We speaker to Gartner’s Nader Heinen about why access control should be built into enterprise AI Read more »
One chief information security officer shares her experience of marshalling what she learned at the FBI for business security, with a particular focus on finance and accounting Read more »
Foundation AI models offer knowledge that spans the internet, but they generally lack an understanding of proprietary business data and processes Read more »
Business continuity efforts don’t stop when employees go remote. Learn how to create and manage a reliable business continuity plan for remote workers. Read more »
The US Cybersecurity and Infrastructure Security Agency reiterates guidance for operators of critical national infrastructure as it eyes the possibility of cyber attacks from Iran Read more »
An actively exploited type confusion vulnerability in the Google Chrome web browser needs immediate attention from users Read more »
A developing cyber attack at Australian airline Qantas that started at a third-party call centre is already being tentatively attributed to Scattered Spider. Find out more and learn about... Read more »
Business continuity software is an application or suite designed to make business continuity planning/business continuity management (BCP/BCM) processes, metrics and compliance more efficient and accurate. Read more »
The principle of least privilege (POLP) is a concept in computer security that limits users’ access rights to only what is strictly required to do their jobs. Read more »
Quantum key distribution (QKD) is a secure communication method for exchanging encryption keys only known between shared parties. Read more »