23 Jun 2022 The business case for building a Virtual Power Plant - and 5 IT watchouts if you do… By Les Viszlai I wrote in my previous article about the Energy Cloud and the benefits offered by Distributed Energy Resources (DERs) and Virtual Power...
09 Jun 2022 Why the price of fish threatens your cybersecurity By Martin Simpson Alongside the war in Ukraine, the cost of living crisis dominates world headlines. While there has been plenty of attention on the...
31 May 2022 Increasing Your ESG Rating with Cloud By Megha Kalsi Environmental, social, and governance (ESG) scores are top of mind for most executives today. Organizations want to be known as...
31 May 2022 Terra firma? The collapse of TerraUSD raises questions about the future of stablecoins By Colin Johnson Kevin Madura Earlier this month, TerraUSD, a type of cryptocurrency known as a “stablecoin”, crashed. This isn’t “supposed” to happen – stablecoins...
03 May 2022 A bridge too far? Largest ever crypto hack highlights the impact on users and the lack of protection at the cutting edge By Colin Johnson Kevin Madura On 29 March, what may be the largest crypto hack to date was detected, with an estimated $625m of cryptocurrency stolen from the “Ronin...
20 Apr 2022 The business case for building a Virtual Power Plant - and 5 IT watch outs if you do… By Les Viszlai I wrote in my previous article about the Energy Cloud and the benefits offered by Distributed Energy Resources (DERs) and Virtual Power...
23 Mar 2022 Managing the rising intensity of cyber risks By Tim Roberts Beth Musumeci Yalini Pathy Even before considering the use of cyber weapons in war, the frequency and severity of cyber attacks are clearly on the rise. We should...
15 Feb 2022 How should cyber leaders respond to four key trends shaping the consumer products and retail landscape? By Stanley Awenlimobor Rising rates of inflation and uncertainty around interest rate increases are just two of the macro trends causing business leaders...
07 Feb 2022 Not just a tool: Embracing AI’s collaborative role in the digital workforce By Angela Zutavern Corporations have long anticipated the day when technology truly revolutionizes operations from top to bottom. In this scenario,...
03 Feb 2022 Crypto hacking: The balance of sophistication between users and bad actors keeps risk riding high throughout the crypto ecosystem By Colin Johnson Kevin Madura Mark Doughty Digital assets such as Bitcoin and Ethereum are a major asset class, representing over $2 trillion in market capitalization, and are...
20 Jan 2022 Hacking New Year - Crypto Edition By Stephen Yu Max Yip The crypto world 'welcomed' the new year with the first major incident of 2022 when crypto[.]com hack was confirmed by its CEO over...
03 Nov 2021 Going green has some cyber security red flags By Edd Hardy With COP 26 underway in Glasgow there is great focus on what we can do to save the planet and rectify years of environmental damage. One...
19 Oct 2021 Cyber-Security in der Luft- und Raumfahrt: Was Entscheider jetzt beachten sollten By Baris Goencue Christian Leber Stefan Ohl Die Wertschöpfungsketten von der Beschaffung der Rohmaterialen bis hin zur Lieferung der Fertigware werden immer anfälliger und...
10 Sep 2021 Cyber Cravings – PE Continues to Pour into Cybersecurity Firms By Connor Lott Recent cyberattacks at companies like Colonial Pipeline, JBS, and SolarWinds have continued to illustrate how much havoc can be wrought...
23 Aug 2021 The cryptic nature of the latest crypto hack By Colin Johnson Mark Doughty Kevin Madura On 11 August 2021, what appeared to be the largest Crypto heist to date took place. A hacker managed to steal over $600m of crypto-assets...
05 Aug 2021 Unchecked expansion of born-digital companies can trigger toxic patterns of behavior (Part One) By Pippa Ross Part 1: Painful lessons from financial servicesWe recently published a white paper outlining how compliance...