Unattended Commerce in the Age of Digital Payments

Since the late 19th century, cash-operated vending machines and kiosks have been used to sell drinks, snacks, newspapers and much more. However, new digital technology is expanding how customers pay through these types of unattended commerce. Today’s consumers use mobile apps, wearables, and contactless cards to pay for food, groceries, parking, bike rentals and other…

Digital Transformation? How About a Security Transformation?

Organizations in every sector are either talking about, planning, or launching digital transformations. Whether it’s making a big move to the cloud, enhancing or expanding e-commerce applications, automating business processes, leveraging artificial intelligence (AI), machine learning (ML), and advanced analytics or building an Internet of Things (IoT) environment, enterprises are using technology solutions in multiple…

Coordination at the State Level Pays Dividends for Fighting Cybercrime

Cybercriminals like easy targets. Enterprises and governments with a disjointed approach to cyber hygiene fill that role perfectly. While the U.S. federal government has a robust approach to cybersecurity, state and local governments are more vulnerable. The statistics bear witness. Cyberattacks against these agencies have increased significantly recently. Approximately 44% of ransomware attacks worldwide are now targeting…

What is ERP? Enterprise resource planning systems explained

ERP definition Enterprise resource planning (ERP) is a system of integrated software applications that manages day-to-day business processes and operations across finance, human resources, procurement, distribution, supply chain, and other functions. ERP systems are critical applications for most organizations because they integrate all the processes necessary to run their business into a single system that…

Cloud tales: Lessons from a cyber incident response team

Many Australian enterprises are getting their cloud security strategies wrong. While they are lowering infrastructure costs and introducing efficiencies by moving to flexible multi-cloud platforms, building the right level of security throughout their agile software development lifecycles is becoming difficult. Almost two-thirds (61 per cent) of respondents to research questions posed by Cybersecurity Insiders, on…