Insight Search

Sort by:
  • Blogs

    January 26, 2022
    Beginning March 2022, financial firms will be subject to new regulations aimed at minimising the harm from operational disruption. At the UK Finance COO Forum in December, participants shared how they are approaching implementation of the regulation and their overall thoughts on the impact of the impending rules.
  • Survey

    July 30, 2024
    Studying the cosmos has transformed our understanding of how planets, stars and galaxies form, and revealed deeper insights into the fundamental nature of the universe. Astrophysicists and cosmologists pursue this knowledge, in effect, by looking into the past. Using cutting-edge technology like that employed in the James Webb Space Telescope, they examine places that existed billions of years…
  • Whitepaper

    April 24, 2024
    Faced with the growing complexity of the geopolitical landscape, governments have been using financial sanctions increasingly as foreign policy tools to respond to developments as wide ranging as regional conflicts and wars, terrorism, and human slavery. In today’s highly charged geopolitical environment, sanctions compliance is a focus not only for financial institutions and regulatory…
  • Insights paper

    October 8, 2024
    Creating and maintaining a sustainable PCI DSS compliance programme is a crucial and complex task for organisations to protect payment card transactions and uphold consumer trust. However, despite the PCI DSS standard being around for almost 20 years, many organisations still struggle to achieve and validate compliance with it.In April 2016, the PCI Security Standards Council (SSC) introduced the…
  • Survey

    April 17, 2025
    The higher education sector is contending with significant challenges. Rapid regulatory changes and declining enrolments due to demographic shifts and competition are creating uncertainty. The need for technological integration, increased governmental scrutiny on institutional practises, and financial instability due to tuition discounting are further complicating the landscape. Additionally,…
  • Podcast

    June 25, 2025
    When NIST released the first post-quantum cryptography standards in August 2024, it set off a domino effect that will hopefully result in protecting the world from the quantum computing threat. Now that we’re beginning to migrate and trust our data to lattice-based cryptography, it’s a good time to examine how ML-KEM works and get some hints about how to implement it well. And who better to ask…
  • Podcast

    May 14, 2025
    Post-quantum cryptography is rapidly moving from the realm of NIST standards to running in production. The threat of quantum computing advances and coming regulations are driving this acceleration. One major component on the PQC migration plan for companies is VPN. In this episode we look at the Ambit corporate VPN client, which uses a standardised NIST PQC cipher: ML-KEM. Did you know there are…
  • Whitepaper

    May 28, 2024
    The Digital Operational Resilience Act (DORA), or more formally known as Regulation (EU) 2022/2554, took effect on 16 January 2023, with final industry compliance required by 17 January 2025. The regulation underscores the importance of digital operational resilience in today’s increasingly interconnected and digitized landscape and seeks to expand the reach of European regulators incorporating…
  • Infographic

    May 2, 2023
    Talent sourcing and technology skilling headline concerns among insurance industry executives and boards in the face of rising labor costs and an increasingly competitive landscape. Strategic priorities include upskilling and reskilling employees as the need to acquire talent that can support digital transformation becomes more critical.
  • Podcast

    July 24, 2024
    The migration to post-quantum cryptography (PQC) is about to begin and is necessary to protect against the threats of fault-tolerant quantum computing. However, critical assets like those in military, banking, and government environments also require other layers of security and strategies such as zero trust and increased encryption bit sizes. Join host Konstantinos Karagiannis as he discusses a…
Loading...