cybersecurity

Can the U.S. and Europe Agree on Rules for AI?

As EU and U.S. leaders meet in Washington at a joint Trade and Technology Council, there is great need for a proposed “transatlantic accord on artificial intelligence.” But the two sides have differing agendas, and...

Nonprofits Need Open Source Software

Software really matters. What exactly an organization uses can be critical in meeting mission goals. The wrong choice can impede the work of a team and their programs.

The Greening of Crypto: Proof of Stake and Beyond

Crypto is feeling intense pain right now. But the ecosystem must address a thorny problem as it comes of age: energy consumption.

Cybersecurity and Trust: Lessons From the Masters

The security challenge has become more urgent during the pandemic, and vigilant companies are adopting new approaches in response. Trust is key.

How Technology Makes War More Terrifying

Russia's Ukraine invasion is the first major physical war between developed countries in the connected age. As the tragedy continues to unfold, we're likely to see it manifest in the digital systems that surround us. 

How the New Approach to Cybersecurity Can Create Trust

Watch the recap of our session with a top cybersecurity practitioner, a chief trust officer, and a leader of the new era of security automation discuss practical approaches to automation in light of cybersecurity threats.

What IT Leaders Learned–and Gained–In the Pandemic: BMC’s CEO Executive Council

BMC hosts a regular “Executive Council” with senior executives of a small number of clients. A recent virtual discussion honed in on lessons learned from the pandemic and where things head from here.

Disinformation and Data Attacks Will Get Worse

Disinformation tactics are getting more and more sophisticated. These are cross-platform, multi-industry threats, and the solutions will be cross-platform and collaborative.

Cybersecurity: A Critical Check in M&A

Cybersecurity due diligence in the M&A deal process should move from being a priority for only technical and information security teams — and an irritating afterthought to corporate development teams — to a high priority...

1 2 3 7