A large oil company responsible for a vast POS network spanning 14,000 gas stations was struggling to achieve PCI compliance. After searching for a new tool, the organization decided to implement SecurDPS. Find out why they chose SecurDPS and the benefits they experienced after installation in this case study.
Unesco member state have adopted an AI ethics recommendation that seeks to define a common set of values and principles to guide the development of ethical AI globally. Also read about a large-scale national cyber exercise in the Netherlands.
This collection revisits basic differences between these two ERPs and associated products, and helps CIOs and IT leaders take a strategic mindset to the issue of staying on ECC or moving forward
The introduction of each internet-connected device to a home network increases the risk of cyber attack. This article in our Royal Holloway security series presents a practical model for investigating the security of a home network to evaluate and track what pathways an attacker may use to compromise it.
This article introduces connected and autonomous vehicles, analysing the underlying technologies and considering their cyber security vulnerabilities and attacks. We identify and assess the existing and emerging countermeasures for such vulnerabilities, and propose high-level recommendations.
Without reporting, cyber crimes cannot be investigated, prosecutions cannot be pursued and effective prevention strategies cannot be developed. Yet despite this, most corporates fail to report cyber crimes. This article in our Royal Holloway security series explains why this is an increasing cause for concern.
Imperial College London is embarking on a three-year project with an Abu Dhabi-based group of researchers to find ways for datacentre operators and cloud providers to secure their infrastructure. Also read how Dubai is positioning itself to reap the benefits of a promising global market for drone technology.
Endpoint security has become a top priority in 2020 – but threats are always evolving, so it’s critical to ensure endpoints are protected with the best-in-class defenses. Read this research report from The Radicati Group for an overview of the key trends, risks and top offerings as they relate to the endpoint security market.
Learn how Edge computing will transform how retail manages the exponential explosion of structured and unstructured data from the proliferation of retail Internet of Things (IoT) and mobile device capabilities.
It’s time to move IT beyond the traditional “better, faster, cheaper — pick any two” conundrum. With the help of AI, virtual agents, and machine learning, organizations can tap into these technological innovations to improve operations across all three variables. Read this ebook to learn how.