eddaniel

27 Results / Page 1 of 3

Background
Shadow AI

todayAugust 1, 2025

close

FEATURED + Artificial Intelligence + CYBERSECURITY + EVOLVING THREAT LANDSCAPE Ervin Daniels

Shadow AI and the Donut of Defense: A Practical Guide to Securing AI Systems

As organizations accelerate their adoption of generative AI, they face increasing challenges in securing sensitive data, protecting model integrity, and managing the use of AI systems across the enterprise. The primary goal of using AI is to ensure it functions within clearly defined guardrails, ensuring proper governance, monitoring, and security. [...]
The Quantum Safe Roadmap

todayJuly 23, 2025

close

CYBERSECURITY + EVOLVING THREAT LANDSCAPE + Quantum Computing Ervin Daniels

The Quantum Safe Roadmap: How CISOs Can Get Ahead of “Harvest Now, Decrypt Later”

As the quantum computing era approaches, CISOs must prepare for one of the most disruptive shifts in cybersecurity. Quantum computing, while full of promise, also poses a major existential threat to today's cryptography. This is not science fiction; it's a race against time. One of the most pressing risks is [...]

todayJune 6, 2025

close

CYBERSECURITY + DATA PRIVACY & COMPLIANCE + BUSINESS CONTINUITY Ervin Daniels

Top 10 Ways to Keep Your Laptop Secure While Traveling

Why Laptop Security Requires Layers of Defense When you travel with a laptop, you're carrying more than a device. You're carrying sensitive files, personal information, and access to your digital life. That's why it's essential to consider multiple layers of protection. In cybersecurity, we refer to this as defense-in-depth a [...]
Cybersecurity Defense

todayMarch 18, 2025

close

CYBERSECURITY + EVOLVING THREAT LANDSCAPE + Artificial Intelligence Ervin Daniels

Shadow AI: The Unseen Security Risk Lurking in Your Organization

What is Shadow AI? Artificial Intelligence (AI) is transforming industries, but not all AI usage is under IT’s watchful eye. Shadow AI refers to the unauthorized use of AI tools and machine learning models within an organization. Like Shadow IT, which uses unapproved software and cloud services, Shadow AI introduces [...]

todayJanuary 15, 2025

  • 79
  • 1
close

EVOLVING THREAT LANDSCAPE + Quantum Computing Ervin Daniels

Navigating the Quantum Threat: A Guide for CISOs

Navigating the Quantum World Staying ahead of emerging cybersecurity challenges is essential to protecting your organization's data and maintaining trust. One of the most significant threats on the horizon is the rise of quantum computing. While quantum technology promises advancements in fields like healthcare and logistics, it also threatens to [...]

todayAugust 14, 2024

  • 133
  • 2
close

FEATURED + CISO Ervin Daniels

Top Cybersecurity Concerns for CISOs in 2024: Navigating the New Landscape

As the digital world continues evolving at an unprecedented pace, the responsibilities of a Chief Information Security Officer (CISO) have never been more critical—or challenging. In 2024, the cybersecurity landscape is marked by a range of emerging threats and complexities that demand the attention of every CISO. Here are the [...]

todaySeptember 13, 2023

  • 156
close

Artificial Intelligence Ervin Daniels

AI’s Impact on Cybersecurity

Businesses are adopting AI.  Artificial Intelligence (AI) is a groundbreaking technology with the potential to revolutionize businesses across all industries. 35% of companies use AI today, according to industry experts. The adoption rate will increase as organizations get familiar with the new paradigm. Among the most impactful applications of AI [...]

todayAugust 9, 2023

  • 73
close

CYBERSECURITY Ervin Daniels

How to Achieve a Robust Security Program 

It's not about if something bad happens to your business. It's the notion that a cyber attack will happen to your business. Business and Security leaders must focus more on risk mitigation than preventing cyber attacks. With the rise of cyber-attacks and data breaches, companies must be vigilant to protect [...]

©2020 Ervin Daniels. Designed By Tru Brand Media Disclaimer: Opinions expressed are solely my own and do not express the views or opinions of IBM.

error: Content is protected !!