Our Blog

AI Vishing: What It Is and How to Protect Yourself

AI Vishing: What It Is and How to Protect Yourself

As I discussed in an earlier blog post, AI technologies show promise for improving productivity, but they can also be utilized by bad actors. A frequently-cited example is the story of a couple who were scammed by a criminal using voice-cloning...

Manual versus Automated Penetration Testing

Manual versus Automated Penetration Testing

In the ever-evolving landscape of cybersecurity, security-minded organizations look for the most effective methods to protect their systems and data from cyberthreats. Penetration testing, meaning an authorized, simulated penetration of a computer...

Introduction to AI and Potential Security Concerns

Introduction to AI and Potential Security Concerns

The rapid rise of powerful, breakthrough AI technologies like ChatGPT has generated a lot of excitement in the IT world, but also concerns about threats to security and privacy. Some tech leaders have even publicly voiced concern that AI poses a...

What you need to know about AI Compliance

What you need to know about AI Compliance

Download eBook: Preparing for AI Compliance AI technologies are being deployed by organizations at one of the fastest rates we’ve ever seen, and in response, regulatory and standards bodies are working to implement new compliance obligations that...

How to Protect Your Business from Ransomware

How to Protect Your Business from Ransomware

Ransomware can severely impact your business if you are not prepared. In recent months, a ransomware attack forced a group of 30 hospitals to divert patients from emergency rooms to other hospitals, while another forced a large financial...

Get In Touch Today