Uncategorized
A take on AI adoption through IT adoption lenses
Technology adoption has become an integral part of many businesses' growth strategies. Information Technology (IT) has been at the forefront of this movement, providing businesses with the tools they need to automate and streamline their processes. However, with the rapid advancement of Artificial Intelligence (AI) technolog and the fuss it has created among people - businesses are starting to explore its potential benefits.
Technology adoption has become an integral part of many businesses' growth strategies. Information Technology (IT) has been at the forefront of this movement, providing businesses with the tools they need to automate and streamline their processes. However, with the rapid advancement of Artificial Intelligence (AI) technolog and the fuss it has created among people - businesses are starting to explore its potential benefits. Read More
Cyber security predictions for 2023
The third decade of the 21st century is certainly competing to meet the parameters of the phrase “interesting times” from a Chinese […]
Digital Risk Management – what you can do on a network you cannot control
I'm sure you've heard many digital security presentations stating that the traditional network "perimeter" model is outdated and doesn't work in a world of a distributed workforce (working from home, frequent travels, contractors). As organizations become more connected to their supply chain, customers and partners, the assets that security teams used to try to protect are becoming "externalized." If we want to manage these new digital risks, we need to start looking beyond traditional boundaries... Sounds like another candidate for truism of the year nonetheless....
I'm sure you've heard many digital security presentations stating that the traditional network "perimeter" model is outdated and doesn't work in a world of a distributed workforce (working from home, frequent travels, contractors). As organizations become more connected to their supply chain, customers and partners, the assets that security teams used to try to protect are becoming "externalized." If we want to manage these new digital risks, we need to start looking beyond traditional boundaries... Sounds like another candidate for truism of the year nonetheless.... Read More
The dusk of Secure Email Gateway?Gartner Market Guide for Email Security.
No panic, the Secure Email Gateway sector is currently still doing quite well. Nevertheless... when Fortune magazine conducted a survey on email back in 2016, 90% of the organizations surveyed, had a mail server locally. What has changed since then? First and foremost, the cloud email offering.
No panic, the Secure Email Gateway sector is currently still doing quite well. Nevertheless... when Fortune magazine conducted a survey on email back in 2016, 90% of the organizations surveyed, had a mail server locally. What has changed since then? First and foremost, the cloud email offering. Read More
The foundations of threat hunting
Threat hunting is a term often used by vendors and analyst agencies in their publications. One that caught our eye was IBM's definition, which reads, "Threat hunting is a proactive approach to identifying previously unknown or ongoing, unpatched threats to an organization's network and IT infrastructure." And while there is no shortage of information on the Internet about tools and techniques for hunting a specific threat... What is missing are general ideas, an introduction to data analysis in the service of IT security, or simply a starting point for applying detailed methods and advanced tools.
Threat hunting is a term often used by vendors and analyst agencies in their publications. One that caught our eye was IBM's definition, which reads, "Threat hunting is a proactive approach to identifying previously unknown or ongoing, unpatched threats to an organization's network and IT infrastructure." And while there is no shortage of information on the Internet about tools and techniques for hunting a specific threat... What is missing are general ideas, an introduction to data analysis in the service of IT security, or simply a starting point for applying detailed methods and advanced tools. Read More