Blogs

Home » Insights » Type of Content

Sep
17
2024

Security By Design- Part 13

The threats and risks our businesses face today are at the highest level of systemic…
Aug
16
2024

Security By Design- Part 12

A faulty CrowdStrike channel file 291 software update to their Falcon End Point Threat Data…
Jun
07
2024

Security By Design- Part 11

The U.S. Cybersecurity and Infrastructure Security Agency defines “Secure by Design” to mean that technology…
Apr
08
2024

Security By Design- Part 10

The Internet is the most complex of digital environments, representing the highest level of systemic…
Mar
14
2024

Security By Design- Part 9

The United States faces escalating threats posed by China, Russia, Iran, foreign cartels, sophisticated hackers,…
Jan
19
2024

Security By Design- Part 8

Do you and your business have the ability to anticipate, prepare for, and adapt to…
Dec
11
2023

Security By Design- Part 7

The DiRECTOR™ framework shows us eight key domains that enable complex digital systems.
Nov
23
2023

Security By Design- Part 6

In business, we have audit departments and others who assess risks, and we engage in…
Sep
29
2023

Security By Design- Part 5

Cyber Insecurity / Cybercrime triggered Business Interruption is the most feared of all Risks
Aug
18
2023

Security By Design- Part 4

What is the SEC’s Goal in adopting their new Rules on Cybersecurity Risk Management, Strategy,…
Jul
11
2023

Security By Design- Part 3

Understanding Risk to your Business today is that Digital and Information Technology Systems are the…
May
19
2023

Security By Design- Part 2

Business Risk is the possibility that an event will eventually lead to a reduction in…
Apr
24
2023

Security By Design

Cybersecurity today is one of the most reported and commented upon topics in business, management…
Aug
10
2022

What Is Gig Economy and…

A job assignment that will only last for a short period is called a "gig".…
Jul
08
2022

The Benefits of Salesforce Communities

The technologies that we use transform into a better alternatives continuously. One of these kinds…
Jun
27
2022

How To Deal with The…

It is very likely that being an American Corporate Professional, you must be well aware…
Sep
24
2021

Cyber Threats in your supply…

Risks associated with supply chain attacks have never been higher as new types of cyber…
Sep
10
2021

Data Privacy Programs

Data privacy is becoming a crucial area of focus for organizations of all sizes, and…
Aug
15
2021

Zero Trust – Securing Your…

Traditional security models have been challenged as millions across the world have transitioned to remote…
Aug
10
2021

Zero Trust as an Enterprise…

As organizations go through these changes, security concerns are paramount with cyber attacks on the…
Jul
23
2021

What Does AI Offer Users…

Artificial intelligence or AI, is a machine capability, which does not occur naturally, to solve…
Jul
15
2021

What Does AI Offer Humankind?

Artificial intelligence or AI, is a machine capability, which does not occur naturally, to solve…
Feb
11
2021

AI in Mainstream Enterprise Applications-…

Artificial intelligence or AI, is a machine capability, which does not occur naturally, to solve…
Jun
12
2020

Practicing Effective Cybersecurity

Cybersecurity can be a complex and overwhelming discipline. There is much written about every aspect…
Jun
12
2020

CCPA: Insights Into Applicability and…

The California Consumer Privacy Act (CCPA) is a new regulation on the horizon that organizations…
Apr
28
2020

Remote Tele-work & Cyber Safety

Managing Business Risk in the context of increased remote Tele-work