Blog

35 Results / Page 2 of 9

Background
Shadow AI

todayAugust 1, 2025

close

CYBERSECURITY + EVOLVING THREAT LANDSCAPE + FEATURED + Artificial Intelligence Ervin Daniels

Shadow AI and the Donut of Defense: A Practical Guide to Securing AI Systems

As organizations accelerate their adoption of generative AI, they face increasing challenges in securing sensitive data, protecting model integrity, and managing the use of AI systems across the enterprise. The primary goal of using AI is to ensure it functions within clearly defined guardrails, ensuring proper governance, monitoring, and security. [...]
The Quantum Safe Roadmap

todayJuly 23, 2025

close

Quantum Computing + CYBERSECURITY + EVOLVING THREAT LANDSCAPE Ervin Daniels

The Quantum Safe Roadmap: How CISOs Can Get Ahead of “Harvest Now, Decrypt Later”

As the quantum computing era approaches, CISOs must prepare for one of the most disruptive shifts in cybersecurity. Quantum computing, while full of promise, also poses a major existential threat to today's cryptography. This is not science fiction; it's a race against time. One of the most pressing risks is [...]

todayJune 6, 2025

close

CYBERSECURITY + DATA PRIVACY & COMPLIANCE + BUSINESS CONTINUITY Ervin Daniels

Top 10 Ways to Keep Your Laptop Secure While Traveling

Why Laptop Security Requires Layers of Defense When you travel with a laptop, you're carrying more than a device. You're carrying sensitive files, personal information, and access to your digital life. That's why it's essential to consider multiple layers of protection. In cybersecurity, we refer to this as defense-in-depth a [...]
Cybersecurity Defense

todayMarch 18, 2025

close

CYBERSECURITY + EVOLVING THREAT LANDSCAPE + Artificial Intelligence Ervin Daniels

Shadow AI: The Unseen Security Risk Lurking in Your Organization

What is Shadow AI? Artificial Intelligence (AI) is transforming industries, but not all AI usage is under IT’s watchful eye. Shadow AI refers to the unauthorized use of AI tools and machine learning models within an organization. Like Shadow IT, which uses unapproved software and cloud services, Shadow AI introduces [...]

©2026 Ervin Daniels. Designed By Tru Brand Media Disclaimer: Opinions expressed are solely my own and do not express the views or opinions of IBM.

error: Content is protected !!