Detecting intentional data exfiltration in Microsoft 365
Learn how to protect your organisation from data exfiltration over email with AI-driven detection methods and best practices.
Insurance Technology Trends for 2025: Lloyd’s Blueprint Two and Beyond
2025 will test the insurance sector’s ability to adapt and innovate. Stuart’s insights highlight the importance of embracing technology to tackle challenges like Blueprint Two, cyber security, and…[ ]
What technology trends can we expect in 2025?
Explore key technology trends for 2025, including advancements in cyber security, AI-powered computing & regulatory shifts.
Why multi-cloud, AI and Zero Trust will become business necessities in 2025
Explore the top tech trends of 2025: the rise of multi-cloud strategies, AI in the workplace, and the implementation of Zero Trust in enterprises. Understand their impact on business efficiency,…[ ]
Impersonation Phishing Attacks in 2024
Learn how impersonation phishing attacks surged in 2024, with cybercriminals using advanced tactics and AI-powered toolkits.
Strengthening operational resilience in preparation for DORA with clean rooms
How financial institutions are preparing for upcoming new regulation, DORA, using clean rooms as a recovery approach for their critical IBM Power Systems
How lax financial sanctions screening can cost millions
Learn why Starling Bank was fined £29m for financial sanction failures and how banks can improve their financial sanctions screening.
Navigating the complex world of NIS2 with Microsoft Security solutions
NIS2 is the single most comprehensive cyber security legislation to date. Find out what it means for your organisation and how Microsoft solutions can help.
The rising cost of data breaches in the financial industry
Data breaches in the financial industry cost an average of $6.08M. Learn about common attack vectors & AI’s role in cyber security.
Cutting cybersecurity costs
The key role of channel partners
Maximise your cybersecurity investment by partnering with experts who can simplify your security stack, reduce vendor complexity, & cut costs.
The rising cost of healthcare data breaches
and how to mitigate them
Learn about the rising cost of healthcare data breaches & measures needed to safeguard sensitive data. Learn why healthcare is a prime target.
How to manage VMware pricing hikes: top alternatives
Understanding the new VMware pricing model: a comprehensive guide to the impact of VMware’s pricing changes, strategies to manage costs, and evaluating alternatives for your IT infrastructure.
Five key focus areas for security operations
Discover the five crucial focus areas for enhancing your security operations. Learn how to assess risks and build strategic partnerships.
Protect your business from sophisticated Business Email Compromise (BEC) attacks
Learn how to safeguard your business against Business Email Compromise (BEC) attacks with the latest guidance from NCSC. Implement strategies to protect your data and ensure business continuity.
Blueprint Two Delays: Why Lloyd's and London Market companies should continue preparing for a digital future
Despite the Blueprint Two delay, companies in the Lloyd’s and London market should continue their digital transformation efforts. Learn why this pause shouldn’t halt progress.
How to help ensure DORA compliance: key tips to adherence
Discover the top tips for DORA compliance. With the regulation set to be applied in January 2025, companies must be ready to comply.
A skeptic's guide to third-party Oracle support by IBM
Northdoor offers third-party Oracle support from IBM that has huge cost savings, personalised service and robust security. Learn about the benefits and address common concerns with real case studies.
Cyber resilience solutions under DORA
Discover DORA and build strong cyber resilience for financial institutions with IBM’s best practices and solutions
Phishing threats on the rise in 2024
Check out Egress’ latest Phishing Threat Trends Report for further insights into who cybercriminals are targeting, when they are sending their attacks and what techniques are being used.
Cyber security questions for C-suite
Find out the key cyber security questions that can help the C-suite transform its cyber security posture to build resilience.
Operational Resilience Legislation Frameworks
Understand how financial institutions can navigate the complex regulatory landscape to enhance their operational resilience.
10 reasons to consider outsourced cyber security for your business
Protect your business with top-notch cyber security outsourcing services. Enhance your defenses and mitigate risks effectively.
Vulnerability Assessment in third-party risk management
Learn what a vulnerability assessment is and its importance in third-party risk management, and how to conduct one.
Modernising IBM i Development
Discover the transformative potential of integrating Git and VSCode into IBM i development. Explore the benefits from streamlined version control to enhanced code editing.
Why cyber resilience may be more important than cyber security
Explore the role of cyber resilience in effective cyber security. Understand how it helps mitigate attacks, ensuring business continuity.
Eight challenges organisations face with DORA
Explore the challenges faced by the financial sector organisations in achieving DORA regulation compliance.
2024 Tech Trends: Sustainability and AI
Explore how sustainability and AI are set to shape the IT agenda in 2024. Understand the role of technology in driving sustainable business practices, the impact of AI on industries, and the…[ ]
What are the top four technology trends in 2024 everyone must be ready for?
Discover the top tech trends in 2024 from cyber resilience, generative AI, sustainable technology, quantum computing and more
Navigating Digital Transformation in the Insurance Industry for 2024
Discover key insights on digital transformation in the insurance industry for 2024. The impact of Blueprint Two, cyber security measures, cloud migration strategies & compliance considerations.
How can Financial Services protect themselves from supply chain cyber attacks?
Learn how financial services businesses can safeguard against cyber attacks & improve supply chain security. Get free supplier analysis.
Navigating IBM Cognos Analytics
Optimise your business intelligence with IBM Cognos Analytics. Unleash the power of your data and make informed decisions with confidence.
Digital Transformation in 2024
Rob Batters shares insights on digital transformation in 2024, offering strategies to navigate challenges and seize opportunities for success
The rising threat of supply chain vulnerabilities
Discover the impact of growing supply chain threats on organizations. Explore recent high-profile hacks and the need to be proactive.
Strengthening DORA Compliance with IBM Solutions
Discover how IBM’s Solutions empower organisations to achieve DORA compliance effortlessly. Find out about the DORA Assessment workshop.
8 steps to achieve cyber security compliance
Master cyber security compliance in eight crucial steps to put your organisation on the right path with Northdoor.
Technology Insights: AI, Cyber Security Solutions
Gain a competitive edge with Technology insights from AJ Thompson. Stay informed about the latest trends from AI, cyber security and more.
How can firms strengthen Operational Resilience under DORA?
To comply with DORA & FCA’s operational resilience regulations, financial firms must assess cyber risks & build resilience. First steps.
How have phishing attacks evolved in 2023?
The report reveals the most phished topics and trends of 2023, shedding light on the tactics cybercriminals employ to deceive unsuspecting individuals.
Supply Chain cyberattacks: The invisible threat organisations must address
In light of the recent supply chain cyberattacks, AJ Thompson highlights the increasing risks organisations of all sizes must address, urging proactive data protection.
How IBM Watsonx uses AI to transform business
An overview of how IBM Watsonx leverages artificial intelligence to optimise processes, enhance customer experiences, and drive innovation across industries
Sanctions Screening and the role of a sanctions checker application
Looking to understand what a sanctions checker application is or need help with financial sanctions screening?
How the NIS2 Directive will impact UK Companies
Understand the key points of the NIS2 Directive. Stay compliant with this latest cybersecurity regulation impacting UK businesses.
DORA Regulation - Key points explained
Discover the key points of the Digital Operational Resilience Act (DORA) and learn what you need to do to comply with the regulation.
Are breached organisations hesitant to increase security spend despite soaring breach costs?
Discover the 2023 IBM Cost of the Data Breach report. Uncover strategies to strengthen your security measures and protect your organisation
Data Science vs. Machine Learning: Understanding the difference
Learn how data science brings structure to big data, while machine learning focuses on learning from the data itself.
Revolutionising healthcare analytics to reduce waiting times and save lives
As Hospital Accident & Emergency Department deaths surge by over 20% since 2021, healthcare providers must explore innovative ways to minimise waiting times.
The six cyber security challenges for business in 2023
Organisations are struggling to deal with six cyber security pain points, but there are solutions to these cyber security challenges.
How to execute an effective, proactive cyber security strategy
The rise of cyber attacks calls for a proactive approach to security. Learn the pitfalls of reactive defences, the benefits of a proactive strategy, and how to execute it effectively.
Why supply chain security is crucial for the Insurance sector
Mitigate cyber risk for insurance firms with AI-powered solutions to identify vulnerabilities in supply chains. Learn more.
Modernise, Build, Test and Deploy IBM Applications in Azure with Skytap
Discover how the Skytap and ARCAD partnership accelerates IBM i application modernisation with agile DevTestOps automation on Azure. Streamline your development process and increase innovation pace.…[ ]
Latest Blog Articles
Subscribe to our newsletter
Subscribe to our newsletter to get the very latest insights and updates in the world of enterprise IT and data security: