Why CISOs need to leap a C-suite credibility gap
Everywhere you look today there are signs of elevated cyber risk.
Strategic insights, best practices and research reports to help security leaders better understand, communicate, and minimize cyber risk across the enterprise.
Explore two RPA and AI/ML use cases at HUD during the operational challenges of the longest US Government shutdown, a rigid legacy IT environment, and complex federal regulations.
Everywhere you look today there are signs of elevated cyber risk.
The banking and financial services industry (FSI) is about as critical as critical infrastructure can get. Both the services it provides and the data it processes represent a major target for nation states and financially motivated threat actors alike.
It’s no secret that the public sector has always been a popular target for threat actors. The National Audit Office (NAO) claimed back in 2022 that it accounted for as many as 40% of cyber-incidents. Trend Micro data reveals that this is no exaggeration. But with funding and skills a persistent challenge, it can be tough knowing how to manage risk across what is for many organisations a large and complex attack surface.
Explore two RPA and AI/ML use cases at HUD during the operational challenges of the longest US Government shutdown, a rigid legacy IT environment, and complex federal regulations.
Artificial intelligence (AI) is transforming the way we interact with technology. And the value organisations can extract from data.
The concept of inclusion to me takes various forms, whether it's personally uplifting other women aspiring to make their mark or demonstrating the power of collaboration within our industry and community.
Annually in March, Women's History Month shines a spotlight on the achievements of women in various areas – socially, economically, culturally, and politically. A pivotal moment within this month is International Women's Day on the 8th of March.
Overworked CISOs are struggling to deliver the cybersecurity results their organizations expect. Fortunately, there are concrete and practical ways they can make their lives easier—while managing cyber risk effectively.
Explore the first article in this series about AI, ML, and RPA, which aims to demystify and explore the full spectrum of these core technologies.
State-sponsored attacks are nothing new. But they are becoming more aggressive and persistent. The US and its allies, including the UK, recently revealed one such campaign, which used living-off-the-land (LOTL) techniques to stay hidden.