Is Zero Trust a model for effective and efficient security? We are adding a third blog post in the series of Prevention, Detection, and Recovery…
A couple of months ago, we published two articles on vulnerability management: Building a Vulnerability Management program How to create a Manageable and Sustainable Vulnerability…
This is a sixth blog post in the series of Prevention, Detection, and Recovery from Cyberattacks. The global survey conducted by Ponemon Institute and sponsored…
The second blog post in the series of Prevention, Detection, and Recovery from Cyberattacks. The global survey conducted by Ponemon Institute and sponsored by IBM…
During the team discussion about next-gen tools and techniques for prevention, detection, and recovery from cyberattacks, we started looking at some of the common mistakes…
In Part I of the article we will discuss the challenges facing AI Governance. It’s not a surprise that every new cyber product we come…
In Part-I we discussed advantages, security, and compliance consideration, challenges, and governance aspects of AI. In part-II we focused on AI policies. Here is part-III….
We hope you got a chance to read four blogs on Artificial Intelligence (AI). The blogs covered security and compliance consideration, challenges, and governance aspects…
A data breach is a security incident which leads to the accidental or unlawful destruction, loss, alteration, unauthorized disclosure of, or access to sensitive, personal,…
Information Security Forum (ISF), a nonprofit association that researches and analyzes security and risk management issues has noted that many CISOs are reporting the wrong…