Insight Search Search Submit Sort by: Relevance Date Search Sort by RelevanceDate Order AscDesc Insights paper March 21, 2025 ISO 20022 Compliance Countdown The new global messaging standard ISO 20022 provides a unified language for electronic data interchange between financial institutions. It is intended to result in increased transparency, speed and inoperability. It will also provide valuable enriched data to enhance financial crime compliance efforts. For those institutions yet to adopt the new standard, preparing for migration and dealing with… Blogs December 16, 2022 Enterprise Architecture-Enabled Business Transformation Business leaders have realised that, in today’s world, with factors such as rapid advancements in technology, increasing social media presence, an ever-changing customer desire for product flexibility and eager adoption among Generation Z, technology is a key enabler in driving innovation and efficiency. Technology investments have demonstrated and continue to provide tangible and measurable… Blogs October 11, 2024 5 Tips to Navigate Security in Agile Development In today’s fast-paced digital landscape, DevOps practices have revolutionised software development and deployment, allowing organisations to achieve greater efficiency and agility. As DevOps teams embrace cloud-based infrastructures like Amazon Web Services (AWS), security must remain a paramount concern. Ensuring the security of a DevOps environment in the AWS cloud demands a proactive and multi… Whitepaper March 31, 2025 The Survival Guide for Chief Compliance Officers in Uncertain Times Chief Compliance Officers (“CCOs”) are facing uncertain times due to a combination of factors that challenge the stability and predictability of their operating environments. These factors include geopolitical tensions; rapidly shifting political and regulatory agendas that are resulting in less uniform approaches across the globe; budget and headcount restraints; evolving business models; the… Podcast July 24, 2024 Podcast | Zero-Trust Post-Quantum Cryptography — with XSOC The migration to post-quantum cryptography (PQC) is about to begin and is necessary to protect against the threats of fault-tolerant quantum computing. However, critical assets like those in military, banking, and government environments also require other layers of security and strategies such as zero trust and increased encryption bit sizes. Join host Konstantinos Karagiannis as he discusses a… Podcast October 16, 2024 Podcast | DARPA’s Quantum Proving Ground — with University of Illinois Urbana-Champaign Quantum information science deals with the world of the very small, sure, but imagine 128 acres of land devoted to advancing QIS. Now imagine this mega complex in a major city! The Illinois Quantum and Microelectronics Park is expected to draw leading companies and researchers to Chicago, and DARPA is already playing a significant role. Find out what this will mean for advancing the industry and… Podcast July 23, 2025 Podcast | Open-Source Quantum Sensing at DEF CON — with Quantum Village DEF CON 33 approaches, bringing with it the fourth year of Quantum Village. Nothing like getting hands-on with quantum computing and sensing technology at the world’s leading hacking conference. To that end, this episode explores the open-source quantum sensing device and software that our guests Mark Carney and Victoria Kumaran are presenting in Vegas. And yes, for the third year in a row, host… Survey April 17, 2025 Risk insights for finance teams If the first few months of 2025 are any indication, navigating risk-strewn near-term and long-term risk environments will be difficult. In this regard, the chief financial officers (CFOs) broad exposure to macroeconomic and strategic risks as well as finance-focused operational challenges is valuable. As finance leaders develop and update strategic roadmaps amid global uncertainty, it is helpful… Podcast June 25, 2025 Podcast | ML-KEM Cocreator Unlocks Lattice-Based Cryptography — with Joppe Bos When NIST released the first post-quantum cryptography standards in August 2024, it set off a domino effect that will hopefully result in protecting the world from the quantum computing threat. Now that we’re beginning to migrate and trust our data to lattice-based cryptography, it’s a good time to examine how ML-KEM works and get some hints about how to implement it well. And who better to ask… Blogs April 26, 2024 Embrace DEI intersectionality for effective cybersecurity The role of a cyber incident responder is more critical than ever as these professionals are tasked with protecting organisations from cyber threats, mitigating risks and minimising the impact of security incidents. As cyber threats continue to proliferate, targeting organisations of all sizes and sectors, it is imperative for cyber incident response (CIR) teams to be well prepared at mitigating… Load More