Featured
IT Security
Third‐party vendor risk in government is no longer peripheral
Imagine leaving your valuables in a locker room under surveillance because you trust the facility to keep them safe. Now imagine discovering that the person in charge of that locker room has outsourced the security to another person you don’t know.
Articles
Artificial Intelligence
The geography of AI and cyber risk: How talent scarcity is now an enterprise risk
Artificial Intelligence
Fair use or mass piracy? The AI industry’s use of copyrighted works for LLM training garners scrutiny
Magazine
The new data borders
Opening 2026, the Digital Life explores how data sovereignty is emerging as a defining priority for enterprises amid geopolitical tensions, AI competition, and evolving privacy laws. Through perspectives spanning CIO strategy, R&D, national policy, and emerging risks, this issue highlights the growing need for systems that are secure, resilient, and jurisdiction-aware in an increasingly fragmented digital
Published on March 26, 2026
Read more »The new age of digital trust
Published on December 26, 2025
The age of agentic systems
Published on August 20, 2025
The state of data privacy
Published on June 04, 2025



