Latest Advisory
VENDORiQ: Unlocking Hyper-Personalisation – Adobe’s AI-Driven CXO Evolution
Adobe’s latest AI innovations, including GenStudio and LLM Optimizer, are enabling businesses to hyper-personalise customer experiences and boost visibility in AI-driven interactions.
VENDORiQ: Unlocking Hyper-Personalisation – Adobe’s AI-Driven CXO Evolution
Adobe’s latest AI innovations, including GenStudio and LLM Optimizer, are enabling businesses to hyper-personalise customer experiences and boost visibility in AI-driven interactions.
Generative AI for Enterprise Use – An Overview of the State-of-the-Art
With more vendors such as Microsoft, Amazon Web Services (AWS), Google, and SalesForce embedding AI technology into their products for enterprise use, organisations will soon have more tools with AI capabilities. However, more solutions do not always mean producing meaningful outcomes, since most of these products will still fall short of expectations due to the current limitations of language models, and some types of work that still cannot be easily replicated by AI.
Can Automated Penetration Testing Replace the Human?
Are human penetration testers still necessary if the task can be automated?
IBRSiQ: Cyber Response Communications
An IBRSiQ on cyber response communications and cyber breaches. Discover the areas or problems that IBRS can assist you with.
Corruption Prevention – ICT’s Critical Role in the Organisation
The ICTs function is susceptible to corruption risks because of its many responsibilities and touchpoints, but there is an upside – this very exposure means that ICT is uniquely placed to help defend the organisation. But the onus is on the CIO and senior ICT executives to act.
Every Breath You Take: The Impact of AI on Privacy
As AI continues to evolve, data privacy and security threats can pose critical concerns in workplace technology. How can enterprises use AI as a tool to secure privacy and ensure regulatory compliance and data protection?
Wicked Game: How to Secure Senior Executives’ Cyber Security Buy-In
No cyber security program can be successful if the executive buy-in is not secured during its initial planning stages. However, many organisations still lack top management that believes in a strong security culture – or invest the time and resources needed to establish and maintain one. What factors contribute to their shortsightedness, and what strategies can CISOs use to convince them otherwise?