Avatar photo

Dwaine Evans

Dwaine Evans' wheelhouse is digital wealth management. His profile features in-depth research and analysis on cyber security and platform advocates for DevOps and its revolutionary potential across various industries. Dwaine's content is geared toward industry professionals looking to make changes, which he highlights through his detailed analyses at the prospects wealth management has to offer. 
Co-op Cyber Attack Highlights Need for Robust Retail Security
Cyber Security
Co-op Cyber Attack Highlights Need for Robust Retail Security

In an era where digital threats continuously evolve, the recent cyber intrusion faced by Co-op, a prominent UK-based retailer, underscores the urgent need for heightened security measures within the retail sector. This breach, which targeted Co-op’s IT systems, did not significantly disrupt the company’s operations due to its swift and effective response. However, it has cast a spotlight on the

Read More
What Led to the Sudden Shutdown of RansomHub RaaS?
Cyber Security
What Led to the Sudden Shutdown of RansomHub RaaS?

The abrupt shutdown of RansomHub, a major ransomware-as-a-service (RaaS) provider, sparked intrigue within cybersecurity circles, leaving experts scrutinizing the elements that led to its unexpected closure. Emerging swiftly amid the disarray caused by law enforcement actions against industry heavyweights like LockBit and ALPHV, RansomHub had carved out a niche with its unique approach in the ransomware landscape. Its rise as

Read More
Should Security Updates Be Subscription-Based?
Cyber Security
Should Security Updates Be Subscription-Based?

Technology has always been at the forefront of innovation, shaping the way businesses and individuals interact with software and security. With Microsoft’s recent decision to implement a subscription fee for its new security update service known as hotpatching, the industry faces a notable paradigm shift. This service, set to be rolled out from July 1, reflects a significant change from

Read More
How Can We Combat the Growing Threat of Infostealers?
Cyber Security
How Can We Combat the Growing Threat of Infostealers?

In recent times, the threat landscape has become increasingly alarming with the rise of sophisticated infostealers targeting banking credentials and personal data. These malicious software variants have effectively infiltrated systems, exposing sensitive information from individuals and organizations alike. A recent study found that over 30,000 Australians were affected by these threats, leaking their banking credentials to malicious entities. The study,

Read More
WealthTech Funding Surges in Q1 Despite Fewer Deals
Digital Wealth Management
WealthTech Funding Surges in Q1 Despite Fewer Deals

The U.S. WealthTech sector has experienced a fascinating trend in the first quarter, with a notable surge in funding despite a decrease in deal frequency. This recovery is underscored by an impressive 9% quarter-on-quarter increase in funding, amounting to $1 billion. However, this figure is a stark contrast to the previous year’s $4.1 billion, indicating a persistent caution among market

Read More
Datadog Acquires Metaplane to Boost Data and DevOps Integration
DevOps
Datadog Acquires Metaplane to Boost Data and DevOps Integration

In the rapidly evolving landscape of technology, the integration of data science and DevOps has become a critical focus as companies endeavor to harness the full potential of digital transformation and artificial intelligence (AI). Datadog, known for its leadership in observability platforms, has strategically acquired Metaplane, a notable entity in the field of data observability. This acquisition is seen as

Read More
Microsoft Unveils Subscription-Based Security for Windows Server
Cyber Security
Microsoft Unveils Subscription-Based Security for Windows Server

Microsoft has recently announced a transformative shift in delivering security updates, emphasizing a subscription-based model for Windows Server systems. This move introduces a monthly fee for the hotpatching feature, a change set to reshape how organizations manage system vulnerabilities and system integrity. The driving force behind this innovative approach is to provide real-time updates without the necessity for immediate system

Read More
Is Manulife iFUNDS Redefining Digital Wealth Advisory?
Digital Wealth Management
Is Manulife iFUNDS Redefining Digital Wealth Advisory?

In the ever-evolving landscape of digital financial services, few platforms have managed to make a mark as pronounced as Manulife iFUNDS. Originally launched in 2018, the platform has redefined how wealth advisory services are delivered, combining technological advancements with personalized financial consultancy. The recent enhancements to this platform by Manulife Singapore and Manulife Investments offer a promising new direction for

Read More
Is Your SAP System Vulnerable to Critical Zero-Day Exploits?
Cyber Security
Is Your SAP System Vulnerable to Critical Zero-Day Exploits?

In the realm of cybersecurity, SAP systems have recently come under intense scrutiny due to the discovery of a critical zero-day vulnerability identified as CVE-2025-31324. This vulnerability, which has been exploited in the wild, poses a severe risk to organizations operating SAP NetWeaver environments. With a maximum CVSS score of 10.0, the vulnerability emanates from inadequate authorization checks within the

Read More
FBI Seeks Help to Identify Chinese Hackers Targeting U.S. Firms
Cyber Security
FBI Seeks Help to Identify Chinese Hackers Targeting U.S. Firms

The ongoing battle against cyber-espionage has taken a critical turn as the FBI calls for public assistance in identifying members of the Chinese Advanced Persistent Threat (APT) group known as Salt Typhoon. This group has been conducting cyber-espionage activities with alarming efficiency and has been linked to China’s Ministry of State Security. Since its emergence five years ago, Salt Typhoon

Read More
Are Energy Giants Being Exploited in Global Phishing Scams?
Cyber Security
Are Energy Giants Being Exploited in Global Phishing Scams?

The global energy sector faces a rising threat as cybercriminals exploit the names and brands of major corporations for sophisticated phishing campaigns. This alarming trend has been detailed extensively in reports, highlighting how attackers are leveraging the reputable images of companies like Siemens Energy, Schneider Electric, and Repsol S.A. to carry out investment scams and fraudulent job schemes. The operation,

Read More
CISOs Prioritize IAM to Enhance Cybersecurity Resilience
Cyber Security
CISOs Prioritize IAM to Enhance Cybersecurity Resilience

In today’s rapidly evolving digital landscape, cybersecurity challenges continue to grow as cybercriminals refine their tactics and expand their targets. At the heart of safeguarding digital assets lies Identity and Access Management (IAM), a critical component for embedding security at every layer of an organization’s architecture. Traditionally seen as a mere IT function, IAM is swiftly transforming into a foundational

Read More