Home Tags ARTICLE

Tag: ARTICLE

Hong Kong Fintech
The global financial services sector is accelerating its transformation in response to changing values and shifting consumer preferences. Hong Kong is responding in its...
Cyber-Kinetic Attacks History
The fact that cyber-kinetic attacks rarely appear on mainstream news doesn’t mean they don’t happen. They happen more frequently than you would think. Many,...
Cyber-Kinetic Timeline
Below is a timeline of key historic cyber-kinetic attacks, system malfunctions and key researcher demos targeting cyber-physical systems (CPS), Internet of Things (IoT) and...
Diversity Uncomfortable
The topic of diversity is not one that most people find in their comfort zone. As I wrote in a previous article on diversity, increasing...
Dartmouth AI
In the summer of 1956, a small gathering of researchers and scientists at Dartmouth College, a small yet prestigious Ivy League school in Hanover, New Hampshire, ignited a spark that would forever change the course of human history. This historic event, known as the Dartmouth Workshop, is widely regarded as the birthplace of artificial intelligence (AI) and marked the inception of a new field of study that has since started revolutionizing countless aspects of our lives.
Blockchain Security

Blockchain Security

Recent advances in Distributed Ledger Technology (DLT) / Blockchain have significant implications for the global economy and financial services FinTech and Decentralized Finance (DeFi)...
Blockchain Cybersecurity
You may have heard, over the last year or two, about the new technological miracle that is the blockchain. It seems that every banker,...
Chinese cybercrime
Western publications often picture the People’s Democratic Republic of China (hereafter China) as the world’s chief propagator of cyberattacks. But the picture is much...
FinCrime Cyber
The worlds of financial crime and cybercrime are colliding, converging into one. The biggest threat to businesses globally is the new cyber-enabled financial crime....
Sanctions Mojca Ivezic
How would you picture those who work to prevent weapons of mass destruction (WMD) from falling into the wrong hands? Would you picture them...
Money Laundering
Terrorist funding detection has been practiced the same way as money laundering detection ever since Counter Terrorism Funding (CTF) initiatives were added to Anti–Money...
Money laundering
In what ways has financial crime hurt you? Most people would respond with a yawn. We might think it is limited to a few...
Enterprise Resilience
Modern theories of the firm remain focused on transaction costs, operational efficiency, employee motivation, leadership, strategy and other related factors. While any of these...
Cyber-Kinetic Robot
The attacker stepped out from behind a hedge in the upper-class suburban neighborhood, being careful to stay in the shadows. Across the street, the...
IoT Protocols Speed Range
IoT Wireless Protocols data rate and range comparison in a chart.