Bringing Security Back into Balance

Credit to Author: Eva Chen| Date: Sun, 04 Aug 2024 00:00:00 +0000

This article by Trend Micro CEO Eva Chen brings focus back to striking the cybersecurity strategies balance between business C-suite and information technology (IT) departments.

Read more

RSAC 2024 Review: AI & Data Governance Priorities

Credit to Author: Shannon Murphy| Date: Tue, 28 May 2024 00:00:00 +0000

Get our take on the RSA 2024 conference where we review some of the major topics covered such as AI and data governance.

Read more

ISPM + ITDR: Proactive Cyber Defense in the AI Era

Credit to Author: Alifiya Sadikali| Date: Wed, 22 May 2024 00:00:00 +0000

In the ever-evolving landscape of cybersecurity, staying ahead of malicious actors requires a multifaceted approach.

Read more

ISPM & ITDR Synergize for AI-Based Identity Security

Credit to Author: Alifiya Sadikali| Date: Wed, 22 May 2024 00:00:00 +0000

In the ever-evolving landscape of cybersecurity, staying ahead of malicious actors requires a multifaceted approach.

Read more

Deepfakes and AI-Driven Disinformation Threaten Polls

Credit to Author: Jon Clay| Date: Thu, 02 May 2024 00:00:00 +0000

Cheap and easy access to AI makes it harder to detect state-sponsored and homegrown campaigns during this election year

Read more

Cybersecurity Decluttered: A Journey to Consolidation

Credit to Author: David Ng| Date: Fri, 12 Apr 2024 00:00:00 +0000

Learn how far cybersecurity has come from scattered resources to consolidation the future.

Read more

Importance of Scanning Files on Uploader Applications

Credit to Author: Fernando Cardoso| Date: Fri, 12 Apr 2024 00:00:00 +0000

Delve into the crucial practice of file scanning within uploader applications, and learn defensive measures to safeguards against malicious threats like malware.

Read more

A Necessary Digital Odyssey of RPA and AI/ML at HUD

Credit to Author: David Chow| Date: Wed, 13 Mar 2024 00:00:00 +0000

Explore two RPA and AI/ML use cases at HUD during the operational challenges of the longest US Government shutdown, a rigid legacy IT environment, and complex federal regulations.

Read more