Most Recent

Unified commerce: a single solution to revolutionize retail

In other words, consumers expect a seamless experience across numerous channels and the ability to make purchases and returns or interact with customer service on their preferred channel. Staff, too, want technological access to the entire omni-channel experience so they can develop human connections with customers and simplify interactions with the brand. In the past, […]

Making the case for retail technology services through ROI

Despite these confounding factors, business leaders nevertheless consider ROI a crucial tool for understanding the value of technology services. When ROI is straightforward to calculate—given a clean data set—it is frequently used as the chief determiner of a technology project’s success. Retail technology teams can leverage this fact to their advantage in multiple ways. Anticipated […]

Strengthening the edge: The acceleration of MXDR, AI, and cybersecurity

Why defense in depth and next-gen firewalls matter Morgan Stanley’s September 2023 wealth management report AI and Cybersecurity: A New Era stated that “cybercriminals are using AI to carry out a variety of sophisticated attacks, from data poisoning to deepfakes.” So, what’s the solution? If bad actors are always one step ahead, is it even […]

Securing funding to prioritize cybersecurity risk management strategy

On this episode of Inside the CISO’S Office, vCISO John Bruggeman converses with Allan Hackney and Jim Studer, each a current consultant and former CIO of several large corporations, including GE, Bank of America, and Univision. They discuss the landscape of legal risk and regulatory compliance surrounding cybersecurity, and how to effectively communicate these pressures […]

Defining security assessments: Risk, compliance, and security frameworks

But where do you start with your security assessments? Which one should your organization invest in first? To answer that question, let us explore the purpose of each assessment in greater detail. The types of security assessments Penetration testing – Tests the effectiveness of your security controls with simulated cyberattacks that criminals would use. Vulnerability […]

The state of cloud network security, SASE, and SD-WAN today

To mitigate cyber risk, OnX keeps clients current with the next iteration of network security practices by offering cutting-edge secure cloud network solutions coupled with our team’s expertise. OnX typically advises clients to invest in two emerging secure networking solutions: secure access service edge (SASE) and secure service edge (SSE). Each solution has distinct features, […]

On the CISO path: Galvanizing female tech professionals and improving cybersecurity in aviation

The cybersecurity battleground Cybersecurity continues to move forward, and the attack surface grows as it does. Taking control of the full scope of risks and threats will be daunting for the most experienced security staff. Deneen pointed out that for all the headway made in cybersecurity in aviation, security professionals still manage comprehensive systems, networks, […]

AI infrastructure: Modern data management for insight-driven strategy

Modern data management Data management describes various techniques for collecting, aggregating, securing, and analyzing data sets. Modern data management integrates emerging technology, such as AI, into data management frameworks and processes. Traditional data management Modern data management Data is structured Data can be unstructured or structured Centered on the on-premises data center Centered on cloud […]

Cloud security benefits: Protecting revenue and operations

Protecting networks allows companies to defend against the effects of a data breach. It utilizes a variety of technologies, frameworks, tools, and more to protect all aspects of this developing technology, from public to multi-cloud environments. The need for network protection When compared to the cost of a data breach, companies are better served investing […]

Nine essential security benefits of cloud technology

Why is cloud security so important? One of the primary benefits of cloud technology is risk reduction. According to Gartner, user error will cause 99% of security breaches by 2025—but this doesn’t mean cloud security will be risk-free. Organizations will continue to face challenges in compliance, complex threat landscapes, and misconfigured systems. For instance, one […]