Cybersecurity

Pagoda city surrounded by trees during sunset; client innovation in Japan concept
The Insider Look into NTT Group x Eviden Identity Management deal
December saw NTT Group select Evidian Identity Governance & Administration (Evidian IGA) as the foundation of their Identity Management Infrastructure in Japan. Eviden, part of Atos Group,  provides an Identity Governance and Administration (IGA) solution to ensure governance and scalability...
A green metal gate locked with a brass padlock |
Cybersecurity services are jumping on the AI progress train
As companies increasingly adopt AI technologies for cybersecurity, a recent Capgemini report reveals that while GenAI enhances threat response and detection, it also introduces new risks, prompting firms like Accenture and Dell to bolster their security offerings amid rising cyber threats.
image of two security cameras | CyberCare
Lines of Defence: Choosing the Right Security Solutions
Implementing cybersecurity measures ensures organisations are protected and ready to defend themselves against cyberattacks. These solutions help organisations benefit from data protection, regulatory compliance, and increased productivity. They prevent financial losses, build customer trust, provide protection for customers and support...
A darkened room with a man with big headphones sitting at 3 computer screens | Delinea
Data protection in a modern enterprise environment requires a dynamic approach
By having a clearer view and a tighter grip on exactly where privilege is provided throughout an organization, firms can significantly and efficiently improve their enterprise security and protection.
image of security camera on a building
Staying cyber secure amongst the cyber chaos
Being cyber secure is paramount for organizations across the globe and protecting client and organizational data is the key to ultimately delivering success for your business.
Black and white close up of a hand trying to pick an old combination lock | Delinea internal
Data breach culprits could be hiding under a firm’s nose
Most ERP platforms will already have in-built cloud security, or be compatible with most security modules available. Protecting resources from external threats can be a simple process. However, how many firms have measures against internal threats?
image of cyber-security
Nobody wants a leak: Getting cyber secure in manufacturing
Manufacturing firms are advancing their stacks, but openings have sprung for bad actors. How can businesses kick the bucket on cyber risks?  
Image of a stethoscope | Microsoft and The White House improve cybersecurity in hospitals
Microsoft and The White House work to improve cybersecurity in hospitals
Microsoft is working alongside The White House, the American Hospital Association and the National Rural Health Association to tackle the cybersecurity issues in the healthcare industry.
Image of lit-up cubes on stage / Boomi World 2024 reveals new innovations
Boomi World 2024 unveils AI innovations for businesses
Boomi's CEO Steve Lucas aims to accelerate innovation in the AI economy, and does so via introducing AI Agent Framework and Trusted Data Management.
image of Accenture building
Palo Alto Networks and Accenture expand alliance for AI and cybersecurity
Together, Palo Alto Networks and Accenture aim to help organizations embrace the potential of AI, with a strong cybersecurity base.
photo of a chess board, strategy and defense concept | guidance
Microsoft releases Zero Trust strategy guidance for DoD customers
Microsoft has released new guidance for the Department of Defense (DoD) Zero Trust strategy to adopt a new cybersecurity framework and help customers facilitate informed and risk-based decisions.
image of a motherboard - cyber defences
The power of IT-OT integration in fortifying cyber defenses  
The industry needs to change the direction of cybersecurity by addressing the disconnects that exist between IT and OT teams.
image of data landscape | Pathlock cloud
Protecting Data During Cloud Journeys from the Inside-Out
To address security challenges in the ever-evolving tech landscape, SAP users must look elsewhere to secure their data from insider threats.
abstract illustrated image of cyberattacks, person wearing a hoodie is sat in front of computer screens | cyberattacks
Microsoft disables Windows feature amid flurry of cyberattacks
Microsoft has disabled a Windows feature, App Installer, which allows users to download new applications after discovering that financially motivated actors were utilizing it to spread malware.
A cube with loads of other cubes : SAP users cybersecurity Pathlock cloud
Protecting SAP users during cloud migrations: The SAP-endorsed advantage
As businesses continue to navigate the uncharted territories of cloud deployment, the assurance of data security and compliance becomes paramount.
A metal fence : Cybersecurity SAP and Xiting
Fortifying data on your S/4 journey with SAP tailored security frameworks
With tailored SAP frameworks, companies can navigate the ever-changing cybersecurity landscape and protect their data during S/4 migrations.
SAP AI MICROSOFT : A shield
Microsoft’s new Security Copilot shields SAP systems with AI
Microsoft has announced the new Microsoft Security Copilot, an AI-driven security solution, to revolutionize how companies like SAP defend.
image of security camera | EY and BlueVoyant
EY US collabs with BlueVoyant for cyber risk management
EY US has entered into a strategic alliance with BlueVoyant, a cyber defense company, to provide proven cyber risk management design.
Image of some crown jewels
In a world of deep fakes, securing an organization’s crown jewels gets real
The closer you get to full cyber protection, the more expensive and resource-intensive cyber defense becomes. That's why many businesses are choosing to focus on their crown jewels.
Accenture building
Accenture acquires cybersecurity company, MNEMO Mexico
Accenture has acquired MNEMO Mexico, hopping to help organizations build more cyber-resilient businesses and secure their digital cores, technologies and supply chains.
image of padlock and gold cards on laptop | Microsoft and Amazon
Microsoft and Amazon join fight to diminish tech support fraud
Microsoft and Amazon have joined forces along with international law enforcement in the fight against perpetrators of tech support fraud.
Okta announces Okta AI and its support for passwordless authentication/ cybersecurity
Okta announces Okta AI and support for passkeys
Okta's support of passkeys as passwordless authentication is a part of its solution for Customer Identity and Access Management (CIAM). The company has also worked closely with its legal and governance teams in the development of Okta AI, to ensure that customer personal data remains segregated.
A hand held up to a screen with the index finger showing a digital fingerprint | Remote work and GenAI
Remote work and GenAI: spanners in the cybersecurity engine?
Remote work and GenAI are here to stay. But what does this mean for enterprise cybersecurity and how are they impacting it?
image of phone on yellow background with white lock on phonescreen on purple background | supply chain | cybersecurity
Is it time to get your digital supply chain security in order?
Cybersecurity is one of the biggest priorities for modern organizations operating across on-prem and virtual digital infrastructures. Dan Llewellyn explores more.
3D render image of cybersecurity - cyber criminal sat at computer desk with computer | MXDR
Deloitte enhances MXDR solution to improve cybersecurity measures
Deloitte has expanded their MXDR cybersecurity solution to help support some of the unique challenges for enterprise, cloud and OT.
abstract technololgy image / The secret to reducing outsourced software testing
The World Economic Forum and Deloitte launch Quantum Readiness Toolkit to stem cybersecurity risk
The World Economic Forum and Deloitte have released a quantum toolkit to help protect organizations from developing cybersecurity risks.
image of Teal LED computer panel | Accenture and Immersive Labs, Cybersecurity
Accenture and Immersive Labs to bridge cyber talent gap
Accenture has teamed up with Immersive Labs to launch the Cyber Million program that aims to solve the cybersecurity talent deficit by increasing access to one million entry-level cybersecurity operation jobs over the next decade.
From NO to YES, but securely: unlocking innovation with Cloud ERP
By taking a proactive approach to security, companies can embrace new technologies and services while mitigating security risks.
Microsoft Security Copilot
Microsoft Security Copilot is ready for takeoff
Microsoft has launched Microsoft Security Copilot, a cyber threat detection tool to bring the next generation of AI to cybersecurity.
Deloitte Consulting LLC Tech trends 2023 report
Deloitte’s chief futurist on the tech trends defining 2023
Following this year's Deloitte Tech Trends report, ERP Today speaks to Deloitte’s Chief futurist, Mike Bechtel, to answer some of our burning questions on what’s next for enterprises and vendors alike.