4.1 C
New York

Cyber Security

The Product Leader Redefining How AI Connects Companies and Customers

In a tech world sprinting toward “automate everything,” Madhuri...

AI Computer Document Extraction Soars, But Paper Isn’t Going Anywhere

Along with ChatGPT, RAG, LLMs and Prompt Engineering, another...

A Conversation with Rajesh Kesavalalji on Optimizing AI Infrastructure

With over 18 years of experience spanning enterprise applications...

Winning CyberSecurity Budget: The Value-Based Approach

Cybersecurity is no longer a luxury, but a necessity for businesses however, it's common for security to be viewed as a cost center, which...

Agnidipta Sarkar, Group CISO at Biocon: Thought Leaders Interview Series

We had the pleasure of interviewing Agnidipta Sarkar, a highly regarded Digital Resilience Practitioner and Group CISO at Biocon, a leading Indian biopharmaceutical company....

Training employees in the basics of information security – what to look for

Information security incidents can have severe consequences for businesses, especially when they are a result of unintentional violations by employees. According to research, in...

IBM Security X-Force Threat Intelligence Index 2023:Key findings

The IBM X-Force Threat Intelligence Index 2023 report has been released, revealing key insights and trends in cyber threats across the globe. The IBM...

6 Practices to Ditch for Effective Vulnerability Management

Vulnerabilities in technology environments have become increasingly prevalent, with the number of identified flaws growing exponentially in the past two decades. The first vulnerability...

Firms that pay ransom money are facilitating 10 new attacks: Report Reveals

A recent report by cybersecurity firm Trend Micro has revealed that just 10% of ransomware victims pay the ransom, but those who do are...

Subscribe

Popular articles

The Product Leader Redefining How AI Connects Companies and Customers

In a tech world sprinting toward “automate everything,” Madhuri...

The Hidden Rules of Global Scale According to a Veteran SaaS Architect

Sunil Thamatam, a principal software engineer with twenty years...

Guide to Browser Fingerprinting: How to Bypass It or Prevent it?

I’ve tested almost every so-called “privacy” browser out there...