A couple of months ago, we published two articles on vulnerability management: Building a Vulnerability Management program How to create a Manageable…
In March 2020, Visser Precision Manufacturing confirmed it was “the recent target of a criminal cybersecurity incident, including access to or theft…
In March 2020, Visser Precision Manufacturing confirmed it was “the recent target of a criminal cybersecurity incident, including access to or theft…
This is a sixth blog post in the series of Prevention, Detection, and Recovery from Cyberattacks. The global survey conducted by Ponemon…
The second blog post in the series of Prevention, Detection, and Recovery from Cyberattacks. The global survey conducted by Ponemon Institute and…
During the team discussion about next-gen tools and techniques for prevention, detection, and recovery from cyberattacks, we started looking at some of…
COVID -19 free demo
In Part I of the article we will discuss the challenges facing AI Governance. It’s not a surprise that every new cyber…
In Part-I we discussed advantages, security, and compliance consideration, challenges, and governance aspects of AI. In part-II we focused on AI policies….