Google Cloud/Cloud Security Alliance Report: IT and Security Pros Are ‘Cautiously Optimistic’ About AI

Google Cloud/Cloud Security Alliance Report: IT and Security Pros Are ‘Cautiously Optimistic’ About AI

The C-suite is more familiar with AI technologies than their IT and security staff, according to a report from the Cloud Security Alliance commissioned by Google Cloud. The report, published on April 3, addressed whether IT and security professionals fear AI will replace their jobs, the benefits and challenges of the increase in generative AI and more. Of the IT and security professionals surveyed, 63% believe AI will improve security within their organization. Another 24%…

Read More

What Australia’s Digital ID Means to How Citizens Interact With Businesses Online

What Australia’s Digital ID Means to How Citizens Interact With Businesses Online

Australia is about to get a national online ID system — the Digital ID — which promises to improve the security and privacy of data online. However, concerns among Australians persist. In just a few months, Australians will have access to a new form of ID, which aims to make identification online much safer. It’s called the Digital ID, and it will form a cornerstone of the government’s strategy to improve the security of data…

Read More

Rushing into generative AI is risky: How to protect data

Rushing into generative AI is risky: How to protect data

Rushing into generative AI is risky: How to protect data | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More

Improving IT security through cross-department collaboration

Improving IT security through cross-department collaboration

Improving IT security through cross-department collaboration | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy…

Read More

IT and OT cybersecurity: bridging the divide

IT and OT cybersecurity: bridging the divide

IT and OT cybersecurity: bridging the divide | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

Cyber risk is a business risk

Cyber risk is a business risk

Cyber risk is a business risk | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy…

Read More

Pam Nigro – Top Cybersecurity Leaders 2023

Pam Nigro – Top Cybersecurity Leaders 2023

Pam Nigro – Top Cybersecurity Leaders 2023 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

SAP cyber resilience is not a one-and-done procedure

SAP cyber resilience is not a one-and-done procedure

SAP cyber resilience is not a one-and-done procedure | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

Network visibility and security gaps due to remote work challenge IT

Network visibility and security gaps due to remote work challenge IT

Network visibility and security gaps due to remote work challenge IT | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more….

Read More

How to effectively communicate cybersecurity best practices to staff

How to effectively communicate cybersecurity best practices to staff

How to effectively communicate cybersecurity best practices to staff | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More
1 2