VELOCITY - DATA AND ANALYTICS SUMMIT

Data

Which trends will revolutionise the global payments ecosystem

What’s Revolutionising the Global Payment Ecosystem?

A survey by HTF Market Intelligence revealed that the Global Payment gateway market will significantly surge at a CAGR of 22.2% between 2023 and...
What is the Safe Escape from Human Firewall Vulnerabilities

Are You Equipped to Fight the Human Firewall Vulnerabilities?

About 95% of cybersecurity threats are in some way caused by human error, prompting businesses to act against Human Firewall Vulnerabilities. Here are a few ways to prevent it. 
Securing the Repeatability of Cloud with IaC

Securing the Repeatability of Cloud with IaC

Unleash the power of Infrastructure as Code (IaC) in the cloud while mitigating risks. Learn how collaboration between DevOps & security teams fosters secure,...
Why You Need Experience Level Agreements (XLAs) Now

Why You Need Experience Level Agreements (XLAs) Now

How Experience Level Agreements (XLAs) unlock employee and customer satisfaction in the digital age. Learn how XLAs go beyond traditional performance metrics to reveal...
Fortifying Data Privacy Defences in The Cyber Jungle

Fortifying Data Privacy Defences in The Cyber Jungle

Security experts discuss the complex array of challenges and opportunities in the Middle East regarding data privacy. Amid the dynamic landscape of digital privacy and...
How Risky Are Medusa Ransomware Threats For Organisations?

How Risky Are Medusa Ransomware Threats for Organisations?

A survey by Palo Alto Networks revealed that Medusa ransomware impacted 74 organisations worldwide in 2023, where technology, education, and manufacturing sectors topped the...
A data supply-chain with AI is the quickest route to industrial transformation

AI-Powered Data Supply-Chain for Rapid Industrial Transformation

The best AI outcomes often come from a willingness to collaborate with partners, providers, and even competitors on shared data initiatives. This leads to...
High-Risk Cyber Vulnerabilities Trends: Where's the Future?

High-Risk Cyber Vulnerabilities Trends: Where’s the Future?

According to research by Qualys, one-third of the high-risk vulnerabilities impact network devices and web applications that are traditionally difficult to safeguard through conventional...
How do Phishing Scammers Lure Victims with Fake Giveaways?

How do Phishing Scammers Lure Victims with Fake Giveaways?

According to a phishing incident reported in Singapore, scammers created a sophisticated site that prompted users to enter their Telegram details, mimicking Singapore’s Ministry’s...
Cybersecurity Trends in 2024

Cybersecurity Trends in 2024

Seventy-five per cent of the data generation and processing will happen outside the traditional confines of data centres or the cloud, inviting cyber vulnerabilities...

Latest Posts