.
HomeSecurity

Security

Why Graph Databases are Ideal forRisk, Fraud and Compliance

Interdependence in Risk, Fraud and Compliance Once of the challenges for applications that deal with...

Preparation is the key to quickly (and quietly) resolving cyber incidents

When you need to deal with a cyber incident, you want to minimize the...

Governance and Risk: A Synopsis for 21st Century Reformers

A big clear book, Governance and Risk, sums up the domain and predicament we...

The Good, Bad and Ugly…The Effect the Latest Pandemic has had on Corporate Governance

The past decade has ushered in a new normal regarding how we maneuver the...

Key Business Changes from the Russian Invasion of Ukraine

After the Russian invasion of Ukraine, the world of business will never be the...

Are you ready for the payment revolution?

The payment revolution has already begun, with the likes of cryptocurrency, mobile wallets, and...

SaaS Security: What is Software-as-a-Service?

The thought that comes to mind after reading the term security is some sort...

A Sensational Leak

Despite all the cognitive abilities at their disposal, human beings have, time and time...

Safeguarding the All-Important Teen Experience

Surely, human beings are the smartest species in the world’s history, but that hasn’t...

Hot Topics