The typical approach to digital transformations has led to broken processes being refined. But what we’re doing is different. We’ve taken a design-led and customer-first approach; not looking at technology, but at how we challenge the entire business model.
Schems 2 means Privacy Shield has been invalidated. But what does that mean for your business and your data? Jim Wright explores the steps you can take to make sure you know where your data is being processed and how to be GDPR compliant.
With phishing attacks playing a major role in the attacks we’ve seen this year, and the increase of attacks playing off the pandemic, it’s more important than ever to instil the basics of cyber security in your teams, especially if they’re working from home and perhaps less in the loop with training and common phishing attempts.
30% of data breaches involved internal actors, which shows how human error still contributes to vulnerabilities. Your people are still one of the weakest links in your security strategy, so continued training and awareness is crucial – especially with the rise of remote working.
Clients may trust you with some of the most important transactions in their lives, yet you may barely know them at all. These relationships are engineered by you, the business, and it’s down to you to orchestrate that relationship to provide you with timely, usable data.
COVID-19 repercussions are coming and good companies will be laser focused on the clients; great companies will do this by embracing data platforms and analytics. Director of Financial Services, Chris Mills explains how to value your client through data excellence.
One common term that is often seen in CVEs relating to the heap is "use-after-free". The use-after-free vulnerability exploits a mistake made by the original author of a software and can result in devastating effects that range from remote code execution to the leaking of sensitive data. In this blog I'll explain what a use-after-free vulnerability is and how it works...