forefront of innovation and in the heart of the customer.


Using AI to combat fraud risk



Using AI to combat fraud risk 1

By Andrew Foster, VP consulting, AppZen

Fraud experts use three factors to explain the motivation for an individual to commit fraud – pressure, opportunity and rationalisation. While the percentage of employees committing fraud is very low, this model, known as the Fraud Triangle, is used to explain what lies behind it for those who do commit it.

Coronavirus has had a huge impact in driving up fraud levels because it has increased all three elements of the Fraud Triangle and has pushed the risk of financial fraud to unprecedented levels.

Many people are clearly now under increased financial pressure. Coupled with this, companies have changed working practices, and cut or furloughed staff, putting traditional controls under intense pressure and creating more opportunities for those few individuals who are now more able to rationalise fraud.

Combatting rising fraud risk

Finance professionals and business managers are clearly facing many challenges in the current climate and fraud mitigation may not be the top priority. Unfortunately, attempted business spend fraud is increasing and will go up in the coming months and years. By taking proactive steps and implementing the right approach it is possible to protect company expenditure and also to save time and money.

At a time when costs are under great strain and adding investigative staff is a hard sell, how can organisations stop would-be fraudsters? It turns out there is some good news. By rethinking controls regimes and mining the data already coursing through existing enterprise systems, businesses can identify, investigate, and remediate potential fraud – and even prevent it in the first place.

AI-powered software developed specifically for finance teams can revolutionise spend and expense management, enabling organisations to quickly and accurately identify spend risks and combat fraud. This approach helps companies rely less on an auditor’s luck in catching a few bad actors and more on a systematic, data-driven and fair approach.

There are four key reasons why AI understands financial documents better than anyone else:

  1. AI looks at everything: every transaction, every line item.
  2. AI remembers everything, so it can spot anomalies and duplicates over time.
  3. AI doesn’t just look at the transactions themselves, but at their context.
  4. AI is continuously learning from the collective experience, insight, and problem spots from their large
    Andrew Foster

    Andrew Foster

    enterprise customers.

Analysing huge volumes of information without an army of analysts

AI software reads financial documents – like POs, receipts, and contracts – and extracts meaning from all the structured and unstructured data in those documents to identify the problem areas. Because AI can process such a huge volume of transactions, it’s extremely accurate at recognising when something is awry. Most of the time, it isn’t fraud – it’s a duplicate receipt, or someone expensing an out-of-policy item. Regardless, AI systems save finance teams’ time by highlighting only high risk transactions that need review and eliminating the need to spend time spot checking transactions (the majority of which are just fine).

Perfect memory

AI systems remember every transaction and document ever processed, which makes catching duplicates over time, across departments, or price or quantity anomalies, straightforward and easy. They will systematically identify which employees are over the policy line; for example, which employees are consistently spending slightly higher than the stipulated meal limit, delivering an objective way to see who is pushing the limit of T&E policy, not being diligent, or even committing fraud.

Using collective market insight

AI software vendors have large numbers of companies using their systems and by collecting information across all their customers they have unrivalled insight into a lot of different kinds of misbehaviour. This enables them to spot trends or common fraudulent behaviours. As their systems learn, they share patterns that represent high risk (without sharing the transaction data) so that all users of their systems can benefit from what they’ve seen and learned from the entire customer base. This increases their effectiveness and accuracy in identifying and stopping expenses fraud.

Customisable controls

Of course, in many cases, what’s out-of-policy for one company is in line with policy at another. AI systems combine the benefits of scale with individual controls that let each customer automate their own policies and tailor the risks they care about most by creating custom rules to build their own spend policies, controls and risk levels.


Through an automated, AI-driven approach, finance teams can catch duplicates, stop wasteful or over-the-limit spend, identify data entry typos, find incorrect receipts and block out-of-policy expenses, far more quickly and effectively than any manual process ever could.

In these times where resources are being stretched to the limit and fraud risk is at a record high, streamlining the process and removing error-prone manual tasks gives finance teams far better visibility into patterns of behaviour and spend within an organisation, and eliminates wasteful, fraudulent or out-of-policy spend.

Continue Reading


The role of wearables in the future workplace



The role of wearables in the future workplace 2

By Stefan Spendrup, Vice President of Sales Northern and Western Europe at SOTI

With the world having to adapt fast to social distancing, the avoidance of touching surfaces where viruses can be transmitted, and the increased monitoring of healthcare, it’s no wonder that the wearable tech market, which offers solutions to all these dilemmas, is set to grow 137% by 2024.[1]

While the places that we work in have already been disrupted with perspex screens, one-way systems, hand sanitising stations and ‘bubbles’, the next big disruption in the workplace is going to be wearable devices. Statistics show that by connecting workers to one another and to resources, 50% of companies expect to see a boost in productivity.[2] Where will this boost come from? Here are some of the key areas that wearable devices are impacting in the future workplace and the challenges that need to be overcome.

COVID-19 prevention

With many medium to large workplaces playing host to hundreds, if not thousands of people, it is an impossible task to keep all touchpoints on doors and barriers clean. At the same time, access must be controlled for safety and security. While electronic passes have existed for a long time, using wearables to grant access can help keep people moving, eradicating the need to touch surfaces and reducing the spread of viruses.

More advanced possibilities include ordering a lift in advance from a smartphone to help ensure a flow of traffic in busy high-rise buildings, booking meeting rooms to aid with test and trace records, and replacing lunch queues with bookable slots.

One of the key indicators of COVID-19, and in fact many transmittable diseases, is a rise in body temperature. Wearables in the workplace can keep track of any changes in people’s vital signs to help identify and isolate members of staff that are unwell, preventing the entire workforce from becoming ill.

Safety and situational awareness 

By gaining insights into their business operations in real-time, wearables also allow employers to make smarter decisions and take a more proactive approach to ensure the safety of their employees. Wearable devices can be personalised and configured to a worker’s exact needs and specifications. They can also be equipped with haptic response capabilities that employers can use to inform workers if they are operating in an unsafe manner. After all, one bad twist or bend could result in a workplace injury and take that person out of action.

The data capture capabilities of wearable technology can help determine which tasks workers are performing incorrectly, and which may be contributing to inefficiency or poor performance. Organisations can also produce daily, weekly, monthly and yearly reports/scorecards to track performance and identify trends. This can help in targeting risks and mitigating those risks to decrease the potential for injuries and other safety incidents. This can also help identify high-risk employees and situations so employers can intervene accordingly with additional training or tools, helping to combat injuries, fatigue and lost productivity.

Streamlined processes and increased productivity 

Wearable technology will also help organisations increase their efficiency and productivity in several ways.[3] There is a larger demand for products to be made faster and cheaper across industries. Consumers are looking for the easiest and quickest ways to buy products and services. Wearables can help speed up production costs, cut down on operational expenses and alleviate unnecessary strain on workers.

These devices can help automate previously manual processes, help to develop a more hands-free environment, and collect and share data on a local network. For example, leveraging wearable technology to design and test new products in simulated environments can increase design accuracy and enable organisations to identify and rectify any issues before products are released. This also removes the need for physical design prototypes, cutting down on development time and production costs.

Personalised and effective training

Organisations can leverage wearable technology to streamline their training and make it more efficient and tailored to the specific employee receiving the training. Wearable technology also boosts performance, improves employee satisfaction and increases knowledge retention amongst employees. Wearables allow organisations to create immersive task simulations for training purposes. Wearables will take scenario training to an entirely new level by placing employees in simulated situations that closely mimic what a day on the job will truly look like. Instead of watching actors deal with fake situations on a television screen, employees will have the opportunity to work through the scenarios themselves, venture down their decision-making paths and chart their own courses of action. The days of one-dimensional presentations are over as we usher in a new era of interactive training.

Wearables also allow for a more in-depth product knowledge training experience. Rather than asking employees to read various sales sheets, product sheets or corporate brochures, wearables can give employees three-dimensional training on how various products work. They can test out products in real-life scenarios without ever leaving the building. This type of immersive training will ensure employees know everything (specs, benefits, etc.) there is to know about a product and its use cases, helping them sell, advise or troubleshoot products more effectively.

Challenges and concerns related to wearable technology 

When implementing wearable technology into an organisation, it is also introducing a new level of data collection and, as a result, a new area of security concern. It becomes increasingly important to protect the device and the data housed within the device from unwanted access, the same way a company would protect employee information, financial records, etc. And security is not the only concern related to new IoT devices. Organisations will need to worry about compliance, management, updates and more.

Having one central platform can help breakdown organisational silos to eliminate downtime, build applications faster, and manage all mobile and IoT devices in one place, including wearable technology. Wearables are already revolutionising the way workers do their jobs, from law enforcement officers using body cams to gather evidence or record their interactions with the public, to hospital workers using wireless pendants to streamline communication and improve the patient experience. COVID-19 is only accelerating this push towards this integration. It is exciting when we look at the potential and possibilities for wearables in the workplace, but organisations that take the time and care to ensure their devices are properly managed, will reap the most benefits.




Continue Reading


Endpoint Security Industry: An Overview



Endpoint Security Industry: An Overview 3

Endpoint protection is the practice of stopping unauthorised actors and campaigns from targeting endpoints or access points of end-user computers like desktops, notebooks, and handheld devices. Endpoint security solutions guard against cybersecurity risks to these access points on a network.

From standard antivirus applications, endpoint security has developed to offer robust protection from advanced ransomware and emerging zero-day attacks. Nation-states, organised crime, hacktivists and deliberate and unintentional insider attacks are at risk of organisations of all sizes. Endpoint defence is also seen as the forefront in cybersecurity, which is one of the first locations businesses look to protect their business networks. Digital Audio Workstations [DAWs] Market

Modern EPPs harness the cloud’s ability to manage an ever-growing hazard intelligence database, release bloat endpoints correlated with locally storing all this intelligence, and the maintenance needed to keep these databases up-to-date. It also provides superior speed as well as scalability to access this data in the cloud. The EPP includes a single console for system administrators that is mounted on a network gateway or server that enables cybersecurity experts to centrally monitor the protection of each computer.

An Evolution in Endpoint Security

Over the years, the defence of endpoints has progressed from primitive antiviruses to more sophisticated next-generation antiviruses using advanced technologies, new and improved identification and the response of endpoints, and the OS-Centric Optimistic Security strategy. In a constant basis, it shifts. Network vulnerabilities from yesterday are today’s strengths.

Tomorrow’s vectors of attack will inevitably be defended. And then, it’s off. Yet there has been a step-change in the cybersecurity world. The global pandemic got humanity to fewer than 12 parsecs in the Future of Jobs. In two weeks, strategy plans that were set out to be applied in two years were followed. Attacks grew as the perimeter of the network extended indefinitely. And the CISO obeyed and kept the company secure. To focus on endpoint defence, the cybersecurity world aligns.

Key Components of Endpoint Security

Endpoint encryption and application control, two main components of an efficient endpoint protection solution, are important endpoint security layers that prevent problems such as data leaks from occurring deliberately or accidentally by copying or moving data to removable media devices. Endpoint encryption completely encrypts endpoint data, like notebooks, cell devices, and other endpoints, as well as directories, archives, and portable storage devices, such as CDs and USB drives, for your business.

Application monitoring, a key component of robust endpoint protection initiatives, avoids the operation of unauthorised software on endpoints. Regulation of software addresses the problem of workers installing unauthorised or unsafe software on mobile devices that may build network bugs and result in unauthorised entry.

Endpoint security is handled in the business environment by a central management server that tracks and handles all endpoint connexions to the network. However, security solutions such as antivirus software are monitored and managed at individual endpoints in the consumer environment, without the need for central administration.

The Risks of Endpoint Threats

Security is rapidly changing in today’s mobile world, and endpoints now form a new perimeter, and companies need to secure their data across networks. As companies expand, so do their vulnerabilities, and all businesses must secure endpoints regardless of size or stature. However, there is no apparent, easily guarded line that can hold all the data in and attackers out of the system with the growth in telecommuting, more workers requested or compelled to operate from home, the Internet of Things (IoT), and cloud services.

Endpoint threats help to know what kind of susceptibilities exist to gain an improved understanding of what is required from endpoint protection. A few kinds of attacks that are or are becoming more common are listed below. It is necessary to bear in mind, however, that many more forms of attacks exist and attackers every day learn new methods. Legal ramifications: Infringement of data and loss of personal or confidential information is a serious problem that can lead to considerable legal harm. Reputational damage: Businesses suffering data breaches and cyber-attacks are at risk of adverse public opinion, leading to reduced brand and reputational damage.

A Glance at Importance of Endpoint Security in Today’s World

Endpoint security strategies play a significant role in defending against today’s increasingly advanced cyber threats. Today’s cyber-attacks need a new line of security protection. For a variety of factors, an endpoint defence framework is a critical part of enterprise cybersecurity. First of all, data is often the most important asset a company has in today’s business environment and losing that data or access to that data could put the whole business at risk of insolvency.

Businesses have now had to deal with not only a rising number of endpoints but also an increase in the number of endpoint forms. These variables make it more difficult for enterprise endpoint protection on their own, but they are exacerbated by remote work and BYOD policies that make perimeter security increasingly inadequate and generate vulnerabilities.

The threat landscape is also becoming more complex: hackers are constantly seeking new ways to gain access, steal data or trick employees into distributing confidential data. The endpoint security platforms have become a must-have in terms of protecting modern companies because of the cost of a large-scale breach, cost of transferring resources from business objectives to tackling threats and the actual financial cost of enforcement breaches.

An entry point for threats is given by any computer, such as a tablet, smartphone or laptop. Endpoint security seeks to properly protect any endpoint connecting to a network at these points of entry to block access attempts and other risky activities. The corporate network security perimeter has effectively collapsed as more companies accept activities including BYOD (Bring Your Device) and remote/mobile workers.

The need for effective endpoint protection measures, especially because of the increase in mobile threats, has increased substantially. A centralised security solution is no longer sufficient for today’s ever-shifting and undefinable security limit, with workers relying on mobile devices and laptops to work and connect to business networks. Endpoint security offers a further shield to centralized security controls at the point of entry for some attacks and the point of exit for sensitive information.

Differentiating Endpoint Security from Anti-Virus Software

What separates endpoint protection from popular anti-virus applications is that endpoints are responsible for or more of their protection in the endpoint security framework. This goes against network security, where security measures protect the network as a whole instead of certain computers and servers. Endpoint defence, however, is not carried out exclusively on smartphones.

Common endpoint defence techniques with security tools on a central server or control board and tools on individual devices provide a two-pronged approach. Still, by some definitions, certain simpler types of protection fall under the safety umbrella of the endpoint. That said, modern concepts of endpoint protection typically define more sophisticated methodologies, including intrusion detection and behaviour-blocking elements that either end-users or intruders recognise and block threatening activities and behaviours.

Common Trends in Endpoint Security

Endpoint security trends forecast the future of endpoint threat management and the solution features that we will see in the future in the industry. As trends for the year 2018, several developments have been facing, including machine learning and AI, SaaS-based endpoint defence, layered protection against file-less attacks, putting IoT devices under the protective umbrella, etc.

Today’s methods can achieve better remediation, which ensures that operations such as deleting data, terminating procedures, and rolling back photos of the system can spare IT, employees, the tedium of manually reimaging violated systems.

Endpoint Security Software Features to Look for in 2020

There were 4.1 billion accounts of data threats in the first half of 2019 alone. Therefore, employing an endpoint security framework has become essential for every enterprise. Some of the top endpoint security software features to look for: Securing devices, especially USB ports, generating reports, Device-based and user-based security policies, Application Control, Remote patch installation to quickly fix critical vulnerabilities, Strong secure communication encryption algorithm, Receiving configuration security/status alerts, Browser management

In 2020, companies must secure more ends than ever with the global pandemic COVID-19 requiring more workers to operate remotely. Attackers know that human beings, who now often operate beyond the regulated environment created by office computers and networks, are the weakest link to security. Forced outside of the formal system, individuals are more vulnerable to weaknesses and generate openings for attack.

The Future of Endpoint Security

In 2020 and the near future, enhancing endpoint protection needs to be a top priority. The borderless and non-discriminatory existence of cyber-attacks means that sharing their experiences and working together to defend themselves and the general population is essential for the cybersecurity industry. Endpoint security has grown from modest beginnings of protecting standard PCs to protect complex networks in large enterprises, protecting varied environments like business-issued hardware, programmes for bring-your-own-device (BYOD) and more.

For corporations and private clients, cybersecurity used to be all about protecting the endpoint. Since then, rapid technological growth has forced security firms, such as Bitdefender, to develop new techniques and business strategies that could meet the needs of ever-larger organisations. 86% of all infringements are financially motivated, where risk actors are after financial data, intellectual property, health records, and consumer identities of companies that can be easily sold on the Dark Web.

Cybersecurity has repeatedly become one of the leading anxieties for companies around the world in recent years, and this pattern will worsen in 2020. We expect to see an increase in new specifications as businesses increasingly recover from the current pandemic. The evolution of large-scale breaches symbolises a growing trend in the number and gravity of security breaches. Data breaches frequently disclose confidential information that also puts consumers at risk of identity fraud, damages the reputations of firms, and puts businesses responsible for violations of compliance. Cyber Observer, a comprehensive solution for cybersecurity management and understanding, estimates that by 2021, cybercrime harm is expected to exceed $6 trillion annually.


Security is constantly evolving and there is a possibility that the future might hold much more than what we have seen. We cannot, however, ignore the changes that have been seen from the past several years to where we have gotten to today.

Who We Are

Adroit Market Research is a global business analytics and consulting company. Our target audience is a wide range of corporations, manufacturing companies, product/technology development institutions and industry associations that require understanding of a market’s size, key trends, participants and future outlook of an industry. We intend to become our clients’ knowledge partner and provide them with valuable market insights to help create opportunities that increase their revenues. We follow a code– Explore, Learn and Transform. At our core, we are curious people who love to identify and understand industry patterns, create an insightful study around our findings and churn out money-making roadmaps.

Continue Reading
Editorial & Advertiser disclosureOur website provides you with information, news, press releases, Opinion and advertorials on various financial products and services. This is not to be considered as financial advice and should be considered only for information purposes. We cannot guarantee the accuracy or applicability of any information provided with respect to your individual or personal circumstances. Please seek Professional advice from a qualified professional before making any financial decisions. We link to various third party websites, affiliate sales networks, and may link to our advertising partners websites. Though we are tied up with various advertising and affiliate networks, this does not affect our analysis or opinion. When you view or click on certain links available on our articles, our partners may compensate us for displaying the content to you, or make a purchase or fill a form. This will not incur any additional charges to you. To make things simpler for you to identity or distinguish sponsored articles or links, you may consider all articles or links hosted on our site as a partner endorsed link.

Call For Entries

Global Banking and Finance Review Awards Nominations 2020
2020 Global Banking & Finance Awards now open. Click Here

Latest Articles

How can businesses celebrate Halloween virtually? 4 How can businesses celebrate Halloween virtually? 5
Top Stories1 day ago

How can businesses celebrate Halloween virtually?

Bring the spooky season to life by virtually gathering the team for fun activities during October. Even though this year’s...

Five key challenges CIOs in insurance will face over the next 12 months 6 Five key challenges CIOs in insurance will face over the next 12 months 7
Top Stories1 day ago

Five key challenges CIOs in insurance will face over the next 12 months

By Andrew Jenkins, Principal in the CIO & Technology Officers Practice at Odgers Berndtson, discusses five challenges CIOs will face as...

Why the future of work hinges on a mutually beneficial employer-employee contract 8 Why the future of work hinges on a mutually beneficial employer-employee contract 9
Business1 day ago

Why the future of work hinges on a mutually beneficial employer-employee contract

By Stuart Hearn, CEO and founder of Clear Review, the leader in performance management It feels like there’s been almost continual talk of...

For lenders: 5 reasons for losing a customer 10 For lenders: 5 reasons for losing a customer 11
Finance1 day ago

For lenders: 5 reasons for losing a customer

By Matt Cockayne, Chief Commercial Officer at Yapily Businesses of all sizes are battling the ongoing effects caused by the...

Eight Benefits of International Financing 12 Eight Benefits of International Financing 13
Finance1 day ago

Eight Benefits of International Financing

By Luigi Wewege is the Senior Vice President, and Head of Private Banking of Belize based Caye International Bank   Lending...

How the UK’s tax system could change to recover from COVID-19 14 How the UK’s tax system could change to recover from COVID-19 15
Finance1 day ago

How the UK’s tax system could change to recover from COVID-19

By Finn Houlihan, Director at ATC Tax   The economic impact of the COVID-19 pandemic on the British economy continues...

LightArt's Project Demonstrate What The Future Hold For Real Estate Market 16 LightArt's Project Demonstrate What The Future Hold For Real Estate Market 17
Top Stories1 day ago

LightArt’s Project Demonstrate What The Future Hold For Real Estate Market

This piece explores how LightArt byTom John Or-Paz seeks to leverage art to improve neighborhoods at scale in the branded...

The digital game plan for CFOs in a post COVID-19 world 19 The digital game plan for CFOs in a post COVID-19 world 20
Finance1 day ago

The digital game plan for CFOs in a post COVID-19 world

By Neil Kinson, Chief of Staff, Redwood Software – explains the digital priorities for CFOs as they prepare for a...

Keynotes Announced: SAP Financial Services Live 2020 21 Keynotes Announced: SAP Financial Services Live 2020 22
Events1 day ago

Keynotes Announced: SAP Financial Services Live 2020

We are delighted to announce our Keynote Speakers & Session Titles for the upcoming free to attend digital event for...

Using AI to combat fraud risk 23 Using AI to combat fraud risk 24
Technology1 day ago

Using AI to combat fraud risk

By Andrew Foster, VP consulting, AppZen Fraud experts use three factors to explain the motivation for an individual to commit...

Newsletters with Secrets & Analysis. Subscribe Now