From the Summer 2025 Issue

AI’s Risks and Rewards for Cybersecurity: Navigating Its Future

Author(s):

Andrew Hodges, Quorum Cyber, Solutions Director

AI's Risks and Rewards

Artificial Intelligence (AI) is no longer a theoretical future—it’s an operational reality reshaping both the threats organizations face and the tools they use to defend against them. From AI-enhanced phishing to autonomous threat detection and response, AI is rapidly changing the rules of cybersecurity. While the benefits are compelling, so are the risks. Cyber attackers … Read more

From the Summer 2025 Issue

Diverging threads or unified security? Navigating the Landscape of AI Agent Communication Protocols

Author(s):

Alex Haynes, CISO , IBS Software

Diverging threads or unified security

As a security researcher, the burgeoning field of AI agent-to-agent communication protocols is as interesting as it is concerning. On one hand, the prospect of autonomous AI entities collaborating seamlessly to solve complex problems is fascinating. On the other hand, the current fragmented landscape of proposed protocols, each with its own security nuances and architectural … Read more

From the Summer 2025 Issue

AI-Driven SDLC: Reducing Human Error, Stopping Ransomware

Author(s):

Pratik Kamble, SEO Specialist, Boston Institute of Analytics

AI-Driven SDLC

Ransomware attacks have increasingly become a threat in the field of cybersecurity and are very often caused by human errors in the development and deployment of software. Vulnerabilities such as insecure code, unpatched systems, or misconfigurations give ransomware a foothold in entering systems. It is proven that even with advanced security tools in place, human … Read more

From the Summer 2025 Issue

AI’s Impact on SAP Systems: The Pros and Cons for Enterprise Cybersecurity

Author(s):

Christoph Nagy, CEO, SecurityBridge

Artificial Intelligence (AI) is no longer the purview of science fiction. From Metropolis to The Matrix, we’ve been introduced to computer intelligence with above-human smarts and strength, benefits, and dangers. “Open the pod doors, Hal.” Now, AI is not fiction; it’s all too real. And with it have come its incredible abilities to learn, reason, … Read more

From the Spring 2025 Issue

The Ever-Expanding Attack Surface: Urgent Need for Proactive Cybersecurity Strategies

Author(s):

Gaurav Sharma, Director of Operations, Chetu

The Ever-Expanding Attack Surface

The more doors and windows, the more opportunities a burglar has to break into your house. It is no different in the cyber realm, where hackers now have countless more entry points because of the digital transformation sweeping across businesses and industries. One of the primary drivers of the growing attack surface is the Internet … Read more

From the Spring 2025 Issue

Data Sovereignty: My House, My Rules – Maybe?

Author(s):

Justin Petitt, Director, Cybersecurity Center of Excellence, Edgewater Federal Solutions

Data Sovereignty

Data Sovereignty refers to the concept that data is subject to the laws and governance structures of the country in which said data is collected or stored, along with the policies of the organization holding or providing the data. With the increasing presence and utility of Artificial Intelligence, Large Language Models, and especially Cloud Computing, … Read more

From the Spring 2025 Issue

Human Rights and Their Controversy in the New International Convention Against Cybercrime

Author(s):

Claudia Da Costa Bonard de Carvalho, , CCBC Criminal Compliance Business School

Human Rights and Their Controversy in the New International Convention against Cyber Crime

Recently, the UN in New York approved the draft of a new treaty on cybercrimes, known as the Convention against the Use of New Technologies for Criminal Purposes[1]. This convention regulates issues from the previous Budapest Convention, now focusing on detailing international cooperation in combating cybercrime. The text of the proposal is fundamentally based on … Read more

From the Fall 2024 Issue

Guide For Implementing Robust SAP Security

Author(s):

Christoph Nagy, CEO, SecurityBridge

Guide for Implementing Robust SAP Security

Cybersecurity has become one of the chief concerns for organizations worldwide. Enterprise systems, now ubiquitous in business, call for robust security measures. SAP, the preferred enterprise system, plays a significant role in business operations. With 99 of the 100 largest companies in the world being SAP customers, hackers have focussed on this enterprise platform juggernaut. … Read more

From the Fall 2024 Issue

Your Guide to SAP Security: Its Importance and Best Practices

Author(s):

Christoph Nagy, CEO, SecurityBridge

A Guide to SAP Security

In today’s digital age, cybersecurity has become a paramount concern for organizations across the globe. Among the various enterprise systems that require robust security measures, SAP (Systems, Applications, and Products in Data Processing) stands out due to its critical role in business operations, with 99 of the 100 largest companies in the world being SAP business applications … Read more

From the Fall 2024 Issue

Strategic Integration of Cybersecurity in Digital Transformation: Ensuring Resilience and Growth

Author(s):

Dr. Michael C. Redmond, PhD, Founder and CEO, Redmond Worldwide

Digital Tranformation

The Risk of Implementing Digital Transformation Without Cyber Security Considerations Is High In an era where digital transformation is pivotal for organizational growth and efficiency, neglecting cybersecurity can pose significant threats. As businesses increasingly integrate digital technologies into their operations, the potential for vulnerabilities multiplies. Without a robust cybersecurity framework, these vulnerabilities can be easily … Read more