Yaron Haviv explains what a well thought out data strategy looks like, and why ‘I don’t need to work with five different types of database'
Read the full storyThe Stack
Interviews, insight, intelligence, and exclusive events for digital leaders.
Read Our Latest Posts
Latest Posts

"It’s notable that the exploit first uses the NtQuerySystemInformation API to leak kernel addresses to user mode."

"Frankly I don’t think it’s feasible to opt out of learning the skill of applying AI in your craft."

CISO Rob Duhart Jr is setting up a new "safety" domain in the wake of an alleged breach

"It's a bit of a matrix management job; you get a programme coming in from the side saying, ‘can I have a bit of everything, please? And by the way, I'd like to do it my own way…’