A take on AI adoption through IT adoption lenses

Technology adoption has become an integral part of many businesses' growth strategies. Information Technolog...
Read more

Cyber security predictions for 2023

The third decade of the 21st century is certainly competing to meet the parameters of the phrase "interestin...
Read more

Digital Risk Management – what you can do on a network you cannot control

I'm sure you've heard many digital security presentations stating that the traditional network "perimeter" m...
Read more

The dusk of Secure Email Gateway?Gartner Market Guide for Email Security.

No panic, the Secure Email Gateway sector is currently still doing quite well. Nevertheless... when Fortune ...
Read more

The foundations of threat hunting

Threat hunting is a term often used by vendors and analyst agencies in their publications. One that caught o...
Read more
Please be advised that our website is using cookies for marketing, statistical and functional reasons. In order to optimize the content on our website and to adapt them to your individual needs, we use informations saved using cookies on users’ end devices. Cookies can be controlled by the user through the settings of their web browser. By contiuning to use our website without changing your web browser settings, you are accepting the use of cookies.
Akceptuję More info