The impact of generative AI (GenAI) on email security has the potential to be substantive, reshaping the threat landscape and compelling organisations to rethink traditional defences in this area. Despite the nascent nature of GenAI adoption in organisations, PAC already sees the evolving sophistication of AI-generated emails, requiring a proactive approach to security that addresses current vulnerabilities and anticipates future risks.
SHARE :
TinyML brings complex AI models to the embedded space. Typically, these tools are closely integrated in development environments or ...
Event Date : February 19, 2024
This Excel document delivers market figures broken down by vertical sectors. Figures cover a seven-year time frame (results from the past two years ...
Event Date : June 04, 2025
This vendor profile gives a comprehensive overview of the Worldwide positioning, performance and strategy of Proximus.
Event Date : January 31, 2025
This Excel document is part of the company profiles PAC publishes every year at local, regional and worldwide level.
Event Date : February 05, 2025
This Excel document is part of the company profiles PAC publishes every year at local, regional and worldwide level.
Event Date : February 13, 2025
SAP - Figures - US - FY 31-Dec-2024
Datamart September 02, 2025
Identity & Access Management – Dependencies, Connections, and Provider Landscape – InBrief Analysis
Market Reports September 02, 2025
Vendor Profile September 02, 2025
Zucchetti - Figures - Italy - FY 31-Dec-2024
Datamart September 02, 2025
Zucchetti - Vendor Profile - Italy
Vendor Profile September 02, 2025
Atos: Cause for Optimism, Despite the Headlines
Blog Post February 05, 2024
Adobe’s LLM Optimizer: Why Generative Engine Optimization (GEO) Matters for Enterprises
Blog Post September 03, 2025
Part 6: The Human Side of GRC: Why Governance, Risk, and Compliance Must Live in Your Culture
Blog Post September 02, 2025
AT&T's Acquisition Of Ecostar's Spectrum - "Use It Or Lose It"
Blog Post August 28, 2025
Part 5: From Policy to Practice: Operationalizing Cybersecurity Governance, Risk and Compliance
Blog Post August 26, 2025
Part 4: GRC in Context: How Cybersecurity Governance, Risk, and Compliance Varies by Industry
Blog Post August 19, 2025