Utilizing AI to defend the Black Hat NOC

This year’s Black Hat USA conference saw more than 907M threat events detected in real time, according to data collected by Palo Alto Networks. This is a staggering number that shows just how attractive the event is to threat actors – and artificial intelligence (AI) was a key driver in protecting against these attempts. With…

Exploring the pros and cons of cloud-based large language models

The paradigm shift towards the cloud has dominated the technology landscape, providing organizations with stronger connectivity, efficiency, and scalability. As a result of ongoing cloud adoption, developers face increased pressures to rapidly create and deploy applications in support of their organization’s cloud transformation goals. Cloud applications, in essence, have become organizations’ crown jewels and developers…

Unveiling the risks of OT systems and how to secure them

When we consider what security means for an organization, most think of needing to secure systems and devices like cloud computing instances, servers, employee workstations, and other tech commonly seen in the workplace. While these are certainly important, there are many other devices requiring protection that are hiding in plain sight. Operational technology (OT) is…

7 sins of digital transformation

As CIOs prepare for the next wave of digital transformation, they must demonstrate shorter-term business impacts from technology investments and achieve larger innovation goals that evolve the organization’s business model. But perhaps more importantly, they must learn from their previous big digital wins — and avoid repeating all-too-frequent mistakes that cause transformations to fail or…