Preview Mode
Documentation

Leadership Perspectives: Simplifying security in the age of complexity

Hear from tech leaders on the future of AI, advocating for security investments, and battling human error.

theNET | Future Internet | Insights for the digital enterprise

Why web applications are a C-suite priority

Application failures can cost companies millions — like the 6 hour outage of Meta apps leading to $60 million in losses. Here's how technology leaders can rethink combating this threat to the bottom line.

Read (5 min)
Featured Content

Using AI to tell a story with data

CEO of Sushidata shares how applying AI to unstructured customer data can help organizations deepen customer insights and improve experiences — enhancing satisfaction and minimize defections

Read (8 min)

Tech sprawl emulates the snake game

Enterprises have added more and more point solutions as they have grown, much like the snake adding segments in the old 1980s cell phone game. Complex enterprise security stacks are causing friction and slowing business down

Read (8 min)

Modern security innovations and trends: From AI to quantum

Generative AI and quantum computing promise to revolutionize cyber security by enhancing the efficiency of security operations and sparking new threats

Read (4 min)

AI governance starts with data governance

Governing the use of AI in the enterprise is essential for reducing risks. Because AI depends on data, AI governance must start with data governance

Read (6 min)

Receive a monthly recap of the most popular Internet insights!

Balancing data sovereignty and AI

Organizations need ways to leverage AI without letting data cross geographical borders. Unless they can control where models run and how models are updated, they risk costly regulatory violations

Read (4 min)

Preparing for the future of AI in cyber security

In 20 years, AI will reshape our world considerably. But too many organizations are focused exclusively on what AI can do today — to make the most of AI in the future, organizations need to build a long-term strategy and start modernizing security now

Read (9 min)

Implementing controls for government use of AI

AI shows potential to address complex societal challenges, but agencies must balance innovation with safeguarding citizens' interests as they navigate this emerging landscape and combat shadow AI

Read (9 min)

CTOs guide on AI-assisted development

Technology leaders are eager to explore AI-assisted development to enhance efficiency and accelerate results — 8 best practices for managing the risks of AI integration

Read (7 min)

The state of cloud security

Developing resilient, forward-looking security strategies will become more important to explore the complex world of cloud security and realize its full potential while minimizing risks to businesses

Read (5 min)

AI’s role in reinventing the customer experience

Nan Guo, SVP of Engineering at Zendesk shares how she utilizes AI to personalize the consumer and employee experience — while adhering to the principle of security-by-design

Read (5 min)

Enhance cyber security and build resilience

Incidents like last year’s record-breaking DDoS attacks and recent high-profile breaches underscore the need for organizations to be fully engaged in their current cyber security efforts — 4 key initiatives to help balance today's threats with the evolving landscape

Read (4 min)

A digital native mindset to cyber security

Digital natives are taking advantage of Zero Trust and leading a change in cyber security — here are the top 5 benefits they are experiencing.

Read (6 min)

ChatGPT impersonators reveal security vulnerability

With popularity comes risks — Shadow AI multiplies the risks of Shadow IT with the surge in fraudulent and malicious applications designed to infiltrate and steal data

Read (5 min)

Can AI find vulnerabilities?

Why AI is a double-edged sword when it comes to security and how to future-proof against vulnerability exploits

Read (6 min)

Overcoming the challenges of data sovereignty

More than 100 countries have enacted laws aimed at protecting the privacy of their citizen’s personal information—and that’s a good thing. However, complying with these laws can pose serious challenges to global businesses

Read (7 min)
2024 Vision

2024 vision: 10 predictions for technology leaders

Considerations as you prepare your organization’s strategies and priorities for the next 12 months

Read (9 min)

Securing LLMs

10 types of large language model (LLM) attacks and the risk they introduce when embedded in applications

Read (5 min)

Using AI in cyber defenses

The sophistication of threats warrants new security methods — by leveraging AI, organizations can adapt in real time

Read (5 min)

Ideas for using generative AI safely

New security threats rise to the surface with every transformative technology. Each time, the industry has responded by tightening security, protocol, and process — the same will happen with AI

Read (4 min)

AI is here: How can businesses stay secure?

As organization adopt AI into their operations, they must also be proactive to secure themselves from the potential of AI-run cyberattacks

Read (4 min)

Protecting data from AI

When used without being mindful of the limitations and risks AI tools present — they can not only hamper the development process but also cause harm to the organizations using them

Read (8 min)

Should you ban employee use of AI?

Examining the benefits and risks of AI-based large language models so CISOs can determine if they should allow or ban ChatGPT and other generative AI tools

Read (6 min)
Room with digital library

Securing the AI revolution everywhere

There is incredible opportunity in using AI, but this technology also presents challenges that may be addressed through cyber security

Read (5 min)
Globe with connections between users

The Internet is the new corporate network

Shifting from an on-premise infrastructure to a cloud-connected model affords organizations more flexibility than ever before — but it brings its own challenges as well

Read (5 min)

Showing egress fees the exit

AI requires access to massive amounts of data and significant computing power — storage and data management then, become a large expense in developing AI systems

Read (4 min)
Image of AI on a computer chip

ChatGPT: How to protect your company

3 considerations when evaluating your cyber security posture in the age of generative AI

Read (4 min)
Photo of person using a laptop

The phishing implications of AI

While intended for good, attackers can exploit generative AI as a tool in developing phishing campaigns

Read (7 min)
Hexagonal pattern

Security implications of Web3

Considerations as you explore the decentralized web

Read (10 min)
Image of code

Optimizing app development

Next-gen serverless platforms eliminate tedious tasks and enable developer focus

Read (8 min)
Image of a broken link in a chain

The evolving DNS threat landscape

3 novel threat vectors join a long list of persistent DNS security threats

Read (7 min)
CXO in front of a window looking at data

A new CXO emerges: CZTO

Zero Trust is no longer simply a concept; it is now a requisite. Who ‘exactly’ is accountable?

Read (5 min)
Image of a city skyline

The future of networking

Securing a remote workforce requires a holistic security strategy that eliminates complexity and security gaps

Read (7 min)