While ordinary data breaches have become a staple of our lives. Yet, most of them involve data you can change. The same isn’t true for biometrics.
Category: Feature Length
How AI Can Become A True Productivity Booster
From customer service to meeting management, AI has started to take over the busy work for us humans. However, the verdict on where it will lead us is still out there. Will it allow us to focus on essential things in work and life? Or will it be just another technology? A closer look at previous technological upheavals…
Clone Me: Data Ownership In The Age Of AI
AI has started to supercharge scams, and with the data we share on social media, it is becoming far too easy for attackers to take control of our identities.
How Boards Can Step Up Their Cybersecurity Oversight
Learn more about the steps that Management and Boards can take to counter privacy and cybersecurity threats around the globe.
Opening Up To Open Source: Why AI Needs To Become A Community Affair
From Mentoring to medical diagnostics, AI has many applications. Yet, in many cases, the general models available today must be tweaked and adapted to fit the purpose. After all, giving affirmations and detecting cybersecurity threats are very different ideas. Yet, the same open-source basis can be used for many scenarios. Being able to own the…
Top Table: Why Companies Need to Elevate the Role of Their CIO and CISO
In many organizations CIO and CISO play in the second line. There are at least five reasons why they belong at the top table.
Passkey Is A Game-Changer—If Three Cybersecurity Problems Are Solved
Human psychology and memory are insufficient to generate and remember good passwords. Will passkeys really be a game-changer? Find Out!
Emotional Rescue: Using Human Nature to Enhance Cybersecurity
Verizon’s Data Breach Investigation Report shows, every year, almost all successful attacks comprise some form of a human component
‘Someone Will Take Care Of IT’: How To Make IT An Integral Part Of Your Organization
Few things invoke a stronger feeling of helplessness than being reliant on someone else and not getting the results needed. Join me for three actions in IT.
How Companies Can Ace Cybersecurity Training
What does it take to make better cybersecurity training? How can emotional intelligence and gamification stop people from falling for scams?