Content hub
Beyond the Hype: Practical Lessons on Building With AI in Regulated Industries
Learn practical lessons on building AI in regulated industries, focusing on measurement, explainability, and culture to move beyond hype towards...
PII and Secure Client Communication: Why Your Insurance Depends On It
Learn how aligning Professional Indemnity Insurance (PII) with secure client communication can protect your firm from breaches...
From Reactive to Proactive: Building a Future-Ready Security Programme
Learn how ING's CISO Debbie Janeczek is transforming security from reactive to proactive, emphasising resilience, AI safety,...
To Secure or Not to Secure: What Counts as PII and Why?
Learn what counts as PII, when to secure personal information, and how simple tools like encryption...
Ctrl-Shift: Driving the Smart Data Revolution
Discover how Smart Data is transforming UK data sharing with trust, interoperability, and...
What To Do About Digital ID in the UK: Do We Need It?
Digital identity in the UK is taking shape. Paul Holland explains how trust, inclusion, and...
How Do You Lock a Word Document, and Is It Secure?
Learn how to lock a Word document with a password on Windows, Mac, and mobile -...
How Data Sovereignty Is Reshaping Business Strategies
What data sovereignty means, why it’s accelerating, and how organisations can...
Why You Shouldn’t Keep Your Life Admin on a Laptop
Keeping life admin on a laptop is risky. See practical steps to secure access,...