Category: Blog

The Operational and Security Functions of Building AI Applications

Navigating Internal AI Deployment Conversations Utilizing AI in internal enterprise environments involves numerous considerations. This technical brief separates AI conversations into three distinct areas:   1) Utilizing Existing Solutions 2) Customizing AI Workflows 3) Pretraining  This graphic illustrates the three stages of enterprise AI usage. The…
Read more

The Cloudy Road to Cyber Risk Management

The initial transition commenced in 2006 when AWS brought to market the first enterprise ready cloud service offering. A couple years later in 2008 Microsoft and Google, both introduced their respective competitive cloud services. Up to that point, businesses were primarily on-prem, owning their entire technology…
Read more