Cyberattacks Use Office 365 to Target Supply Chain

Malicious actors have a history of trying to compromise users’ Office 365 accounts. By doing so, they can tunnel into a network and use their access to steal sensitive information. But they need not stop there. They can also single out other entities with which the target does business for…

Read More

Quantum Security and AI: Building a Future Together

Quantum computing is still cutting-edge, but that doesn’t mean it can’t be improved. What is quantum computing? Is it the same as quantum cryptography, a central tenet of so-called quantum security? And where does artificial intelligence (AI) fit in? What Is Quantum Security?  Often when you hear about quantum computing…

Read More

Young People Are the Key to Decreasing the Skills Gap

It’s time to look at the industry skills gap differently. More and more digital native young people could potentially be coming into the industry with the right skills, but several elements block their progress. Professionals already in place need to smooth the road for them. That might involve changing some…

Read More