In this episode, Chief Technology Evangelist Jeff DeVerter from Rackspace discusses how businesses can secure their data in the age of AI, aligning daily security tasks with broader business ...
The tension between data hunger and data hazards may be the defining challenge of the modern enterprise. The volume of data collected and stored by enterprises has exploded in the past few years. This ...
The NIST-800 security framework sets the tone of "never trust, always verify," emphasizing the concepts of least privilege and continuous monitoring. This becomes especially important and relevant in ...
The National Security Agency’s Artificial Intelligence, Security Center (AISC), together with the Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), ...
A practical overview of security architectures, threat models, and controls for protecting proprietary enterprise data in retrieval-augmented generation (RAG) systems.
The software arm of Capital One has expanded the availability of a tool that enables IT departments to improve their data security using data tokenisation. The business-to-business software division ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results