previous arrow
next arrow
Slider

Blog

By Erik Zouave

Could the same automated technologies cybersecurity professionals are increasingly using to protect their enterprises also fuel attacks against them? The research bears that out, according to a report my colleague Marc Bruce and I recently completed for the Swedish Defence Research Agency. The use of artificial intelligence (AI) tools to analyze

By Rahul Razdan

Recently, the US congress released a bipartisan draft of a new autonomous vehicle bill. A deeper analysis of the bill is available at “New AV Bill, Its Bipartisan, Is It Better ?” One of the most interesting aspects of the bill was its emphasis on cybersecurity. For most consumers, cybersecurity

By Paul Duvall

While most enterprises are moving workloads to the cloud, it remains less than 10% of overall IT spending. With the cloud, enterprises can deploy applications at scale and transform their business. Many cloud providers also provide robust security solutions that parallel this scale. However, many are limited by the lack

By Tera Garner

The space industry has experienced major changes in recent years: more federal contractors play the field, the U.S. is diverting NASA funds from space exploration to private-public partnerships, and the administration established the U.S. Space Force. Given these developments, 2020 sits poised to be a watershed year with rapid innovation

By Jason Revill

You don’t have to look far nowadays to find a company that’s suffered a data breach. Many of the world’s biggest and most prominent organizations have fallen victim – Yahoo, Uber, ebay, WhatsApp… the list goes on. It would be easy to assume these companies had let cybersecurity slide, but

Locations

Get a Quote

If you have questions or comments, please use this form to reach us, and you will receive a response within one business day. Your can also call us directly at any of our global offices.