The significance of cybersecurity risk in the deal lifecycle cannot be ignored, as it can impact businesses of all sizes and industries. Cybersecurity risk has become more sophisticated and harder to detect, making cyber threats more harmful and costly than ever. Cybersecurity and Data Privacy should be included in the due diligence process as it […]
Blog Grid
Artificial intelligence (AI) involves developing computer systems that can learn and improve themselves, guided by data analysis. AI can be used in cyber security to detect and prevent attacks on networks, automate tasks, and remediate detected threats. Machine learning, a subset of AI, involves training computers to make decisions based on past data. While AI […]
Geoffrey Hinton, a prominent figure in the field of artificial intelligence (AI), recently left his position at Google to express concerns about the potential dangers of the technology he helped develop. Hinton’s work on neural networks has been instrumental in shaping the AI systems behind many of today’s products. However, he has since become worried […]
The proposed acquisition of Activision Blizzard by Microsoft, which is considered the largest merger in consumer technology in decades, is facing opposition from the UK’s competition authority CMA due to concerns that it would impact the fast-growing cloud gaming market. The CMA argues that Microsoft’s solution has significant shortcomings and would require regulatory oversight. Microsoft’s […]
Snowflake, a data cloud firm, has launched a new platform called the Manufacturing Data Cloud. It has been developed to enable companies in automotive, technology, energy and industrial sectors to use their critical industrial data, which was previously siloed, to increase the supply chain performance, efficiency and visibility. The Manufacturing Data Cloud will empower manufacturers […]
The Food & Drug Administration (FDA) has released new cybersecurity guidelines for the medical devices industry in the US. The guidelines will require medical device manufacturers to provide more documentation to demonstrate how their devices are protected from cyber intrusion, and how they plan to respond to any vulnerabilities. The FDA’s new regulations are part […]