Latest Articles

The Proactive CISO’s Playbook: How to close the Exposure Gap and Manage Cyber Risk with Confidence

Trend Micro’s “The Proactive CISO’s Playbook” guides CISOs in shifting from reactive security to strategic leadership. It emphasizes incident readiness, cross-functional collaboration, and continuous improvement. By adopting a proactive, assume-breach mindset, CISOs can build resilient organizations, foster transparency, and drive board-level engagement in cybersecurity.

Read →

The 2024 Attack Intelligence Report

This report presents data and insights that security practitioners can use to better understand and guard against some of the most significant attacks and TTPs occurring in today’s cyber threat landscape. By examining recent notable vulnerabilities and high-impact attacks, the experts of Rapid7 Labs identify trends and add valuable context so you can command your […]

Read →

Semantic search excellence: Getting started with AI

Overview This is part one of a two-part series on the journey to semantic search and generative AI excellence. Join us as we guide you through the spectrum of search methodologies, the steps to building search that understands the meaning of a query, and the choices and options along this path. We’ll start with foundational […]

Read →

The Winning Formula for Loyalty Programs: Balancing Customer Experience, Security, and Privacy

Winning loyalty programs ensure that only legitimate customers are able to access their loyalty accounts and that those accounts are easily accessible and reflect their preferences and behaviors. This is not easy when customer Identity is fragmented across technology. Identity fragmentation impacts an organization’s ability to effectively track, analyze and secure customer data. Watch this […]

Read →

Beyond Login: Maximizing CIAM’s Security Capabilities

Discover how Customer Identity and Access Management (CIAM) can enhance your security. Learn to battle bots, fake signups, and stolen credentials while streamlining authentication and authorization. Key Takeaways:• The importance of CIAM for securing customer data.• Identifying and mitigating identity threats.• Using phishing-resistant methods like passkeys.• Benefits of an adaptable CIAM solution. Speakers:Linda Gong, Product […]

Read →

Unraveling the “Why”: Strategies to Address Chronic Absenteeism

The impact of chronic absenteeism on student learning and academic achievement has been a growing concern across the nation. Even as schools have adapted to the challenges posed by the pandemic, student absenteeism remains persistently high, well above pre-pandemic levels. The reasons behind this concerning trend are multifaceted and require a deeper understanding to implement […]

Read →

Enhancing School-Home Communication for a Successful Year Ahead

In this webinar, we have Kari Murphy, Chief Technology Officer for Deer Park ISD talk us through steps they have taken to enhance communication between educators, staff, and families. She also shares strategies that have helped Deer Park ISD create a robust communication plan. Watch the webinar for tips to help you set up your […]

Read →

IMAGINE ALICE: A CONNECTED HEALTHCARE STORY

Imagine Alice. Alice is an everyday patient whose day to day life is made better by technology-enabled healthcare—like systems that connect her caregivers so they can deliver care in a more Alice-centric, Alice participative way. Now turn that imagination into reality. Watch this insightful webinar, discussing how a unified identity management strategy can power connected […]

Read →
25,000+
Articles
500K+
Monthly Readers
300+
Sponsors
15+
Years of Insights