Arm yourself with insights on the latest security topics to keep up with the evolving threat landscape. Learn more about modern and trusted technology and services that evolve with your business, including threat detection & response, data security, identity & access management, and more.

Navigating the digital wave: Understanding DORA and the role of confidential computing

3 min read - The Digital Operational Resilience Act (DORA) marks a significant milestone in the European Union's (EU) efforts to bolster the operational resilience of the financial sector in the digital age. Envisioned to comprehensively address information and communications technology (ICT) risk management in financial services, DORA aims to harmonize existing regulations across EU member states. It mandates that all financial institutions within its scope build the necessary digital operational resilience, emphasizing a tailored approach for each organization. Focusing on foundational capabilities To…

Forging a framework for central bank digital currencies and tokenization of other financial assets

5 min read - Ever since the COVID-19 pandemic, cash usage has been decreasing worldwide and digital payments based on cryptocurrencies or legacy digital payment systems have prevailed. As a result, new forms of centrally managed digital currencies are emerging alongside cryptocurrencies like Bitcoin, the notorious volatility of which has challenged their acceptance worldwide. More prominently, central bank digital currencies (CBDCs) have come to offer digital forms of central bank money, while tokenized deposits tokenize the lifecycle of commercial bank money in both the…

Top concerns industry leaders have about cyberattacks in 2024 and beyond

3 min read - Cyberattacks are becoming increasingly sophisticated. Read about the concerns that industry leaders have for the future and three approaches organizations can take to build up their defenses. Cyber workforce shortage There are over four million unfilled cybersecurity jobs in the world today. Filling these vacancies has become a security imperative, and several global compliance mandates have been established to tackle the issue. For example, in the US, the 2023-2025 CISA Cybersecurity Strategic Plan aims to increase basic-level cyber skills across…

Why DDI solutions aren’t always ideal for authoritative DNS

5 min read - The distinction between “internal” and “external” networks has always been somewhat false. Clients are accustomed to thinking about firewalls as the barrier between network elements we expose to the internet and back-end systems that are only accessible to insiders. Yet as the delivery mechanisms for applications, websites and content become more decentralized, that barrier is becoming more permeable. The same is true for the people managing those network elements. Quite often, the same team (or the same person!) is responsible…

Failed to load data

IBM Newsletters

Get our newsletters and topic updates that deliver the latest thought leadership and insights on emerging trends.
Subscribe now More newsletters