During the team discussion about next-gen tools and techniques for prevention, detection, and recovery from cyberattacks, we started looking at some of…
In Part I of the article we will discuss the challenges facing AI Governance. It’s not a surprise that every new cyber…
In Part-I we discussed advantages, security, and compliance consideration, challenges, and governance aspects of AI. In part-II we focused on AI policies….
We hope you got a chance to read four blogs on Artificial Intelligence (AI). The blogs covered security and compliance considerations, challenges,…
A data breach is a security incident which leads to the accidental or unlawful destruction, loss, alteration, unauthorized disclosure of, or access…
Internet of Things (IoT) devices with high definition technology allow them to interact with the internet and can be managed remotely. These…
Information Security Forum (ISF), a nonprofit association that researches and analyzes security and risk management issues has noted that many CISOs are…
Information Security Forum (ISF), a nonprofit association that researches and analyzes security and risk management issues has noted that many CISOs are…
The SecuRetain team recently completed a 6-part series to guide organizations with leveraging GDPR preparation for CCPA. The Malware/Ransomware 4-part series is…