Gartner: Generative AI Will Bring “Transformational Benefit” in the Next 2-5 Years

Generative AI landed on Gartner’s coveted Hype Cycle for Emerging Technologies for 2023. Read about AI’s transformational impact on business and society. Read more »

Data Classification Policy

In many ways, data has become the primary currency of modern organizations. It doesn’t matter whether you are a large business enterprise, SMB, government or nonprofit, the collection, management,... Read more »

Get Norton 360 Standard on 2 Devices Plus Identity Theft Protection for $24.99

This exclusive bundle includes online dark web monitoring and identity theft support, so don’t miss out on this discounted year-long subscription. Read more »

Microsoft Defender for Cloud Gets More Multicloud

With Microsoft Defender for Cloud, cloud security posture management features are now available for Google Cloud Platform, as well as AWS and Azure. Read more »

DEF CON Generative AI Hacking Challenge Explored Cutting Edge of Security Vulnerabilities

Data from the human vs. machine challenge could provide a framework for government and enterprise policies around generative AI. Read more »

Drone Usage Policy

Unmanned aircraft systems, more commonly known as drones, have quite literally taken off by performing many new and inventive commercial applications. Delivering packages, recording terrain, reporting news, documenting wildlife... Read more »

At Black Hat, Splunk, AWS, IBM Security and Others Launch Open Source Cybersecurity Framework

With security schema, Splunk and collaborators aim to transform alert telemetry from cacophony to chorus with one taxonomy across vendors and tools. Read more »

5 Tips for Securing Data When Using a Personal Mac for Work

Discover strategies for securing data on your personal Mac for work tasks. Learn how to protect your device against potential threats. Read more »

Massive EvilProxy Phishing Attack Campaign Bypasses 2FA, Targets Top-Level Executives

This attack sent approximately 120,000 phishing emails to organizations worldwide with the goal to steal Microsoft 365 credentials. Read more »

Minimizing Risk Through Proactive Apple Device Management: Addigy

In this Executive Brief by Preetham Gurram, Vice President of Product, Addigy, learn how to proactively manage Apple devices. Read more »
Subscribe to our Newsletter