Endpoint security tools like Palo Alto Networks’ Cortex protect organizations from cyber threats and are especially necessary in the era of remote work.
By addressing transparency, accountability, fairness, and privacy, healthcare organizations can harness generative AI’s transformative power while upholding the highest standards of ethical conduct.
Security leaders should have conversations with key personnel in HR, finance, and sales/marketing to ensure alignment between security and business goals.
John Siefert, Dave Colford, and Tom Smith discuss Acceleration Economy’s upcoming Process Mining Battleground and the key questions that will be addressed for tech buyers.
With all the uncertainties around generative AI, there are certainties as well: AI is nothing without data, it’s critical that AI by kept in check by cybersecurity, and cloud technology makes AI possible and scalable.
These two complementary cybersecurity practices, when combined, enable organizations to quickly and effectively identify and mitigate potential cyber threats.
Janet Schijns discusses the power of strategic partnerships to navigate challenges, unlock opportunities, and achieve sustainable growth in the digital economy.
Generative AI transforms the role of the CIO, making them a central figure in driving innovation, strategy, and decision-making within organizations.
Try framing cloud security conversations in terms of business outcomes and using analogies for better results.
Understanding why ethical AI and explainable AI are foundational elements to generative AI is critical to moving forward.
In this special interview, Aaron Back speaks with Kenny Mullican about the top trends and takeaways from last week’s IBM Think 2023 event in Orlando.
While generative AI is still a relative newcomer in the channel, it’s already starting to create an impact in several ways.
Leveraging threat intelligence for operational needs can make organizations more effective and adaptable in modern cybersecurity operations.
The new resource provides intelligence on malicious actors and attack vectors, especially those used in recent software supply chain attacks.
A communications point person is essential after a breach; they keep everyone in the loop, enabling cybersecurity folks to focus on cybersecurity.
Working with multiple partners delivers the best outcomes for enterprises looking to integrate critical elements of modern business infrastructure.
From watsonx and will.i.am to co-creation and creativity, the first-day news, topics, and presentations at IBM Think were timely and thought-provoking, says Kenny Mullican.
Organizations need to invest in the right people, processes, and technologies to protect themselves from online threats in particular.
Lookout Chief Strategy Officer Aaron Cockerill explains how DLP helps CEOs and CISOs optimize cybersecurity in SaaS environments.
Bill Doerrfeld analyzes the state of modern CI/CD security, reviews the most common risks, and offers some safeguarding suggestions.