No items have been added to your cart yet
The line between human and machine is blurring. Fortunately, practitioners can keep pace with change by exploring the latest advancements—and their implications.
AI and robots were created to assist humanity in its evolution. But robots unchecked have the potential to pose a danger to humanity.
The risk inherent in AI systems can exacerbate the phenomenon of users having blind faith in technology. As AI becomes increasingly complex and autonomous, there is greater potential for unforeseen errors, biases, or ethical lapses to occur.
Inspiration can be drawn from the timeless tale of perseverance in the film The Shawshank Redemption by exploring the parallels between the prison walls of Shawshank and the digital fortresses constructed to protect data.
A holistic approach, merging AI with human expertise and robust governance, alongside continuous monitoring, is essential to effectively combat evolving cyberthreats.
Resilience means moving away from technology to mitigate cyberrisk, and this requires collaboration among technology, people, processes, and enterprises.
Many LLMs rely heavily on labeled data for training and have a high demand for annotated data, which crowdsourcing can help meet in a flexible and cost-effective manner. However, this approach also comes with several challenges.
The BoD assumes a pivotal role in the orientation and direction of organizations to select the best business strategies that not only allow them to challenge current business plans, but also inspire the necessary transformations in the executive teams.
Enterprises rely on systems, and systems sometimes fail. A system can either break down during one of its component processes or initiate processes that run smoothly but fail to produce the desired result/output.
The CISO role has undergone a considerable transformation, adapting to ever-changing technological advancements, regulatory requirements, emerging threats, and increasingly sophisticated threat actors.
Zero trust architecture is based on core principles including least privilege and network segmentation. But it is also based on certain assumptions.
How we implement automation, the controls we establish, and the areas we choose for automation implementation, all influence the level of digital trust in our organizations.
Of all industries, medicine is a centerpiece for the hope fostered by technical innovation.
The complexity of cyberthreats often mirrors the fragmentation within a cybersecurity function. As threats evolve and diversify, cybersecurity functions cannot operate effectively in silos.
A strategy based on diversity and inclusion in the workforce will help address the challenges around building a strong security capability in organizations.
In recent years, deepfakes have become a potent form of social engineering when used for exploitation and to disseminate misinformation.
It is worth exploring the nuances of stakeholder vs. shareholder capitalism, the impact of ESG on corporate creditworthiness, and the specific methodologies used by rating agencies to assess ESG criteria, with a focus on governance.
In an era when digital transformation is at the forefront of organizational strategies, the importance of incorporating cybersecurity into project management processes cannot be overstated.
Bad AI training data leads to bad outputs, and these bad outputs lead to distrust and skepticism of AI systems. People may be more reluctant to use AI systems that they do not find trustworthy, decreasing the return on investment associated with AI.
The rapid adoption of AI has introduced new attack surfaces that many digital trust professionals are only beginning to understand. AI BOM can help organizations better understand the provenance of AI components used to assess related risk.
Within the complex modern financial system, banks are the guards that protect the assets and transactions of many people. Yet it is because of this status that they are the perfect victims of competent criminals.