Artificial intelligence is now a front-line tool in combating cyber threats and delivering data-driven insights. AI expert and Acceleration Economy Practitioner Analyst, Ronak Mathur explores the capabilities of AI to bolster cybersecurity measures.
Search Results: phishing (74)
CISO practitioner analyst Chris Hughes emphasizes why today’s CISOs need to prioritize their agenda to quantify risk, embrace zero trust, and fight talent burnout
Analyst Robert Wood explains a strategy for resolving data breaches that entails getting inside your adversary’s head.
Considering Salesforce’s dismal Q3 results, Bob shares what he thinks the company must examine to get back on the growth train.
In this special report, John Siefert, Chris Hughes, and Tom Smith discuss the role of cybersecurity in today’s market, and why now it’s about more than just mitigating threats, and not just for highly regulated industries such as the public sector and financial services.
Janet looks at this year’s Verizon Data Breach Investigations Report (DBIR) and singles out a few facts that can help organizations evaluate risk in partnership strategy.
In Data Modernization Minute, Ep. 32, Wayne Sadin explains Microsoft’s Power BI Suite within the context of Walmart, the world’s largest retailer. The company’s financial team has recently announced their adoption of this tool.
The increasingly in-demand IBM Consulting has found that its clients and prospects are finding significant value in IBM’s ability to offer not only a full portfolio of modern technology — particularly in the cloud — but also deep industry expertise built over the decades.
Doing things the way they’ve always been done is never a good strategy where technology is concerned, and security is no exception, writes Robert Wood.
In Cybersecurity Minute Episode 28, Chris Hughes discusses how malicious actors compromised more than 130 business organizations through poor two-factor authentication practices.
It never has been more important to foster a culture of cybersecurity for maintaining security across an entire healthcare organization. Here’s how.
With a rapidly evolving threat landscape and higher customer expectations, Security Operations Center’s next steps must involve a new path with modern technologies.
Technology continues to change, but so have the skill sets needed to thrive in this industry, explains Robert Wood.
If neglected, these areas can be a drain on all the other amazing things security teams may be working on, writes Robert Wood.
As more companies embrace a decentralized workforce, they must increase cybersecurity efforts for remote work environments.
As we produce and store more data and files in the cloud, there are concerns about security in an environment that we don’t possess. Learn how secure is data in the cloud.
Los datos y documentos almacenados en la nube son más seguros que los almacenados en dispositivos y sistemas locales. Los sistemas de seguridad en la nube son más sofisticados y avanzados que los habituales de usuarios comunes para equipos y dispositivos locales.
CIOs and CFOs need to work together to build a culture of cyber-aware professionals to ensure cybersecurity across their businesses.
With companies turning to cloud applications, leading software vendors have adopted industry verticalization to stay ahead of the curve.
The FBI warns that cyber – criminals are currently targeting firms in the food and agriculture industries. The Cyber Division…