Tag: Ask
-
5 Key Questions CISOs Must Ask Themselves About Their Cybersecurity Strategy
Events like the recent massive CDK ransomware attack – which shuttered car dealerships across the U.S. in late June 2024 – barely raise …
-
Everything You Wanted to Know About AI Security but Were Afraid to Ask
There’s been a great deal of AI hype recently, but that doesn’t mean the robots are here to replace us. This article sets the record …
-
31% of Organizations Using Generative AI Ask It To Write Code
Code development, content creation and analytics are the top generative AI use cases. However, many enterprise users don’t trust gen AI to …
-
#BHUSA: White House, DARPA and CISA Ask for Help in Securing Open Source Software
“When I worked on a report from the US Cyber Safety Review Board about the Log4j vulnerability, I was stunned to find out that the …
-
5 Questions to Ask When Evaluating a New Cybersecurity Technology
The cybersecurity technology field is, shall we politely say, crowded. I recently returned from attending RSA, one of the biggest …
-
BrandPost: Thinking of “hiring” an AI tool for your development needs? Ask these questions at the interview
Ever since ChatGPT was released in late 2022, the internet has been abuzz with equal parts doom and optimism. Love it or hate it, AI is …
-
Optimize Mac Storage can make your files go poof. Ask me how I know
It recently became clear to me that there is a serious architectural problem with how Apple manages files on the Mac with iCloud, and that …
-
BrandPost: Looking for a Warranty from an MDR Provider? Ask These Key Questions
Managed Detection and Response (MDR) helps ensure organizations are protected against advanced cyberattacks. That protection often comes …
-
Security Planning: Ask What Could Go Wrong
Are you asking the right questions about potential scenarios when thinking about disaster recovery and business …
-
After the Uber Breach: 3 Questions All CISOs Should Ask Themselves
How CISOs handle the ethical issues around data breaches can make or break their careers. Don’t wait until a breach happens to plot the …
●●●