CINXE.COM
Cybersecurity recent news | InformationWeek
<!DOCTYPE html><html lang="en"><head><meta charSet="utf-8"/><meta name="viewport" content="width=device-width,initial-scale=1"/><meta name="robots" content="max-image-preview:large"/><title>Cybersecurity recent news | InformationWeek</title><meta name="description" content="Explore the latest news and expert commentary on Cybersecurity, brought to you by the editors of InformationWeek"/><meta property="og:title" content="Cybersecurity recent news | InformationWeek"/><meta property="og:description" content="Explore the latest news and expert commentary on Cybersecurity, brought to you by the editors of InformationWeek"/><meta property="og:url" content="https://www.informationweek.com/cyber-resilience/cybersecurity"/><meta property="og:type" content="website"/><meta property="og:image" content="https://www.informationweek.com/build/_assets/informationweek-PQYOD7JA.ico"/><meta property="og:site_name" content="Information Week"/><link rel="canonical" href="https://www.informationweek.com/cyber-resilience/cybersecurity"/><script type="application/ld+json">{"@context":"https://schema.org","@type":"BreadcrumbList","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https://www.informationweek.com"},{"@type":"ListItem","position":2,"name":"Cyber Resilience","item":"https://www.informationweek.com/cyber-resilience"},{"@type":"ListItem","position":3,"name":"Cybersecurity","item":"https://www.informationweek.com/cyber-resilience/cybersecurity"}]}</script><link rel="preload" href="https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt12e860b21fa7e8d3/673e3b9d1e14c30871e127b2/military_pattern-Desintegrator-alamy.jpg?width=700&auto=webp&quality=10&disable=upscale&blur=40" as="image"/><meta property="twitter:card" content="summary"/><script type="text/javascript">window.NREUM||(NREUM={});NREUM.init={distributed_tracing:{enabled:true},privacy:{cookies_enabled:true},ajax:{deny_list:["bam.eu01.nr-data.net"]}}; ;NREUM.loader_config={accountID:"3936348",trustKey:"3288925",agentID:"538600207",licenseKey:"NRJS-26ae6a3b09493bbcc87",applicationID:"538600207"}; ;NREUM.info={beacon:"bam.eu01.nr-data.net",errorBeacon:"bam.eu01.nr-data.net",licenseKey:"NRJS-26ae6a3b09493bbcc87",applicationID:"538600207",sa:1}; ;/*! For license information please see nr-loader-spa-1.274.0.min.js.LICENSE.txt */ (()=>{var e,t,r={8122:(e,t,r)=>{"use strict";r.d(t,{a:()=>i});var n=r(944);function i(e,t){try{if(!e||"object"!=typeof e)return(0,n.R)(3);if(!t||"object"!=typeof t)return(0,n.R)(4);const r=Object.create(Object.getPrototypeOf(t),Object.getOwnPropertyDescriptors(t)),o=0===Object.keys(r).length?e:r;for(let a in o)if(void 0!==e[a])try{if(null===e[a]){r[a]=null;continue}Array.isArray(e[a])&&Array.isArray(t[a])?r[a]=Array.from(new Set([...e[a],...t[a]])):"object"==typeof e[a]&&"object"==typeof t[a]?r[a]=i(e[a],t[a]):r[a]=e[a]}catch(e){(0,n.R)(1,e)}return r}catch(e){(0,n.R)(2,e)}}},2555:(e,t,r)=>{"use strict";r.d(t,{Vp:()=>c,fn:()=>s,x1:()=>u});var n=r(384),i=r(8122);const o={beacon:n.NT.beacon,errorBeacon:n.NT.errorBeacon,licenseKey:void 0,applicationID:void 0,sa:void 0,queueTime:void 0,applicationTime:void 0,ttGuid:void 0,user:void 0,account:void 0,product:void 0,extra:void 0,jsAttributes:{},userAttributes:void 0,atts:void 0,transactionName:void 0,tNamePlain:void 0},a={};function s(e){try{const t=c(e);return!!t.licenseKey&&!!t.errorBeacon&&!!t.applicationID}catch(e){return!1}}function c(e){if(!e)throw new Error("All info objects require an agent identifier!");if(!a[e])throw new Error("Info for ".concat(e," was never set"));return a[e]}function u(e,t){if(!e)throw new Error("All info objects require an agent identifier!");a[e]=(0,i.a)(t,o);const r=(0,n.nY)(e);r&&(r.info=a[e])}},9417:(e,t,r)=>{"use strict";r.d(t,{D0:()=>h,gD:()=>g,xN:()=>p});var n=r(993);const i=e=>{if(!e||"string"!=typeof e)return!1;try{document.createDocumentFragment().querySelector(e)}catch{return!1}return!0};var o=r(2614),a=r(944),s=r(384),c=r(8122);const u="[data-nr-mask]",d=()=>{const e={mask_selector:"*",block_selector:"[data-nr-block]",mask_input_options:{color:!1,date:!1,"datetime-local":!1,email:!1,month:!1,number:!1,range:!1,search:!1,tel:!1,text:!1,time:!1,url:!1,week:!1,textarea:!1,select:!1,password:!0}};return{ajax:{deny_list:void 0,block_internal:!0,enabled:!0,harvestTimeSeconds:10,autoStart:!0},distributed_tracing:{enabled:void 0,exclude_newrelic_header:void 0,cors_use_newrelic_header:void 0,cors_use_tracecontext_headers:void 0,allowed_origins:void 0},feature_flags:[],generic_events:{enabled:!0,harvestTimeSeconds:30,autoStart:!0},harvest:{tooManyRequestsDelay:60},jserrors:{enabled:!0,harvestTimeSeconds:10,autoStart:!0},logging:{enabled:!0,harvestTimeSeconds:10,autoStart:!0,level:n.p_.INFO},metrics:{enabled:!0,autoStart:!0},obfuscate:void 0,page_action:{enabled:!0},page_view_event:{enabled:!0,autoStart:!0},page_view_timing:{enabled:!0,harvestTimeSeconds:30,autoStart:!0},performance:{capture_marks:!1,capture_measures:!1},privacy:{cookies_enabled:!0},proxy:{assets:void 0,beacon:void 0},session:{expiresMs:o.wk,inactiveMs:o.BB},session_replay:{autoStart:!0,enabled:!1,harvestTimeSeconds:60,preload:!1,sampling_rate:10,error_sampling_rate:100,collect_fonts:!1,inline_images:!1,fix_stylesheets:!0,mask_all_inputs:!0,get mask_text_selector(){return e.mask_selector},set mask_text_selector(t){i(t)?e.mask_selector="".concat(t,",").concat(u):""===t||null===t?e.mask_selector=u:(0,a.R)(5,t)},get block_class(){return"nr-block"},get ignore_class(){return"nr-ignore"},get mask_text_class(){return"nr-mask"},get block_selector(){return e.block_selector},set block_selector(t){i(t)?e.block_selector+=",".concat(t):""!==t&&(0,a.R)(6,t)},get mask_input_options(){return e.mask_input_options},set mask_input_options(t){t&&"object"==typeof t?e.mask_input_options={...t,password:!0}:(0,a.R)(7,t)}},session_trace:{enabled:!0,harvestTimeSeconds:10,autoStart:!0},soft_navigations:{enabled:!0,harvestTimeSeconds:10,autoStart:!0},spa:{enabled:!0,harvestTimeSeconds:10,autoStart:!0},ssl:void 0,user_actions:{enabled:!0}}},l={},f="All configuration objects require an agent identifier!";function h(e){if(!e)throw new Error(f);if(!l[e])throw new Error("Configuration for ".concat(e," was never set"));return l[e]}function p(e,t){if(!e)throw new Error(f);l[e]=(0,c.a)(t,d());const r=(0,s.nY)(e);r&&(r.init=l[e])}function g(e,t){if(!e)throw new Error(f);var r=h(e);if(r){for(var n=t.split("."),i=0;i<n.length-1;i++)if("object"!=typeof(r=r[n[i]]))return;r=r[n[n.length-1]]}return r}},5603:(e,t,r)=>{"use strict";r.d(t,{a:()=>c,o:()=>s});var n=r(384),i=r(8122);const o={accountID:void 0,trustKey:void 0,agentID:void 0,licenseKey:void 0,applicationID:void 0,xpid:void 0},a={};function s(e){if(!e)throw new Error("All loader-config objects require an agent identifier!");if(!a[e])throw new Error("LoaderConfig for ".concat(e," was never set"));return a[e]}function c(e,t){if(!e)throw new Error("All loader-config objects require an agent identifier!");a[e]=(0,i.a)(t,o);const r=(0,n.nY)(e);r&&(r.loader_config=a[e])}},3371:(e,t,r)=>{"use strict";r.d(t,{V:()=>f,f:()=>l});var n=r(8122),i=r(384),o=r(6154),a=r(9324);let s=0;const c={buildEnv:a.F3,distMethod:a.Xs,version:a.xv,originTime:o.WN},u={customTransaction:void 0,disabled:!1,isolatedBacklog:!1,loaderType:void 0,maxBytes:3e4,onerror:void 0,ptid:void 0,releaseIds:{},appMetadata:{},session:void 0,denyList:void 0,timeKeeper:void 0,obfuscator:void 0},d={};function l(e){if(!e)throw new Error("All runtime objects require an agent identifier!");if(!d[e])throw new Error("Runtime for ".concat(e," was never set"));return d[e]}function f(e,t){if(!e)throw new Error("All runtime objects require an agent identifier!");d[e]={...(0,n.a)(t,u),...c},Object.hasOwnProperty.call(d[e],"harvestCount")||Object.defineProperty(d[e],"harvestCount",{get:()=>++s});const r=(0,i.nY)(e);r&&(r.runtime=d[e])}},9324:(e,t,r)=>{"use strict";r.d(t,{F3:()=>i,Xs:()=>o,Yq:()=>a,xv:()=>n});const n="1.274.0",i="PROD",o="CDN",a="^2.0.0-alpha.17"},6154:(e,t,r)=>{"use strict";r.d(t,{A4:()=>s,OF:()=>d,RI:()=>i,WN:()=>h,bv:()=>o,gm:()=>a,lR:()=>f,m:()=>u,mw:()=>c,sb:()=>l});var n=r(1863);const i="undefined"!=typeof window&&!!window.document,o="undefined"!=typeof WorkerGlobalScope&&("undefined"!=typeof self&&self instanceof WorkerGlobalScope&&self.navigator instanceof WorkerNavigator||"undefined"!=typeof globalThis&&globalThis instanceof WorkerGlobalScope&&globalThis.navigator instanceof WorkerNavigator),a=i?window:"undefined"!=typeof WorkerGlobalScope&&("undefined"!=typeof self&&self instanceof WorkerGlobalScope&&self||"undefined"!=typeof globalThis&&globalThis instanceof WorkerGlobalScope&&globalThis),s="complete"===a?.document?.readyState,c=Boolean("hidden"===a?.document?.visibilityState),u=""+a?.location,d=/iPad|iPhone|iPod/.test(a.navigator?.userAgent),l=d&&"undefined"==typeof SharedWorker,f=(()=>{const e=a.navigator?.userAgent?.match(/Firefox[/\s](\d+\.\d+)/);return Array.isArray(e)&&e.length>=2?+e[1]:0})(),h=Date.now()-(0,n.t)()},7295:(e,t,r)=>{"use strict";r.d(t,{Xv:()=>a,gX:()=>i,iW:()=>o});var n=[];function i(e){if(!e||o(e))return!1;if(0===n.length)return!0;for(var t=0;t<n.length;t++){var r=n[t];if("*"===r.hostname)return!1;if(s(r.hostname,e.hostname)&&c(r.pathname,e.pathname))return!1}return!0}function o(e){return void 0===e.hostname}function a(e){if(n=[],e&&e.length)for(var t=0;t<e.length;t++){let r=e[t];if(!r)continue;0===r.indexOf("http://")?r=r.substring(7):0===r.indexOf("https://")&&(r=r.substring(8));const i=r.indexOf("/");let o,a;i>0?(o=r.substring(0,i),a=r.substring(i)):(o=r,a="");let[s]=o.split(":");n.push({hostname:s,pathname:a})}}function s(e,t){return!(e.length>t.length)&&t.indexOf(e)===t.length-e.length}function c(e,t){return 0===e.indexOf("/")&&(e=e.substring(1)),0===t.indexOf("/")&&(t=t.substring(1)),""===e||e===t}},1687:(e,t,r)=>{"use strict";r.d(t,{Ak:()=>c,Ze:()=>l,x3:()=>u});var n=r(7836),i=r(3606),o=r(860),a=r(2646);const s={};function c(e,t){const r={staged:!1,priority:o.P3[t]||0};d(e),s[e].get(t)||s[e].set(t,r)}function u(e,t){e&&s[e]&&(s[e].get(t)&&s[e].delete(t),h(e,t,!1),s[e].size&&f(e))}function d(e){if(!e)throw new Error("agentIdentifier required");s[e]||(s[e]=new Map)}function l(e="",t="feature",r=!1){if(d(e),!e||!s[e].get(t)||r)return h(e,t);s[e].get(t).staged=!0,f(e)}function f(e){const t=Array.from(s[e]);t.every((([e,t])=>t.staged))&&(t.sort(((e,t)=>e[1].priority-t[1].priority)),t.forEach((([t])=>{s[e].delete(t),h(e,t)})))}function h(e,t,r=!0){const o=e?n.ee.get(e):n.ee,s=i.i.handlers;if(!o.aborted&&o.backlog&&s){if(r){const e=o.backlog[t],r=s[t];if(r){for(let t=0;e&&t<e.length;++t)p(e[t],r);Object.entries(r).forEach((([e,t])=>{Object.values(t||{}).forEach((t=>{t[0]?.on&&t[0]?.context()instanceof a.y&&t[0].on(e,t[1])}))}))}}o.isolatedBacklog||delete s[t],o.backlog[t]=null,o.emit("drain-"+t,[])}}function p(e,t){var r=e[1];Object.values(t[r]||{}).forEach((t=>{var r=e[0];if(t[0]===r){var n=t[1],i=e[3],o=e[2];n.apply(i,o)}}))}},7836:(e,t,r)=>{"use strict";r.d(t,{P:()=>c,ee:()=>u});var n=r(384),i=r(8990),o=r(3371),a=r(2646),s=r(5607);const c="nr@context:".concat(s.W),u=function e(t,r){var n={},s={},d={},l=!1;try{l=16===r.length&&(0,o.f)(r).isolatedBacklog}catch(e){}var f={on:p,addEventListener:p,removeEventListener:function(e,t){var r=n[e];if(!r)return;for(var i=0;i<r.length;i++)r[i]===t&&r.splice(i,1)},emit:function(e,r,n,i,o){!1!==o&&(o=!0);if(u.aborted&&!i)return;t&&o&&t.emit(e,r,n);for(var a=h(n),c=g(e),d=c.length,l=0;l<d;l++)c[l].apply(a,r);var p=v()[s[e]];p&&p.push([f,e,r,a]);return a},get:m,listeners:g,context:h,buffer:function(e,t){const r=v();if(t=t||"feature",f.aborted)return;Object.entries(e||{}).forEach((([e,n])=>{s[n]=t,t in r||(r[t]=[])}))},abort:function(){f._aborted=!0,Object.keys(f.backlog).forEach((e=>{delete f.backlog[e]}))},isBuffering:function(e){return!!v()[s[e]]},debugId:r,backlog:l?{}:t&&"object"==typeof t.backlog?t.backlog:{},isolatedBacklog:l};return Object.defineProperty(f,"aborted",{get:()=>{let e=f._aborted||!1;return e||(t&&(e=t.aborted),e)}}),f;function h(e){return e&&e instanceof a.y?e:e?(0,i.I)(e,c,(()=>new a.y(c))):new a.y(c)}function p(e,t){n[e]=g(e).concat(t)}function g(e){return n[e]||[]}function m(t){return d[t]=d[t]||e(f,t)}function v(){return f.backlog}}(void 0,"globalEE"),d=(0,n.Zm)();d.ee||(d.ee=u)},2646:(e,t,r)=>{"use strict";r.d(t,{y:()=>n});class n{constructor(e){this.contextId=e}}},9908:(e,t,r)=>{"use strict";r.d(t,{d:()=>n,p:()=>i});var n=r(7836).ee.get("handle");function i(e,t,r,i,o){o?(o.buffer([e],i),o.emit(e,t,r)):(n.buffer([e],i),n.emit(e,t,r))}},3606:(e,t,r)=>{"use strict";r.d(t,{i:()=>o});var n=r(9908);o.on=a;var i=o.handlers={};function o(e,t,r,o){a(o||n.d,i,e,t,r)}function a(e,t,r,i,o){o||(o="feature"),e||(e=n.d);var a=t[o]=t[o]||{};(a[r]=a[r]||[]).push([e,i])}},3878:(e,t,r)=>{"use strict";function n(e,t){return{capture:e,passive:!1,signal:t}}function i(e,t,r=!1,i){window.addEventListener(e,t,n(r,i))}function o(e,t,r=!1,i){document.addEventListener(e,t,n(r,i))}r.d(t,{DD:()=>o,jT:()=>n,sp:()=>i})},5607:(e,t,r)=>{"use strict";r.d(t,{W:()=>n});const n=(0,r(9566).bz)()},9566:(e,t,r)=>{"use strict";r.d(t,{LA:()=>s,ZF:()=>c,bz:()=>a,el:()=>u});var n=r(6154);const i="xxxxxxxx-xxxx-4xxx-yxxx-xxxxxxxxxxxx";function o(e,t){return e?15&e[t]:16*Math.random()|0}function a(){const e=n.gm?.crypto||n.gm?.msCrypto;let t,r=0;return e&&e.getRandomValues&&(t=e.getRandomValues(new Uint8Array(30))),i.split("").map((e=>"x"===e?o(t,r++).toString(16):"y"===e?(3&o()|8).toString(16):e)).join("")}function s(e){const t=n.gm?.crypto||n.gm?.msCrypto;let r,i=0;t&&t.getRandomValues&&(r=t.getRandomValues(new Uint8Array(e)));const a=[];for(var s=0;s<e;s++)a.push(o(r,i++).toString(16));return a.join("")}function c(){return s(16)}function u(){return s(32)}},2614:(e,t,r)=>{"use strict";r.d(t,{BB:()=>a,H3:()=>n,g:()=>u,iL:()=>c,tS:()=>s,uh:()=>i,wk:()=>o});const n="NRBA",i="SESSION",o=144e5,a=18e5,s={STARTED:"session-started",PAUSE:"session-pause",RESET:"session-reset",RESUME:"session-resume",UPDATE:"session-update"},c={SAME_TAB:"same-tab",CROSS_TAB:"cross-tab"},u={OFF:0,FULL:1,ERROR:2}},1863:(e,t,r)=>{"use strict";function n(){return Math.floor(performance.now())}r.d(t,{t:()=>n})},7485:(e,t,r)=>{"use strict";r.d(t,{D:()=>i});var n=r(6154);function i(e){if(0===(e||"").indexOf("data:"))return{protocol:"data"};try{const t=new URL(e,location.href),r={port:t.port,hostname:t.hostname,pathname:t.pathname,search:t.search,protocol:t.protocol.slice(0,t.protocol.indexOf(":")),sameOrigin:t.protocol===n.gm?.location?.protocol&&t.host===n.gm?.location?.host};return r.port&&""!==r.port||("http:"===t.protocol&&(r.port="80"),"https:"===t.protocol&&(r.port="443")),r.pathname&&""!==r.pathname?r.pathname.startsWith("/")||(r.pathname="/".concat(r.pathname)):r.pathname="/",r}catch(e){return{}}}},944:(e,t,r)=>{"use strict";function n(e,t){"function"==typeof console.debug&&console.debug("New Relic Warning: https://github.com/newrelic/newrelic-browser-agent/blob/main/docs/warning-codes.md#".concat(e),t)}r.d(t,{R:()=>n})},5284:(e,t,r)=>{"use strict";r.d(t,{t:()=>c,B:()=>s});var n=r(7836),i=r(6154);const o="newrelic";const a=new Set,s={};function c(e,t){const r=n.ee.get(t);s[t]??={},e&&"object"==typeof e&&(a.has(t)||(r.emit("rumresp",[e]),s[t]=e,a.add(t),function(e={}){try{i.gm.dispatchEvent(new CustomEvent(o,{detail:e}))}catch(e){}}({loaded:!0})))}},8990:(e,t,r)=>{"use strict";r.d(t,{I:()=>i});var n=Object.prototype.hasOwnProperty;function i(e,t,r){if(n.call(e,t))return e[t];var i=r();if(Object.defineProperty&&Object.keys)try{return Object.defineProperty(e,t,{value:i,writable:!0,enumerable:!1}),i}catch(e){}return e[t]=i,i}},6389:(e,t,r)=>{"use strict";function n(e,t=500,r={}){const n=r?.leading||!1;let i;return(...r)=>{n&&void 0===i&&(e.apply(this,r),i=setTimeout((()=>{i=clearTimeout(i)}),t)),n||(clearTimeout(i),i=setTimeout((()=>{e.apply(this,r)}),t))}}function i(e){let t=!1;return(...r)=>{t||(t=!0,e.apply(this,r))}}r.d(t,{J:()=>i,s:()=>n})},3304:(e,t,r)=>{"use strict";r.d(t,{A:()=>o});var n=r(7836);const i=()=>{const e=new WeakSet;return(t,r)=>{if("object"==typeof r&&null!==r){if(e.has(r))return;e.add(r)}return r}};function o(e){try{return JSON.stringify(e,i())??""}catch(e){try{n.ee.emit("internal-error",[e])}catch(e){}return""}}},5289:(e,t,r)=>{"use strict";r.d(t,{GG:()=>o,sB:()=>a});var n=r(3878);function i(){return"undefined"==typeof document||"complete"===document.readyState}function o(e,t){if(i())return e();(0,n.sp)("load",e,t)}function a(e){if(i())return e();(0,n.DD)("DOMContentLoaded",e)}},384:(e,t,r)=>{"use strict";r.d(t,{NT:()=>o,US:()=>d,Zm:()=>a,bQ:()=>c,dV:()=>s,nY:()=>u,pV:()=>l});var n=r(6154),i=r(1863);const o={beacon:"bam.nr-data.net",errorBeacon:"bam.nr-data.net"};function a(){return n.gm.NREUM||(n.gm.NREUM={}),void 0===n.gm.newrelic&&(n.gm.newrelic=n.gm.NREUM),n.gm.NREUM}function s(){let e=a();return e.o||(e.o={ST:n.gm.setTimeout,SI:n.gm.setImmediate,CT:n.gm.clearTimeout,XHR:n.gm.XMLHttpRequest,REQ:n.gm.Request,EV:n.gm.Event,PR:n.gm.Promise,MO:n.gm.MutationObserver,FETCH:n.gm.fetch,WS:n.gm.WebSocket}),e}function c(e,t){let r=a();r.initializedAgents??={},t.initializedAt={ms:(0,i.t)(),date:new Date},r.initializedAgents[e]=t}function u(e){let t=a();return t.initializedAgents?.[e]}function d(e,t){a()[e]=t}function l(){return function(){let e=a();const t=e.info||{};e.info={beacon:o.beacon,errorBeacon:o.errorBeacon,...t}}(),function(){let e=a();const t=e.init||{};e.init={...t}}(),s(),function(){let e=a();const t=e.loader_config||{};e.loader_config={...t}}(),a()}},2843:(e,t,r)=>{"use strict";r.d(t,{u:()=>i});var n=r(3878);function i(e,t=!1,r,i){(0,n.DD)("visibilitychange",(function(){if(t)return void("hidden"===document.visibilityState&&e());e(document.visibilityState)}),r,i)}},8139:(e,t,r)=>{"use strict";r.d(t,{u:()=>f});var n=r(7836),i=r(3434),o=r(8990),a=r(6154);const s={},c=a.gm.XMLHttpRequest,u="addEventListener",d="removeEventListener",l="nr@wrapped:".concat(n.P);function f(e){var t=function(e){return(e||n.ee).get("events")}(e);if(s[t.debugId]++)return t;s[t.debugId]=1;var r=(0,i.YM)(t,!0);function f(e){r.inPlace(e,[u,d],"-",p)}function p(e,t){return e[1]}return"getPrototypeOf"in Object&&(a.RI&&h(document,f),h(a.gm,f),h(c.prototype,f)),t.on(u+"-start",(function(e,t){var n=e[1];if(null!==n&&("function"==typeof n||"object"==typeof n)){var i=(0,o.I)(n,l,(function(){var e={object:function(){if("function"!=typeof n.handleEvent)return;return n.handleEvent.apply(n,arguments)},function:n}[typeof n];return e?r(e,"fn-",null,e.name||"anonymous"):n}));this.wrapped=e[1]=i}})),t.on(d+"-start",(function(e){e[1]=this.wrapped||e[1]})),t}function h(e,t,...r){let n=e;for(;"object"==typeof n&&!Object.prototype.hasOwnProperty.call(n,u);)n=Object.getPrototypeOf(n);n&&t(n,...r)}},3434:(e,t,r)=>{"use strict";r.d(t,{Jt:()=>o,YM:()=>c});var n=r(7836),i=r(5607);const o="nr@original:".concat(i.W);var a=Object.prototype.hasOwnProperty,s=!1;function c(e,t){return e||(e=n.ee),r.inPlace=function(e,t,n,i,o){n||(n="");const a="-"===n.charAt(0);for(let s=0;s<t.length;s++){const c=t[s],u=e[c];d(u)||(e[c]=r(u,a?c+n:n,i,c,o))}},r.flag=o,r;function r(t,r,n,s,c){return d(t)?t:(r||(r=""),nrWrapper[o]=t,function(e,t,r){if(Object.defineProperty&&Object.keys)try{return Object.keys(e).forEach((function(r){Object.defineProperty(t,r,{get:function(){return e[r]},set:function(t){return e[r]=t,t}})})),t}catch(e){u([e],r)}for(var n in e)a.call(e,n)&&(t[n]=e[n])}(t,nrWrapper,e),nrWrapper);function nrWrapper(){var o,a,d,l;try{a=this,o=[...arguments],d="function"==typeof n?n(o,a):n||{}}catch(t){u([t,"",[o,a,s],d],e)}i(r+"start",[o,a,s],d,c);try{return l=t.apply(a,o)}catch(e){throw i(r+"err",[o,a,e],d,c),e}finally{i(r+"end",[o,a,l],d,c)}}}function i(r,n,i,o){if(!s||t){var a=s;s=!0;try{e.emit(r,n,i,t,o)}catch(t){u([t,r,n,i],e)}s=a}}}function u(e,t){t||(t=n.ee);try{t.emit("internal-error",e)}catch(e){}}function d(e){return!(e&&"function"==typeof e&&e.apply&&!e[o])}},9300:(e,t,r)=>{"use strict";r.d(t,{T:()=>n});const n=r(860).K7.ajax},3333:(e,t,r)=>{"use strict";r.d(t,{TZ:()=>n,Zp:()=>i,mq:()=>s,nf:()=>a,qN:()=>o});const n=r(860).K7.genericEvents,i=["auxclick","click","copy","keydown","paste","scrollend"],o=["focus","blur"],a=4,s=1e3},6774:(e,t,r)=>{"use strict";r.d(t,{T:()=>n});const n=r(860).K7.jserrors},993:(e,t,r)=>{"use strict";r.d(t,{ET:()=>o,TZ:()=>a,p_:()=>i});var n=r(860);const i={ERROR:"ERROR",WARN:"WARN",INFO:"INFO",DEBUG:"DEBUG",TRACE:"TRACE"},o="log",a=n.K7.logging},3785:(e,t,r)=>{"use strict";r.d(t,{R:()=>c,b:()=>u});var n=r(9908),i=r(1863),o=r(860),a=r(3969),s=r(993);function c(e,t,r={},c=s.p_.INFO){(0,n.p)(a.xV,["API/logging/".concat(c.toLowerCase(),"/called")],void 0,o.K7.metrics,e),(0,n.p)(s.ET,[(0,i.t)(),t,r,c],void 0,o.K7.logging,e)}function u(e){return"string"==typeof e&&Object.values(s.p_).some((t=>t===e.toUpperCase().trim()))}},3969:(e,t,r)=>{"use strict";r.d(t,{TZ:()=>n,XG:()=>s,rs:()=>i,xV:()=>a,z_:()=>o});const n=r(860).K7.metrics,i="sm",o="cm",a="storeSupportabilityMetrics",s="storeEventMetrics"},6630:(e,t,r)=>{"use strict";r.d(t,{T:()=>n});const n=r(860).K7.pageViewEvent},782:(e,t,r)=>{"use strict";r.d(t,{T:()=>n});const n=r(860).K7.pageViewTiming},6344:(e,t,r)=>{"use strict";r.d(t,{BB:()=>d,G4:()=>o,Qb:()=>l,TZ:()=>i,Ug:()=>a,_s:()=>s,bc:()=>u,yP:()=>c});var n=r(2614);const i=r(860).K7.sessionReplay,o={RECORD:"recordReplay",PAUSE:"pauseReplay",REPLAY_RUNNING:"replayRunning",ERROR_DURING_REPLAY:"errorDuringReplay"},a=.12,s={DomContentLoaded:0,Load:1,FullSnapshot:2,IncrementalSnapshot:3,Meta:4,Custom:5},c={[n.g.ERROR]:15e3,[n.g.FULL]:3e5,[n.g.OFF]:0},u={RESET:{message:"Session was reset",sm:"Reset"},IMPORT:{message:"Recorder failed to import",sm:"Import"},TOO_MANY:{message:"429: Too Many Requests",sm:"Too-Many"},TOO_BIG:{message:"Payload was too large",sm:"Too-Big"},CROSS_TAB:{message:"Session Entity was set to OFF on another tab",sm:"Cross-Tab"},ENTITLEMENTS:{message:"Session Replay is not allowed and will not be started",sm:"Entitlement"}},d=5e3,l={API:"api"}},5270:(e,t,r)=>{"use strict";r.d(t,{Aw:()=>c,CT:()=>u,SR:()=>s});var n=r(384),i=r(9417),o=r(7767),a=r(6154);function s(e){return!!(0,n.dV)().o.MO&&(0,o.V)(e)&&!0===(0,i.gD)(e,"session_trace.enabled")}function c(e){return!0===(0,i.gD)(e,"session_replay.preload")&&s(e)}function u(e,t){const r=t.correctAbsoluteTimestamp(e);return{originalTimestamp:e,correctedTimestamp:r,timestampDiff:e-r,originTime:a.WN,correctedOriginTime:t.correctedOriginTime,originTimeDiff:Math.floor(a.WN-t.correctedOriginTime)}}},3738:(e,t,r)=>{"use strict";r.d(t,{He:()=>i,Kp:()=>s,Lc:()=>u,Rz:()=>d,TZ:()=>n,bD:()=>o,d3:()=>a,jx:()=>l,uP:()=>c});const n=r(860).K7.sessionTrace,i="bstResource",o="resource",a="-start",s="-end",c="fn"+a,u="fn"+s,d="pushState",l=1e3},3962:(e,t,r)=>{"use strict";r.d(t,{AM:()=>o,O2:()=>s,Qu:()=>c,TZ:()=>a,ih:()=>u,tC:()=>i});var n=r(860);const i=["click","keydown","submit"],o="api",a=n.K7.softNav,s={INITIAL_PAGE_LOAD:"",ROUTE_CHANGE:1,UNSPECIFIED:2},c={INTERACTION:1,AJAX:2,CUSTOM_END:3,CUSTOM_TRACER:4},u={IP:"in progress",FIN:"finished",CAN:"cancelled"}},7378:(e,t,r)=>{"use strict";r.d(t,{$p:()=>x,BR:()=>b,Kp:()=>R,L3:()=>y,Lc:()=>c,NC:()=>o,SG:()=>d,TZ:()=>i,U6:()=>p,UT:()=>m,d3:()=>w,dT:()=>f,e5:()=>A,gx:()=>v,l9:()=>l,oW:()=>h,op:()=>g,rw:()=>u,tH:()=>E,uP:()=>s,wW:()=>T,xq:()=>a});var n=r(384);const i=r(860).K7.spa,o=["click","submit","keypress","keydown","keyup","change"],a=999,s="fn-start",c="fn-end",u="cb-start",d="api-ixn-",l="remaining",f="interaction",h="spaNode",p="jsonpNode",g="fetch-start",m="fetch-done",v="fetch-body-",b="jsonp-end",y=(0,n.dV)().o.ST,w="-start",R="-end",x="-body",T="cb"+R,A="jsTime",E="fetch"},4234:(e,t,r)=>{"use strict";r.d(t,{W:()=>o});var n=r(7836),i=r(1687);class o{constructor(e,t){this.agentIdentifier=e,this.ee=n.ee.get(e),this.featureName=t,this.blocked=!1}deregisterDrain(){(0,i.x3)(this.agentIdentifier,this.featureName)}}},7767:(e,t,r)=>{"use strict";r.d(t,{V:()=>o});var n=r(9417),i=r(6154);const o=e=>i.RI&&!0===(0,n.gD)(e,"privacy.cookies_enabled")},425:(e,t,r)=>{"use strict";r.d(t,{j:()=>j});var n=r(860),i=r(2555),o=r(3371),a=r(9908),s=r(7836),c=r(1687),u=r(5289),d=r(6154),l=r(944),f=r(3969),h=r(384),p=r(6344);const g=["setErrorHandler","finished","addToTrace","addRelease","addPageAction","setCurrentRouteName","setPageViewName","setCustomAttribute","interaction","noticeError","setUserId","setApplicationVersion","start",p.G4.RECORD,p.G4.PAUSE,"log","wrapLogger"],m=["setErrorHandler","finished","addToTrace","addRelease"];var v=r(1863),b=r(2614),y=r(993),w=r(3785),R=r(2646),x=r(3434);function T(e,t,r,n){if("object"!=typeof t||!t||"string"!=typeof r||!r||"function"!=typeof t[r])return(0,l.R)(29);const i=function(e){return(e||s.ee).get("logger")}(e),o=(0,x.YM)(i),a=new R.y(s.P);return a.level=n.level,a.customAttributes=n.customAttributes,o.inPlace(t,[r],"wrap-logger-",a),i}function A(){const e=(0,h.pV)();g.forEach((t=>{e[t]=(...r)=>function(t,...r){let n=[];return Object.values(e.initializedAgents).forEach((e=>{e&&e.api?e.exposed&&e.api[t]&&n.push(e.api[t](...r)):(0,l.R)(38,t)})),n.length>1?n:n[0]}(t,...r)}))}const E={};var S=r(9417),N=r(5603),O=r(5284);const _=e=>{const t=e.startsWith("http");e+="/",r.p=t?e:"https://"+e};let I=!1;function j(e,t={},g,R){let{init:x,info:j,loader_config:P,runtime:C={},exposed:k=!0}=t;C.loaderType=g;const L=(0,h.pV)();j||(x=L.init,j=L.info,P=L.loader_config),(0,S.xN)(e.agentIdentifier,x||{}),(0,N.a)(e.agentIdentifier,P||{}),j.jsAttributes??={},d.bv&&(j.jsAttributes.isWorker=!0),(0,i.x1)(e.agentIdentifier,j);const H=(0,S.D0)(e.agentIdentifier),D=[j.beacon,j.errorBeacon];I||(H.proxy.assets&&(_(H.proxy.assets),D.push(H.proxy.assets)),H.proxy.beacon&&D.push(H.proxy.beacon),A(),(0,h.US)("activatedFeatures",O.B),e.runSoftNavOverSpa&&=!0===H.soft_navigations.enabled&&H.feature_flags.includes("soft_nav")),C.denyList=[...H.ajax.deny_list||[],...H.ajax.block_internal?D:[]],C.ptid=e.agentIdentifier,(0,o.V)(e.agentIdentifier,C),e.ee=s.ee.get(e.agentIdentifier),void 0===e.api&&(e.api=function(e,t,h=!1){t||(0,c.Ak)(e,"api");const g={};var R=s.ee.get(e),x=R.get("tracer");E[e]=b.g.OFF,R.on(p.G4.REPLAY_RUNNING,(t=>{E[e]=t}));var A="api-",S=A+"ixn-";function N(t,r,n,o){const a=(0,i.Vp)(e);return null===r?delete a.jsAttributes[t]:(0,i.x1)(e,{...a,jsAttributes:{...a.jsAttributes,[t]:r}}),I(A,n,!0,o||null===r?"session":void 0)(t,r)}function O(){}g.log=function(e,{customAttributes:t={},level:r=y.p_.INFO}={}){(0,a.p)(f.xV,["API/log/called"],void 0,n.K7.metrics,R),(0,w.R)(R,e,t,r)},g.wrapLogger=(e,t,{customAttributes:r={},level:i=y.p_.INFO}={})=>{(0,a.p)(f.xV,["API/wrapLogger/called"],void 0,n.K7.metrics,R),T(R,e,t,{customAttributes:r,level:i})},m.forEach((e=>{g[e]=I(A,e,!0,"api")})),g.addPageAction=I(A,"addPageAction",!0,n.K7.genericEvents),g.setPageViewName=function(t,r){if("string"==typeof t)return"/"!==t.charAt(0)&&(t="/"+t),(0,o.f)(e).customTransaction=(r||"http://custom.transaction")+t,I(A,"setPageViewName",!0)()},g.setCustomAttribute=function(e,t,r=!1){if("string"==typeof e){if(["string","number","boolean"].includes(typeof t)||null===t)return N(e,t,"setCustomAttribute",r);(0,l.R)(40,typeof t)}else(0,l.R)(39,typeof e)},g.setUserId=function(e){if("string"==typeof e||null===e)return N("enduser.id",e,"setUserId",!0);(0,l.R)(41,typeof e)},g.setApplicationVersion=function(e){if("string"==typeof e||null===e)return N("application.version",e,"setApplicationVersion",!1);(0,l.R)(42,typeof e)},g.start=()=>{try{(0,a.p)(f.xV,["API/start/called"],void 0,n.K7.metrics,R),R.emit("manual-start-all")}catch(e){(0,l.R)(23,e)}},g[p.G4.RECORD]=function(){(0,a.p)(f.xV,["API/recordReplay/called"],void 0,n.K7.metrics,R),(0,a.p)(p.G4.RECORD,[],void 0,n.K7.sessionReplay,R)},g[p.G4.PAUSE]=function(){(0,a.p)(f.xV,["API/pauseReplay/called"],void 0,n.K7.metrics,R),(0,a.p)(p.G4.PAUSE,[],void 0,n.K7.sessionReplay,R)},g.interaction=function(e){return(new O).get("object"==typeof e?e:{})};const _=O.prototype={createTracer:function(e,t){var r={},i=this,o="function"==typeof t;return(0,a.p)(f.xV,["API/createTracer/called"],void 0,n.K7.metrics,R),h||(0,a.p)(S+"tracer",[(0,v.t)(),e,r],i,n.K7.spa,R),function(){if(x.emit((o?"":"no-")+"fn-start",[(0,v.t)(),i,o],r),o)try{return t.apply(this,arguments)}catch(e){const t="string"==typeof e?new Error(e):e;throw x.emit("fn-err",[arguments,this,t],r),t}finally{x.emit("fn-end",[(0,v.t)()],r)}}}};function I(e,t,r,i){return function(){return(0,a.p)(f.xV,["API/"+t+"/called"],void 0,n.K7.metrics,R),i&&(0,a.p)(e+t,[(0,v.t)(),...arguments],r?null:this,i,R),r?void 0:this}}function j(){r.e(478).then(r.bind(r,8778)).then((({setAPI:t})=>{t(e),(0,c.Ze)(e,"api")})).catch((e=>{(0,l.R)(27,e),R.abort()}))}return["actionText","setName","setAttribute","save","ignore","onEnd","getContext","end","get"].forEach((e=>{_[e]=I(S,e,void 0,h?n.K7.softNav:n.K7.spa)})),g.setCurrentRouteName=h?I(S,"routeName",void 0,n.K7.softNav):I(A,"routeName",!0,n.K7.spa),g.noticeError=function(t,r){"string"==typeof t&&(t=new Error(t)),(0,a.p)(f.xV,["API/noticeError/called"],void 0,n.K7.metrics,R),(0,a.p)("err",[t,(0,v.t)(),!1,r,!!E[e]],void 0,n.K7.jserrors,R)},d.RI?(0,u.GG)((()=>j()),!0):j(),g}(e.agentIdentifier,R,e.runSoftNavOverSpa)),void 0===e.exposed&&(e.exposed=k),I=!0}},8374:(e,t,r)=>{r.nc=(()=>{try{return document?.currentScript?.nonce}catch(e){}return""})()},860:(e,t,r)=>{"use strict";r.d(t,{$J:()=>o,K7:()=>n,P3:()=>i});const n={ajax:"ajax",genericEvents:"generic_events",jserrors:"jserrors",logging:"logging",metrics:"metrics",pageAction:"page_action",pageViewEvent:"page_view_event",pageViewTiming:"page_view_timing",sessionReplay:"session_replay",sessionTrace:"session_trace",softNav:"soft_navigations",spa:"spa"},i={[n.pageViewEvent]:1,[n.pageViewTiming]:2,[n.metrics]:3,[n.jserrors]:4,[n.spa]:5,[n.ajax]:6,[n.sessionTrace]:7,[n.softNav]:8,[n.sessionReplay]:9,[n.logging]:10,[n.genericEvents]:11},o={[n.pageViewTiming]:"events",[n.ajax]:"events",[n.spa]:"events",[n.softNav]:"events",[n.metrics]:"jserrors",[n.jserrors]:"jserrors",[n.sessionTrace]:"browser/blobs",[n.sessionReplay]:"browser/blobs",[n.logging]:"browser/logs",[n.genericEvents]:"ins"}}},n={};function i(e){var t=n[e];if(void 0!==t)return t.exports;var o=n[e]={exports:{}};return r[e](o,o.exports,i),o.exports}i.m=r,i.d=(e,t)=>{for(var r in t)i.o(t,r)&&!i.o(e,r)&&Object.defineProperty(e,r,{enumerable:!0,get:t[r]})},i.f={},i.e=e=>Promise.all(Object.keys(i.f).reduce(((t,r)=>(i.f[r](e,t),t)),[])),i.u=e=>({212:"nr-spa-compressor",249:"nr-spa-recorder",478:"nr-spa"}[e]+"-1.274.0.min.js"),i.o=(e,t)=>Object.prototype.hasOwnProperty.call(e,t),e={},t="NRBA-1.274.0.PROD:",i.l=(r,n,o,a)=>{if(e[r])e[r].push(n);else{var s,c;if(void 0!==o)for(var u=document.getElementsByTagName("script"),d=0;d<u.length;d++){var l=u[d];if(l.getAttribute("src")==r||l.getAttribute("data-webpack")==t+o){s=l;break}}if(!s){c=!0;var f={478:"sha512-1vUqEfJPB8Pihje9mv5CfYgkitO1FWcS+UQb84DbXqP8oYctRv4/lzl/MzNLPlRhcY1WVDBGL20I8vm6s2VV7g==",249:"sha512-Y/BeZAh6VSTmUtUNmS5XdyKxL92s30Fyyj8xVW76HSPxcKItL4+x2+kGMZc8pMJnUpZDz1L4eftZQAJh3D8NnA==",212:"sha512-Gn2tQ3qog5Yhrx/gRutkSTYPp+7nkKFt4/mIXg99LxcNpMDAYJZDBYmAACdoHNM86+iq1F3cBcQotFNzjIX8bw=="};(s=document.createElement("script")).charset="utf-8",s.timeout=120,i.nc&&s.setAttribute("nonce",i.nc),s.setAttribute("data-webpack",t+o),s.src=r,0!==s.src.indexOf(window.location.origin+"/")&&(s.crossOrigin="anonymous"),f[a]&&(s.integrity=f[a])}e[r]=[n];var h=(t,n)=>{s.onerror=s.onload=null,clearTimeout(p);var i=e[r];if(delete e[r],s.parentNode&&s.parentNode.removeChild(s),i&&i.forEach((e=>e(n))),t)return t(n)},p=setTimeout(h.bind(null,void 0,{type:"timeout",target:s}),12e4);s.onerror=h.bind(null,s.onerror),s.onload=h.bind(null,s.onload),c&&document.head.appendChild(s)}},i.r=e=>{"undefined"!=typeof Symbol&&Symbol.toStringTag&&Object.defineProperty(e,Symbol.toStringTag,{value:"Module"}),Object.defineProperty(e,"__esModule",{value:!0})},i.p="https://js-agent.newrelic.com/",(()=>{var e={38:0,788:0};i.f.j=(t,r)=>{var n=i.o(e,t)?e[t]:void 0;if(0!==n)if(n)r.push(n[2]);else{var o=new Promise(((r,i)=>n=e[t]=[r,i]));r.push(n[2]=o);var a=i.p+i.u(t),s=new Error;i.l(a,(r=>{if(i.o(e,t)&&(0!==(n=e[t])&&(e[t]=void 0),n)){var o=r&&("load"===r.type?"missing":r.type),a=r&&r.target&&r.target.src;s.message="Loading chunk "+t+" failed.\n("+o+": "+a+")",s.name="ChunkLoadError",s.type=o,s.request=a,n[1](s)}}),"chunk-"+t,t)}};var t=(t,r)=>{var n,o,[a,s,c]=r,u=0;if(a.some((t=>0!==e[t]))){for(n in s)i.o(s,n)&&(i.m[n]=s[n]);if(c)c(i)}for(t&&t(r);u<a.length;u++)o=a[u],i.o(e,o)&&e[o]&&e[o][0](),e[o]=0},r=self["webpackChunk:NRBA-1.274.0.PROD"]=self["webpackChunk:NRBA-1.274.0.PROD"]||[];r.forEach(t.bind(null,0)),r.push=t.bind(null,r.push.bind(r))})(),(()=>{"use strict";i(8374);var e=i(944),t=i(6344),r=i(9566);class n{agentIdentifier;constructor(e=(0,r.LA)(16)){this.agentIdentifier=e}#e(t,...r){if("function"==typeof this.api?.[t])return this.api[t](...r);(0,e.R)(35,t)}addPageAction(e,t){return this.#e("addPageAction",e,t)}setPageViewName(e,t){return this.#e("setPageViewName",e,t)}setCustomAttribute(e,t,r){return this.#e("setCustomAttribute",e,t,r)}noticeError(e,t){return this.#e("noticeError",e,t)}setUserId(e){return this.#e("setUserId",e)}setApplicationVersion(e){return this.#e("setApplicationVersion",e)}setErrorHandler(e){return this.#e("setErrorHandler",e)}addRelease(e,t){return this.#e("addRelease",e,t)}log(e,t){return this.#e("log",e,t)}}class o extends n{#e(t,...r){if("function"==typeof this.api?.[t])return this.api[t](...r);(0,e.R)(35,t)}start(){return this.#e("start")}finished(e){return this.#e("finished",e)}recordReplay(){return this.#e(t.G4.RECORD)}pauseReplay(){return this.#e(t.G4.PAUSE)}addToTrace(e){return this.#e("addToTrace",e)}setCurrentRouteName(e){return this.#e("setCurrentRouteName",e)}interaction(){return this.#e("interaction")}wrapLogger(e,t,r){return this.#e("wrapLogger",e,t,r)}}var a=i(860),s=i(9417);const c=Object.values(a.K7);function u(e){const t={};return c.forEach((r=>{t[r]=function(e,t){return!0===(0,s.gD)(t,"".concat(e,".enabled"))}(r,e)})),t}var d=i(425);var l=i(1687),f=i(4234),h=i(5289),p=i(6154),g=i(5270),m=i(7767),v=i(6389);class b extends f.W{constructor(e,t,r=!0){super(e.agentIdentifier,t),this.auto=r,this.abortHandler=void 0,this.featAggregate=void 0,this.onAggregateImported=void 0,!1===e.init[this.featureName].autoStart&&(this.auto=!1),this.auto?(0,l.Ak)(e.agentIdentifier,t):this.ee.on("manual-start-all",(0,v.J)((()=>{(0,l.Ak)(e.agentIdentifier,this.featureName),this.auto=!0,this.importAggregator(e)})))}importAggregator(t,r={}){if(this.featAggregate||!this.auto)return;let n;this.onAggregateImported=new Promise((e=>{n=e}));const o=async()=>{let o;try{if((0,m.V)(this.agentIdentifier)){const{setupAgentSession:e}=await i.e(478).then(i.bind(i,6526));o=e(t)}}catch(t){(0,e.R)(20,t),this.ee.emit("internal-error",[t]),this.featureName===a.K7.sessionReplay&&this.abortHandler?.()}try{if(t.sharedAggregator)await t.sharedAggregator;else{t.sharedAggregator=i.e(478).then(i.bind(i,9337));const{EventAggregator:e}=await t.sharedAggregator;t.sharedAggregator=new e}if(!this.#t(this.featureName,o))return(0,l.Ze)(this.agentIdentifier,this.featureName),void n(!1);const{lazyFeatureLoader:e}=await i.e(478).then(i.bind(i,6103)),{Aggregate:a}=await e(this.featureName,"aggregate");this.featAggregate=new a(t,r),n(!0)}catch(t){(0,e.R)(34,t),this.abortHandler?.(),(0,l.Ze)(this.agentIdentifier,this.featureName,!0),n(!1),this.ee&&this.ee.abort()}};p.RI?(0,h.GG)((()=>o()),!0):o()}#t(e,t){switch(e){case a.K7.sessionReplay:return(0,g.SR)(this.agentIdentifier)&&!!t;case a.K7.sessionTrace:return!!t;default:return!0}}}var y=i(6630);class w extends b{static featureName=y.T;constructor(e,t=!0){super(e,y.T,t),this.importAggregator(e)}}var R=i(384);var x=i(9908),T=i(2843),A=i(3878),E=i(782),S=i(1863);class N extends b{static featureName=E.T;constructor(e,t=!0){super(e,E.T,t),p.RI&&((0,T.u)((()=>(0,x.p)("docHidden",[(0,S.t)()],void 0,E.T,this.ee)),!0),(0,A.sp)("pagehide",(()=>(0,x.p)("winPagehide",[(0,S.t)()],void 0,E.T,this.ee))),this.importAggregator(e))}}var O=i(3969);class _ extends b{static featureName=O.TZ;constructor(e,t=!0){super(e,O.TZ,t),this.importAggregator(e)}}var I=i(6774),j=i(3304);class P{constructor(e,t,r,n,i){this.name="UncaughtError",this.message="string"==typeof e?e:(0,j.A)(e),this.sourceURL=t,this.line=r,this.column=n,this.__newrelic=i}}function C(e){return H(e)?e:new P(void 0!==e?.message?e.message:e,e?.filename||e?.sourceURL,e?.lineno||e?.line,e?.colno||e?.col,e?.__newrelic)}function k(e){const t="Unhandled Promise Rejection";if(!e?.reason)return;if(H(e.reason))try{return e.reason.message=t+": "+e.reason.message,C(e.reason)}catch(t){return C(e.reason)}const r=C(e.reason);return r.message=t+": "+r?.message,r}function L(e){if(e.error instanceof SyntaxError&&!/:\d+$/.test(e.error.stack?.trim())){const t=new P(e.message,e.filename,e.lineno,e.colno,e.error.__newrelic);return t.name=SyntaxError.name,t}return H(e.error)?e.error:C(e)}function H(e){return e instanceof Error&&!!e.stack}class D extends b{static featureName=I.T;#r=!1;constructor(e,r=!0){super(e,I.T,r);try{this.removeOnAbort=new AbortController}catch(e){}this.ee.on("internal-error",(e=>{this.abortHandler&&(0,x.p)("ierr",[C(e),(0,S.t)(),!0,{},this.#r],void 0,this.featureName,this.ee)})),this.ee.on(t.G4.REPLAY_RUNNING,(e=>{this.#r=e})),p.gm.addEventListener("unhandledrejection",(e=>{this.abortHandler&&(0,x.p)("err",[k(e),(0,S.t)(),!1,{unhandledPromiseRejection:1},this.#r],void 0,this.featureName,this.ee)}),(0,A.jT)(!1,this.removeOnAbort?.signal)),p.gm.addEventListener("error",(e=>{this.abortHandler&&(0,x.p)("err",[L(e),(0,S.t)(),!1,{},this.#r],void 0,this.featureName,this.ee)}),(0,A.jT)(!1,this.removeOnAbort?.signal)),this.abortHandler=this.#n,this.importAggregator(e)}#n(){this.removeOnAbort?.abort(),this.abortHandler=void 0}}var M=i(8990);let K=1;const U="nr@id";function V(e){const t=typeof e;return!e||"object"!==t&&"function"!==t?-1:e===p.gm?0:(0,M.I)(e,U,(function(){return K++}))}function G(e){if("string"==typeof e&&e.length)return e.length;if("object"==typeof e){if("undefined"!=typeof ArrayBuffer&&e instanceof ArrayBuffer&&e.byteLength)return e.byteLength;if("undefined"!=typeof Blob&&e instanceof Blob&&e.size)return e.size;if(!("undefined"!=typeof FormData&&e instanceof FormData))try{return(0,j.A)(e).length}catch(e){return}}}var F=i(8139),B=i(7836),W=i(3434);const z={},q=["open","send"];function Z(t){var r=t||B.ee;const n=function(e){return(e||B.ee).get("xhr")}(r);if(z[n.debugId]++)return n;z[n.debugId]=1,(0,F.u)(r);var i=(0,W.YM)(n),o=p.gm.XMLHttpRequest,a=p.gm.MutationObserver,s=p.gm.Promise,c=p.gm.setInterval,u="readystatechange",d=["onload","onerror","onabort","onloadstart","onloadend","onprogress","ontimeout"],l=[],f=p.gm.XMLHttpRequest=function(t){const r=new o(t),a=n.context(r);try{n.emit("new-xhr",[r],a),r.addEventListener(u,(s=a,function(){var e=this;e.readyState>3&&!s.resolved&&(s.resolved=!0,n.emit("xhr-resolved",[],e)),i.inPlace(e,d,"fn-",y)}),(0,A.jT)(!1))}catch(t){(0,e.R)(15,t);try{n.emit("internal-error",[t])}catch(e){}}var s;return r};function h(e,t){i.inPlace(t,["onreadystatechange"],"fn-",y)}if(function(e,t){for(var r in e)t[r]=e[r]}(o,f),f.prototype=o.prototype,i.inPlace(f.prototype,q,"-xhr-",y),n.on("send-xhr-start",(function(e,t){h(e,t),function(e){l.push(e),a&&(g?g.then(b):c?c(b):(m=-m,v.data=m))}(t)})),n.on("open-xhr-start",h),a){var g=s&&s.resolve();if(!c&&!s){var m=1,v=document.createTextNode(m);new a(b).observe(v,{characterData:!0})}}else r.on("fn-end",(function(e){e[0]&&e[0].type===u||b()}));function b(){for(var e=0;e<l.length;e++)h(0,l[e]);l.length&&(l=[])}function y(e,t){return t}return n}var Y="fetch-",X=Y+"body-",J=["arrayBuffer","blob","json","text","formData"],Q=p.gm.Request,ee=p.gm.Response,te="prototype";const re={};function ne(e){const t=function(e){return(e||B.ee).get("fetch")}(e);if(!(Q&&ee&&p.gm.fetch))return t;if(re[t.debugId]++)return t;function r(e,r,n){var i=e[r];"function"==typeof i&&(e[r]=function(){var e,r=[...arguments],o={};t.emit(n+"before-start",[r],o),o[B.P]&&o[B.P].dt&&(e=o[B.P].dt);var a=i.apply(this,r);return t.emit(n+"start",[r,e],a),a.then((function(e){return t.emit(n+"end",[null,e],a),e}),(function(e){throw t.emit(n+"end",[e],a),e}))})}return re[t.debugId]=1,J.forEach((e=>{r(Q[te],e,X),r(ee[te],e,X)})),r(p.gm,"fetch",Y),t.on(Y+"end",(function(e,r){var n=this;if(r){var i=r.headers.get("content-length");null!==i&&(n.rxSize=i),t.emit(Y+"done",[null,r],n)}else t.emit(Y+"done",[e],n)})),t}var ie=i(7485),oe=i(5603);class ae{constructor(e){this.agentIdentifier=e}generateTracePayload(e){if(!this.shouldGenerateTrace(e))return null;var t=(0,oe.o)(this.agentIdentifier);if(!t)return null;var n=(t.accountID||"").toString()||null,i=(t.agentID||"").toString()||null,o=(t.trustKey||"").toString()||null;if(!n||!i)return null;var a=(0,r.ZF)(),s=(0,r.el)(),c=Date.now(),u={spanId:a,traceId:s,timestamp:c};return(e.sameOrigin||this.isAllowedOrigin(e)&&this.useTraceContextHeadersForCors())&&(u.traceContextParentHeader=this.generateTraceContextParentHeader(a,s),u.traceContextStateHeader=this.generateTraceContextStateHeader(a,c,n,i,o)),(e.sameOrigin&&!this.excludeNewrelicHeader()||!e.sameOrigin&&this.isAllowedOrigin(e)&&this.useNewrelicHeaderForCors())&&(u.newrelicHeader=this.generateTraceHeader(a,s,c,n,i,o)),u}generateTraceContextParentHeader(e,t){return"00-"+t+"-"+e+"-01"}generateTraceContextStateHeader(e,t,r,n,i){return i+"@nr=0-1-"+r+"-"+n+"-"+e+"----"+t}generateTraceHeader(e,t,r,n,i,o){if(!("function"==typeof p.gm?.btoa))return null;var a={v:[0,1],d:{ty:"Browser",ac:n,ap:i,id:e,tr:t,ti:r}};return o&&n!==o&&(a.d.tk=o),btoa((0,j.A)(a))}shouldGenerateTrace(e){return this.isDtEnabled()&&this.isAllowedOrigin(e)}isAllowedOrigin(e){var t=!1,r={};if((0,s.gD)(this.agentIdentifier,"distributed_tracing")&&(r=(0,s.D0)(this.agentIdentifier).distributed_tracing),e.sameOrigin)t=!0;else if(r.allowed_origins instanceof Array)for(var n=0;n<r.allowed_origins.length;n++){var i=(0,ie.D)(r.allowed_origins[n]);if(e.hostname===i.hostname&&e.protocol===i.protocol&&e.port===i.port){t=!0;break}}return t}isDtEnabled(){var e=(0,s.gD)(this.agentIdentifier,"distributed_tracing");return!!e&&!!e.enabled}excludeNewrelicHeader(){var e=(0,s.gD)(this.agentIdentifier,"distributed_tracing");return!!e&&!!e.exclude_newrelic_header}useNewrelicHeaderForCors(){var e=(0,s.gD)(this.agentIdentifier,"distributed_tracing");return!!e&&!1!==e.cors_use_newrelic_header}useTraceContextHeadersForCors(){var e=(0,s.gD)(this.agentIdentifier,"distributed_tracing");return!!e&&!!e.cors_use_tracecontext_headers}}var se=i(9300),ce=i(7295),ue=["load","error","abort","timeout"],de=ue.length,le=(0,R.dV)().o.REQ,fe=(0,R.dV)().o.XHR;class he extends b{static featureName=se.T;constructor(e,t=!0){super(e,se.T,t),this.dt=new ae(e.agentIdentifier),this.handler=(e,t,r,n)=>(0,x.p)(e,t,r,n,this.ee);try{const e={xmlhttprequest:"xhr",fetch:"fetch",beacon:"beacon"};p.gm?.performance?.getEntriesByType("resource").forEach((t=>{if(t.initiatorType in e&&0!==t.responseStatus){const r={status:t.responseStatus},n={rxSize:t.transferSize,duration:Math.floor(t.duration),cbTime:0};pe(r,t.name),this.handler("xhr",[r,n,t.startTime,t.responseEnd,e[t.initiatorType]],void 0,a.K7.ajax)}}))}catch(e){}ne(this.ee),Z(this.ee),function(e,t,r,n){function i(e){var t=this;t.totalCbs=0,t.called=0,t.cbTime=0,t.end=R,t.ended=!1,t.xhrGuids={},t.lastSize=null,t.loadCaptureCalled=!1,t.params=this.params||{},t.metrics=this.metrics||{},e.addEventListener("load",(function(r){T(t,e)}),(0,A.jT)(!1)),p.lR||e.addEventListener("progress",(function(e){t.lastSize=e.loaded}),(0,A.jT)(!1))}function o(e){this.params={method:e[0]},pe(this,e[1]),this.metrics={}}function s(t,r){e.loader_config.xpid&&this.sameOrigin&&r.setRequestHeader("X-NewRelic-ID",e.loader_config.xpid);var i=n.generateTracePayload(this.parsedOrigin);if(i){var o=!1;i.newrelicHeader&&(r.setRequestHeader("newrelic",i.newrelicHeader),o=!0),i.traceContextParentHeader&&(r.setRequestHeader("traceparent",i.traceContextParentHeader),i.traceContextStateHeader&&r.setRequestHeader("tracestate",i.traceContextStateHeader),o=!0),o&&(this.dt=i)}}function c(e,r){var n=this.metrics,i=e[0],o=this;if(n&&i){var a=G(i);a&&(n.txSize=a)}this.startTime=(0,S.t)(),this.body=i,this.listener=function(e){try{"abort"!==e.type||o.loadCaptureCalled||(o.params.aborted=!0),("load"!==e.type||o.called===o.totalCbs&&(o.onloadCalled||"function"!=typeof r.onload)&&"function"==typeof o.end)&&o.end(r)}catch(e){try{t.emit("internal-error",[e])}catch(e){}}};for(var s=0;s<de;s++)r.addEventListener(ue[s],this.listener,(0,A.jT)(!1))}function u(e,t,r){this.cbTime+=e,t?this.onloadCalled=!0:this.called+=1,this.called!==this.totalCbs||!this.onloadCalled&&"function"==typeof r.onload||"function"!=typeof this.end||this.end(r)}function d(e,t){var r=""+V(e)+!!t;this.xhrGuids&&!this.xhrGuids[r]&&(this.xhrGuids[r]=!0,this.totalCbs+=1)}function l(e,t){var r=""+V(e)+!!t;this.xhrGuids&&this.xhrGuids[r]&&(delete this.xhrGuids[r],this.totalCbs-=1)}function f(){this.endTime=(0,S.t)()}function h(e,r){r instanceof fe&&"load"===e[0]&&t.emit("xhr-load-added",[e[1],e[2]],r)}function g(e,r){r instanceof fe&&"load"===e[0]&&t.emit("xhr-load-removed",[e[1],e[2]],r)}function m(e,t,r){t instanceof fe&&("onload"===r&&(this.onload=!0),("load"===(e[0]&&e[0].type)||this.onload)&&(this.xhrCbStart=(0,S.t)()))}function v(e,r){this.xhrCbStart&&t.emit("xhr-cb-time",[(0,S.t)()-this.xhrCbStart,this.onload,r],r)}function b(e){var t,r=e[1]||{};if("string"==typeof e[0]?0===(t=e[0]).length&&p.RI&&(t=""+p.gm.location.href):e[0]&&e[0].url?t=e[0].url:p.gm?.URL&&e[0]&&e[0]instanceof URL?t=e[0].href:"function"==typeof e[0].toString&&(t=e[0].toString()),"string"==typeof t&&0!==t.length){t&&(this.parsedOrigin=(0,ie.D)(t),this.sameOrigin=this.parsedOrigin.sameOrigin);var i=n.generateTracePayload(this.parsedOrigin);if(i&&(i.newrelicHeader||i.traceContextParentHeader))if(e[0]&&e[0].headers)s(e[0].headers,i)&&(this.dt=i);else{var o={};for(var a in r)o[a]=r[a];o.headers=new Headers(r.headers||{}),s(o.headers,i)&&(this.dt=i),e.length>1?e[1]=o:e.push(o)}}function s(e,t){var r=!1;return t.newrelicHeader&&(e.set("newrelic",t.newrelicHeader),r=!0),t.traceContextParentHeader&&(e.set("traceparent",t.traceContextParentHeader),t.traceContextStateHeader&&e.set("tracestate",t.traceContextStateHeader),r=!0),r}}function y(e,t){this.params={},this.metrics={},this.startTime=(0,S.t)(),this.dt=t,e.length>=1&&(this.target=e[0]),e.length>=2&&(this.opts=e[1]);var r,n=this.opts||{},i=this.target;"string"==typeof i?r=i:"object"==typeof i&&i instanceof le?r=i.url:p.gm?.URL&&"object"==typeof i&&i instanceof URL&&(r=i.href),pe(this,r);var o=(""+(i&&i instanceof le&&i.method||n.method||"GET")).toUpperCase();this.params.method=o,this.body=n.body,this.txSize=G(n.body)||0}function w(e,t){if(this.endTime=(0,S.t)(),this.params||(this.params={}),(0,ce.iW)(this.params))return;let n;this.params.status=t?t.status:0,"string"==typeof this.rxSize&&this.rxSize.length>0&&(n=+this.rxSize);const i={txSize:this.txSize,rxSize:n,duration:(0,S.t)()-this.startTime};r("xhr",[this.params,i,this.startTime,this.endTime,"fetch"],this,a.K7.ajax)}function R(e){const t=this.params,n=this.metrics;if(!this.ended){this.ended=!0;for(let t=0;t<de;t++)e.removeEventListener(ue[t],this.listener,!1);t.aborted||(0,ce.iW)(t)||(n.duration=(0,S.t)()-this.startTime,this.loadCazptureCalled||4!==e.readyState?null==t.status&&(t.status=0):T(this,e),n.cbTime=this.cbTime,r("xhr",[t,n,this.startTime,this.endTime,"xhr"],this,a.K7.ajax))}}function T(e,r){e.params.status=r.status;var n=function(e,t){var r=e.responseType;return"json"===r&&null!==t?t:"arraybuffer"===r||"blob"===r||"json"===r?G(e.response):"text"===r||""===r||void 0===r?G(e.responseText):void 0}(r,e.lastSize);if(n&&(e.metrics.rxSize=n),e.sameOrigin){var i=r.getResponseHeader("X-NewRelic-App-Data");i&&((0,x.p)(O.rs,["Ajax/CrossApplicationTracing/Header/Seen"],void 0,a.K7.metrics,t),e.params.cat=i.split(", ").pop())}e.loadCaptureCalled=!0}t.on("new-xhr",i),t.on("open-xhr-start",o),t.on("open-xhr-end",s),t.on("send-xhr-start",c),t.on("xhr-cb-time",u),t.on("xhr-load-added",d),t.on("xhr-load-removed",l),t.on("xhr-resolved",f),t.on("addEventListener-end",h),t.on("removeEventListener-end",g),t.on("fn-end",v),t.on("fetch-before-start",b),t.on("fetch-start",y),t.on("fn-start",m),t.on("fetch-done",w)}(e,this.ee,this.handler,this.dt),this.importAggregator(e)}}function pe(e,t){var r=(0,ie.D)(t),n=e.params||e;n.hostname=r.hostname,n.port=r.port,n.protocol=r.protocol,n.host=r.hostname+":"+r.port,n.pathname=r.pathname,e.parsedOrigin=r,e.sameOrigin=r.sameOrigin}const ge={},me=["pushState","replaceState"];function ve(e){const t=function(e){return(e||B.ee).get("history")}(e);return!p.RI||ge[t.debugId]++||(ge[t.debugId]=1,(0,W.YM)(t).inPlace(window.history,me,"-")),t}var be=i(3738);const{He:ye,bD:we,d3:Re,Kp:xe,TZ:Te,Lc:Ae,uP:Ee,Rz:Se}=be;class Ne extends b{static featureName=Te;constructor(e,t=!0){super(e,Te,t);if(!(0,m.V)(this.agentIdentifier))return void this.deregisterDrain();const r=this.ee;let n;ve(r),this.eventsEE=(0,F.u)(r),this.eventsEE.on(Ee,(function(e,t){this.bstStart=(0,S.t)()})),this.eventsEE.on(Ae,(function(e,t){(0,x.p)("bst",[e[0],t,this.bstStart,(0,S.t)()],void 0,a.K7.sessionTrace,r)})),r.on(Se+Re,(function(e){this.time=(0,S.t)(),this.startPath=location.pathname+location.hash})),r.on(Se+xe,(function(e){(0,x.p)("bstHist",[location.pathname+location.hash,this.startPath,this.time],void 0,a.K7.sessionTrace,r)}));try{n=new PerformanceObserver((e=>{const t=e.getEntries();(0,x.p)(ye,[t],void 0,a.K7.sessionTrace,r)})),n.observe({type:we,buffered:!0})}catch(e){}this.importAggregator(e,{resourceObserver:n})}}var Oe=i(2614);class _e extends b{static featureName=t.TZ;#i;#o;constructor(e,r=!0){let n;super(e,t.TZ,r),this.replayRunning=!1,this.#o=e;try{n=JSON.parse(localStorage.getItem("".concat(Oe.H3,"_").concat(Oe.uh)))}catch(e){}(0,g.SR)(e.agentIdentifier)&&this.ee.on(t.G4.RECORD,(()=>this.#a())),this.#s(n)?(this.#i=n?.sessionReplayMode,this.#c()):this.importAggregator(e),this.ee.on("err",(e=>{this.replayRunning&&(this.errorNoticed=!0,(0,x.p)(t.G4.ERROR_DURING_REPLAY,[e],void 0,this.featureName,this.ee))})),this.ee.on(t.G4.REPLAY_RUNNING,(e=>{this.replayRunning=e}))}#s(e){return e&&(e.sessionReplayMode===Oe.g.FULL||e.sessionReplayMode===Oe.g.ERROR)||(0,g.Aw)(this.agentIdentifier)}#u=!1;async#c(e){if(!this.#u){this.#u=!0;try{const{Recorder:t}=await Promise.all([i.e(478),i.e(249)]).then(i.bind(i,8589));this.recorder??=new t({mode:this.#i,agentIdentifier:this.agentIdentifier,trigger:e,ee:this.ee}),this.recorder.startRecording(),this.abortHandler=this.recorder.stopRecording}catch(e){}this.importAggregator(this.#o,{recorder:this.recorder,errorNoticed:this.errorNoticed})}}#a(){this.featAggregate?this.featAggregate.mode!==Oe.g.FULL&&this.featAggregate.initializeRecording(Oe.g.FULL,!0):(this.#i=Oe.g.FULL,this.#c(t.Qb.API),this.recorder&&this.recorder.parent.mode!==Oe.g.FULL&&(this.recorder.parent.mode=Oe.g.FULL,this.recorder.stopRecording(),this.recorder.startRecording(),this.abortHandler=this.recorder.stopRecording))}}var Ie=i(3962);class je extends b{static featureName=Ie.TZ;constructor(e,t=!0){if(super(e,Ie.TZ,t),!p.RI||!(0,R.dV)().o.MO)return;const r=ve(this.ee);Ie.tC.forEach((e=>{(0,A.sp)(e,(e=>{a(e)}),!0)}));const n=()=>(0,x.p)("newURL",[(0,S.t)(),""+window.location],void 0,this.featureName,this.ee);r.on("pushState-end",n),r.on("replaceState-end",n);try{this.removeOnAbort=new AbortController}catch(e){}(0,A.sp)("popstate",(e=>(0,x.p)("newURL",[e.timeStamp,""+window.location],void 0,this.featureName,this.ee)),!0,this.removeOnAbort?.signal);let i=!1;const o=new((0,R.dV)().o.MO)(((e,t)=>{i||(i=!0,requestAnimationFrame((()=>{(0,x.p)("newDom",[(0,S.t)()],void 0,this.featureName,this.ee),i=!1})))})),a=(0,v.s)((e=>{(0,x.p)("newUIEvent",[e],void 0,this.featureName,this.ee),o.observe(document.body,{attributes:!0,childList:!0,subtree:!0,characterData:!0})}),100,{leading:!0});this.abortHandler=function(){this.removeOnAbort?.abort(),o.disconnect(),this.abortHandler=void 0},this.importAggregator(e,{domObserver:o})}}var Pe=i(7378);const Ce={},ke=["appendChild","insertBefore","replaceChild"];function Le(e){const t=function(e){return(e||B.ee).get("jsonp")}(e);if(!p.RI||Ce[t.debugId])return t;Ce[t.debugId]=!0;var r=(0,W.YM)(t),n=/[?&](?:callback|cb)=([^&#]+)/,i=/(.*)\.([^.]+)/,o=/^(\w+)(\.|$)(.*)$/;function a(e,t){if(!e)return t;const r=e.match(o),n=r[1];return a(r[3],t[n])}return r.inPlace(Node.prototype,ke,"dom-"),t.on("dom-start",(function(e){!function(e){if(!e||"string"!=typeof e.nodeName||"script"!==e.nodeName.toLowerCase())return;if("function"!=typeof e.addEventListener)return;var o=(s=e.src,c=s.match(n),c?c[1]:null);var s,c;if(!o)return;var u=function(e){var t=e.match(i);if(t&&t.length>=3)return{key:t[2],parent:a(t[1],window)};return{key:e,parent:window}}(o);if("function"!=typeof u.parent[u.key])return;var d={};function l(){t.emit("jsonp-end",[],d),e.removeEventListener("load",l,(0,A.jT)(!1)),e.removeEventListener("error",f,(0,A.jT)(!1))}function f(){t.emit("jsonp-error",[],d),t.emit("jsonp-end",[],d),e.removeEventListener("load",l,(0,A.jT)(!1)),e.removeEventListener("error",f,(0,A.jT)(!1))}r.inPlace(u.parent,[u.key],"cb-",d),e.addEventListener("load",l,(0,A.jT)(!1)),e.addEventListener("error",f,(0,A.jT)(!1)),t.emit("new-jsonp",[e.src],d)}(e[0])})),t}const He={};function De(e){const t=function(e){return(e||B.ee).get("promise")}(e);if(He[t.debugId])return t;He[t.debugId]=!0;var r=t.context,n=(0,W.YM)(t),i=p.gm.Promise;return i&&function(){function e(r){var o=t.context(),a=n(r,"executor-",o,null,!1);const s=Reflect.construct(i,[a],e);return t.context(s).getCtx=function(){return o},s}p.gm.Promise=e,Object.defineProperty(e,"name",{value:"Promise"}),e.toString=function(){return i.toString()},Object.setPrototypeOf(e,i),["all","race"].forEach((function(r){const n=i[r];e[r]=function(e){let i=!1;[...e||[]].forEach((e=>{this.resolve(e).then(a("all"===r),a(!1))}));const o=n.apply(this,arguments);return o;function a(e){return function(){t.emit("propagate",[null,!i],o,!1,!1),i=i||!e}}}})),["resolve","reject"].forEach((function(r){const n=i[r];e[r]=function(e){const r=n.apply(this,arguments);return e!==r&&t.emit("propagate",[e,!0],r,!1,!1),r}})),e.prototype=i.prototype;const o=i.prototype.then;i.prototype.then=function(...e){var i=this,a=r(i);a.promise=i,e[0]=n(e[0],"cb-",a,null,!1),e[1]=n(e[1],"cb-",a,null,!1);const s=o.apply(this,e);return a.nextPromise=s,t.emit("propagate",[i,!0],s,!1,!1),s},i.prototype.then[W.Jt]=o,t.on("executor-start",(function(e){e[0]=n(e[0],"resolve-",this,null,!1),e[1]=n(e[1],"resolve-",this,null,!1)})),t.on("executor-err",(function(e,t,r){e[1](r)})),t.on("cb-end",(function(e,r,n){t.emit("propagate",[n,!0],this.nextPromise,!1,!1)})),t.on("propagate",(function(e,r,n){this.getCtx&&!r||(this.getCtx=function(){if(e instanceof Promise)var r=t.context(e);return r&&r.getCtx?r.getCtx():this})}))}(),t}const Me={},Ke="setTimeout",Ue="setInterval",Ve="clearTimeout",Ge="-start",Fe=[Ke,"setImmediate",Ue,Ve,"clearImmediate"];function Be(e){const t=function(e){return(e||B.ee).get("timer")}(e);if(Me[t.debugId]++)return t;Me[t.debugId]=1;var r=(0,W.YM)(t);return r.inPlace(p.gm,Fe.slice(0,2),Ke+"-"),r.inPlace(p.gm,Fe.slice(2,3),Ue+"-"),r.inPlace(p.gm,Fe.slice(3),Ve+"-"),t.on(Ue+Ge,(function(e,t,n){e[0]=r(e[0],"fn-",null,n)})),t.on(Ke+Ge,(function(e,t,n){this.method=n,this.timerDuration=isNaN(e[1])?0:+e[1],e[0]=r(e[0],"fn-",this,n)})),t}const We={};function ze(e){const t=function(e){return(e||B.ee).get("mutation")}(e);if(!p.RI||We[t.debugId])return t;We[t.debugId]=!0;var r=(0,W.YM)(t),n=p.gm.MutationObserver;return n&&(window.MutationObserver=function(e){return this instanceof n?new n(r(e,"fn-")):n.apply(this,arguments)},MutationObserver.prototype=n.prototype),t}const{TZ:qe,d3:Ze,Kp:Ye,$p:Xe,wW:Je,e5:Qe,tH:$e,uP:et,rw:tt,Lc:rt}=Pe;class nt extends b{static featureName=qe;constructor(e,t=!0){if(super(e,qe,t),!p.RI)return;try{this.removeOnAbort=new AbortController}catch(e){}let r,n=0;const i=this.ee.get("tracer"),o=Le(this.ee),a=De(this.ee),s=Be(this.ee),c=Z(this.ee),u=this.ee.get("events"),d=ne(this.ee),l=ve(this.ee),f=ze(this.ee);function h(e,t){l.emit("newURL",[""+window.location,t])}function g(){n++,r=window.location.hash,this[et]=(0,S.t)()}function m(){n--,window.location.hash!==r&&h(0,!0);var e=(0,S.t)();this[Qe]=~~this[Qe]+e-this[et],this[rt]=e}function v(e,t){e.on(t,(function(){this[t]=(0,S.t)()}))}this.ee.on(et,g),a.on(tt,g),o.on(tt,g),this.ee.on(rt,m),a.on(Je,m),o.on(Je,m),this.ee.on("fn-err",((...t)=>{t[2]?.__newrelic?.[e.agentIdentifier]||(0,x.p)("function-err",[...t],void 0,this.featureName,this.ee)})),this.ee.buffer([et,rt,"xhr-resolved"],this.featureName),u.buffer([et],this.featureName),s.buffer(["setTimeout"+Ye,"clearTimeout"+Ze,et],this.featureName),c.buffer([et,"new-xhr","send-xhr"+Ze],this.featureName),d.buffer([$e+Ze,$e+"-done",$e+Xe+Ze,$e+Xe+Ye],this.featureName),l.buffer(["newURL"],this.featureName),f.buffer([et],this.featureName),a.buffer(["propagate",tt,Je,"executor-err","resolve"+Ze],this.featureName),i.buffer([et,"no-"+et],this.featureName),o.buffer(["new-jsonp","cb-start","jsonp-error","jsonp-end"],this.featureName),v(d,$e+Ze),v(d,$e+"-done"),v(o,"new-jsonp"),v(o,"jsonp-end"),v(o,"cb-start"),l.on("pushState-end",h),l.on("replaceState-end",h),window.addEventListener("hashchange",h,(0,A.jT)(!0,this.removeOnAbort?.signal)),window.addEventListener("load",h,(0,A.jT)(!0,this.removeOnAbort?.signal)),window.addEventListener("popstate",(function(){h(0,n>1)}),(0,A.jT)(!0,this.removeOnAbort?.signal)),this.abortHandler=this.#n,this.importAggregator(e)}#n(){this.removeOnAbort?.abort(),this.abortHandler=void 0}}var it=i(3333);class ot extends b{static featureName=it.TZ;constructor(e,t=!0){super(e,it.TZ,t);const r=[e.init.page_action.enabled,e.init.performance.capture_marks,e.init.performance.capture_measures,e.init.user_actions.enabled];p.RI&&e.init.user_actions.enabled&&(it.Zp.forEach((e=>(0,A.sp)(e,(e=>(0,x.p)("ua",[e],void 0,this.featureName,this.ee)),!0))),it.qN.forEach((e=>(0,A.sp)(e,(e=>(0,x.p)("ua",[e],void 0,this.featureName,this.ee)))))),r.some((e=>e))?this.importAggregator(e):this.deregisterDrain()}}var at=i(993),st=i(3785);class ct extends b{static featureName=at.TZ;constructor(e,t=!0){super(e,at.TZ,t);const r=this.ee;this.ee.on("wrap-logger-end",(function([e]){const{level:t,customAttributes:n}=this;(0,st.R)(r,e,n,t)})),this.importAggregator(e)}}new class extends o{constructor(t,r){super(r),p.gm?(this.features={},(0,R.bQ)(this.agentIdentifier,this),this.desiredFeatures=new Set(t.features||[]),this.desiredFeatures.add(w),this.runSoftNavOverSpa=[...this.desiredFeatures].some((e=>e.featureName===a.K7.softNav)),(0,d.j)(this,t,t.loaderType||"agent"),this.run()):(0,e.R)(21)}get config(){return{info:this.info,init:this.init,loader_config:this.loader_config,runtime:this.runtime}}run(){try{const t=u(this.agentIdentifier),r=[...this.desiredFeatures];r.sort(((e,t)=>a.P3[e.featureName]-a.P3[t.featureName])),r.forEach((r=>{if(!t[r.featureName]&&r.featureName!==a.K7.pageViewEvent)return;if(this.runSoftNavOverSpa&&r.featureName===a.K7.spa)return;if(!this.runSoftNavOverSpa&&r.featureName===a.K7.softNav)return;const n=function(e){switch(e){case a.K7.ajax:return[a.K7.jserrors];case a.K7.sessionTrace:return[a.K7.ajax,a.K7.pageViewEvent];case a.K7.sessionReplay:return[a.K7.sessionTrace];case a.K7.pageViewTiming:return[a.K7.pageViewEvent];default:return[]}}(r.featureName).filter((e=>!(e in this.features)));n.length>0&&(0,e.R)(36,{targetFeature:r.featureName,missingDependencies:n}),this.features[r.featureName]=new r(this)}))}catch(t){(0,e.R)(22,t);for(const e in this.features)this.features[e].abortHandler?.();const r=(0,R.Zm)();delete r.initializedAgents[this.agentIdentifier]?.api,delete r.initializedAgents[this.agentIdentifier]?.features,delete this.sharedAggregator;return r.ee.get(this.agentIdentifier).abort(),!1}}}({features:[he,w,N,Ne,_e,_,D,ot,ct,je,nt],loaderType:"spa"})})()})(); </script><link rel="preconnect" href="https://cdn.cookielaw.org"/><link rel="preconnect" href="https://fonts.gstatic.com" crossorigin="anonymous"/><link rel="preconnect" href="https://fonts.googleapis.com" crossorigin="anonymous"/><link rel="preconnect" href="https://www.googletagmanager.com"/><link rel="stylesheet" href="/build/_assets/styles.generated-IVZR5GKI.css"/><link rel="stylesheet" href="/build/_assets/brand.generated-Z52KH5ZS.css"/><link rel="stylesheet" href="https://fonts.googleapis.com/css2?family=Montserrat:ital,wght@0,400;0,500;0,600;0,700;1,400;1,500;1,600;1,700&display=swap"/><link rel="stylesheet" href="https://fonts.googleapis.com/css2?family=Montserrat:ital,wght@0,400;0,500;0,600;0,700;1,400;1,500;1,600;1,700&display=swap"/><link rel="icon" type="image/x-icon" href="/build/_assets/informationweek-PQYOD7JA.ico"/><noscript><style type="text/css">.gptHideContent { opacity: 1!important; }</style></noscript><script src="https://loader.bridged.media/bridged-agent.js"></script><script type="text/javascript" src="https://cdn.cookielaw.org/consent/db797727-a266-409f-983d-f30f1926b3fb/OtAutoBlock.js"></script><script type="text/javascript" src="https://cdn.cookielaw.org/scripttemplates/otSDKStub.js" data-domain-script="db797727-a266-409f-983d-f30f1926b3fb"></script><script> function OptanonWrapper() { const isClosed = OneTrust.IsAlertBoxClosed() const allowPersonalised = /,C0004,/.test(OnetrustActiveGroups) console.log('cookieBannerConsentChanged emit', isClosed, allowPersonalised) const event = new CustomEvent('cookieBannerConsentChanged', { detail: { allowPersonalised, isClosed } }) window.dispatchEvent(event) }</script><link rel="preconnect" href="https://dev.visualwebsiteoptimizer.com"/><script type="text/javascript" id="vwoCode">window._vwo_code = window._vwo_code || (function () { var account_id = 775579, version = 1.5, settings_tolerance = 2000, library_tolerance = 2500, use_existing_jquery = false, is_spa = 1, hide_element = 'body', hide_element_style = 'opacity:0 !important;filter:alpha(opacity=0) !important;background:none !important',/* DO NOT EDIT BELOW THIS LINE */ f = false, d = document, vwoCodeEl = d.querySelector('#vwoCode'), code = { use_existing_jquery: function () { return use_existing_jquery }, library_tolerance: function () { return library_tolerance }, hide_element_style: function () { return '{' + hide_element_style + '}' }, finish: function () { if (!f) { f = true; var e = d.getElementById('_vis_opt_path_hides'); if (e) e.parentNode.removeChild(e) } }, finished: function () { return f }, load: function (e) { var t = d.createElement('script'); t.fetchPriority = 'high'; t.src = e; t.type = 'text/javascript'; t.onerror = function () { _vwo_code.finish() }; d.getElementsByTagName('head')[0].appendChild(t) }, getVersion: function () { return version }, getMatchedCookies: function (e) { var t = []; if (document.cookie) { t = document.cookie.match(e) || [] } return t }, getCombinationCookie: function () { var e = code.getMatchedCookies(/(?:^|;)\s?(_vis_opt_exp_\d+_combi=[^;$]*)/gi); e = e.map(function (e) { try { var t = decodeURIComponent(e); if (!/_vis_opt_exp_\d+_combi=(?:\d+,?)+\s*$/.test(t)) { return '' } return t } catch (e) { return '' } }); var i = []; e.forEach(function (e) { var t = e.match(/([\d,]+)/g); t && i.push(t.join('-')) }); return i.join('|') }, init: function () { if (d.URL.indexOf('__vwo_disable__') > -1) return; window.settings_timer = setTimeout(function () { _vwo_code.finish() }, settings_tolerance); var e = d.createElement('style'), t = hide_element ? hide_element + '{' + hide_element_style + '}' : '', i = d.getElementsByTagName('head')[0]; e.setAttribute('id', '_vis_opt_path_hides'); vwoCodeEl && e.setAttribute('nonce', vwoCodeEl.nonce); e.setAttribute('type', 'text/css'); if (e.styleSheet) e.styleSheet.cssText = t; else e.appendChild(d.createTextNode(t)); i.appendChild(e); var n = this.getCombinationCookie(); this.load('https://dev.visualwebsiteoptimizer.com/j.php?a=' + account_id + '&u=' + encodeURIComponent(d.URL) + '&f=' + +is_spa + '&vn=' + version + (n ? '&c=' + n : '')); return settings_timer } }; window._vwo_settings_timer = code.init(); return code; }()); </script><script async="" src="//static.adsafeprotected.com/iasPET.1.js"></script><script async="" src="https://securepubads.g.doubleclick.net/tag/js/gpt.js" type="text/javascript"></script></head><body class="brand-informationweek gptHideContent"><noscript></noscript><div id="bigsky_v"></div><div id="fb-root"></div><div id="welcome_v"></div><main data-theme="theme1" class="Provider"><div data-testid="ad_blocker" class="ads ad adsbox doubleclick ad-placement carbon-ads" style="height:1px;width:1px;position:absolute;left:-999em;top:-999em"></div><div><div data-template="layout" class="Layout"><nav data-module="navigation" aria-label="navigation" class="Navigation"><div data-testid="header" class="Navigation-HeaderWrapper"><div class="FullScreenBackground Navigation-HeaderBackground"></div><div class="Navigation-Header"><div class="InformaBar" data-component="informa-bar"><div class="InformaBar-ContentSection InformaBar-ContentSection_hidden" data-testid="informa-bar-content-section"><div class="InformaBar-LeftSection" data-testid="informa-bar-left-section"><div>InformationWeek is part of the Informa Tech Division of Informa PLC</div><div><a class="InformaBar-SubMenuItem" data-testid="informa-bar-sub-menu-item" href="https://www.informa.com/" title="Informa PLC" target="_blank" rel="noreferrer">Informa PLC</a><span class="InformaBar-Delimiter">|</span><a class="InformaBar-SubMenuItem" data-testid="informa-bar-sub-menu-item" href="https://www.informa.com/about-us/" title="ABOUT US" target="_blank" rel="noreferrer">ABOUT US</a><span class="InformaBar-Delimiter">|</span><a class="InformaBar-SubMenuItem" data-testid="informa-bar-sub-menu-item" href="https://www.informa.com/investors/" title="INVESTOR RELATIONS" target="_blank" rel="noreferrer">INVESTOR RELATIONS</a><span class="InformaBar-Delimiter">|</span><a class="InformaBar-SubMenuItem" data-testid="informa-bar-sub-menu-item" href="https://www.informa.com/talent/" title="TALENT" target="_blank" rel="noreferrer">TALENT</a></div></div><div class="InformaBar-RightSection" data-testid="informa-bar-right-section">This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.</div></div><div class="InformaBar-LogoSection" data-testid="informa-bar-logo-section" role="button" tabindex="0" aria-label="Open Informa bar"><div class="InformaBar-LogoWrapper"><img class="InformaBar-Logo" src="/build/_assets/informaLogoWhite-RZAE7EJI.png" alt="Logo Informa"/></div><span class="InformaBar-IconWrapper InformaBar-IconWrapper_closed"><svg viewBox="0 0 320 512" aria-hidden="true" focusable="false" role="img" xml:space="preserve" xmlns="http://www.w3.org/2000/svg" xmlns:xlink="http://www.w3.org/1999/xlink" fill="currentColor" height="100%"><path fill="#ffffff" d="M288.662 352H31.338c-17.818 0-26.741-21.543-14.142-34.142l128.662-128.662c7.81-7.81 20.474-7.81 28.284 0l128.662 128.662c12.6 12.599 3.676 34.142-14.142 34.142z"></path></svg></span></div></div></div></div><div class="Navigation-SecondaryMenuWrapper"><div class="FullScreenBackground Navigation-SecondaryMenuBackground"></div><div class="Navigation-SecondaryMenu"><nav data-testid="SecondaryMenu" class="SecondaryMenu"><a class="SecondaryMenu-Link" data-discover="true" href="/resources?page=1&types=Research+Report">Reports</a><a class="SecondaryMenu-Link" data-discover="true" href="/resources?page=1&types=Virtual+Event&types=Webinar">Online Events</a><a class="SecondaryMenu-Link" data-discover="true" href="/advertise">Advertise</a><a class="SecondaryMenu-Link" data-discover="true" href="/about-us">About</a></nav></div></div><div style="padding-top:0px"></div><div id="navigation-header" class="Navigation-NavBase"><div data-testid="navBase" class="NavBase"><div class="NavBase-Content"><div class="FullScreenBackground NavBase-SecondaryMenuBackground"></div><div class="NavBase-HeaderWrapper"><div class="NavBase-IconsWrapper"><button data-testid="navBase-megaMenuButton" class="NavBase-MegaMenuButton" aria-label="Open Mega menu"><span data-component="icon" data-name="Bars" class="NavBase-MegaMenuIcon NavBase-MegaMenuIcon_iconVariant_small NavBase-MegaMenuIcon_iconType_bars" style="mask-image:url(/build/_assets/Bars-F4G2A5NO.svg);-webkit-mask-image:url(/build/_assets/Bars-F4G2A5NO.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span></button><button data-testid="SearchButtonDesktop" class="NavBase-SearchButtonDesktop" aria-label="Open Search"><span data-component="icon" data-name="Search" class="NavBase-SearchIcon NavBase-SearchIcon_iconVariant_large NavBase-SearchIcon_iconType_search" style="mask-image:url(/build/_assets/Search-T2ANYVG5.svg);-webkit-mask-image:url(/build/_assets/Search-T2ANYVG5.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span></button><button data-testid="SearchButtonTablet" class="NavBase-SearchButtonTablet" aria-label="Open Search in MegaMenu"><span data-component="icon" data-name="Search" class="NavBase-SearchIcon NavBase-SearchIcon_iconVariant_small NavBase-SearchIcon_iconType_search" style="mask-image:url(/build/_assets/Search-T2ANYVG5.svg);-webkit-mask-image:url(/build/_assets/Search-T2ANYVG5.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span></button></div><div class="NavBase-LogoWrapper"><button data-testid="navBase-LogoMegaMenuButton" class="NavBase-LogoMegaMenuButton" aria-label="Open Mega menu"><span data-component="icon" data-name="Bars" class="NavBase-LogoMegaMenuIcon NavBase-LogoMegaMenuIcon_iconVariant_small NavBase-LogoMegaMenuIcon_iconType_bars" style="mask-image:url(/build/_assets/Bars-F4G2A5NO.svg);-webkit-mask-image:url(/build/_assets/Bars-F4G2A5NO.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span></button><a class="NavBase-Logo" data-discover="true" href="/"><img data-testid="logo-image" data-component="image" class="NavBase-LogoImage" data-src="https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt610f1382a6ead9c3/64b854bd7f10ca354fa97a15/178206_IWK22_Logo_RGB.svg?width=476&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt610f1382a6ead9c3/64b854bd7f10ca354fa97a15/178206_IWK22_Logo_RGB.svg?width=476&auto=webp&quality=80&disable=upscale" loading="lazy" alt="InformationWeek" title="InformationWeek"/></a></div><div class="NavBase-RegisterWrapper"><div data-module="newsletter-signup-promo"><div class="NewsletterSignupPromo-Button NewsletterSignupPromo-Button_small NewsletterSignupButton"><a data-component="button" data-testid="headerSmallNewsletterButton" class="Button Button_size_small Button_variant_primaryFilled" href="https://iw-resources.informationweek.com/c/pubRD.mpl?secure=1&sr=pp&_t=pp:&qf=w_ingg126&ch=iwsite" target="_blank" rel="nofollow" data-name="subscribe-nav" data-action-type="sign-up"><span data-component="icon" data-name="Email" class="Button-Icon Button-Icon_position_left" style="mask-image:url(/build/_assets/Email-47H7P533.svg);-webkit-mask-image:url(/build/_assets/Email-47H7P533.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span><span class="Button-ContentWrapper">Newsletter Sign-Up</span></a></div><div class="NewsletterSignupPromo-Button NewsletterSignupPromo-Button_medium NewsletterSignupButton"><div data-component="social-share" class="SocialShare SocialShare_variant_layout Layout-SocialShare"><a target="_blank" rel="noreferrer" aria-label="Linkedin" class="Layout-SocialLink" href="https://www.linkedin.com/company/informationweek/"><span class="SocialShare-IconWrapper SocialShare-IconWrapper_variant_layout"><span data-component="icon" data-name="Linkedin" class="SocialShare-Icon SocialShare-Icon_variant_layout SocialShare-Icon_type_linkedin" style="mask-image:url(/build/_assets/Linkedin-VQUF3EEQ.svg);-webkit-mask-image:url(/build/_assets/Linkedin-VQUF3EEQ.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span></span></a><a target="_blank" rel="noreferrer" aria-label="Twitter" class="Layout-SocialLink" href="https://twitter.com/InformationWeek"><span class="SocialShare-IconWrapper SocialShare-IconWrapper_variant_layout"><span data-component="icon" data-name="Twitter" class="SocialShare-Icon SocialShare-Icon_variant_layout SocialShare-Icon_type_twitter" style="mask-image:url(/build/_assets/Twitter-WD5AOEQ7.svg);-webkit-mask-image:url(/build/_assets/Twitter-WD5AOEQ7.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span></span></a><a target="_blank" rel="noreferrer" aria-label="Facebook" class="Layout-SocialLink" href="https://www.facebook.com/informationweek"><span class="SocialShare-IconWrapper SocialShare-IconWrapper_variant_layout"><span data-component="icon" data-name="Facebook" class="SocialShare-Icon SocialShare-Icon_variant_layout SocialShare-Icon_type_facebook" style="mask-image:url(/build/_assets/Facebook-CJB5G2HY.svg);-webkit-mask-image:url(/build/_assets/Facebook-CJB5G2HY.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span></span></a><a target="_blank" rel="noreferrer" aria-label="GoogleNews" class="Layout-SocialLink" href="https://news.google.com/publications/CAAqBwgKMOfGrQsw9NHFAw"><span class="SocialShare-IconWrapper SocialShare-IconWrapper_variant_layout"><span data-component="icon" data-name="GoogleNews" class="SocialShare-Icon SocialShare-Icon_variant_layout SocialShare-Icon_type_googleNews" style="mask-image:url(/build/_assets/GoogleNews-6O72APW7.svg);-webkit-mask-image:url(/build/_assets/GoogleNews-6O72APW7.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span></span></a><a target="_blank" rel="noreferrer" aria-label="RSS" class="Layout-SocialLink" href="https://informationweek.com/rss.xml"><span class="SocialShare-IconWrapper SocialShare-IconWrapper_variant_layout"><span data-component="icon" data-name="RSS" class="SocialShare-Icon SocialShare-Icon_variant_layout SocialShare-Icon_type_rss" style="mask-image:url(/build/_assets/RSS-3XFHIVCK.svg);-webkit-mask-image:url(/build/_assets/RSS-3XFHIVCK.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span></span></a></div><a data-component="button" data-testid="headerMediumNewsletterButton" class="Button Button_size_medium Button_variant_primaryFilled" href="https://iw-resources.informationweek.com/c/pubRD.mpl?secure=1&sr=pp&_t=pp:&qf=w_ingg126&ch=iwsite" target="_blank" rel="nofollow" data-name="subscribe-nav" data-action-type="sign-up"><span data-component="icon" data-name="Email" class="Button-Icon Button-Icon_position_left" style="mask-image:url(/build/_assets/Email-47H7P533.svg);-webkit-mask-image:url(/build/_assets/Email-47H7P533.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span><span class="Button-ContentWrapper">Newsletter Sign-Up</span></a></div></div><button data-testid="RegisterSearchButton" class="NavBase-RegisterSearchButton" aria-label="Open Search in MegaMenu"><span data-component="icon" data-name="Search" class="NavBase-SearchIcon NavBase-SearchIcon_iconVariant_large NavBase-SearchIcon_iconType_search" style="mask-image:url(/build/_assets/Search-T2ANYVG5.svg);-webkit-mask-image:url(/build/_assets/Search-T2ANYVG5.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span></button></div></div><div class="NavBase-SearchWrapper"><div class="FullScreenBackground NavBase-SearchBackground"></div><button data-testid="SearchCloseButton" class="NavBase-SearchCloseButton" aria-label="Close Search"><span data-component="icon" data-name="Close" class="NavBase-SearchIcon NavBase-SearchIcon_iconVariant_medium NavBase-SearchIcon_iconType_close" style="mask-image:url(/build/_assets/Close-KKOYAUD6.svg);-webkit-mask-image:url(/build/_assets/Close-KKOYAUD6.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span></button></div></div></div><div class="Navigation-MainMenu"><div data-testid="mainMenu"><div class="FullScreenBackground MainMenu-BackgroundSubmenu"></div><div class="FullScreenBackground MainMenu-BackgroundMenuItem"></div><div class="MainMenu-Content"><div class="MainMenu-MegaMenuButtonWrapper"><button data-testid="mainMenu-MegaMenuButton" aria-label="Open MegaMenu" class="MainMenu-MegaMenuButton"><span data-component="icon" data-name="Bars" class="MainMenu-MegaMenuIcon" style="mask-image:url(/build/_assets/Bars-F4G2A5NO.svg);-webkit-mask-image:url(/build/_assets/Bars-F4G2A5NO.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span></button></div><div class="MainMenu-ItemsWrapper" role="menu"><div class="MainMenu-MenuItemWrapper"><div class="MainMenu-MenuItem" role="menuitem" tabindex="0" data-testid="openSubMenu" aria-label="Open Sub menu of Leadership"><span class="MainMenu-MainTitle">Leadership<span data-component="icon" data-name="ChevronDown" class="MainMenu-SubMenuIcon" style="mask-image:url(/build/_assets/ChevronDown-PF4EH6J6.svg);-webkit-mask-image:url(/build/_assets/ChevronDown-PF4EH6J6.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span></span></div><div class="MainMenu-SubMenuWrapper"><div class="MainMenu-SubMenuContent"><div data-module="sub-menu" class="SubMenu MainMenu-SubMenu" role="presentation"><div class="SubMenu-Container"><div class="SubMenu-RelatedTopicsWrapper"><h4 class="SubMenu-RelatedTopics">Related Topics</h4><div class="SubMenu-CasualLinkWrapper" data-testid="related"><ul class="SubMenu-CasualLinkList"><li class="SubMenu-CasualLinkItem"><a class="SubMenu-ItemLink" data-testid="sub-menu-item-link" data-discover="true" href="/it-leadership/digital-transformation">Digital Transformation</a></li><li class="SubMenu-CasualLinkItem"><a class="SubMenu-ItemLink" data-testid="sub-menu-item-link" data-discover="true" href="/it-leadership/it-staffing-careers">IT Staffing & Careers</a></li></ul><ul class="SubMenu-CasualLinkList"><li class="SubMenu-CasualLinkItem"><a class="SubMenu-ItemLink" data-testid="sub-menu-item-link" data-discover="true" href="/it-leadership/it-management">IT Management</a></li><li class="SubMenu-CasualLinkItem"><a class="SubMenu-ItemLink" data-testid="sub-menu-item-link" data-discover="true" href="/it-leadership/it-strategy">IT Strategy</a></li></ul></div></div><div class="SubMenu-RecentContentWrapper" data-testid="recent"><div class="SubMenu-RecentContentHeading"><h4 data-testid="recent-title" class="SubMenu-RecentText">Recent in <a class="SubMenu-RecentTopicTerm" data-discover="true" href="/it-leadership">Leadership</a></h4><div data-testid="see-more" class="SubMenu-SeeMore"><a class="SubMenu-MoreContent" data-discover="true" href="/it-leadership"><span class="SubMenu-SeeMoreText">See All Leadership</span><span data-component="icon" data-name="ChevronRight" class="SubMenu-SeeMoreIcon" style="mask-image:url(/build/_assets/ChevronRight-NHDKEYGJ.svg);-webkit-mask-image:url(/build/_assets/ChevronRight-NHDKEYGJ.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span></a></div></div><div class="SubMenu-ContentWrapper"><div class="ContentPreview" data-module="content-preview" data-variant="card-vertical"><div class="ContentPreview-Wrapper ContentPreview-Wrapper_variant_cardVertical"><a data-testid="thumbnail" data-discover="true" href="/it-leadership/solarwinds-ceo-on-building-trust-after-breach-unifying-it-and-c-suite-and-genai-future"><div class="ContentPreview-ImageContainer"><span data-testid="content-preview-screen-reader-text" class="ContentPreview-ImageScreenReaderText">thumbnail</span><img data-testid="content-preview-image" data-component="image" class="ContentPreview-Image" data-src="https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt8b52468b0c8f906b/6745d77ff7643ded0dda2f1c/Sudhakar_RamakrishnaNew.jpg?width=700&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt8b52468b0c8f906b/6745d77ff7643ded0dda2f1c/Sudhakar_RamakrishnaNew.jpg?width=700&auto=webp&quality=80&disable=upscale" loading="lazy" alt="" title=""/></div></a><a data-component="keyword" class="Keyword Keyword_variant_standard Keyword_title_itLeadership ContentPreview-Category" data-discover="true" href="/it-leadership">IT Leadership</a><div class="VerticalCard"><div class="VerticalCard-Body"><a class="VerticalCard-Title VerticalCard-Title_displayOption_default" data-testid="preview-default-title" data-discover="true" href="/it-leadership/solarwinds-ceo-on-building-trust-after-breach-unifying-it-and-c-suite-and-genai-future">SolarWinds CEO on Building Trust After Breach, Unifying IT and C-Suite, and GenAI Future</a><a class="VerticalCard-Title VerticalCard-Title_displayOption_mobile" data-testid="preview-mobile-title" data-discover="true" href="/it-leadership/solarwinds-ceo-on-building-trust-after-breach-unifying-it-and-c-suite-and-genai-future">SolarWinds CEO on Building Trust After Breach, Unifying IT and C-Suite, and GenAI Future</a><div class="Contributors Contributors_variant_slimline VerticalCard-ContributorsWrapper" data-component="contributors"><div class="Contributors-InfoWrapper"><span class="Contributors-ByText" data-testid="by-text">by</span><a class="Contributors-ContributorName" data-testid="contributor-name" data-discover="true" href="/author/shane-snider">Shane Snider</a></div></div></div><div class="VerticalCard-Footer"><span class="VerticalCard-Date" data-testid="vertical-card-date">Nov 26, 2024</span><div data-module="card-time" class="CardTime"><div data-component="article-read-time" class="ArticleReadTime ArticleReadTime_size_small CardTime-ReadTime"><span>7 Min<!-- --> <!-- -->Read</span></div></div></div></div></div></div><div class="ContentPreview" data-module="content-preview" data-variant="card-vertical"><div class="ContentPreview-Wrapper ContentPreview-Wrapper_variant_cardVertical"><a data-testid="thumbnail" data-discover="true" href="/it-leadership/tech-company-layoffs-the-covid-tech-bubble-bursts-sep-14"><div class="ContentPreview-ImageContainer"><span data-testid="content-preview-screen-reader-text" class="ContentPreview-ImageScreenReaderText">Green Balloon about to be burst by a needle held by a businessman's hand in a pinstripe sleeve.</span><img data-testid="content-preview-image" data-component="image" class="ContentPreview-Image" data-src="https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/bltbf06263940b69a5e/668da1beeb4ff69673df3f17/BubbleBurst-Brian_Jackson-CFMK07-CP.jpg?width=700&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/bltbf06263940b69a5e/668da1beeb4ff69673df3f17/BubbleBurst-Brian_Jackson-CFMK07-CP.jpg?width=700&auto=webp&quality=80&disable=upscale" loading="lazy" alt="" title=""/></div></a><a data-component="keyword" class="Keyword Keyword_variant_standard Keyword_title_itLeadership ContentPreview-Category" data-discover="true" href="/it-leadership">IT Leadership</a><div class="VerticalCard"><div class="VerticalCard-Body"><a class="VerticalCard-Title VerticalCard-Title_displayOption_default" data-testid="preview-default-title" data-discover="true" href="/it-leadership/tech-company-layoffs-the-covid-tech-bubble-bursts-sep-14">Tech Company Layoffs: The COVID Tech Bubble Bursts</a><a class="VerticalCard-Title VerticalCard-Title_displayOption_mobile" data-testid="preview-mobile-title" data-discover="true" href="/it-leadership/tech-company-layoffs-the-covid-tech-bubble-bursts-sep-14">Tech Company Layoffs: The COVID Tech Bubble Bursts</a><div class="Contributors Contributors_variant_slimline VerticalCard-ContributorsWrapper" data-component="contributors"><div class="Contributors-InfoWrapper"><span class="Contributors-ByText" data-testid="by-text">by</span><a class="Contributors-ContributorName Contributors-ContributorName_showComma" data-testid="contributor-name" data-discover="true" href="/author/brandon-taylor">Brandon Taylor<!-- -->, </a><a class="Contributors-ContributorName" data-testid="contributor-name" data-discover="true" href="/author/jessica-davis">Jessica Davis</a></div></div></div><div class="VerticalCard-Footer"><span class="VerticalCard-Date" data-testid="vertical-card-date">Nov 26, 2024</span><div data-module="card-time" class="CardTime"><div data-component="article-read-time" class="ArticleReadTime ArticleReadTime_size_small CardTime-ReadTime"><span>4h 34m<!-- --> <!-- -->Read</span></div></div></div></div></div></div></div></div></div></div></div></div></div><div class="MainMenu-MenuItemWrapper"><div class="MainMenu-MenuItem" role="menuitem" tabindex="0" data-testid="openSubMenu" aria-label="Open Sub menu of Resilience"><span class="MainMenu-MainTitle">Resilience<span data-component="icon" data-name="ChevronDown" class="MainMenu-SubMenuIcon" style="mask-image:url(/build/_assets/ChevronDown-PF4EH6J6.svg);-webkit-mask-image:url(/build/_assets/ChevronDown-PF4EH6J6.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span></span></div><div class="MainMenu-SubMenuWrapper"><div class="MainMenu-SubMenuContent"><div data-module="sub-menu" class="SubMenu MainMenu-SubMenu" role="presentation"><div class="SubMenu-Container"><div class="SubMenu-RelatedTopicsWrapper"><h4 class="SubMenu-RelatedTopics">Related Topics</h4><div class="SubMenu-CasualLinkWrapper" data-testid="related"><ul class="SubMenu-CasualLinkList"><li class="SubMenu-CasualLinkItem"><a class="SubMenu-ItemLink" data-testid="sub-menu-item-link" data-discover="true" href="/cyber-resilience/cybersecurity">Cybersecurity</a></li><li class="SubMenu-CasualLinkItem"><a class="SubMenu-ItemLink" data-testid="sub-menu-item-link" data-discover="true" href="/cyber-resilience/risk-management">Risk Management</a></li></ul><ul class="SubMenu-CasualLinkList"><li class="SubMenu-CasualLinkItem"><a class="SubMenu-ItemLink" data-testid="sub-menu-item-link" data-discover="true" href="/cyber-resilience/incident-response">Incident Response</a></li></ul></div></div><div class="SubMenu-RecentContentWrapper" data-testid="recent"><div class="SubMenu-RecentContentHeading"><h4 data-testid="recent-title" class="SubMenu-RecentText">Recent in <a class="SubMenu-RecentTopicTerm" data-discover="true" href="/cyber-resilience">Resilience</a></h4><div data-testid="see-more" class="SubMenu-SeeMore"><a class="SubMenu-MoreContent" data-discover="true" href="/cyber-resilience"><span class="SubMenu-SeeMoreText">See All Resilience</span><span data-component="icon" data-name="ChevronRight" class="SubMenu-SeeMoreIcon" style="mask-image:url(/build/_assets/ChevronRight-NHDKEYGJ.svg);-webkit-mask-image:url(/build/_assets/ChevronRight-NHDKEYGJ.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span></a></div></div><div class="SubMenu-ContentWrapper"><div class="ContentPreview" data-module="content-preview" data-variant="card-vertical"><div class="ContentPreview-Wrapper ContentPreview-Wrapper_variant_cardVertical"><a data-testid="thumbnail" data-discover="true" href="/cyber-resilience/meeting-ai-regulations-a-guide-for-security-leaders"><div class="ContentPreview-ImageContainer"><span data-testid="content-preview-screen-reader-text" class="ContentPreview-ImageScreenReaderText">digital abstract with security locks and words like danger</span><img data-testid="content-preview-image" data-component="image" class="ContentPreview-Image" data-src="https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt63431016eb292e37/673caa6d012f52541bdcfd36/cybersecurity-SergeyNivens-adobe-new.jpg?width=700&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt63431016eb292e37/673caa6d012f52541bdcfd36/cybersecurity-SergeyNivens-adobe-new.jpg?width=700&auto=webp&quality=80&disable=upscale" loading="lazy" alt="" title=""/></div></a><a data-component="keyword" class="Keyword Keyword_variant_standard Keyword_title_cyberResilience ContentPreview-Category" data-discover="true" href="/cyber-resilience">Cyber Resilience</a><div class="VerticalCard"><div class="VerticalCard-Body"><a class="VerticalCard-Title VerticalCard-Title_displayOption_default" data-testid="preview-default-title" data-discover="true" href="/cyber-resilience/meeting-ai-regulations-a-guide-for-security-leaders">Meeting AI Regulations: A Guide for Security Leaders</a><a class="VerticalCard-Title VerticalCard-Title_displayOption_mobile" data-testid="preview-mobile-title" data-discover="true" href="/cyber-resilience/meeting-ai-regulations-a-guide-for-security-leaders">Meeting AI Regulations: A Guide for Security Leaders</a><div class="Contributors Contributors_variant_slimline VerticalCard-ContributorsWrapper" data-component="contributors"><div class="Contributors-InfoWrapper"><span class="Contributors-ByText" data-testid="by-text">by</span><a class="Contributors-ContributorName" data-testid="contributor-name" data-discover="true" href="/author/dana-simberkoff">Dana Simberkoff</a></div></div></div><div class="VerticalCard-Footer"><span class="VerticalCard-Date" data-testid="vertical-card-date">Nov 26, 2024</span><div data-module="card-time" class="CardTime"><div data-component="article-read-time" class="ArticleReadTime ArticleReadTime_size_small CardTime-ReadTime"><span>4 Min<!-- --> <!-- -->Read</span></div></div></div></div></div></div><div class="ContentPreview" data-module="content-preview" data-variant="card-vertical"><div class="ContentPreview-Wrapper ContentPreview-Wrapper_variant_cardVertical"><a data-testid="thumbnail" data-discover="true" href="/cyber-resilience/what-does-enterprise-wide-cybersecurity-culture-look-like-"><div class="ContentPreview-ImageContainer"><span data-testid="content-preview-screen-reader-text" class="ContentPreview-ImageScreenReaderText">Cybersecurity team with 3d software design for computer.</span><img data-testid="content-preview-image" data-component="image" class="ContentPreview-Image" data-src="https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/bltd4562d02cb55817f/673e10dc006ff59e6ee82a21/cybersecurityteam_YuriArcurs-AlamyStockPhoto.jpg?width=700&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/bltd4562d02cb55817f/673e10dc006ff59e6ee82a21/cybersecurityteam_YuriArcurs-AlamyStockPhoto.jpg?width=700&auto=webp&quality=80&disable=upscale" loading="lazy" alt="" title=""/></div></a><a data-component="keyword" class="Keyword Keyword_variant_standard Keyword_title_cyberResilience ContentPreview-Category" data-discover="true" href="/cyber-resilience">Cyber Resilience</a><div class="VerticalCard"><div class="VerticalCard-Body"><a class="VerticalCard-Title VerticalCard-Title_displayOption_default" data-testid="preview-default-title" data-discover="true" href="/cyber-resilience/what-does-enterprise-wide-cybersecurity-culture-look-like-">What Does Enterprise-Wide Cybersecurity Culture Look Like?</a><a class="VerticalCard-Title VerticalCard-Title_displayOption_mobile" data-testid="preview-mobile-title" data-discover="true" href="/cyber-resilience/what-does-enterprise-wide-cybersecurity-culture-look-like-">What Does Enterprise-Wide Cybersecurity Culture Look Like?</a><div class="Contributors Contributors_variant_slimline VerticalCard-ContributorsWrapper" data-component="contributors"><div class="Contributors-InfoWrapper"><span class="Contributors-ByText" data-testid="by-text">by</span><a class="Contributors-ContributorName" data-testid="contributor-name" data-discover="true" href="/author/carrie-pallardy">Carrie Pallardy</a></div></div></div><div class="VerticalCard-Footer"><span class="VerticalCard-Date" data-testid="vertical-card-date">Nov 25, 2024</span><div data-module="card-time" class="CardTime"><div data-component="article-read-time" class="ArticleReadTime ArticleReadTime_size_small CardTime-ReadTime"><span>7 Min<!-- --> <!-- -->Read</span></div></div></div></div></div></div></div></div></div></div></div></div></div><div class="MainMenu-MenuItemWrapper"><div class="MainMenu-MenuItem" role="menuitem" tabindex="0" data-testid="openSubMenu" aria-label="Open Sub menu of ML & AI"><span class="MainMenu-MainTitle">ML & AI<span data-component="icon" data-name="ChevronDown" class="MainMenu-SubMenuIcon" style="mask-image:url(/build/_assets/ChevronDown-PF4EH6J6.svg);-webkit-mask-image:url(/build/_assets/ChevronDown-PF4EH6J6.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span></span></div><div class="MainMenu-SubMenuWrapper"><div class="MainMenu-SubMenuContent"><div data-module="sub-menu" class="SubMenu MainMenu-SubMenu" role="presentation"><div class="SubMenu-Container"><div class="SubMenu-RelatedTopicsWrapper"><h4 class="SubMenu-RelatedTopics">Related Topics</h4><div class="SubMenu-CasualLinkWrapper" data-testid="related"><ul class="SubMenu-CasualLinkList"><li class="SubMenu-CasualLinkItem"><a class="SubMenu-ItemLink" data-testid="sub-menu-item-link" data-discover="true" href="/machine-learning-ai/responsible-ai">Responsible AI</a></li><li class="SubMenu-CasualLinkItem"><a class="SubMenu-ItemLink" data-testid="sub-menu-item-link" data-discover="true" href="/machine-learning-ai/it-automation">IT Automation</a></li></ul><ul class="SubMenu-CasualLinkList"><li class="SubMenu-CasualLinkItem"><a class="SubMenu-ItemLink" data-testid="sub-menu-item-link" data-discover="true" href="/machine-learning-ai/ai-innovations">AI Innovations</a></li></ul></div></div><div class="SubMenu-RecentContentWrapper" data-testid="recent"><div class="SubMenu-RecentContentHeading"><h4 data-testid="recent-title" class="SubMenu-RecentText">Recent in <a class="SubMenu-RecentTopicTerm" data-discover="true" href="/machine-learning-ai">ML & AI</a></h4><div data-testid="see-more" class="SubMenu-SeeMore"><a class="SubMenu-MoreContent" data-discover="true" href="/machine-learning-ai"><span class="SubMenu-SeeMoreText">See All ML & AI</span><span data-component="icon" data-name="ChevronRight" class="SubMenu-SeeMoreIcon" style="mask-image:url(/build/_assets/ChevronRight-NHDKEYGJ.svg);-webkit-mask-image:url(/build/_assets/ChevronRight-NHDKEYGJ.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span></a></div></div><div class="SubMenu-ContentWrapper"><div class="ContentPreview" data-module="content-preview" data-variant="card-vertical"><div class="ContentPreview-Wrapper ContentPreview-Wrapper_variant_cardVertical"><a data-testid="thumbnail" data-discover="true" href="/machine-learning-ai/how-can-decision-makers-trust-hallucinating-ai-"><div class="ContentPreview-ImageContainer"><span data-testid="content-preview-screen-reader-text" class="ContentPreview-ImageScreenReaderText">AI face embedded in a digital background</span><img data-testid="content-preview-image" data-component="image" class="ContentPreview-Image" data-src="https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/bltb938eb74765d22cf/66ccbaafd957e64e748e02bf/AI-Mopic-AdobeStocknew.jpg?width=700&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/bltb938eb74765d22cf/66ccbaafd957e64e748e02bf/AI-Mopic-AdobeStocknew.jpg?width=700&auto=webp&quality=80&disable=upscale" loading="lazy" alt="" title=""/></div></a><a data-component="keyword" class="Keyword Keyword_variant_standard Keyword_title_machineLearningAi ContentPreview-Category" data-discover="true" href="/machine-learning-ai">Machine Learning & AI</a><div class="VerticalCard"><div class="VerticalCard-Body"><a class="VerticalCard-Title VerticalCard-Title_displayOption_default" data-testid="preview-default-title" data-discover="true" href="/machine-learning-ai/how-can-decision-makers-trust-hallucinating-ai-">How Can Decision Makers Trust Hallucinating AI?</a><a class="VerticalCard-Title VerticalCard-Title_displayOption_mobile" data-testid="preview-mobile-title" data-discover="true" href="/machine-learning-ai/how-can-decision-makers-trust-hallucinating-ai-">How Can Decision Makers Trust Hallucinating AI?</a><div class="Contributors Contributors_variant_slimline VerticalCard-ContributorsWrapper" data-component="contributors"><div class="Contributors-InfoWrapper"><span class="Contributors-ByText" data-testid="by-text">by</span><a class="Contributors-ContributorName" data-testid="contributor-name" data-discover="true" href="/author/max-belov">Max Belov</a></div></div></div><div class="VerticalCard-Footer"><span class="VerticalCard-Date" data-testid="vertical-card-date">Nov 25, 2024</span><div data-module="card-time" class="CardTime"><div data-component="article-read-time" class="ArticleReadTime ArticleReadTime_size_small CardTime-ReadTime"><span>4 Min<!-- --> <!-- -->Read</span></div></div></div></div></div></div><div class="ContentPreview" data-module="content-preview" data-variant="card-vertical"><div class="ContentPreview-Wrapper ContentPreview-Wrapper_variant_cardVertical"><a data-testid="thumbnail" data-discover="true" href="/machine-learning-ai/all-in-on-ai-3-ways-to-win-with-an-ai-supported-team"><div class="ContentPreview-ImageContainer"><span data-testid="content-preview-screen-reader-text" class="ContentPreview-ImageScreenReaderText">thumbnail</span><img data-testid="content-preview-image" data-component="image" class="ContentPreview-Image" data-src="https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/bltab1151e20d635167/673cd9cbad0eb7294a334a25/HP_InfoWeek2_Hero.jpg?width=700&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/bltab1151e20d635167/673cd9cbad0eb7294a334a25/HP_InfoWeek2_Hero.jpg?width=700&auto=webp&quality=80&disable=upscale" loading="lazy" alt="" title=""/></div></a><span data-component="keyword" class="Keyword Keyword_variant_standard Keyword_title_sponsoredContent Keyword_disabled ContentPreview-Category ContentPreview-Category_isSponsoredContent">Sponsored Content</span><div class="VerticalCard"><div class="VerticalCard-Body"><a class="VerticalCard-Title VerticalCard-Title_displayOption_default" data-testid="preview-default-title" data-discover="true" href="/machine-learning-ai/all-in-on-ai-3-ways-to-win-with-an-ai-supported-team">All In On AI: 3 Ways to Win With an AI-Supported Team</a><a class="VerticalCard-Title VerticalCard-Title_displayOption_mobile" data-testid="preview-mobile-title" data-discover="true" href="/machine-learning-ai/all-in-on-ai-3-ways-to-win-with-an-ai-supported-team">All In On AI: 3 Ways to Win With an AI-Supported Team</a><div class="Contributors Contributors_variant_slimline VerticalCard-ContributorsWrapper" data-component="contributors"><div class="Contributors-InfoWrapper"><span class="Contributors-ByText" data-testid="by-text">by</span><a class="Contributors-ContributorName" data-testid="contributor-name" data-discover="true" href="/author/kobi-elbaz">Kobi Elbaz</a></div></div></div><div class="VerticalCard-Footer"><span class="VerticalCard-Date" data-testid="vertical-card-date">Nov 25, 2024</span><div data-module="card-time" class="CardTime"><div data-component="article-read-time" class="ArticleReadTime ArticleReadTime_size_small CardTime-ReadTime"><span>3 Min<!-- --> <!-- -->Read</span></div></div></div></div></div></div></div></div></div></div></div></div></div><div class="MainMenu-MenuItemWrapper"><div class="MainMenu-MenuItem" role="menuitem" tabindex="0" data-testid="openSubMenu" aria-label="Open Sub menu of Data"><span class="MainMenu-MainTitle">Data<span data-component="icon" data-name="ChevronDown" class="MainMenu-SubMenuIcon" style="mask-image:url(/build/_assets/ChevronDown-PF4EH6J6.svg);-webkit-mask-image:url(/build/_assets/ChevronDown-PF4EH6J6.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span></span></div><div class="MainMenu-SubMenuWrapper"><div class="MainMenu-SubMenuContent"><div data-module="sub-menu" class="SubMenu MainMenu-SubMenu" role="presentation"><div class="SubMenu-Container"><div class="SubMenu-RelatedTopicsWrapper"><h4 class="SubMenu-RelatedTopics">Related Topics</h4><div class="SubMenu-CasualLinkWrapper" data-testid="related"><ul class="SubMenu-CasualLinkList"><li class="SubMenu-CasualLinkItem"><a class="SubMenu-ItemLink" data-testid="sub-menu-item-link" data-discover="true" href="/data-management/data-privacy">Data Privacy</a></li></ul><ul class="SubMenu-CasualLinkList"><li class="SubMenu-CasualLinkItem"><a class="SubMenu-ItemLink" data-testid="sub-menu-item-link" data-discover="true" href="/data-management/data-governance">Data Governance</a></li></ul></div></div><div class="SubMenu-RecentContentWrapper" data-testid="recent"><div class="SubMenu-RecentContentHeading"><h4 data-testid="recent-title" class="SubMenu-RecentText">Recent in <a class="SubMenu-RecentTopicTerm" data-discover="true" href="/data-management">Data</a></h4><div data-testid="see-more" class="SubMenu-SeeMore"><a class="SubMenu-MoreContent" data-discover="true" href="/data-management"><span class="SubMenu-SeeMoreText">See All Data Mgmt</span><span data-component="icon" data-name="ChevronRight" class="SubMenu-SeeMoreIcon" style="mask-image:url(/build/_assets/ChevronRight-NHDKEYGJ.svg);-webkit-mask-image:url(/build/_assets/ChevronRight-NHDKEYGJ.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span></a></div></div><div class="SubMenu-ContentWrapper"><div class="ContentPreview" data-module="content-preview" data-variant="card-vertical"><div class="ContentPreview-Wrapper ContentPreview-Wrapper_variant_cardVertical"><a data-testid="thumbnail" data-discover="true" href="/data-management/beyond-washington-dc-the-state-of-state-based-data-privacy-laws"><div class="ContentPreview-ImageContainer"><span data-testid="content-preview-screen-reader-text" class="ContentPreview-ImageScreenReaderText">Lawyer holding Data Protection Act book.</span><img data-testid="content-preview-image" data-component="image" class="ContentPreview-Image" data-src="https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt0401b4355d039e7c/6740cf2a9d8a1d9c97068372/dataprotectionlaw_designer491-AlamyStockPhoto.jpg?width=700&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt0401b4355d039e7c/6740cf2a9d8a1d9c97068372/dataprotectionlaw_designer491-AlamyStockPhoto.jpg?width=700&auto=webp&quality=80&disable=upscale" loading="lazy" alt="" title=""/></div></a><a data-component="keyword" class="Keyword Keyword_variant_standard Keyword_title_dataManagement ContentPreview-Category" data-discover="true" href="/data-management">Data Management</a><a class="ContentPreview-IconWrapper" title="Link to all podcast" data-testid="content-preview-icon-link" data-discover="true" href="/podcasts"><span data-component="icon" data-name="Microphone" class="ContentPreview-Icon" style="mask-image:url(/build/_assets/Microphone-W4D26BPI.svg);-webkit-mask-image:url(/build/_assets/Microphone-W4D26BPI.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span></a><div class="VerticalCard"><div class="VerticalCard-Body"><a class="VerticalCard-Title VerticalCard-Title_displayOption_default" data-testid="preview-default-title" data-discover="true" href="/data-management/beyond-washington-dc-the-state-of-state-based-data-privacy-laws">Beyond Washington, DC: The State of State-Based Data Privacy Laws</a><a class="VerticalCard-Title VerticalCard-Title_displayOption_mobile" data-testid="preview-mobile-title" data-discover="true" href="/data-management/beyond-washington-dc-the-state-of-state-based-data-privacy-laws">Beyond Washington, DC: The State of State-Based Data Privacy Laws</a><div class="Contributors Contributors_variant_slimline VerticalCard-ContributorsWrapper" data-component="contributors"><div class="Contributors-InfoWrapper"><span class="Contributors-ByText" data-testid="by-text">by</span><a class="Contributors-ContributorName" data-testid="contributor-name" data-discover="true" href="/author/joao-pierre-s-ruth">Joao-Pierre S. Ruth</a></div></div></div><div class="VerticalCard-Footer"><span class="VerticalCard-Date" data-testid="vertical-card-date">Nov 25, 2024</span></div></div></div></div><div class="ContentPreview" data-module="content-preview" data-variant="card-vertical"><div class="ContentPreview-Wrapper ContentPreview-Wrapper_variant_cardVertical"><a data-testid="thumbnail" data-discover="true" href="/responsible-ai/innovation-relies-on-safeguarding-ai-technology-to-mitigate-its-risks"><div class="ContentPreview-ImageContainer"><span data-testid="content-preview-screen-reader-text" class="ContentPreview-ImageScreenReaderText">Robot Hacker On Blue Background Concept Modern Artificial Intelligence Technology</span><img data-testid="content-preview-image" data-component="image" class="ContentPreview-Image" data-src="https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/bltd172a680ebd0d4fb/6740a006f8c46b80832fbfdd/AI_Hacker_Ievgen_Chepil_via_Alamy_Stock.jpg?width=700&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/bltd172a680ebd0d4fb/6740a006f8c46b80832fbfdd/AI_Hacker_Ievgen_Chepil_via_Alamy_Stock.jpg?width=700&auto=webp&quality=80&disable=upscale" loading="lazy" alt="" title=""/></div></a><a data-component="keyword" class="Keyword Keyword_variant_standard Keyword_title_responsibleAi ContentPreview-Category" data-discover="true" href="/machine-learning-ai/responsible-ai">Responsible AI</a><a class="ContentPreview-IconWrapper" title="Link to all video" data-testid="content-preview-icon-link" data-discover="true" href="/videos"><span data-component="icon" data-name="Play" class="ContentPreview-Icon" style="mask-image:url(/build/_assets/Play-CLWHZVKX.svg);-webkit-mask-image:url(/build/_assets/Play-CLWHZVKX.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span></a><div class="VerticalCard"><div class="VerticalCard-Body"><a class="VerticalCard-Title VerticalCard-Title_displayOption_default" data-testid="preview-default-title" data-discover="true" href="/responsible-ai/innovation-relies-on-safeguarding-ai-technology-to-mitigate-its-risks">Innovation Relies on Safeguarding AI Technology to Mitigate its Risks</a><a class="VerticalCard-Title VerticalCard-Title_displayOption_mobile" data-testid="preview-mobile-title" data-discover="true" href="/responsible-ai/innovation-relies-on-safeguarding-ai-technology-to-mitigate-its-risks">Innovation Relies on Safeguarding AI Technology to Mitigate its Risks</a><div class="Contributors Contributors_variant_slimline VerticalCard-ContributorsWrapper" data-component="contributors"><div class="Contributors-InfoWrapper"><span class="Contributors-ByText" data-testid="by-text">by</span><a class="Contributors-ContributorName" data-testid="contributor-name" data-discover="true" href="/author/brandon-taylor">Brandon Taylor</a></div></div></div><div class="VerticalCard-Footer"><span class="VerticalCard-Date" data-testid="vertical-card-date">Nov 22, 2024</span><div data-module="card-time" class="CardTime"><div data-component="article-read-time" class="ArticleReadTime ArticleReadTime_size_small CardTime-ReadTime"><span>5 Min<!-- --> <!-- -->View</span></div></div></div></div></div></div></div></div></div></div></div></div></div><div class="MainMenu-MenuItemWrapper"><div class="MainMenu-MenuItem" role="menuitem" tabindex="0" data-testid="openSubMenu" aria-label="Open Sub menu of Sustainability"><span class="MainMenu-MainTitle">Sustainability<span data-component="icon" data-name="ChevronDown" class="MainMenu-SubMenuIcon" style="mask-image:url(/build/_assets/ChevronDown-PF4EH6J6.svg);-webkit-mask-image:url(/build/_assets/ChevronDown-PF4EH6J6.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span></span></div><div class="MainMenu-SubMenuWrapper"><div class="MainMenu-SubMenuContent"><div data-module="sub-menu" class="SubMenu MainMenu-SubMenu" role="presentation"><div class="SubMenu-Container"><div class="SubMenu-RelatedTopicsWrapper"><h4 class="SubMenu-RelatedTopics">Related Topics</h4><div class="SubMenu-CasualLinkWrapper" data-testid="related"><ul class="SubMenu-CasualLinkList"><li class="SubMenu-CasualLinkItem"><a class="SubMenu-ItemLink" data-testid="sub-menu-item-link" data-discover="true" href="/sustainability/green-it">Green IT</a></li></ul><ul class="SubMenu-CasualLinkList"><li class="SubMenu-CasualLinkItem"><a class="SubMenu-ItemLink" data-testid="sub-menu-item-link" data-discover="true" href="/sustainability/esg">ESG</a></li></ul></div></div><div class="SubMenu-RecentContentWrapper" data-testid="recent"><div class="SubMenu-RecentContentHeading"><h4 data-testid="recent-title" class="SubMenu-RecentText">Recent in <a class="SubMenu-RecentTopicTerm" data-discover="true" href="/sustainability">Sustainability</a></h4><div data-testid="see-more" class="SubMenu-SeeMore"><a class="SubMenu-MoreContent" data-discover="true" href="/sustainability"><span class="SubMenu-SeeMoreText">See All Sustainability</span><span data-component="icon" data-name="ChevronRight" class="SubMenu-SeeMoreIcon" style="mask-image:url(/build/_assets/ChevronRight-NHDKEYGJ.svg);-webkit-mask-image:url(/build/_assets/ChevronRight-NHDKEYGJ.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span></a></div></div><div class="SubMenu-ContentWrapper"><div class="ContentPreview" data-module="content-preview" data-variant="card-vertical"><div class="ContentPreview-Wrapper ContentPreview-Wrapper_variant_cardVertical"><a data-testid="thumbnail" data-discover="true" href="/machine-learning-ai/ai-and-the-war-against-plastic-waste"><div class="ContentPreview-ImageContainer"><span data-testid="content-preview-screen-reader-text" class="ContentPreview-ImageScreenReaderText">Pollution floating in river, Mumbai, India</span><img data-testid="content-preview-image" data-component="image" class="ContentPreview-Image" data-src="https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt8d72c07646ca59f0/673615d16eeb84936fd89a51/pollutedriver_paulkennedy-AlamyStockPhoto.jpg?width=700&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt8d72c07646ca59f0/673615d16eeb84936fd89a51/pollutedriver_paulkennedy-AlamyStockPhoto.jpg?width=700&auto=webp&quality=80&disable=upscale" loading="lazy" alt="" title=""/></div></a><a data-component="keyword" class="Keyword Keyword_variant_standard Keyword_title_machineLearningAi ContentPreview-Category" data-discover="true" href="/machine-learning-ai">Machine Learning & AI</a><div class="VerticalCard"><div class="VerticalCard-Body"><a class="VerticalCard-Title VerticalCard-Title_displayOption_default" data-testid="preview-default-title" data-discover="true" href="/machine-learning-ai/ai-and-the-war-against-plastic-waste">AI and the War Against Plastic Waste</a><a class="VerticalCard-Title VerticalCard-Title_displayOption_mobile" data-testid="preview-mobile-title" data-discover="true" href="/machine-learning-ai/ai-and-the-war-against-plastic-waste">AI and the War Against Plastic Waste</a><div class="Contributors Contributors_variant_slimline VerticalCard-ContributorsWrapper" data-component="contributors"><div class="Contributors-InfoWrapper"><span class="Contributors-ByText" data-testid="by-text">by</span><a class="Contributors-ContributorName" data-testid="contributor-name" data-discover="true" href="/author/carrie-pallardy">Carrie Pallardy</a></div></div></div><div class="VerticalCard-Footer"><span class="VerticalCard-Date" data-testid="vertical-card-date">Nov 19, 2024</span><div data-module="card-time" class="CardTime"><div data-component="article-read-time" class="ArticleReadTime ArticleReadTime_size_small CardTime-ReadTime"><span>10 Min<!-- --> <!-- -->Read</span></div></div></div></div></div></div><div class="ContentPreview" data-module="content-preview" data-variant="card-vertical"><div class="ContentPreview-Wrapper ContentPreview-Wrapper_variant_cardVertical"><a data-testid="thumbnail" data-discover="true" href="/sustainability/why-cios-must-lead-the-charge-on-sustainable-technology"><div class="ContentPreview-ImageContainer"><span data-testid="content-preview-screen-reader-text" class="ContentPreview-ImageScreenReaderText">green world digital</span><img data-testid="content-preview-image" data-component="image" class="ContentPreview-Image" data-src="https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt214d1816c7d0f46c/671fa236a93995afbd90faff/KanawatTH-green-energy-security-shutterstock.jpg?width=700&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt214d1816c7d0f46c/671fa236a93995afbd90faff/KanawatTH-green-energy-security-shutterstock.jpg?width=700&auto=webp&quality=80&disable=upscale" loading="lazy" alt="" title=""/></div></a><a data-component="keyword" class="Keyword Keyword_variant_standard Keyword_title_sustainability ContentPreview-Category" data-discover="true" href="/sustainability">Sustainability</a><div class="VerticalCard"><div class="VerticalCard-Body"><a class="VerticalCard-Title VerticalCard-Title_displayOption_default" data-testid="preview-default-title" data-discover="true" href="/sustainability/why-cios-must-lead-the-charge-on-sustainable-technology">Why CIOs Must Lead the Charge on Sustainable Technology</a><a class="VerticalCard-Title VerticalCard-Title_displayOption_mobile" data-testid="preview-mobile-title" data-discover="true" href="/sustainability/why-cios-must-lead-the-charge-on-sustainable-technology">Why CIOs Must Lead the Charge on Sustainable Technology</a><div class="Contributors Contributors_variant_slimline VerticalCard-ContributorsWrapper" data-component="contributors"><div class="Contributors-InfoWrapper"><span class="Contributors-ByText" data-testid="by-text">by</span><a class="Contributors-ContributorName" data-testid="contributor-name" data-discover="true" href="/author/hiren-hasmukh">Hiren Hasmukh</a></div></div></div><div class="VerticalCard-Footer"><span class="VerticalCard-Date" data-testid="vertical-card-date">Nov 13, 2024</span><div data-module="card-time" class="CardTime"><div data-component="article-read-time" class="ArticleReadTime ArticleReadTime_size_small CardTime-ReadTime"><span>4 Min<!-- --> <!-- -->Read</span></div></div></div></div></div></div></div></div></div></div></div></div></div><div class="MainMenu-MenuItemWrapper"><div class="MainMenu-MenuItem" role="menuitem" tabindex="0" data-testid="openSubMenu" aria-label="Open Sub menu of Infrastructure"><span class="MainMenu-MainTitle">Infrastructure<span data-component="icon" data-name="ChevronDown" class="MainMenu-SubMenuIcon" style="mask-image:url(/build/_assets/ChevronDown-PF4EH6J6.svg);-webkit-mask-image:url(/build/_assets/ChevronDown-PF4EH6J6.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span></span></div><div class="MainMenu-SubMenuWrapper"><div class="MainMenu-SubMenuContent"><div data-module="sub-menu" class="SubMenu MainMenu-SubMenu" role="presentation"><div class="SubMenu-Container"><div class="SubMenu-RelatedTopicsWrapper"><h4 class="SubMenu-RelatedTopics">Related Topics</h4><div class="SubMenu-CasualLinkWrapper" data-testid="related"><ul class="SubMenu-CasualLinkList"><li class="SubMenu-CasualLinkItem"><a class="SubMenu-ItemLink" data-testid="sub-menu-item-link" data-discover="true" href="/it-infrastructure/data-centers">Data Centers</a></li></ul><ul class="SubMenu-CasualLinkList"><li class="SubMenu-CasualLinkItem"><a class="SubMenu-ItemLink" data-testid="sub-menu-item-link" data-discover="true" href="/it-infrastructure/cloud-computing">Cloud Computing</a></li></ul></div></div><div class="SubMenu-RecentContentWrapper" data-testid="recent"><div class="SubMenu-RecentContentHeading"><h4 data-testid="recent-title" class="SubMenu-RecentText">Recent in <a class="SubMenu-RecentTopicTerm" data-discover="true" href="/it-infrastructure">Infrastructure</a></h4><div data-testid="see-more" class="SubMenu-SeeMore"><a class="SubMenu-MoreContent" data-discover="true" href="/it-infrastructure"><span class="SubMenu-SeeMoreText">See All Infrastructure</span><span data-component="icon" data-name="ChevronRight" class="SubMenu-SeeMoreIcon" style="mask-image:url(/build/_assets/ChevronRight-NHDKEYGJ.svg);-webkit-mask-image:url(/build/_assets/ChevronRight-NHDKEYGJ.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span></a></div></div><div class="SubMenu-ContentWrapper"><div class="ContentPreview" data-module="content-preview" data-variant="card-vertical"><div class="ContentPreview-Wrapper ContentPreview-Wrapper_variant_cardVertical"><a data-testid="thumbnail" data-discover="true" href="/it-leadership/solarwinds-ceo-on-building-trust-after-breach-unifying-it-and-c-suite-and-genai-future"><div class="ContentPreview-ImageContainer"><span data-testid="content-preview-screen-reader-text" class="ContentPreview-ImageScreenReaderText">thumbnail</span><img data-testid="content-preview-image" data-component="image" class="ContentPreview-Image" data-src="https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt8b52468b0c8f906b/6745d77ff7643ded0dda2f1c/Sudhakar_RamakrishnaNew.jpg?width=700&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt8b52468b0c8f906b/6745d77ff7643ded0dda2f1c/Sudhakar_RamakrishnaNew.jpg?width=700&auto=webp&quality=80&disable=upscale" loading="lazy" alt="" title=""/></div></a><a data-component="keyword" class="Keyword Keyword_variant_standard Keyword_title_itLeadership ContentPreview-Category" data-discover="true" href="/it-leadership">IT Leadership</a><div class="VerticalCard"><div class="VerticalCard-Body"><a class="VerticalCard-Title VerticalCard-Title_displayOption_default" data-testid="preview-default-title" data-discover="true" href="/it-leadership/solarwinds-ceo-on-building-trust-after-breach-unifying-it-and-c-suite-and-genai-future">SolarWinds CEO on Building Trust After Breach, Unifying IT and C-Suite, and GenAI Future</a><a class="VerticalCard-Title VerticalCard-Title_displayOption_mobile" data-testid="preview-mobile-title" data-discover="true" href="/it-leadership/solarwinds-ceo-on-building-trust-after-breach-unifying-it-and-c-suite-and-genai-future">SolarWinds CEO on Building Trust After Breach, Unifying IT and C-Suite, and GenAI Future</a><div class="Contributors Contributors_variant_slimline VerticalCard-ContributorsWrapper" data-component="contributors"><div class="Contributors-InfoWrapper"><span class="Contributors-ByText" data-testid="by-text">by</span><a class="Contributors-ContributorName" data-testid="contributor-name" data-discover="true" href="/author/shane-snider">Shane Snider</a></div></div></div><div class="VerticalCard-Footer"><span class="VerticalCard-Date" data-testid="vertical-card-date">Nov 26, 2024</span><div data-module="card-time" class="CardTime"><div data-component="article-read-time" class="ArticleReadTime ArticleReadTime_size_small CardTime-ReadTime"><span>7 Min<!-- --> <!-- -->Read</span></div></div></div></div></div></div><div class="ContentPreview" data-module="content-preview" data-variant="card-vertical"><div class="ContentPreview-Wrapper ContentPreview-Wrapper_variant_cardVertical"><a data-testid="thumbnail" data-discover="true" href="/machine-learning-ai/how-will-ai-shape-the-future-of-cloud-and-vice-versa-"><div class="ContentPreview-ImageContainer"><span data-testid="content-preview-screen-reader-text" class="ContentPreview-ImageScreenReaderText">Ai Robot hand pointing Cloud computing technology internet storage network.</span><img data-testid="content-preview-image" data-component="image" class="ContentPreview-Image" data-src="https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt3b1e254416796507/673b682fe86a8c1ecc89b925/AI_cloud-PeachayaTanomsup-AlamyStockPhoto.jpg?width=700&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt3b1e254416796507/673b682fe86a8c1ecc89b925/AI_cloud-PeachayaTanomsup-AlamyStockPhoto.jpg?width=700&auto=webp&quality=80&disable=upscale" loading="lazy" alt="" title=""/></div></a><a data-component="keyword" class="Keyword Keyword_variant_standard Keyword_title_machineLearningAi ContentPreview-Category" data-discover="true" href="/machine-learning-ai">Machine Learning & AI</a><a class="ContentPreview-IconWrapper" title="Link to all podcast" data-testid="content-preview-icon-link" data-discover="true" href="/podcasts"><span data-component="icon" data-name="Microphone" class="ContentPreview-Icon" style="mask-image:url(/build/_assets/Microphone-W4D26BPI.svg);-webkit-mask-image:url(/build/_assets/Microphone-W4D26BPI.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span></a><div class="VerticalCard"><div class="VerticalCard-Body"><a class="VerticalCard-Title VerticalCard-Title_displayOption_default" data-testid="preview-default-title" data-discover="true" href="/machine-learning-ai/how-will-ai-shape-the-future-of-cloud-and-vice-versa-">How Will AI Shape the Future of Cloud and Vice Versa?</a><a class="VerticalCard-Title VerticalCard-Title_displayOption_mobile" data-testid="preview-mobile-title" data-discover="true" href="/machine-learning-ai/how-will-ai-shape-the-future-of-cloud-and-vice-versa-">How Will AI Shape the Future of Cloud and Vice Versa?</a><div class="Contributors Contributors_variant_slimline VerticalCard-ContributorsWrapper" data-component="contributors"><div class="Contributors-InfoWrapper"><span class="Contributors-ByText" data-testid="by-text">by</span><a class="Contributors-ContributorName" data-testid="contributor-name" data-discover="true" href="/author/joao-pierre-s-ruth">Joao-Pierre S. Ruth</a></div></div></div><div class="VerticalCard-Footer"><span class="VerticalCard-Date" data-testid="vertical-card-date">Nov 19, 2024</span></div></div></div></div></div></div></div></div></div></div></div><div class="MainMenu-MenuItemWrapper"><div class="MainMenu-MenuItem" role="menuitem" tabindex="0" data-testid="openSubMenu" aria-label="Open Sub menu of Software"><span class="MainMenu-MainTitle">Software<span data-component="icon" data-name="ChevronDown" class="MainMenu-SubMenuIcon" style="mask-image:url(/build/_assets/ChevronDown-PF4EH6J6.svg);-webkit-mask-image:url(/build/_assets/ChevronDown-PF4EH6J6.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span></span></div><div class="MainMenu-SubMenuWrapper"><div class="MainMenu-SubMenuContent"><div data-module="sub-menu" class="SubMenu MainMenu-SubMenu" role="presentation"><div class="SubMenu-Container"><div class="SubMenu-RelatedTopicsWrapper"><h4 class="SubMenu-RelatedTopics">Related Topics</h4><div class="SubMenu-CasualLinkWrapper" data-testid="related"><ul class="SubMenu-CasualLinkList"><li class="SubMenu-CasualLinkItem"><a class="SubMenu-ItemLink" data-testid="sub-menu-item-link" data-discover="true" href="/software-services/devops">DevOps</a></li><li class="SubMenu-CasualLinkItem"><a class="SubMenu-ItemLink" data-testid="sub-menu-item-link" data-discover="true" href="/software-services/software-platforms">Software Platforms</a></li></ul><ul class="SubMenu-CasualLinkList"><li class="SubMenu-CasualLinkItem"><a class="SubMenu-ItemLink" data-testid="sub-menu-item-link" data-discover="true" href="/software-services/operating-systems">Operating Systems</a></li></ul></div></div><div class="SubMenu-RecentContentWrapper" data-testid="recent"><div class="SubMenu-RecentContentHeading"><h4 data-testid="recent-title" class="SubMenu-RecentText">Recent in <a class="SubMenu-RecentTopicTerm" data-discover="true" href="/software-services">Software</a></h4><div data-testid="see-more" class="SubMenu-SeeMore"><a class="SubMenu-MoreContent" data-discover="true" href="/software-services"><span class="SubMenu-SeeMoreText">See All Software</span><span data-component="icon" data-name="ChevronRight" class="SubMenu-SeeMoreIcon" style="mask-image:url(/build/_assets/ChevronRight-NHDKEYGJ.svg);-webkit-mask-image:url(/build/_assets/ChevronRight-NHDKEYGJ.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span></a></div></div><div class="SubMenu-ContentWrapper"><div class="ContentPreview" data-module="content-preview" data-variant="card-vertical"><div class="ContentPreview-Wrapper ContentPreview-Wrapper_variant_cardVertical"><a data-testid="thumbnail" data-discover="true" href="/software-services/develop-an-effective-strategy-for-user-self-help-portals"><div class="ContentPreview-ImageContainer"><span data-testid="content-preview-screen-reader-text" class="ContentPreview-ImageScreenReaderText">help desk concept cubes </span><img data-testid="content-preview-image" data-component="image" class="ContentPreview-Image" data-src="https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt491b97d9db8b5ef6/6744b9b0fbdcfdb173ec309b/self_help_portal-Bonaventura-alamy.jpg?width=700&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt491b97d9db8b5ef6/6744b9b0fbdcfdb173ec309b/self_help_portal-Bonaventura-alamy.jpg?width=700&auto=webp&quality=80&disable=upscale" loading="lazy" alt="" title=""/></div></a><a data-component="keyword" class="Keyword Keyword_variant_standard Keyword_title_softwareServices ContentPreview-Category" data-discover="true" href="/software-services">Software & Services</a><div class="VerticalCard"><div class="VerticalCard-Body"><a class="VerticalCard-Title VerticalCard-Title_displayOption_default" data-testid="preview-default-title" data-discover="true" href="/software-services/develop-an-effective-strategy-for-user-self-help-portals">Develop an Effective Strategy for User Self-Help Portals</a><a class="VerticalCard-Title VerticalCard-Title_displayOption_mobile" data-testid="preview-mobile-title" data-discover="true" href="/software-services/develop-an-effective-strategy-for-user-self-help-portals">Develop an Effective Strategy for User Self-Help Portals</a><div class="Contributors Contributors_variant_slimline VerticalCard-ContributorsWrapper" data-component="contributors"><div class="Contributors-InfoWrapper"><span class="Contributors-ByText" data-testid="by-text">by</span><a class="Contributors-ContributorName" data-testid="contributor-name" data-discover="true" href="/author/mary-e-shacklett">Mary E. Shacklett</a></div></div></div><div class="VerticalCard-Footer"><span class="VerticalCard-Date" data-testid="vertical-card-date">Nov 26, 2024</span><div data-module="card-time" class="CardTime"><div data-component="article-read-time" class="ArticleReadTime ArticleReadTime_size_small CardTime-ReadTime"><span>6 Min<!-- --> <!-- -->Read</span></div></div></div></div></div></div><div class="ContentPreview" data-module="content-preview" data-variant="card-vertical"><div class="ContentPreview-Wrapper ContentPreview-Wrapper_variant_cardVertical"><a data-testid="thumbnail" data-discover="true" href="/data-management/doj-urges-google-breakup-targets-chrome-android-and-data-sharing"><div class="ContentPreview-ImageContainer"><span data-testid="content-preview-screen-reader-text" class="ContentPreview-ImageScreenReaderText">Google logo artistic concept</span><img data-testid="content-preview-image" data-component="image" class="ContentPreview-Image" data-src="https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt001013fc4cea5864/673f19f3ffb4172d04bc9a2d/2CDJ2XD.jpg?width=700&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt001013fc4cea5864/673f19f3ffb4172d04bc9a2d/2CDJ2XD.jpg?width=700&auto=webp&quality=80&disable=upscale" loading="lazy" alt="" title=""/></div></a><a data-component="keyword" class="Keyword Keyword_variant_standard Keyword_title_dataManagement ContentPreview-Category" data-discover="true" href="/data-management">Data Management</a><div class="VerticalCard"><div class="VerticalCard-Body"><a class="VerticalCard-Title VerticalCard-Title_displayOption_default" data-testid="preview-default-title" data-discover="true" href="/data-management/doj-urges-google-breakup-targets-chrome-android-and-data-sharing">DOJ Urges Google Breakup, Targets Chrome, Android and Data Sharing</a><a class="VerticalCard-Title VerticalCard-Title_displayOption_mobile" data-testid="preview-mobile-title" data-discover="true" href="/data-management/doj-urges-google-breakup-targets-chrome-android-and-data-sharing">DOJ Urges Google Breakup, Targets Chrome, Android and Data Sharing</a><div class="Contributors Contributors_variant_slimline VerticalCard-ContributorsWrapper" data-component="contributors"><div class="Contributors-InfoWrapper"><span class="Contributors-ByText" data-testid="by-text">by</span><a class="Contributors-ContributorName" data-testid="contributor-name" data-discover="true" href="/author/shane-snider">Shane Snider</a></div></div></div><div class="VerticalCard-Footer"><span class="VerticalCard-Date" data-testid="vertical-card-date">Nov 21, 2024</span><div data-module="card-time" class="CardTime"><div data-component="article-read-time" class="ArticleReadTime ArticleReadTime_size_small CardTime-ReadTime"><span>3 Min<!-- --> <!-- -->Read</span></div></div></div></div></div></div></div></div></div></div></div></div></div><div class="MainMenu-MenuItemWrapper"><div class="MainMenu-MenuItem" role="menuitem" tabindex="0" data-testid="openSubMenu" aria-label="Open Sub menu of More"><span class="MainMenu-MainTitle">More<span data-component="icon" data-name="ChevronDown" class="MainMenu-SubMenuIcon" style="mask-image:url(/build/_assets/ChevronDown-PF4EH6J6.svg);-webkit-mask-image:url(/build/_assets/ChevronDown-PF4EH6J6.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span></span></div><div class="MainMenu-SubMenuWrapper"><div class="MainMenu-SubMenuContent"><div data-module="sub-menu" class="SubMenu MainMenu-SubMenu" role="presentation"><div class="SubMenu-Container"><div class="SubMenu-RelatedTopicsWrapper"><h4 class="SubMenu-RelatedTopics">Related Topics</h4><div class="SubMenu-CasualLinkWrapper" data-testid="related"><ul class="SubMenu-CasualLinkList"><li class="SubMenu-CasualLinkItem"><a class="SubMenu-ItemLink" data-testid="sub-menu-item-link" rel="nofollow" target="_blank" href="https://iw-resources.informationweek.com/free/w_ingg126/prgm.cgi?a=1">Newsletters</a></li><li class="SubMenu-CasualLinkItem"><a class="SubMenu-ItemLink" data-testid="sub-menu-item-link" data-discover="true" href="/resources?page=1&types=Research+Report">Reports/Research</a></li><li class="SubMenu-CasualLinkItem"><a class="SubMenu-ItemLink" data-testid="sub-menu-item-link" data-discover="true" href="/resources?page=1&types=Virtual+Event&types=Webinar">Online Events</a></li><li class="SubMenu-CasualLinkItem"><a class="SubMenu-ItemLink" data-testid="sub-menu-item-link" data-discover="true" href="/events">Live Events</a></li><li class="SubMenu-CasualLinkItem"><a class="SubMenu-ItemLink" data-testid="sub-menu-item-link" data-discover="true" href="/podcasts">Podcasts</a></li></ul><ul class="SubMenu-CasualLinkList"><li class="SubMenu-CasualLinkItem"><a class="SubMenu-ItemLink" data-testid="sub-menu-item-link" data-discover="true" href="/resources?page=1&types=White+Paper">White Papers</a></li><li class="SubMenu-CasualLinkItem"><a class="SubMenu-ItemLink" data-testid="sub-menu-item-link" data-discover="true" href="/advertise">Advertise With Us</a></li><li class="SubMenu-CasualLinkItem"><a class="SubMenu-ItemLink" data-testid="sub-menu-item-link" data-discover="true" href="/about-us">About Us</a></li><li class="SubMenu-CasualLinkItem"><a class="SubMenu-ItemLink" data-testid="sub-menu-item-link" data-discover="true" href="/it-sectors">IT Sectors</a></li></ul></div></div><div class="SubMenu-RecentContentWrapper" data-testid="recent"><div data-testid="see-more" class="SubMenu-SeeMore"><a class="SubMenu-MoreContent SubMenu-MoreContent_noRecent" data-discover="true" href="/resources"><span class="SubMenu-SeeMoreText">InformationWeek Resource Library</span><span data-component="icon" data-name="ChevronRight" class="SubMenu-SeeMoreIcon" style="mask-image:url(/build/_assets/ChevronRight-NHDKEYGJ.svg);-webkit-mask-image:url(/build/_assets/ChevronRight-NHDKEYGJ.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span></a></div></div></div></div></div></div></div></div><div class="MainMenu-SearchButtonWrapper"><button data-testid="mainMenu-SearchButton" aria-label="Open Search" class="MainMenu-SearchButton"><span data-component="icon" data-name="Search" class="MainMenu-SearchButtonIcon" style="mask-image:url(/build/_assets/Search-T2ANYVG5.svg);-webkit-mask-image:url(/build/_assets/Search-T2ANYVG5.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span></button></div></div><div class="MainMenu-SearchWrapper"><div class="FullScreenBackground MainMenu-SearchBackground MainMenu-SearchBackground_withSearchBar"></div><button data-testid="mainMenu-SearchCloseButton" class="MainMenu-SearchCloseButton" aria-label="Close Search"><span data-component="icon" data-name="Close" class="MainMenu-SearchCloseIcon" style="mask-image:url(/build/_assets/Close-KKOYAUD6.svg);-webkit-mask-image:url(/build/_assets/Close-KKOYAUD6.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span></button></div></div></div></div></nav><section class="Layout-Section"><div id="iiris-identity" data-testid="iris-identity"></div><div data-template="topic-list"><div data-template="list-content" class="ListContent"><div class="TwoColumnLayout"><div id="portal-root"></div><div class="TwoColumnLayout-Head"><div class="TopicList-Head"><ul data-component="breadcrumb" class="Breadcrumb TopicList-Breadcrumbs"><li class="Breadcrumb-ListItem"><a class="Breadcrumb-GetText" data-testid="breadcrumb-link" data-discover="true" href="/">Home</a><span data-component="icon" data-name="ChevronRight" class="Breadcrumb-DividerIcon Breadcrumb-NextIcon" style="mask-image:url(/build/_assets/ChevronRight-NHDKEYGJ.svg);-webkit-mask-image:url(/build/_assets/ChevronRight-NHDKEYGJ.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span><span data-component="icon" data-name="ChevronRight" class="Breadcrumb-DividerIcon Breadcrumb-PrevIcon" style="mask-image:url(/build/_assets/ChevronRight-NHDKEYGJ.svg);-webkit-mask-image:url(/build/_assets/ChevronRight-NHDKEYGJ.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span></li><li class="Breadcrumb-ListItem"><a class="Breadcrumb-GetText Breadcrumb-GetText_isNearLastItem" data-testid="breadcrumb-link" data-discover="true" href="/cyber-resilience">Cyber Resilience</a><span data-component="icon" data-name="ChevronRight" class="Breadcrumb-DividerIcon Breadcrumb-NextIcon" style="mask-image:url(/build/_assets/ChevronRight-NHDKEYGJ.svg);-webkit-mask-image:url(/build/_assets/ChevronRight-NHDKEYGJ.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span></li><li class="Breadcrumb-ListItem"><a class="Breadcrumb-GetText Breadcrumb-GetText_isLastItem" data-testid="breadcrumb-link" data-discover="true" href="/cyber-resilience/cybersecurity">Cybersecurity</a></li></ul><div data-module="category-header" class="CategoryHeader CategoryHeader_primaryTitle"><div class="CategoryHeader-TitleWrapper CategoryHeader-TitleWrapper_primaryTitle"><div class="CategoryHeader-TitleContent"><h1 class="CategoryHeader-Title CategoryHeader-Title_primary" data-testid="category-header-title">Cybersecurity</h1></div><div class="CategoryHeader-SponsorAdsWrapper" data-testid="category-header-sponsor-ads"></div></div></div></div></div><div class="TwoColumnLayout-Content"><div class="TwoColumnLayout-Body"><div class="ListContent-Body" data-testid="list-content-body"><div class="ContentPreview ListContent-Content ListContent-Content_featured" data-module="content-preview" data-variant="summary"><div class="ContentPreview-Wrapper ContentPreview-Wrapper_variant_summary"><a data-testid="thumbnail" data-discover="true" href="/cyber-resilience/why-it-leaders-should-hire-veterans-for-cybersecurity-roles"><div class="ContentPreview-ImageContainer"><span data-testid="content-preview-screen-reader-text" class="ContentPreview-ImageScreenReaderText">military clothing pattern camouflage</span><img data-testid="content-preview-image" data-component="image" class="ContentPreview-Image" data-src="https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt12e860b21fa7e8d3/673e3b9d1e14c30871e127b2/military_pattern-Desintegrator-alamy.jpg?width=700&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt12e860b21fa7e8d3/673e3b9d1e14c30871e127b2/military_pattern-Desintegrator-alamy.jpg?width=700&auto=webp&quality=80&disable=upscale" loading="lazy" alt="" title=""/></div></a><a data-component="keyword" class="Keyword Keyword_variant_standard Keyword_title_cyberResilience ContentPreview-Category" data-discover="true" href="/cyber-resilience">Cyber Resilience</a><div class="ArticlePreview"><div class="ArticlePreview-Body"><a class="ArticlePreview-Title ArticlePreview-Title_displayOption_default" data-testid="preview-default-title" data-discover="true" href="/cyber-resilience/why-it-leaders-should-hire-veterans-for-cybersecurity-roles">Why IT Leaders Should Hire Veterans for Cybersecurity Roles</a><a class="ArticlePreview-Title ArticlePreview-Title_displayOption_mobile" data-testid="preview-mobile-title" data-discover="true" href="/cyber-resilience/why-it-leaders-should-hire-veterans-for-cybersecurity-roles">Why IT Leaders Should Hire Veterans for Cybersecurity Roles</a><p data-testid="preview-card-summary" class="ArticlePreview-Summary">Maintaining cybersecurity requires the effort of a team. Veterans are uniquely skilled to operate in this role and bring strengths that meet key industry needs.</p><div class="Contributors Contributors_variant_slimline Contributors_cardVariant_summary Contributors_hasAvatar" data-component="contributors"><div class="Contributors-AvatarWrapper"><a class="Contributors-AvatarLink" aria-label="David McGuire" data-discover="true" href="/author/david-mcguire"><img aria-hidden="true" data-testid="contributor-avatar" data-component="image" class="Contributors-Avatar" data-src="https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt91c4ecaadaa91ae5/673e3937f449cea96b6c9f41/David_McGuire_Headshot1.jpg?width=100&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt91c4ecaadaa91ae5/673e3937f449cea96b6c9f41/David_McGuire_Headshot1.jpg?width=100&auto=webp&quality=80&disable=upscale" loading="lazy" alt="Picture of David McGuire" title="Picture of David McGuire"/></a></div><div class="Contributors-InfoWrapper"><span class="Contributors-ByText" data-testid="by-text">by</span><a class="Contributors-ContributorName" data-testid="contributor-name" data-discover="true" href="/author/david-mcguire">David McGuire</a><span class="Contributors-ContributorTitle" data-testid="contributor-title">, <!-- -->CEO, SpecterOps</span></div></div></div><div class="ArticlePreview-Footer"><span class="ArticlePreview-Date">Nov 27, 2024</span><div data-module="card-time" class="CardTime"><span class="CardTime-SeparatorLine">|</span><div data-component="article-read-time" class="ArticleReadTime ArticleReadTime_size_small CardTime-ReadTime"><span>1 Min<!-- --> <!-- -->Read</span></div></div></div></div></div></div><div class="ListContent-Content ListContent-Content_latest"><div class="ListContent-ContentWrapper"><div class="ListContent-ContentContainer"><div class="ContentPreview ListContent-LatestItem" data-module="content-preview" data-variant="normal"><div class="ContentPreview-Wrapper ContentPreview-Wrapper_variant_normal ContentPreview-Wrapper_articleSize_big"><a data-testid="thumbnail" data-discover="true" href="/cyber-resilience/meeting-ai-regulations-a-guide-for-security-leaders"><div class="ContentPreview-ImageContainer"><span data-testid="content-preview-screen-reader-text" class="ContentPreview-ImageScreenReaderText">digital abstract with security locks and words like danger</span><img data-testid="content-preview-image" data-component="image" class="ContentPreview-Image" data-src="https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt63431016eb292e37/673caa6d012f52541bdcfd36/cybersecurity-SergeyNivens-adobe-new.jpg?width=700&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt63431016eb292e37/673caa6d012f52541bdcfd36/cybersecurity-SergeyNivens-adobe-new.jpg?width=700&auto=webp&quality=80&disable=upscale" loading="lazy" alt="" title=""/></div></a><a data-component="keyword" class="Keyword Keyword_variant_standard Keyword_title_cyberResilience ContentPreview-Category" data-discover="true" href="/cyber-resilience">Cyber Resilience</a><div class="ContentCard"><div class="ContentCard-Body"><a class="ContentCard-Title ContentCard-Title_displayOption_default" data-testid="preview-default-title" data-discover="true" href="/cyber-resilience/meeting-ai-regulations-a-guide-for-security-leaders">Meeting AI Regulations: A Guide for Security Leaders</a><a class="ContentCard-Title ContentCard-Title_displayOption_mobile" data-testid="preview-mobile-title" data-discover="true" href="/cyber-resilience/meeting-ai-regulations-a-guide-for-security-leaders">Meeting AI Regulations: A Guide for Security Leaders</a><div class="Contributors Contributors_variant_slimline Contributors_cardVariant_normal" data-component="contributors"><div class="Contributors-InfoWrapper"><span class="Contributors-ByText" data-testid="by-text">by</span><a class="Contributors-ContributorName" data-testid="contributor-name" data-discover="true" href="/author/dana-simberkoff">Dana Simberkoff</a></div></div></div><div class="ContentCard-Footer"><span class="ContentCard-Date" data-testid="content-card-date">Nov 26, 2024</span><div data-module="card-time" class="CardTime"><div data-component="article-read-time" class="ArticleReadTime ArticleReadTime_size_small CardTime-ReadTime"><span>1 Min<!-- --> <!-- -->Read</span></div></div></div></div></div></div><div class="ContentPreview ListContent-LatestItem" data-module="content-preview" data-variant="normal"><div class="ContentPreview-Wrapper ContentPreview-Wrapper_variant_normal ContentPreview-Wrapper_articleSize_big"><a data-testid="thumbnail" data-discover="true" href="/cyber-resilience/what-does-enterprise-wide-cybersecurity-culture-look-like-"><div class="ContentPreview-ImageContainer"><span data-testid="content-preview-screen-reader-text" class="ContentPreview-ImageScreenReaderText">Cybersecurity team with 3d software design for computer.</span><img data-testid="content-preview-image" data-component="image" class="ContentPreview-Image" data-src="https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/bltd4562d02cb55817f/673e10dc006ff59e6ee82a21/cybersecurityteam_YuriArcurs-AlamyStockPhoto.jpg?width=700&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/bltd4562d02cb55817f/673e10dc006ff59e6ee82a21/cybersecurityteam_YuriArcurs-AlamyStockPhoto.jpg?width=700&auto=webp&quality=80&disable=upscale" loading="lazy" alt="" title=""/></div></a><a data-component="keyword" class="Keyword Keyword_variant_standard Keyword_title_cyberResilience ContentPreview-Category" data-discover="true" href="/cyber-resilience">Cyber Resilience</a><div class="ContentCard"><div class="ContentCard-Body"><a class="ContentCard-Title ContentCard-Title_displayOption_default" data-testid="preview-default-title" data-discover="true" href="/cyber-resilience/what-does-enterprise-wide-cybersecurity-culture-look-like-">What Does Enterprise-Wide Cybersecurity Culture Look Like?</a><a class="ContentCard-Title ContentCard-Title_displayOption_mobile" data-testid="preview-mobile-title" data-discover="true" href="/cyber-resilience/what-does-enterprise-wide-cybersecurity-culture-look-like-">What Does Enterprise-Wide Cybersecurity Culture Look Like?</a><div class="Contributors Contributors_variant_slimline Contributors_cardVariant_normal" data-component="contributors"><div class="Contributors-InfoWrapper"><span class="Contributors-ByText" data-testid="by-text">by</span><a class="Contributors-ContributorName" data-testid="contributor-name" data-discover="true" href="/author/carrie-pallardy">Carrie Pallardy</a></div></div></div><div class="ContentCard-Footer"><span class="ContentCard-Date" data-testid="content-card-date">Nov 25, 2024</span><div data-module="card-time" class="CardTime"><div data-component="article-read-time" class="ArticleReadTime ArticleReadTime_size_small CardTime-ReadTime"><span>1 Min<!-- --> <!-- -->Read</span></div></div></div></div></div></div></div></div><div class="ListContent-ContentWrapper"><div class="ListContent-ContentContainer"><div class="ContentPreview ListContent-LatestItem" data-module="content-preview" data-variant="normal"><div class="ContentPreview-Wrapper ContentPreview-Wrapper_variant_normal ContentPreview-Wrapper_articleSize_small"><a data-testid="thumbnail" data-discover="true" href="/cyber-resilience/does-the-us-government-have-a-cybersecurity-monoculture-problem-"><div class="ContentPreview-ImageContainer"><span data-testid="content-preview-screen-reader-text" class="ContentPreview-ImageScreenReaderText">thumbnail</span><img data-testid="content-preview-image" data-component="image" class="ContentPreview-Image" data-src="https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt2ee36708e13d1bde/673f984a9f50470048b0f01e/Microsoftsecurity-SOPA-Alamy.jpg?width=700&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt2ee36708e13d1bde/673f984a9f50470048b0f01e/Microsoftsecurity-SOPA-Alamy.jpg?width=700&auto=webp&quality=80&disable=upscale" loading="lazy" alt="" title=""/></div></a><a data-component="keyword" class="Keyword Keyword_variant_standard Keyword_title_cyberResilience ContentPreview-Category" data-discover="true" href="/cyber-resilience">Cyber Resilience</a><div class="ContentCard"><div class="ContentCard-Body"><a class="ContentCard-Title ContentCard-Title_displayOption_default" data-testid="preview-default-title" data-discover="true" href="/cyber-resilience/does-the-us-government-have-a-cybersecurity-monoculture-problem-">Does the US Government Have a Cybersecurity Monoculture Problem?</a><a class="ContentCard-Title ContentCard-Title_displayOption_mobile" data-testid="preview-mobile-title" data-discover="true" href="/cyber-resilience/does-the-us-government-have-a-cybersecurity-monoculture-problem-">Does the US Government Have a Cybersecurity Monoculture Problem?</a><div class="Contributors Contributors_variant_slimline Contributors_cardVariant_normal" data-component="contributors"><div class="Contributors-InfoWrapper"><span class="Contributors-ByText" data-testid="by-text">by</span><a class="Contributors-ContributorName" data-testid="contributor-name" data-discover="true" href="/author/carrie-pallardy">Carrie Pallardy</a></div></div></div><div class="ContentCard-Footer"><span class="ContentCard-Date" data-testid="content-card-date">Nov 21, 2024</span><div data-module="card-time" class="CardTime"><div data-component="article-read-time" class="ArticleReadTime ArticleReadTime_size_small CardTime-ReadTime"><span>1 Min<!-- --> <!-- -->Read</span></div></div></div></div></div></div><div class="ContentPreview ListContent-LatestItem" data-module="content-preview" data-variant="normal"><div class="ContentPreview-Wrapper ContentPreview-Wrapper_variant_normal ContentPreview-Wrapper_articleSize_small"><a data-testid="thumbnail" data-discover="true" href="/cyber-resilience/cyber-awareness-is-a-joke-here-s-how-to-actually-prepare-for-attacks"><div class="ContentPreview-ImageContainer"><span data-testid="content-preview-screen-reader-text" class="ContentPreview-ImageScreenReaderText">Binary Code With Skull and Crossbones, Representing A Computer Virus Or Malware attack -</span><img data-testid="content-preview-image" data-component="image" class="ContentPreview-Image" data-src="https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt0f90a5e8f8dfebfe/67378f3b5e7baf08b4f0b382/cybersecurity_skull-Nina_Shatirishvili_-alamy.jpg?width=700&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt0f90a5e8f8dfebfe/67378f3b5e7baf08b4f0b382/cybersecurity_skull-Nina_Shatirishvili_-alamy.jpg?width=700&auto=webp&quality=80&disable=upscale" loading="lazy" alt="" title=""/></div></a><a data-component="keyword" class="Keyword Keyword_variant_standard Keyword_title_cyberResilience ContentPreview-Category" data-discover="true" href="/cyber-resilience">Cyber Resilience</a><div class="ContentCard"><div class="ContentCard-Body"><a class="ContentCard-Title ContentCard-Title_displayOption_default" data-testid="preview-default-title" data-discover="true" href="/cyber-resilience/cyber-awareness-is-a-joke-here-s-how-to-actually-prepare-for-attacks">Cyber Awareness Is a Joke: Here’s How to Actually Prepare for Attacks</a><a class="ContentCard-Title ContentCard-Title_displayOption_mobile" data-testid="preview-mobile-title" data-discover="true" href="/cyber-resilience/cyber-awareness-is-a-joke-here-s-how-to-actually-prepare-for-attacks">Cyber Awareness Is a Joke: Here’s How to Actually Prepare for Attacks</a><div class="Contributors Contributors_variant_slimline Contributors_cardVariant_normal" data-component="contributors"><div class="Contributors-InfoWrapper"><span class="Contributors-ByText" data-testid="by-text">by</span><a class="Contributors-ContributorName" data-testid="contributor-name" data-discover="true" href="/author/max-vetter">Max Vetter</a></div></div></div><div class="ContentCard-Footer"><span class="ContentCard-Date" data-testid="content-card-date">Nov 21, 2024</span><div data-module="card-time" class="CardTime"><div data-component="article-read-time" class="ArticleReadTime ArticleReadTime_size_small CardTime-ReadTime"><span>1 Min<!-- --> <!-- -->Read</span></div></div></div></div></div></div><div class="ContentPreview ListContent-LatestItem" data-module="content-preview" data-variant="normal"><div class="ContentPreview-Wrapper ContentPreview-Wrapper_variant_normal ContentPreview-Wrapper_articleSize_small"><a data-testid="thumbnail" data-discover="true" href="/cyber-resilience/dhs-releases-secure-ai-framework-for-critical-infrastructure"><div class="ContentPreview-ImageContainer"><span data-testid="content-preview-screen-reader-text" class="ContentPreview-ImageScreenReaderText">US Department of Homeland Security Logo</span><img data-testid="content-preview-image" data-component="image" class="ContentPreview-Image" data-src="https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt0bf2bba9f29000a2/673df900625fb93ca33e421d/dhs-logo_GK_Images_alamy.jpg?width=700&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt0bf2bba9f29000a2/673df900625fb93ca33e421d/dhs-logo_GK_Images_alamy.jpg?width=700&auto=webp&quality=80&disable=upscale" loading="lazy" alt="" title=""/></div></a><a data-component="keyword" class="Keyword Keyword_variant_standard Keyword_title_cyberResilience ContentPreview-Category" data-discover="true" href="/cyber-resilience">Cyber Resilience</a><div class="ContentCard"><div class="ContentCard-Body"><a class="ContentCard-Title ContentCard-Title_displayOption_default" data-testid="preview-default-title" data-discover="true" href="/cyber-resilience/dhs-releases-secure-ai-framework-for-critical-infrastructure">DHS Releases Secure AI Framework for Critical Infrastructure</a><a class="ContentCard-Title ContentCard-Title_displayOption_mobile" data-testid="preview-mobile-title" data-discover="true" href="/cyber-resilience/dhs-releases-secure-ai-framework-for-critical-infrastructure">DHS Releases Secure AI Framework for Critical Infrastructure</a><div class="Contributors Contributors_variant_slimline Contributors_cardVariant_normal" data-component="contributors"><div class="Contributors-InfoWrapper"><span class="Contributors-ByText" data-testid="by-text">by</span><a class="Contributors-ContributorName" data-testid="contributor-name" data-discover="true" href="/author/dark-reading">Dark Reading</a></div></div></div><div class="ContentCard-Footer"><span class="ContentCard-Date" data-testid="content-card-date">Nov 21, 2024</span><div data-module="card-time" class="CardTime"><div data-component="article-read-time" class="ArticleReadTime ArticleReadTime_size_small CardTime-ReadTime"><span>1 Min<!-- --> <!-- -->Read</span></div></div></div></div></div></div></div></div></div><div class="ContentPreview ListContent-ContentItem" data-module="content-preview" data-variant="small"><div class="ListPreview"><div class="ListPreview-Container"><div class="ListPreview-ImageWrapper"><a aria-label="Read more about: cloud computing background" data-discover="true" href="/it-infrastructure/6-cloud-trends-to-watch-in-2025"><div title="cloud computing background"><img data-component="image" class="ListPreview-Image" data-src="https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt976ce52f1cfd0dc2/67376e6ed415b349d98bd337/cloud-YAY_Media_AS_-alamy.jpg?width=300&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt976ce52f1cfd0dc2/67376e6ed415b349d98bd337/cloud-YAY_Media_AS_-alamy.jpg?width=300&auto=webp&quality=80&disable=upscale" loading="lazy" alt="cloud computing background" title="cloud computing background"/></div></a></div><div class="ListPreview-ContentWrapper"><div class="ListPreview-KeywordWrapper"><a data-component="keyword" class="Keyword Keyword_variant_alternate Keyword_title_itInfrastructure ListPreview-Keyword" data-discover="true" href="/it-infrastructure">IT Infrastructure</a></div><div class="ListPreview-TitleWrapper"><a class="ListPreview-Title" data-testid="preview-default-title" data-discover="true" href="/it-infrastructure/6-cloud-trends-to-watch-in-2025">6 Cloud Trends to Watch in 2025</a></div><div class="ListPreview-MobileTitleWrapper"><a class="ListPreview-Title" data-testid="preview-mobile-title" data-discover="true" href="/it-infrastructure/6-cloud-trends-to-watch-in-2025">6 Cloud Trends to Watch in 2025</a></div><div class="ListPreview-Footer"><span class="ListPreview-Date" data-testid="list-preview-date">Nov 18, 2024</span><div data-module="card-time" class="CardTime"><span class="CardTime-SeparatorLine">|</span><div data-component="article-read-time" class="ArticleReadTime ArticleReadTime_size_small CardTime-ReadTime"><span>1 Min<!-- --> <!-- -->Read</span></div></div></div></div></div><div class="ListPreview-ContributorsWrapper"><div class="Contributors Contributors_variant_slimline Contributors_cardVariant_small Contributors_hasAvatar" data-component="contributors"><div class="Contributors-AvatarWrapper"><a class="Contributors-AvatarLink" aria-label="Lisa Morgan" data-discover="true" href="/author/lisa-morgan"><img aria-hidden="true" data-testid="contributor-avatar" data-component="image" class="Contributors-Avatar" data-src="https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt55c84ed4ee6ab7f9/66c4ed22992f7282278db37f/Lisa_Morgan_new_photo.jpg?width=100&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt55c84ed4ee6ab7f9/66c4ed22992f7282278db37f/Lisa_Morgan_new_photo.jpg?width=100&auto=webp&quality=80&disable=upscale" loading="lazy" alt="Picture of Lisa Morgan" title="Picture of Lisa Morgan"/></a></div><div class="Contributors-InfoWrapper"><span class="Contributors-ByText" data-testid="by-text">by</span><a class="Contributors-ContributorName" data-testid="contributor-name" data-discover="true" href="/author/lisa-morgan">Lisa Morgan</a><span class="Contributors-ContributorTitle" data-testid="contributor-title">, <!-- -->Freelance Writer</span></div></div></div></div></div><div class="ContentPreview ListContent-ContentItem" data-module="content-preview" data-variant="small"><div class="ListPreview"><div class="ListPreview-Container"><div class="ListPreview-ImageWrapper"><a aria-label="Read more about: White House" data-discover="true" href="/cyber-resilience/what-could-the-trump-administration-mean-for-cybersecurity-"><div title="White House"><img data-component="image" class="ListPreview-Image" data-src="https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt2f56fcbcc16d26da/67366cf18df9b3ded5aa6711/WhiteHouse_TheProtectedArtArchive-AlamyStockPhoto.jpg?width=300&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt2f56fcbcc16d26da/67366cf18df9b3ded5aa6711/WhiteHouse_TheProtectedArtArchive-AlamyStockPhoto.jpg?width=300&auto=webp&quality=80&disable=upscale" loading="lazy" alt="White House" title="White House"/></div></a></div><div class="ListPreview-ContentWrapper"><div class="ListPreview-KeywordWrapper"><a data-component="keyword" class="Keyword Keyword_variant_alternate Keyword_title_cyberResilience ListPreview-Keyword" data-discover="true" href="/cyber-resilience">Cyber Resilience</a></div><div class="ListPreview-TitleWrapper"><a class="ListPreview-Title" data-testid="preview-default-title" data-discover="true" href="/cyber-resilience/what-could-the-trump-administration-mean-for-cybersecurity-">What Could the Trump Administration Mean for Cybersecurity?</a></div><div class="ListPreview-MobileTitleWrapper"><a class="ListPreview-Title" data-testid="preview-mobile-title" data-discover="true" href="/cyber-resilience/what-could-the-trump-administration-mean-for-cybersecurity-">What Could the Trump Administration Mean for Cybersecurity?</a></div><div class="ListPreview-Footer"><span class="ListPreview-Date" data-testid="list-preview-date">Nov 14, 2024</span><div data-module="card-time" class="CardTime"><span class="CardTime-SeparatorLine">|</span><div data-component="article-read-time" class="ArticleReadTime ArticleReadTime_size_small CardTime-ReadTime"><span>1 Min<!-- --> <!-- -->Read</span></div></div></div></div></div><div class="ListPreview-ContributorsWrapper"><div class="Contributors Contributors_variant_slimline Contributors_cardVariant_small Contributors_hasAvatar" data-component="contributors"><div class="Contributors-AvatarWrapper"><a class="Contributors-AvatarLink" aria-label="Carrie Pallardy" data-discover="true" href="/author/carrie-pallardy"><img aria-hidden="true" data-testid="contributor-avatar" data-component="image" class="Contributors-Avatar" data-src="https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blta2ac0cf507deba77/64bf49006c654daed172bbba/CarriePallardy_Head_Shot.gif?width=100&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blta2ac0cf507deba77/64bf49006c654daed172bbba/CarriePallardy_Head_Shot.gif?width=100&auto=webp&quality=80&disable=upscale" loading="lazy" alt="Picture of Carrie Pallardy" title="Picture of Carrie Pallardy"/></a></div><div class="Contributors-InfoWrapper"><span class="Contributors-ByText" data-testid="by-text">by</span><a class="Contributors-ContributorName" data-testid="contributor-name" data-discover="true" href="/author/carrie-pallardy">Carrie Pallardy</a><span class="Contributors-ContributorTitle" data-testid="contributor-title">, <!-- -->Contributing Reporter</span></div></div></div></div></div><div class="ContentPreview ListContent-ContentItem" data-module="content-preview" data-variant="small"><div class="ListPreview"><div class="ListPreview-Container"><div class="ListPreview-ImageWrapper"><a aria-label="Read more about: shadow of a hand on a grey wall" data-discover="true" href="/cyber-resilience/shedding-light-on-your-shadow-it"><div title="shadow of a hand on a grey wall"><img data-component="image" class="ListPreview-Image" data-src="https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt7f03e5863a184ce8/672e6e049fcdcd592a5ff8ee/Shadow-Elly_Miller-alamy.jpg?width=300&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt7f03e5863a184ce8/672e6e049fcdcd592a5ff8ee/Shadow-Elly_Miller-alamy.jpg?width=300&auto=webp&quality=80&disable=upscale" loading="lazy" alt="shadow of a hand on a grey wall" title="shadow of a hand on a grey wall"/></div></a></div><div class="ListPreview-ContentWrapper"><div class="ListPreview-KeywordWrapper"><a data-component="keyword" class="Keyword Keyword_variant_alternate Keyword_title_cyberResilience ListPreview-Keyword" data-discover="true" href="/cyber-resilience">Cyber Resilience</a></div><div class="ListPreview-TitleWrapper"><a class="ListPreview-Title" data-testid="preview-default-title" data-discover="true" href="/cyber-resilience/shedding-light-on-your-shadow-it">Shedding Light on Your Shadow IT</a></div><div class="ListPreview-MobileTitleWrapper"><a class="ListPreview-Title" data-testid="preview-mobile-title" data-discover="true" href="/cyber-resilience/shedding-light-on-your-shadow-it">Shedding Light on Your Shadow IT</a></div><div class="ListPreview-Footer"><span class="ListPreview-Date" data-testid="list-preview-date">Nov 14, 2024</span><div data-module="card-time" class="CardTime"><span class="CardTime-SeparatorLine">|</span><div data-component="article-read-time" class="ArticleReadTime ArticleReadTime_size_small CardTime-ReadTime"><span>1 Min<!-- --> <!-- -->Read</span></div></div></div></div></div><div class="ListPreview-ContributorsWrapper"><div class="Contributors Contributors_variant_slimline Contributors_cardVariant_small Contributors_hasAvatar" data-component="contributors"><div class="Contributors-AvatarWrapper"><a class="Contributors-AvatarLink" aria-label="Mario Platt" data-discover="true" href="/author/mario-platt"><img aria-hidden="true" data-testid="contributor-avatar" data-component="image" class="Contributors-Avatar" data-src="https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt5a596288167f91e7/672e6c4f6b2961f3157b644c/Mario_Platt_Image_(002).jpeg?width=100&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt5a596288167f91e7/672e6c4f6b2961f3157b644c/Mario_Platt_Image_(002).jpeg?width=100&auto=webp&quality=80&disable=upscale" loading="lazy" alt="Picture of Mario Platt" title="Picture of Mario Platt"/></a></div><div class="Contributors-InfoWrapper"><span class="Contributors-ByText" data-testid="by-text">by</span><a class="Contributors-ContributorName" data-testid="contributor-name" data-discover="true" href="/author/mario-platt">Mario Platt</a><span class="Contributors-ContributorTitle" data-testid="contributor-title">, <!-- -->Vice President and CISO, LastPass</span></div></div></div></div></div><div class="ContentPreview ListContent-ContentItem" data-module="content-preview" data-variant="small"><div class="ListPreview"><div class="ListPreview-Container"><div class="ListPreview-ImageWrapper"><a aria-label="Read more about: frustrated business person on the phone" data-discover="true" href="/cyber-resilience/how-developers-drive-security-professionals-crazy"><div title="frustrated business person on the phone"><img data-component="image" class="ListPreview-Image" data-src="https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt2682c76dd3de6eb9/67321fdcfdb3ea33337e2b5b/Frustrated(1800)_Maskot_Alamy.jpg?width=300&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt2682c76dd3de6eb9/67321fdcfdb3ea33337e2b5b/Frustrated(1800)_Maskot_Alamy.jpg?width=300&auto=webp&quality=80&disable=upscale" loading="lazy" alt="frustrated business person on the phone" title="frustrated business person on the phone"/></div></a></div><div class="ListPreview-ContentWrapper"><div class="ListPreview-KeywordWrapper"><a data-component="keyword" class="Keyword Keyword_variant_alternate Keyword_title_cyberResilience ListPreview-Keyword" data-discover="true" href="/cyber-resilience">Cyber Resilience</a></div><div class="ListPreview-TitleWrapper"><a class="ListPreview-Title" data-testid="preview-default-title" data-discover="true" href="/cyber-resilience/how-developers-drive-security-professionals-crazy">How Developers Drive Security Professionals Crazy</a></div><div class="ListPreview-MobileTitleWrapper"><a class="ListPreview-Title" data-testid="preview-mobile-title" data-discover="true" href="/cyber-resilience/how-developers-drive-security-professionals-crazy">How Developers Drive Security Professionals Crazy</a></div><div class="ListPreview-Footer"><span class="ListPreview-Date" data-testid="list-preview-date">Nov 14, 2024</span><div data-module="card-time" class="CardTime"><span class="CardTime-SeparatorLine">|</span><div data-component="article-read-time" class="ArticleReadTime ArticleReadTime_size_small CardTime-ReadTime"><span>1 Min<!-- --> <!-- -->Read</span></div></div></div></div></div><div class="ListPreview-ContributorsWrapper"><div class="Contributors Contributors_variant_slimline Contributors_cardVariant_small Contributors_hasAvatar" data-component="contributors"><div class="Contributors-AvatarWrapper"><a class="Contributors-AvatarLink" aria-label="Dark Reading" data-discover="true" href="/author/dark-reading"><img aria-hidden="true" data-testid="contributor-avatar" data-component="image" class="Contributors-Avatar" data-src="https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt9b8ea0e8a04b43eb/650c9551fe6e6b248b4df476/285801_DR23_Graphics_Website_Author_Logo_0.jpg?width=100&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt9b8ea0e8a04b43eb/650c9551fe6e6b248b4df476/285801_DR23_Graphics_Website_Author_Logo_0.jpg?width=100&auto=webp&quality=80&disable=upscale" loading="lazy" alt="Picture of Dark Reading" title="Picture of Dark Reading"/></a></div><div class="Contributors-InfoWrapper"><span class="Contributors-ByText" data-testid="by-text">by</span><a class="Contributors-ContributorName" data-testid="contributor-name" data-discover="true" href="/author/dark-reading">Dark Reading</a><span class="Contributors-ContributorTitle" data-testid="contributor-title">, <!-- -->Staff & Contributors</span></div></div></div></div></div><div class="ContentPreview ListContent-ContentItem" data-module="content-preview" data-variant="small"><div class="ListPreview"><div class="ListPreview-Container"><div class="ListPreview-ImageWrapper"><a aria-label="Read more about: Evil Robot Concept and rogue AI risk as robots gone bad." data-discover="true" href="/machine-learning-ai/inside-the-duality-of-ai-s-superpowers"><div title="Evil Robot Concept and rogue AI risk as robots gone bad."><img data-component="image" class="ListPreview-Image" data-src="https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/bltac16c1f2d82605a8/6735125d3509810e9f88f1b6/AI_Risk_Assessment_Brain_light_via_Alamy_Stock.jpg?width=300&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/bltac16c1f2d82605a8/6735125d3509810e9f88f1b6/AI_Risk_Assessment_Brain_light_via_Alamy_Stock.jpg?width=300&auto=webp&quality=80&disable=upscale" loading="lazy" alt="Evil Robot Concept and rogue AI risk as robots gone bad." title="Evil Robot Concept and rogue AI risk as robots gone bad."/></div></a><a class="ListPreview-IconWrapper" title="Link to all video" aria-label="Redirect to All page" data-testid="content-preview-icon-link" data-discover="true" href="/videos"><span data-component="icon" data-name="Play" class="ListPreview-Icon" style="mask-image:url(/build/_assets/Play-CLWHZVKX.svg);-webkit-mask-image:url(/build/_assets/Play-CLWHZVKX.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span></a></div><div class="ListPreview-ContentWrapper"><div class="ListPreview-KeywordWrapper"><a data-component="keyword" class="Keyword Keyword_variant_alternate Keyword_title_machineLearningAi ListPreview-Keyword" data-discover="true" href="/machine-learning-ai">Machine Learning & AI</a></div><div class="ListPreview-TitleWrapper"><a class="ListPreview-Title" data-testid="preview-default-title" data-discover="true" href="/machine-learning-ai/inside-the-duality-of-ai-s-superpowers">Inside The Duality of AI's Superpowers</a></div><div class="ListPreview-MobileTitleWrapper"><a class="ListPreview-Title" data-testid="preview-mobile-title" data-discover="true" href="/machine-learning-ai/inside-the-duality-of-ai-s-superpowers">Inside The Duality of AI's Superpowers</a></div><div class="ListPreview-Footer"><span class="ListPreview-Date" data-testid="list-preview-date">Nov 14, 2024</span><div data-module="card-time" class="CardTime"><span class="CardTime-SeparatorLine">|</span><div data-component="article-read-time" class="ArticleReadTime ArticleReadTime_size_small CardTime-ReadTime"><span>5 Min<!-- --> <!-- -->View</span></div></div></div></div></div><div class="ListPreview-ContributorsWrapper"><div class="Contributors Contributors_variant_slimline Contributors_cardVariant_small Contributors_hasAvatar" data-component="contributors"><div class="Contributors-AvatarWrapper"><a class="Contributors-AvatarLink" aria-label="Brandon Taylor" data-discover="true" href="/author/brandon-taylor"><img aria-hidden="true" data-testid="contributor-avatar" data-component="image" class="Contributors-Avatar" data-src="https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt15232db5d2321c39/64bf5c007b352808e9c5a64e/BrandonTaylorHeadshot1.jpg?width=100&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt15232db5d2321c39/64bf5c007b352808e9c5a64e/BrandonTaylorHeadshot1.jpg?width=100&auto=webp&quality=80&disable=upscale" loading="lazy" alt="Picture of Brandon Taylor" title="Picture of Brandon Taylor"/></a></div><div class="Contributors-InfoWrapper"><span class="Contributors-ByText" data-testid="by-text">by</span><a class="Contributors-ContributorName" data-testid="contributor-name" data-discover="true" href="/author/brandon-taylor">Brandon Taylor</a><span class="Contributors-ContributorTitle" data-testid="contributor-title">, <!-- -->Digital Editorial Program Manager</span></div></div></div></div></div><div class="ContentPreview ListContent-ContentItem" data-module="content-preview" data-variant="small"><div class="ListPreview"><div class="ListPreview-Container"><div class="ListPreview-ImageWrapper"><a aria-label="Read more about: magnifying glass over digital backdrop" data-discover="true" href="/cyber-resilience/how-digital-fraud-has-evolved-key-takeaways-for-cisos"><div title="magnifying glass over digital backdrop"><img data-component="image" class="ListPreview-Image" data-src="https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt44f803258d7dbf67/67321dc446f258cf3bbd92bf/magnifying_glass-canbedone-alamy.jpg?width=300&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt44f803258d7dbf67/67321dc446f258cf3bbd92bf/magnifying_glass-canbedone-alamy.jpg?width=300&auto=webp&quality=80&disable=upscale" loading="lazy" alt="magnifying glass over digital backdrop" title="magnifying glass over digital backdrop"/></div></a></div><div class="ListPreview-ContentWrapper"><div class="ListPreview-KeywordWrapper"><a data-component="keyword" class="Keyword Keyword_variant_alternate Keyword_title_cyberResilience ListPreview-Keyword" data-discover="true" href="/cyber-resilience">Cyber Resilience</a></div><div class="ListPreview-TitleWrapper"><a class="ListPreview-Title" data-testid="preview-default-title" data-discover="true" href="/cyber-resilience/how-digital-fraud-has-evolved-key-takeaways-for-cisos">How Digital Fraud Has Evolved: Key Takeaways for CISOs</a></div><div class="ListPreview-MobileTitleWrapper"><a class="ListPreview-Title" data-testid="preview-mobile-title" data-discover="true" href="/cyber-resilience/how-digital-fraud-has-evolved-key-takeaways-for-cisos">How Digital Fraud Has Evolved: Key Takeaways for CISOs</a></div><div class="ListPreview-Footer"><span class="ListPreview-Date" data-testid="list-preview-date">Nov 13, 2024</span><div data-module="card-time" class="CardTime"><span class="CardTime-SeparatorLine">|</span><div data-component="article-read-time" class="ArticleReadTime ArticleReadTime_size_small CardTime-ReadTime"><span>1 Min<!-- --> <!-- -->Read</span></div></div></div></div></div><div class="ListPreview-ContributorsWrapper"><div class="Contributors Contributors_variant_slimline Contributors_cardVariant_small Contributors_hasAvatar" data-component="contributors"><div class="Contributors-AvatarWrapper"><a class="Contributors-AvatarLink" aria-label="Network Computing" data-discover="true" href="/author/network-computing"><img aria-hidden="true" data-testid="contributor-avatar" data-component="image" class="Contributors-Avatar" data-src="https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt08cc37c4d59bc6be/64bee8d7a166134a3526acb8/NWC_Favicon.png?width=100&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt08cc37c4d59bc6be/64bee8d7a166134a3526acb8/NWC_Favicon.png?width=100&auto=webp&quality=80&disable=upscale" loading="lazy" alt="Picture of Network Computing" title="Picture of Network Computing"/></a></div><div class="Contributors-InfoWrapper"><span class="Contributors-ByText" data-testid="by-text">by</span><a class="Contributors-ContributorName" data-testid="contributor-name" data-discover="true" href="/author/network-computing">Network Computing</a><span class="Contributors-ContributorTitle" data-testid="contributor-title">, <!-- -->Contributor</span></div></div></div></div></div><div class="ContentPreview ListContent-ContentItem" data-module="content-preview" data-variant="small"><div class="ListPreview"><div class="ListPreview-Container"><div class="ListPreview-ImageWrapper"><a aria-label="Read more about: " data-discover="true" href="/cyber-resilience/threatlocker-ceo-talks-supply-chain-risk-ai-s-cybersecurity-role-and-fear"><div title=""><img data-component="image" class="ListPreview-Image" data-src="https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt3d4cea418c977268/672cfdad3a7bf19f1d9eaa5e/ThreatLocker_Danny_Jenkins_Headshot.png?width=300&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt3d4cea418c977268/672cfdad3a7bf19f1d9eaa5e/ThreatLocker_Danny_Jenkins_Headshot.png?width=300&auto=webp&quality=80&disable=upscale" loading="lazy" alt="" title=""/></div></a></div><div class="ListPreview-ContentWrapper"><div class="ListPreview-KeywordWrapper"><a data-component="keyword" class="Keyword Keyword_variant_alternate Keyword_title_cyberResilience ListPreview-Keyword" data-discover="true" href="/cyber-resilience">Cyber Resilience</a></div><div class="ListPreview-TitleWrapper"><a class="ListPreview-Title" data-testid="preview-default-title" data-discover="true" href="/cyber-resilience/threatlocker-ceo-talks-supply-chain-risk-ai-s-cybersecurity-role-and-fear">ThreatLocker CEO Talks Supply Chain Risk, AI’s Cybersecurity Role, and Fear</a></div><div class="ListPreview-MobileTitleWrapper"><a class="ListPreview-Title" data-testid="preview-mobile-title" data-discover="true" href="/cyber-resilience/threatlocker-ceo-talks-supply-chain-risk-ai-s-cybersecurity-role-and-fear">ThreatLocker CEO Talks Supply Chain Risk, AI’s Cybersecurity Role, and Fear</a></div><div class="ListPreview-Footer"><span class="ListPreview-Date" data-testid="list-preview-date">Nov 7, 2024</span><div data-module="card-time" class="CardTime"><span class="CardTime-SeparatorLine">|</span><div data-component="article-read-time" class="ArticleReadTime ArticleReadTime_size_small CardTime-ReadTime"><span>1 Min<!-- --> <!-- -->Read</span></div></div></div></div></div><div class="ListPreview-ContributorsWrapper"><div class="Contributors Contributors_variant_slimline Contributors_cardVariant_small Contributors_hasAvatar" data-component="contributors"><div class="Contributors-AvatarWrapper"><a class="Contributors-AvatarLink" aria-label="Shane Snider" data-discover="true" href="/author/shane-snider"><img aria-hidden="true" data-testid="contributor-avatar" data-component="image" class="Contributors-Avatar" data-src="https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/bltf4de7e5784b276a0/650d8d5ffac8e1d4a1f21f76/Shane_Snider_Profile.jpg?width=100&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/bltf4de7e5784b276a0/650d8d5ffac8e1d4a1f21f76/Shane_Snider_Profile.jpg?width=100&auto=webp&quality=80&disable=upscale" loading="lazy" alt="Picture of Shane Snider" title="Picture of Shane Snider"/></a></div><div class="Contributors-InfoWrapper"><span class="Contributors-ByText" data-testid="by-text">by</span><a class="Contributors-ContributorName" data-testid="contributor-name" data-discover="true" href="/author/shane-snider">Shane Snider</a><span class="Contributors-ContributorTitle" data-testid="contributor-title">, <!-- -->Senior Writer, InformationWeek</span></div></div></div></div></div><div class="ContentPreview ListContent-ContentItem" data-module="content-preview" data-variant="small"><div class="ListPreview"><div class="ListPreview-Container"><div class="ListPreview-ImageWrapper"><a aria-label="Read more about: Plates Fact and Fake. Fake news concept." data-discover="true" href="/cyber-resilience/how-cheap-fakes-exploit-our-psychological-vulnerabilities"><div title="Plates Fact and Fake. Fake news concept."><img data-component="image" class="ListPreview-Image" data-src="https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/bltcb47b7bc18b7886a/67250cadf8dd5dee1b0c0a8e/fake-designer491_-alamy.jpg?width=300&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/bltcb47b7bc18b7886a/67250cadf8dd5dee1b0c0a8e/fake-designer491_-alamy.jpg?width=300&auto=webp&quality=80&disable=upscale" loading="lazy" alt="Plates Fact and Fake. Fake news concept." title="Plates Fact and Fake. Fake news concept."/></div></a></div><div class="ListPreview-ContentWrapper"><div class="ListPreview-KeywordWrapper"><a data-component="keyword" class="Keyword Keyword_variant_alternate Keyword_title_cyberResilience ListPreview-Keyword" data-discover="true" href="/cyber-resilience">Cyber Resilience</a></div><div class="ListPreview-TitleWrapper"><a class="ListPreview-Title" data-testid="preview-default-title" data-discover="true" href="/cyber-resilience/how-cheap-fakes-exploit-our-psychological-vulnerabilities">How ‘Cheap Fakes’ Exploit Our Psychological Vulnerabilities</a></div><div class="ListPreview-MobileTitleWrapper"><a class="ListPreview-Title" data-testid="preview-mobile-title" data-discover="true" href="/cyber-resilience/how-cheap-fakes-exploit-our-psychological-vulnerabilities">How ‘Cheap Fakes’ Exploit Our Psychological Vulnerabilities</a></div><div class="ListPreview-Footer"><span class="ListPreview-Date" data-testid="list-preview-date">Nov 7, 2024</span><div data-module="card-time" class="CardTime"><span class="CardTime-SeparatorLine">|</span><div data-component="article-read-time" class="ArticleReadTime ArticleReadTime_size_small CardTime-ReadTime"><span>1 Min<!-- --> <!-- -->Read</span></div></div></div></div></div><div class="ListPreview-ContributorsWrapper"><div class="Contributors Contributors_variant_slimline Contributors_cardVariant_small Contributors_hasAvatar" data-component="contributors"><div class="Contributors-AvatarWrapper"><a class="Contributors-AvatarLink" aria-label="Matt Lindley" data-discover="true" href="/author/matt-lindley"><img aria-hidden="true" data-testid="contributor-avatar" data-component="image" class="Contributors-Avatar" data-src="https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt067bca7a46b0e1b0/672505271a8879e435720372/Matt_Lindley_Headshot_(002).jpg?width=100&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt067bca7a46b0e1b0/672505271a8879e435720372/Matt_Lindley_Headshot_(002).jpg?width=100&auto=webp&quality=80&disable=upscale" loading="lazy" alt="Picture of Matt Lindley" title="Picture of Matt Lindley"/></a></div><div class="Contributors-InfoWrapper"><span class="Contributors-ByText" data-testid="by-text">by</span><a class="Contributors-ContributorName" data-testid="contributor-name" data-discover="true" href="/author/matt-lindley">Matt Lindley</a><span class="Contributors-ContributorTitle" data-testid="contributor-title">, <!-- -->COO and CISO, Ninjio</span></div></div></div></div></div><div class="ContentPreview ListContent-ContentItem" data-module="content-preview" data-variant="small"><div class="ListPreview"><div class="ListPreview-Container"><div class="ListPreview-ImageWrapper"><a aria-label="Read more about: acronym CISO on a digital background" data-discover="true" href="/cybersecurity/how-to-find-the-right-ciso"><div title="acronym CISO on a digital background"><img data-component="image" class="ListPreview-Image" data-src="https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt57b97f3549c8af5c/6728ee3735a2cddc297056e0/CISO(1800)_Borka_Kiss_Alamy.jpg?width=300&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt57b97f3549c8af5c/6728ee3735a2cddc297056e0/CISO(1800)_Borka_Kiss_Alamy.jpg?width=300&auto=webp&quality=80&disable=upscale" loading="lazy" alt="acronym CISO on a digital background" title="acronym CISO on a digital background"/></div></a></div><div class="ListPreview-ContentWrapper"><div class="ListPreview-KeywordWrapper"><a data-component="keyword" class="Keyword Keyword_variant_alternate Keyword_title_cybersecurity ListPreview-Keyword" data-discover="true" href="/cyber-resilience/cybersecurity">Cybersecurity</a></div><div class="ListPreview-TitleWrapper"><a class="ListPreview-Title" data-testid="preview-default-title" data-discover="true" href="/cybersecurity/how-to-find-the-right-ciso">How to Find the Right CISO</a></div><div class="ListPreview-MobileTitleWrapper"><a class="ListPreview-Title" data-testid="preview-mobile-title" data-discover="true" href="/cybersecurity/how-to-find-the-right-ciso">How to Find the Right CISO</a></div><div class="ListPreview-Footer"><span class="ListPreview-Date" data-testid="list-preview-date">Nov 7, 2024</span><div data-module="card-time" class="CardTime"><span class="CardTime-SeparatorLine">|</span><div data-component="article-read-time" class="ArticleReadTime ArticleReadTime_size_small CardTime-ReadTime"><span>1 Min<!-- --> <!-- -->Read</span></div></div></div></div></div><div class="ListPreview-ContributorsWrapper"><div class="Contributors Contributors_variant_slimline Contributors_cardVariant_small Contributors_hasAvatar" data-component="contributors"><div class="Contributors-AvatarWrapper"><a class="Contributors-AvatarLink" aria-label="Dark Reading" data-discover="true" href="/author/dark-reading"><img aria-hidden="true" data-testid="contributor-avatar" data-component="image" class="Contributors-Avatar" data-src="https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt9b8ea0e8a04b43eb/650c9551fe6e6b248b4df476/285801_DR23_Graphics_Website_Author_Logo_0.jpg?width=100&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt9b8ea0e8a04b43eb/650c9551fe6e6b248b4df476/285801_DR23_Graphics_Website_Author_Logo_0.jpg?width=100&auto=webp&quality=80&disable=upscale" loading="lazy" alt="Picture of Dark Reading" title="Picture of Dark Reading"/></a></div><div class="Contributors-InfoWrapper"><span class="Contributors-ByText" data-testid="by-text">by</span><a class="Contributors-ContributorName" data-testid="contributor-name" data-discover="true" href="/author/dark-reading">Dark Reading</a><span class="Contributors-ContributorTitle" data-testid="contributor-title">, <!-- -->Staff & Contributors</span></div></div></div></div></div><div class="ContentPreview ListContent-ContentItem ListContent-ContentItem_borderless" data-module="content-preview" data-variant="small"><div class="ListPreview"><div class="ListPreview-Container"><div class="ListPreview-ImageWrapper"><a aria-label="Read more about: A female clicking on futuristic neural network" data-discover="true" href="/it-leadership/letting-neurodiverse-talent-shine-in-cybersecurity"><div title="A female clicking on futuristic neural network"><img data-component="image" class="ListPreview-Image" data-src="https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt5d11550a05f78c55/672100240aea3be9e788bb31/neuralnetwork_Wirestock-AlamyStockPhoto.jpg?width=300&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt5d11550a05f78c55/672100240aea3be9e788bb31/neuralnetwork_Wirestock-AlamyStockPhoto.jpg?width=300&auto=webp&quality=80&disable=upscale" loading="lazy" alt="A female clicking on futuristic neural network" title="A female clicking on futuristic neural network"/></div></a></div><div class="ListPreview-ContentWrapper"><div class="ListPreview-KeywordWrapper"><a data-component="keyword" class="Keyword Keyword_variant_alternate Keyword_title_itLeadership ListPreview-Keyword" data-discover="true" href="/it-leadership">IT Leadership</a></div><div class="ListPreview-TitleWrapper"><a class="ListPreview-Title" data-testid="preview-default-title" data-discover="true" href="/it-leadership/letting-neurodiverse-talent-shine-in-cybersecurity">Letting Neurodiverse Talent Shine in Cybersecurity</a></div><div class="ListPreview-MobileTitleWrapper"><a class="ListPreview-Title" data-testid="preview-mobile-title" data-discover="true" href="/it-leadership/letting-neurodiverse-talent-shine-in-cybersecurity">Letting Neurodiverse Talent Shine in Cybersecurity</a></div><div class="ListPreview-Footer"><span class="ListPreview-Date" data-testid="list-preview-date">Nov 6, 2024</span><div data-module="card-time" class="CardTime"><span class="CardTime-SeparatorLine">|</span><div data-component="article-read-time" class="ArticleReadTime ArticleReadTime_size_small CardTime-ReadTime"><span>1 Min<!-- --> <!-- -->Read</span></div></div></div></div></div><div class="ListPreview-ContributorsWrapper"><div class="Contributors Contributors_variant_slimline Contributors_cardVariant_small Contributors_hasAvatar" data-component="contributors"><div class="Contributors-AvatarWrapper"><a class="Contributors-AvatarLink" aria-label="Carrie Pallardy" data-discover="true" href="/author/carrie-pallardy"><img aria-hidden="true" data-testid="contributor-avatar" data-component="image" class="Contributors-Avatar" data-src="https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blta2ac0cf507deba77/64bf49006c654daed172bbba/CarriePallardy_Head_Shot.gif?width=100&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blta2ac0cf507deba77/64bf49006c654daed172bbba/CarriePallardy_Head_Shot.gif?width=100&auto=webp&quality=80&disable=upscale" loading="lazy" alt="Picture of Carrie Pallardy" title="Picture of Carrie Pallardy"/></a></div><div class="Contributors-InfoWrapper"><span class="Contributors-ByText" data-testid="by-text">by</span><a class="Contributors-ContributorName" data-testid="contributor-name" data-discover="true" href="/author/carrie-pallardy">Carrie Pallardy</a><span class="Contributors-ContributorTitle" data-testid="contributor-title">, <!-- -->Contributing Reporter</span></div></div></div></div></div><div class="ContentPreview ListContent-ContentItem" data-module="content-preview" data-variant="small"><div class="ListPreview"><div class="ListPreview-Container"><div class="ListPreview-ImageWrapper"><a aria-label="Read more about: " data-discover="true" href="/cyber-resilience/iranian-threat-actors-ramp-up-ransomware-cyber-activity"><div title=""><img data-component="image" class="ListPreview-Image" data-src="https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/bltc46f8d5e435f637b/6720f1b3dd4fd46017159b3a/digitalIranflag_PantherMediaGmbH-AlamyStockPhoto.jpg?width=300&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/bltc46f8d5e435f637b/6720f1b3dd4fd46017159b3a/digitalIranflag_PantherMediaGmbH-AlamyStockPhoto.jpg?width=300&auto=webp&quality=80&disable=upscale" loading="lazy" alt="" title=""/></div></a></div><div class="ListPreview-ContentWrapper"><div class="ListPreview-KeywordWrapper"><a data-component="keyword" class="Keyword Keyword_variant_alternate Keyword_title_cyberResilience ListPreview-Keyword" data-discover="true" href="/cyber-resilience">Cyber Resilience</a></div><div class="ListPreview-TitleWrapper"><a class="ListPreview-Title" data-testid="preview-default-title" data-discover="true" href="/cyber-resilience/iranian-threat-actors-ramp-up-ransomware-cyber-activity">Iranian Threat Actors Ramp Up Ransomware, Cyber Activity</a></div><div class="ListPreview-MobileTitleWrapper"><a class="ListPreview-Title" data-testid="preview-mobile-title" data-discover="true" href="/cyber-resilience/iranian-threat-actors-ramp-up-ransomware-cyber-activity">Iranian Threat Actors Ramp Up Ransomware, Cyber Activity</a></div><div class="ListPreview-Footer"><span class="ListPreview-Date" data-testid="list-preview-date">Nov 5, 2024</span><div data-module="card-time" class="CardTime"><span class="CardTime-SeparatorLine">|</span><div data-component="article-read-time" class="ArticleReadTime ArticleReadTime_size_small CardTime-ReadTime"><span>1 Min<!-- --> <!-- -->Read</span></div></div></div></div></div><div class="ListPreview-ContributorsWrapper"><div class="Contributors Contributors_variant_slimline Contributors_cardVariant_small Contributors_hasAvatar" data-component="contributors"><div class="Contributors-AvatarWrapper"><a class="Contributors-AvatarLink" aria-label="Carrie Pallardy" data-discover="true" href="/author/carrie-pallardy"><img aria-hidden="true" data-testid="contributor-avatar" data-component="image" class="Contributors-Avatar" data-src="https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blta2ac0cf507deba77/64bf49006c654daed172bbba/CarriePallardy_Head_Shot.gif?width=100&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blta2ac0cf507deba77/64bf49006c654daed172bbba/CarriePallardy_Head_Shot.gif?width=100&auto=webp&quality=80&disable=upscale" loading="lazy" alt="Picture of Carrie Pallardy" title="Picture of Carrie Pallardy"/></a></div><div class="Contributors-InfoWrapper"><span class="Contributors-ByText" data-testid="by-text">by</span><a class="Contributors-ContributorName" data-testid="contributor-name" data-discover="true" href="/author/carrie-pallardy">Carrie Pallardy</a><span class="Contributors-ContributorTitle" data-testid="contributor-title">, <!-- -->Contributing Reporter</span></div></div></div></div></div><div class="ContentPreview ListContent-ContentItem" data-module="content-preview" data-variant="small"><div class="ListPreview"><div class="ListPreview-Container"><div class="ListPreview-ImageWrapper"><a aria-label="Read more about: two cloud cutouts in black sky" data-discover="true" href="/it-infrastructure/5-tips-for-balancing-cost-and-security-in-cloud-adoption"><div title="two cloud cutouts in black sky"><img data-component="image" class="ListPreview-Image" data-src="https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt7598ddc228751a79/67224090fd841ec8017a05b8/cloud-pixabay.png?width=300&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt7598ddc228751a79/67224090fd841ec8017a05b8/cloud-pixabay.png?width=300&auto=webp&quality=80&disable=upscale" loading="lazy" alt="two cloud cutouts in black sky" title="two cloud cutouts in black sky"/></div></a></div><div class="ListPreview-ContentWrapper"><div class="ListPreview-KeywordWrapper"><a data-component="keyword" class="Keyword Keyword_variant_alternate Keyword_title_itInfrastructure ListPreview-Keyword" data-discover="true" href="/it-infrastructure">IT Infrastructure</a></div><div class="ListPreview-TitleWrapper"><a class="ListPreview-Title" data-testid="preview-default-title" data-discover="true" href="/it-infrastructure/5-tips-for-balancing-cost-and-security-in-cloud-adoption">5 Tips for Balancing Cost and Security in Cloud Adoption</a></div><div class="ListPreview-MobileTitleWrapper"><a class="ListPreview-Title" data-testid="preview-mobile-title" data-discover="true" href="/it-infrastructure/5-tips-for-balancing-cost-and-security-in-cloud-adoption">5 Tips for Balancing Cost and Security in Cloud Adoption</a></div><div class="ListPreview-Footer"><span class="ListPreview-Date" data-testid="list-preview-date">Nov 4, 2024</span><div data-module="card-time" class="CardTime"><span class="CardTime-SeparatorLine">|</span><div data-component="article-read-time" class="ArticleReadTime ArticleReadTime_size_small CardTime-ReadTime"><span>1 Min<!-- --> <!-- -->Read</span></div></div></div></div></div><div class="ListPreview-ContributorsWrapper"><div class="Contributors Contributors_variant_slimline Contributors_cardVariant_small Contributors_hasAvatar" data-component="contributors"><div class="Contributors-AvatarWrapper"><a class="Contributors-AvatarLink" aria-label="Manju Naglapur" data-discover="true" href="/author/manju-naglapur"><img aria-hidden="true" data-testid="contributor-avatar" data-component="image" class="Contributors-Avatar" data-src="https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt46c86e69397a043e/67223e4d33bb3c689856181b/manju-naglapur-1530x1005.jpg?width=100&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt46c86e69397a043e/67223e4d33bb3c689856181b/manju-naglapur-1530x1005.jpg?width=100&auto=webp&quality=80&disable=upscale" loading="lazy" alt="Picture of Manju Naglapur" title="Picture of Manju Naglapur"/></a></div><div class="Contributors-InfoWrapper"><span class="Contributors-ByText" data-testid="by-text">by</span><a class="Contributors-ContributorName" data-testid="contributor-name" data-discover="true" href="/author/manju-naglapur">Manju Naglapur</a><span class="Contributors-ContributorTitle" data-testid="contributor-title">, <!-- -->SVP and General Manager, Unisys </span></div></div></div></div></div><div class="ContentPreview ListContent-ContentItem" data-module="content-preview" data-variant="small"><div class="ListPreview"><div class="ListPreview-Container"><div class="ListPreview-ImageWrapper"><a aria-label="Read more about: alligator in swamp water" data-discover="true" href="/data-management/is-your-data-lake-becoming-a-swamp-keep-that-lake-clean-"><div title="alligator in swamp water"><img data-component="image" class="ListPreview-Image" data-src="https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt0801b8db3eb68598/6720ea682c2ff90483b56e89/swamp-alligator-Meghan_Gaspar-McCarthy_from_Pixabay_1280.jpg?width=300&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt0801b8db3eb68598/6720ea682c2ff90483b56e89/swamp-alligator-Meghan_Gaspar-McCarthy_from_Pixabay_1280.jpg?width=300&auto=webp&quality=80&disable=upscale" loading="lazy" alt="alligator in swamp water" title="alligator in swamp water"/></div></a></div><div class="ListPreview-ContentWrapper"><div class="ListPreview-KeywordWrapper"><a data-component="keyword" class="Keyword Keyword_variant_alternate Keyword_title_dataManagement ListPreview-Keyword" data-discover="true" href="/data-management">Data Management</a></div><div class="ListPreview-TitleWrapper"><a class="ListPreview-Title" data-testid="preview-default-title" data-discover="true" href="/data-management/is-your-data-lake-becoming-a-swamp-keep-that-lake-clean-">Is Your Data Lake Becoming a Swamp? Keep that Lake Clean</a></div><div class="ListPreview-MobileTitleWrapper"><a class="ListPreview-Title" data-testid="preview-mobile-title" data-discover="true" href="/data-management/is-your-data-lake-becoming-a-swamp-keep-that-lake-clean-">Is Your Data Lake Becoming a Swamp? Keep that Lake Clean</a></div><div class="ListPreview-Footer"><span class="ListPreview-Date" data-testid="list-preview-date">Nov 1, 2024</span><div data-module="card-time" class="CardTime"><span class="CardTime-SeparatorLine">|</span><div data-component="article-read-time" class="ArticleReadTime ArticleReadTime_size_small CardTime-ReadTime"><span>1 Min<!-- --> <!-- -->Read</span></div></div></div></div></div><div class="ListPreview-ContributorsWrapper"><div class="Contributors Contributors_variant_slimline Contributors_cardVariant_small Contributors_hasAvatar" data-component="contributors"><div class="Contributors-AvatarWrapper"><a class="Contributors-AvatarLink" aria-label="Robin Das" data-discover="true" href="/author/robin-das"><img aria-hidden="true" data-testid="contributor-avatar" data-component="image" class="Contributors-Avatar" data-src="https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt4c0b409a1c495268/6720ec79674e13779350fb48/Robin_Das_Exec_Dir_Market_Growth_Strategy_(2).png?width=100&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt4c0b409a1c495268/6720ec79674e13779350fb48/Robin_Das_Exec_Dir_Market_Growth_Strategy_(2).png?width=100&auto=webp&quality=80&disable=upscale" loading="lazy" alt="Picture of Robin Das" title="Picture of Robin Das"/></a></div><div class="Contributors-InfoWrapper"><span class="Contributors-ByText" data-testid="by-text">by</span><a class="Contributors-ContributorName" data-testid="contributor-name" data-discover="true" href="/author/robin-das">Robin Das</a><span class="Contributors-ContributorTitle" data-testid="contributor-title">, <!-- -->Executive Director, DataBee</span></div></div></div></div></div><div class="ContentPreview ListContent-ContentItem" data-module="content-preview" data-variant="small"><div class="ListPreview"><div class="ListPreview-Container"><div class="ListPreview-ImageWrapper"><a aria-label="Read more about: Halloween monster night poster and Autumn party background with a scary zombie hand with a yellow moon glowing" data-discover="true" href="/cyber-resilience/2024-halloween-frights-in-tech"><div title="Halloween monster night poster and Autumn party background with a scary zombie hand with a yellow moon glowing"><img data-component="image" class="ListPreview-Image" data-src="https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/bltdec2ad3a4261ccc9/671bdbf81e8517688efe1954/halloweenhand-Brain_light-alamy.jpg?width=300&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/bltdec2ad3a4261ccc9/671bdbf81e8517688efe1954/halloweenhand-Brain_light-alamy.jpg?width=300&auto=webp&quality=80&disable=upscale" loading="lazy" alt="Halloween monster night poster and Autumn party background with a scary zombie hand with a yellow moon glowing" title="Halloween monster night poster and Autumn party background with a scary zombie hand with a yellow moon glowing"/></div></a><a class="ListPreview-IconWrapper" title="Link to all slideshow" aria-label="Redirect to All page" data-testid="content-preview-icon-link" data-discover="true" href="/slideshows"><span data-component="icon" data-name="Images" class="ListPreview-Icon" style="mask-image:url(/build/_assets/Images-OMBWO34R.svg);-webkit-mask-image:url(/build/_assets/Images-OMBWO34R.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span></a></div><div class="ListPreview-ContentWrapper"><div class="ListPreview-KeywordWrapper"><a data-component="keyword" class="Keyword Keyword_variant_alternate Keyword_title_cyberResilience ListPreview-Keyword" data-discover="true" href="/cyber-resilience">Cyber Resilience</a></div><div class="ListPreview-TitleWrapper"><a class="ListPreview-Title" data-testid="preview-default-title" data-discover="true" href="/cyber-resilience/2024-halloween-frights-in-tech">2024 Halloween Frights in Tech</a></div><div class="ListPreview-MobileTitleWrapper"><a class="ListPreview-Title" data-testid="preview-mobile-title" data-discover="true" href="/cyber-resilience/2024-halloween-frights-in-tech">2024 Halloween Frights in Tech</a></div><div class="ListPreview-Footer"><span class="ListPreview-Date" data-testid="list-preview-date">Oct 31, 2024</span><div data-module="card-time" class="CardTime"><span class="CardTime-SeparatorLine">|</span><div data-component="article-read-time" class="ArticleReadTime ArticleReadTime_size_small CardTime-ReadTime"><span>10<!-- --> <!-- -->Slides</span></div></div></div></div></div><div class="ListPreview-ContributorsWrapper"><div class="Contributors Contributors_variant_slimline Contributors_cardVariant_small Contributors_hasAvatar" data-component="contributors"><div class="Contributors-AvatarWrapper"><a class="Contributors-AvatarLink" aria-label="Pam Baker" data-discover="true" href="/author/pam-baker"><img aria-hidden="true" data-testid="contributor-avatar" data-component="image" class="Contributors-Avatar" data-src="https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blta2c974464f9d8086/64bc0833691b1233dc5fefd2/Pam-Baker.png?width=100&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blta2c974464f9d8086/64bc0833691b1233dc5fefd2/Pam-Baker.png?width=100&auto=webp&quality=80&disable=upscale" loading="lazy" alt="Picture of Pam Baker" title="Picture of Pam Baker"/></a></div><div class="Contributors-InfoWrapper"><span class="Contributors-ByText" data-testid="by-text">by</span><a class="Contributors-ContributorName" data-testid="contributor-name" data-discover="true" href="/author/pam-baker">Pam Baker</a><span class="Contributors-ContributorTitle" data-testid="contributor-title">, <!-- -->Contributing Writer</span></div></div></div></div></div><div class="ContentPreview ListContent-ContentItem" data-module="content-preview" data-variant="small"><div class="ListPreview"><div class="ListPreview-Container"><div class="ListPreview-ImageWrapper"><a aria-label="Read more about: Serious People Negotiating in Conference Room" data-discover="true" href="/cyber-resilience/what-military-wargames-can-teach-us-about-cybersecurity"><div title="Serious People Negotiating in Conference Room"><img data-component="image" class="ListPreview-Image" data-src="https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt48b432feba9cdb54/671f9eb9ce342e100d74fa38/business_people_serious-Aleksei_Gorodenkov_alamy.jpg?width=300&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt48b432feba9cdb54/671f9eb9ce342e100d74fa38/business_people_serious-Aleksei_Gorodenkov_alamy.jpg?width=300&auto=webp&quality=80&disable=upscale" loading="lazy" alt="Serious People Negotiating in Conference Room" title="Serious People Negotiating in Conference Room"/></div></a></div><div class="ListPreview-ContentWrapper"><div class="ListPreview-KeywordWrapper"><a data-component="keyword" class="Keyword Keyword_variant_alternate Keyword_title_cyberResilience ListPreview-Keyword" data-discover="true" href="/cyber-resilience">Cyber Resilience</a></div><div class="ListPreview-TitleWrapper"><a class="ListPreview-Title" data-testid="preview-default-title" data-discover="true" href="/cyber-resilience/what-military-wargames-can-teach-us-about-cybersecurity">What Military Wargames Can Teach Us About Cybersecurity</a></div><div class="ListPreview-MobileTitleWrapper"><a class="ListPreview-Title" data-testid="preview-mobile-title" data-discover="true" href="/cyber-resilience/what-military-wargames-can-teach-us-about-cybersecurity">What Military Wargames Can Teach Us About Cybersecurity</a></div><div class="ListPreview-Footer"><span class="ListPreview-Date" data-testid="list-preview-date">Oct 31, 2024</span><div data-module="card-time" class="CardTime"><span class="CardTime-SeparatorLine">|</span><div data-component="article-read-time" class="ArticleReadTime ArticleReadTime_size_small CardTime-ReadTime"><span>1 Min<!-- --> <!-- -->Read</span></div></div></div></div></div><div class="ListPreview-ContributorsWrapper"><div class="Contributors Contributors_variant_slimline Contributors_cardVariant_small Contributors_hasAvatar" data-component="contributors"><div class="Contributors-AvatarWrapper"><a class="Contributors-AvatarLink" aria-label="Stefan Voss" data-discover="true" href="/author/stefan-voss"><img aria-hidden="true" data-testid="contributor-avatar" data-component="image" class="Contributors-Avatar" data-src="https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt8222bac38b9adcd7/671f98dd29bb8879286ac631/Stefan_Voss.jpg?width=100&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt8222bac38b9adcd7/671f98dd29bb8879286ac631/Stefan_Voss.jpg?width=100&auto=webp&quality=80&disable=upscale" loading="lazy" alt="Picture of Stefan Voss" title="Picture of Stefan Voss"/></a></div><div class="Contributors-InfoWrapper"><span class="Contributors-ByText" data-testid="by-text">by</span><a class="Contributors-ContributorName" data-testid="contributor-name" data-discover="true" href="/author/stefan-voss">Stefan Voss</a><span class="Contributors-ContributorTitle" data-testid="contributor-title">, <!-- -->VP of Product, Cove Data Protection</span></div></div></div></div></div><div class="ContentPreview ListContent-ContentItem" data-module="content-preview" data-variant="small"><div class="ListPreview"><div class="ListPreview-Container"><div class="ListPreview-ImageWrapper"><a aria-label="Read more about: green earth overlaid on fields with wind turbines" data-discover="true" href="/sustainability/cybersecurity-isn-t-easy-when-you-re-trying-to-be-green"><div title="green earth overlaid on fields with wind turbines"><img data-component="image" class="ListPreview-Image" data-src="https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt214d1816c7d0f46c/671fa236a93995afbd90faff/KanawatTH-green-energy-security-shutterstock.jpg?width=300&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt214d1816c7d0f46c/671fa236a93995afbd90faff/KanawatTH-green-energy-security-shutterstock.jpg?width=300&auto=webp&quality=80&disable=upscale" loading="lazy" alt="green earth overlaid on fields with wind turbines" title="green earth overlaid on fields with wind turbines"/></div></a></div><div class="ListPreview-ContentWrapper"><div class="ListPreview-KeywordWrapper"><a data-component="keyword" class="Keyword Keyword_variant_alternate Keyword_title_sustainability ListPreview-Keyword" data-discover="true" href="/sustainability">Sustainability</a></div><div class="ListPreview-TitleWrapper"><a class="ListPreview-Title" data-testid="preview-default-title" data-discover="true" href="/sustainability/cybersecurity-isn-t-easy-when-you-re-trying-to-be-green">Cybersecurity Isn't Easy When You're Trying to Be Green</a></div><div class="ListPreview-MobileTitleWrapper"><a class="ListPreview-Title" data-testid="preview-mobile-title" data-discover="true" href="/sustainability/cybersecurity-isn-t-easy-when-you-re-trying-to-be-green">Cybersecurity Isn't Easy When You're Trying to Be Green</a></div><div class="ListPreview-Footer"><span class="ListPreview-Date" data-testid="list-preview-date">Oct 31, 2024</span><div data-module="card-time" class="CardTime"><span class="CardTime-SeparatorLine">|</span><div data-component="article-read-time" class="ArticleReadTime ArticleReadTime_size_small CardTime-ReadTime"><span>1 Min<!-- --> <!-- -->Read</span></div></div></div></div></div><div class="ListPreview-ContributorsWrapper"><div class="Contributors Contributors_variant_slimline Contributors_cardVariant_small Contributors_hasAvatar" data-component="contributors"><div class="Contributors-AvatarWrapper"><a class="Contributors-AvatarLink" aria-label="Dark Reading" data-discover="true" href="/author/dark-reading"><img aria-hidden="true" data-testid="contributor-avatar" data-component="image" class="Contributors-Avatar" data-src="https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt9b8ea0e8a04b43eb/650c9551fe6e6b248b4df476/285801_DR23_Graphics_Website_Author_Logo_0.jpg?width=100&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt9b8ea0e8a04b43eb/650c9551fe6e6b248b4df476/285801_DR23_Graphics_Website_Author_Logo_0.jpg?width=100&auto=webp&quality=80&disable=upscale" loading="lazy" alt="Picture of Dark Reading" title="Picture of Dark Reading"/></a></div><div class="Contributors-InfoWrapper"><span class="Contributors-ByText" data-testid="by-text">by</span><a class="Contributors-ContributorName" data-testid="contributor-name" data-discover="true" href="/author/dark-reading">Dark Reading</a><span class="Contributors-ContributorTitle" data-testid="contributor-title">, <!-- -->Staff & Contributors</span></div></div></div></div></div><div class="ContentPreview ListContent-ContentItem" data-module="content-preview" data-variant="small"><div class="ListPreview"><div class="ListPreview-Container"><div class="ListPreview-ImageWrapper"><a aria-label="Read more about: " data-discover="true" href="/cyber-resilience/beyond-the-election-the-long-cybersecurity-fight-vs-bad-actors"><div title=""><img data-component="image" class="ListPreview-Image" data-src="https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/bltdfaf4c9b4480a8e7/671be12084b58df2a8f0e1a2/maskedhacktavist_AlekseiGorodenkov-AlamyStockPhoto.jpg?width=300&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/bltdfaf4c9b4480a8e7/671be12084b58df2a8f0e1a2/maskedhacktavist_AlekseiGorodenkov-AlamyStockPhoto.jpg?width=300&auto=webp&quality=80&disable=upscale" loading="lazy" alt="" title=""/></div></a><a class="ListPreview-IconWrapper" title="Link to all podcast" aria-label="Redirect to All page" data-testid="content-preview-icon-link" data-discover="true" href="/podcasts"><span data-component="icon" data-name="Microphone" class="ListPreview-Icon" style="mask-image:url(/build/_assets/Microphone-W4D26BPI.svg);-webkit-mask-image:url(/build/_assets/Microphone-W4D26BPI.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span></a></div><div class="ListPreview-ContentWrapper"><div class="ListPreview-KeywordWrapper"><a data-component="keyword" class="Keyword Keyword_variant_alternate Keyword_title_cyberResilience ListPreview-Keyword" data-discover="true" href="/cyber-resilience">Cyber Resilience</a></div><div class="ListPreview-TitleWrapper"><a class="ListPreview-Title" data-testid="preview-default-title" data-discover="true" href="/cyber-resilience/beyond-the-election-the-long-cybersecurity-fight-vs-bad-actors">Beyond the Election: The Long Cybersecurity Fight vs Bad Actors</a></div><div class="ListPreview-MobileTitleWrapper"><a class="ListPreview-Title" data-testid="preview-mobile-title" data-discover="true" href="/cyber-resilience/beyond-the-election-the-long-cybersecurity-fight-vs-bad-actors">Beyond the Election: The Long Cybersecurity Fight vs Bad Actors</a></div><div class="ListPreview-Footer"><span class="ListPreview-Date" data-testid="list-preview-date">Oct 28, 2024</span><div data-module="card-time" class="CardTime"><span class="CardTime-SeparatorLine">|</span><div data-component="article-read-time" class="ArticleReadTime ArticleReadTime_size_small CardTime-ReadTime"><span>38 Min<!-- --> <!-- -->Listen</span></div></div></div></div></div><div class="ListPreview-ContributorsWrapper"><div class="Contributors Contributors_variant_slimline Contributors_cardVariant_small Contributors_hasAvatar" data-component="contributors"><div class="Contributors-AvatarWrapper"><a class="Contributors-AvatarLink" aria-label="Joao-Pierre S. Ruth" data-discover="true" href="/author/joao-pierre-s-ruth"><img aria-hidden="true" data-testid="contributor-avatar" data-component="image" class="Contributors-Avatar" data-src="https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt7f004b6f174043df/67460618a8aa13b634af5c6c/Headshot2024-edited.jpg?width=100&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt7f004b6f174043df/67460618a8aa13b634af5c6c/Headshot2024-edited.jpg?width=100&auto=webp&quality=80&disable=upscale" loading="lazy" alt="Picture of Joao-Pierre S. Ruth" title="Picture of Joao-Pierre S. Ruth"/></a></div><div class="Contributors-InfoWrapper"><span class="Contributors-ByText" data-testid="by-text">by</span><a class="Contributors-ContributorName" data-testid="contributor-name" data-discover="true" href="/author/joao-pierre-s-ruth">Joao-Pierre S. Ruth</a><span class="Contributors-ContributorTitle" data-testid="contributor-title">, <!-- -->Senior Editor</span></div></div></div></div></div><div class="ContentPreview ListContent-ContentItem" data-module="content-preview" data-variant="small"><div class="ListPreview"><div class="ListPreview-Container"><div class="ListPreview-ImageWrapper"><a aria-label="Read more about: Concept of cloud computing" data-discover="true" href="/it-leadership/curtail-cloud-spend-with-these-strategies-"><div title="Concept of cloud computing"><img data-component="image" class="ListPreview-Image" data-src="https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blted8d9ef4c5adc333/671cf0abdae4ebcf28036c1a/Cloud_Computing_Kiyoshi_Takahase_Segundo_via_Alamy_Stock.jpg?width=300&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blted8d9ef4c5adc333/671cf0abdae4ebcf28036c1a/Cloud_Computing_Kiyoshi_Takahase_Segundo_via_Alamy_Stock.jpg?width=300&auto=webp&quality=80&disable=upscale" loading="lazy" alt="Concept of cloud computing" title="Concept of cloud computing"/></div></a><a class="ListPreview-IconWrapper" title="Link to all video" aria-label="Redirect to All page" data-testid="content-preview-icon-link" data-discover="true" href="/videos"><span data-component="icon" data-name="Play" class="ListPreview-Icon" style="mask-image:url(/build/_assets/Play-CLWHZVKX.svg);-webkit-mask-image:url(/build/_assets/Play-CLWHZVKX.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span></a></div><div class="ListPreview-ContentWrapper"><div class="ListPreview-KeywordWrapper"><a data-component="keyword" class="Keyword Keyword_variant_alternate Keyword_title_itLeadership ListPreview-Keyword" data-discover="true" href="/it-leadership">IT Leadership</a></div><div class="ListPreview-TitleWrapper"><a class="ListPreview-Title" data-testid="preview-default-title" data-discover="true" href="/it-leadership/curtail-cloud-spend-with-these-strategies-">Curtail Cloud Spend With These Strategies</a></div><div class="ListPreview-MobileTitleWrapper"><a class="ListPreview-Title" data-testid="preview-mobile-title" data-discover="true" href="/it-leadership/curtail-cloud-spend-with-these-strategies-">Curtail Cloud Spend With These Strategies</a></div><div class="ListPreview-Footer"><span class="ListPreview-Date" data-testid="list-preview-date">Oct 26, 2024</span><div data-module="card-time" class="CardTime"><span class="CardTime-SeparatorLine">|</span><div data-component="article-read-time" class="ArticleReadTime ArticleReadTime_size_small CardTime-ReadTime"><span>5 Min<!-- --> <!-- -->View</span></div></div></div></div></div><div class="ListPreview-ContributorsWrapper"><div class="Contributors Contributors_variant_slimline Contributors_cardVariant_small Contributors_hasAvatar" data-component="contributors"><div class="Contributors-AvatarWrapper"><a class="Contributors-AvatarLink" aria-label="Brandon Taylor" data-discover="true" href="/author/brandon-taylor"><img aria-hidden="true" data-testid="contributor-avatar" data-component="image" class="Contributors-Avatar" data-src="https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt15232db5d2321c39/64bf5c007b352808e9c5a64e/BrandonTaylorHeadshot1.jpg?width=100&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt15232db5d2321c39/64bf5c007b352808e9c5a64e/BrandonTaylorHeadshot1.jpg?width=100&auto=webp&quality=80&disable=upscale" loading="lazy" alt="Picture of Brandon Taylor" title="Picture of Brandon Taylor"/></a></div><div class="Contributors-InfoWrapper"><span class="Contributors-ByText" data-testid="by-text">by</span><a class="Contributors-ContributorName" data-testid="contributor-name" data-discover="true" href="/author/brandon-taylor">Brandon Taylor</a><span class="Contributors-ContributorTitle" data-testid="contributor-title">, <!-- -->Digital Editorial Program Manager</span></div></div></div></div></div><div class="ContentPreview ListContent-ContentItem" data-module="content-preview" data-variant="small"><div class="ListPreview"><div class="ListPreview-Container"><div class="ListPreview-ImageWrapper"><a aria-label="Read more about: close up of an eye with digital background" data-discover="true" href="/cyber-resilience/ai-manipulation-threatens-the-bonds-of-our-digital-world"><div title="close up of an eye with digital background"><img data-component="image" class="ListPreview-Image" data-src="https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt2e504e1eb5fa2747/65c2487f86cf3e040a3aa0d1/deepfakes-Bildagentur-online_-alamy.jpg?width=300&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt2e504e1eb5fa2747/65c2487f86cf3e040a3aa0d1/deepfakes-Bildagentur-online_-alamy.jpg?width=300&auto=webp&quality=80&disable=upscale" loading="lazy" alt="close up of an eye with digital background" title="close up of an eye with digital background"/></div></a></div><div class="ListPreview-ContentWrapper"><div class="ListPreview-KeywordWrapper"><a data-component="keyword" class="Keyword Keyword_variant_alternate Keyword_title_cyberResilience ListPreview-Keyword" data-discover="true" href="/cyber-resilience">Cyber Resilience</a></div><div class="ListPreview-TitleWrapper"><a class="ListPreview-Title" data-testid="preview-default-title" data-discover="true" href="/cyber-resilience/ai-manipulation-threatens-the-bonds-of-our-digital-world">AI Manipulation Threatens the Bonds of Our Digital World</a></div><div class="ListPreview-MobileTitleWrapper"><a class="ListPreview-Title" data-testid="preview-mobile-title" data-discover="true" href="/cyber-resilience/ai-manipulation-threatens-the-bonds-of-our-digital-world">AI Manipulation Threatens the Bonds of Our Digital World</a></div><div class="ListPreview-Footer"><span class="ListPreview-Date" data-testid="list-preview-date">Oct 25, 2024</span><div data-module="card-time" class="CardTime"><span class="CardTime-SeparatorLine">|</span><div data-component="article-read-time" class="ArticleReadTime ArticleReadTime_size_small CardTime-ReadTime"><span>1 Min<!-- --> <!-- -->Read</span></div></div></div></div></div><div class="ListPreview-ContributorsWrapper"><div class="Contributors Contributors_variant_slimline Contributors_cardVariant_small Contributors_hasAvatar" data-component="contributors"><div class="Contributors-AvatarWrapper"><a class="Contributors-AvatarLink" aria-label="Christophe Van de Weyer" data-discover="true" href="/author/christophe-van-de-weyer"><img aria-hidden="true" data-testid="contributor-avatar" data-component="image" class="Contributors-Avatar" data-src="https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt707b50429e87210c/671660a27edd3d6332fa62cc/Christophe_Van_de_Weyer.jpeg?width=100&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt707b50429e87210c/671660a27edd3d6332fa62cc/Christophe_Van_de_Weyer.jpeg?width=100&auto=webp&quality=80&disable=upscale" loading="lazy" alt="Picture of Christophe Van de Weyer" title="Picture of Christophe Van de Weyer"/></a></div><div class="Contributors-InfoWrapper"><span class="Contributors-ByText" data-testid="by-text">by</span><a class="Contributors-ContributorName" data-testid="contributor-name" data-discover="true" href="/author/christophe-van-de-weyer">Christophe Van de Weyer</a><span class="Contributors-ContributorTitle" data-testid="contributor-title">, <!-- -->CEO, Telesign</span></div></div></div></div></div><div class="ContentPreview ListContent-ContentItem ListContent-ContentItem_borderless" data-module="content-preview" data-variant="small"><div class="ListPreview"><div class="ListPreview-Container"><div class="ListPreview-ImageWrapper"><a aria-label="Read more about: Internet Data Protection" data-discover="true" href="/cyber-resilience/internet-archive-cyberattack-saga-continues"><div title="Internet Data Protection"><img data-component="image" class="ListPreview-Image" data-src="https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/bltb37a710c162f2ab3/6719499148c8ca6110269453/InternetData_protection-ZoonarGmbH-AlamyStockPhoto.jpg?width=300&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/bltb37a710c162f2ab3/6719499148c8ca6110269453/InternetData_protection-ZoonarGmbH-AlamyStockPhoto.jpg?width=300&auto=webp&quality=80&disable=upscale" loading="lazy" alt="Internet Data Protection" title="Internet Data Protection"/></div></a></div><div class="ListPreview-ContentWrapper"><div class="ListPreview-KeywordWrapper"><a data-component="keyword" class="Keyword Keyword_variant_alternate Keyword_title_cyberResilience ListPreview-Keyword" data-discover="true" href="/cyber-resilience">Cyber Resilience</a></div><div class="ListPreview-TitleWrapper"><a class="ListPreview-Title" data-testid="preview-default-title" data-discover="true" href="/cyber-resilience/internet-archive-cyberattack-saga-continues">Internet Archive Cyberattack Saga Continues</a></div><div class="ListPreview-MobileTitleWrapper"><a class="ListPreview-Title" data-testid="preview-mobile-title" data-discover="true" href="/cyber-resilience/internet-archive-cyberattack-saga-continues">Internet Archive Cyberattack Saga Continues</a></div><div class="ListPreview-Footer"><span class="ListPreview-Date" data-testid="list-preview-date">Oct 24, 2024</span><div data-module="card-time" class="CardTime"><span class="CardTime-SeparatorLine">|</span><div data-component="article-read-time" class="ArticleReadTime ArticleReadTime_size_small CardTime-ReadTime"><span>1 Min<!-- --> <!-- -->Read</span></div></div></div></div></div><div class="ListPreview-ContributorsWrapper"><div class="Contributors Contributors_variant_slimline Contributors_cardVariant_small Contributors_hasAvatar" data-component="contributors"><div class="Contributors-AvatarWrapper"><a class="Contributors-AvatarLink" aria-label="Carrie Pallardy" data-discover="true" href="/author/carrie-pallardy"><img aria-hidden="true" data-testid="contributor-avatar" data-component="image" class="Contributors-Avatar" data-src="https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blta2ac0cf507deba77/64bf49006c654daed172bbba/CarriePallardy_Head_Shot.gif?width=100&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blta2ac0cf507deba77/64bf49006c654daed172bbba/CarriePallardy_Head_Shot.gif?width=100&auto=webp&quality=80&disable=upscale" loading="lazy" alt="Picture of Carrie Pallardy" title="Picture of Carrie Pallardy"/></a></div><div class="Contributors-InfoWrapper"><span class="Contributors-ByText" data-testid="by-text">by</span><a class="Contributors-ContributorName" data-testid="contributor-name" data-discover="true" href="/author/carrie-pallardy">Carrie Pallardy</a><span class="Contributors-ContributorTitle" data-testid="contributor-title">, <!-- -->Contributing Reporter</span></div></div></div></div></div><div class="ContentPreview ListContent-ContentItem" data-module="content-preview" data-variant="small"><div class="ListPreview"><div class="ListPreview-Container"><div class="ListPreview-ImageWrapper"><a aria-label="Read more about: security lock on a screen" data-discover="true" href="/cyber-resilience/overconfidence-in-cybersecurity-a-hidden-risk"><div title="security lock on a screen"><img data-component="image" class="ListPreview-Image" data-src="https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt5820554609f8638f/66e49b83efb9960ddb888e40/cybersecurity-Stu_Gray-alamy.jpg?width=300&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt5820554609f8638f/66e49b83efb9960ddb888e40/cybersecurity-Stu_Gray-alamy.jpg?width=300&auto=webp&quality=80&disable=upscale" loading="lazy" alt="security lock on a screen" title="security lock on a screen"/></div></a></div><div class="ListPreview-ContentWrapper"><div class="ListPreview-KeywordWrapper"><a data-component="keyword" class="Keyword Keyword_variant_alternate Keyword_title_cyberResilience ListPreview-Keyword" data-discover="true" href="/cyber-resilience">Cyber Resilience</a></div><div class="ListPreview-TitleWrapper"><a class="ListPreview-Title" data-testid="preview-default-title" data-discover="true" href="/cyber-resilience/overconfidence-in-cybersecurity-a-hidden-risk">Overconfidence in Cybersecurity: A Hidden Risk</a></div><div class="ListPreview-MobileTitleWrapper"><a class="ListPreview-Title" data-testid="preview-mobile-title" data-discover="true" href="/cyber-resilience/overconfidence-in-cybersecurity-a-hidden-risk">Overconfidence in Cybersecurity: A Hidden Risk</a></div><div class="ListPreview-Footer"><span class="ListPreview-Date" data-testid="list-preview-date">Oct 24, 2024</span><div data-module="card-time" class="CardTime"><span class="CardTime-SeparatorLine">|</span><div data-component="article-read-time" class="ArticleReadTime ArticleReadTime_size_small CardTime-ReadTime"><span>1 Min<!-- --> <!-- -->Read</span></div></div></div></div></div><div class="ListPreview-ContributorsWrapper"><div class="Contributors Contributors_variant_slimline Contributors_cardVariant_small Contributors_hasAvatar" data-component="contributors"><div class="Contributors-AvatarWrapper"><a class="Contributors-AvatarLink" aria-label="Akhil Mittal" data-discover="true" href="/author/akhil-mittal"><img aria-hidden="true" data-testid="contributor-avatar" data-component="image" class="Contributors-Avatar" data-src="https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt3b4d9cfdf06067c2/671126371bb940228439e245/Akhil_Mitta.jpg?width=100&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt3b4d9cfdf06067c2/671126371bb940228439e245/Akhil_Mitta.jpg?width=100&auto=webp&quality=80&disable=upscale" loading="lazy" alt="Picture of Akhil Mittal" title="Picture of Akhil Mittal"/></a></div><div class="Contributors-InfoWrapper"><span class="Contributors-ByText" data-testid="by-text">by</span><a class="Contributors-ContributorName" data-testid="contributor-name" data-discover="true" href="/author/akhil-mittal">Akhil Mittal</a><span class="Contributors-ContributorTitle" data-testid="contributor-title">, <!-- -->Senior Manager, Synopsys</span></div></div></div></div></div><div class="ContentPreview ListContent-ContentItem" data-module="content-preview" data-variant="small"><div class="ListPreview"><div class="ListPreview-Container"><div class="ListPreview-ImageWrapper"><a aria-label="Read more about: digital eye" data-discover="true" href="/cyber-resilience/is-a-cpo-still-a-cpo-the-evolving-role-of-privacy-leadership"><div title="digital eye"><img data-component="image" class="ListPreview-Image" data-src="https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/bltbc4738c66d611fbf/66a1243e5cc53e07a2cee6d1/privacy-Skorzewiak-alamy.jpg?width=300&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/bltbc4738c66d611fbf/66a1243e5cc53e07a2cee6d1/privacy-Skorzewiak-alamy.jpg?width=300&auto=webp&quality=80&disable=upscale" loading="lazy" alt="digital eye" title="digital eye"/></div></a></div><div class="ListPreview-ContentWrapper"><div class="ListPreview-KeywordWrapper"><a data-component="keyword" class="Keyword Keyword_variant_alternate Keyword_title_cyberResilience ListPreview-Keyword" data-discover="true" href="/cyber-resilience">Cyber Resilience</a></div><div class="ListPreview-TitleWrapper"><a class="ListPreview-Title" data-testid="preview-default-title" data-discover="true" href="/cyber-resilience/is-a-cpo-still-a-cpo-the-evolving-role-of-privacy-leadership">Is a CPO Still a CPO? The Evolving Role of Privacy Leadership</a></div><div class="ListPreview-MobileTitleWrapper"><a class="ListPreview-Title" data-testid="preview-mobile-title" data-discover="true" href="/cyber-resilience/is-a-cpo-still-a-cpo-the-evolving-role-of-privacy-leadership">Is a CPO Still a CPO? The Evolving Role of Privacy Leadership</a></div><div class="ListPreview-Footer"><span class="ListPreview-Date" data-testid="list-preview-date">Oct 24, 2024</span><div data-module="card-time" class="CardTime"><span class="CardTime-SeparatorLine">|</span><div data-component="article-read-time" class="ArticleReadTime ArticleReadTime_size_small CardTime-ReadTime"><span>1 Min<!-- --> <!-- -->Read</span></div></div></div></div></div><div class="ListPreview-ContributorsWrapper"><div class="Contributors Contributors_variant_slimline Contributors_cardVariant_small Contributors_hasAvatar" data-component="contributors"><div class="Contributors-AvatarWrapper"><a class="Contributors-AvatarLink" aria-label="Dark Reading" data-discover="true" href="/author/dark-reading"><img aria-hidden="true" data-testid="contributor-avatar" data-component="image" class="Contributors-Avatar" data-src="https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt9b8ea0e8a04b43eb/650c9551fe6e6b248b4df476/285801_DR23_Graphics_Website_Author_Logo_0.jpg?width=100&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt9b8ea0e8a04b43eb/650c9551fe6e6b248b4df476/285801_DR23_Graphics_Website_Author_Logo_0.jpg?width=100&auto=webp&quality=80&disable=upscale" loading="lazy" alt="Picture of Dark Reading" title="Picture of Dark Reading"/></a></div><div class="Contributors-InfoWrapper"><span class="Contributors-ByText" data-testid="by-text">by</span><a class="Contributors-ContributorName" data-testid="contributor-name" data-discover="true" href="/author/dark-reading">Dark Reading</a><span class="Contributors-ContributorTitle" data-testid="contributor-title">, <!-- -->Staff & Contributors</span></div></div></div></div></div><div class="ContentPreview ListContent-ContentItem" data-module="content-preview" data-variant="small"><div class="ListPreview"><div class="ListPreview-Container"><div class="ListPreview-ImageWrapper"><a aria-label="Read more about: " data-discover="true" href="/cyber-resilience/fast-chat-multicloud-complexity-demands-new-levels-of-security-visibility"><div title=""><img data-component="image" class="ListPreview-Image" data-src="https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/bltf0ddbfab60c3a022/664b858294a678943b5fe046/Cybersecurity-STU_GRAY_VIA_ALAMY_STOCK.jpg?width=300&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/bltf0ddbfab60c3a022/664b858294a678943b5fe046/Cybersecurity-STU_GRAY_VIA_ALAMY_STOCK.jpg?width=300&auto=webp&quality=80&disable=upscale" loading="lazy" alt="" title=""/></div></a><a class="ListPreview-IconWrapper" title="Link to all video" aria-label="Redirect to All page" data-testid="content-preview-icon-link" data-discover="true" href="/videos"><span data-component="icon" data-name="Play" class="ListPreview-Icon" style="mask-image:url(/build/_assets/Play-CLWHZVKX.svg);-webkit-mask-image:url(/build/_assets/Play-CLWHZVKX.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span></a></div><div class="ListPreview-ContentWrapper"><div class="ListPreview-KeywordWrapper"><span data-component="keyword" class="Keyword Keyword_variant_alternate Keyword_title_sponsoredContent Keyword_disabled ListPreview-Keyword">Sponsored Content</span></div><div class="ListPreview-TitleWrapper"><a class="ListPreview-Title" data-testid="preview-default-title" data-discover="true" href="/cyber-resilience/fast-chat-multicloud-complexity-demands-new-levels-of-security-visibility">Fast Chat: Multicloud Complexity Demands New Levels of Security Visibility</a></div><div class="ListPreview-MobileTitleWrapper"><a class="ListPreview-Title" data-testid="preview-mobile-title" data-discover="true" href="/cyber-resilience/fast-chat-multicloud-complexity-demands-new-levels-of-security-visibility">Fast Chat: Multicloud Complexity Demands New Levels of Security Visibility</a></div><div class="ListPreview-Footer"><span class="ListPreview-Date" data-testid="list-preview-date">Oct 21, 2024</span><div data-module="card-time" class="CardTime"><span class="CardTime-SeparatorLine">|</span><div data-component="article-read-time" class="ArticleReadTime ArticleReadTime_size_small CardTime-ReadTime"><span>19 Min<!-- --> <!-- -->View</span></div></div></div></div></div></div></div><div class="ContentPreview ListContent-ContentItem" data-module="content-preview" data-variant="small"><div class="ListPreview"><div class="ListPreview-Container"><div class="ListPreview-ImageWrapper"><a aria-label="Read more about: clouds in the sky with silver locks floating across" data-discover="true" href="/cyber-resilience/navigating-the-complexities-and-security-risks-of-multi-cloud-management"><div title="clouds in the sky with silver locks floating across"><img data-component="image" class="ListPreview-Image" data-src="https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt467f85df3b3f19c3/670fe73280529a407971472f/Cloud(1800)_John_Williams_RF_Alamy.jpg?width=300&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt467f85df3b3f19c3/670fe73280529a407971472f/Cloud(1800)_John_Williams_RF_Alamy.jpg?width=300&auto=webp&quality=80&disable=upscale" loading="lazy" alt="clouds in the sky with silver locks floating across" title="clouds in the sky with silver locks floating across"/></div></a></div><div class="ListPreview-ContentWrapper"><div class="ListPreview-KeywordWrapper"><a data-component="keyword" class="Keyword Keyword_variant_alternate Keyword_title_cyberResilience ListPreview-Keyword" data-discover="true" href="/cyber-resilience">Cyber Resilience</a></div><div class="ListPreview-TitleWrapper"><a class="ListPreview-Title" data-testid="preview-default-title" data-discover="true" href="/cyber-resilience/navigating-the-complexities-and-security-risks-of-multi-cloud-management">Navigating the Complexities and Security Risks of Multi-Cloud Management</a></div><div class="ListPreview-MobileTitleWrapper"><a class="ListPreview-Title" data-testid="preview-mobile-title" data-discover="true" href="/cyber-resilience/navigating-the-complexities-and-security-risks-of-multi-cloud-management">Navigating the Complexities and Security Risks of Multi-Cloud Management</a></div><div class="ListPreview-Footer"><span class="ListPreview-Date" data-testid="list-preview-date">Oct 21, 2024</span><div data-module="card-time" class="CardTime"><span class="CardTime-SeparatorLine">|</span><div data-component="article-read-time" class="ArticleReadTime ArticleReadTime_size_small CardTime-ReadTime"><span>1 Min<!-- --> <!-- -->Read</span></div></div></div></div></div><div class="ListPreview-ContributorsWrapper"><div class="Contributors Contributors_variant_slimline Contributors_cardVariant_small Contributors_hasAvatar" data-component="contributors"><div class="Contributors-AvatarWrapper"><a class="Contributors-AvatarLink" aria-label="Dark Reading" data-discover="true" href="/author/dark-reading"><img aria-hidden="true" data-testid="contributor-avatar" data-component="image" class="Contributors-Avatar" data-src="https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt9b8ea0e8a04b43eb/650c9551fe6e6b248b4df476/285801_DR23_Graphics_Website_Author_Logo_0.jpg?width=100&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt9b8ea0e8a04b43eb/650c9551fe6e6b248b4df476/285801_DR23_Graphics_Website_Author_Logo_0.jpg?width=100&auto=webp&quality=80&disable=upscale" loading="lazy" alt="Picture of Dark Reading" title="Picture of Dark Reading"/></a></div><div class="Contributors-InfoWrapper"><span class="Contributors-ByText" data-testid="by-text">by</span><a class="Contributors-ContributorName" data-testid="contributor-name" data-discover="true" href="/author/dark-reading">Dark Reading</a><span class="Contributors-ContributorTitle" data-testid="contributor-title">, <!-- -->Staff & Contributors</span></div></div></div></div></div><div class="ContentPreview ListContent-ContentItem" data-module="content-preview" data-variant="small"><div class="ListPreview"><div class="ListPreview-Container"><div class="ListPreview-ImageWrapper"><a aria-label="Read more about: Man holds Bankruptcy Chapter 11 agreement documents." data-discover="true" href="/cyber-resilience/big-breach-sends-national-public-data-to-bankruptcy"><div title="Man holds Bankruptcy Chapter 11 agreement documents."><img data-component="image" class="ListPreview-Image" data-src="https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt64018c8375f96308/67112a71a792d27ff40ad700/chpt11bankruptcy_designer491-AlamyStockPhoto.jpg?width=300&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt64018c8375f96308/67112a71a792d27ff40ad700/chpt11bankruptcy_designer491-AlamyStockPhoto.jpg?width=300&auto=webp&quality=80&disable=upscale" loading="lazy" alt="Man holds Bankruptcy Chapter 11 agreement documents." title="Man holds Bankruptcy Chapter 11 agreement documents."/></div></a></div><div class="ListPreview-ContentWrapper"><div class="ListPreview-KeywordWrapper"><a data-component="keyword" class="Keyword Keyword_variant_alternate Keyword_title_cyberResilience ListPreview-Keyword" data-discover="true" href="/cyber-resilience">Cyber Resilience</a></div><div class="ListPreview-TitleWrapper"><a class="ListPreview-Title" data-testid="preview-default-title" data-discover="true" href="/cyber-resilience/big-breach-sends-national-public-data-to-bankruptcy">Big Breach Sends National Public Data to Bankruptcy</a></div><div class="ListPreview-MobileTitleWrapper"><a class="ListPreview-Title" data-testid="preview-mobile-title" data-discover="true" href="/cyber-resilience/big-breach-sends-national-public-data-to-bankruptcy">Big Breach Sends National Public Data to Bankruptcy</a></div><div class="ListPreview-Footer"><span class="ListPreview-Date" data-testid="list-preview-date">Oct 17, 2024</span><div data-module="card-time" class="CardTime"><span class="CardTime-SeparatorLine">|</span><div data-component="article-read-time" class="ArticleReadTime ArticleReadTime_size_small CardTime-ReadTime"><span>1 Min<!-- --> <!-- -->Read</span></div></div></div></div></div><div class="ListPreview-ContributorsWrapper"><div class="Contributors Contributors_variant_slimline Contributors_cardVariant_small Contributors_hasAvatar" data-component="contributors"><div class="Contributors-AvatarWrapper"><a class="Contributors-AvatarLink" aria-label="Carrie Pallardy" data-discover="true" href="/author/carrie-pallardy"><img aria-hidden="true" data-testid="contributor-avatar" data-component="image" class="Contributors-Avatar" data-src="https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blta2ac0cf507deba77/64bf49006c654daed172bbba/CarriePallardy_Head_Shot.gif?width=100&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blta2ac0cf507deba77/64bf49006c654daed172bbba/CarriePallardy_Head_Shot.gif?width=100&auto=webp&quality=80&disable=upscale" loading="lazy" alt="Picture of Carrie Pallardy" title="Picture of Carrie Pallardy"/></a></div><div class="Contributors-InfoWrapper"><span class="Contributors-ByText" data-testid="by-text">by</span><a class="Contributors-ContributorName" data-testid="contributor-name" data-discover="true" href="/author/carrie-pallardy">Carrie Pallardy</a><span class="Contributors-ContributorTitle" data-testid="contributor-title">, <!-- -->Contributing Reporter</span></div></div></div></div></div><div class="ContentPreview ListContent-ContentItem" data-module="content-preview" data-variant="small"><div class="ListPreview"><div class="ListPreview-Container"><div class="ListPreview-ImageWrapper"><a aria-label="Read more about: The words security gap on missing puzzle piece with a magnifying glass." data-discover="true" href="/cyber-resilience/security-at-the-edge-needs-more-attention"><div title="The words security gap on missing puzzle piece with a magnifying glass."><img data-component="image" class="ListPreview-Image" data-src="https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt263ddb45d8d166ac/6703ff67b2d4a43a52cea205/2FWP9E1.jpg?width=300&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt263ddb45d8d166ac/6703ff67b2d4a43a52cea205/2FWP9E1.jpg?width=300&auto=webp&quality=80&disable=upscale" loading="lazy" alt="The words security gap on missing puzzle piece with a magnifying glass." title="The words security gap on missing puzzle piece with a magnifying glass."/></div></a></div><div class="ListPreview-ContentWrapper"><div class="ListPreview-KeywordWrapper"><a data-component="keyword" class="Keyword Keyword_variant_alternate Keyword_title_cyberResilience ListPreview-Keyword" data-discover="true" href="/cyber-resilience">Cyber Resilience</a></div><div class="ListPreview-TitleWrapper"><a class="ListPreview-Title" data-testid="preview-default-title" data-discover="true" href="/cyber-resilience/security-at-the-edge-needs-more-attention">Security at the Edge Needs More Attention</a></div><div class="ListPreview-MobileTitleWrapper"><a class="ListPreview-Title" data-testid="preview-mobile-title" data-discover="true" href="/cyber-resilience/security-at-the-edge-needs-more-attention">Security at the Edge Needs More Attention</a></div><div class="ListPreview-Footer"><span class="ListPreview-Date" data-testid="list-preview-date">Oct 17, 2024</span><div data-module="card-time" class="CardTime"><span class="CardTime-SeparatorLine">|</span><div data-component="article-read-time" class="ArticleReadTime ArticleReadTime_size_small CardTime-ReadTime"><span>1 Min<!-- --> <!-- -->Read</span></div></div></div></div></div><div class="ListPreview-ContributorsWrapper"><div class="Contributors Contributors_variant_slimline Contributors_cardVariant_small Contributors_hasAvatar" data-component="contributors"><div class="Contributors-AvatarWrapper"><a class="Contributors-AvatarLink" aria-label="Lisa Morgan" data-discover="true" href="/author/lisa-morgan"><img aria-hidden="true" data-testid="contributor-avatar" data-component="image" class="Contributors-Avatar" data-src="https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt55c84ed4ee6ab7f9/66c4ed22992f7282278db37f/Lisa_Morgan_new_photo.jpg?width=100&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt55c84ed4ee6ab7f9/66c4ed22992f7282278db37f/Lisa_Morgan_new_photo.jpg?width=100&auto=webp&quality=80&disable=upscale" loading="lazy" alt="Picture of Lisa Morgan" title="Picture of Lisa Morgan"/></a></div><div class="Contributors-InfoWrapper"><span class="Contributors-ByText" data-testid="by-text">by</span><a class="Contributors-ContributorName" data-testid="contributor-name" data-discover="true" href="/author/lisa-morgan">Lisa Morgan</a><span class="Contributors-ContributorTitle" data-testid="contributor-title">, <!-- -->Freelance Writer</span></div></div></div></div></div><div class="ContentPreview ListContent-ContentItem" data-module="content-preview" data-variant="small"><div class="ListPreview"><div class="ListPreview-Container"><div class="ListPreview-ImageWrapper"><a aria-label="Read more about: Information Technology Framework Strategy Business Management Solution" data-discover="true" href="/cyber-resilience/the-challenge-of-sticking-to-cisa-s-vulnerability-framework"><div title="Information Technology Framework Strategy Business Management Solution"><img data-component="image" class="ListPreview-Image" data-src="https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt65fad349048ae935/6709715c523f9966859af52c/frameword-sleepyfellow_-alamy.jpg?width=300&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt65fad349048ae935/6709715c523f9966859af52c/frameword-sleepyfellow_-alamy.jpg?width=300&auto=webp&quality=80&disable=upscale" loading="lazy" alt="Information Technology Framework Strategy Business Management Solution" title="Information Technology Framework Strategy Business Management Solution"/></div></a></div><div class="ListPreview-ContentWrapper"><div class="ListPreview-KeywordWrapper"><a data-component="keyword" class="Keyword Keyword_variant_alternate Keyword_title_cyberResilience ListPreview-Keyword" data-discover="true" href="/cyber-resilience">Cyber Resilience</a></div><div class="ListPreview-TitleWrapper"><a class="ListPreview-Title" data-testid="preview-default-title" data-discover="true" href="/cyber-resilience/the-challenge-of-sticking-to-cisa-s-vulnerability-framework">The Challenge of Sticking to CISA’s Vulnerability Framework</a></div><div class="ListPreview-MobileTitleWrapper"><a class="ListPreview-Title" data-testid="preview-mobile-title" data-discover="true" href="/cyber-resilience/the-challenge-of-sticking-to-cisa-s-vulnerability-framework">The Challenge of Sticking to CISA’s Vulnerability Framework</a></div><div class="ListPreview-Footer"><span class="ListPreview-Date" data-testid="list-preview-date">Oct 17, 2024</span><div data-module="card-time" class="CardTime"><span class="CardTime-SeparatorLine">|</span><div data-component="article-read-time" class="ArticleReadTime ArticleReadTime_size_small CardTime-ReadTime"><span>1 Min<!-- --> <!-- -->Read</span></div></div></div></div></div><div class="ListPreview-ContributorsWrapper"><div class="Contributors Contributors_variant_slimline Contributors_cardVariant_small Contributors_hasAvatar" data-component="contributors"><div class="Contributors-AvatarWrapper"><a class="Contributors-AvatarLink" aria-label="Sarah Gray" data-discover="true" href="/author/sarah-gray"><img aria-hidden="true" data-testid="contributor-avatar" data-component="image" class="Contributors-Avatar" data-src="https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt81866850d4e05a10/67096c0c6a604e33c59d15c7/Sarah_Gray.jpg?width=100&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt81866850d4e05a10/67096c0c6a604e33c59d15c7/Sarah_Gray.jpg?width=100&auto=webp&quality=80&disable=upscale" loading="lazy" alt="Picture of Sarah Gray" title="Picture of Sarah Gray"/></a></div><div class="Contributors-InfoWrapper"><span class="Contributors-ByText" data-testid="by-text">by</span><a class="Contributors-ContributorName" data-testid="contributor-name" data-discover="true" href="/author/sarah-gray">Sarah Gray</a><span class="Contributors-ContributorTitle" data-testid="contributor-title">, <!-- -->Director of Product Marketing, Adaptiva</span></div></div></div></div></div><div class="ContentPreview ListContent-ContentItem" data-module="content-preview" data-variant="small"><div class="ListPreview"><div class="ListPreview-Container"><div class="ListPreview-ImageWrapper"><a aria-label="Read more about: red, white and blue star confetti" data-discover="true" href="/cyber-resilience/cyberattackers-unleash-flood-of-potentially-disruptive-election-related-activity"><div title="red, white and blue star confetti"><img data-component="image" class="ListPreview-Image" data-src="https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/bltda30b2f9dcc533b7/670ea812b0391959f65d93be/election_confetti-Jon_Helgason-Alamy.jpg?width=300&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/bltda30b2f9dcc533b7/670ea812b0391959f65d93be/election_confetti-Jon_Helgason-Alamy.jpg?width=300&auto=webp&quality=80&disable=upscale" loading="lazy" alt="red, white and blue star confetti" title="red, white and blue star confetti"/></div></a></div><div class="ListPreview-ContentWrapper"><div class="ListPreview-KeywordWrapper"><a data-component="keyword" class="Keyword Keyword_variant_alternate Keyword_title_cyberResilience ListPreview-Keyword" data-discover="true" href="/cyber-resilience">Cyber Resilience</a></div><div class="ListPreview-TitleWrapper"><a class="ListPreview-Title" data-testid="preview-default-title" data-discover="true" href="/cyber-resilience/cyberattackers-unleash-flood-of-potentially-disruptive-election-related-activity">Cyberattackers Unleash Flood of Potentially Disruptive Election-Related Activity</a></div><div class="ListPreview-MobileTitleWrapper"><a class="ListPreview-Title" data-testid="preview-mobile-title" data-discover="true" href="/cyber-resilience/cyberattackers-unleash-flood-of-potentially-disruptive-election-related-activity">Cyberattackers Unleash Flood of Potentially Disruptive Election-Related Activity</a></div><div class="ListPreview-Footer"><span class="ListPreview-Date" data-testid="list-preview-date">Oct 17, 2024</span><div data-module="card-time" class="CardTime"><span class="CardTime-SeparatorLine">|</span><div data-component="article-read-time" class="ArticleReadTime ArticleReadTime_size_small CardTime-ReadTime"><span>1 Min<!-- --> <!-- -->Read</span></div></div></div></div></div><div class="ListPreview-ContributorsWrapper"><div class="Contributors Contributors_variant_slimline Contributors_cardVariant_small Contributors_hasAvatar" data-component="contributors"><div class="Contributors-AvatarWrapper"><a class="Contributors-AvatarLink" aria-label="Dark Reading" data-discover="true" href="/author/dark-reading"><img aria-hidden="true" data-testid="contributor-avatar" data-component="image" class="Contributors-Avatar" data-src="https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt9b8ea0e8a04b43eb/650c9551fe6e6b248b4df476/285801_DR23_Graphics_Website_Author_Logo_0.jpg?width=100&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt9b8ea0e8a04b43eb/650c9551fe6e6b248b4df476/285801_DR23_Graphics_Website_Author_Logo_0.jpg?width=100&auto=webp&quality=80&disable=upscale" loading="lazy" alt="Picture of Dark Reading" title="Picture of Dark Reading"/></a></div><div class="Contributors-InfoWrapper"><span class="Contributors-ByText" data-testid="by-text">by</span><a class="Contributors-ContributorName" data-testid="contributor-name" data-discover="true" href="/author/dark-reading">Dark Reading</a><span class="Contributors-ContributorTitle" data-testid="contributor-title">, <!-- -->Staff & Contributors</span></div></div></div></div></div><div class="ContentPreview ListContent-ContentItem ListContent-ContentItem_borderless" data-module="content-preview" data-variant="small"><div class="ListPreview"><div class="ListPreview-Container"><div class="ListPreview-ImageWrapper"><a aria-label="Read more about: baseball player hitting ball" data-discover="true" href="/it-leadership/8-technical-skills-everyone-should-have"><div title="baseball player hitting ball"><img data-component="image" class="ListPreview-Image" data-src="https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt0061ad1d0f57bda4/6707dee11d7c5ddf8331373b/00skills-ball_and_bat-Tom_Wang-alamy.jpg?width=300&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt0061ad1d0f57bda4/6707dee11d7c5ddf8331373b/00skills-ball_and_bat-Tom_Wang-alamy.jpg?width=300&auto=webp&quality=80&disable=upscale" loading="lazy" alt="baseball player hitting ball" title="baseball player hitting ball"/></div></a><a class="ListPreview-IconWrapper" title="Link to all slideshow" aria-label="Redirect to All page" data-testid="content-preview-icon-link" data-discover="true" href="/slideshows"><span data-component="icon" data-name="Images" class="ListPreview-Icon" style="mask-image:url(/build/_assets/Images-OMBWO34R.svg);-webkit-mask-image:url(/build/_assets/Images-OMBWO34R.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span></a></div><div class="ListPreview-ContentWrapper"><div class="ListPreview-KeywordWrapper"><a data-component="keyword" class="Keyword Keyword_variant_alternate Keyword_title_itLeadership ListPreview-Keyword" data-discover="true" href="/it-leadership">IT Leadership</a></div><div class="ListPreview-TitleWrapper"><a class="ListPreview-Title" data-testid="preview-default-title" data-discover="true" href="/it-leadership/8-technical-skills-everyone-should-have">8 Technical Skills Everyone Should Have</a></div><div class="ListPreview-MobileTitleWrapper"><a class="ListPreview-Title" data-testid="preview-mobile-title" data-discover="true" href="/it-leadership/8-technical-skills-everyone-should-have">8 Technical Skills Everyone Should Have</a></div><div class="ListPreview-Footer"><span class="ListPreview-Date" data-testid="list-preview-date">Oct 16, 2024</span><div data-module="card-time" class="CardTime"><span class="CardTime-SeparatorLine">|</span><div data-component="article-read-time" class="ArticleReadTime ArticleReadTime_size_small CardTime-ReadTime"><span>8<!-- --> <!-- -->Slides</span></div></div></div></div></div><div class="ListPreview-ContributorsWrapper"><div class="Contributors Contributors_variant_slimline Contributors_cardVariant_small Contributors_hasAvatar" data-component="contributors"><div class="Contributors-AvatarWrapper"><a class="Contributors-AvatarLink" aria-label="Lisa Morgan" data-discover="true" href="/author/lisa-morgan"><img aria-hidden="true" data-testid="contributor-avatar" data-component="image" class="Contributors-Avatar" data-src="https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt55c84ed4ee6ab7f9/66c4ed22992f7282278db37f/Lisa_Morgan_new_photo.jpg?width=100&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt55c84ed4ee6ab7f9/66c4ed22992f7282278db37f/Lisa_Morgan_new_photo.jpg?width=100&auto=webp&quality=80&disable=upscale" loading="lazy" alt="Picture of Lisa Morgan" title="Picture of Lisa Morgan"/></a></div><div class="Contributors-InfoWrapper"><span class="Contributors-ByText" data-testid="by-text">by</span><a class="Contributors-ContributorName" data-testid="contributor-name" data-discover="true" href="/author/lisa-morgan">Lisa Morgan</a><span class="Contributors-ContributorTitle" data-testid="contributor-title">, <!-- -->Freelance Writer</span></div></div></div></div></div><nav role="navigation" aria-label="Pagination Navigation" data-component="pagination" class="ListContent-Pagination"><ul class="Pagination-Wrapper"><li><a tabindex="-1" aria-label="Cannot go to Previous page" class="Pagination-Link Pagination-Link_disabled" data-discover="true" href="/cyber-resilience/cybersecurity"><span class="Pagination-PageWrapper"><span class="Pagination-ArrowIconWrapper Pagination-ArrowIconWrapper_disabled"><span data-component="icon" data-name="ArrowLeft" class="Pagination-ArrowIcon Pagination-ArrowIcon_disabled" style="mask-image:url(/build/_assets/ArrowLeft-LJREXKU3.svg);-webkit-mask-image:url(/build/_assets/ArrowLeft-LJREXKU3.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span></span><span data-testid="labelText" class="Pagination-Move">Previous</span></span></a></li><li><a tabindex="-1" aria-label="Current page, page 1" class="Pagination-PageNumber Pagination-PageNumber_current" data-discover="true" href="/cyber-resilience/cybersecurity">1</a></li><li><a tabindex="0" aria-label="Go to page 2" class="Pagination-PageNumber" data-discover="true" href="/cyber-resilience/cybersecurity?page=2">2</a></li><li><a tabindex="0" aria-label="Go to page 3" class="Pagination-PageNumber" data-discover="true" href="/cyber-resilience/cybersecurity?page=3">3</a></li><li><a tabindex="0" aria-label="Go to page 4" class="Pagination-PageNumber" data-discover="true" href="/cyber-resilience/cybersecurity?page=4">4</a></li><li><a tabindex="0" aria-label="Go to page 5" class="Pagination-PageNumber" data-discover="true" href="/cyber-resilience/cybersecurity?page=5">5</a></li><li class="Pagination-Dots">…</li><li><a tabindex="0" aria-label="Go to page 109" class="Pagination-PageNumber Pagination-PageNumber_desktop" data-discover="true" href="/cyber-resilience/cybersecurity?page=109">109</a></li><li><a tabindex="0" aria-label="Go to Next page 2" class="Pagination-Link" data-discover="true" href="/cyber-resilience/cybersecurity?page=2"><span class="Pagination-PageWrapper"><span data-testid="labelText" class="Pagination-Move">Next</span><span class="Pagination-ArrowIconWrapper"><span data-component="icon" data-name="ArrowRight" class="Pagination-ArrowIcon" style="mask-image:url(/build/_assets/ArrowRight-KNUWEVNZ.svg);-webkit-mask-image:url(/build/_assets/ArrowRight-KNUWEVNZ.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span></span></span></a></li></ul></nav></div></div><div class="TwoColumnLayout-Sidebar"><div class="Sidebar" data-module="sidebar"><div class="Sidebar-SidebarItem" data-testid="sidebar-item"><div data-module="content-cards" class="ContentCards ContentCards_sidebar"><div class="ContentCards-CardsWrapper ContentCards-CardsWrapper_default"><div class="ContentCards-Header ContentCards-Header_default" data-testid="content-cards-header"><h3 class="ContentCards-Title" data-testid="contentCardsTitle">Editor's Choice</h3></div><div class="ContentCards-Content ContentCards-Content_default"><div class="ContentCards-ContentPreview ContentCards-ContentPreview_default" data-testid="content-preview-default"><div class="ContentPreview" data-module="content-preview" data-variant="card-horizontal"><div class="HorizontalCard"><div class="HorizontalCard-ImageWrapper"><a data-discover="true" href="/it-leadership/solarwinds-ceo-on-building-trust-after-breach-unifying-it-and-c-suite-and-genai-future"><span class="HorizontalCard-ImageScreenReaderText"></span><img data-component="image" class="HorizontalCard-Image" data-src="https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt8b52468b0c8f906b/6745d77ff7643ded0dda2f1c/Sudhakar_RamakrishnaNew.jpg?width=300&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt8b52468b0c8f906b/6745d77ff7643ded0dda2f1c/Sudhakar_RamakrishnaNew.jpg?width=300&auto=webp&quality=80&disable=upscale" loading="lazy" alt="" title=""/></a></div><div class="HorizontalCard-ContentWrapper"><div class="HorizontalCard-KeywordWrapper"><a data-component="keyword" class="Keyword Keyword_variant_alternate Keyword_title_itLeadership HorizontalCard-Keyword" data-discover="true" href="/it-leadership">IT Leadership</a></div><div class="HorizontalCard-TitleWrapper"><a class="HorizontalCard-Title" data-testid="preview-default-title" data-discover="true" href="/it-leadership/solarwinds-ceo-on-building-trust-after-breach-unifying-it-and-c-suite-and-genai-future">SolarWinds CEO on Building Trust After Breach, Unifying IT and C-Suite, and GenAI Future</a></div><div class="HorizontalCard-MobileTitleWrapper"><a class="HorizontalCard-Title" data-testid="preview-mobile-title" data-discover="true" href="/it-leadership/solarwinds-ceo-on-building-trust-after-breach-unifying-it-and-c-suite-and-genai-future">SolarWinds CEO on Building Trust After Breach, Unifying IT and C-Suite, and GenAI Future</a></div><p class="HorizontalCard-Date" data-testid="horizontalCardDate">Nov 26, 2024</p></div></div></div></div><div class="ContentCards-ContentPreview ContentCards-ContentPreview_default" data-testid="content-preview-default"><div class="ContentPreview" data-module="content-preview" data-variant="card-horizontal"><div class="HorizontalCard"><div class="HorizontalCard-ImageWrapper"><a data-discover="true" href="/machine-learning-ai/the-new-cold-war-us-urged-to-form-manhattan-project-for-agi"><span class="HorizontalCard-ImageScreenReaderText">Tech war between China and the USA. Flag of USA and China on a microprocessor</span><img data-component="image" class="HorizontalCard-Image" data-src="https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/bltf49c02c531155ca8/673f7b21f8c46bd4922fbca9/AI_cold_war.jpg?width=300&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/bltf49c02c531155ca8/673f7b21f8c46bd4922fbca9/AI_cold_war.jpg?width=300&auto=webp&quality=80&disable=upscale" loading="lazy" alt="" title=""/></a></div><div class="HorizontalCard-ContentWrapper"><div class="HorizontalCard-KeywordWrapper"><a data-component="keyword" class="Keyword Keyword_variant_alternate Keyword_title_machineLearningAi HorizontalCard-Keyword" data-discover="true" href="/machine-learning-ai">Machine Learning & AI</a></div><div class="HorizontalCard-TitleWrapper"><a class="HorizontalCard-Title" data-testid="preview-default-title" data-discover="true" href="/machine-learning-ai/the-new-cold-war-us-urged-to-form-manhattan-project-for-agi">The New Cold War: US Urged to Form ‘Manhattan Project’ for AGI</a></div><div class="HorizontalCard-MobileTitleWrapper"><a class="HorizontalCard-Title" data-testid="preview-mobile-title" data-discover="true" href="/machine-learning-ai/the-new-cold-war-us-urged-to-form-manhattan-project-for-agi">The New Cold War: US Urged to Form ‘Manhattan Project’ for AGI</a></div><p class="HorizontalCard-Date" data-testid="horizontalCardDate">Nov 21, 2024</p></div></div></div></div><div class="ContentCards-ContentPreview ContentCards-ContentPreview_default" data-testid="content-preview-default"><div class="ContentPreview" data-module="content-preview" data-variant="card-horizontal"><div class="HorizontalCard"><div class="HorizontalCard-ImageWrapper"><a data-discover="true" href="/it-infrastructure/6-cloud-trends-to-watch-in-2025"><span class="HorizontalCard-ImageScreenReaderText">cloud computing background</span><img data-component="image" class="HorizontalCard-Image" data-src="https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt976ce52f1cfd0dc2/67376e6ed415b349d98bd337/cloud-YAY_Media_AS_-alamy.jpg?width=300&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt976ce52f1cfd0dc2/67376e6ed415b349d98bd337/cloud-YAY_Media_AS_-alamy.jpg?width=300&auto=webp&quality=80&disable=upscale" loading="lazy" alt="" title=""/></a></div><div class="HorizontalCard-ContentWrapper"><div class="HorizontalCard-KeywordWrapper"><a data-component="keyword" class="Keyword Keyword_variant_alternate Keyword_title_itInfrastructure HorizontalCard-Keyword" data-discover="true" href="/it-infrastructure">IT Infrastructure</a></div><div class="HorizontalCard-TitleWrapper"><a class="HorizontalCard-Title" data-testid="preview-default-title" data-discover="true" href="/it-infrastructure/6-cloud-trends-to-watch-in-2025">6 Cloud Trends to Watch in 2025</a></div><div class="HorizontalCard-MobileTitleWrapper"><a class="HorizontalCard-Title" data-testid="preview-mobile-title" data-discover="true" href="/it-infrastructure/6-cloud-trends-to-watch-in-2025">6 Cloud Trends to Watch in 2025</a></div><p class="HorizontalCard-Date" data-testid="horizontalCardDate">Nov 18, 2024</p></div></div></div></div><div class="ContentCards-ContentPreview ContentCards-ContentPreview_default" data-testid="content-preview-default"><div class="ContentPreview" data-module="content-preview" data-variant="card-horizontal"><div class="HorizontalCard"><div class="HorizontalCard-ImageWrapper"><a data-discover="true" href="/it-leadership/help-wanted-it-hiring-trends-in-2025"><span class="HorizontalCard-ImageScreenReaderText">Young businessman working on a virtual screen of the future and sees the inscription: Now hiring </span><img data-component="image" class="HorizontalCard-Image" data-src="https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/bltc836cd7e008ac6fd/673622c22202400113c00768/2DRD7WH.jpg?width=300&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/bltc836cd7e008ac6fd/673622c22202400113c00768/2DRD7WH.jpg?width=300&auto=webp&quality=80&disable=upscale" loading="lazy" alt="" title=""/></a></div><div class="HorizontalCard-ContentWrapper"><div class="HorizontalCard-KeywordWrapper"><a data-component="keyword" class="Keyword Keyword_variant_alternate Keyword_title_itLeadership HorizontalCard-Keyword" data-discover="true" href="/it-leadership">IT Leadership</a></div><div class="HorizontalCard-TitleWrapper"><a class="HorizontalCard-Title" data-testid="preview-default-title" data-discover="true" href="/it-leadership/help-wanted-it-hiring-trends-in-2025">Help Wanted: IT Hiring Trends in 2025</a></div><div class="HorizontalCard-MobileTitleWrapper"><a class="HorizontalCard-Title" data-testid="preview-mobile-title" data-discover="true" href="/it-leadership/help-wanted-it-hiring-trends-in-2025">Help Wanted: IT Hiring Trends in 2025</a></div><p class="HorizontalCard-Date" data-testid="horizontalCardDate">Nov 20, 2024</p></div></div></div></div><div class="ContentCards-ContentPreview ContentCards-ContentPreview_default" data-testid="content-preview-default"><div class="ContentPreview" data-module="content-preview" data-variant="card-horizontal"><div class="HorizontalCard"><div class="HorizontalCard-ImageWrapper"><a data-discover="true" href="/it-leadership/2024-informationweek-us-it-salary-report-profits-layoffs-and-the-continued-rise-of-ai"><span class="HorizontalCard-ImageScreenReaderText">Calculator displaying the text "SALARY" on top of $100 bills.</span><img data-component="image" class="HorizontalCard-Image" data-src="https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt7155157a2ee649fd/665f5cf3dea0b45b6f742583/image-1200x675.jpg?width=300&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt7155157a2ee649fd/665f5cf3dea0b45b6f742583/image-1200x675.jpg?width=300&auto=webp&quality=80&disable=upscale" loading="lazy" alt="" title=""/></a><a class="HorizontalCard-IconWrapper" title="Link to all document" data-testid="content-preview-icon-link" data-discover="true" href="/it-leadership/2024-informationweek-us-it-salary-report-profits-layoffs-and-the-continued-rise-of-ai"><span data-component="icon" data-name="Document" class="HorizontalCard-Icon" style="mask-image:url(/build/_assets/Document-NG4YMZFA.svg);-webkit-mask-image:url(/build/_assets/Document-NG4YMZFA.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span></a></div><div class="HorizontalCard-ContentWrapper"><div class="HorizontalCard-KeywordWrapper"><a data-component="keyword" class="Keyword Keyword_variant_alternate Keyword_title_itLeadership HorizontalCard-Keyword" data-discover="true" href="/it-leadership">IT Leadership</a></div><div class="HorizontalCard-TitleWrapper"><a class="HorizontalCard-Title" data-testid="preview-default-title" data-discover="true" href="/it-leadership/2024-informationweek-us-it-salary-report-profits-layoffs-and-the-continued-rise-of-ai">2024 InformationWeek US IT Salary Report: Profits, Layoffs, and the Continued Rise of AI</a></div><div class="HorizontalCard-MobileTitleWrapper"><a class="HorizontalCard-Title" data-testid="preview-mobile-title" data-discover="true" href="/it-leadership/2024-informationweek-us-it-salary-report-profits-layoffs-and-the-continued-rise-of-ai">2024 InformationWeek US IT Salary Report</a></div><p class="HorizontalCard-Date" data-testid="horizontalCardDate">Jun 4, 2024</p></div></div></div></div></div></div></div></div><div class="Sidebar-SidebarItem" data-testid="sidebar-item"></div><div class="Sidebar-SidebarItem" data-testid="sidebar-item"><div data-component="content-list" class="ContentList"><div class="ContentList-Header"><span data-component="icon" data-name="Document" class="ContentList-Icon" style="mask-image:url(/build/_assets/Document-NG4YMZFA.svg);-webkit-mask-image:url(/build/_assets/Document-NG4YMZFA.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span><span class="ContentList-Title" data-testid="content-list-title">White Papers</span></div><ul class="ContentList-List"><li class="ContentList-ListItem"><a target="_blank" rel="nofollow" data-testid="content-list-item-title" href="https://iw-resources.informationweek.com/c/pubRD.mpl?secure=1&sr=pp&_t=pp:&qf=w_jfro17&ch=SBX&cid=_whitepaper_14.500005845&_mc=_whitepaper_14.500005845"><p class="ContentList-ListItemTitle">Software Supply Chain State of the Union 2024</p></a></li><li class="ContentList-ListItem"><a target="_blank" rel="nofollow" data-testid="content-list-item-title" href="https://iw-resources.informationweek.com/c/pubRD.mpl?secure=1&sr=pp&_t=pp:&qf=w_defa7361&ch=SBX&cid=_whitepaper_14.500005842&_mc=_whitepaper_14.500005842"><p class="ContentList-ListItemTitle">Work Smarter, Not Harder with Gemini in Security Operations</p></a></li><li class="ContentList-ListItem"><a target="_blank" rel="nofollow" data-testid="content-list-item-title" href="https://iw-resources.informationweek.com/c/pubRD.mpl?secure=1&sr=pp&_t=pp:&qf=w_defa7358&ch=SBX&cid=_whitepaper_14.500005840&_mc=_whitepaper_14.500005840"><p class="ContentList-ListItemTitle">The Defender's Advantage Solutions Guide</p></a></li><li class="ContentList-ListItem"><a target="_blank" rel="nofollow" data-testid="content-list-item-title" href="https://iw-resources.informationweek.com/c/pubRD.mpl?secure=1&sr=pp&_t=pp:&qf=w_defa7359&ch=SBX&cid=_whitepaper_14.500005838&_mc=_whitepaper_14.500005838"><p class="ContentList-ListItemTitle">The Defender's Advantage | A guide to activating cyber defense</p></a></li><li class="ContentList-ListItem"><a target="_blank" rel="nofollow" data-testid="content-list-item-title" href="https://iw-resources.informationweek.com/c/pubRD.mpl?secure=1&sr=pp&_t=pp:&qf=w_defa6938&ch=SBX&cid=_whitepaper_14.500005784&_mc=_whitepaper_14.500005784"><p class="ContentList-ListItemTitle">Digital Resilience: Merging IT Growth with Environmental Responsibility</p></a></li></ul><div class="ContentList-CTAButton"><span data-component="button" role="presentation" class="Button Button_size_medium Button_variant_textLink"><span class="Button-ContentWrapper"><a class="ContentList-CTAText" rel="noreferrer" data-discover="true" href="/resources?page=1&types=White+Paper" target="_blank">More White Papers</a></span><span data-component="icon" data-name="ChevronRight" class="Button-Icon Button-Icon_position_right" style="mask-image:url(/build/_assets/ChevronRight-NHDKEYGJ.svg);-webkit-mask-image:url(/build/_assets/ChevronRight-NHDKEYGJ.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span></span></div></div></div><div class="Sidebar-SidebarItem" data-testid="sidebar-item"><div data-component="content-list" class="ContentList"><div class="ContentList-Header"><span data-component="icon" data-name="Date" class="ContentList-Icon" style="mask-image:url(/build/_assets/Date-KJRS72FO.svg);-webkit-mask-image:url(/build/_assets/Date-KJRS72FO.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span><span class="ContentList-Title" data-testid="content-list-title">Live Events</span></div><ul class="ContentList-List"><li class="ContentList-ListItem"><a target="_blank" rel="nofollow" data-testid="content-list-item-title" href="https://iw-resources.informationweek.com/c/pubRD.mpl?secure=1&sr=pp&_t=pp:&qf=w_defa6833&ch=iwkSBX&cid=_session_16.500323&_mc=_session_16.500323"><p class="ContentList-ListItemTitle">[Virtual Event] The Essential Guide to Cloud Management</p></a><span class="ContentList-ListItemDate" data-testid="content-list-item-date">Oct 17, 2024</span></li></ul><div class="ContentList-CTAButton"><span data-component="button" role="presentation" class="Button Button_size_medium Button_variant_textLink"><span class="Button-ContentWrapper"><a class="ContentList-CTAText" target="_blank" rel="noreferrer" href="https://www.informationweek.com/upcoming-events">More Live Events</a></span><span data-component="icon" data-name="ChevronRight" class="Button-Icon Button-Icon_position_right" style="mask-image:url(/build/_assets/ChevronRight-NHDKEYGJ.svg);-webkit-mask-image:url(/build/_assets/ChevronRight-NHDKEYGJ.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span></span></div></div></div><div class="Sidebar-SidebarItem" data-testid="sidebar-item"><div data-component="content-list" class="ContentList"><div class="ContentList-Header"><span data-component="icon" data-name="Document" class="ContentList-Icon" style="mask-image:url(/build/_assets/Document-NG4YMZFA.svg);-webkit-mask-image:url(/build/_assets/Document-NG4YMZFA.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span><span class="ContentList-Title" data-testid="content-list-title">Reports</span></div><ul class="ContentList-List"><li class="ContentList-ListItem"><a target="_blank" rel="nofollow" data-testid="content-list-item-title" href="https://iw-resources.informationweek.com/c/pubRD.mpl?secure=1&sr=pp&_t=pp:&qf=w_ingg253&ch=sbx&cid=_analytics_7.300006014&_mc=_analytics_7.300006014"><p class="ContentList-ListItemTitle">2024 InformationWeek US IT Salary Report</p></a><span class="ContentList-ListItemDate" data-testid="content-list-item-date">May 29, 2024</span></li><li class="ContentList-ListItem"><a target="_blank" rel="nofollow" data-testid="content-list-item-title" href="https://iw-resources.informationweek.com/c/pubRD.mpl?secure=1&sr=pp&_t=pp:&qf=w_ingg40&ch=sbx&cid=_analytics_7.300005937&_mc=_analytics_7.300005937"><p class="ContentList-ListItemTitle">2022 State of ITOps and SecOps</p></a><span class="ContentList-ListItemDate" data-testid="content-list-item-date">Jun 21, 2022</span></li></ul><div class="ContentList-CTAButton"><span data-component="button" role="presentation" class="Button Button_size_medium Button_variant_textLink"><span class="Button-ContentWrapper"><a class="ContentList-CTAText" rel="noreferrer" data-discover="true" href="/resources?page=1&types=Research+Report" target="_blank">More Reports</a></span><span data-component="icon" data-name="ChevronRight" class="Button-Icon Button-Icon_position_right" style="mask-image:url(/build/_assets/ChevronRight-NHDKEYGJ.svg);-webkit-mask-image:url(/build/_assets/ChevronRight-NHDKEYGJ.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span></span></div></div></div></div></div></div></div><div class="ListContent-NewsletterSignupPromo"><div data-module="newsletter-signup-promo"><div class="SubscribeBanner SubscribeBanner_mode_light SubscribeBanner_variant_vertical TopicList-NewsletterContent"><div class="SubscribeBanner-Wrapper"><div class="SubscribeBanner-Title" data-testid="subscribeBanner_title">Never Miss a Beat: Get a snapshot of the issues affecting the IT industry straight to your inbox.</div><div class="SubscribeBanner-Message" data-testid="subscribeBanner_message"></div><div class="SubscribeBanner-Button"><a data-component="button" data-testid="bannerNewsletterbutton" class="Button Button_size_medium Button_variant_primaryFilled" href="https://iw-resources.informationweek.com/c/pubRD.mpl?secure=1&sr=pp&_t=pp:&qf=w_ingg126&ch=iwsite" target="_blank" rel="nofollow" data-name="subscribe-banner" data-action-type="sign-up"><span class="Button-ContentWrapper">SIGN-UP</span></a></div></div></div></div></div></div></div></section><footer data-module="footer" class="Footer"><div class="Footer-Background"></div><div data-testid="logo" class="Footer-LogoContainer Footer-LogoContainer_length_2"><a data-discover="true" href="/"><img title="Information Week Logo" data-component="image" class="Footer-LogoImage Footer-LogoImage_length_2" data-src="https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blte28ded54d12e0ac0/644913f2d2002548587a2a5e/InformationWeek-Logo.png?width=700&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blte28ded54d12e0ac0/644913f2d2002548587a2a5e/InformationWeek-Logo.png?width=700&auto=webp&quality=80&disable=upscale" loading="lazy" alt="Information Week Logo"/></a></div><div data-testid="LinkSection" class="LinkSection LinkSection_length_2"><h5 class="LinkSection-Title" data-testid="link-section-title">Discover More</h5><div class="LinkSection-LinksWrapper"><a class="LinkSection-Link" target="_blank" rel="noreferrer" href="https://omdia.tech.informa.com/">Omdia</a><a class="LinkSection-Link" target="_blank" rel="noreferrer" href="https://www.networkcomputing.com/">Network Computing</a><a class="LinkSection-Link" target="_blank" rel="noreferrer" href="https://www.itprotoday.com/">ITPro Today</a><a class="LinkSection-Link" target="_blank" rel="noreferrer" href="https://www.datacenterknowledge.com/">Data Center Knowledge</a><a class="LinkSection-Link" target="_blank" rel="noreferrer" href="https://datacenterworld.com/">Data Center World </a></div></div><div data-testid="LinkSection" class="LinkSection LinkSection_length_2"><h5 class="LinkSection-Title" data-testid="link-section-title">Working With Us</h5><div class="LinkSection-LinksWrapper"><a class="LinkSection-Link" rel="noreferrer" data-discover="true" href="/about-us" target="_blank">About Us</a><a class="LinkSection-Link" target="_blank" rel="noreferrer" href="https://info.wrightsmedia.com/informa-licensing-reprints-request">Reprints</a><a class="LinkSection-Link" rel="noreferrer" data-discover="true" href="/advertise" target="_blank">Advertise</a><a class="LinkSection-Link" rel="noreferrer" data-discover="true" href="/contact-us" target="_blank">Contact Us</a></div></div><div data-testid="registration" class="Footer-RegistrationWrapper"><div class="RegistrationSection RegistrationSection_linkSectionLength_2"><h5 class="RegistrationSection-Title">Join Us</h5><div class="Layout-Register Layout-Register_variant_footer"></div><div class="Layout-NewsLetter Layout-NewsLetter_variant_footer"><div data-module="newsletter-signup-promo"><a data-component="button" data-testid="footerNewsletterButton" class="Button Button_size_medium Button_variant_primaryFilled" href="https://iw-resources.informationweek.com/c/pubRD.mpl?secure=1&sr=pp&_t=pp:&qf=w_ingg126&ch=iwsite" target="_blank" rel="nofollow" data-name="subscribe-footer" data-action-type="sign-up"><span class="Button-ContentWrapper">Newsletter Sign-Up</span></a></div></div></div></div><div data-testid="social" class="SocialSection SocialSection_linkSectionLength_2"><h5 class="SocialSection-Title">Follow Us</h5><div data-component="social-share" class="SocialShare SocialShare_variant_layout"><a target="_blank" rel="noreferrer" aria-label="Linkedin" href="https://www.linkedin.com/company/informationweek/"><span class="SocialShare-IconWrapper SocialShare-IconWrapper_variant_layout"><span data-component="icon" data-name="Linkedin" class="SocialShare-Icon SocialShare-Icon_variant_layout SocialShare-Icon_type_linkedin" style="mask-image:url(/build/_assets/Linkedin-VQUF3EEQ.svg);-webkit-mask-image:url(/build/_assets/Linkedin-VQUF3EEQ.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span></span></a><a target="_blank" rel="noreferrer" aria-label="Twitter" href="https://twitter.com/InformationWeek"><span class="SocialShare-IconWrapper SocialShare-IconWrapper_variant_layout"><span data-component="icon" data-name="Twitter" class="SocialShare-Icon SocialShare-Icon_variant_layout SocialShare-Icon_type_twitter" style="mask-image:url(/build/_assets/Twitter-WD5AOEQ7.svg);-webkit-mask-image:url(/build/_assets/Twitter-WD5AOEQ7.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span></span></a><a target="_blank" rel="noreferrer" aria-label="Facebook" href="https://www.facebook.com/informationweek"><span class="SocialShare-IconWrapper SocialShare-IconWrapper_variant_layout"><span data-component="icon" data-name="Facebook" class="SocialShare-Icon SocialShare-Icon_variant_layout SocialShare-Icon_type_facebook" style="mask-image:url(/build/_assets/Facebook-CJB5G2HY.svg);-webkit-mask-image:url(/build/_assets/Facebook-CJB5G2HY.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span></span></a><a target="_blank" rel="noreferrer" aria-label="GoogleNews" href="https://news.google.com/publications/CAAqBwgKMOfGrQsw9NHFAw"><span class="SocialShare-IconWrapper SocialShare-IconWrapper_variant_layout"><span data-component="icon" data-name="GoogleNews" class="SocialShare-Icon SocialShare-Icon_variant_layout SocialShare-Icon_type_googleNews" style="mask-image:url(/build/_assets/GoogleNews-6O72APW7.svg);-webkit-mask-image:url(/build/_assets/GoogleNews-6O72APW7.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span></span></a><a target="_blank" rel="noreferrer" aria-label="RSS" href="https://informationweek.com/rss.xml"><span class="SocialShare-IconWrapper SocialShare-IconWrapper_variant_layout"><span data-component="icon" data-name="RSS" class="SocialShare-Icon SocialShare-Icon_variant_layout SocialShare-Icon_type_rss" style="mask-image:url(/build/_assets/RSS-3XFHIVCK.svg);-webkit-mask-image:url(/build/_assets/RSS-3XFHIVCK.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span></span></a></div></div><div class="CopyrightsSection"><div class="CopyrightsSection-Background"></div><div data-testid="copyrights" class="CopyrightsSection-Wrapper"><a data-testid="businessUnit" class="CopyrightsSection-BusinessLink" target="_blank" href="https://www.informatech.com"><img title="Informa Tech" data-component="image" class="CopyrightsSection-BusinessImage" data-src="https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/bltb60310a8e8e4737f/643d330afd160d1fb09a967a/InformaTechBTYB_240x60.webp?width=700&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/bltb60310a8e8e4737f/643d330afd160d1fb09a967a/InformaTechBTYB_240x60.webp?width=700&auto=webp&quality=80&disable=upscale" loading="lazy" alt="Informa Tech"/></a><div class="CopyrightsSection-TextWrapper"><p data-testid="copyrightText" class="CopyrightsSection-Text"><span class="CopyrightsSection-TextBlock"></span>Copyright © 2024. All rights reserved. Informa Tech, a trading division of Informa PLC.</p><div data-testid="copyrightLinks" class="CopyrightsSection-LinksWrapper CopyrightsSection-LinksWrapper_hasLinks"><a class="CopyrightsSection-Link" target="_blank" href="https://www.informatech.com/">Home<span class="CopyrightsSection-LinkSeparator">|</span></a><a class="CopyrightsSection-Link" rel="noreferrer" target="_blank" href="https://www.informationweek.com/cookie-policy">Cookie Policy<span class="CopyrightsSection-LinkSeparator">|</span></a><a class="CopyrightsSection-Link" rel="noreferrer" target="_blank" href="https://www.informa.com/privacy-policy/">Privacy<span class="CopyrightsSection-LinkSeparator">|</span></a><a class="CopyrightsSection-Link" rel="noreferrer" target="_blank" href="https://www.informatech.com/terms-and-conditions/">Terms of Use</a></div></div></div></div></footer></div></div></main><script>((STORAGE_KEY, restoreKey) => { if (!window.history.state || !window.history.state.key) { let key = Math.random().toString(32).slice(2); window.history.replaceState({ key }, ""); } try { let positions = JSON.parse(sessionStorage.getItem(STORAGE_KEY) || "{}"); let storedY = positions[restoreKey || window.history.state.key]; if (typeof storedY === "number") { window.scrollTo(0, storedY); } } catch (error) { console.error(error); sessionStorage.removeItem(STORAGE_KEY); } })("positions", null)</script><link rel="modulepreload" href="/build/manifest-A2F38A42.js"/><link rel="modulepreload" href="/build/entry.client-SFHSSSEN.js"/><link rel="modulepreload" href="/build/_shared/chunk-RVHE4U6B.js"/><link rel="modulepreload" href="/build/_shared/chunk-SJXV5VAW.js"/><link rel="modulepreload" href="/build/_shared/chunk-63EVRDSK.js"/><link rel="modulepreload" href="/build/_shared/chunk-ADMCF34Z.js"/><link rel="modulepreload" href="/build/_shared/chunk-QLNIWV7P.js"/><link rel="modulepreload" href="/build/_shared/chunk-VAILQJN5.js"/><link rel="modulepreload" href="/build/_shared/chunk-RZRUW7QG.js"/><link rel="modulepreload" href="/build/_shared/chunk-3MIG7PUI.js"/><link rel="modulepreload" href="/build/_shared/chunk-B7M2L5OV.js"/><link rel="modulepreload" href="/build/_shared/chunk-JWYSME77.js"/><link rel="modulepreload" href="/build/_shared/chunk-JRHR4PP4.js"/><link rel="modulepreload" href="/build/_shared/chunk-WTDTITBY.js"/><link rel="modulepreload" href="/build/_shared/chunk-VZQVWFLO.js"/><link rel="modulepreload" href="/build/_shared/chunk-4PCUPHYO.js"/><link rel="modulepreload" href="/build/_shared/chunk-JERMOH2I.js"/><link rel="modulepreload" href="/build/_shared/chunk-265XATAY.js"/><link rel="modulepreload" href="/build/_shared/chunk-5JUJG2OP.js"/><link rel="modulepreload" href="/build/_shared/chunk-BC6KZFPP.js"/><link rel="modulepreload" href="/build/_shared/chunk-QVUW3IXO.js"/><link rel="modulepreload" href="/build/_shared/chunk-ALTNKHHR.js"/><link rel="modulepreload" href="/build/_shared/chunk-HMGGHMSJ.js"/><link rel="modulepreload" href="/build/_shared/chunk-IW54JVOH.js"/><link rel="modulepreload" href="/build/root-TPDAOOC5.js"/><link rel="modulepreload" href="/build/_shared/chunk-BEXYKDRS.js"/><link rel="modulepreload" href="/build/_shared/chunk-ED7QE4BI.js"/><link rel="modulepreload" href="/build/_shared/chunk-JSR73AOE.js"/><link rel="modulepreload" href="/build/_shared/chunk-2GCGBGJC.js"/><link rel="modulepreload" href="/build/_shared/chunk-V2OXSPCY.js"/><link rel="modulepreload" href="/build/_shared/chunk-TMZP7SNL.js"/><link rel="modulepreload" href="/build/_shared/chunk-67BSXSX4.js"/><link rel="modulepreload" href="/build/_shared/chunk-AZ4H7HW6.js"/><link rel="modulepreload" href="/build/_shared/chunk-WJRCTNP6.js"/><link rel="modulepreload" href="/build/_shared/chunk-RF3GAYWA.js"/><link rel="modulepreload" href="/build/_shared/chunk-7IHSV4VV.js"/><link rel="modulepreload" href="/build/_shared/chunk-PLHCH5TH.js"/><link rel="modulepreload" href="/build/_shared/chunk-6GCYGCGB.js"/><link rel="modulepreload" href="/build/_shared/chunk-WGLVXOTX.js"/><link rel="modulepreload" href="/build/_shared/chunk-WXVEBWE3.js"/><link rel="modulepreload" href="/build/_shared/chunk-7WX3BG7O.js"/><link rel="modulepreload" href="/build/_shared/chunk-S6Q7UVRU.js"/><link rel="modulepreload" href="/build/_shared/chunk-2Q3IQPTU.js"/><link rel="modulepreload" href="/build/_shared/chunk-B765HE7O.js"/><link rel="modulepreload" href="/build/_shared/chunk-4DPVJM62.js"/><link rel="modulepreload" href="/build/_shared/chunk-PHSYQFSR.js"/><link rel="modulepreload" href="/build/_shared/chunk-GGO4FWBQ.js"/><link rel="modulepreload" href="/build/_shared/chunk-N3DN6AS5.js"/><link rel="modulepreload" href="/build/_shared/chunk-IJ353W5V.js"/><link rel="modulepreload" href="/build/_shared/chunk-C5UGRRW5.js"/><link rel="modulepreload" href="/build/_shared/chunk-KNORYGJC.js"/><link rel="modulepreload" href="/build/_shared/chunk-TDM4RAGW.js"/><link rel="modulepreload" href="/build/routes/$topic.$slug._index-J4IJ2FVO.js"/><script>window.__remixContext = {"future":{"v3_fetcherPersist":false,"v3_relativeSplatPath":false,"v3_throwAbortReason":false},"state":{"loaderData":{"root":{"brand":"informationweek","authenticationStatus":"anonymous","siteName":"InformationWeek","ads":{"networkId":3834,"parentAdUnit":"informationweek.home","enabledAds":"all","checkClientIP":false,"disableSponsorBar":true},"authConfig":{"enabled":false,"disableCaptcha":false},"vwo":{"enabled":true,"accountId":"775579"},"isDctsTurnOn":false,"oneTrust":{"siteId":"db797727-a266-409f-983d-f30f1926b3fb"},"gtmIds":{"primary":"GTM-5523ZCM","secondary":"GTM-MTN2X7K"},"ui":{"brand":"informationweek","theme":"theme1","font":{"primary":{"name":"Montserrat","url":"https://fonts.googleapis.com/css2?family=Montserrat:ital,wght@0,400;0,500;0,600;0,700;1,400;1,500;1,600;1,700\u0026display=swap"},"secondary":{"name":"Montserrat","url":"https://fonts.googleapis.com/css2?family=Montserrat:ital,wght@0,400;0,500;0,600;0,700;1,400;1,500;1,600;1,700\u0026display=swap"}}},"environment":"prod","featureToggles":{"elnNewsletter":false,"elnWithoutNewsletter":false,"iirisAuthentication":true,"subBrand":false,"useSettingsRedirectAPIVersion1":true,"gatingEnabled":false,"iirisRecommendationDisabled":false,"iasPetEnabled":true,"bridgedMediaEnabled":true,"ecommerceEnabled":false,"iirisRecommendationVer":"version4","weather3MonthForecastEnabled":false},"layout":{"socialLinks":[{"type":"Linkedin","url":"https://www.linkedin.com/company/informationweek/"},{"type":"Twitter","url":"https://twitter.com/InformationWeek"},{"type":"Facebook","url":"https://www.facebook.com/informationweek"},{"type":"GoogleNews","url":"https://news.google.com/publications/CAAqBwgKMOfGrQsw9NHFAw"},{"type":"RSS","url":"https://informationweek.com/rss.xml"}],"informaBar":{"enabled":true,"leftSection":{"description":"InformationWeek is part of the Informa Tech Division of Informa PLC","subMenu":[{"title":"Informa PLC","url":"https://www.informa.com/"},{"title":"ABOUT US","url":"https://www.informa.com/about-us/"},{"title":"INVESTOR RELATIONS","url":"https://www.informa.com/investors/"},{"title":"TALENT","url":"https://www.informa.com/talent/"}]},"rightSection":{"description":"This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726."}},"nav":{"mainMenuItems":[{"title":"Leadership","url":"/it-leadership","seeAllLink":"See All Leadership","seeAllLinkUrl":"/it-leadership","hasSubMenu":true,"subMenu":[{"title":"Digital Transformation","url":"/it-leadership/digital-transformation"},{"title":"IT Staffing \u0026 Careers","url":"/it-leadership/it-staffing-careers"},{"title":"IT Management","url":"/it-leadership/it-management"},{"title":"IT Strategy","url":"/it-leadership/it-strategy"}],"recentContents":[{"thumbnail":{"src":"https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt8b52468b0c8f906b/6745d77ff7643ded0dda2f1c/Sudhakar_RamakrishnaNew.jpg","alt":""},"articleName":"SolarWinds CEO on Building Trust After Breach, Unifying IT and C-Suite, and GenAI Future","mobileHeadline":"SolarWinds CEO on Building Trust After Breach, Unifying IT and C-Suite, and GenAI Future","articleSummary":"The company stands on solid financial ground even after a massive breach four years ago shook the tech community. SolarWinds CEO Sudhakar Ramakrishna tells InformationWeek that his “against the grain” approach helped rebuild trust.","articleUrl":"/it-leadership/solarwinds-ceo-on-building-trust-after-breach-unifying-it-and-c-suite-and-genai-future","listPageUrl":"","date":"Nov 26, 2024","webinarStartTime":"","categoryName":"IT Leadership","categoryUrl":"/it-leadership","contentType":"Article","contributors":[{"name":"Shane Snider","link":"/author/shane-snider","avatar":"https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/bltf4de7e5784b276a0/650d8d5ffac8e1d4a1f21f76/Shane_Snider_Profile.jpg"}],"timeRead":7,"variant":"card-vertical","layoutVariant":"vertical"},{"thumbnail":{"src":"https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/bltbf06263940b69a5e/668da1beeb4ff69673df3f17/BubbleBurst-Brian_Jackson-CFMK07-CP.jpg","alt":"Green Balloon about to be burst by a needle held by a businessman's hand in a pinstripe sleeve."},"articleName":"Tech Company Layoffs: The COVID Tech Bubble Bursts","mobileHeadline":"Tech Company Layoffs: The COVID Tech Bubble Bursts","articleSummary":"UPDATED 11/26/2024 -- As COVID drove everyone online, tech companies hired like crazy. Now we are hitting the COVID tech bust as tech giants shed jobs by the thousands. Check back regularly for updates to our tech layoffs tracker.","articleUrl":"/it-leadership/tech-company-layoffs-the-covid-tech-bubble-bursts-sep-14","listPageUrl":"","date":"Nov 26, 2024","webinarStartTime":"","categoryName":"IT Leadership","categoryUrl":"/it-leadership","contentType":"Article","contributors":[{"name":"Brandon Taylor","link":"/author/brandon-taylor","avatar":"https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt15232db5d2321c39/64bf5c007b352808e9c5a64e/BrandonTaylorHeadshot1.jpg"},{"name":"Jessica Davis","link":"/author/jessica-davis","avatar":"https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blte17e46d01a58d768/64bf65b2e7200e514c22fb6c/JessicaDavisHeadshot012020croppedsquare.jpg"}],"timeRead":274,"variant":"card-vertical","layoutVariant":"vertical"}]},{"title":"Resilience","url":"/cyber-resilience","seeAllLink":"See All Resilience","seeAllLinkUrl":"/cyber-resilience","hasSubMenu":true,"subMenu":[{"title":"Cybersecurity","url":"/cyber-resilience/cybersecurity"},{"title":"Risk Management","url":"/cyber-resilience/risk-management"},{"title":"Incident Response","url":"/cyber-resilience/incident-response"}],"recentContents":[{"thumbnail":{"src":"https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt63431016eb292e37/673caa6d012f52541bdcfd36/cybersecurity-SergeyNivens-adobe-new.jpg","alt":"digital abstract with security locks and words like danger"},"articleName":"Meeting AI Regulations: A Guide for Security Leaders","mobileHeadline":"Meeting AI Regulations: A Guide for Security Leaders","articleSummary":"With AI adoption surging, security leaders tackle growing data risks and regulations. CISOs must focus on data management, align with standards, and build security culture. ","articleUrl":"/cyber-resilience/meeting-ai-regulations-a-guide-for-security-leaders","listPageUrl":"","date":"Nov 26, 2024","webinarStartTime":"","categoryName":"Cyber Resilience","categoryUrl":"/cyber-resilience","contentType":"Article","contributors":[{"name":"Dana Simberkoff","link":"/author/dana-simberkoff","avatar":"https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt0221aa47da904b75/673ca7e4905e34f081972fe1/Dana_Simberkoff_Headshot.png"}],"timeRead":4,"variant":"card-vertical","layoutVariant":"vertical"},{"thumbnail":{"src":"https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/bltd4562d02cb55817f/673e10dc006ff59e6ee82a21/cybersecurityteam_YuriArcurs-AlamyStockPhoto.jpg","alt":"Cybersecurity team with 3d software design for computer."},"articleName":"What Does Enterprise-Wide Cybersecurity Culture Look Like?","mobileHeadline":"What Does Enterprise-Wide Cybersecurity Culture Look Like?","articleSummary":"Effective cybersecurity doesn’t live within a single team. It is woven throughout the entirety of an enterprise’s culture.","articleUrl":"/cyber-resilience/what-does-enterprise-wide-cybersecurity-culture-look-like-","listPageUrl":"","date":"Nov 25, 2024","webinarStartTime":"","categoryName":"Cyber Resilience","categoryUrl":"/cyber-resilience","contentType":"Article","contributors":[{"name":"Carrie Pallardy","link":"/author/carrie-pallardy","avatar":"https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blta2ac0cf507deba77/64bf49006c654daed172bbba/CarriePallardy_Head_Shot.gif"}],"timeRead":7,"variant":"card-vertical","layoutVariant":"vertical"}]},{"title":"ML \u0026 AI","url":"/machine-learning-ai","seeAllLink":"See All ML \u0026 AI","seeAllLinkUrl":"/machine-learning-ai","hasSubMenu":true,"subMenu":[{"title":"Responsible AI","url":"/machine-learning-ai/responsible-ai"},{"title":"IT Automation","url":"/machine-learning-ai/it-automation"},{"title":"AI Innovations","url":"/machine-learning-ai/ai-innovations"}],"recentContents":[{"thumbnail":{"src":"https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/bltb938eb74765d22cf/66ccbaafd957e64e748e02bf/AI-Mopic-AdobeStocknew.jpg","alt":"AI face embedded in a digital background"},"articleName":"How Can Decision Makers Trust Hallucinating AI?","mobileHeadline":"How Can Decision Makers Trust Hallucinating AI?","articleSummary":"AI is a powerful tool, but it is prone to hallucinations. Organizations should use effective methods to rely on AI in the decision-making process. ","articleUrl":"/machine-learning-ai/how-can-decision-makers-trust-hallucinating-ai-","listPageUrl":"","date":"Nov 25, 2024","webinarStartTime":"","categoryName":"Machine Learning \u0026 AI","categoryUrl":"/machine-learning-ai","contentType":"Article","contributors":[{"name":"Max Belov","link":"/author/max-belov","avatar":"https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt574748b6e6346cc7/673b9db9a1f586b0d4fc1bec/Max_Belov_(002).jpg"}],"timeRead":4,"variant":"card-vertical","layoutVariant":"vertical"},{"thumbnail":{"src":"https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/bltab1151e20d635167/673cd9cbad0eb7294a334a25/HP_InfoWeek2_Hero.jpg","alt":""},"articleName":"All In On AI: 3 Ways to Win With an AI-Supported Team","mobileHeadline":"All In On AI: 3 Ways to Win With an AI-Supported Team","articleSummary":"Here are three top takeaways for leaders to future-proof their sales operations with AI. ","articleUrl":"/machine-learning-ai/all-in-on-ai-3-ways-to-win-with-an-ai-supported-team","listPageUrl":"","date":"Nov 25, 2024","webinarStartTime":"","categoryName":"Sponsored Content","categoryUrl":"/machine-learning-ai","contentType":"Article","contributors":[{"name":"Kobi Elbaz","link":"/author/kobi-elbaz","avatar":"https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt0956cac04887ce80/66e4aaae8c0058bca7b4b12e/Kobi_Elbaz_HP_High_Res_Headshot.jpg"}],"timeRead":3,"variant":"card-vertical","layoutVariant":"vertical"}]},{"title":"Data","url":"/data-management","seeAllLink":"See All Data Mgmt","seeAllLinkUrl":"/data-management","hasSubMenu":true,"subMenu":[{"title":"Data Privacy","url":"/data-management/data-privacy"},{"title":"Data Governance","url":"/data-management/data-governance"}],"recentContents":[{"thumbnail":{"src":"https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt0401b4355d039e7c/6740cf2a9d8a1d9c97068372/dataprotectionlaw_designer491-AlamyStockPhoto.jpg","alt":"Lawyer holding Data Protection Act book."},"articleName":"Beyond Washington, DC: The State of State-Based Data Privacy Laws","mobileHeadline":"Beyond Washington, DC: The State of State-Based Data Privacy Laws","articleSummary":"In the absence of federal law, how will state-based data privacy laws due to take effect in 2025 and beyond affect business operations?","articleUrl":"/data-management/beyond-washington-dc-the-state-of-state-based-data-privacy-laws","listPageUrl":"/podcasts","date":"Nov 25, 2024","webinarStartTime":"","categoryName":"Data Management","categoryUrl":"/data-management","contentType":"Podcast","contributors":[{"name":"Joao-Pierre S. Ruth","link":"/author/joao-pierre-s-ruth","avatar":"https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt7f004b6f174043df/67460618a8aa13b634af5c6c/Headshot2024-edited.jpg"}],"timeRead":0,"variant":"card-vertical","layoutVariant":"vertical"},{"thumbnail":{"src":"https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/bltd172a680ebd0d4fb/6740a006f8c46b80832fbfdd/AI_Hacker_Ievgen_Chepil_via_Alamy_Stock.jpg","alt":"Robot Hacker On Blue Background Concept Modern Artificial Intelligence Technology"},"articleName":"Innovation Relies on Safeguarding AI Technology to Mitigate its Risks","mobileHeadline":"Innovation Relies on Safeguarding AI Technology to Mitigate its Risks","articleSummary":"This session explains how to get the best of generative AI in your organization by securing your AI systems to avoid security pitfalls and mitigate risks. ","articleUrl":"/responsible-ai/innovation-relies-on-safeguarding-ai-technology-to-mitigate-its-risks","listPageUrl":"/videos","date":"Nov 22, 2024","webinarStartTime":"","categoryName":"Responsible AI","categoryUrl":"/machine-learning-ai/responsible-ai","contentType":"Video","contributors":[{"name":"Brandon Taylor","link":"/author/brandon-taylor","avatar":"https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt15232db5d2321c39/64bf5c007b352808e9c5a64e/BrandonTaylorHeadshot1.jpg"}],"timeRead":5,"variant":"card-vertical","layoutVariant":"vertical"}]},{"title":"Sustainability","url":"/sustainability","seeAllLink":"See All Sustainability","seeAllLinkUrl":"/sustainability","hasSubMenu":true,"subMenu":[{"title":"Green IT","url":"/sustainability/green-it"},{"title":"ESG","url":"/sustainability/esg"}],"recentContents":[{"thumbnail":{"src":"https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt8d72c07646ca59f0/673615d16eeb84936fd89a51/pollutedriver_paulkennedy-AlamyStockPhoto.jpg","alt":"Pollution floating in river, Mumbai, India"},"articleName":"AI and the War Against Plastic Waste","mobileHeadline":"AI and the War Against Plastic Waste","articleSummary":"Plastic waste is one of today’s most complex environmental challenges, and people are putting AI to work to understand it and solve it.","articleUrl":"/machine-learning-ai/ai-and-the-war-against-plastic-waste","listPageUrl":"","date":"Nov 19, 2024","webinarStartTime":"","categoryName":"Machine Learning \u0026 AI","categoryUrl":"/machine-learning-ai","contentType":"Article","contributors":[{"name":"Carrie Pallardy","link":"/author/carrie-pallardy","avatar":"https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blta2ac0cf507deba77/64bf49006c654daed172bbba/CarriePallardy_Head_Shot.gif"}],"timeRead":10,"variant":"card-vertical","layoutVariant":"vertical"},{"thumbnail":{"src":"https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt214d1816c7d0f46c/671fa236a93995afbd90faff/KanawatTH-green-energy-security-shutterstock.jpg","alt":"green world digital"},"articleName":"Why CIOs Must Lead the Charge on Sustainable Technology","mobileHeadline":"Why CIOs Must Lead the Charge on Sustainable Technology","articleSummary":"CIOs face mounting pressure to deliver sustainable IT solutions while maintaining competitiveness. Learn actionable strategies to transform environmental challenges into business advantages. ","articleUrl":"/sustainability/why-cios-must-lead-the-charge-on-sustainable-technology","listPageUrl":"","date":"Nov 13, 2024","webinarStartTime":"","categoryName":"Sustainability","categoryUrl":"/sustainability","contentType":"Article","contributors":[{"name":"Hiren Hasmukh","link":"/author/hiren-hasmukh","avatar":"https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt5af869efbaef1ad5/672e24385bd1c22efd43f5b4/Hiren_Hasmukh.png"}],"timeRead":4,"variant":"card-vertical","layoutVariant":"vertical"}]},{"title":"Infrastructure","url":"/it-infrastructure","seeAllLink":"See All Infrastructure","seeAllLinkUrl":"/it-infrastructure","hasSubMenu":true,"subMenu":[{"title":"Data Centers","url":"/it-infrastructure/data-centers"},{"title":"Cloud Computing","url":"/it-infrastructure/cloud-computing"}],"recentContents":[{"thumbnail":{"src":"https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt8b52468b0c8f906b/6745d77ff7643ded0dda2f1c/Sudhakar_RamakrishnaNew.jpg","alt":""},"articleName":"SolarWinds CEO on Building Trust After Breach, Unifying IT and C-Suite, and GenAI Future","mobileHeadline":"SolarWinds CEO on Building Trust After Breach, Unifying IT and C-Suite, and GenAI Future","articleSummary":"The company stands on solid financial ground even after a massive breach four years ago shook the tech community. SolarWinds CEO Sudhakar Ramakrishna tells InformationWeek that his “against the grain” approach helped rebuild trust.","articleUrl":"/it-leadership/solarwinds-ceo-on-building-trust-after-breach-unifying-it-and-c-suite-and-genai-future","listPageUrl":"","date":"Nov 26, 2024","webinarStartTime":"","categoryName":"IT Leadership","categoryUrl":"/it-leadership","contentType":"Article","contributors":[{"name":"Shane Snider","link":"/author/shane-snider","avatar":"https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/bltf4de7e5784b276a0/650d8d5ffac8e1d4a1f21f76/Shane_Snider_Profile.jpg"}],"timeRead":7,"variant":"card-vertical","layoutVariant":"vertical"},{"thumbnail":{"src":"https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt3b1e254416796507/673b682fe86a8c1ecc89b925/AI_cloud-PeachayaTanomsup-AlamyStockPhoto.jpg","alt":"Ai Robot hand pointing Cloud computing technology internet storage network."},"articleName":"How Will AI Shape the Future of Cloud and Vice Versa?","mobileHeadline":"How Will AI Shape the Future of Cloud and Vice Versa?","articleSummary":"What role does AI have in the current state of cloud? What types of cloud systems and resources stand to benefit from, or need to adapt to, AI?","articleUrl":"/machine-learning-ai/how-will-ai-shape-the-future-of-cloud-and-vice-versa-","listPageUrl":"/podcasts","date":"Nov 19, 2024","webinarStartTime":"","categoryName":"Machine Learning \u0026 AI","categoryUrl":"/machine-learning-ai","contentType":"Podcast","contributors":[{"name":"Joao-Pierre S. Ruth","link":"/author/joao-pierre-s-ruth","avatar":"https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt7f004b6f174043df/67460618a8aa13b634af5c6c/Headshot2024-edited.jpg"}],"timeRead":0,"variant":"card-vertical","layoutVariant":"vertical"}]},{"title":"Software","url":"/software-services","seeAllLink":"See All Software","seeAllLinkUrl":"/software-services","hasSubMenu":true,"subMenu":[{"title":"DevOps","url":"/software-services/devops"},{"title":"Software Platforms","url":"/software-services/software-platforms"},{"title":"Operating Systems","url":"/software-services/operating-systems"}],"recentContents":[{"thumbnail":{"src":"https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt491b97d9db8b5ef6/6744b9b0fbdcfdb173ec309b/self_help_portal-Bonaventura-alamy.jpg","alt":"help desk concept cubes "},"articleName":"Develop an Effective Strategy for User Self-Help Portals","mobileHeadline":"Develop an Effective Strategy for User Self-Help Portals","articleSummary":"Too often, user self-help portals fall short in companies, but they don’t have to. By formalizing a strategy for building and maintaining self-help systems, IT and user departments can optimize self-help. ","articleUrl":"/software-services/develop-an-effective-strategy-for-user-self-help-portals","listPageUrl":"","date":"Nov 26, 2024","webinarStartTime":"","categoryName":"Software \u0026 Services","categoryUrl":"/software-services","contentType":"Article","contributors":[{"name":"Mary E. Shacklett","link":"/author/mary-e-shacklett","avatar":"https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/bltc7d4dbb527ae98d2/64bc07e7b2796e5edd361fed/Mary-Shacklett-125x125.gif"}],"timeRead":6,"variant":"card-vertical","layoutVariant":"vertical"},{"thumbnail":{"src":"https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt001013fc4cea5864/673f19f3ffb4172d04bc9a2d/2CDJ2XD.jpg","alt":"Google logo artistic concept"},"articleName":"DOJ Urges Google Breakup, Targets Chrome, Android and Data Sharing","mobileHeadline":"DOJ Urges Google Breakup, Targets Chrome, Android and Data Sharing","articleSummary":"In what could be the biggest antitrust action since the 1980s telecom breakup, a judge will decide on Google’s future as the most dominant search player in the world.","articleUrl":"/data-management/doj-urges-google-breakup-targets-chrome-android-and-data-sharing","listPageUrl":"","date":"Nov 21, 2024","webinarStartTime":"","categoryName":"Data Management","categoryUrl":"/data-management","contentType":"Article","contributors":[{"name":"Shane Snider","link":"/author/shane-snider","avatar":"https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/bltf4de7e5784b276a0/650d8d5ffac8e1d4a1f21f76/Shane_Snider_Profile.jpg"}],"timeRead":3,"variant":"card-vertical","layoutVariant":"vertical"}]},{"title":"More","url":"/resources","seeAllLink":"InformationWeek Resource Library","seeAllLinkUrl":"/resources","hasSubMenu":true,"subMenu":[{"title":"Newsletters","url":"https://iw-resources.informationweek.com/free/w_ingg126/prgm.cgi?a=1"},{"title":"Reports/Research","url":"/resources?page=1\u0026types=Research+Report"},{"title":"Online Events","url":"/resources?page=1\u0026types=Virtual+Event\u0026types=Webinar"},{"title":"Live Events","url":"/events"},{"title":"Podcasts","url":"/podcasts"},{"title":"White Papers","url":"/resources?page=1\u0026types=White+Paper"},{"title":"Advertise With Us","url":"/advertise"},{"title":"About Us","url":"/about-us"},{"title":"IT Sectors","url":"/it-sectors"}],"recentContents":[]}],"secondaryMenu":[{"title":"Reports","url":"/resources?page=1\u0026types=Research+Report"},{"title":"Online Events","url":"/resources?page=1\u0026types=Virtual+Event\u0026types=Webinar"},{"title":"Advertise","url":"/advertise"},{"title":"About","url":"/about-us"}]},"megaMenu":{"largeMenu":[{"title":"Leadership","url":"/it-leadership","subMenu":[{"title":"Digital Transformation","url":"/it-leadership/digital-transformation"},{"title":"IT Staffing \u0026 Careers","url":"/it-leadership/it-staffing-careers"},{"title":"IT Management","url":"/it-leadership/it-management"},{"title":"IT Strategy","url":"/it-leadership/it-strategy"}],"seeAllLink":"See All Leadership","seeAllLinkUrl":"/it-leadership"},{"title":"Resilience","url":"/cyber-resilience","subMenu":[{"title":"Cybersecurity","url":"/cyber-resilience/cybersecurity"},{"title":"Risk Management","url":"/cyber-resilience/risk-management"},{"title":"Incident Response","url":"/cyber-resilience/incident-response"}],"seeAllLink":"See All Resilience","seeAllLinkUrl":"/cyber-resilience"},{"title":"ML \u0026 AI","url":"/machine-learning-ai","subMenu":[{"title":"Responsible AI","url":"/machine-learning-ai/responsible-ai"},{"title":"IT Automation","url":"/machine-learning-ai/it-automation"},{"title":"AI Innovations","url":"/machine-learning-ai/ai-innovations"}],"seeAllLink":"See All ML \u0026 AI","seeAllLinkUrl":"/machine-learning-ai"},{"title":"Data","url":"/data-management","subMenu":[{"title":"Data Privacy","url":"/data-management/data-privacy"},{"title":"Data Governance","url":"/data-management/data-governance"}],"seeAllLink":"See All Data Mgmt","seeAllLinkUrl":"/data-management"},{"title":"Sustainability","url":"/sustainability","subMenu":[{"title":"Green IT","url":"/sustainability/green-it"},{"title":"ESG","url":"/sustainability/esg"}],"seeAllLink":"See All Sustainability","seeAllLinkUrl":"/sustainability"},{"title":"Infrastructure","url":"/it-infrastructure","subMenu":[{"title":"Data Centers","url":"/it-infrastructure/data-centers"},{"title":"Cloud Computing","url":"/it-infrastructure/cloud-computing"}],"seeAllLink":"See All Infrastructure","seeAllLinkUrl":"/it-infrastructure"},{"title":"Software","url":"/software-services","subMenu":[{"title":"DevOps","url":"/software-services/devops"},{"title":"Software Platforms","url":"/software-services/software-platforms"},{"title":"Operating Systems","url":"/software-services/operating-systems"}],"seeAllLink":"See All Software","seeAllLinkUrl":"/software-services"},{"title":"More","url":"/resources","subMenu":[{"title":"Newsletters","url":"https://iw-resources.informationweek.com/free/w_ingg126/prgm.cgi?a=1"},{"title":"Reports/Research","url":"/resources?page=1\u0026types=Research+Report"},{"title":"Online Events","url":"/resources?page=1\u0026types=Virtual+Event\u0026types=Webinar"},{"title":"Live Events","url":"/events"},{"title":"Podcasts","url":"/podcasts"},{"title":"White Papers","url":"/resources?page=1\u0026types=White+Paper"},{"title":"Advertise With Us","url":"/advertise"},{"title":"About Us","url":"/about-us"},{"title":"IT Sectors","url":"/it-sectors"}],"seeAllLink":"InformationWeek Resource Library","seeAllLinkUrl":"/resources"}],"smallMenu":[{"title":"Browse","url":"","subMenu":[{"title":"InformationWeek Resource Library","url":"/resources"},{"title":"Reports/Research","url":"/resources?page=1\u0026types=Research+Report"},{"title":"Online Events","url":"/resources?page=1\u0026types=Virtual+Event\u0026types=Webinar"},{"title":"White Papers","url":"/resources?page=1\u0026types=White+Paper"},{"title":"Podcasts","url":"/podcasts"},{"title":"Upcoming Events","url":"/events"}]},{"title":"Advertise","url":"","subMenu":[{"title":"Explore Marketing Solutions","url":"/advertise"}]},{"title":"IT Sectors","url":"","subMenu":[{"title":"Agriculture","url":"/it-sectors/agriculture"},{"title":"Education","url":"/it-sectors/education"},{"title":"Energy","url":"/it-sectors/energy"},{"title":"Fintech","url":"/it-sectors/fintech"},{"title":"Government","url":"/it-sectors/government"},{"title":"Healthcare","url":"/it-sectors/healthcare"},{"title":"Manufacturing","url":"/it-sectors/manufacturing"},{"title":"Sports/Entertainment","url":"/it-sectors/sports-entertainment"}]}],"sideNavSections":[{"title":"Communicate","url":"","subMenu":[{"title":"About Us","url":"/about-us"},{"title":"Contact Us","url":"/contact-us"}],"seeAllLink":"","seeAllLinkUrl":""}]},"navBase":{"logo":{"url":"https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt610f1382a6ead9c3/64b854bd7f10ca354fa97a15/178206_IWK22_Logo_RGB.svg","altText":"InformationWeek"}},"footer":{"logo":{"url":"https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blte28ded54d12e0ac0/644913f2d2002548587a2a5e/InformationWeek-Logo.png","altText":"Information Week Logo"},"linkSections":[{"links":[{"image":{"altText":"","url":"https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt6ac71116800a46bf/64babac96bef06569b0668ee/OMDIA_LOGO_BLACK_2_with_extra_height.png"},"openInNewTab":true,"title":"Omdia","url":"https://omdia.tech.informa.com/"},{"image":{"altText":"Network Computing Logo","url":"https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt40fbedd2eb2df482/643d354fbf535e7c079bb364/Network_Computing_logo.png"},"openInNewTab":true,"title":"Network Computing","url":"https://www.networkcomputing.com/"},{"image":{"altText":"IT Pro Today Logo","url":"https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/bltf8425441a9bb7395/643d3589d465e31028d41abe/IT_Pro_Today_Logo.png"},"openInNewTab":true,"title":"ITPro Today","url":"https://www.itprotoday.com/"},{"image":{"altText":"Data Center Knowledge Logo","url":"https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt4b847636ba215910/643d35d937023c7ed8e9d6a6/Data_Center_Knowledge_Logo.png"},"openInNewTab":true,"title":"Data Center Knowledge","url":"https://www.datacenterknowledge.com/"},{"image":{"altText":"Data Center World Logo","url":"https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blte6d1f0c534c109a8/643d36703381c910e4384762/Data_Center_World_Logo.png"},"openInNewTab":true,"title":"Data Center World ","url":"https://datacenterworld.com/"}],"title":"Discover More","type":"1"},{"links":[{"image":{"altText":"InformationWeek Logo","url":"https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blte28ded54d12e0ac0/644913f2d2002548587a2a5e/InformationWeek-Logo.png"},"openInNewTab":true,"title":"About Us","url":"/about-us"},{"image":{"altText":"InformationWeek Logo","url":"https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blte28ded54d12e0ac0/644913f2d2002548587a2a5e/InformationWeek-Logo.png"},"openInNewTab":true,"title":"Reprints","url":"https://info.wrightsmedia.com/informa-licensing-reprints-request"},{"image":{"altText":"InformationWeek Logo","url":"https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blte28ded54d12e0ac0/644913f2d2002548587a2a5e/InformationWeek-Logo.png"},"openInNewTab":true,"title":"Advertise","url":"/advertise"},{"image":{"altText":"InformationWeek Logo","url":"https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blte28ded54d12e0ac0/644913f2d2002548587a2a5e/InformationWeek-Logo.png"},"openInNewTab":true,"title":"Contact Us","url":"/contact-us"}],"title":"Working With Us","type":"1"}],"brandLinks":[],"copyright":{"businessUnit":{"url":"https://www.informatech.com","name":"Informa Tech","logoUrl":"https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/bltb60310a8e8e4737f/643d330afd160d1fb09a967a/InformaTechBTYB_240x60.webp"},"links":[{"image":{"altText":"Home","url":"https://www.informatech.com/"},"openInNewTab":false,"title":"Home","url":"https://www.informatech.com/"},{"image":{"altText":"Cookie Policy","url":"https://www.informationweek.com/cookie-policy"},"openInNewTab":true,"title":"Cookie Policy","url":"https://www.informationweek.com/cookie-policy"},{"image":{"altText":"Privacy","url":"https://www.informa.com/privacy-policy/"},"openInNewTab":true,"title":"Privacy","url":"https://www.informa.com/privacy-policy/"},{"image":{"altText":"Terms of Use","url":"https://www.informatech.com/terms-and-conditions/"},"openInNewTab":true,"title":"Terms of Use","url":"https://www.informatech.com/terms-and-conditions/"}],"title":". All rights reserved. Informa Tech, a trading division of Informa PLC."}},"isSponsorBarEnabled":true,"isPaidContent":false},"newRelicJs":"window.NREUM||(NREUM={});NREUM.init={distributed_tracing:{enabled:true},privacy:{cookies_enabled:true},ajax:{deny_list:[\"bam.eu01.nr-data.net\"]}};\n\n;NREUM.loader_config={accountID:\"3936348\",trustKey:\"3288925\",agentID:\"538600207\",licenseKey:\"NRJS-26ae6a3b09493bbcc87\",applicationID:\"538600207\"};\n;NREUM.info={beacon:\"bam.eu01.nr-data.net\",errorBeacon:\"bam.eu01.nr-data.net\",licenseKey:\"NRJS-26ae6a3b09493bbcc87\",applicationID:\"538600207\",sa:1};\n;/*! For license information please see nr-loader-spa-1.274.0.min.js.LICENSE.txt */\n(()=\u003e{var e,t,r={8122:(e,t,r)=\u003e{\"use strict\";r.d(t,{a:()=\u003ei});var n=r(944);function i(e,t){try{if(!e||\"object\"!=typeof e)return(0,n.R)(3);if(!t||\"object\"!=typeof t)return(0,n.R)(4);const r=Object.create(Object.getPrototypeOf(t),Object.getOwnPropertyDescriptors(t)),o=0===Object.keys(r).length?e:r;for(let a in o)if(void 0!==e[a])try{if(null===e[a]){r[a]=null;continue}Array.isArray(e[a])\u0026\u0026Array.isArray(t[a])?r[a]=Array.from(new Set([...e[a],...t[a]])):\"object\"==typeof e[a]\u0026\u0026\"object\"==typeof t[a]?r[a]=i(e[a],t[a]):r[a]=e[a]}catch(e){(0,n.R)(1,e)}return r}catch(e){(0,n.R)(2,e)}}},2555:(e,t,r)=\u003e{\"use strict\";r.d(t,{Vp:()=\u003ec,fn:()=\u003es,x1:()=\u003eu});var n=r(384),i=r(8122);const o={beacon:n.NT.beacon,errorBeacon:n.NT.errorBeacon,licenseKey:void 0,applicationID:void 0,sa:void 0,queueTime:void 0,applicationTime:void 0,ttGuid:void 0,user:void 0,account:void 0,product:void 0,extra:void 0,jsAttributes:{},userAttributes:void 0,atts:void 0,transactionName:void 0,tNamePlain:void 0},a={};function s(e){try{const t=c(e);return!!t.licenseKey\u0026\u0026!!t.errorBeacon\u0026\u0026!!t.applicationID}catch(e){return!1}}function c(e){if(!e)throw new Error(\"All info objects require an agent identifier!\");if(!a[e])throw new Error(\"Info for \".concat(e,\" was never set\"));return a[e]}function u(e,t){if(!e)throw new Error(\"All info objects require an agent identifier!\");a[e]=(0,i.a)(t,o);const r=(0,n.nY)(e);r\u0026\u0026(r.info=a[e])}},9417:(e,t,r)=\u003e{\"use strict\";r.d(t,{D0:()=\u003eh,gD:()=\u003eg,xN:()=\u003ep});var n=r(993);const i=e=\u003e{if(!e||\"string\"!=typeof e)return!1;try{document.createDocumentFragment().querySelector(e)}catch{return!1}return!0};var o=r(2614),a=r(944),s=r(384),c=r(8122);const u=\"[data-nr-mask]\",d=()=\u003e{const e={mask_selector:\"*\",block_selector:\"[data-nr-block]\",mask_input_options:{color:!1,date:!1,\"datetime-local\":!1,email:!1,month:!1,number:!1,range:!1,search:!1,tel:!1,text:!1,time:!1,url:!1,week:!1,textarea:!1,select:!1,password:!0}};return{ajax:{deny_list:void 0,block_internal:!0,enabled:!0,harvestTimeSeconds:10,autoStart:!0},distributed_tracing:{enabled:void 0,exclude_newrelic_header:void 0,cors_use_newrelic_header:void 0,cors_use_tracecontext_headers:void 0,allowed_origins:void 0},feature_flags:[],generic_events:{enabled:!0,harvestTimeSeconds:30,autoStart:!0},harvest:{tooManyRequestsDelay:60},jserrors:{enabled:!0,harvestTimeSeconds:10,autoStart:!0},logging:{enabled:!0,harvestTimeSeconds:10,autoStart:!0,level:n.p_.INFO},metrics:{enabled:!0,autoStart:!0},obfuscate:void 0,page_action:{enabled:!0},page_view_event:{enabled:!0,autoStart:!0},page_view_timing:{enabled:!0,harvestTimeSeconds:30,autoStart:!0},performance:{capture_marks:!1,capture_measures:!1},privacy:{cookies_enabled:!0},proxy:{assets:void 0,beacon:void 0},session:{expiresMs:o.wk,inactiveMs:o.BB},session_replay:{autoStart:!0,enabled:!1,harvestTimeSeconds:60,preload:!1,sampling_rate:10,error_sampling_rate:100,collect_fonts:!1,inline_images:!1,fix_stylesheets:!0,mask_all_inputs:!0,get mask_text_selector(){return e.mask_selector},set mask_text_selector(t){i(t)?e.mask_selector=\"\".concat(t,\",\").concat(u):\"\"===t||null===t?e.mask_selector=u:(0,a.R)(5,t)},get block_class(){return\"nr-block\"},get ignore_class(){return\"nr-ignore\"},get mask_text_class(){return\"nr-mask\"},get block_selector(){return e.block_selector},set block_selector(t){i(t)?e.block_selector+=\",\".concat(t):\"\"!==t\u0026\u0026(0,a.R)(6,t)},get mask_input_options(){return e.mask_input_options},set mask_input_options(t){t\u0026\u0026\"object\"==typeof t?e.mask_input_options={...t,password:!0}:(0,a.R)(7,t)}},session_trace:{enabled:!0,harvestTimeSeconds:10,autoStart:!0},soft_navigations:{enabled:!0,harvestTimeSeconds:10,autoStart:!0},spa:{enabled:!0,harvestTimeSeconds:10,autoStart:!0},ssl:void 0,user_actions:{enabled:!0}}},l={},f=\"All configuration objects require an agent identifier!\";function h(e){if(!e)throw new Error(f);if(!l[e])throw new Error(\"Configuration for \".concat(e,\" was never set\"));return l[e]}function p(e,t){if(!e)throw new Error(f);l[e]=(0,c.a)(t,d());const r=(0,s.nY)(e);r\u0026\u0026(r.init=l[e])}function g(e,t){if(!e)throw new Error(f);var r=h(e);if(r){for(var n=t.split(\".\"),i=0;i\u003cn.length-1;i++)if(\"object\"!=typeof(r=r[n[i]]))return;r=r[n[n.length-1]]}return r}},5603:(e,t,r)=\u003e{\"use strict\";r.d(t,{a:()=\u003ec,o:()=\u003es});var n=r(384),i=r(8122);const o={accountID:void 0,trustKey:void 0,agentID:void 0,licenseKey:void 0,applicationID:void 0,xpid:void 0},a={};function s(e){if(!e)throw new Error(\"All loader-config objects require an agent identifier!\");if(!a[e])throw new Error(\"LoaderConfig for \".concat(e,\" was never set\"));return a[e]}function c(e,t){if(!e)throw new Error(\"All loader-config objects require an agent identifier!\");a[e]=(0,i.a)(t,o);const r=(0,n.nY)(e);r\u0026\u0026(r.loader_config=a[e])}},3371:(e,t,r)=\u003e{\"use strict\";r.d(t,{V:()=\u003ef,f:()=\u003el});var n=r(8122),i=r(384),o=r(6154),a=r(9324);let s=0;const c={buildEnv:a.F3,distMethod:a.Xs,version:a.xv,originTime:o.WN},u={customTransaction:void 0,disabled:!1,isolatedBacklog:!1,loaderType:void 0,maxBytes:3e4,onerror:void 0,ptid:void 0,releaseIds:{},appMetadata:{},session:void 0,denyList:void 0,timeKeeper:void 0,obfuscator:void 0},d={};function l(e){if(!e)throw new Error(\"All runtime objects require an agent identifier!\");if(!d[e])throw new Error(\"Runtime for \".concat(e,\" was never set\"));return d[e]}function f(e,t){if(!e)throw new Error(\"All runtime objects require an agent identifier!\");d[e]={...(0,n.a)(t,u),...c},Object.hasOwnProperty.call(d[e],\"harvestCount\")||Object.defineProperty(d[e],\"harvestCount\",{get:()=\u003e++s});const r=(0,i.nY)(e);r\u0026\u0026(r.runtime=d[e])}},9324:(e,t,r)=\u003e{\"use strict\";r.d(t,{F3:()=\u003ei,Xs:()=\u003eo,Yq:()=\u003ea,xv:()=\u003en});const n=\"1.274.0\",i=\"PROD\",o=\"CDN\",a=\"^2.0.0-alpha.17\"},6154:(e,t,r)=\u003e{\"use strict\";r.d(t,{A4:()=\u003es,OF:()=\u003ed,RI:()=\u003ei,WN:()=\u003eh,bv:()=\u003eo,gm:()=\u003ea,lR:()=\u003ef,m:()=\u003eu,mw:()=\u003ec,sb:()=\u003el});var n=r(1863);const i=\"undefined\"!=typeof window\u0026\u0026!!window.document,o=\"undefined\"!=typeof WorkerGlobalScope\u0026\u0026(\"undefined\"!=typeof self\u0026\u0026self instanceof WorkerGlobalScope\u0026\u0026self.navigator instanceof WorkerNavigator||\"undefined\"!=typeof globalThis\u0026\u0026globalThis instanceof WorkerGlobalScope\u0026\u0026globalThis.navigator instanceof WorkerNavigator),a=i?window:\"undefined\"!=typeof WorkerGlobalScope\u0026\u0026(\"undefined\"!=typeof self\u0026\u0026self instanceof WorkerGlobalScope\u0026\u0026self||\"undefined\"!=typeof globalThis\u0026\u0026globalThis instanceof WorkerGlobalScope\u0026\u0026globalThis),s=\"complete\"===a?.document?.readyState,c=Boolean(\"hidden\"===a?.document?.visibilityState),u=\"\"+a?.location,d=/iPad|iPhone|iPod/.test(a.navigator?.userAgent),l=d\u0026\u0026\"undefined\"==typeof SharedWorker,f=(()=\u003e{const e=a.navigator?.userAgent?.match(/Firefox[/\\s](\\d+\\.\\d+)/);return Array.isArray(e)\u0026\u0026e.length\u003e=2?+e[1]:0})(),h=Date.now()-(0,n.t)()},7295:(e,t,r)=\u003e{\"use strict\";r.d(t,{Xv:()=\u003ea,gX:()=\u003ei,iW:()=\u003eo});var n=[];function i(e){if(!e||o(e))return!1;if(0===n.length)return!0;for(var t=0;t\u003cn.length;t++){var r=n[t];if(\"*\"===r.hostname)return!1;if(s(r.hostname,e.hostname)\u0026\u0026c(r.pathname,e.pathname))return!1}return!0}function o(e){return void 0===e.hostname}function a(e){if(n=[],e\u0026\u0026e.length)for(var t=0;t\u003ce.length;t++){let r=e[t];if(!r)continue;0===r.indexOf(\"http://\")?r=r.substring(7):0===r.indexOf(\"https://\")\u0026\u0026(r=r.substring(8));const i=r.indexOf(\"/\");let o,a;i\u003e0?(o=r.substring(0,i),a=r.substring(i)):(o=r,a=\"\");let[s]=o.split(\":\");n.push({hostname:s,pathname:a})}}function s(e,t){return!(e.length\u003et.length)\u0026\u0026t.indexOf(e)===t.length-e.length}function c(e,t){return 0===e.indexOf(\"/\")\u0026\u0026(e=e.substring(1)),0===t.indexOf(\"/\")\u0026\u0026(t=t.substring(1)),\"\"===e||e===t}},1687:(e,t,r)=\u003e{\"use strict\";r.d(t,{Ak:()=\u003ec,Ze:()=\u003el,x3:()=\u003eu});var n=r(7836),i=r(3606),o=r(860),a=r(2646);const s={};function c(e,t){const r={staged:!1,priority:o.P3[t]||0};d(e),s[e].get(t)||s[e].set(t,r)}function u(e,t){e\u0026\u0026s[e]\u0026\u0026(s[e].get(t)\u0026\u0026s[e].delete(t),h(e,t,!1),s[e].size\u0026\u0026f(e))}function d(e){if(!e)throw new Error(\"agentIdentifier required\");s[e]||(s[e]=new Map)}function l(e=\"\",t=\"feature\",r=!1){if(d(e),!e||!s[e].get(t)||r)return h(e,t);s[e].get(t).staged=!0,f(e)}function f(e){const t=Array.from(s[e]);t.every((([e,t])=\u003et.staged))\u0026\u0026(t.sort(((e,t)=\u003ee[1].priority-t[1].priority)),t.forEach((([t])=\u003e{s[e].delete(t),h(e,t)})))}function h(e,t,r=!0){const o=e?n.ee.get(e):n.ee,s=i.i.handlers;if(!o.aborted\u0026\u0026o.backlog\u0026\u0026s){if(r){const e=o.backlog[t],r=s[t];if(r){for(let t=0;e\u0026\u0026t\u003ce.length;++t)p(e[t],r);Object.entries(r).forEach((([e,t])=\u003e{Object.values(t||{}).forEach((t=\u003e{t[0]?.on\u0026\u0026t[0]?.context()instanceof a.y\u0026\u0026t[0].on(e,t[1])}))}))}}o.isolatedBacklog||delete s[t],o.backlog[t]=null,o.emit(\"drain-\"+t,[])}}function p(e,t){var r=e[1];Object.values(t[r]||{}).forEach((t=\u003e{var r=e[0];if(t[0]===r){var n=t[1],i=e[3],o=e[2];n.apply(i,o)}}))}},7836:(e,t,r)=\u003e{\"use strict\";r.d(t,{P:()=\u003ec,ee:()=\u003eu});var n=r(384),i=r(8990),o=r(3371),a=r(2646),s=r(5607);const c=\"nr@context:\".concat(s.W),u=function e(t,r){var n={},s={},d={},l=!1;try{l=16===r.length\u0026\u0026(0,o.f)(r).isolatedBacklog}catch(e){}var f={on:p,addEventListener:p,removeEventListener:function(e,t){var r=n[e];if(!r)return;for(var i=0;i\u003cr.length;i++)r[i]===t\u0026\u0026r.splice(i,1)},emit:function(e,r,n,i,o){!1!==o\u0026\u0026(o=!0);if(u.aborted\u0026\u0026!i)return;t\u0026\u0026o\u0026\u0026t.emit(e,r,n);for(var a=h(n),c=g(e),d=c.length,l=0;l\u003cd;l++)c[l].apply(a,r);var p=v()[s[e]];p\u0026\u0026p.push([f,e,r,a]);return a},get:m,listeners:g,context:h,buffer:function(e,t){const r=v();if(t=t||\"feature\",f.aborted)return;Object.entries(e||{}).forEach((([e,n])=\u003e{s[n]=t,t in r||(r[t]=[])}))},abort:function(){f._aborted=!0,Object.keys(f.backlog).forEach((e=\u003e{delete f.backlog[e]}))},isBuffering:function(e){return!!v()[s[e]]},debugId:r,backlog:l?{}:t\u0026\u0026\"object\"==typeof t.backlog?t.backlog:{},isolatedBacklog:l};return Object.defineProperty(f,\"aborted\",{get:()=\u003e{let e=f._aborted||!1;return e||(t\u0026\u0026(e=t.aborted),e)}}),f;function h(e){return e\u0026\u0026e instanceof a.y?e:e?(0,i.I)(e,c,(()=\u003enew a.y(c))):new a.y(c)}function p(e,t){n[e]=g(e).concat(t)}function g(e){return n[e]||[]}function m(t){return d[t]=d[t]||e(f,t)}function v(){return f.backlog}}(void 0,\"globalEE\"),d=(0,n.Zm)();d.ee||(d.ee=u)},2646:(e,t,r)=\u003e{\"use strict\";r.d(t,{y:()=\u003en});class n{constructor(e){this.contextId=e}}},9908:(e,t,r)=\u003e{\"use strict\";r.d(t,{d:()=\u003en,p:()=\u003ei});var n=r(7836).ee.get(\"handle\");function i(e,t,r,i,o){o?(o.buffer([e],i),o.emit(e,t,r)):(n.buffer([e],i),n.emit(e,t,r))}},3606:(e,t,r)=\u003e{\"use strict\";r.d(t,{i:()=\u003eo});var n=r(9908);o.on=a;var i=o.handlers={};function o(e,t,r,o){a(o||n.d,i,e,t,r)}function a(e,t,r,i,o){o||(o=\"feature\"),e||(e=n.d);var a=t[o]=t[o]||{};(a[r]=a[r]||[]).push([e,i])}},3878:(e,t,r)=\u003e{\"use strict\";function n(e,t){return{capture:e,passive:!1,signal:t}}function i(e,t,r=!1,i){window.addEventListener(e,t,n(r,i))}function o(e,t,r=!1,i){document.addEventListener(e,t,n(r,i))}r.d(t,{DD:()=\u003eo,jT:()=\u003en,sp:()=\u003ei})},5607:(e,t,r)=\u003e{\"use strict\";r.d(t,{W:()=\u003en});const n=(0,r(9566).bz)()},9566:(e,t,r)=\u003e{\"use strict\";r.d(t,{LA:()=\u003es,ZF:()=\u003ec,bz:()=\u003ea,el:()=\u003eu});var n=r(6154);const i=\"xxxxxxxx-xxxx-4xxx-yxxx-xxxxxxxxxxxx\";function o(e,t){return e?15\u0026e[t]:16*Math.random()|0}function a(){const e=n.gm?.crypto||n.gm?.msCrypto;let t,r=0;return e\u0026\u0026e.getRandomValues\u0026\u0026(t=e.getRandomValues(new Uint8Array(30))),i.split(\"\").map((e=\u003e\"x\"===e?o(t,r++).toString(16):\"y\"===e?(3\u0026o()|8).toString(16):e)).join(\"\")}function s(e){const t=n.gm?.crypto||n.gm?.msCrypto;let r,i=0;t\u0026\u0026t.getRandomValues\u0026\u0026(r=t.getRandomValues(new Uint8Array(e)));const a=[];for(var s=0;s\u003ce;s++)a.push(o(r,i++).toString(16));return a.join(\"\")}function c(){return s(16)}function u(){return s(32)}},2614:(e,t,r)=\u003e{\"use strict\";r.d(t,{BB:()=\u003ea,H3:()=\u003en,g:()=\u003eu,iL:()=\u003ec,tS:()=\u003es,uh:()=\u003ei,wk:()=\u003eo});const n=\"NRBA\",i=\"SESSION\",o=144e5,a=18e5,s={STARTED:\"session-started\",PAUSE:\"session-pause\",RESET:\"session-reset\",RESUME:\"session-resume\",UPDATE:\"session-update\"},c={SAME_TAB:\"same-tab\",CROSS_TAB:\"cross-tab\"},u={OFF:0,FULL:1,ERROR:2}},1863:(e,t,r)=\u003e{\"use strict\";function n(){return Math.floor(performance.now())}r.d(t,{t:()=\u003en})},7485:(e,t,r)=\u003e{\"use strict\";r.d(t,{D:()=\u003ei});var n=r(6154);function i(e){if(0===(e||\"\").indexOf(\"data:\"))return{protocol:\"data\"};try{const t=new URL(e,location.href),r={port:t.port,hostname:t.hostname,pathname:t.pathname,search:t.search,protocol:t.protocol.slice(0,t.protocol.indexOf(\":\")),sameOrigin:t.protocol===n.gm?.location?.protocol\u0026\u0026t.host===n.gm?.location?.host};return r.port\u0026\u0026\"\"!==r.port||(\"http:\"===t.protocol\u0026\u0026(r.port=\"80\"),\"https:\"===t.protocol\u0026\u0026(r.port=\"443\")),r.pathname\u0026\u0026\"\"!==r.pathname?r.pathname.startsWith(\"/\")||(r.pathname=\"/\".concat(r.pathname)):r.pathname=\"/\",r}catch(e){return{}}}},944:(e,t,r)=\u003e{\"use strict\";function n(e,t){\"function\"==typeof console.debug\u0026\u0026console.debug(\"New Relic Warning: https://github.com/newrelic/newrelic-browser-agent/blob/main/docs/warning-codes.md#\".concat(e),t)}r.d(t,{R:()=\u003en})},5284:(e,t,r)=\u003e{\"use strict\";r.d(t,{t:()=\u003ec,B:()=\u003es});var n=r(7836),i=r(6154);const o=\"newrelic\";const a=new Set,s={};function c(e,t){const r=n.ee.get(t);s[t]??={},e\u0026\u0026\"object\"==typeof e\u0026\u0026(a.has(t)||(r.emit(\"rumresp\",[e]),s[t]=e,a.add(t),function(e={}){try{i.gm.dispatchEvent(new CustomEvent(o,{detail:e}))}catch(e){}}({loaded:!0})))}},8990:(e,t,r)=\u003e{\"use strict\";r.d(t,{I:()=\u003ei});var n=Object.prototype.hasOwnProperty;function i(e,t,r){if(n.call(e,t))return e[t];var i=r();if(Object.defineProperty\u0026\u0026Object.keys)try{return Object.defineProperty(e,t,{value:i,writable:!0,enumerable:!1}),i}catch(e){}return e[t]=i,i}},6389:(e,t,r)=\u003e{\"use strict\";function n(e,t=500,r={}){const n=r?.leading||!1;let i;return(...r)=\u003e{n\u0026\u0026void 0===i\u0026\u0026(e.apply(this,r),i=setTimeout((()=\u003e{i=clearTimeout(i)}),t)),n||(clearTimeout(i),i=setTimeout((()=\u003e{e.apply(this,r)}),t))}}function i(e){let t=!1;return(...r)=\u003e{t||(t=!0,e.apply(this,r))}}r.d(t,{J:()=\u003ei,s:()=\u003en})},3304:(e,t,r)=\u003e{\"use strict\";r.d(t,{A:()=\u003eo});var n=r(7836);const i=()=\u003e{const e=new WeakSet;return(t,r)=\u003e{if(\"object\"==typeof r\u0026\u0026null!==r){if(e.has(r))return;e.add(r)}return r}};function o(e){try{return JSON.stringify(e,i())??\"\"}catch(e){try{n.ee.emit(\"internal-error\",[e])}catch(e){}return\"\"}}},5289:(e,t,r)=\u003e{\"use strict\";r.d(t,{GG:()=\u003eo,sB:()=\u003ea});var n=r(3878);function i(){return\"undefined\"==typeof document||\"complete\"===document.readyState}function o(e,t){if(i())return e();(0,n.sp)(\"load\",e,t)}function a(e){if(i())return e();(0,n.DD)(\"DOMContentLoaded\",e)}},384:(e,t,r)=\u003e{\"use strict\";r.d(t,{NT:()=\u003eo,US:()=\u003ed,Zm:()=\u003ea,bQ:()=\u003ec,dV:()=\u003es,nY:()=\u003eu,pV:()=\u003el});var n=r(6154),i=r(1863);const o={beacon:\"bam.nr-data.net\",errorBeacon:\"bam.nr-data.net\"};function a(){return n.gm.NREUM||(n.gm.NREUM={}),void 0===n.gm.newrelic\u0026\u0026(n.gm.newrelic=n.gm.NREUM),n.gm.NREUM}function s(){let e=a();return e.o||(e.o={ST:n.gm.setTimeout,SI:n.gm.setImmediate,CT:n.gm.clearTimeout,XHR:n.gm.XMLHttpRequest,REQ:n.gm.Request,EV:n.gm.Event,PR:n.gm.Promise,MO:n.gm.MutationObserver,FETCH:n.gm.fetch,WS:n.gm.WebSocket}),e}function c(e,t){let r=a();r.initializedAgents??={},t.initializedAt={ms:(0,i.t)(),date:new Date},r.initializedAgents[e]=t}function u(e){let t=a();return t.initializedAgents?.[e]}function d(e,t){a()[e]=t}function l(){return function(){let e=a();const t=e.info||{};e.info={beacon:o.beacon,errorBeacon:o.errorBeacon,...t}}(),function(){let e=a();const t=e.init||{};e.init={...t}}(),s(),function(){let e=a();const t=e.loader_config||{};e.loader_config={...t}}(),a()}},2843:(e,t,r)=\u003e{\"use strict\";r.d(t,{u:()=\u003ei});var n=r(3878);function i(e,t=!1,r,i){(0,n.DD)(\"visibilitychange\",(function(){if(t)return void(\"hidden\"===document.visibilityState\u0026\u0026e());e(document.visibilityState)}),r,i)}},8139:(e,t,r)=\u003e{\"use strict\";r.d(t,{u:()=\u003ef});var n=r(7836),i=r(3434),o=r(8990),a=r(6154);const s={},c=a.gm.XMLHttpRequest,u=\"addEventListener\",d=\"removeEventListener\",l=\"nr@wrapped:\".concat(n.P);function f(e){var t=function(e){return(e||n.ee).get(\"events\")}(e);if(s[t.debugId]++)return t;s[t.debugId]=1;var r=(0,i.YM)(t,!0);function f(e){r.inPlace(e,[u,d],\"-\",p)}function p(e,t){return e[1]}return\"getPrototypeOf\"in Object\u0026\u0026(a.RI\u0026\u0026h(document,f),h(a.gm,f),h(c.prototype,f)),t.on(u+\"-start\",(function(e,t){var n=e[1];if(null!==n\u0026\u0026(\"function\"==typeof n||\"object\"==typeof n)){var i=(0,o.I)(n,l,(function(){var e={object:function(){if(\"function\"!=typeof n.handleEvent)return;return n.handleEvent.apply(n,arguments)},function:n}[typeof n];return e?r(e,\"fn-\",null,e.name||\"anonymous\"):n}));this.wrapped=e[1]=i}})),t.on(d+\"-start\",(function(e){e[1]=this.wrapped||e[1]})),t}function h(e,t,...r){let n=e;for(;\"object\"==typeof n\u0026\u0026!Object.prototype.hasOwnProperty.call(n,u);)n=Object.getPrototypeOf(n);n\u0026\u0026t(n,...r)}},3434:(e,t,r)=\u003e{\"use strict\";r.d(t,{Jt:()=\u003eo,YM:()=\u003ec});var n=r(7836),i=r(5607);const o=\"nr@original:\".concat(i.W);var a=Object.prototype.hasOwnProperty,s=!1;function c(e,t){return e||(e=n.ee),r.inPlace=function(e,t,n,i,o){n||(n=\"\");const a=\"-\"===n.charAt(0);for(let s=0;s\u003ct.length;s++){const c=t[s],u=e[c];d(u)||(e[c]=r(u,a?c+n:n,i,c,o))}},r.flag=o,r;function r(t,r,n,s,c){return d(t)?t:(r||(r=\"\"),nrWrapper[o]=t,function(e,t,r){if(Object.defineProperty\u0026\u0026Object.keys)try{return Object.keys(e).forEach((function(r){Object.defineProperty(t,r,{get:function(){return e[r]},set:function(t){return e[r]=t,t}})})),t}catch(e){u([e],r)}for(var n in e)a.call(e,n)\u0026\u0026(t[n]=e[n])}(t,nrWrapper,e),nrWrapper);function nrWrapper(){var o,a,d,l;try{a=this,o=[...arguments],d=\"function\"==typeof n?n(o,a):n||{}}catch(t){u([t,\"\",[o,a,s],d],e)}i(r+\"start\",[o,a,s],d,c);try{return l=t.apply(a,o)}catch(e){throw i(r+\"err\",[o,a,e],d,c),e}finally{i(r+\"end\",[o,a,l],d,c)}}}function i(r,n,i,o){if(!s||t){var a=s;s=!0;try{e.emit(r,n,i,t,o)}catch(t){u([t,r,n,i],e)}s=a}}}function u(e,t){t||(t=n.ee);try{t.emit(\"internal-error\",e)}catch(e){}}function d(e){return!(e\u0026\u0026\"function\"==typeof e\u0026\u0026e.apply\u0026\u0026!e[o])}},9300:(e,t,r)=\u003e{\"use strict\";r.d(t,{T:()=\u003en});const n=r(860).K7.ajax},3333:(e,t,r)=\u003e{\"use strict\";r.d(t,{TZ:()=\u003en,Zp:()=\u003ei,mq:()=\u003es,nf:()=\u003ea,qN:()=\u003eo});const n=r(860).K7.genericEvents,i=[\"auxclick\",\"click\",\"copy\",\"keydown\",\"paste\",\"scrollend\"],o=[\"focus\",\"blur\"],a=4,s=1e3},6774:(e,t,r)=\u003e{\"use strict\";r.d(t,{T:()=\u003en});const n=r(860).K7.jserrors},993:(e,t,r)=\u003e{\"use strict\";r.d(t,{ET:()=\u003eo,TZ:()=\u003ea,p_:()=\u003ei});var n=r(860);const i={ERROR:\"ERROR\",WARN:\"WARN\",INFO:\"INFO\",DEBUG:\"DEBUG\",TRACE:\"TRACE\"},o=\"log\",a=n.K7.logging},3785:(e,t,r)=\u003e{\"use strict\";r.d(t,{R:()=\u003ec,b:()=\u003eu});var n=r(9908),i=r(1863),o=r(860),a=r(3969),s=r(993);function c(e,t,r={},c=s.p_.INFO){(0,n.p)(a.xV,[\"API/logging/\".concat(c.toLowerCase(),\"/called\")],void 0,o.K7.metrics,e),(0,n.p)(s.ET,[(0,i.t)(),t,r,c],void 0,o.K7.logging,e)}function u(e){return\"string\"==typeof e\u0026\u0026Object.values(s.p_).some((t=\u003et===e.toUpperCase().trim()))}},3969:(e,t,r)=\u003e{\"use strict\";r.d(t,{TZ:()=\u003en,XG:()=\u003es,rs:()=\u003ei,xV:()=\u003ea,z_:()=\u003eo});const n=r(860).K7.metrics,i=\"sm\",o=\"cm\",a=\"storeSupportabilityMetrics\",s=\"storeEventMetrics\"},6630:(e,t,r)=\u003e{\"use strict\";r.d(t,{T:()=\u003en});const n=r(860).K7.pageViewEvent},782:(e,t,r)=\u003e{\"use strict\";r.d(t,{T:()=\u003en});const n=r(860).K7.pageViewTiming},6344:(e,t,r)=\u003e{\"use strict\";r.d(t,{BB:()=\u003ed,G4:()=\u003eo,Qb:()=\u003el,TZ:()=\u003ei,Ug:()=\u003ea,_s:()=\u003es,bc:()=\u003eu,yP:()=\u003ec});var n=r(2614);const i=r(860).K7.sessionReplay,o={RECORD:\"recordReplay\",PAUSE:\"pauseReplay\",REPLAY_RUNNING:\"replayRunning\",ERROR_DURING_REPLAY:\"errorDuringReplay\"},a=.12,s={DomContentLoaded:0,Load:1,FullSnapshot:2,IncrementalSnapshot:3,Meta:4,Custom:5},c={[n.g.ERROR]:15e3,[n.g.FULL]:3e5,[n.g.OFF]:0},u={RESET:{message:\"Session was reset\",sm:\"Reset\"},IMPORT:{message:\"Recorder failed to import\",sm:\"Import\"},TOO_MANY:{message:\"429: Too Many Requests\",sm:\"Too-Many\"},TOO_BIG:{message:\"Payload was too large\",sm:\"Too-Big\"},CROSS_TAB:{message:\"Session Entity was set to OFF on another tab\",sm:\"Cross-Tab\"},ENTITLEMENTS:{message:\"Session Replay is not allowed and will not be started\",sm:\"Entitlement\"}},d=5e3,l={API:\"api\"}},5270:(e,t,r)=\u003e{\"use strict\";r.d(t,{Aw:()=\u003ec,CT:()=\u003eu,SR:()=\u003es});var n=r(384),i=r(9417),o=r(7767),a=r(6154);function s(e){return!!(0,n.dV)().o.MO\u0026\u0026(0,o.V)(e)\u0026\u0026!0===(0,i.gD)(e,\"session_trace.enabled\")}function c(e){return!0===(0,i.gD)(e,\"session_replay.preload\")\u0026\u0026s(e)}function u(e,t){const r=t.correctAbsoluteTimestamp(e);return{originalTimestamp:e,correctedTimestamp:r,timestampDiff:e-r,originTime:a.WN,correctedOriginTime:t.correctedOriginTime,originTimeDiff:Math.floor(a.WN-t.correctedOriginTime)}}},3738:(e,t,r)=\u003e{\"use strict\";r.d(t,{He:()=\u003ei,Kp:()=\u003es,Lc:()=\u003eu,Rz:()=\u003ed,TZ:()=\u003en,bD:()=\u003eo,d3:()=\u003ea,jx:()=\u003el,uP:()=\u003ec});const n=r(860).K7.sessionTrace,i=\"bstResource\",o=\"resource\",a=\"-start\",s=\"-end\",c=\"fn\"+a,u=\"fn\"+s,d=\"pushState\",l=1e3},3962:(e,t,r)=\u003e{\"use strict\";r.d(t,{AM:()=\u003eo,O2:()=\u003es,Qu:()=\u003ec,TZ:()=\u003ea,ih:()=\u003eu,tC:()=\u003ei});var n=r(860);const i=[\"click\",\"keydown\",\"submit\"],o=\"api\",a=n.K7.softNav,s={INITIAL_PAGE_LOAD:\"\",ROUTE_CHANGE:1,UNSPECIFIED:2},c={INTERACTION:1,AJAX:2,CUSTOM_END:3,CUSTOM_TRACER:4},u={IP:\"in progress\",FIN:\"finished\",CAN:\"cancelled\"}},7378:(e,t,r)=\u003e{\"use strict\";r.d(t,{$p:()=\u003ex,BR:()=\u003eb,Kp:()=\u003eR,L3:()=\u003ey,Lc:()=\u003ec,NC:()=\u003eo,SG:()=\u003ed,TZ:()=\u003ei,U6:()=\u003ep,UT:()=\u003em,d3:()=\u003ew,dT:()=\u003ef,e5:()=\u003eA,gx:()=\u003ev,l9:()=\u003el,oW:()=\u003eh,op:()=\u003eg,rw:()=\u003eu,tH:()=\u003eE,uP:()=\u003es,wW:()=\u003eT,xq:()=\u003ea});var n=r(384);const i=r(860).K7.spa,o=[\"click\",\"submit\",\"keypress\",\"keydown\",\"keyup\",\"change\"],a=999,s=\"fn-start\",c=\"fn-end\",u=\"cb-start\",d=\"api-ixn-\",l=\"remaining\",f=\"interaction\",h=\"spaNode\",p=\"jsonpNode\",g=\"fetch-start\",m=\"fetch-done\",v=\"fetch-body-\",b=\"jsonp-end\",y=(0,n.dV)().o.ST,w=\"-start\",R=\"-end\",x=\"-body\",T=\"cb\"+R,A=\"jsTime\",E=\"fetch\"},4234:(e,t,r)=\u003e{\"use strict\";r.d(t,{W:()=\u003eo});var n=r(7836),i=r(1687);class o{constructor(e,t){this.agentIdentifier=e,this.ee=n.ee.get(e),this.featureName=t,this.blocked=!1}deregisterDrain(){(0,i.x3)(this.agentIdentifier,this.featureName)}}},7767:(e,t,r)=\u003e{\"use strict\";r.d(t,{V:()=\u003eo});var n=r(9417),i=r(6154);const o=e=\u003ei.RI\u0026\u0026!0===(0,n.gD)(e,\"privacy.cookies_enabled\")},425:(e,t,r)=\u003e{\"use strict\";r.d(t,{j:()=\u003ej});var n=r(860),i=r(2555),o=r(3371),a=r(9908),s=r(7836),c=r(1687),u=r(5289),d=r(6154),l=r(944),f=r(3969),h=r(384),p=r(6344);const g=[\"setErrorHandler\",\"finished\",\"addToTrace\",\"addRelease\",\"addPageAction\",\"setCurrentRouteName\",\"setPageViewName\",\"setCustomAttribute\",\"interaction\",\"noticeError\",\"setUserId\",\"setApplicationVersion\",\"start\",p.G4.RECORD,p.G4.PAUSE,\"log\",\"wrapLogger\"],m=[\"setErrorHandler\",\"finished\",\"addToTrace\",\"addRelease\"];var v=r(1863),b=r(2614),y=r(993),w=r(3785),R=r(2646),x=r(3434);function T(e,t,r,n){if(\"object\"!=typeof t||!t||\"string\"!=typeof r||!r||\"function\"!=typeof t[r])return(0,l.R)(29);const i=function(e){return(e||s.ee).get(\"logger\")}(e),o=(0,x.YM)(i),a=new R.y(s.P);return a.level=n.level,a.customAttributes=n.customAttributes,o.inPlace(t,[r],\"wrap-logger-\",a),i}function A(){const e=(0,h.pV)();g.forEach((t=\u003e{e[t]=(...r)=\u003efunction(t,...r){let n=[];return Object.values(e.initializedAgents).forEach((e=\u003e{e\u0026\u0026e.api?e.exposed\u0026\u0026e.api[t]\u0026\u0026n.push(e.api[t](...r)):(0,l.R)(38,t)})),n.length\u003e1?n:n[0]}(t,...r)}))}const E={};var S=r(9417),N=r(5603),O=r(5284);const _=e=\u003e{const t=e.startsWith(\"http\");e+=\"/\",r.p=t?e:\"https://\"+e};let I=!1;function j(e,t={},g,R){let{init:x,info:j,loader_config:P,runtime:C={},exposed:k=!0}=t;C.loaderType=g;const L=(0,h.pV)();j||(x=L.init,j=L.info,P=L.loader_config),(0,S.xN)(e.agentIdentifier,x||{}),(0,N.a)(e.agentIdentifier,P||{}),j.jsAttributes??={},d.bv\u0026\u0026(j.jsAttributes.isWorker=!0),(0,i.x1)(e.agentIdentifier,j);const H=(0,S.D0)(e.agentIdentifier),D=[j.beacon,j.errorBeacon];I||(H.proxy.assets\u0026\u0026(_(H.proxy.assets),D.push(H.proxy.assets)),H.proxy.beacon\u0026\u0026D.push(H.proxy.beacon),A(),(0,h.US)(\"activatedFeatures\",O.B),e.runSoftNavOverSpa\u0026\u0026=!0===H.soft_navigations.enabled\u0026\u0026H.feature_flags.includes(\"soft_nav\")),C.denyList=[...H.ajax.deny_list||[],...H.ajax.block_internal?D:[]],C.ptid=e.agentIdentifier,(0,o.V)(e.agentIdentifier,C),e.ee=s.ee.get(e.agentIdentifier),void 0===e.api\u0026\u0026(e.api=function(e,t,h=!1){t||(0,c.Ak)(e,\"api\");const g={};var R=s.ee.get(e),x=R.get(\"tracer\");E[e]=b.g.OFF,R.on(p.G4.REPLAY_RUNNING,(t=\u003e{E[e]=t}));var A=\"api-\",S=A+\"ixn-\";function N(t,r,n,o){const a=(0,i.Vp)(e);return null===r?delete a.jsAttributes[t]:(0,i.x1)(e,{...a,jsAttributes:{...a.jsAttributes,[t]:r}}),I(A,n,!0,o||null===r?\"session\":void 0)(t,r)}function O(){}g.log=function(e,{customAttributes:t={},level:r=y.p_.INFO}={}){(0,a.p)(f.xV,[\"API/log/called\"],void 0,n.K7.metrics,R),(0,w.R)(R,e,t,r)},g.wrapLogger=(e,t,{customAttributes:r={},level:i=y.p_.INFO}={})=\u003e{(0,a.p)(f.xV,[\"API/wrapLogger/called\"],void 0,n.K7.metrics,R),T(R,e,t,{customAttributes:r,level:i})},m.forEach((e=\u003e{g[e]=I(A,e,!0,\"api\")})),g.addPageAction=I(A,\"addPageAction\",!0,n.K7.genericEvents),g.setPageViewName=function(t,r){if(\"string\"==typeof t)return\"/\"!==t.charAt(0)\u0026\u0026(t=\"/\"+t),(0,o.f)(e).customTransaction=(r||\"http://custom.transaction\")+t,I(A,\"setPageViewName\",!0)()},g.setCustomAttribute=function(e,t,r=!1){if(\"string\"==typeof e){if([\"string\",\"number\",\"boolean\"].includes(typeof t)||null===t)return N(e,t,\"setCustomAttribute\",r);(0,l.R)(40,typeof t)}else(0,l.R)(39,typeof e)},g.setUserId=function(e){if(\"string\"==typeof e||null===e)return N(\"enduser.id\",e,\"setUserId\",!0);(0,l.R)(41,typeof e)},g.setApplicationVersion=function(e){if(\"string\"==typeof e||null===e)return N(\"application.version\",e,\"setApplicationVersion\",!1);(0,l.R)(42,typeof e)},g.start=()=\u003e{try{(0,a.p)(f.xV,[\"API/start/called\"],void 0,n.K7.metrics,R),R.emit(\"manual-start-all\")}catch(e){(0,l.R)(23,e)}},g[p.G4.RECORD]=function(){(0,a.p)(f.xV,[\"API/recordReplay/called\"],void 0,n.K7.metrics,R),(0,a.p)(p.G4.RECORD,[],void 0,n.K7.sessionReplay,R)},g[p.G4.PAUSE]=function(){(0,a.p)(f.xV,[\"API/pauseReplay/called\"],void 0,n.K7.metrics,R),(0,a.p)(p.G4.PAUSE,[],void 0,n.K7.sessionReplay,R)},g.interaction=function(e){return(new O).get(\"object\"==typeof e?e:{})};const _=O.prototype={createTracer:function(e,t){var r={},i=this,o=\"function\"==typeof t;return(0,a.p)(f.xV,[\"API/createTracer/called\"],void 0,n.K7.metrics,R),h||(0,a.p)(S+\"tracer\",[(0,v.t)(),e,r],i,n.K7.spa,R),function(){if(x.emit((o?\"\":\"no-\")+\"fn-start\",[(0,v.t)(),i,o],r),o)try{return t.apply(this,arguments)}catch(e){const t=\"string\"==typeof e?new Error(e):e;throw x.emit(\"fn-err\",[arguments,this,t],r),t}finally{x.emit(\"fn-end\",[(0,v.t)()],r)}}}};function I(e,t,r,i){return function(){return(0,a.p)(f.xV,[\"API/\"+t+\"/called\"],void 0,n.K7.metrics,R),i\u0026\u0026(0,a.p)(e+t,[(0,v.t)(),...arguments],r?null:this,i,R),r?void 0:this}}function j(){r.e(478).then(r.bind(r,8778)).then((({setAPI:t})=\u003e{t(e),(0,c.Ze)(e,\"api\")})).catch((e=\u003e{(0,l.R)(27,e),R.abort()}))}return[\"actionText\",\"setName\",\"setAttribute\",\"save\",\"ignore\",\"onEnd\",\"getContext\",\"end\",\"get\"].forEach((e=\u003e{_[e]=I(S,e,void 0,h?n.K7.softNav:n.K7.spa)})),g.setCurrentRouteName=h?I(S,\"routeName\",void 0,n.K7.softNav):I(A,\"routeName\",!0,n.K7.spa),g.noticeError=function(t,r){\"string\"==typeof t\u0026\u0026(t=new Error(t)),(0,a.p)(f.xV,[\"API/noticeError/called\"],void 0,n.K7.metrics,R),(0,a.p)(\"err\",[t,(0,v.t)(),!1,r,!!E[e]],void 0,n.K7.jserrors,R)},d.RI?(0,u.GG)((()=\u003ej()),!0):j(),g}(e.agentIdentifier,R,e.runSoftNavOverSpa)),void 0===e.exposed\u0026\u0026(e.exposed=k),I=!0}},8374:(e,t,r)=\u003e{r.nc=(()=\u003e{try{return document?.currentScript?.nonce}catch(e){}return\"\"})()},860:(e,t,r)=\u003e{\"use strict\";r.d(t,{$J:()=\u003eo,K7:()=\u003en,P3:()=\u003ei});const n={ajax:\"ajax\",genericEvents:\"generic_events\",jserrors:\"jserrors\",logging:\"logging\",metrics:\"metrics\",pageAction:\"page_action\",pageViewEvent:\"page_view_event\",pageViewTiming:\"page_view_timing\",sessionReplay:\"session_replay\",sessionTrace:\"session_trace\",softNav:\"soft_navigations\",spa:\"spa\"},i={[n.pageViewEvent]:1,[n.pageViewTiming]:2,[n.metrics]:3,[n.jserrors]:4,[n.spa]:5,[n.ajax]:6,[n.sessionTrace]:7,[n.softNav]:8,[n.sessionReplay]:9,[n.logging]:10,[n.genericEvents]:11},o={[n.pageViewTiming]:\"events\",[n.ajax]:\"events\",[n.spa]:\"events\",[n.softNav]:\"events\",[n.metrics]:\"jserrors\",[n.jserrors]:\"jserrors\",[n.sessionTrace]:\"browser/blobs\",[n.sessionReplay]:\"browser/blobs\",[n.logging]:\"browser/logs\",[n.genericEvents]:\"ins\"}}},n={};function i(e){var t=n[e];if(void 0!==t)return t.exports;var o=n[e]={exports:{}};return r[e](o,o.exports,i),o.exports}i.m=r,i.d=(e,t)=\u003e{for(var r in t)i.o(t,r)\u0026\u0026!i.o(e,r)\u0026\u0026Object.defineProperty(e,r,{enumerable:!0,get:t[r]})},i.f={},i.e=e=\u003ePromise.all(Object.keys(i.f).reduce(((t,r)=\u003e(i.f[r](e,t),t)),[])),i.u=e=\u003e({212:\"nr-spa-compressor\",249:\"nr-spa-recorder\",478:\"nr-spa\"}[e]+\"-1.274.0.min.js\"),i.o=(e,t)=\u003eObject.prototype.hasOwnProperty.call(e,t),e={},t=\"NRBA-1.274.0.PROD:\",i.l=(r,n,o,a)=\u003e{if(e[r])e[r].push(n);else{var s,c;if(void 0!==o)for(var u=document.getElementsByTagName(\"script\"),d=0;d\u003cu.length;d++){var l=u[d];if(l.getAttribute(\"src\")==r||l.getAttribute(\"data-webpack\")==t+o){s=l;break}}if(!s){c=!0;var f={478:\"sha512-1vUqEfJPB8Pihje9mv5CfYgkitO1FWcS+UQb84DbXqP8oYctRv4/lzl/MzNLPlRhcY1WVDBGL20I8vm6s2VV7g==\",249:\"sha512-Y/BeZAh6VSTmUtUNmS5XdyKxL92s30Fyyj8xVW76HSPxcKItL4+x2+kGMZc8pMJnUpZDz1L4eftZQAJh3D8NnA==\",212:\"sha512-Gn2tQ3qog5Yhrx/gRutkSTYPp+7nkKFt4/mIXg99LxcNpMDAYJZDBYmAACdoHNM86+iq1F3cBcQotFNzjIX8bw==\"};(s=document.createElement(\"script\")).charset=\"utf-8\",s.timeout=120,i.nc\u0026\u0026s.setAttribute(\"nonce\",i.nc),s.setAttribute(\"data-webpack\",t+o),s.src=r,0!==s.src.indexOf(window.location.origin+\"/\")\u0026\u0026(s.crossOrigin=\"anonymous\"),f[a]\u0026\u0026(s.integrity=f[a])}e[r]=[n];var h=(t,n)=\u003e{s.onerror=s.onload=null,clearTimeout(p);var i=e[r];if(delete e[r],s.parentNode\u0026\u0026s.parentNode.removeChild(s),i\u0026\u0026i.forEach((e=\u003ee(n))),t)return t(n)},p=setTimeout(h.bind(null,void 0,{type:\"timeout\",target:s}),12e4);s.onerror=h.bind(null,s.onerror),s.onload=h.bind(null,s.onload),c\u0026\u0026document.head.appendChild(s)}},i.r=e=\u003e{\"undefined\"!=typeof Symbol\u0026\u0026Symbol.toStringTag\u0026\u0026Object.defineProperty(e,Symbol.toStringTag,{value:\"Module\"}),Object.defineProperty(e,\"__esModule\",{value:!0})},i.p=\"https://js-agent.newrelic.com/\",(()=\u003e{var e={38:0,788:0};i.f.j=(t,r)=\u003e{var n=i.o(e,t)?e[t]:void 0;if(0!==n)if(n)r.push(n[2]);else{var o=new Promise(((r,i)=\u003en=e[t]=[r,i]));r.push(n[2]=o);var a=i.p+i.u(t),s=new Error;i.l(a,(r=\u003e{if(i.o(e,t)\u0026\u0026(0!==(n=e[t])\u0026\u0026(e[t]=void 0),n)){var o=r\u0026\u0026(\"load\"===r.type?\"missing\":r.type),a=r\u0026\u0026r.target\u0026\u0026r.target.src;s.message=\"Loading chunk \"+t+\" failed.\\n(\"+o+\": \"+a+\")\",s.name=\"ChunkLoadError\",s.type=o,s.request=a,n[1](s)}}),\"chunk-\"+t,t)}};var t=(t,r)=\u003e{var n,o,[a,s,c]=r,u=0;if(a.some((t=\u003e0!==e[t]))){for(n in s)i.o(s,n)\u0026\u0026(i.m[n]=s[n]);if(c)c(i)}for(t\u0026\u0026t(r);u\u003ca.length;u++)o=a[u],i.o(e,o)\u0026\u0026e[o]\u0026\u0026e[o][0](),e[o]=0},r=self[\"webpackChunk:NRBA-1.274.0.PROD\"]=self[\"webpackChunk:NRBA-1.274.0.PROD\"]||[];r.forEach(t.bind(null,0)),r.push=t.bind(null,r.push.bind(r))})(),(()=\u003e{\"use strict\";i(8374);var e=i(944),t=i(6344),r=i(9566);class n{agentIdentifier;constructor(e=(0,r.LA)(16)){this.agentIdentifier=e}#e(t,...r){if(\"function\"==typeof this.api?.[t])return this.api[t](...r);(0,e.R)(35,t)}addPageAction(e,t){return this.#e(\"addPageAction\",e,t)}setPageViewName(e,t){return this.#e(\"setPageViewName\",e,t)}setCustomAttribute(e,t,r){return this.#e(\"setCustomAttribute\",e,t,r)}noticeError(e,t){return this.#e(\"noticeError\",e,t)}setUserId(e){return this.#e(\"setUserId\",e)}setApplicationVersion(e){return this.#e(\"setApplicationVersion\",e)}setErrorHandler(e){return this.#e(\"setErrorHandler\",e)}addRelease(e,t){return this.#e(\"addRelease\",e,t)}log(e,t){return this.#e(\"log\",e,t)}}class o extends n{#e(t,...r){if(\"function\"==typeof this.api?.[t])return this.api[t](...r);(0,e.R)(35,t)}start(){return this.#e(\"start\")}finished(e){return this.#e(\"finished\",e)}recordReplay(){return this.#e(t.G4.RECORD)}pauseReplay(){return this.#e(t.G4.PAUSE)}addToTrace(e){return this.#e(\"addToTrace\",e)}setCurrentRouteName(e){return this.#e(\"setCurrentRouteName\",e)}interaction(){return this.#e(\"interaction\")}wrapLogger(e,t,r){return this.#e(\"wrapLogger\",e,t,r)}}var a=i(860),s=i(9417);const c=Object.values(a.K7);function u(e){const t={};return c.forEach((r=\u003e{t[r]=function(e,t){return!0===(0,s.gD)(t,\"\".concat(e,\".enabled\"))}(r,e)})),t}var d=i(425);var l=i(1687),f=i(4234),h=i(5289),p=i(6154),g=i(5270),m=i(7767),v=i(6389);class b extends f.W{constructor(e,t,r=!0){super(e.agentIdentifier,t),this.auto=r,this.abortHandler=void 0,this.featAggregate=void 0,this.onAggregateImported=void 0,!1===e.init[this.featureName].autoStart\u0026\u0026(this.auto=!1),this.auto?(0,l.Ak)(e.agentIdentifier,t):this.ee.on(\"manual-start-all\",(0,v.J)((()=\u003e{(0,l.Ak)(e.agentIdentifier,this.featureName),this.auto=!0,this.importAggregator(e)})))}importAggregator(t,r={}){if(this.featAggregate||!this.auto)return;let n;this.onAggregateImported=new Promise((e=\u003e{n=e}));const o=async()=\u003e{let o;try{if((0,m.V)(this.agentIdentifier)){const{setupAgentSession:e}=await i.e(478).then(i.bind(i,6526));o=e(t)}}catch(t){(0,e.R)(20,t),this.ee.emit(\"internal-error\",[t]),this.featureName===a.K7.sessionReplay\u0026\u0026this.abortHandler?.()}try{if(t.sharedAggregator)await t.sharedAggregator;else{t.sharedAggregator=i.e(478).then(i.bind(i,9337));const{EventAggregator:e}=await t.sharedAggregator;t.sharedAggregator=new e}if(!this.#t(this.featureName,o))return(0,l.Ze)(this.agentIdentifier,this.featureName),void n(!1);const{lazyFeatureLoader:e}=await i.e(478).then(i.bind(i,6103)),{Aggregate:a}=await e(this.featureName,\"aggregate\");this.featAggregate=new a(t,r),n(!0)}catch(t){(0,e.R)(34,t),this.abortHandler?.(),(0,l.Ze)(this.agentIdentifier,this.featureName,!0),n(!1),this.ee\u0026\u0026this.ee.abort()}};p.RI?(0,h.GG)((()=\u003eo()),!0):o()}#t(e,t){switch(e){case a.K7.sessionReplay:return(0,g.SR)(this.agentIdentifier)\u0026\u0026!!t;case a.K7.sessionTrace:return!!t;default:return!0}}}var y=i(6630);class w extends b{static featureName=y.T;constructor(e,t=!0){super(e,y.T,t),this.importAggregator(e)}}var R=i(384);var x=i(9908),T=i(2843),A=i(3878),E=i(782),S=i(1863);class N extends b{static featureName=E.T;constructor(e,t=!0){super(e,E.T,t),p.RI\u0026\u0026((0,T.u)((()=\u003e(0,x.p)(\"docHidden\",[(0,S.t)()],void 0,E.T,this.ee)),!0),(0,A.sp)(\"pagehide\",(()=\u003e(0,x.p)(\"winPagehide\",[(0,S.t)()],void 0,E.T,this.ee))),this.importAggregator(e))}}var O=i(3969);class _ extends b{static featureName=O.TZ;constructor(e,t=!0){super(e,O.TZ,t),this.importAggregator(e)}}var I=i(6774),j=i(3304);class P{constructor(e,t,r,n,i){this.name=\"UncaughtError\",this.message=\"string\"==typeof e?e:(0,j.A)(e),this.sourceURL=t,this.line=r,this.column=n,this.__newrelic=i}}function C(e){return H(e)?e:new P(void 0!==e?.message?e.message:e,e?.filename||e?.sourceURL,e?.lineno||e?.line,e?.colno||e?.col,e?.__newrelic)}function k(e){const t=\"Unhandled Promise Rejection\";if(!e?.reason)return;if(H(e.reason))try{return e.reason.message=t+\": \"+e.reason.message,C(e.reason)}catch(t){return C(e.reason)}const r=C(e.reason);return r.message=t+\": \"+r?.message,r}function L(e){if(e.error instanceof SyntaxError\u0026\u0026!/:\\d+$/.test(e.error.stack?.trim())){const t=new P(e.message,e.filename,e.lineno,e.colno,e.error.__newrelic);return t.name=SyntaxError.name,t}return H(e.error)?e.error:C(e)}function H(e){return e instanceof Error\u0026\u0026!!e.stack}class D extends b{static featureName=I.T;#r=!1;constructor(e,r=!0){super(e,I.T,r);try{this.removeOnAbort=new AbortController}catch(e){}this.ee.on(\"internal-error\",(e=\u003e{this.abortHandler\u0026\u0026(0,x.p)(\"ierr\",[C(e),(0,S.t)(),!0,{},this.#r],void 0,this.featureName,this.ee)})),this.ee.on(t.G4.REPLAY_RUNNING,(e=\u003e{this.#r=e})),p.gm.addEventListener(\"unhandledrejection\",(e=\u003e{this.abortHandler\u0026\u0026(0,x.p)(\"err\",[k(e),(0,S.t)(),!1,{unhandledPromiseRejection:1},this.#r],void 0,this.featureName,this.ee)}),(0,A.jT)(!1,this.removeOnAbort?.signal)),p.gm.addEventListener(\"error\",(e=\u003e{this.abortHandler\u0026\u0026(0,x.p)(\"err\",[L(e),(0,S.t)(),!1,{},this.#r],void 0,this.featureName,this.ee)}),(0,A.jT)(!1,this.removeOnAbort?.signal)),this.abortHandler=this.#n,this.importAggregator(e)}#n(){this.removeOnAbort?.abort(),this.abortHandler=void 0}}var M=i(8990);let K=1;const U=\"nr@id\";function V(e){const t=typeof e;return!e||\"object\"!==t\u0026\u0026\"function\"!==t?-1:e===p.gm?0:(0,M.I)(e,U,(function(){return K++}))}function G(e){if(\"string\"==typeof e\u0026\u0026e.length)return e.length;if(\"object\"==typeof e){if(\"undefined\"!=typeof ArrayBuffer\u0026\u0026e instanceof ArrayBuffer\u0026\u0026e.byteLength)return e.byteLength;if(\"undefined\"!=typeof Blob\u0026\u0026e instanceof Blob\u0026\u0026e.size)return e.size;if(!(\"undefined\"!=typeof FormData\u0026\u0026e instanceof FormData))try{return(0,j.A)(e).length}catch(e){return}}}var F=i(8139),B=i(7836),W=i(3434);const z={},q=[\"open\",\"send\"];function Z(t){var r=t||B.ee;const n=function(e){return(e||B.ee).get(\"xhr\")}(r);if(z[n.debugId]++)return n;z[n.debugId]=1,(0,F.u)(r);var i=(0,W.YM)(n),o=p.gm.XMLHttpRequest,a=p.gm.MutationObserver,s=p.gm.Promise,c=p.gm.setInterval,u=\"readystatechange\",d=[\"onload\",\"onerror\",\"onabort\",\"onloadstart\",\"onloadend\",\"onprogress\",\"ontimeout\"],l=[],f=p.gm.XMLHttpRequest=function(t){const r=new o(t),a=n.context(r);try{n.emit(\"new-xhr\",[r],a),r.addEventListener(u,(s=a,function(){var e=this;e.readyState\u003e3\u0026\u0026!s.resolved\u0026\u0026(s.resolved=!0,n.emit(\"xhr-resolved\",[],e)),i.inPlace(e,d,\"fn-\",y)}),(0,A.jT)(!1))}catch(t){(0,e.R)(15,t);try{n.emit(\"internal-error\",[t])}catch(e){}}var s;return r};function h(e,t){i.inPlace(t,[\"onreadystatechange\"],\"fn-\",y)}if(function(e,t){for(var r in e)t[r]=e[r]}(o,f),f.prototype=o.prototype,i.inPlace(f.prototype,q,\"-xhr-\",y),n.on(\"send-xhr-start\",(function(e,t){h(e,t),function(e){l.push(e),a\u0026\u0026(g?g.then(b):c?c(b):(m=-m,v.data=m))}(t)})),n.on(\"open-xhr-start\",h),a){var g=s\u0026\u0026s.resolve();if(!c\u0026\u0026!s){var m=1,v=document.createTextNode(m);new a(b).observe(v,{characterData:!0})}}else r.on(\"fn-end\",(function(e){e[0]\u0026\u0026e[0].type===u||b()}));function b(){for(var e=0;e\u003cl.length;e++)h(0,l[e]);l.length\u0026\u0026(l=[])}function y(e,t){return t}return n}var Y=\"fetch-\",X=Y+\"body-\",J=[\"arrayBuffer\",\"blob\",\"json\",\"text\",\"formData\"],Q=p.gm.Request,ee=p.gm.Response,te=\"prototype\";const re={};function ne(e){const t=function(e){return(e||B.ee).get(\"fetch\")}(e);if(!(Q\u0026\u0026ee\u0026\u0026p.gm.fetch))return t;if(re[t.debugId]++)return t;function r(e,r,n){var i=e[r];\"function\"==typeof i\u0026\u0026(e[r]=function(){var e,r=[...arguments],o={};t.emit(n+\"before-start\",[r],o),o[B.P]\u0026\u0026o[B.P].dt\u0026\u0026(e=o[B.P].dt);var a=i.apply(this,r);return t.emit(n+\"start\",[r,e],a),a.then((function(e){return t.emit(n+\"end\",[null,e],a),e}),(function(e){throw t.emit(n+\"end\",[e],a),e}))})}return re[t.debugId]=1,J.forEach((e=\u003e{r(Q[te],e,X),r(ee[te],e,X)})),r(p.gm,\"fetch\",Y),t.on(Y+\"end\",(function(e,r){var n=this;if(r){var i=r.headers.get(\"content-length\");null!==i\u0026\u0026(n.rxSize=i),t.emit(Y+\"done\",[null,r],n)}else t.emit(Y+\"done\",[e],n)})),t}var ie=i(7485),oe=i(5603);class ae{constructor(e){this.agentIdentifier=e}generateTracePayload(e){if(!this.shouldGenerateTrace(e))return null;var t=(0,oe.o)(this.agentIdentifier);if(!t)return null;var n=(t.accountID||\"\").toString()||null,i=(t.agentID||\"\").toString()||null,o=(t.trustKey||\"\").toString()||null;if(!n||!i)return null;var a=(0,r.ZF)(),s=(0,r.el)(),c=Date.now(),u={spanId:a,traceId:s,timestamp:c};return(e.sameOrigin||this.isAllowedOrigin(e)\u0026\u0026this.useTraceContextHeadersForCors())\u0026\u0026(u.traceContextParentHeader=this.generateTraceContextParentHeader(a,s),u.traceContextStateHeader=this.generateTraceContextStateHeader(a,c,n,i,o)),(e.sameOrigin\u0026\u0026!this.excludeNewrelicHeader()||!e.sameOrigin\u0026\u0026this.isAllowedOrigin(e)\u0026\u0026this.useNewrelicHeaderForCors())\u0026\u0026(u.newrelicHeader=this.generateTraceHeader(a,s,c,n,i,o)),u}generateTraceContextParentHeader(e,t){return\"00-\"+t+\"-\"+e+\"-01\"}generateTraceContextStateHeader(e,t,r,n,i){return i+\"@nr=0-1-\"+r+\"-\"+n+\"-\"+e+\"----\"+t}generateTraceHeader(e,t,r,n,i,o){if(!(\"function\"==typeof p.gm?.btoa))return null;var a={v:[0,1],d:{ty:\"Browser\",ac:n,ap:i,id:e,tr:t,ti:r}};return o\u0026\u0026n!==o\u0026\u0026(a.d.tk=o),btoa((0,j.A)(a))}shouldGenerateTrace(e){return this.isDtEnabled()\u0026\u0026this.isAllowedOrigin(e)}isAllowedOrigin(e){var t=!1,r={};if((0,s.gD)(this.agentIdentifier,\"distributed_tracing\")\u0026\u0026(r=(0,s.D0)(this.agentIdentifier).distributed_tracing),e.sameOrigin)t=!0;else if(r.allowed_origins instanceof Array)for(var n=0;n\u003cr.allowed_origins.length;n++){var i=(0,ie.D)(r.allowed_origins[n]);if(e.hostname===i.hostname\u0026\u0026e.protocol===i.protocol\u0026\u0026e.port===i.port){t=!0;break}}return t}isDtEnabled(){var e=(0,s.gD)(this.agentIdentifier,\"distributed_tracing\");return!!e\u0026\u0026!!e.enabled}excludeNewrelicHeader(){var e=(0,s.gD)(this.agentIdentifier,\"distributed_tracing\");return!!e\u0026\u0026!!e.exclude_newrelic_header}useNewrelicHeaderForCors(){var e=(0,s.gD)(this.agentIdentifier,\"distributed_tracing\");return!!e\u0026\u0026!1!==e.cors_use_newrelic_header}useTraceContextHeadersForCors(){var e=(0,s.gD)(this.agentIdentifier,\"distributed_tracing\");return!!e\u0026\u0026!!e.cors_use_tracecontext_headers}}var se=i(9300),ce=i(7295),ue=[\"load\",\"error\",\"abort\",\"timeout\"],de=ue.length,le=(0,R.dV)().o.REQ,fe=(0,R.dV)().o.XHR;class he extends b{static featureName=se.T;constructor(e,t=!0){super(e,se.T,t),this.dt=new ae(e.agentIdentifier),this.handler=(e,t,r,n)=\u003e(0,x.p)(e,t,r,n,this.ee);try{const e={xmlhttprequest:\"xhr\",fetch:\"fetch\",beacon:\"beacon\"};p.gm?.performance?.getEntriesByType(\"resource\").forEach((t=\u003e{if(t.initiatorType in e\u0026\u00260!==t.responseStatus){const r={status:t.responseStatus},n={rxSize:t.transferSize,duration:Math.floor(t.duration),cbTime:0};pe(r,t.name),this.handler(\"xhr\",[r,n,t.startTime,t.responseEnd,e[t.initiatorType]],void 0,a.K7.ajax)}}))}catch(e){}ne(this.ee),Z(this.ee),function(e,t,r,n){function i(e){var t=this;t.totalCbs=0,t.called=0,t.cbTime=0,t.end=R,t.ended=!1,t.xhrGuids={},t.lastSize=null,t.loadCaptureCalled=!1,t.params=this.params||{},t.metrics=this.metrics||{},e.addEventListener(\"load\",(function(r){T(t,e)}),(0,A.jT)(!1)),p.lR||e.addEventListener(\"progress\",(function(e){t.lastSize=e.loaded}),(0,A.jT)(!1))}function o(e){this.params={method:e[0]},pe(this,e[1]),this.metrics={}}function s(t,r){e.loader_config.xpid\u0026\u0026this.sameOrigin\u0026\u0026r.setRequestHeader(\"X-NewRelic-ID\",e.loader_config.xpid);var i=n.generateTracePayload(this.parsedOrigin);if(i){var o=!1;i.newrelicHeader\u0026\u0026(r.setRequestHeader(\"newrelic\",i.newrelicHeader),o=!0),i.traceContextParentHeader\u0026\u0026(r.setRequestHeader(\"traceparent\",i.traceContextParentHeader),i.traceContextStateHeader\u0026\u0026r.setRequestHeader(\"tracestate\",i.traceContextStateHeader),o=!0),o\u0026\u0026(this.dt=i)}}function c(e,r){var n=this.metrics,i=e[0],o=this;if(n\u0026\u0026i){var a=G(i);a\u0026\u0026(n.txSize=a)}this.startTime=(0,S.t)(),this.body=i,this.listener=function(e){try{\"abort\"!==e.type||o.loadCaptureCalled||(o.params.aborted=!0),(\"load\"!==e.type||o.called===o.totalCbs\u0026\u0026(o.onloadCalled||\"function\"!=typeof r.onload)\u0026\u0026\"function\"==typeof o.end)\u0026\u0026o.end(r)}catch(e){try{t.emit(\"internal-error\",[e])}catch(e){}}};for(var s=0;s\u003cde;s++)r.addEventListener(ue[s],this.listener,(0,A.jT)(!1))}function u(e,t,r){this.cbTime+=e,t?this.onloadCalled=!0:this.called+=1,this.called!==this.totalCbs||!this.onloadCalled\u0026\u0026\"function\"==typeof r.onload||\"function\"!=typeof this.end||this.end(r)}function d(e,t){var r=\"\"+V(e)+!!t;this.xhrGuids\u0026\u0026!this.xhrGuids[r]\u0026\u0026(this.xhrGuids[r]=!0,this.totalCbs+=1)}function l(e,t){var r=\"\"+V(e)+!!t;this.xhrGuids\u0026\u0026this.xhrGuids[r]\u0026\u0026(delete this.xhrGuids[r],this.totalCbs-=1)}function f(){this.endTime=(0,S.t)()}function h(e,r){r instanceof fe\u0026\u0026\"load\"===e[0]\u0026\u0026t.emit(\"xhr-load-added\",[e[1],e[2]],r)}function g(e,r){r instanceof fe\u0026\u0026\"load\"===e[0]\u0026\u0026t.emit(\"xhr-load-removed\",[e[1],e[2]],r)}function m(e,t,r){t instanceof fe\u0026\u0026(\"onload\"===r\u0026\u0026(this.onload=!0),(\"load\"===(e[0]\u0026\u0026e[0].type)||this.onload)\u0026\u0026(this.xhrCbStart=(0,S.t)()))}function v(e,r){this.xhrCbStart\u0026\u0026t.emit(\"xhr-cb-time\",[(0,S.t)()-this.xhrCbStart,this.onload,r],r)}function b(e){var t,r=e[1]||{};if(\"string\"==typeof e[0]?0===(t=e[0]).length\u0026\u0026p.RI\u0026\u0026(t=\"\"+p.gm.location.href):e[0]\u0026\u0026e[0].url?t=e[0].url:p.gm?.URL\u0026\u0026e[0]\u0026\u0026e[0]instanceof URL?t=e[0].href:\"function\"==typeof e[0].toString\u0026\u0026(t=e[0].toString()),\"string\"==typeof t\u0026\u00260!==t.length){t\u0026\u0026(this.parsedOrigin=(0,ie.D)(t),this.sameOrigin=this.parsedOrigin.sameOrigin);var i=n.generateTracePayload(this.parsedOrigin);if(i\u0026\u0026(i.newrelicHeader||i.traceContextParentHeader))if(e[0]\u0026\u0026e[0].headers)s(e[0].headers,i)\u0026\u0026(this.dt=i);else{var o={};for(var a in r)o[a]=r[a];o.headers=new Headers(r.headers||{}),s(o.headers,i)\u0026\u0026(this.dt=i),e.length\u003e1?e[1]=o:e.push(o)}}function s(e,t){var r=!1;return t.newrelicHeader\u0026\u0026(e.set(\"newrelic\",t.newrelicHeader),r=!0),t.traceContextParentHeader\u0026\u0026(e.set(\"traceparent\",t.traceContextParentHeader),t.traceContextStateHeader\u0026\u0026e.set(\"tracestate\",t.traceContextStateHeader),r=!0),r}}function y(e,t){this.params={},this.metrics={},this.startTime=(0,S.t)(),this.dt=t,e.length\u003e=1\u0026\u0026(this.target=e[0]),e.length\u003e=2\u0026\u0026(this.opts=e[1]);var r,n=this.opts||{},i=this.target;\"string\"==typeof i?r=i:\"object\"==typeof i\u0026\u0026i instanceof le?r=i.url:p.gm?.URL\u0026\u0026\"object\"==typeof i\u0026\u0026i instanceof URL\u0026\u0026(r=i.href),pe(this,r);var o=(\"\"+(i\u0026\u0026i instanceof le\u0026\u0026i.method||n.method||\"GET\")).toUpperCase();this.params.method=o,this.body=n.body,this.txSize=G(n.body)||0}function w(e,t){if(this.endTime=(0,S.t)(),this.params||(this.params={}),(0,ce.iW)(this.params))return;let n;this.params.status=t?t.status:0,\"string\"==typeof this.rxSize\u0026\u0026this.rxSize.length\u003e0\u0026\u0026(n=+this.rxSize);const i={txSize:this.txSize,rxSize:n,duration:(0,S.t)()-this.startTime};r(\"xhr\",[this.params,i,this.startTime,this.endTime,\"fetch\"],this,a.K7.ajax)}function R(e){const t=this.params,n=this.metrics;if(!this.ended){this.ended=!0;for(let t=0;t\u003cde;t++)e.removeEventListener(ue[t],this.listener,!1);t.aborted||(0,ce.iW)(t)||(n.duration=(0,S.t)()-this.startTime,this.loadCazptureCalled||4!==e.readyState?null==t.status\u0026\u0026(t.status=0):T(this,e),n.cbTime=this.cbTime,r(\"xhr\",[t,n,this.startTime,this.endTime,\"xhr\"],this,a.K7.ajax))}}function T(e,r){e.params.status=r.status;var n=function(e,t){var r=e.responseType;return\"json\"===r\u0026\u0026null!==t?t:\"arraybuffer\"===r||\"blob\"===r||\"json\"===r?G(e.response):\"text\"===r||\"\"===r||void 0===r?G(e.responseText):void 0}(r,e.lastSize);if(n\u0026\u0026(e.metrics.rxSize=n),e.sameOrigin){var i=r.getResponseHeader(\"X-NewRelic-App-Data\");i\u0026\u0026((0,x.p)(O.rs,[\"Ajax/CrossApplicationTracing/Header/Seen\"],void 0,a.K7.metrics,t),e.params.cat=i.split(\", \").pop())}e.loadCaptureCalled=!0}t.on(\"new-xhr\",i),t.on(\"open-xhr-start\",o),t.on(\"open-xhr-end\",s),t.on(\"send-xhr-start\",c),t.on(\"xhr-cb-time\",u),t.on(\"xhr-load-added\",d),t.on(\"xhr-load-removed\",l),t.on(\"xhr-resolved\",f),t.on(\"addEventListener-end\",h),t.on(\"removeEventListener-end\",g),t.on(\"fn-end\",v),t.on(\"fetch-before-start\",b),t.on(\"fetch-start\",y),t.on(\"fn-start\",m),t.on(\"fetch-done\",w)}(e,this.ee,this.handler,this.dt),this.importAggregator(e)}}function pe(e,t){var r=(0,ie.D)(t),n=e.params||e;n.hostname=r.hostname,n.port=r.port,n.protocol=r.protocol,n.host=r.hostname+\":\"+r.port,n.pathname=r.pathname,e.parsedOrigin=r,e.sameOrigin=r.sameOrigin}const ge={},me=[\"pushState\",\"replaceState\"];function ve(e){const t=function(e){return(e||B.ee).get(\"history\")}(e);return!p.RI||ge[t.debugId]++||(ge[t.debugId]=1,(0,W.YM)(t).inPlace(window.history,me,\"-\")),t}var be=i(3738);const{He:ye,bD:we,d3:Re,Kp:xe,TZ:Te,Lc:Ae,uP:Ee,Rz:Se}=be;class Ne extends b{static featureName=Te;constructor(e,t=!0){super(e,Te,t);if(!(0,m.V)(this.agentIdentifier))return void this.deregisterDrain();const r=this.ee;let n;ve(r),this.eventsEE=(0,F.u)(r),this.eventsEE.on(Ee,(function(e,t){this.bstStart=(0,S.t)()})),this.eventsEE.on(Ae,(function(e,t){(0,x.p)(\"bst\",[e[0],t,this.bstStart,(0,S.t)()],void 0,a.K7.sessionTrace,r)})),r.on(Se+Re,(function(e){this.time=(0,S.t)(),this.startPath=location.pathname+location.hash})),r.on(Se+xe,(function(e){(0,x.p)(\"bstHist\",[location.pathname+location.hash,this.startPath,this.time],void 0,a.K7.sessionTrace,r)}));try{n=new PerformanceObserver((e=\u003e{const t=e.getEntries();(0,x.p)(ye,[t],void 0,a.K7.sessionTrace,r)})),n.observe({type:we,buffered:!0})}catch(e){}this.importAggregator(e,{resourceObserver:n})}}var Oe=i(2614);class _e extends b{static featureName=t.TZ;#i;#o;constructor(e,r=!0){let n;super(e,t.TZ,r),this.replayRunning=!1,this.#o=e;try{n=JSON.parse(localStorage.getItem(\"\".concat(Oe.H3,\"_\").concat(Oe.uh)))}catch(e){}(0,g.SR)(e.agentIdentifier)\u0026\u0026this.ee.on(t.G4.RECORD,(()=\u003ethis.#a())),this.#s(n)?(this.#i=n?.sessionReplayMode,this.#c()):this.importAggregator(e),this.ee.on(\"err\",(e=\u003e{this.replayRunning\u0026\u0026(this.errorNoticed=!0,(0,x.p)(t.G4.ERROR_DURING_REPLAY,[e],void 0,this.featureName,this.ee))})),this.ee.on(t.G4.REPLAY_RUNNING,(e=\u003e{this.replayRunning=e}))}#s(e){return e\u0026\u0026(e.sessionReplayMode===Oe.g.FULL||e.sessionReplayMode===Oe.g.ERROR)||(0,g.Aw)(this.agentIdentifier)}#u=!1;async#c(e){if(!this.#u){this.#u=!0;try{const{Recorder:t}=await Promise.all([i.e(478),i.e(249)]).then(i.bind(i,8589));this.recorder??=new t({mode:this.#i,agentIdentifier:this.agentIdentifier,trigger:e,ee:this.ee}),this.recorder.startRecording(),this.abortHandler=this.recorder.stopRecording}catch(e){}this.importAggregator(this.#o,{recorder:this.recorder,errorNoticed:this.errorNoticed})}}#a(){this.featAggregate?this.featAggregate.mode!==Oe.g.FULL\u0026\u0026this.featAggregate.initializeRecording(Oe.g.FULL,!0):(this.#i=Oe.g.FULL,this.#c(t.Qb.API),this.recorder\u0026\u0026this.recorder.parent.mode!==Oe.g.FULL\u0026\u0026(this.recorder.parent.mode=Oe.g.FULL,this.recorder.stopRecording(),this.recorder.startRecording(),this.abortHandler=this.recorder.stopRecording))}}var Ie=i(3962);class je extends b{static featureName=Ie.TZ;constructor(e,t=!0){if(super(e,Ie.TZ,t),!p.RI||!(0,R.dV)().o.MO)return;const r=ve(this.ee);Ie.tC.forEach((e=\u003e{(0,A.sp)(e,(e=\u003e{a(e)}),!0)}));const n=()=\u003e(0,x.p)(\"newURL\",[(0,S.t)(),\"\"+window.location],void 0,this.featureName,this.ee);r.on(\"pushState-end\",n),r.on(\"replaceState-end\",n);try{this.removeOnAbort=new AbortController}catch(e){}(0,A.sp)(\"popstate\",(e=\u003e(0,x.p)(\"newURL\",[e.timeStamp,\"\"+window.location],void 0,this.featureName,this.ee)),!0,this.removeOnAbort?.signal);let i=!1;const o=new((0,R.dV)().o.MO)(((e,t)=\u003e{i||(i=!0,requestAnimationFrame((()=\u003e{(0,x.p)(\"newDom\",[(0,S.t)()],void 0,this.featureName,this.ee),i=!1})))})),a=(0,v.s)((e=\u003e{(0,x.p)(\"newUIEvent\",[e],void 0,this.featureName,this.ee),o.observe(document.body,{attributes:!0,childList:!0,subtree:!0,characterData:!0})}),100,{leading:!0});this.abortHandler=function(){this.removeOnAbort?.abort(),o.disconnect(),this.abortHandler=void 0},this.importAggregator(e,{domObserver:o})}}var Pe=i(7378);const Ce={},ke=[\"appendChild\",\"insertBefore\",\"replaceChild\"];function Le(e){const t=function(e){return(e||B.ee).get(\"jsonp\")}(e);if(!p.RI||Ce[t.debugId])return t;Ce[t.debugId]=!0;var r=(0,W.YM)(t),n=/[?\u0026](?:callback|cb)=([^\u0026#]+)/,i=/(.*)\\.([^.]+)/,o=/^(\\w+)(\\.|$)(.*)$/;function a(e,t){if(!e)return t;const r=e.match(o),n=r[1];return a(r[3],t[n])}return r.inPlace(Node.prototype,ke,\"dom-\"),t.on(\"dom-start\",(function(e){!function(e){if(!e||\"string\"!=typeof e.nodeName||\"script\"!==e.nodeName.toLowerCase())return;if(\"function\"!=typeof e.addEventListener)return;var o=(s=e.src,c=s.match(n),c?c[1]:null);var s,c;if(!o)return;var u=function(e){var t=e.match(i);if(t\u0026\u0026t.length\u003e=3)return{key:t[2],parent:a(t[1],window)};return{key:e,parent:window}}(o);if(\"function\"!=typeof u.parent[u.key])return;var d={};function l(){t.emit(\"jsonp-end\",[],d),e.removeEventListener(\"load\",l,(0,A.jT)(!1)),e.removeEventListener(\"error\",f,(0,A.jT)(!1))}function f(){t.emit(\"jsonp-error\",[],d),t.emit(\"jsonp-end\",[],d),e.removeEventListener(\"load\",l,(0,A.jT)(!1)),e.removeEventListener(\"error\",f,(0,A.jT)(!1))}r.inPlace(u.parent,[u.key],\"cb-\",d),e.addEventListener(\"load\",l,(0,A.jT)(!1)),e.addEventListener(\"error\",f,(0,A.jT)(!1)),t.emit(\"new-jsonp\",[e.src],d)}(e[0])})),t}const He={};function De(e){const t=function(e){return(e||B.ee).get(\"promise\")}(e);if(He[t.debugId])return t;He[t.debugId]=!0;var r=t.context,n=(0,W.YM)(t),i=p.gm.Promise;return i\u0026\u0026function(){function e(r){var o=t.context(),a=n(r,\"executor-\",o,null,!1);const s=Reflect.construct(i,[a],e);return t.context(s).getCtx=function(){return o},s}p.gm.Promise=e,Object.defineProperty(e,\"name\",{value:\"Promise\"}),e.toString=function(){return i.toString()},Object.setPrototypeOf(e,i),[\"all\",\"race\"].forEach((function(r){const n=i[r];e[r]=function(e){let i=!1;[...e||[]].forEach((e=\u003e{this.resolve(e).then(a(\"all\"===r),a(!1))}));const o=n.apply(this,arguments);return o;function a(e){return function(){t.emit(\"propagate\",[null,!i],o,!1,!1),i=i||!e}}}})),[\"resolve\",\"reject\"].forEach((function(r){const n=i[r];e[r]=function(e){const r=n.apply(this,arguments);return e!==r\u0026\u0026t.emit(\"propagate\",[e,!0],r,!1,!1),r}})),e.prototype=i.prototype;const o=i.prototype.then;i.prototype.then=function(...e){var i=this,a=r(i);a.promise=i,e[0]=n(e[0],\"cb-\",a,null,!1),e[1]=n(e[1],\"cb-\",a,null,!1);const s=o.apply(this,e);return a.nextPromise=s,t.emit(\"propagate\",[i,!0],s,!1,!1),s},i.prototype.then[W.Jt]=o,t.on(\"executor-start\",(function(e){e[0]=n(e[0],\"resolve-\",this,null,!1),e[1]=n(e[1],\"resolve-\",this,null,!1)})),t.on(\"executor-err\",(function(e,t,r){e[1](r)})),t.on(\"cb-end\",(function(e,r,n){t.emit(\"propagate\",[n,!0],this.nextPromise,!1,!1)})),t.on(\"propagate\",(function(e,r,n){this.getCtx\u0026\u0026!r||(this.getCtx=function(){if(e instanceof Promise)var r=t.context(e);return r\u0026\u0026r.getCtx?r.getCtx():this})}))}(),t}const Me={},Ke=\"setTimeout\",Ue=\"setInterval\",Ve=\"clearTimeout\",Ge=\"-start\",Fe=[Ke,\"setImmediate\",Ue,Ve,\"clearImmediate\"];function Be(e){const t=function(e){return(e||B.ee).get(\"timer\")}(e);if(Me[t.debugId]++)return t;Me[t.debugId]=1;var r=(0,W.YM)(t);return r.inPlace(p.gm,Fe.slice(0,2),Ke+\"-\"),r.inPlace(p.gm,Fe.slice(2,3),Ue+\"-\"),r.inPlace(p.gm,Fe.slice(3),Ve+\"-\"),t.on(Ue+Ge,(function(e,t,n){e[0]=r(e[0],\"fn-\",null,n)})),t.on(Ke+Ge,(function(e,t,n){this.method=n,this.timerDuration=isNaN(e[1])?0:+e[1],e[0]=r(e[0],\"fn-\",this,n)})),t}const We={};function ze(e){const t=function(e){return(e||B.ee).get(\"mutation\")}(e);if(!p.RI||We[t.debugId])return t;We[t.debugId]=!0;var r=(0,W.YM)(t),n=p.gm.MutationObserver;return n\u0026\u0026(window.MutationObserver=function(e){return this instanceof n?new n(r(e,\"fn-\")):n.apply(this,arguments)},MutationObserver.prototype=n.prototype),t}const{TZ:qe,d3:Ze,Kp:Ye,$p:Xe,wW:Je,e5:Qe,tH:$e,uP:et,rw:tt,Lc:rt}=Pe;class nt extends b{static featureName=qe;constructor(e,t=!0){if(super(e,qe,t),!p.RI)return;try{this.removeOnAbort=new AbortController}catch(e){}let r,n=0;const i=this.ee.get(\"tracer\"),o=Le(this.ee),a=De(this.ee),s=Be(this.ee),c=Z(this.ee),u=this.ee.get(\"events\"),d=ne(this.ee),l=ve(this.ee),f=ze(this.ee);function h(e,t){l.emit(\"newURL\",[\"\"+window.location,t])}function g(){n++,r=window.location.hash,this[et]=(0,S.t)()}function m(){n--,window.location.hash!==r\u0026\u0026h(0,!0);var e=(0,S.t)();this[Qe]=~~this[Qe]+e-this[et],this[rt]=e}function v(e,t){e.on(t,(function(){this[t]=(0,S.t)()}))}this.ee.on(et,g),a.on(tt,g),o.on(tt,g),this.ee.on(rt,m),a.on(Je,m),o.on(Je,m),this.ee.on(\"fn-err\",((...t)=\u003e{t[2]?.__newrelic?.[e.agentIdentifier]||(0,x.p)(\"function-err\",[...t],void 0,this.featureName,this.ee)})),this.ee.buffer([et,rt,\"xhr-resolved\"],this.featureName),u.buffer([et],this.featureName),s.buffer([\"setTimeout\"+Ye,\"clearTimeout\"+Ze,et],this.featureName),c.buffer([et,\"new-xhr\",\"send-xhr\"+Ze],this.featureName),d.buffer([$e+Ze,$e+\"-done\",$e+Xe+Ze,$e+Xe+Ye],this.featureName),l.buffer([\"newURL\"],this.featureName),f.buffer([et],this.featureName),a.buffer([\"propagate\",tt,Je,\"executor-err\",\"resolve\"+Ze],this.featureName),i.buffer([et,\"no-\"+et],this.featureName),o.buffer([\"new-jsonp\",\"cb-start\",\"jsonp-error\",\"jsonp-end\"],this.featureName),v(d,$e+Ze),v(d,$e+\"-done\"),v(o,\"new-jsonp\"),v(o,\"jsonp-end\"),v(o,\"cb-start\"),l.on(\"pushState-end\",h),l.on(\"replaceState-end\",h),window.addEventListener(\"hashchange\",h,(0,A.jT)(!0,this.removeOnAbort?.signal)),window.addEventListener(\"load\",h,(0,A.jT)(!0,this.removeOnAbort?.signal)),window.addEventListener(\"popstate\",(function(){h(0,n\u003e1)}),(0,A.jT)(!0,this.removeOnAbort?.signal)),this.abortHandler=this.#n,this.importAggregator(e)}#n(){this.removeOnAbort?.abort(),this.abortHandler=void 0}}var it=i(3333);class ot extends b{static featureName=it.TZ;constructor(e,t=!0){super(e,it.TZ,t);const r=[e.init.page_action.enabled,e.init.performance.capture_marks,e.init.performance.capture_measures,e.init.user_actions.enabled];p.RI\u0026\u0026e.init.user_actions.enabled\u0026\u0026(it.Zp.forEach((e=\u003e(0,A.sp)(e,(e=\u003e(0,x.p)(\"ua\",[e],void 0,this.featureName,this.ee)),!0))),it.qN.forEach((e=\u003e(0,A.sp)(e,(e=\u003e(0,x.p)(\"ua\",[e],void 0,this.featureName,this.ee)))))),r.some((e=\u003ee))?this.importAggregator(e):this.deregisterDrain()}}var at=i(993),st=i(3785);class ct extends b{static featureName=at.TZ;constructor(e,t=!0){super(e,at.TZ,t);const r=this.ee;this.ee.on(\"wrap-logger-end\",(function([e]){const{level:t,customAttributes:n}=this;(0,st.R)(r,e,n,t)})),this.importAggregator(e)}}new class extends o{constructor(t,r){super(r),p.gm?(this.features={},(0,R.bQ)(this.agentIdentifier,this),this.desiredFeatures=new Set(t.features||[]),this.desiredFeatures.add(w),this.runSoftNavOverSpa=[...this.desiredFeatures].some((e=\u003ee.featureName===a.K7.softNav)),(0,d.j)(this,t,t.loaderType||\"agent\"),this.run()):(0,e.R)(21)}get config(){return{info:this.info,init:this.init,loader_config:this.loader_config,runtime:this.runtime}}run(){try{const t=u(this.agentIdentifier),r=[...this.desiredFeatures];r.sort(((e,t)=\u003ea.P3[e.featureName]-a.P3[t.featureName])),r.forEach((r=\u003e{if(!t[r.featureName]\u0026\u0026r.featureName!==a.K7.pageViewEvent)return;if(this.runSoftNavOverSpa\u0026\u0026r.featureName===a.K7.spa)return;if(!this.runSoftNavOverSpa\u0026\u0026r.featureName===a.K7.softNav)return;const n=function(e){switch(e){case a.K7.ajax:return[a.K7.jserrors];case a.K7.sessionTrace:return[a.K7.ajax,a.K7.pageViewEvent];case a.K7.sessionReplay:return[a.K7.sessionTrace];case a.K7.pageViewTiming:return[a.K7.pageViewEvent];default:return[]}}(r.featureName).filter((e=\u003e!(e in this.features)));n.length\u003e0\u0026\u0026(0,e.R)(36,{targetFeature:r.featureName,missingDependencies:n}),this.features[r.featureName]=new r(this)}))}catch(t){(0,e.R)(22,t);for(const e in this.features)this.features[e].abortHandler?.();const r=(0,R.Zm)();delete r.initializedAgents[this.agentIdentifier]?.api,delete r.initializedAgents[this.agentIdentifier]?.features,delete this.sharedAggregator;return r.ee.get(this.agentIdentifier).abort(),!1}}}({features:[he,w,N,Ne,_e,_,D,ot,ct,je,nt],loaderType:\"spa\"})})()})();\n","testAutomationFlags":{"disableAds":false,"disableIirisAuth":false,"disableWelcomeAd":false,"disableBigskyAd":false,"disableIirisRecommend":false,"disableDcts":false,"disableWeatherWidget":false,"disableCashGrainWidget":false,"disableCommoditiesWidget":false,"disableCaptcha":false,"disableCookieBanner":false,"overrideBrandStyling":"","overrideThemeStyling":""},"configState":{"font":{"primary":{"name":"Montserrat","url":"https://fonts.googleapis.com/css2?family=Montserrat:ital,wght@0,400;0,500;0,600;0,700;1,400;1,500;1,600;1,700\u0026display=swap"},"secondary":{"name":"Montserrat","url":"https://fonts.googleapis.com/css2?family=Montserrat:ital,wght@0,400;0,500;0,600;0,700;1,400;1,500;1,600;1,700\u0026display=swap"}},"theme":"theme1","uiBrand":"informationweek","isMarketsDivision":false,"image":{"brand":"https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/bltc0182b2356ae8eed/64b83949410a1b4c0bd7459b/IW_generic_image.png","contributor":"https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/bltd227769938aa3739/64b55d4d33298f5b051a72d5/Contributor_Avatar.png"},"media":{"brightcoveAccountId":"1568176135"},"newsletterSignupPromo":{"unbounceURL":"https://iw-resources.informationweek.com/c/pubRD.mpl?secure=1\u0026sr=pp\u0026_t=pp:\u0026qf=w_ingg126\u0026ch=iwsite"},"isOneTrustLoaded":false}},"routes/$topic.$slug._index":{"isRequestedByGoogleBot":false,"iirisRecommendationConfig":{"id":"widget-1689347319021","division":"it","brandFamily":"enterpriseit","entityTagBackground":"#333333BF","dateFormat":"Month DD, YYYY","showBy":"","showTime":"","borderRadius":"5","imageWidth":"324","imageHeight":"182","dateTimeBgcolor":"#ffffff","dateTimeFontColor":"#767676","imagePosition":"vertical","dropShadow":"","dateTimeFontsize":"12","entityTagBorderColor":"#333333BF","borderColor":"#e6e6e6","showdate":"","redirectMode":"same","recipe":"related-items"},"template":{"title":"Cybersecurity","categories":[],"categoryDesc":"","variant":"secondary","breadcrumbs":[{"url":"/","title":"Home"},{"title":"Cyber Resilience","url":"/cyber-resilience"},{"title":"Cybersecurity","url":"/cyber-resilience/cybersecurity"}],"newsletterSignUpPromo":{"title":"Never Miss a Beat: Get a snapshot of the issues affecting the IT industry straight to your inbox.","message":"","newsletterId":"blt8d3a84e50fd3381c","buttonText":"SIGN-UP","variant":"vertical","mode":"light"},"pagination":{"totalCount":109,"currentPage":1},"contents":[{"contentType":"Article","thumbnail":{"src":"https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt12e860b21fa7e8d3/673e3b9d1e14c30871e127b2/military_pattern-Desintegrator-alamy.jpg","alt":"military clothing pattern camouflage"},"contributors":[{"name":"David McGuire","link":"/author/david-mcguire","avatar":"https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt91c4ecaadaa91ae5/673e3937f449cea96b6c9f41/David_McGuire_Headshot1.jpg","role":"CEO, SpecterOps"}],"articleName":"Why IT Leaders Should Hire Veterans for Cybersecurity Roles","mobileHeadline":"Why IT Leaders Should Hire Veterans for Cybersecurity Roles ","articleUrl":"/cyber-resilience/why-it-leaders-should-hire-veterans-for-cybersecurity-roles","linkAttrs":{},"listPageUrl":"","date":"Nov 27, 2024","webinarStartTime":"","articleSummary":"Maintaining cybersecurity requires the effort of a team. Veterans are uniquely skilled to operate in this role and bring strengths that meet key industry needs. ","articleBodyJsonSummary":"","variant":"normal","categoryName":"Cyber Resilience","categoryUrl":"/cyber-resilience","timeRead":1,"paidGating":{"paidContent":false,"paidProductTaxonomy":[]},"articleSize":"big"},{"contentType":"Article","thumbnail":{"src":"https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt63431016eb292e37/673caa6d012f52541bdcfd36/cybersecurity-SergeyNivens-adobe-new.jpg","alt":"digital abstract with security locks and words like danger"},"contributors":[{"name":"Dana Simberkoff","link":"/author/dana-simberkoff","avatar":"https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt0221aa47da904b75/673ca7e4905e34f081972fe1/Dana_Simberkoff_Headshot.png","role":" Chief Risk, Privacy, and Information Security Officer, AvePoint"}],"articleName":"Meeting AI Regulations: A Guide for Security Leaders","mobileHeadline":"Meeting AI Regulations: A Guide for Security Leaders ","articleUrl":"/cyber-resilience/meeting-ai-regulations-a-guide-for-security-leaders","linkAttrs":{},"listPageUrl":"","date":"Nov 26, 2024","webinarStartTime":"","articleSummary":"With AI adoption surging, security leaders tackle growing data risks and regulations. CISOs must focus on data management, align with standards, and build security culture. ","articleBodyJsonSummary":"","variant":"normal","categoryName":"Cyber Resilience","categoryUrl":"/cyber-resilience","timeRead":1,"paidGating":{"paidContent":false,"paidProductTaxonomy":[]},"articleSize":"big"},{"contentType":"Article","thumbnail":{"src":"https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/bltd4562d02cb55817f/673e10dc006ff59e6ee82a21/cybersecurityteam_YuriArcurs-AlamyStockPhoto.jpg","alt":"Cybersecurity team with 3d software design for computer."},"contributors":[{"name":"Carrie Pallardy","link":"/author/carrie-pallardy","avatar":"https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blta2ac0cf507deba77/64bf49006c654daed172bbba/CarriePallardy_Head_Shot.gif","role":"Contributing Reporter"}],"articleName":"What Does Enterprise-Wide Cybersecurity Culture Look Like?","mobileHeadline":"What Does Enterprise-Wide Cybersecurity Culture Look Like?","articleUrl":"/cyber-resilience/what-does-enterprise-wide-cybersecurity-culture-look-like-","linkAttrs":{},"listPageUrl":"","date":"Nov 25, 2024","webinarStartTime":"","articleSummary":"Effective cybersecurity doesn’t live within a single team. It is woven throughout the entirety of an enterprise’s culture.","articleBodyJsonSummary":"","variant":"normal","categoryName":"Cyber Resilience","categoryUrl":"/cyber-resilience","timeRead":1,"paidGating":{"paidContent":false,"paidProductTaxonomy":[]},"articleSize":"big"},{"contentType":"Article","thumbnail":{"src":"https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt2ee36708e13d1bde/673f984a9f50470048b0f01e/Microsoftsecurity-SOPA-Alamy.jpg","alt":""},"contributors":[{"name":"Carrie Pallardy","link":"/author/carrie-pallardy","avatar":"https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blta2ac0cf507deba77/64bf49006c654daed172bbba/CarriePallardy_Head_Shot.gif","role":"Contributing Reporter"}],"articleName":"Does the US Government Have a Cybersecurity Monoculture Problem?","mobileHeadline":"Does the US Government Have a Cybersecurity Monoculture Problem?","articleUrl":"/cyber-resilience/does-the-us-government-have-a-cybersecurity-monoculture-problem-","linkAttrs":{},"listPageUrl":"","date":"Nov 21, 2024","webinarStartTime":"","articleSummary":"A recent ProPublica report dives into the way Microsoft provided its services to upgrade the government’s cybersecurity.","articleBodyJsonSummary":"","variant":"normal","categoryName":"Cyber Resilience","categoryUrl":"/cyber-resilience","timeRead":1,"paidGating":{"paidContent":false,"paidProductTaxonomy":[]},"articleSize":"big"},{"contentType":"Article","thumbnail":{"src":"https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt0f90a5e8f8dfebfe/67378f3b5e7baf08b4f0b382/cybersecurity_skull-Nina_Shatirishvili_-alamy.jpg","alt":"Binary Code With Skull and Crossbones, Representing A Computer Virus Or Malware attack -"},"contributors":[{"name":"Max Vetter","link":"/author/max-vetter","avatar":"https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt07968c0bf3c43350/67378c4c3535773a9dea4f23/max_vetter.jpg","role":"VP of Cyber, Immersive Labs"}],"articleName":"Cyber Awareness Is a Joke: Here’s How to Actually Prepare for Attacks","mobileHeadline":"Cyber Awareness Is a Joke: Here’s How to Actually Prepare for Attacks ","articleUrl":"/cyber-resilience/cyber-awareness-is-a-joke-here-s-how-to-actually-prepare-for-attacks","linkAttrs":{},"listPageUrl":"","date":"Nov 21, 2024","webinarStartTime":"","articleSummary":"Traditional cyber training provides a false sense of security for organizations, as success is determined by test completion rather than capability. Cyber drills and exercises aren’t optional -- they’re essential. ","articleBodyJsonSummary":"","variant":"normal","categoryName":"Cyber Resilience","categoryUrl":"/cyber-resilience","timeRead":1,"paidGating":{"paidContent":false,"paidProductTaxonomy":[]},"articleSize":"big"},{"contentType":"Article","thumbnail":{"src":"https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt0bf2bba9f29000a2/673df900625fb93ca33e421d/dhs-logo_GK_Images_alamy.jpg","alt":"US Department of Homeland Security Logo"},"contributors":[{"name":"Dark Reading","link":"/author/dark-reading","avatar":"https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt9b8ea0e8a04b43eb/650c9551fe6e6b248b4df476/285801_DR23_Graphics_Website_Author_Logo_0.jpg","role":"Staff \u0026 Contributors"}],"articleName":"DHS Releases Secure AI Framework for Critical Infrastructure","mobileHeadline":"DHS Releases Secure AI Framework for Critical Infrastructure","articleUrl":"/cyber-resilience/dhs-releases-secure-ai-framework-for-critical-infrastructure","linkAttrs":{},"listPageUrl":"","date":"Nov 21, 2024","webinarStartTime":"","articleSummary":"The voluntary recommendations from the Department of Homeland Security cover how artificial intelligence should be used in the power grid, water system, air travel network, healthcare, and other pieces of critical infrastructure.","articleBodyJsonSummary":"","variant":"normal","categoryName":"Cyber Resilience","categoryUrl":"/cyber-resilience","timeRead":1,"paidGating":{"paidContent":false,"paidProductTaxonomy":[]},"articleSize":"big"},{"contentType":"Article","thumbnail":{"src":"https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt976ce52f1cfd0dc2/67376e6ed415b349d98bd337/cloud-YAY_Media_AS_-alamy.jpg","alt":"cloud computing background"},"contributors":[{"name":"Lisa Morgan","link":"/author/lisa-morgan","avatar":"https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt55c84ed4ee6ab7f9/66c4ed22992f7282278db37f/Lisa_Morgan_new_photo.jpg","role":"Freelance Writer"}],"articleName":"6 Cloud Trends to Watch in 2025","mobileHeadline":"6 Cloud Trends to Watch in 2025 ","articleUrl":"/it-infrastructure/6-cloud-trends-to-watch-in-2025","linkAttrs":{},"listPageUrl":"","date":"Nov 18, 2024","webinarStartTime":"","articleSummary":"Cloud strategies continue to shift as organizations utilize more services. AI is one of the biggest drivers. ","articleBodyJsonSummary":"","variant":"normal","categoryName":"IT Infrastructure","categoryUrl":"/it-infrastructure","timeRead":1,"paidGating":{"paidContent":false,"paidProductTaxonomy":[]},"articleSize":"big"},{"contentType":"Article","thumbnail":{"src":"https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt2f56fcbcc16d26da/67366cf18df9b3ded5aa6711/WhiteHouse_TheProtectedArtArchive-AlamyStockPhoto.jpg","alt":"White House"},"contributors":[{"name":"Carrie Pallardy","link":"/author/carrie-pallardy","avatar":"https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blta2ac0cf507deba77/64bf49006c654daed172bbba/CarriePallardy_Head_Shot.gif","role":"Contributing Reporter"}],"articleName":"What Could the Trump Administration Mean for Cybersecurity?","mobileHeadline":"What Could the Trump Administration Mean for Cybersecurity?","articleUrl":"/cyber-resilience/what-could-the-trump-administration-mean-for-cybersecurity-","linkAttrs":{},"listPageUrl":"","date":"Nov 14, 2024","webinarStartTime":"","articleSummary":"The incoming Trump administration has the potential to make big waves in the cybersecurity space.","articleBodyJsonSummary":"","variant":"normal","categoryName":"Cyber Resilience","categoryUrl":"/cyber-resilience","timeRead":1,"paidGating":{"paidContent":false,"paidProductTaxonomy":[]},"articleSize":"big"},{"contentType":"Article","thumbnail":{"src":"https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt7f03e5863a184ce8/672e6e049fcdcd592a5ff8ee/Shadow-Elly_Miller-alamy.jpg","alt":"shadow of a hand on a grey wall"},"contributors":[{"name":"Mario Platt","link":"/author/mario-platt","avatar":"https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt5a596288167f91e7/672e6c4f6b2961f3157b644c/Mario_Platt_Image_(002).jpeg","role":"Vice President and CISO, LastPass"}],"articleName":"Shedding Light on Your Shadow IT","mobileHeadline":"Shedding Light on Your Shadow IT ","articleUrl":"/cyber-resilience/shedding-light-on-your-shadow-it","linkAttrs":{},"listPageUrl":"","date":"Nov 14, 2024","webinarStartTime":"","articleSummary":"Effective management of shadow IT calls for a combination of strong technical measures and cultivating a culture of security awareness, thereby reducing the risks associated with unapproved tools and services. ","articleBodyJsonSummary":"","variant":"normal","categoryName":"Cyber Resilience","categoryUrl":"/cyber-resilience","timeRead":1,"paidGating":{"paidContent":false,"paidProductTaxonomy":[]},"articleSize":"big"},{"contentType":"Article","thumbnail":{"src":"https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt2682c76dd3de6eb9/67321fdcfdb3ea33337e2b5b/Frustrated(1800)_Maskot_Alamy.jpg","alt":"frustrated business person on the phone"},"contributors":[{"name":"Dark Reading","link":"/author/dark-reading","avatar":"https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt9b8ea0e8a04b43eb/650c9551fe6e6b248b4df476/285801_DR23_Graphics_Website_Author_Logo_0.jpg","role":"Staff \u0026 Contributors"}],"articleName":"How Developers Drive Security Professionals Crazy","mobileHeadline":"How Developers Drive Security Professionals Crazy","articleUrl":"/cyber-resilience/how-developers-drive-security-professionals-crazy","linkAttrs":{},"listPageUrl":"","date":"Nov 14, 2024","webinarStartTime":"","articleSummary":"The journey toward a successful DevSecOps implementation is complex, requiring a strategic approach to overcome the myriad challenges it presents.","articleBodyJsonSummary":"","variant":"normal","categoryName":"Cyber Resilience","categoryUrl":"/cyber-resilience","timeRead":1,"paidGating":{"paidContent":false,"paidProductTaxonomy":[]},"articleSize":"big"},{"contentType":"Video","thumbnail":{"src":"https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/bltac16c1f2d82605a8/6735125d3509810e9f88f1b6/AI_Risk_Assessment_Brain_light_via_Alamy_Stock.jpg","alt":"Evil Robot Concept and rogue AI risk as robots gone bad."},"contributors":[{"name":"Brandon Taylor","link":"/author/brandon-taylor","avatar":"https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt15232db5d2321c39/64bf5c007b352808e9c5a64e/BrandonTaylorHeadshot1.jpg","role":"Digital Editorial Program Manager"}],"articleName":"Inside The Duality of AI's Superpowers","mobileHeadline":"Inside The Duality of AI's Superpowers","articleUrl":"/machine-learning-ai/inside-the-duality-of-ai-s-superpowers","linkAttrs":{},"listPageUrl":"/videos","date":"Nov 14, 2024","webinarStartTime":"","articleSummary":"This session weighs the benefits of AI versus the risks and explores pathways to begin your AI risk assessment.","articleBodyJsonSummary":"","variant":"normal","categoryName":"Machine Learning \u0026 AI","categoryUrl":"/machine-learning-ai","timeRead":5,"paidGating":{"paidContent":false,"paidProductTaxonomy":[]},"articleSize":"big"},{"contentType":"Article","thumbnail":{"src":"https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt44f803258d7dbf67/67321dc446f258cf3bbd92bf/magnifying_glass-canbedone-alamy.jpg","alt":"magnifying glass over digital backdrop"},"contributors":[{"name":"Network Computing","link":"/author/network-computing","avatar":"https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt08cc37c4d59bc6be/64bee8d7a166134a3526acb8/NWC_Favicon.png","role":"Contributor"}],"articleName":"How Digital Fraud Has Evolved: Key Takeaways for CISOs","mobileHeadline":"How Digital Fraud Has Evolved: Key Takeaways for CISOs","articleUrl":"/cyber-resilience/how-digital-fraud-has-evolved-key-takeaways-for-cisos","linkAttrs":{},"listPageUrl":"","date":"Nov 13, 2024","webinarStartTime":"","articleSummary":"Regular training, robust fraud detection systems, and a culture of vigilance are key to combating digital fraud these days.","articleBodyJsonSummary":"","variant":"normal","categoryName":"Cyber Resilience","categoryUrl":"/cyber-resilience","timeRead":1,"paidGating":{"paidContent":false,"paidProductTaxonomy":[]},"articleSize":"big"},{"contentType":"Article","thumbnail":{"src":"https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt3d4cea418c977268/672cfdad3a7bf19f1d9eaa5e/ThreatLocker_Danny_Jenkins_Headshot.png","alt":""},"contributors":[{"name":"Shane Snider","link":"/author/shane-snider","avatar":"https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/bltf4de7e5784b276a0/650d8d5ffac8e1d4a1f21f76/Shane_Snider_Profile.jpg","role":"Senior Writer, InformationWeek"}],"articleName":"ThreatLocker CEO Talks Supply Chain Risk, AI’s Cybersecurity Role, and Fear","mobileHeadline":"ThreatLocker CEO Talks Supply Chain Risk, AI’s Cybersecurity Role, and Fear","articleUrl":"/cyber-resilience/threatlocker-ceo-talks-supply-chain-risk-ai-s-cybersecurity-role-and-fear","linkAttrs":{},"listPageUrl":"","date":"Nov 7, 2024","webinarStartTime":"","articleSummary":"The security endpoint and zero-trust firm looks toward the future with an eye on AI possibilities -- both on the security side and on the threat side. ","articleBodyJsonSummary":"","variant":"normal","categoryName":"Cyber Resilience","categoryUrl":"/cyber-resilience","timeRead":1,"paidGating":{"paidContent":false,"paidProductTaxonomy":[]},"articleSize":"big"},{"contentType":"Article","thumbnail":{"src":"https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/bltcb47b7bc18b7886a/67250cadf8dd5dee1b0c0a8e/fake-designer491_-alamy.jpg","alt":"Plates Fact and Fake. Fake news concept."},"contributors":[{"name":"Matt Lindley","link":"/author/matt-lindley","avatar":"https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt067bca7a46b0e1b0/672505271a8879e435720372/Matt_Lindley_Headshot_(002).jpg","role":"COO and CISO, Ninjio"}],"articleName":"How ‘Cheap Fakes’ Exploit Our Psychological Vulnerabilities","mobileHeadline":"How ‘Cheap Fakes’ Exploit Our Psychological Vulnerabilities ","articleUrl":"/cyber-resilience/how-cheap-fakes-exploit-our-psychological-vulnerabilities","linkAttrs":{},"listPageUrl":"","date":"Nov 7, 2024","webinarStartTime":"","articleSummary":"Cheap fakes pose a serious cybersecurity threat. By manipulating existing media, cybercriminals can easily trick victims and spread misinformation. ","articleBodyJsonSummary":"","variant":"normal","categoryName":"Cyber Resilience","categoryUrl":"/cyber-resilience","timeRead":1,"paidGating":{"paidContent":false,"paidProductTaxonomy":[]},"articleSize":"big"},{"contentType":"Article","thumbnail":{"src":"https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt57b97f3549c8af5c/6728ee3735a2cddc297056e0/CISO(1800)_Borka_Kiss_Alamy.jpg","alt":"acronym CISO on a digital background"},"contributors":[{"name":"Dark Reading","link":"/author/dark-reading","avatar":"https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt9b8ea0e8a04b43eb/650c9551fe6e6b248b4df476/285801_DR23_Graphics_Website_Author_Logo_0.jpg","role":"Staff \u0026 Contributors"}],"articleName":"How to Find the Right CISO","mobileHeadline":"How to Find the Right CISO","articleUrl":"/cybersecurity/how-to-find-the-right-ciso","linkAttrs":{},"listPageUrl":"","date":"Nov 7, 2024","webinarStartTime":"","articleSummary":"Great CISOs are in short supply, so choose wisely. Here are five ways to make sure you've made the right pick.","articleBodyJsonSummary":"","variant":"normal","categoryName":"Cybersecurity","categoryUrl":"/cyber-resilience/cybersecurity","timeRead":1,"paidGating":{"paidContent":false,"paidProductTaxonomy":[]},"articleSize":"big"},{"contentType":"Article","thumbnail":{"src":"https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt5d11550a05f78c55/672100240aea3be9e788bb31/neuralnetwork_Wirestock-AlamyStockPhoto.jpg","alt":"A female clicking on futuristic neural network"},"contributors":[{"name":"Carrie Pallardy","link":"/author/carrie-pallardy","avatar":"https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blta2ac0cf507deba77/64bf49006c654daed172bbba/CarriePallardy_Head_Shot.gif","role":"Contributing Reporter"}],"articleName":"Letting Neurodiverse Talent Shine in Cybersecurity","mobileHeadline":"Letting Neurodiverse Talent Shine in Cybersecurity","articleUrl":"/it-leadership/letting-neurodiverse-talent-shine-in-cybersecurity","linkAttrs":{},"listPageUrl":"","date":"Nov 6, 2024","webinarStartTime":"","articleSummary":"Neurodiversity is increasingly recognized as an asset in cybersecurity, but how can enterprises best attract and support neurodiverse talent?","articleBodyJsonSummary":"","variant":"normal","categoryName":"IT Leadership","categoryUrl":"/it-leadership","timeRead":1,"paidGating":{"paidContent":false,"paidProductTaxonomy":[]},"articleSize":"big"},{"contentType":"Article","thumbnail":{"src":"https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/bltc46f8d5e435f637b/6720f1b3dd4fd46017159b3a/digitalIranflag_PantherMediaGmbH-AlamyStockPhoto.jpg","alt":""},"contributors":[{"name":"Carrie Pallardy","link":"/author/carrie-pallardy","avatar":"https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blta2ac0cf507deba77/64bf49006c654daed172bbba/CarriePallardy_Head_Shot.gif","role":"Contributing Reporter"}],"articleName":"Iranian Threat Actors Ramp Up Ransomware, Cyber Activity","mobileHeadline":"Iranian Threat Actors Ramp Up Ransomware, Cyber Activity","articleUrl":"/cyber-resilience/iranian-threat-actors-ramp-up-ransomware-cyber-activity","linkAttrs":{},"listPageUrl":"","date":"Nov 5, 2024","webinarStartTime":"","articleSummary":"As US government agencies warn of Iran-based threat actor activity, how can enterprise leaders manage their risks?","articleBodyJsonSummary":"","variant":"normal","categoryName":"Cyber Resilience","categoryUrl":"/cyber-resilience","timeRead":1,"paidGating":{"paidContent":false,"paidProductTaxonomy":[]},"articleSize":"big"},{"contentType":"Article","thumbnail":{"src":"https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt7598ddc228751a79/67224090fd841ec8017a05b8/cloud-pixabay.png","alt":"two cloud cutouts in black sky"},"contributors":[{"name":"Manju Naglapur","link":"/author/manju-naglapur","avatar":"https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt46c86e69397a043e/67223e4d33bb3c689856181b/manju-naglapur-1530x1005.jpg","role":"SVP and General Manager, Unisys "}],"articleName":"5 Tips for Balancing Cost and Security in Cloud Adoption","mobileHeadline":"5 Tips for Balancing Cost and Security in Cloud Adoption","articleUrl":"/it-infrastructure/5-tips-for-balancing-cost-and-security-in-cloud-adoption","linkAttrs":{},"listPageUrl":"","date":"Nov 4, 2024","webinarStartTime":"","articleSummary":"Cloud adoption offers opportunities for cost savings scaling, but it is critical businesses balance these benefits with robust security measures to avoid potential risks. ","articleBodyJsonSummary":"","variant":"normal","categoryName":"IT Infrastructure","categoryUrl":"/it-infrastructure","timeRead":1,"paidGating":{"paidContent":false,"paidProductTaxonomy":[]},"articleSize":"big"},{"contentType":"Article","thumbnail":{"src":"https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt0801b8db3eb68598/6720ea682c2ff90483b56e89/swamp-alligator-Meghan_Gaspar-McCarthy_from_Pixabay_1280.jpg","alt":"alligator in swamp water"},"contributors":[{"name":"Robin Das","link":"/author/robin-das","avatar":"https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt4c0b409a1c495268/6720ec79674e13779350fb48/Robin_Das_Exec_Dir_Market_Growth_Strategy_(2).png","role":"Executive Director, DataBee"}],"articleName":"Is Your Data Lake Becoming a Swamp? Keep that Lake Clean","mobileHeadline":"Is Your Data Lake Becoming a Swamp? Keep that Lake Clean","articleUrl":"/data-management/is-your-data-lake-becoming-a-swamp-keep-that-lake-clean-","linkAttrs":{},"listPageUrl":"","date":"Nov 1, 2024","webinarStartTime":"","articleSummary":"Understanding past mistakes that organizations have made with their data can play a key role. Taking an actionable, aware approach to this process can help set your organization up for success. ","articleBodyJsonSummary":"","variant":"normal","categoryName":"Data Management","categoryUrl":"/data-management","timeRead":1,"paidGating":{"paidContent":false,"paidProductTaxonomy":[]},"articleSize":"big"},{"contentType":"Slideshow","thumbnail":{"src":"https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/bltdec2ad3a4261ccc9/671bdbf81e8517688efe1954/halloweenhand-Brain_light-alamy.jpg","alt":"Halloween monster night poster and Autumn party background with a scary zombie hand with a yellow moon glowing"},"contributors":[{"name":"Pam Baker","link":"/author/pam-baker","avatar":"https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blta2c974464f9d8086/64bc0833691b1233dc5fefd2/Pam-Baker.png","role":"Contributing Writer"}],"articleName":"2024 Halloween Frights in Tech","mobileHeadline":"2024 Halloween Frights in Tech","articleUrl":"/cyber-resilience/2024-halloween-frights-in-tech","linkAttrs":{},"listPageUrl":"/slideshows","date":"Oct 31, 2024","webinarStartTime":"","articleSummary":"This is not about your childhood-hunkered-by-the-campfire scary stories. These are the getcha, gotcha, gut-clenching tales of a truly terrifying time.","articleBodyJsonSummary":"","variant":"normal","categoryName":"Cyber Resilience","categoryUrl":"/cyber-resilience","timeRead":10,"paidGating":{"paidContent":false,"paidProductTaxonomy":[]},"articleSize":"big"},{"contentType":"Article","thumbnail":{"src":"https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt48b432feba9cdb54/671f9eb9ce342e100d74fa38/business_people_serious-Aleksei_Gorodenkov_alamy.jpg","alt":"Serious People Negotiating in Conference Room"},"contributors":[{"name":"Stefan Voss","link":"/author/stefan-voss","avatar":"https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt8222bac38b9adcd7/671f98dd29bb8879286ac631/Stefan_Voss.jpg","role":"VP of Product, Cove Data Protection"}],"articleName":"What Military Wargames Can Teach Us About Cybersecurity","mobileHeadline":"What Military Wargames Can Teach Us About Cybersecurity ","articleUrl":"/cyber-resilience/what-military-wargames-can-teach-us-about-cybersecurity","linkAttrs":{},"listPageUrl":"","date":"Oct 31, 2024","webinarStartTime":"","articleSummary":"Tabletop wargaming identifies weaknesses, refines strategies, and trains teams to make quick, informed decisions during the crucial first 24-48 hours of a crisis. ","articleBodyJsonSummary":"","variant":"normal","categoryName":"Cyber Resilience","categoryUrl":"/cyber-resilience","timeRead":1,"paidGating":{"paidContent":false,"paidProductTaxonomy":[]},"articleSize":"big"},{"contentType":"Article","thumbnail":{"src":"https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt214d1816c7d0f46c/671fa236a93995afbd90faff/KanawatTH-green-energy-security-shutterstock.jpg","alt":"green earth overlaid on fields with wind turbines"},"contributors":[{"name":"Dark Reading","link":"/author/dark-reading","avatar":"https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt9b8ea0e8a04b43eb/650c9551fe6e6b248b4df476/285801_DR23_Graphics_Website_Author_Logo_0.jpg","role":"Staff \u0026 Contributors"}],"articleName":"Cybersecurity Isn't Easy When You're Trying to Be Green","mobileHeadline":"Cybersecurity Isn't Easy When You're Trying to Be Green","articleUrl":"/sustainability/cybersecurity-isn-t-easy-when-you-re-trying-to-be-green","linkAttrs":{},"listPageUrl":"","date":"Oct 31, 2024","webinarStartTime":"","articleSummary":"Renewable energy firms deal with a large cyberattack surface area, given the distributed nature of power generation and more pervasive connectivity.","articleBodyJsonSummary":"","variant":"normal","categoryName":"Sustainability","categoryUrl":"/sustainability","timeRead":1,"paidGating":{"paidContent":false,"paidProductTaxonomy":[]},"articleSize":"big"},{"contentType":"Podcast","thumbnail":{"src":"https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/bltdfaf4c9b4480a8e7/671be12084b58df2a8f0e1a2/maskedhacktavist_AlekseiGorodenkov-AlamyStockPhoto.jpg","alt":""},"contributors":[{"name":"Joao-Pierre S. Ruth","link":"/author/joao-pierre-s-ruth","avatar":"https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt7f004b6f174043df/67460618a8aa13b634af5c6c/Headshot2024-edited.jpg","role":"Senior Editor"}],"articleName":"Beyond the Election: The Long Cybersecurity Fight vs Bad Actors","mobileHeadline":"Beyond the Election: The Long Cybersecurity Fight vs Bad Actors","articleUrl":"/cyber-resilience/beyond-the-election-the-long-cybersecurity-fight-vs-bad-actors","linkAttrs":{},"listPageUrl":"/podcasts","date":"Oct 28, 2024","webinarStartTime":"","articleSummary":"How should organizations orient their cybersecurity and defenses for the post-election landscape? What long-term threats, from misinformation to data breaches, will remain?","articleBodyJsonSummary":"","variant":"normal","categoryName":"Cyber Resilience","categoryUrl":"/cyber-resilience","timeRead":38,"paidGating":{"paidContent":false,"paidProductTaxonomy":[]},"articleSize":"big"},{"contentType":"Video","thumbnail":{"src":"https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blted8d9ef4c5adc333/671cf0abdae4ebcf28036c1a/Cloud_Computing_Kiyoshi_Takahase_Segundo_via_Alamy_Stock.jpg","alt":"Concept of cloud computing"},"contributors":[{"name":"Brandon Taylor","link":"/author/brandon-taylor","avatar":"https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt15232db5d2321c39/64bf5c007b352808e9c5a64e/BrandonTaylorHeadshot1.jpg","role":"Digital Editorial Program Manager"}],"articleName":"Curtail Cloud Spend With These Strategies","mobileHeadline":"Curtail Cloud Spend With These Strategies","articleUrl":"/it-leadership/curtail-cloud-spend-with-these-strategies-","linkAttrs":{},"listPageUrl":"/videos","date":"Oct 26, 2024","webinarStartTime":"","articleSummary":"This session explores the “cloud paradox,” focusing on optimizing cloud usage to save costs while integrating security.","articleBodyJsonSummary":"","variant":"normal","categoryName":"IT Leadership","categoryUrl":"/it-leadership","timeRead":5,"paidGating":{"paidContent":false,"paidProductTaxonomy":[]},"articleSize":"big"},{"contentType":"Article","thumbnail":{"src":"https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt2e504e1eb5fa2747/65c2487f86cf3e040a3aa0d1/deepfakes-Bildagentur-online_-alamy.jpg","alt":"close up of an eye with digital background"},"contributors":[{"name":"Christophe Van de Weyer","link":"/author/christophe-van-de-weyer","avatar":"https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt707b50429e87210c/671660a27edd3d6332fa62cc/Christophe_Van_de_Weyer.jpeg","role":"CEO, Telesign"}],"articleName":"AI Manipulation Threatens the Bonds of Our Digital World","mobileHeadline":"AI Manipulation Threatens the Bonds of Our Digital World ","articleUrl":"/cyber-resilience/ai-manipulation-threatens-the-bonds-of-our-digital-world","linkAttrs":{},"listPageUrl":"","date":"Oct 25, 2024","webinarStartTime":"","articleSummary":"AI-generated deepfakes pose significant risks to election integrity, public trust, and global institutions, as seen with recent high-profile cases involving political figures and international organizations. ","articleBodyJsonSummary":"","variant":"normal","categoryName":"Cyber Resilience","categoryUrl":"/cyber-resilience","timeRead":1,"paidGating":{"paidContent":false,"paidProductTaxonomy":[]},"articleSize":"big"},{"contentType":"Article","thumbnail":{"src":"https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/bltb37a710c162f2ab3/6719499148c8ca6110269453/InternetData_protection-ZoonarGmbH-AlamyStockPhoto.jpg","alt":"Internet Data Protection"},"contributors":[{"name":"Carrie Pallardy","link":"/author/carrie-pallardy","avatar":"https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blta2ac0cf507deba77/64bf49006c654daed172bbba/CarriePallardy_Head_Shot.gif","role":"Contributing Reporter"}],"articleName":"Internet Archive Cyberattack Saga Continues","mobileHeadline":"Internet Archive Cyberattack Saga Continues ","articleUrl":"/cyber-resilience/internet-archive-cyberattack-saga-continues","linkAttrs":{},"listPageUrl":"","date":"Oct 24, 2024","webinarStartTime":"","articleSummary":"The nonprofit suffered a series of successive cyberattacks, and it has yet to fully recover.","articleBodyJsonSummary":"","variant":"normal","categoryName":"Cyber Resilience","categoryUrl":"/cyber-resilience","timeRead":1,"paidGating":{"paidContent":false,"paidProductTaxonomy":[]},"articleSize":"big"},{"contentType":"Article","thumbnail":{"src":"https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt5820554609f8638f/66e49b83efb9960ddb888e40/cybersecurity-Stu_Gray-alamy.jpg","alt":"security lock on a screen"},"contributors":[{"name":"Akhil Mittal","link":"/author/akhil-mittal","avatar":"https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt3b4d9cfdf06067c2/671126371bb940228439e245/Akhil_Mitta.jpg","role":"Senior Manager, Synopsys"}],"articleName":"Overconfidence in Cybersecurity: A Hidden Risk","mobileHeadline":"Overconfidence in Cybersecurity: A Hidden Risk ","articleUrl":"/cyber-resilience/overconfidence-in-cybersecurity-a-hidden-risk","linkAttrs":{},"listPageUrl":"","date":"Oct 24, 2024","webinarStartTime":"","articleSummary":"Overconfidence in cybersecurity leaves companies exposed. Staying ahead of evolving threats means streamlining your tools and regularly reassessing your strategy. ","articleBodyJsonSummary":"","variant":"normal","categoryName":"Cyber Resilience","categoryUrl":"/cyber-resilience","timeRead":1,"paidGating":{"paidContent":false,"paidProductTaxonomy":[]},"articleSize":"big"},{"contentType":"Article","thumbnail":{"src":"https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/bltbc4738c66d611fbf/66a1243e5cc53e07a2cee6d1/privacy-Skorzewiak-alamy.jpg","alt":"digital eye"},"contributors":[{"name":"Dark Reading","link":"/author/dark-reading","avatar":"https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt9b8ea0e8a04b43eb/650c9551fe6e6b248b4df476/285801_DR23_Graphics_Website_Author_Logo_0.jpg","role":"Staff \u0026 Contributors"}],"articleName":"Is a CPO Still a CPO? The Evolving Role of Privacy Leadership","mobileHeadline":"Is a CPO Still a CPO? The Evolving Role of Privacy Leadership","articleUrl":"/cyber-resilience/is-a-cpo-still-a-cpo-the-evolving-role-of-privacy-leadership","linkAttrs":{},"listPageUrl":"","date":"Oct 24, 2024","webinarStartTime":"","articleSummary":"Has the role of chief privacy officer become something more than it was? And is it still a role that just one person can handle?","articleBodyJsonSummary":"","variant":"normal","categoryName":"Cyber Resilience","categoryUrl":"/cyber-resilience","timeRead":1,"paidGating":{"paidContent":false,"paidProductTaxonomy":[]},"articleSize":"big"},{"contentType":"Video","thumbnail":{"src":"https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/bltf0ddbfab60c3a022/664b858294a678943b5fe046/Cybersecurity-STU_GRAY_VIA_ALAMY_STOCK.jpg","alt":""},"contributors":[],"articleName":"Fast Chat: Multicloud Complexity Demands New Levels of Security Visibility","mobileHeadline":"Fast Chat: Multicloud Complexity Demands New Levels of Security Visibility","articleUrl":"/cyber-resilience/fast-chat-multicloud-complexity-demands-new-levels-of-security-visibility","linkAttrs":{},"listPageUrl":"/videos","date":"Oct 21, 2024","webinarStartTime":"","articleSummary":"A snapshot on multicloud security and some of the common challenges that prevent companies from optimizing their security posture and rapidly detecting and remediating threats.","articleBodyJsonSummary":"","variant":"normal","categoryName":"Sponsored Content","categoryUrl":"#","timeRead":19,"paidGating":{"paidContent":false,"paidProductTaxonomy":[]},"articleSize":"big"},{"contentType":"Article","thumbnail":{"src":"https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt467f85df3b3f19c3/670fe73280529a407971472f/Cloud(1800)_John_Williams_RF_Alamy.jpg","alt":"clouds in the sky with silver locks floating across"},"contributors":[{"name":"Dark Reading","link":"/author/dark-reading","avatar":"https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt9b8ea0e8a04b43eb/650c9551fe6e6b248b4df476/285801_DR23_Graphics_Website_Author_Logo_0.jpg","role":"Staff \u0026 Contributors"}],"articleName":"Navigating the Complexities and Security Risks of Multi-Cloud Management","mobileHeadline":"Navigating the Complexities and Security Risks of Multi-Cloud Management","articleUrl":"/cyber-resilience/navigating-the-complexities-and-security-risks-of-multi-cloud-management","linkAttrs":{},"listPageUrl":"","date":"Oct 21, 2024","webinarStartTime":"","articleSummary":"Businesses that successfully manage the complexities of multi-cloud management will be best positioned to thrive in an increasingly digital and interconnected world.","articleBodyJsonSummary":"","variant":"normal","categoryName":"Cyber Resilience","categoryUrl":"/cyber-resilience","timeRead":1,"paidGating":{"paidContent":false,"paidProductTaxonomy":[]},"articleSize":"big"},{"contentType":"Article","thumbnail":{"src":"https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt64018c8375f96308/67112a71a792d27ff40ad700/chpt11bankruptcy_designer491-AlamyStockPhoto.jpg","alt":"Man holds Bankruptcy Chapter 11 agreement documents."},"contributors":[{"name":"Carrie Pallardy","link":"/author/carrie-pallardy","avatar":"https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blta2ac0cf507deba77/64bf49006c654daed172bbba/CarriePallardy_Head_Shot.gif","role":"Contributing Reporter"}],"articleName":"Big Breach Sends National Public Data to Bankruptcy","mobileHeadline":"Big Breach Sends National Public Data to Bankruptcy","articleUrl":"/cyber-resilience/big-breach-sends-national-public-data-to-bankruptcy","linkAttrs":{},"listPageUrl":"","date":"Oct 17, 2024","webinarStartTime":"","articleSummary":"Following a data breach and its fallout, data broker National Public Data files for Chapter 11 bankruptcy.","articleBodyJsonSummary":"","variant":"normal","categoryName":"Cyber Resilience","categoryUrl":"/cyber-resilience","timeRead":1,"paidGating":{"paidContent":false,"paidProductTaxonomy":[]},"articleSize":"big"},{"contentType":"Article","thumbnail":{"src":"https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt263ddb45d8d166ac/6703ff67b2d4a43a52cea205/2FWP9E1.jpg","alt":"The words security gap on missing puzzle piece with a magnifying glass."},"contributors":[{"name":"Lisa Morgan","link":"/author/lisa-morgan","avatar":"https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt55c84ed4ee6ab7f9/66c4ed22992f7282278db37f/Lisa_Morgan_new_photo.jpg","role":"Freelance Writer"}],"articleName":"Security at the Edge Needs More Attention","mobileHeadline":"Security at the Edge Needs More Attention ","articleUrl":"/cyber-resilience/security-at-the-edge-needs-more-attention","linkAttrs":{},"listPageUrl":"","date":"Oct 17, 2024","webinarStartTime":"","articleSummary":"More cybersecurity tools and workforce training are a must as threats and technology continue to evolve. But even then, security holes persist. ","articleBodyJsonSummary":"","variant":"normal","categoryName":"Cyber Resilience","categoryUrl":"/cyber-resilience","timeRead":1,"paidGating":{"paidContent":false,"paidProductTaxonomy":[]},"articleSize":"big"},{"contentType":"Article","thumbnail":{"src":"https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt65fad349048ae935/6709715c523f9966859af52c/frameword-sleepyfellow_-alamy.jpg","alt":"Information Technology Framework Strategy Business Management Solution"},"contributors":[{"name":"Sarah Gray","link":"/author/sarah-gray","avatar":"https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt81866850d4e05a10/67096c0c6a604e33c59d15c7/Sarah_Gray.jpg","role":"Director of Product Marketing, Adaptiva"}],"articleName":"The Challenge of Sticking to CISA’s Vulnerability Framework","mobileHeadline":"The Challenge of Sticking to CISA’s Vulnerability Framework ","articleUrl":"/cyber-resilience/the-challenge-of-sticking-to-cisa-s-vulnerability-framework","linkAttrs":{},"listPageUrl":"","date":"Oct 17, 2024","webinarStartTime":"","articleSummary":"The Cybersecurity and Infrastructure Security Agency created a framework for prioritizing vulnerabilities but following it manually can be a challenge. Here’s why, and what organizations can do to stay safe. ","articleBodyJsonSummary":"","variant":"normal","categoryName":"Cyber Resilience","categoryUrl":"/cyber-resilience","timeRead":1,"paidGating":{"paidContent":false,"paidProductTaxonomy":[]},"articleSize":"big"},{"contentType":"Article","thumbnail":{"src":"https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/bltda30b2f9dcc533b7/670ea812b0391959f65d93be/election_confetti-Jon_Helgason-Alamy.jpg","alt":"red, white and blue star confetti"},"contributors":[{"name":"Dark Reading","link":"/author/dark-reading","avatar":"https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt9b8ea0e8a04b43eb/650c9551fe6e6b248b4df476/285801_DR23_Graphics_Website_Author_Logo_0.jpg","role":"Staff \u0026 Contributors"}],"articleName":"Cyberattackers Unleash Flood of Potentially Disruptive Election-Related Activity","mobileHeadline":"Cyberattackers Unleash Flood of Potentially Disruptive Election-Related Activity","articleUrl":"/cyber-resilience/cyberattackers-unleash-flood-of-potentially-disruptive-election-related-activity","linkAttrs":{},"listPageUrl":"","date":"Oct 17, 2024","webinarStartTime":"","articleSummary":"Organizations should be on high alert until next month's US presidential election to ensure the integrity of the voting process, researchers warn.","articleBodyJsonSummary":"","variant":"normal","categoryName":"Cyber Resilience","categoryUrl":"/cyber-resilience","timeRead":1,"paidGating":{"paidContent":false,"paidProductTaxonomy":[]},"articleSize":"big"},{"contentType":"Slideshow","thumbnail":{"src":"https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt0061ad1d0f57bda4/6707dee11d7c5ddf8331373b/00skills-ball_and_bat-Tom_Wang-alamy.jpg","alt":"baseball player hitting ball"},"contributors":[{"name":"Lisa Morgan","link":"/author/lisa-morgan","avatar":"https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt55c84ed4ee6ab7f9/66c4ed22992f7282278db37f/Lisa_Morgan_new_photo.jpg","role":"Freelance Writer"}],"articleName":"8 Technical Skills Everyone Should Have","mobileHeadline":"8 Technical Skills Everyone Should Have ","articleUrl":"/it-leadership/8-technical-skills-everyone-should-have","linkAttrs":{},"listPageUrl":"/slideshows","date":"Oct 16, 2024","webinarStartTime":"","articleSummary":"Technology tends to get easier to use over time to expand the base of potential users. Meanwhile, new tech and channels continue to emerge challenging workers to keep up. Here’s a look at some skills that all employees should have. ","articleBodyJsonSummary":"","variant":"normal","categoryName":"IT Leadership","categoryUrl":"/it-leadership","timeRead":8,"paidGating":{"paidContent":false,"paidProductTaxonomy":[]},"articleSize":"big"}],"sidebarModules":[{"type":"module_content_cards","data":{"title":"Editor's Choice","moduleLabel":"","variant":"default","contents":[{"type":"contentPreview","data":{"contentType":"Article","variant":"card-horizontal","thumbnail":{"src":"https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt8b52468b0c8f906b/6745d77ff7643ded0dda2f1c/Sudhakar_RamakrishnaNew.jpg","alt":""},"articleName":"SolarWinds CEO on Building Trust After Breach, Unifying IT and C-Suite, and GenAI Future","mobileHeadline":"SolarWinds CEO on Building Trust After Breach, Unifying IT and C-Suite, and GenAI Future","articleUrl":"/it-leadership/solarwinds-ceo-on-building-trust-after-breach-unifying-it-and-c-suite-and-genai-future","listPageUrl":"/it-leadership/solarwinds-ceo-on-building-trust-after-breach-unifying-it-and-c-suite-and-genai-future","linkAttrs":{},"date":"Nov 26, 2024","webinarStartTime":"","categoryName":"IT Leadership","categoryUrl":"/it-leadership","contributors":[{"name":"Shane Snider","link":"/author/shane-snider","avatar":"https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/bltf4de7e5784b276a0/650d8d5ffac8e1d4a1f21f76/Shane_Snider_Profile.jpg"}],"timeRead":7,"paidGating":{"paidContent":false,"paidProductTaxonomy":[]}}},{"type":"contentPreview","data":{"contentType":"Article","variant":"card-horizontal","thumbnail":{"src":"https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/bltf49c02c531155ca8/673f7b21f8c46bd4922fbca9/AI_cold_war.jpg","alt":"Tech war between China and the USA. Flag of USA and China on a microprocessor"},"articleName":"The New Cold War: US Urged to Form ‘Manhattan Project’ for AGI","mobileHeadline":"The New Cold War: US Urged to Form ‘Manhattan Project’ for AGI","articleUrl":"/machine-learning-ai/the-new-cold-war-us-urged-to-form-manhattan-project-for-agi","listPageUrl":"/machine-learning-ai/the-new-cold-war-us-urged-to-form-manhattan-project-for-agi","linkAttrs":{},"date":"Nov 21, 2024","webinarStartTime":"","categoryName":"Machine Learning \u0026 AI","categoryUrl":"/machine-learning-ai","contributors":[{"name":"Shane Snider","link":"/author/shane-snider","avatar":"https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/bltf4de7e5784b276a0/650d8d5ffac8e1d4a1f21f76/Shane_Snider_Profile.jpg"}],"timeRead":5,"paidGating":{"paidContent":false,"paidProductTaxonomy":[]}}},{"type":"contentPreview","data":{"contentType":"Article","variant":"card-horizontal","thumbnail":{"src":"https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt976ce52f1cfd0dc2/67376e6ed415b349d98bd337/cloud-YAY_Media_AS_-alamy.jpg","alt":"cloud computing background"},"articleName":"6 Cloud Trends to Watch in 2025","mobileHeadline":"6 Cloud Trends to Watch in 2025 ","articleUrl":"/it-infrastructure/6-cloud-trends-to-watch-in-2025","listPageUrl":"/it-infrastructure/6-cloud-trends-to-watch-in-2025","linkAttrs":{},"date":"Nov 18, 2024","webinarStartTime":"","categoryName":"IT Infrastructure","categoryUrl":"/it-infrastructure","contributors":[{"name":"Lisa Morgan","link":"/author/lisa-morgan","avatar":"https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt55c84ed4ee6ab7f9/66c4ed22992f7282278db37f/Lisa_Morgan_new_photo.jpg"}],"timeRead":7,"paidGating":{"paidContent":false,"paidProductTaxonomy":[]}}},{"type":"contentPreview","data":{"contentType":"Article","variant":"card-horizontal","thumbnail":{"src":"https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/bltc836cd7e008ac6fd/673622c22202400113c00768/2DRD7WH.jpg","alt":"Young businessman working on a virtual screen of the future and sees the inscription: Now hiring "},"articleName":"Help Wanted: IT Hiring Trends in 2025","mobileHeadline":"Help Wanted: IT Hiring Trends in 2025","articleUrl":"/it-leadership/help-wanted-it-hiring-trends-in-2025","listPageUrl":"/it-leadership/help-wanted-it-hiring-trends-in-2025","linkAttrs":{},"date":"Nov 20, 2024","webinarStartTime":"","categoryName":"IT Leadership","categoryUrl":"/it-leadership","contributors":[{"name":"Lisa Morgan","link":"/author/lisa-morgan","avatar":"https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt55c84ed4ee6ab7f9/66c4ed22992f7282278db37f/Lisa_Morgan_new_photo.jpg"}],"timeRead":8,"paidGating":{"paidContent":false,"paidProductTaxonomy":[]}}},{"type":"contentPreview","data":{"contentType":"Document","variant":"card-horizontal","thumbnail":{"src":"https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt7155157a2ee649fd/665f5cf3dea0b45b6f742583/image-1200x675.jpg","alt":"Calculator displaying the text \"SALARY\" on top of $100 bills."},"articleName":"2024 InformationWeek US IT Salary Report: Profits, Layoffs, and the Continued Rise of AI","mobileHeadline":"2024 InformationWeek US IT Salary Report","articleUrl":"/it-leadership/2024-informationweek-us-it-salary-report-profits-layoffs-and-the-continued-rise-of-ai","listPageUrl":"/it-leadership/2024-informationweek-us-it-salary-report-profits-layoffs-and-the-continued-rise-of-ai","linkAttrs":{},"date":"Jun 4, 2024","webinarStartTime":"","categoryName":"IT Leadership","categoryUrl":"/it-leadership","contributors":[{"name":"InformationWeek Staff","link":"/author/informationweek-staff","avatar":"https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/bltf6866111140df5bb/6515ef45f3d316b9fb5271a6/IWK23_1000x1000_solid.png"}],"timeRead":1,"paidGating":{"paidContent":false,"paidProductTaxonomy":[]}}}],"dateDisplay":"show","contributorDisplay":"show"},"adConfig":{"nativeAdOption":false}},{"type":"module_link_list","data":{"listOption":"External Feed","listTitle":"Webinars","icon":"ChalkBoard","externalFeed":"https://smartbox.techweb.com/smartbox/externalsmartbox?site_id=300001\u0026taxonomy_ids=\u0026num_display=3\u0026article_type=upcoming_webinars","ctaButton":{"ctaButtonLink":"/resources?page=1\u0026types=Virtual+Event\u0026types=Webinar","ctaButtonText":"More Webinars"},"openInNewTab":true,"articles":[]}},{"type":"module_link_list","data":{"listOption":"External Feed","listTitle":"White Papers","icon":"Document","externalFeed":"https://smartbox.techweb.com/smartbox/externalsmartbox?site_id=300001\u0026taxonomy_ids=\u0026num_display=\u0026article_type=whitepaper","ctaButton":{"ctaButtonLink":"/resources?page=1\u0026types=White+Paper","ctaButtonText":"More White Papers"},"openInNewTab":true,"articles":[{"title":"Software Supply Chain State of the Union 2024","publishedDate":"","url":"https://iw-resources.informationweek.com/c/pubRD.mpl?secure=1\u0026sr=pp\u0026_t=pp:\u0026qf=w_jfro17\u0026ch=SBX\u0026cid=_whitepaper_14.500005845\u0026_mc=_whitepaper_14.500005845","eventDate":""},{"title":"Work Smarter, Not Harder with Gemini in Security Operations","publishedDate":"","url":"https://iw-resources.informationweek.com/c/pubRD.mpl?secure=1\u0026sr=pp\u0026_t=pp:\u0026qf=w_defa7361\u0026ch=SBX\u0026cid=_whitepaper_14.500005842\u0026_mc=_whitepaper_14.500005842","eventDate":""},{"title":"The Defender's Advantage Solutions Guide","publishedDate":"","url":"https://iw-resources.informationweek.com/c/pubRD.mpl?secure=1\u0026sr=pp\u0026_t=pp:\u0026qf=w_defa7358\u0026ch=SBX\u0026cid=_whitepaper_14.500005840\u0026_mc=_whitepaper_14.500005840","eventDate":""},{"title":"The Defender's Advantage | A guide to activating cyber defense","publishedDate":"","url":"https://iw-resources.informationweek.com/c/pubRD.mpl?secure=1\u0026sr=pp\u0026_t=pp:\u0026qf=w_defa7359\u0026ch=SBX\u0026cid=_whitepaper_14.500005838\u0026_mc=_whitepaper_14.500005838","eventDate":""},{"title":"Digital Resilience: Merging IT Growth with Environmental Responsibility","publishedDate":"","url":"https://iw-resources.informationweek.com/c/pubRD.mpl?secure=1\u0026sr=pp\u0026_t=pp:\u0026qf=w_defa6938\u0026ch=SBX\u0026cid=_whitepaper_14.500005784\u0026_mc=_whitepaper_14.500005784","eventDate":""}]}},{"type":"module_link_list","data":{"listOption":"External Feed","listTitle":"Live Events","icon":"Date","externalFeed":"https://smartbox.techweb.com/smartbox/externalsmartbox?site_id=300001\u0026taxonomy_ids=\u0026num_display=3\u0026article_type=session","ctaButton":{"ctaButtonLink":"https://www.informationweek.com/upcoming-events","ctaButtonText":"More Live Events"},"openInNewTab":true,"articles":[{"title":"[Virtual Event] The Essential Guide to Cloud Management","publishedDate":"Oct 17, 2024","url":"https://iw-resources.informationweek.com/c/pubRD.mpl?secure=1\u0026sr=pp\u0026_t=pp:\u0026qf=w_defa6833\u0026ch=iwkSBX\u0026cid=_session_16.500323\u0026_mc=_session_16.500323","eventDate":""}]}},{"type":"module_link_list","data":{"listOption":"External Feed","listTitle":"Reports","icon":"Document","externalFeed":"https://smartbox.techweb.com/smartbox/externalsmartbox?site_id=300001\u0026taxonomy_ids=\u0026num_display=5\u0026article_type=analytics","ctaButton":{"ctaButtonLink":"/resources?page=1\u0026types=Research+Report","ctaButtonText":"More Reports"},"openInNewTab":true,"articles":[{"title":"2024 InformationWeek US IT Salary Report","publishedDate":"May 29, 2024","url":"https://iw-resources.informationweek.com/c/pubRD.mpl?secure=1\u0026sr=pp\u0026_t=pp:\u0026qf=w_ingg253\u0026ch=sbx\u0026cid=_analytics_7.300006014\u0026_mc=_analytics_7.300006014","eventDate":""},{"title":"2022 State of ITOps and SecOps","publishedDate":"Jun 21, 2022","url":"https://iw-resources.informationweek.com/c/pubRD.mpl?secure=1\u0026sr=pp\u0026_t=pp:\u0026qf=w_ingg40\u0026ch=sbx\u0026cid=_analytics_7.300005937\u0026_mc=_analytics_7.300005937","eventDate":""}]}}],"resourcesModule":{"title":"More Insights","linkLists":[{"listOption":"External Feed","listTitle":"Webinars","icon":"ChalkBoard","externalFeed":"https://smartbox.techweb.com/smartbox/externalsmartbox?site_id=300001\u0026taxonomy_ids=\u0026num_display=3\u0026article_type=upcoming_webinars","ctaButton":{"ctaButtonLink":"/resources?page=1\u0026types=Virtual+Event\u0026types=Webinar","ctaButtonText":"More Webinars"},"openInNewTab":true,"articles":[]},{"listOption":"External Feed","listTitle":"Reports","icon":"Document","externalFeed":"https://smartbox.techweb.com/smartbox/externalsmartbox?site_id=300001\u0026taxonomy_ids=\u0026num_display=5\u0026article_type=analytics","ctaButton":{"ctaButtonLink":"/resources?page=1\u0026types=Research+Report","ctaButtonText":"More Reports"},"openInNewTab":true,"articles":[{"title":"2024 InformationWeek US IT Salary Report","publishedDate":"May 29, 2024","url":"https://iw-resources.informationweek.com/c/pubRD.mpl?secure=1\u0026sr=pp\u0026_t=pp:\u0026qf=w_ingg253\u0026ch=sbx\u0026cid=_analytics_7.300006014\u0026_mc=_analytics_7.300006014","eventDate":""},{"title":"2022 State of ITOps and SecOps","publishedDate":"Jun 21, 2022","url":"https://iw-resources.informationweek.com/c/pubRD.mpl?secure=1\u0026sr=pp\u0026_t=pp:\u0026qf=w_ingg40\u0026ch=sbx\u0026cid=_analytics_7.300005937\u0026_mc=_analytics_7.300005937","eventDate":""}]}],"dateDisplay":"hide"}},"metadata":{"type":"topic","uid":"blt8488cefeb3d8fe4b","aid":"139641","reg":"anonymous"},"schema":[{"@context":"https://schema.org","@type":"BreadcrumbList","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https://www.informationweek.com"},{"@type":"ListItem","position":2,"name":"Cyber Resilience","item":"https://www.informationweek.com/cyber-resilience"},{"@type":"ListItem","position":3,"name":"Cybersecurity","item":"https://www.informationweek.com/cyber-resilience/cybersecurity"}]}],"seo":{"canonicalUrl":"https://www.informationweek.com/cyber-resilience/cybersecurity","metaDescription":"Explore the latest news and expert commentary on Cybersecurity, brought to you by the editors of InformationWeek","metaTitle":"Cybersecurity recent news | InformationWeek","noIndex":false,"imageUrl":"https://www.informationweek.com/build/_assets/informationweek-PQYOD7JA.ico","siteName":"Information Week"},"gtm":{"loadEvent":{"attributes":{"seo":{"canonicalURL":"https://www.informationweek.com/cyber-resilience/cybersecurity","hideFromSearchEngines":false}},"category":{"pageType":"topic"},"pageInfo":{"pageID":"blt8488cefeb3d8fe4b","pageName":"Cybersecurity","destinationURL":"https://www.informationweek.com/cyber-resilience/cybersecurity"}}},"isLivePreview":false}},"actionData":null,"errors":null}};</script><script type="module" async="">import "/build/manifest-A2F38A42.js"; import * as route0 from "/build/root-TPDAOOC5.js"; import * as route1 from "/build/routes/$topic.$slug._index-J4IJ2FVO.js"; window.__remixRouteModules = {"root":route0,"routes/$topic.$slug._index":route1}; import("/build/entry.client-SFHSSSEN.js");</script><script async="" defer="" src="https://connect.facebook.net/en_US/sdk.js#xfbml=1&version=v3.2"></script><script async="" defer="" src="https://www.instagram.com/embed.js"></script></body></html>