Unless you have been living in a darkened room for a long time, you will know the countdown for the EU’s General Data Protection Regulation is dramatically coming to a head. May 2018 is when the regulation really takes hold, and organisations are fast in the act on putting plans, processes and personnel in place, in order […]
This is the first in a series of blogs, that will start to look at some use cases for leveraging block chain technology in the world of identity and access management. I don’t proclaim to be a BC expert and there are several blogs better equipped to tackle that subject, but a good introductory text […]
We can get insurance for virtually anything these days. Cars obviously (albeit if that wasn’t law, how many would pay for it?). Ourselves. Pets. Eyes. Teeth. Holidays. You name it and The Meerkat can sort it out. The market for insurance is highly complex, with econometrics playing a large part in determining the potential risk […]
The ‘insider’ is the dude in the office. He (or she) probably works in IT and looks and acts like a regular employee. They are however, probably a bigger risk to the organisations corporate information than a hacker on the public internet. An insider is generally seen as a trusted user of the network. They […]