How can attackers abuse artificial intelligence?
Artificial intelligence (AI) is rapidly finding applications in nearly every walk of life. Self-driving cars, social media networks, cybersecurity companies, and everything in …
The rise of digital platforms is empowering the military, but challenges remain
Digital technologies such as cloud computing, big data, data analytics, IoT, artificial intelligence, augmented reality, and blockchain are gradually being leveraged in the …
Only 25% of organizations using AI have an enterprise-wide AI strategy
Only 25% of global organizations that are already using artificial intelligence (AI) solutions, have developed an enterprise-wide AI strategy, according to IDC. At the same …
How businesses can become more nimble and secure by moving to the cloud
Today’s business landscape is more dynamic than ever before. Organizations are being inundated with data, generated by an ever-increasing number of connected devices and …
The highly competitive global encryption management solutions market continues to grow
The increasing adoption of digitalization and globalization of enterprises have made IT resources prone to cyber attacks. This has increased the demand for encryption …
Inside the NIST team working to make cybersecurity more user-friendly
Cybersecurity is usually not a user’s primary duty, yet they suffer an increasing burden to respond to security warnings, maintain many complex passwords, and make security …
How consumers view the transparency of their AI-enabled interactions
The ethical use of AI is becoming fundamental to winning people’s trust, a new study from the Capgemini Research Institute has found. As organizations progress to harness the …
How companies innovate as they face industry disruption
Nearly three-quarters (72%) of industry sectors experienced an increase in disruption over the past eight years, leaving $41 trillion in enterprise value (market …
Cybersecurity crisis communication: How to do it well
Riviera Beach is one of the several cities and towns in Florida which have recently been hit with ransomware. Its local government, like that of Lake City before it, decided …
Eliminating fragmentation unlocks opportunities to realize the promise of the cloud
A major expectation gap exists between what IT managers hoped the public cloud would deliver for their organizations and what has actually transpired, a Cohesity survey of 900 …
To remain competitive, businesses need strategic digital transformation
With no international alignment on how to regulate the digital environment, companies are managing an increasingly complicated set of conflicting rules in key markets. At the …
Countering industrial cyberthreats with secure, standards-based, licensed wireless networks
Over the past few years, cyber threats aimed at a number of critical infrastructure targets have drawn our attention to the security of mission critical networks. These …