Cut the Complexity: How AI is Revolutionizing HR

Summary In a landscape where business growth is a priority, AI is becoming an essential tool in HR. A significant 76% of HR leaders believe that failing to adopt AI solutions, including generative AI, within the next 12 to 24 months could leave their organisations trailing behind competitors. However, merely adopting the technology isn’t enough; […]

Read More →

Building cybersecurity culture in science-driven organizations

In this insightful interview, Anne Sofie Roed Rasmussen, CISO at Novonesis, discusses how to foster a strong cybersecurity culture within science-driven organisations. The conversation covers the integration of cybersecurity with innovation, assessing cultural progress, managing shadow IT, and earning the trust of scientific leaders. Key Points Measuring cybersecurity culture progress through both qualitative and quantitative […]

Read More →

How Kim Crawley challenges big tech in “Digital Safety in a Dangerous World”

In this engaging interview with Help Net Security, Kim Crawley, a cybersecurity expert and Professor at the Open Institute of Technology, discusses her upcoming book, Digital Safety in a Dangerous World. The book promises vital expert advice and insights from various industry professionals on how individuals can safeguard their privacy in today’s increasingly perilous digital […]

Read More →

[ON-DEMAND] Maintaining Cyber Resilience with Network Visibility

In the face of evolving cybersecurity threats, this webinar touches on the importance of maintaining network visibility for state and local governments. As operations grow more complex with changing policies and budgetary demands, effective strategies are essential. The session offers insights from industry experts on how to enhance cyber resilience. Key Points Real-time network visibility […]

Read More →

European Union public vulnerability database enters beta phase

Summary The European Union has taken a significant step towards enhancing its cybersecurity capabilities with the launch of the beta version of the European Vulnerability Database (EUVD). Managed by the EU Agency for Cybersecurity (ENISA), this initiative aims to provide a centralised resource for collecting and sharing information regarding security vulnerabilities, especially pertinent given recent […]

Read More →

Intelligent Protection Management Corp. Reports First Quarter 2025 Financial Results Reflecting Transition to Managed Technology Solutions Provider Focused on Cybersecurity and Cloud Infrastructure

Intelligent Protection Management Corp. (IPM) has just revealed its financial results for the first quarter of 2025, reflecting a major shift towards becoming a provider of managed technology solutions in cybersecurity and cloud infrastructure. The company reported a significant revenue increase alongside strategic acquisitions and enhancements to its board to support its new direction. Source: […]

Read More →

Agentic AI: Driving HR Transformation

Summary Organisations are increasingly embracing AI agents to revolutionise their workflows and eliminate tedious manual tasks. This article details how HR leaders can harness these advanced technologies to amplify human creativity while automating processes. Agentic AI, an adaptive and autonomous system, enhances decision-making and enables HR teams to concentrate on strategic initiatives rather than administrative […]

Read More →

Scaling innovative companies at the intersection of cybersecurity, AI, and resilience

Paladin Capital Group’s Nazo Moosa recently chatted with Mike Butcher at StrictlyVC London about the exciting realm where cybersecurity, AI, and resilience meet. They dived into what it takes to scale innovative companies in this space and how intentional investments can shape a secure and sustainable future in the digital world. Source: TechCrunch Key Points […]

Read More →

What is penetration testing?

A penetration test, or pen test, simulates a cyber attack on a computer system, network, or application to uncover vulnerabilities in an organisation’s security posture. Conducted by ethical hackers, these tests are essential for assessing how well a company can defend against potential threats and maintaining compliance with industry regulations. Pen testing promotes proactive cybersecurity […]

Read More →