How is the PR industry adapting to the march of artificial intelligence?

… opportunities and threats posed by artificial intelligence (AI), I have asked what … Relations (CIPR). “The conversation about artificial intelligence in public relations is polarised … of machine learning and therefore artificial intelligence,” Waddington continues. “Instead they’re … VISIT THE SOURCE ARTICLE How is…

Breaching critical systems a simple task for today’s hackers

… the threat posed by hackers, cybercriminals and cyberterrorists. Government … asked over a hundred hackers, penetration testers and … reiterate. If a determined attacker decides they want  … our respondents felt about attacking the government compared with, … VISIT THE SOURCE ARTICLE Breaching critical…

Momentum in north London: How soaring membership of grassroots group has affected local Labour politics

… the local party because grassroots activists are already there.” Asked … was elected secretary for Hackney South Labour. But, shortly … member, who asked to remain anonymous, told the Gazette the … the Co-op, trade unions, and groups like Progress. “All these … VISIT…

As U.S. indicts foreign hackers, American cyber spies fear arrests in tit-for-tat action

… asked to remain anonymous, said most indictments of foreign hackers “are mainly … to leaking the sophisticated hacking tools, the group took to Twitter and … hacking coding. Subsequent releases by the Shadow Brokers revealed that the group … VISIT THE SOURCE ARTICLE As…

Broadening the Art of the Possible Through Diversity

During a recent conversation with an industry peer and great friend, he asked, “How did you make Cisco’s Security and Trust Organization so inclusive and diverse?” The question made me pause for a couple reasons. First, that he thought that one person alone could be…

Meltdown, Spectre, and Cisco Cloud Collaboration Security

I wanted to provide a few quick answers to questions that we’re being asked about the implications of Meltdown and Spectre on the security of Cisco’s cloud collaboration portfolio. These vulnerabilities are most relevant in multi-tenant cloud environments, where they create the possibility that Cisco’s…