Blogs in the Spotlight Seven levers to reduce your IT costs while future-proofing your business Optimize IT: Leverage AI, cloud and automation for cost-effective, future-ready enterprise solutions Read more How manufacturers can stay productive and secure in the new threat landscape NIS 2 helps manufacturers gain better visibility into their suppliers' security posture to identify and mitigate supply chain vulnerabilities. Read more Beyond the hype: The top 7 cybersecurity risks in GenAI and how to mitigate these GenAI can be misused and requires caution and responsible use. Today, only 38% of organizations actively address cybersecurity risks associated with LLMs. Read more Latest blog posts Select a topic Automation Cloud Critical communications CSR Cybersecurity Data & AI Digital transformation Environment Ethics & Digital Society IoT & Edge Quantum computing & HPC Select an industry Aerospace Defense Energy & Utilities Financial Services & Insurance Healthcare & Life Sciences Manufacturing Media Public Sector Retail Telecommunications Transport & Logistics Sep 20 2024 Airport cybersecurity: Threats, strategies, and a midnight conundrum A story to set the stage for the discussion on the critical cybersecurity challenges and the necessary measures to safeguard our airports. Sep 19 2024 The CISO’s journey: Mastering the elephant in the room for a resilient IT, IoT, and OT cybersecurity strategy It is only when you build a good foundation for your roadmap that you will save yourself time, money, efforts, and gain trust for further cybersecurity investments in your organization. Sep 19 2024 Safeguarding the Railway: Fighting Cybercrime and Coming Out Full Steam Ahead Cybersecurity in railways is not just about technology; it is about creating a culture of vigilance and resilience. Here’s why. Sep 3 2024 Conquer DORA compliance: Challenges and strategies for the Digital Operational Resilience Act Master DORA compliance by understanding key challenges, implementing risk frameworks and enhancing resilience. Aug 16 2024 Shielding the retail, transport and logistics ecosystem with GenAI security This blog explores trends, common pitfalls, and opportunities in cybersecurity within this sector to help you protect your RLT business along your digital transformation journey. Aug 12 2024 Accelerate cloud adoption with Google’s Security and Resilience Framework Google has moved from a shared responsibility model to the shared-fate model for managing risks in what Google calls Trusted Cloud, differentiating itself from other cloud competitors. Jul 11 2024 How manufacturers can stay productive and secure in the new threat landscape NIS 2 helps manufacturers gain better visibility into their suppliers' security posture to identify and mitigate supply chain vulnerabilities. Jun 27 2024 Navigating the future of cybersecurity with CSMA and AI Most organizations lack the expertise and resources needed to effectively adopt CSMA and AI, not to mention the cost associated with this adoption. Here’s where we were able to change the conversation and demonstrate why Eviden is an industry leader. Jun 25 2024 Money 20/20 through the eyes of a cybersecurity expert: Key observations and recommendations AI catalyzed FSI transformation and security at this month’s Money 20/20 Europe event. Get key takeaways from our security experts. Prev1/3Next