All Research

How to Show the Value of the Security Program

IT security is often thought of as a black hole by organization leaders unconvinced of its value. Learn how to demonstrate the value of the security program: combine...

Volume of Information: Streamline the Lifecycle of Information

​We all interact with information in our personal and professional lives, but the volume of information has grown to levels that are too much to handle. Explore a...

The State of Quantum-Resistant Cryptography

​With the threat of Q-Day fast approaching, organizations must decide when to move away from conventional algorithms and adopt quantum-resistant cryptography. In deciding...

Cyber Insurance

Insurers are responding to an increasingly hostile cybersecurity threat environment by insisting on restrictive contractual language. Organizations must assess their...

Partners Are More Important Than the Software

​Enterprise application implementations face significant obstacles to success. The right implementation partner is critical. Smooth the path to your implementation’s...

Combating Social Engineering Attacks

Social engineering is one of those tried-and-true attack vectors that seems to be at the core of many high-profile security breaches. Take these steps to ensure your...

Emphasize Response in Incident Response

​Many organizations rely on an outdated security incident management program or, worse, don’t even have one, relying instead on a reactive, case-by-case approach. Improve...

'Cylinders of Excellence' or 'Splendid Silos of Isolation'?

​IT is a team sport, and adversarial relationships between central and distributed IT are unproductive. Historically, organizations have vacillated between centralizing...

AI Mind Reading: It’s Not Coming … It’s Already Here

​Brain-machine interfaces and neuroprosthetics have been here for over a decade, but just this year AI mind reading became a technology trend, mostly due to Neuralink’s...

Can I Trust a Gen AI Chatbot With My Customers?

​Gen AI-enabled customer-facing chatbots can be a valuable tool, but their use comes with pitfalls for an unprepared organization. It’s imperative to keep a human in the...
Visit our Exponential IT Research Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us