
Four paths to stay ahead of regulation in times of change
Gartner lists four primary options available to legal and compliance leaders to cope with unprecedented levels of regulatory change. These

Gartner lists four primary options available to legal and compliance leaders to cope with unprecedented levels of regulatory change. These

Backdrop: Proofpoint’s The Human Factor 2022 report reveals that more than 20 million messages attempted to deliver malware linked to

The rapid adoption of DevOps in 2021 drove rapid software delivery, better code quality, and improved developer productivity. Key challenges

Cybersecurity is turning into a social phenomenon. Investor interest, public pressure, employee demands, and governmental regulations are strengthening the incentives

The Forrester State of Application Security 2022 report noted that applications are the top cause of external breaches. Software supply

The first known cyber extortion attack dates back to 1989, a decade before the invention of bitcoin. Targeted at the

Devastating cyberattacks causing widespread damage to critical infrastructure and disrupting citizens’ lives are no longer the stuff of Hollywood movies.

Technology governance issues emanating from cross-country politics have led to digital geopolitics rapidly becoming an issue that multinational CIOs must

Back in 1996, a Microsoft employee developed peer-to-peer (also referred to as point-to-point) tunnelling protocol (PPTP) to provide a more

The Enterprise Strategy Group report, Walking the Line: GitOps and Shift Left Security: Scalable, Developer-centric Supply Chain Security Solutions, shows

Whether for personal use or accessing your corporate network, authentication and authorisation are two critical concepts in access control. At

Whistleblowers are the single most effective source of information in detecting corporate fraud. This was the conclusion of a 2007