dreamstime m 112545431
Applications & Technology

Using AI to Develop Enhanced Cybersecurity Measures

March 1, 2024 Holt Hackney 0

A research team at Los Alamos National Laboratory is using artificial intelligence to address several critical shortcomings in large-scale malware analysis, making significant advancements in the classification of Microsoft Windows malware and paving the way […]

sigmund Im cQ6hQo10 unsplash
Applications & Technology

How CTEM Could Help Consolidate the Cyber Stack

February 27, 2024 Holt Hackney 0

By Brian Martin For a long time, cybersecurity has been in reactive mode, focused on scanning for vulnerabilities and trying to remediate them as quickly as possible. Most organisations struggled with this approach because as […]

dreamstime m 47022087
Security

Gartner Identifies the Top Cybersecurity Trends for 2024

February 26, 2024 Holt Hackney 0

Generative AI (GenAI), unsecure employee behavior, third-party risks, continuous threat exposure, boardroom communication gaps and identity-first approaches to security are the driving forces behind the top cybersecurity trends for 2024, according to Gartner, Inc. “GenAI is occupying […]

dreamstime m 97042768
Applications & Technology

The Architect’s Contract

February 22, 2024 Holt Hackney 0

By Paul Preiss, of IASA Global Today, it has been 22 years that I have been studying architects. 22 years of delight and chagrin, of hope, belief and wishing. Mpre than two decades of seeing […]

hitesh choudhary t1PaIbMTJIM unsplash
Artificial Intelligence

What Is the Best Route to Fairer AI Systems?

February 21, 2024 Holt Hackney 0

In December, the European Union passed the AI Act, the first major law aiming to regulate technologies that fall under the umbrella of artificial intelligence. The legislation might have arrived sooner, but the sudden success of […]

adi goldstein EUsVwEOsblE unsplash
Applications & Technology

Integration Patterns in Software Development

February 20, 2024 Holt Hackney 0

By Alok Mehta – CIO Business Systems.  Kemper Insurance. and Uma Medikondla – Director, Software Development.  Kemper Insurance Applications are integrated with each other; without that we cannot meet users’ requirements. For example, when a […]

hacker 2371490 1280 e1502993846714 1
Security

Cybersecurity Preparedness: What Guidance to Follow?

February 16, 2024 Holt Hackney 0

By Asélle Ibraimova, Christian Leuthner & Catherine Castaldo, of ReedSmith With cybersecurity becoming a board-level issue, compliance officers, lawyers, board members, and business drivers are looking for official guidance or recommendations on cybersecurity measures to protect business, customers, and […]