
How to stop AI-driven fake customer accounts
AI-driven fake accounts are rising fast. Learn how robust customer verification helps organisations prevent fraud, protect data quality, and build trusted digital relationships.

AI-driven fake accounts are rising fast. Learn how robust customer verification helps organisations prevent fraud, protect data quality, and build trusted digital relationships.

Operational sovereignty is now critical as organisations face geopolitical instability, regulatory pressure and infrastructure disruption while striving to maintain resilience, compliance and control over digital operations.

Deepfakes are becoming a serious security threat, enabling disinformation, fraud and disruption. Detecting and countering synthetic media is now essential for governments and organisations.

Agentic commerce is redefining retail traffic and security. As AI agents proliferate, retailers must move beyond bot detection to intent-based, behavioural defence strategies.

Small and mid-sized businesses can strengthen cyber security using Retrieval-Augmented Generation, gaining AI-driven insights, compliance assurance and enterprise-grade protection without the cost or complexity.

Modern enterprises face disruptions that traditional disaster recovery can no longer address. This article explores why resilience must evolve into a proactive, business-aligned capability for continuity.

Network outages expose how fragile digital operations have become. NIS2 turns resilience into a legal requirement, making redundancy, continuity planning, and multi-layered protection essential for modern businesses.

Justin Kuruvilla, Chief Cyber Security Strategist at Risk Ledger, explores how DORA’s true potential lies beyond compliance—building resilience through collaboration, visibility, and systemic risk understanding.

Threat intelligence is only valuable when actionable. Kerri Shafer-Page of Arctic Wolf explains how automation, visibility, and external expertise turn data into effective cybersecurity defence.

Matthew Albans, CTO at Roke, warns organisations that quantum computers could soon break current encryption. Early preparation with post-quantum cryptography is essential to stay secure.

Pierre du Rostu, CEO of AXA Digital Commercial Platform, explores how integrated, tech-driven risk management can help companies navigate the growing challenges of climate, conflict, and cyber threats.

Tom Grissen, CEO of Daon, warns that poorly implemented biometrics create dangerous security gaps. Discover why layered, intelligent biometric defences are vital against AI-powered cyber threats.

AI is no longer just a defensive tool. Cybercriminals are operationalising AI to accelerate attacks, making adaptive, human-centred defence strategies more critical than ever.

LevelBlue’s Sean Shirley analyses a live AsyncRAT fileless malware attack, showing how trusted tools, memory-resident loaders and persistence tactics evade defences – and what organisations must do to respond.

John Smith, CTO EMEA at Veracode, highlights why UK government software remains a hacker’s playground, exploring security debt, AI risks, and the need for urgent cyber resilience.

Kevin Curran of Ulster University warns that “harvest now, decrypt later” quantum threats could expose today’s encrypted data tomorrow. Businesses must prepare now for the post-quantum era.

Quantum computing is no longer science fiction. Discover how small businesses can prepare today, from cybersecurity to optimisation, and gain competitive advantage in tomorrow’s digital landscape.

AI offers transformative business insights, but processing sensitive data creates risks. Confidential computing safeguards data in use, ensuring privacy, regulatory compliance, and secure AI-driven operations.

Shadow AI is on the rise as employees use unsanctioned GenAI tools at work. Discover how IT leaders can turn hidden risks into opportunities for productivity and trust.

BYOD boosts flexibility but heightens risk. Learn how IT leaders can secure personal devices, protect corporate data, and build trust while enabling modern, mobile workplaces.

The EU AI Act enforces transparency, risk mitigation, and ethical AI use from 2025—prompting companies to rethink deployment, security, and long-term compliance strategies.

Agentic AI is powerful, but without identity-centred security strategies, it introduces major risks. Learn how to integrate AI agents securely into your organisation’s infrastructure.

Third-party risk management must evolve beyond compliance to become a proactive, intelligence-led discipline—bridging silos, embracing real-time visibility, and addressing human, technological, and process-based gaps.

AI demands speed and innovation, but without hybrid cloud visibility and security, risks escalate. Discover why deep observability is key to secure transformation.

How GIGA Data Centers is delivering hyperscale performance to the colocation market

Unilever is bringing the fourth industrial revolution to ice cream manufacturing.

Hamza Khan of McKinsey & Company’s on how brands can begin to shape an effective metaverse strategy.

Shining light on the future of machine autonomy

Alessandro Galimberti, Senior Director Analyst at Gartner, explores how generative AI is transforming Infrastructure and Operations, driving efficiency, agility, and competitive advantage for forward-thinking organisations.

Enterprise AI is failing at scale due to fragmented data. A unified, platform-based approach enables governed autonomy, trusted decisions, and sustainable AI-driven transformation.

IKEA Retail’s (Ingka Group) Karolina Boremalm and her digital experience design team have introduced an all-encompassing DesignOps strategy to the company, with a design system at its centre. Here, Digital Bulletin speaks to a number of key stakeholders.

This month, Ben and Rom are joined by Blue Prism’s Martin Stevenson to discuss our case study on Telefónica Spain and its far-reaching automation programme. Ben also speaks with Glasswall’s Luke Robbertse about the rise of Content Disarm & Reconstruction technology in the cybersecurity space.

AI-driven fake accounts are rising fast. Learn how robust customer verification helps organisations prevent fraud, protect data quality, and build trusted digital relationships.

Operational sovereignty is now critical as organisations face geopolitical instability, regulatory pressure and infrastructure disruption while striving to maintain resilience, compliance and control over digital operations.

Deepfakes are becoming a serious security threat, enabling disinformation, fraud and disruption. Detecting and countering synthetic media is now essential for governments and organisations.

Agentic commerce is redefining retail traffic and security. As AI agents proliferate, retailers must move beyond bot detection to intent-based, behavioural defence strategies.

Small and mid-sized businesses can strengthen cyber security using Retrieval-Augmented Generation, gaining AI-driven insights, compliance assurance and enterprise-grade protection without the cost or complexity.

Modern enterprises face disruptions that traditional disaster recovery can no longer address. This article explores why resilience must evolve into a proactive, business-aligned capability for continuity.

Network outages expose how fragile digital operations have become. NIS2 turns resilience into a legal requirement, making redundancy, continuity planning, and multi-layered protection essential for modern businesses.

Justin Kuruvilla, Chief Cyber Security Strategist at Risk Ledger, explores how DORA’s true potential lies beyond compliance—building resilience through collaboration, visibility, and systemic risk understanding.

Threat intelligence is only valuable when actionable. Kerri Shafer-Page of Arctic Wolf explains how automation, visibility, and external expertise turn data into effective cybersecurity defence.

Matthew Albans, CTO at Roke, warns organisations that quantum computers could soon break current encryption. Early preparation with post-quantum cryptography is essential to stay secure.

Pierre du Rostu, CEO of AXA Digital Commercial Platform, explores how integrated, tech-driven risk management can help companies navigate the growing challenges of climate, conflict, and cyber threats.

Tom Grissen, CEO of Daon, warns that poorly implemented biometrics create dangerous security gaps. Discover why layered, intelligent biometric defences are vital against AI-powered cyber threats.

AI is no longer just a defensive tool. Cybercriminals are operationalising AI to accelerate attacks, making adaptive, human-centred defence strategies more critical than ever.

LevelBlue’s Sean Shirley analyses a live AsyncRAT fileless malware attack, showing how trusted tools, memory-resident loaders and persistence tactics evade defences – and what organisations must do to respond.

John Smith, CTO EMEA at Veracode, highlights why UK government software remains a hacker’s playground, exploring security debt, AI risks, and the need for urgent cyber resilience.

Kevin Curran of Ulster University warns that “harvest now, decrypt later” quantum threats could expose today’s encrypted data tomorrow. Businesses must prepare now for the post-quantum era.

Quantum computing is no longer science fiction. Discover how small businesses can prepare today, from cybersecurity to optimisation, and gain competitive advantage in tomorrow’s digital landscape.

AI offers transformative business insights, but processing sensitive data creates risks. Confidential computing safeguards data in use, ensuring privacy, regulatory compliance, and secure AI-driven operations.

Shadow AI is on the rise as employees use unsanctioned GenAI tools at work. Discover how IT leaders can turn hidden risks into opportunities for productivity and trust.

BYOD boosts flexibility but heightens risk. Learn how IT leaders can secure personal devices, protect corporate data, and build trust while enabling modern, mobile workplaces.

The EU AI Act enforces transparency, risk mitigation, and ethical AI use from 2025—prompting companies to rethink deployment, security, and long-term compliance strategies.

Agentic AI is powerful, but without identity-centred security strategies, it introduces major risks. Learn how to integrate AI agents securely into your organisation’s infrastructure.

Third-party risk management must evolve beyond compliance to become a proactive, intelligence-led discipline—bridging silos, embracing real-time visibility, and addressing human, technological, and process-based gaps.

AI demands speed and innovation, but without hybrid cloud visibility and security, risks escalate. Discover why deep observability is key to secure transformation.