Blog

32 Results / Page 1 of 8

Background

todayAugust 6, 2025

close

CYBERSECURITY + Leadership & Cyber Workforce Ervin Daniels

Hiring for Impact: How I Strategically Closed Skills Gaps in Technical Sales

Building the Right Team with Intention When I stepped into the role of Technical Sales Manager, I quickly realized that success wasn't just about hitting our delivery numbers. It was also about having the right people in the right places. We had apparent technical skills gaps across several sales territories, [...]
Shadow AI

todayAugust 1, 2025

close

CYBERSECURITY + EVOLVING THREAT LANDSCAPE + FEATURED + Artificial Intelligence Ervin Daniels

Shadow AI and the Donut of Defense: A Practical Guide to Securing AI Systems

As organizations accelerate their adoption of generative AI, they face increasing challenges in securing sensitive data, protecting model integrity, and managing the use of AI systems across the enterprise. The primary goal of using AI is to ensure it functions within clearly defined guardrails, ensuring proper governance, monitoring, and security. [...]
The Quantum Safe Roadmap

todayJuly 23, 2025

close

Quantum Computing + CYBERSECURITY + EVOLVING THREAT LANDSCAPE Ervin Daniels

The Quantum Safe Roadmap: How CISOs Can Get Ahead of “Harvest Now, Decrypt Later”

As the quantum computing era approaches, CISOs must prepare for one of the most disruptive shifts in cybersecurity. Quantum computing, while full of promise, also poses a major existential threat to today's cryptography. This is not science fiction; it's a race against time. One of the most pressing risks is [...]

todayJune 6, 2025

close

CYBERSECURITY + DATA PRIVACY & COMPLIANCE + BUSINESS CONTINUITY Ervin Daniels

Top 10 Ways to Keep Your Laptop Secure While Traveling

Why Laptop Security Requires Layers of Defense When you travel with a laptop, you're carrying more than a device. You're carrying sensitive files, personal information, and access to your digital life. That's why it's essential to consider multiple layers of protection. In cybersecurity, we refer to this as defense-in-depth a [...]

©2020 Ervin Daniels. Designed By Tru Brand Media Disclaimer: Opinions expressed are solely my own and do not express the views or opinions of IBM.

error: Content is protected !!