In the fast-paced world of technology and security, John Patterson, the President of IKE …
cybersecurity standards
-
-
AI in CybersecurityAutomotive RetailFood Supply Chain Management
Volvo Employee SSNs Stolen in Supplier Ransomware Attack
by Priya Kapoorby Priya Kapoor 2 minutes readIn a concerning trend, three major international vehicle manufacturers have recently become victims of …
-
AI App DevelopmentChildren's Privacy ProtectionCustomer Data SecurityMobile Applications
Viral call-recording app Neon goes dark after exposing users’ phone numbers, call recordings, and transcripts
by David Chenby David Chen 2 minutes readIn the fast-paced world of mobile applications, security breaches can quickly turn a user …
-
AI in CybersecurityAI in Software Development
GitHub Mandates 2FA and Short-Lived Tokens to Strengthen npm Supply Chain Security
by Priya Kapoorby Priya Kapoor 2 minutes readIn a bid to fortify the security of the npm supply chain, GitHub made …
-
AI and Machine Learning in ComplianceAI in CybersecurityCybersecurity Risk ManagementData Governance in RetailInformation Technology
How CISOs Can Drive Effective AI Governance
by Jamal Richaqrds 2 minutes readIn the ever-evolving landscape of enterprise technology, the rise of artificial intelligence (AI) has …
-
AI in CybersecurityCorporate Data ProtectionHealthcare Technology
KillSec Ransomware Hits Brazilian Healthcare Software Provider
by Nia Walkerby Nia Walker 2 minutes readIn a recent cyberattack that sent shockwaves through the tech world, the notorious KillSec …
-
Cloud ServicesGovernment Technology Collaboration
UK Government Signs £400 Million Deal With Google Cloud, Here’s Why
by Samantha Rowland 3 minutes readThe recent announcement of the UK government signing a £400 million deal with Google …
-
AI Ethics and GovernanceAI in Software DevelopmentArtificial Intelligence
JFrog Upgrades AI Tooling, Governance To Speed up Software Delivery
by Priya Kapoorby Priya Kapoor 2 minutes readIn the ever-evolving landscape of software development, agility and efficiency are paramount. With JFrog’s …
-
Cybersecurity AwarenessData Privacy & ProtectionIoT SecurityRegulations and Compliance
How Has IoT Security Changed Over the Past 5 Years?
by David Chenby David Chen 2 minutes readIn the ever-evolving landscape of technology, the realm of Internet of Things (IoT) security …
-
Configuration ManagementIT and Software Development
Development of System Configuration Management: Handling Exclusive Configurations and Associated Templates
by Lila Hernandez 2 minutes readSeries Overview This article is Part 2.3 of a multi-part series: “Development of system …