The Digital Operational Resilience Act (DORA) is an EU regulation many US firms may need to comply with. After DORA comes ...
Now that the industry has survived the largest IT outage in history, it begs the question: How could such a disaster be ...
We will see the AI Singularity very soon. How can we prepare for it? On the heels of publishing my latest book The AI ...
Organizations often focus on protecting sensitive data within their core applications — such as Salesforce, Microsoft365, ...
As cybersecurity platforms have become more effective, cyber attackers have shifted their strategy. Rather than challenging ...
The U.S. Air Force recently released its Zero Trust Strategy, outlining strategic goals and objectives that enable Air and ...
A Wake-Up Call for AI-Era Security It was just another Tuesday morning. With a steaming cup of coffee in hand, I settled into ...
Tech leaders recognize that there has never been a more crucial time to begin incentivizing routine security practices and ...
In today's rapidly evolving digital landscape, we can no longer rely on a centralized security team as the sole gatekeeper of ...
Modern DevOps and cloud infrastructure has exploded in complexity, and with that complexity comes a big access problem. Today ...
In today’s hyper-connected world, our smartphones have become indispensable tools for both personal and professional use.
I wrote an article entitled "The CSO’s Myopia." At the time, I aimed to highlight a critical limitation in information ...
Results that may be inaccessible to you are currently showing.
Hide inaccessible results