Contents
Improving risk management – combining security and cyber insurance practices
PAUL BAIRD
How to assess the impact of generative artificial intelligence
GRAHAM HOSKING
Encryption blind spots: shining a light on cloud network traffic
MARK JOW
The NIS 2 Directive: securing critical assets
STEVE KENNY
Published: 2024-09-10