Governing the digital nomads of the future
The Fourth Industrial Revolution brings with it a fundamental shift in how we do business, writes Jessica Knight, IRMSA risk intelligence committee member. Advances in technology and the increasing digitisation of many roles means that the conventional...
Fujitsu develops AI disaster mitigation technology
Fujitsu Limited and Fujitsu Laboratories today announced the development of a technology that draws on mathematical models built with limited data on rainfall and water levels to create flooding predictions for rivers. The solution leverages Fujitsu Human Centric AI...
A risk-based approach to procurement
The impact of fraud in procurement can be far reaching with many aspects of the business affected by such transactions. With the threat of reputational damage, legal non-compliance and potential financial losses remaining a possibility, it is critical that...
Data allowed to go dark is a risk and missed opportunity
Increased data growth, coupled with the need to benefit from the existing data opportunity consistently positions data at the core of all business operations today. But within the data hype, are businesses too consumed with either storing all data for 'just in case'...
Are you prepared for multinational risks?
In recent years, many more organisations have established business continuity management programmes (BCPs) which define the different processes (suggestion to utilise the wording of 'process' rather than 'system' due to general, but not always, confusion around BCP...
Everyone should think like a hacker
Relevant cybersecurity isn't perpetuated exclusively through investment and systems, it is reliant on people and their understanding of the cyber threat. A leading ethical technology hacker in Europe, Jamie Woodruff, gained access to a well-known financial institution...
Successfully managing risk in a digital world
At a time when IT staff need to deliver on the backup, recovery, and business continuity needs of organisations, decision-makers must be able to successfully manage risk. By Kate Mollett, regional manager for Africa at Veeam In South Africa, the recent launch of...
Identity and access management has business on high alert
Identity and access management (IAM) is now a must in commerce and the need to protect digital assets (most notably data) is driving the development of solutions and widespread adoption, irrespective of the size of the business. Paul Chari, principal consultant EDC...
Productivity, innovation in manufacturing calls for better risk management
With manufacturing focused intensively on innovation, combined with a reliance on connected networks and products, it is an industry that is highly vulnerable to cyber attacks. Yet, the manufacturing industry remains fragmented in its approach to managing...
Where do cloud risks lie?
Cloud services have heralded a new era in IT. Their benefits are numerous, accelerating business through their ability to quickly scale, allow organisations to be agile with their resources, and provide new opportunities for collaboration. Tumelo Mashego, business...
Building the security baseline
At any given moment, a cybercrime victim is losing around R3.5 million a day, according to Action Fraud in the UK. The Cyber Security Breaches Survey 2019 found that 60% of medium firms and 61% of large firms deny that they have been attacked and yet 25% of those that...
Cybercrime in the South African legal fraternity
Hack attacks, ransom threats and theft of money through fraudulent transactions are all becoming a stark reality for legal professionals and law firms around the world. According to the South African Banking Risk Information Centre (SABRIC), South Africa currently has...