Wonder Woman – Design Thinking for Cybersecurity
Discover why financial controls fall short in cybersecurity and how design thinking can offer a transformative approach. Inspired by Wonder Woman’s journey.
Plunging Head-on Into Language AI
Dive into the ethical and security challenges of AI in our complex digital world., examining Google’s LaMDA and the risks of unsupervised machine learning.
Why Are We Here and What to Do About It?
Uncover the root causes of rising cybersecurity breaches affecting major sectors. This analysis traces key flaws from 1945 to now, offering solutions for future.
A Smooth, Accurate, Precision-Made Machine
The link between a 2016 AI report by Obama’s team and today’s cybersecurity threats and how incidents like the Colonial Pipeline attack expose vulnerability.
Colonial Pipeline Cyberattack: Who benefits?
Uncover the impact of the Colonial Pipeline cyberattack on U.S. energy markets and infrastructure security. A wake-up call for urgent modernization.
T-Minus Zero
Explore China’s growing influence in global cyberspace and its impact on U.S. tech and security. Are we falling behind in the AI and Quantum race?
Too Much Time Spent Updating; Not Enough Time Spent Selling
Explore the pitfalls of over-automation in sales with insights from Jill Rowley. Learn how to bridge the gap between sales and marketing for long-term customer value.
Great Brand Stories Last Forever
Discover the power of brand storytelling in the crowded cybersecurity market. Learn how to build emotional bonds with deeply cynical CISOs and stand out among competitors.
The Massive Challenges of Digital Transformation
Thanks to Fortinet for identifying seven critical security issues that any organization looking to successfully adopt digital acceleration strategies.
Can Hardware Security Modules (HSM) Lower Your Insurance Costs?
Discover why cyber liability insurance is crucial for businesses today. Learn how your cybersecurity measures can impact your insurance premiums.
The Cybersecurity Mindset is Broken
Discover why reactive cybersecurity is failing and how a first principles approach could transform asset protection and eliminate common vulnerabilities.
Coronavirus Means More BEC
As an increasing proportion of the workforce shifts to remote work, email usage will only increase. This is a dream for cybercriminals.
A 2021 First Quarter Review
2021 Q1 wrap-up. Dive into the latest cybersecurity threats and trends. Understand why traditional defenses are failing and what the future holds for cyber risk. Stay ahead of evolving challenges.
Demystifying CCPA
Navigating California’s CCPA law? This comprehensive guide breaks down its impact on businesses, both in and out of California, and how to comply effectively.
A Risk-Based Approach to Cybersecurity
Navigate the challenges of quantifying cybersecurity risk in finance. Uncover the limitations of traditional frameworks and the promise of FAIR.
Canary in the Cybermine
Discover why AI falls short in cybersecurity. Uncover the barriers to adoption and how threat actors exploit AI’s potential.
The Dark Side of Digital Transformation
Dive into the urgent issue of digital inequality in the COVID-19 era. Learn how skill gaps deepen societal divisions and what we can do about it.
The Future of Cybersecurity Education
Learn why culture and training are key in cybersecurity. Adapt to new risks and close the skills gap in a digital world, according to Gartner.
It’s What You Do With the Awareness!
Explore how human nature impacts cybersecurity. Minimize risks by understanding behavior in the final part of our series.
When Culture Eats Strategy For Breakfast
Discover the role of human-centric cybersecurity in Part 2 of our series. Learn how C-Suite investment can elevate your organization’s cyber hygiene.
A Mature Cybersecurity Culture is Vital
Discover why a strong cybersecurity culture is essential for corporate success. Learn how C-Suite leadership can drive security maturity and mitigate risks.
Why Should Businesses Care About Data Privacy?
Dive into the critical need for reform in digital security, privacy and compliance. Discover why current methods fail and how to better protect data and meet regulations.
Parallel Threats
Uncover the cybersecurity risks of the Capitol assault and SolarWinds breach. Learn why both events call for a total network rebuild to ensure future security.
The 996 Rule
Explore the contrasting success stories of Richard Branson and Jack Ma. Learn how their backgrounds, work ethics, and philosophies shaped their empires.
A National Security Architecture – The Time Has Come
Discover the ‘Cycopalypse’: Why the U.S. is losing in cybersecurity across education, tech, and policy. Learn what must change for a secure future.
Cyberwar: The Five Essential Keys to Winning
Discover why the U.S. lags in cybersecurity across five key areas. Learn lessons from the SolarWinds attack and what must change for a secure future.
Ransomware Elevates Its Targets
Learn from DoppelPaymer’s attack on Foxconn. Elevate your cybersecurity game to fend off sophisticated threats.
Fire in the Hole
Uncover the impact of FireEye’s recent hack. This breach shakes the cybersecurity industry and raises questions about national security and defense capabilities.
Misinformation, Disinformation, and Conspiracy Theories
Uncover the evolution of disinformation from the Cold War to today’s digital landscape. Learn how it impacts elections and public opinion, and ways to combat it.
Censorship, Suppression, and the 2020 Election
Dive into the role of social media in fueling domestic extremism in the US, examining content moderation challenges and the migration to alternative platforms.