Optimizing Cloud Security: Managing Sprawl, Technical Debt, and Right-Sizing Challenges

By Peter Turpin As organizations continue to embrace digital transformation through the rapid adoption of cloud services, they can face significant security challenges stemming from cloud sprawl, technical debt, and improper right-sizing of IT resource…

Risk Matters: Cyber Risk and AI – The Changing Landscape

By Lawrence A. Gordon, PhD In today’s world of interconnected computer-based information systems, cyber risk has become one of the critical risk factors impacting organizations. Indeed, several studies have shown that cyber risk (i.e., the […]

Zero Trust in Practice: How to Minimize Your Attack Surface and Strengthen Cybersecurity

By Laurence Dale As cyber threats grow more complex, traditional perimeter-based security is no longer enough and more organisations are turning to a Zero Trust approach. Businesses now face a range of challenges like remote […]

Vigilance, Resilience, Flexibility Are Considered Keys to Countering Evolving Cyber Threats

Various emerging technologies (from cloud and edge computing and applied AI to virtual reality and blockchain) increasingly complicate cyber risk management. And intensifying this dynamic are “risk entanglement,” the “interconnectedness (‘not Internet’…

Turning Vulnerability to Cyber Threats into Industrial Grade Resiliency in the Manufacturing Industry

By Reidar Boldevin, Consulting Manager – Security at Columbus Abstract Manufacturing has been the most cyberattacked industry for three consecutive years. The interconnectedness of operational technology (OT) and informational technology (IT) networks,…

Digital Monitoring is No Substitute for Engaged Management for Remote Work Success

By Christine Clark A new study from the University of California San Diego and the Massachusetts Institute of Technology has examined digital worker surveillance—specifically, the use of software to monitor remote workers’ activities—and tests how [……

2025 AI Insights: Threat Detection and Response

By Andrew Grealy, Head of Armis Labs, and Michael Freeman, Head of Threat Intelligence In 2024, advancements in artificial intelligence (AI) have led to increasingly sophisticated threat actor exploits, such as deepfake technology used in […]