I am text block. Click edit button to change this text. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Articles & White papers

The Legacy of ELIZA

Recent dramatic advancements in Machine Learning (ML) and Na..
Artificial Intelligence

Artificial Intelligence for All, Responsibly

Artificial Intelligence / Machine Learning solutions could s..

Cloud Solutions and the Dynamic…

Firms that consistently exhibit dynamic traits such as busin..
cybersecurity

Employee Security Awareness Training

The four cybersecurity threats organizations should focus on..
Cybersecurity Incident Response

Cybersecurity Incident Response Preparedness

Being prepared with an established plan of action to immedia..

The (Imaginary) Ideal IT Strategy

Strategy generally involves, setting goals and priorities, d..

IoT Medical Device Cybersecurity

Cybersecurity risks go beyond ransom attacks and traditional..

Third Party Supply Chain Risk…

Organizations โ€“ public and private โ€“ have felt the impact of..
Explore More

Blogs

Mar
14
2024

Security By Design- Part 9

The United States faces escalating threats posed by China, Russia, Iran, foreign cartels, sophisticated hackers,…
Jan
19
2024

Security By Design- Part 8

Do you and your business have the ability to anticipate, prepare for, and adapt to…
Dec
11
2023

Security By Design- Part 7

The DiRECTORโ„ข framework shows us eight key domains that enable complex digital systems.
Nov
23
2023

Security By Design- Part 6

In business, we have audit departments and others who assess risks, and we engage in…
Sep
29
2023

Security By Design- Part 5

Cyber Insecurity / Cybercrime triggered Business Interruption is the most feared of all Risks
Aug
18
2023

Security By Design- Part 4

What is the SECโ€™s Goal in adopting their new Rules on Cybersecurity Risk Management, Strategy,…
Explore More

Videos & Podcasts

Explore More

Events

June
16
2022

Webinar: Demystifying ZTA (Zero Trust…

What is Zero Trust Architecture? What are the Visions, Goals, Challenges, and Risks in achieving…
March
17
2022

Zero Trust Architecture Adoption

What is Zero Trust Architecture Adoption and What it is Not!
January
20
2022

Zero Trust Architecture Adoption in…

What is Zero Trust Architecture in Federal Government and What it is Not!
December
16
2021

Webinar: B2C Experiences Revolutionizing B2B…

Nearly 70% of business buyers say they expect an โ€œAmazon-likeโ€ buying experience from their business…
September
30
2021

Manufacturing Cybersecurity Webinar

What do Hackers see when they are targeting manufacturing companies and how they decide to…
September
23
2021

Webinar: Cloud Solutions and Dynamic…

Cloud solutions and web-based communications, collaboration and productivity platforms can dramatically enhance and support your…
Explore More