Nieuws

IT teams likely struggle to get employees to react to announcements about system upgrades. How do you make sure your messages ...
Not all visions can predict the future. That future is now, and cybersecurity needs to reinvent itself. Zero Trust is the solution.
As AI regulations expand globally, CISOs must balance innovation with compliance—adopting frameworks like GDPR, CCPA, and ...
Enkrypt AI's new report reveals critical safety flaws in multimodal models, exposing risks like CSEM content and CBRN info ...
Legacy Privileged Access Management (PAM) quietly drains resources, stalls innovation, & introduces security risks. It’s time ...
A tailored phishing campaign runs on personal information. Taking employees’ personal information out of circulation deprives attackers of a valuable resource.
With over 15 years of experience in research and technology, John excels at executive-level leadership, relationship management, and strategy development. He is a published author, technologist, and ...
CSA’s AI Safety Initiative is the premier coalition of trusted experts who converge to develop and deliver essential AI guidance and tools that empower organizations of all sizes to deploy AI ...
CSA’s Enterprise Authority to Operate (EATO) framework and auditing guidelines are specifically designed to fulfill stringent ...
The CCSK certificate is highly regarded as the benchmark for cloud security expertise. It provides a comprehensive and unbiased understanding of how to effectively secure data in the cloud. Earning ...
The CSA Cloud Controls Matrix (CCM) is a cybersecurity control framework for cloud computing. It is composed of 197 control objectives that are structured in 17 domains covering all key aspects of ...
Written by Ken Huang, CEO & Chief AI Officer, DistributedApps.ai. This blog post presents MAESTRO (Multi-Agent Environment, Security, Threat, Risk, and Outcome), a novel threat modeling framework ...