Put guardrails around AI use to protect your org, but be open to changes

Artificial intelligence (AI) is a topic that’s currently on everyone’s minds. While in some industries there is concern it could replace workers, other industries have embraced it as a game-changer for streamlining processes, automating repetitive task… Continue reading Put guardrails around AI use to protect your org, but be open to changes

Bridging the gap between cloud vs on-premise security

With the proliferation of SaaS applications, remote work and shadow IT, organizations feel obliged to embrace cloud-based cybersecurity. And rightly so, because the corporate resources, traffic, and threats are no longer confined within the office prem… Continue reading Bridging the gap between cloud vs on-premise security

5 resolutions to prepare for SEC’s new cyber disclosure rules

2023 has been marked as a year of global conflict and unrest, all of which will impact the cyber threat landscape for years to come. However, one of the most significant cyber security developments for 2024 isn’t driven by attackers. It’s driven by reg… Continue reading 5 resolutions to prepare for SEC’s new cyber disclosure rules

5 resolutions to prepare for SEC’s new cyber disclosure rules

2023 has been marked as a year of global conflict and unrest, all of which will impact the cyber threat landscape for years to come. However, one of the most significant cyber security developments for 2024 isn’t driven by attackers. It’s driven by reg… Continue reading 5 resolutions to prepare for SEC’s new cyber disclosure rules

Stop panic buying your security products and start prioritizing

As 2024 is rounding the corner, many companies are making a fresh start with a new cybersecurity budget. But with the growing number of cyberattacks and their increasingly complex nature, even those companies whose cybersecurity budgets have gone up fo… Continue reading Stop panic buying your security products and start prioritizing

Why it’s the perfect time to reflect on your software update policy

The threat landscape is evolving by the minute, with both malicious actors and well-intentioned researchers constantly on the hunt for new attack vectors that bypass security controls and gain control of systems and applications. In fact, thousands of … Continue reading Why it’s the perfect time to reflect on your software update policy

NIS2 and its global ramifications

The Network and Information Systems Directive (NIS2), due to come into effect in October 2024, seeks to improve cyber resilience in the European Union (EU). Its effects are likely to be wider reaching, though, bringing in more stringent processes and c… Continue reading NIS2 and its global ramifications

CISOs can marry security and business success

With an endless string of cyber fires to be put out, it’s easy to forget that the cybersecurity function in an organization doesn’t exist in a vacuum. Its main purpose is to ensure the organization succeeds, and that’s the reason CISOs get the budget t… Continue reading CISOs can marry security and business success

Crypto asset discovery and the post-quantum migration

Quantum computing is reshaping our world and will revolutionize many industries, including materials science, life sciences, transportation, and energy. Google recently demonstrated the power of quantum computers by solving a problem in seconds that to… Continue reading Crypto asset discovery and the post-quantum migration

4 warning signs that your low-code development needs DevSecOps

Low code platforms have democratized development in the enterprise. They improve efficiency and enable companies to do more with less. But as you begin to do more you will start hitting speed bumps that eventually become roadblocks. If your releases ha… Continue reading 4 warning signs that your low-code development needs DevSecOps