Marketplaces have become a feature of our economy. From apps for our phones and third-party sellers on e-commerce platforms to content producers on social media and education websites, marketplaces enable businesses to forgo building a digital sales channel and piggyback on established websites and apps. With the rise of large language models, customized models have…
Category: Feature Length
Important Considerations Before Using Biometrics For Authentication
While ordinary data breaches have become a staple of our lives. Yet, most of them involve data you can change. The same isn’t true for biometrics.
How AI Can Become A True Productivity Booster
From customer service to meeting management, AI has started to take over the busy work for us humans. However, the verdict on where it will lead us is still out there. Will it allow us to focus on essential things in work and life? Or will it be just another technology? A closer look at previous technological upheavals…
Clone Me: Data Ownership In The Age Of AI
AI has started to supercharge scams, and with the data we share on social media, it is becoming far too easy for attackers to take control of our identities.
How Boards Can Step Up Their Cybersecurity Oversight
Learn more about the steps that Management and Boards can take to counter privacy and cybersecurity threats around the globe.
Opening Up To Open Source: Why AI Needs To Become A Community Affair
From Mentoring to medical diagnostics, AI has many applications. Yet, in many cases, the general models available today must be tweaked and adapted to fit the purpose. After all, giving affirmations and detecting cybersecurity threats are very different ideas. Yet, the same open-source basis can be used for many scenarios. Being able to own the…
Top Table: Why Companies Need to Elevate the Role of Their CIO and CISO
In many organizations CIO and CISO play in the second line. There are at least five reasons why they belong at the top table.
Passkey Is A Game-Changer—If Three Cybersecurity Problems Are Solved
Human psychology and memory are insufficient to generate and remember good passwords. Will passkeys really be a game-changer? Find Out!
Emotional Rescue: Using Human Nature to Enhance Cybersecurity
Verizon’s Data Breach Investigation Report shows, every year, almost all successful attacks comprise some form of a human component
‘Someone Will Take Care Of IT’: How To Make IT An Integral Part Of Your Organization
Few things invoke a stronger feeling of helplessness than being reliant on someone else and not getting the results needed. Join me for three actions in IT.