I am text block. Click edit button to change this text. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Articles & White papers

The Legacy of ELIZA

Recent dramatic advancements in Machine Learning (ML) and Na..
Artificial Intelligence

Artificial Intelligence for All, Responsibly

Artificial Intelligence / Machine Learning solutions could s..

Cloud Solutions and the Dynamic…

Firms that consistently exhibit dynamic traits such as busin..
cybersecurity

Employee Security Awareness Training

The four cybersecurity threats organizations should focus on..
Cybersecurity Incident Response

Cybersecurity Incident Response Preparedness

Being prepared with an established plan of action to immedia..

The (Imaginary) Ideal IT Strategy

Strategy generally involves, setting goals and priorities, d..

IoT Medical Device Cybersecurity

Cybersecurity risks go beyond ransom attacks and traditional..

Third Party Supply Chain Risk…

Organizations โ€“ public and private โ€“ have felt the impact of..
Explore More

Blogs

Sep
17
2024

Security By Design- Part 13

The threats and risks our businesses face today are at the highest level of systemic…
Aug
16
2024

Security By Design- Part 12

A faulty CrowdStrike channel file 291 software update to their Falcon End Point Threat Data…
Jun
07
2024

Security By Design- Part 11

The U.S. Cybersecurity and Infrastructure Security Agency defines โ€œSecure by Designโ€ to mean that technology…
Apr
08
2024

Security By Design- Part 10

The Internet is the most complex of digital environments, representing the highest level of systemic…
Mar
14
2024

Security By Design- Part 9

The United States faces escalating threats posed by China, Russia, Iran, foreign cartels, sophisticated hackers,…
Jan
19
2024

Security By Design- Part 8

Do you and your business have the ability to anticipate, prepare for, and adapt to…
Explore More

Videos & Podcasts

Explore More

Events

June
16
2022

Webinar: Demystifying ZTA (Zero Trust…

What is Zero Trust Architecture? What are the Visions, Goals, Challenges, and Risks in achieving…
March
17
2022

Zero Trust Architecture Adoption

What is Zero Trust Architecture Adoption and What it is Not!
January
20
2022

Zero Trust Architecture Adoption in…

What is Zero Trust Architecture in Federal Government and What it is Not!
December
16
2021

Webinar: B2C Experiences Revolutionizing B2B…

Nearly 70% of business buyers say they expect an โ€œAmazon-likeโ€ buying experience from their business…
September
30
2021

Manufacturing Cybersecurity Webinar

What do Hackers see when they are targeting manufacturing companies and how they decide to…
September
23
2021

Webinar: Cloud Solutions and Dynamic…

Cloud solutions and web-based communications, collaboration and productivity platforms can dramatically enhance and support your…
Explore More