The results are in from another independent analyst report and it’s great news for Trend Micro’s endpoint security. We achieved the highest score possible for the “strategy” category, were top ranked for “current offering” category, and among the second-highest scores in the market presence category, according to The Forrester Wave: Endpoint Security Suites, Q2 2018 … Read more
Regulation round-up is our monthly email to all regulated firms, updating you on the latest news that affects your sector.
Basel Committee issuing latest progress report on banks’ implementation of the Principles for effective risk data aggregation and reporting, June 2018.
Basel Committee issues progress report on banks’ implementation of the Principles for effective risk data aggregation and reporting, 21 June 2018
The four “Vs” of data are well known – volume, velocity, variety and veracity. However, data warehousing infrastructure in many organisations is no longer equipped to handle these. The fifth elusive “V” – value – is even more evasive. Meeting these challenges at the scale of data that modern organisations have requires a new approach … Read more
Money Fellows is an Egyptian startup which was founded by Ahmed Wadi in 2014. The startup is a partnership group savings and lending platform. It aims at digitizing credit associations and rotating savings. Early in 2018, Wadi the CEO got equity investment worth $600,000 from Dubai Angel Investors and 500 startups. Wadi is planning to use … Read more
Just last week I was part of launching DNB ID, an app making it possible to safely and securely iden…
Should you send your data to computers or bring your computing assets to the data? This is a major question in IoT. A few years ago you might have said “everything goes to the cloud,” but sheer size and scope often makes a smart edge more inevitable. IDC estimates that 40% of IoT data will … Read more
Do you own a Mac? If so, you might have the common perception that they’re more secure from internet threats than Windows PCs. Unfortunately, this isn’t the case. The truth is that Macs have historically not been targeted by hackers as frequently as Windows systems, simply because there were fewer to attack, so it didn’t … Read more
Using your camera and a QR code scanner on your mobile device, it’s easy to scan a code to download an app or go to a website—a bit too easy, some might say. What if the QR code is for a malicious app, or takes you to a dangerous website? How would you know before … Read more