AI/MLAmid all the AI, a ‘human-first’ cybersecurity approach must prevailDavid BalabanJanuary 16, 2025A “human first” cybersecurity approach can deliver the resiliency organizations will need to survive in the AI era.
Data SecurityFive ways to turn data security into a competitive advantageDavid BalabanDecember 18, 2024Smart companies understand that data security has become a competitive advantage – not just an operational necessity.
AI/MLSix ways AI enhances network securityDavid BalabanOctober 16, 2024Here’s a snapshot into how AI will reshape network security.
Network SecurityFive ways to beef up network security and reduce data theftDavid BalabanSeptember 27, 2024These five best practices are the blocking and tackling of network data security that never go out of style.
DevSecOpsSeven ways to secure open-source softwareDavid BalabanSeptember 17, 2024Securing open-source software will take collaboration, innovation and a commitment to best practices.
AI/MLFive ways to secure modern, AI-based customer support toolsDavid BalabanAugust 16, 2024Here’s how to modernize and service customers better, but keep the enterprise secure.
PhishingThree ways to mitigate digital impersonation attacksDavid BalabanJuly 23, 2024Digital impersonation attacks are at the center of much of the financial fraud caused by hackers, including phishing and malware distribution.
Security Strategy, Plan, BudgetNine ways construction companies can modernize and mitigate cyber risksDavid BalabanJune 26, 2024The construction industry has been ripe for IT modernization for decades – the companies that don’t modernize won’t be around by 2030.
Critical Infrastructure SecurityTen ways to minimize software supply chain risksDavid BalabanMay 17, 2024Organizations must make software supply chain security a collaborative effort where everyone on the development team gets involved.
PhishingSix ways to fend off spam in corporate networksDavid BalabanApril 18, 2024There’s no easy way to ward off spam – organizations need a mix of advanced email filtering, security protocols, modern data security tools, and user education.