Latest Posts › Cyber Attacks

Share:

How to Hire a CISO as Scrutiny Intensifies

The role of the chief information security officer (CISO) in 2024  is evolving. With budgetary limitations, an increasingly complex threat environment, generative artificial intelligence (AI) tools, new regulatory mandates, a...more

Deepfakes and the Use of AI in Cyberattacks

The headlines about a $25 million wire transfer fraud employing deepfake technology have rightfully given chief financial officers and finance departments considerable pause. The attack began with a phishing email delivered...more

2 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide