Hudson River Trading is enhancing its trading models by leveraging Google Cloud’s scalable infrastructure and advanced AI capabilities, including Dynamic Workload Scheduling and Spot VMs, to boost efficiency and innovation in quantitative trading.
Risk Management
Cloud-native software introduces a new range of considerations — from licensing to software developer’s financials to data ownership — for procurement chiefs to consider.
Veriato leverages GenAI and predictive security tools to enhance insider threat detection, productivity monitoring, and compliance, dynamically updating risk profiles to proactively safeguard organizations.
Hyperscaler joins forces with large India-based telecom firm to develop new AI-driven products and features for the latter’s massive customer base.
Drones have the opportunity to improve supply chain processes, including delivery, risk management, and inventory management.
A federal watchdog group’s dareport exposes major flaws in Microsoft’s cloud cybersecurity, demanding urgent action from CEO Satya Nadella to address widespread shortcomings and restore customer trust amidst escalating cyber threats.
The addition of generative capabilities to AI set the stage for a transformative shift to autonomous agents in manufacturing, posing ethical considerations and requiring thoughtful strategic planning.
An exploration of the NSA’s software supply chain security guidance and how it can help organizations fortify overall cybersecurity.
It’s been a year of major new tech developments, from ChatGPT to Apple’s Vision Pro. Use this 10-point framework to evaluate new tech for your business.
Establishing a strong working relationship between the CISO and the CIO is crucial for the overall success and security of a company, writes Kenny Mullican.
A discussion on the evolving role of the CFO in the era of AI and technology, emphasizing the shift from scorekeeping to value creation and the importance of understanding customer experience and intangible assets.
The chief data officer (CDO) and chief information security officer (CISO) should agree on encryption, role-based access, zero trust security, and data retention for effective business decisions and risk mitigation.
COVID–driven supply chain disruption has been reduced, but a host of other bad actors have taken its place. Here’s how practitioners can stay a step ahead.
Trend Micro is integrating AI into its cybersecurity platform to empower organizations with enhanced capabilities.
Microsoft and Accenture’s Project Amplify social impact initiative offers a wealth of insights for companies looking to enhance their partners ecosystem to make a difference in the world.
The speed of AI innovation is outpacing companies’ ability to understand, let alone manage, the risk. This is where leaders can take control.
Employment identity theft is a growing concern for individuals and businesses. Learn how to protect yourself and your organization from becoming a victim.
Snyk provides developer-focused security for companies across every sector, enabling ongoing security improvements including reduced risk exposure.
The cybersecurity innovator Snyk caters to developers, ensuring that their code is secure as it’s written, and that their open-source software is monitored continuously.
From a security perspective, AI can be used against itself within the realm of behavioral analytics and malware detection.