EN

Uncategorized

A take on AI adoption through IT adoption lenses

Read More

Technology adoption has become an integral part of many businesses' growth strategies. Information Technology (IT) has been at the forefront of this movement, providing businesses with the tools they need to automate and streamline their processes. However, with the rapid advancement of Artificial Intelligence (AI) technolog and the fuss it has created among people - businesses are starting to explore its potential benefits. Read More

Cyber security predictions for 2023

Read More

Digital Risk Management – what you can do on a network you cannot control

Read More

I'm sure you've heard many digital security presentations stating that the traditional network "perimeter" model is outdated and doesn't work in a world of a distributed workforce (working from home, frequent travels, contractors). As organizations become more connected to their supply chain, customers and partners, the assets that security teams used to try to protect are becoming "externalized." If we want to manage these new digital risks, we need to start looking beyond traditional boundaries... Sounds like another candidate for truism of the year nonetheless.... Read More

The dusk of Secure Email Gateway?Gartner Market Guide for Email Security.

Read More

No panic, the Secure Email Gateway sector is currently still doing quite well. Nevertheless... when Fortune magazine conducted a survey on email back in 2016, 90% of the organizations surveyed, had a mail server locally. What has changed since then? First and foremost, the cloud email offering. Read More

The foundations of threat hunting

Read More

Threat hunting is a term often used by vendors and analyst agencies in their publications. One that caught our eye was IBM's definition, which reads, "Threat hunting is a proactive approach to identifying previously unknown or ongoing, unpatched threats to an organization's network and IT infrastructure." And while there is no shortage of information on the Internet about tools and techniques for hunting a specific threat... What is missing are general ideas, an introduction to data analysis in the service of IT security, or simply a starting point for applying detailed methods and advanced tools. Read More

Please be advised that our website is using cookies for marketing, statistical and functional reasons. In order to optimize the content on our website and to adapt them to your individual needs, we use informations saved using cookies on users’ end devices. Cookies can be controlled by the user through the settings of their web browser. By contiuning to use our website without changing your web browser settings, you are accepting the use of cookies.
I accept More info