Check Out All Things

cybersecurity

Defending Health and Social Care from Cyber Attacks

The National Cyber Security Centre (NCSC) recently calculated that...

CIOs and CISOs Battle Cyber Threats, Climate, Compliance

CIOs and CISOs face unrelenting pressure from three massive...

Is Poor Collaboration Hurting Your Team’s Productivity?

Regardless of how many days you believe hybrid workers...

Building a Cyber Empire with Strategies for Success

Join us for an enlightening episode of our show,...

Three ways to protect your business from cyberattacks

Keeping on top of cyberattacks in this current digital...

Data Sovereignty in AI: Five Key Considerations

Data is the most valuable economic asset for modern companies and their greatest resource for growth and change. Consequently, safeguarding such data and adhering...

Defending Health and Social Care from Cyber Attacks

The National Cyber Security Centre (NCSC) recently calculated that Health and Social Care is the 5th biggest sector attacked by cyber-criminals in the UK....

How is AI changing patch management?

Cyberattacks are increasing in frequency and severity. This means maintaining the security of IT systems is more critical now than ever – and doing...

Futureproofing Identity Security with AI and ML

The field of Identity Security is undergoing a technological evolution, moving from repetitive admin work to automated, more secure solutions. Gone are the days...

The Critical Convergence of OT and IT Cybersecurity

In today’s increasingly digitised world, the threat of cyberattacks involving operational technology (OT) systems is increasing, becoming more apparent and frequent. Whilst cyberattacks of...

Reducing LLM hallucinations with trusted data

Large language models (LLM) have a range of uses, but LLMs or AI hallucinations pose great risks to organisations, and can lead to mistrust...

Are WAAP’s needed to protect cloud applications and APIs?

Attacks in the cloud are on the rise, with The State of Cloud Native Security 2024 report revealing 64% of organisations reported an increase...

Tackling AI’s Data Sovereignty Dilemma

With the advent of ever stricter data privacy and protection regulations – as well as stringent client requirements with regards to where their data...

Distinguishing Real AI in Cybersecurity

The term ‘artificial intelligence’ can be broadly described as an IT system’s simulation of human intelligence processes, such as the ability to adapt, solve...

Three Ways to Strengthen API Security

APIs (Application Programming Interfaces) are a critical driver of the digital economy. Observers predicted that Nvidia’s recently launched Omniverse Cloud APIs will propel new...