applications
Latest about applications
IT infrastructure must move with the times and adopt hybrid models
By Martin Hodgson published
As traditional working structures continue to fall away, legacy IT must move with the times.
How to integrate AI into your cyber defense strategy
By Dedi Yarkoni published
How security leaders can harness AI’s capabilities to enhance their cyber defense strategies.
The future of verification is passwordless
By David Ranson published
Will 2024 be the year the tech world ends its relationship with passwords?
Generative AI: Questions for competition and consumer protection authorities
By Oliver Howley, Mary Wilks published
The growth of GenAI has surged, with governments now striving to establish regulations that mitigate potential risks while still fostering the transformative power of AI.
Three strategies to protect users from cyberattacks
By Dan Allen published
Why businesses need to support a collaborative security culture, to protect end users.
Balancing act: CISOs knife-edge role in modern cybersecurity
By Peter Scott published
CISOs face growing scrutiny, legal obligations, and tech challenges in cybersecurity leadership evolution.
Bridging the data security gap: navigating data protection
By Mark Semenenko published
As businesses must learn the tools and tactics to address the security gap and seize the opportunity to harness the power of their data for innovation and growth.
Preventing the risks of cloud exploitation at the edge
By Drazen Kerzan published
Drazen Kerzan, Senior Manager at Edgio discusses cloud exploitation and the precautions to lower security risks.
Get daily insight, inspiration and deals in your inbox
Sign up for breaking news, reviews, opinion, top tech deals, and more.