By Javvad Malik2016-12-06T09:15:00
The Achilles’ heel of every cyber-security program is compliance. Javvad Malik offers some tips on how the right kind of training can fix that.
You are not logged in and do not have access to members-only content.
If you are already a registered user or a member, SIGN IN now.
2016-12-13T14:15:00Z By Simone Petrella
Nothing can sideline a merger or acquisition quite so well as dodgy cyber-security compliance. Simone Petrella discusses what every board should know in advance.
2026-02-02T12:32:00Z By Ashwathama Rajendran CW guest columnist
Generative AI (GenAI) has moved rapidly from experimentation into day-to-day use across many organizations. Over the past year, teams have shifted from exploratory pilots to relying on these tools for core activities such as contract analysis, research, and software development.
2026-01-16T20:32:00Z By Oscar Gonzalez
The U.S. Federal Trade Commission finalized its order against General Motors and its OnStar subsidiary over the improper usage of geolocation and driving behavior data of drivers.
Site powered by Webvision Cloud