Data-driven vehicles: The next security challenge

Data-driven vehicles: The next security challenge

Companies are increasingly building smart products that are tailored to know the individual user. In the automotive world, the next generation passenger vehicle could behave like a personal chauffeur, sentry and bodyguard rolled into one. Over the next decade, every...

read more
7 ways to store Renewable Energy

7 ways to store Renewable Energy

Renewable energy is growing by leaps and bounds, but in order for much of it to work, it needs to be stored during peak production and released during low production. https://www.youtube.com/embed/kAB3-lzxvkE Credit Joe Scott...

read more
Building a Cyber Risk Report Your Board Will Love

Building a Cyber Risk Report Your Board Will Love

It’s not a question of if but when – as a CISO, you will be called to brief the board of directors on cybersecurity performance - and with growing pressure from the board, this day is probably coming sooner than expected. The meeting will probably come with a short...

read more
The Four New Pillars of Corporate Protection

The Four New Pillars of Corporate Protection

Over the last few years, we’ve witnessed countless cyber-attacks and massive data breaches. If we take a closer look at some of the more recent larger hacks such as Facebook, Uber, Yahoo and Capital One, we see that these breaches are hitting very advanced companies...

read more
Thirsty future ahead as climate change explodes plant growth

Thirsty future ahead as climate change explodes plant growth

Rising CO2 levels and a warmer earth means plants will grow bigger and have longer to suck the land dry. That’s bad news for human water supplies. By the end of the century plants could consume substantially more water, leaving less for people across North America,...

read more