sigmund Im cQ6hQo10 unsplash
Applications & Technology

How CTEM Could Help Consolidate the Cyber Stack

February 27, 2024 Holt Hackney 0

By Brian Martin For a long time, cybersecurity has been in reactive mode, focused on scanning for vulnerabilities and trying to remediate them as quickly as possible. Most organisations struggled with this approach because as […]

dreamstime m 97042768
Applications & Technology

The Architect’s Contract

February 22, 2024 Holt Hackney 0

By Paul Preiss, of IASA Global Today, it has been 22 years that I have been studying architects. 22 years of delight and chagrin, of hope, belief and wishing. Mpre than two decades of seeing […]

hacker 2371490 1280 e1502993846714 1
Security

Cybersecurity Preparedness: What Guidance to Follow?

February 16, 2024 Holt Hackney 0

By Asélle Ibraimova, Christian Leuthner & Catherine Castaldo, of ReedSmith With cybersecurity becoming a board-level issue, compliance officers, lawyers, board members, and business drivers are looking for official guidance or recommendations on cybersecurity measures to protect business, customers, and […]

dreamstime m 133405576
Applications & Technology

The Need to Assess Cyber Maturity

January 23, 2024 Holt Hackney 0

By Phil Robinson, Principal Security Consultant, Prism Infosec Establishing basic cyber hygiene practices is vital but how should the security team then seek to build on these foundations and bring about improvements?  After baselining the […]

markus winkler tGBXiHcPKrM unsplash
Cloud

Generative AI: To Do or Not To Do

January 2, 2024 Holt Hackney 0

By Dr. Gopala Krishna Behara Today, every IT vendor is hammering the drum for Generative AI.  The same is true with recent seminars and conferences on IT technology. The speakers always mention Generative AI. In […]