applications
Latest about applications
Generative AI: Questions for competition and consumer protection authorities
By Oliver Howley, Mary Wilks published
The growth of GenAI has surged, with governments now striving to establish regulations that mitigate potential risks while still fostering the transformative power of AI.
Three strategies to protect users from cyberattacks
By Dan Allen published
Why businesses need to support a collaborative security culture, to protect end users.
Balancing act: CISOs knife-edge role in modern cybersecurity
By Peter Scott published
CISOs face growing scrutiny, legal obligations, and tech challenges in cybersecurity leadership evolution.
Bridging the data security gap: navigating data protection
By Mark Semenenko published
As businesses must learn the tools and tactics to address the security gap and seize the opportunity to harness the power of their data for innovation and growth.
Preventing the risks of cloud exploitation at the edge
By Drazen Kerzan published
Drazen Kerzan, Senior Manager at Edgio discusses cloud exploitation and the precautions to lower security risks.
Enterprise AI applications are threatening security
By Ray Canzanese published
Netskope's Ray Canzanese discusses the urgent risks of generative AI use in the workplace and how to overcome them.
Pre-built solutions - why build a house when you can buy one?
By Christian Floerkemeier published
Most people don't build a home from scratch - it's time for tech teams to follow suit.
Privacy vs convenience – which comes out ahead?
By Suzan Sakarya published
Personal data is under attack more than ever before, so how do you protect it?
Get daily insight, inspiration and deals in your inbox
Get the hottest deals available in your inbox plus news, reviews, opinion, analysis and more from the TechRadar team.