Smart Contracts Part 1: What is a Smart Contract?

In recent years, there’s been considerable talk of blockchain and its use cases in the business world. While some of these topics have specific use cases – metaverse, decentralized finance, etc – there...

Metrics’ Role in Cyber Transformation

We’ve all heard the saying, “what gets measured gets done,” meaning that regular measurement and reporting helps to keep organizations focused on the information that matters. But with so many data points...

Creating a Resilient Cybersecurity Strategy, Part 3: Role of the Board

This is the last of a three-part series about developing a cybersecurity governance lifecycle that provides coverage, balance, effectiveness, efficiency and assurance. This series explores cybersecurity...

Cybersecurity Risk Assessments vs. Gap Assessments: Why Both Matter

As cybersecurity incidents continue to make headlines, whether involving the breach of sensitive information or the halting of an enterprise’s operations, cybersecurity risks remain top of mind for many...

A House Divided: Key Differences in Cybersecurity Implementation for IT and OT

Anyone who has spent a significant amount of time in any U.S. state where college football is popular, has likely seen a “house divided” bumper sticker or license plate cover, with contrasting university logos...

TECHNOLOGY INSIGHTS

Perspectives from Our Experts on Technology Trends and Risks.