News

IT teams likely struggle to get employees to react to announcements about system upgrades. How do you make sure your messages ...
As AI regulations expand globally, CISOs must balance innovation with compliance—adopting frameworks like GDPR, CCPA, and ...
Legacy Privileged Access Management (PAM) quietly drains resources, stalls innovation, & introduces security risks. It’s time ...
Enkrypt AI's new report reveals critical safety flaws in multimodal models, exposing risks like CSEM content and CBRN info ...
In retail, the commerce platform you choose should earn your trust through verifiable compliance practices & transparent ...
How the MCP Authorization Spec reshapes security for LLM-powered autonomous agents. Agentic AI systems – where large language models (LLMs) power autonomous, goal-driven agents – are rapidly ...
Founded in 2013 by the Cloud Security Alliance, the Security Trust Assurance and Risk (STAR) registry encompasses key principles of transparency, rigorous auditing, and cloud security and privacy best ...
Self-driving cars, facial recognition software, automated hiring tools, AI chatbots. AI is everywhere. And like any transformative technology, it brings with it a whole new set of security challenges.
With over 15 years of experience in research and technology, John excels at executive-level leadership, relationship management, and strategy development. He is a published author, technologist, and ...