-
Jun 20, 2024 |
securityboulevard.com | Simon Horswell |Jenn Markey |Anchal Mehra |Shelley Bryen
-
Jun 20, 2024 |
entrust.com | Adam Gothmann |Jenn Markey
Midway through 2024, we’ve moved beyond digital transformation to become digital first. From shopping to banking to healthcare and beyond, increasingly the expectation is to at least be able to start – if not finish – your journey online. While the pandemic was rocket fuel for digitization, the pace of change is only expected to accelerate – driven by AI, biometrics, and quantum computing.
-
Jun 20, 2024 |
securityboulevard.com | Jenn Markey
Midway through 2024, we've moved beyond digital transformation to become digital first. From shopping to banking to healthcare and beyond, increasingly the expectation is to at least be able to start - if not finish - your journey online. While the pandemic was rocket fuel for digitization, the pace of change is only expected to accelerate - driven by AI, biometrics, and quantum computing.
-
May 24, 2024 |
securityboulevard.com | Jenn Markey |Tony Ball |Aled Owen |Mark Ruchie
-
May 24, 2024 |
entrust.com | Adam Gothmann |Jenn Markey
PKI and cryptography are critical components of a Zero Trust strategy, driving the use of encryption to keep identities, devices, data, connections, and communications secure. Like many things, increased use of encryption starts with good intentions, but may have unintended consequences. In this case, the proliferation of certificates across the organization may create a management and ownership challenge, adding cyber risk.
-
May 24, 2024 |
securityboulevard.com | Jenn Markey
Cyberattacks were forecast to have cost the global economy $8 trillion USD in 2023, and this number is forecast to grow to $10.5 trillion by 2025. In many cases, the scale and effectiveness of these attacks are being fueled by artificial intelligence (AI), especially deepfakes. Our Identity Fraud Report 2024 shows a 31x increase in the volume of deepfake attempts between 2022 and 2023.
-
May 24, 2024 |
securityboulevard.com | Jenn Markey
PKI and cryptography are critical components of a Zero Trust strategy, driving the use of encryption to keep identities, devices, data, connections, and communications secure. Like many things, increased use of encryption starts with good intentions, but may have unintended consequences. In this case, the proliferation of certificates across the organization may create a management and ownership challenge, adding cyber risk.
-
May 12, 2024 |
securityinfowatch.com | Jenn Markey
Long gone are the days of delegating technology and cybersecurity concerns to be addressed solely by the IT department. With artificial intelligence (AI), post quantum (PQ), and an ever-intensifying threat landscape, senior leadership teams and boards have a duty of care to make the right investments and provide the strategic guidance and oversight to help keep the organization, employees, customers, and other key stakeholders safe.
-
Apr 26, 2024 |
securityboulevard.com | Jenn Markey
Gone are the days of delegating technology and cybersecurity concerns to be solved solely by the IT department. With artificial intelligence (AI), post-quantum (PQ), and an intensifying threat landscape, senior leadership teams and boards must make the right investments and provide strategic guidance to help keep the organization, employees, customers, and other key stakeholders safe.
-
Apr 25, 2024 |
entrust.com | Adam Gothmann |Jenn Markey
Gone are the days of delegating technology and cybersecurity concerns to be solved solely by the IT department. With artificial intelligence (AI), post-quantum (PQ), and an intensifying threat landscape, senior leadership teams and boards must make the right investments and provide strategic guidance to help keep the organization, employees, customers, and other key stakeholders safe.