The crucial role of data pipelines in building strong GenAI apps [Q&A]
For GenAI to live up to its promise reliable flow of data is key. AI models are only as good as the data pipeline connections bringing in quality data.
Outdated connections mean more hallucinations and untrustworthy results with data engineers hopelessly trying to manually integrate hundreds of AI data feeds. We spoke to Rivery co-founder and CEO Itamar Ben Hemo to discuss why good data pipelines are key to success.
Over half of businesses have suffered regret over a software purchase
A new study from Capterra shows that 59 percent of global businesses regret at least one software purchase they've made in the last 18 months.
Despite this though, the survey of over 3,500 businesses finds 75 percent of organizations are planning to increase their software spending in 2025, with a significant focus on IT systems and artificial intelligence (AI).
Are Black Friday deals really all that good?
In recent years the concept of Black Friday has spread beyond the US thanks to the web, such that millions around the world now go online at this time of year in search of bargains. But are the deals on offer really all they seem?
A new report from Smartproxy suggests that they might not be. It highlights the tactics some sites use to create the illusion of savings. Many increase the baseline prices of products in the weeks before Black Friday. So by the time the 'discounts' hit, they're often just bringing prices back to normal.
Free online tool shines a light on the global threat landscape
Cyber threats are becoming more complex and it can be difficult for defenders to see the big picture and make decisions accordingly.
Now though help is at hand as ImmuniWeb is launching a free online tool making historical data on the security of internet-accessible resources available to the global cybersecurity community, educational institutions, government agencies, and even individual researchers.
Cyber exposure management in today's enterprise landscape [Q&A]
The cybersecurity landscape is more complex than ever and that means enterprises need to have a real-time picture of their exposure.
We spoke to Nadir Izrael, CTO and co-founder of Armis, to learn what this should look like and how security teams can evaluate and evolve their security programs to achieve more control over their asset landscape.
Holiday shoppers in threat actors' sights
Thanksgiving, Black Friday, Cyber Monday, and Christmas bring millions of shoppers online with attractive discounts and limited time offers, but of course they also create ideal conditions for cybercriminals to exploit unwary bargain hunters.
A new report from Fortinet's FortiGuard Labs looks at the evolving threat surface of eCommerce, highlighting how cybercriminals are leveraging Remote Code Execution (RCE) exploits, Man-in-the-Middle (MITM) phishing kits, sniffers, and website cloning services to manipulate online transactions and gain access to steal sensitive data.
Small businesses lack mobile device security policies
Smaller businesses lack the tech resources of larger ones so it's common practice that they not only allow employees to use their personal mobile phones to complete work tasks but in many cases actively expect them to.
Research carried out by OnePoll for SME security solutions company CyberSmart finds that 60 percent of organizations expect their employees to use mobile devices to carry out work tasks despite not providing all of them with work phones.
Identity issues cost retailers millions
As we approach the peak holiday shopping season a new survey of nearly 400 IT security decision-makers and retail customers from identity specialist HYPR shows that 58 percent of retail organizations experienced at least one authentication-related breach and 65 percent were victims of identity fraud over the last 12 months.
Retailers have suffered losses of up to $6.27 million in the last year alone due to insecure authentication methods. By contrast financial institutions reported only $4.57 million lost during the same period.
Addressing AI challenges for the enterprise [Q&A]
With more and more businesses keen to benefit from the possibilities that AI offers it seems like everyone is jumping on the bandwagon. But this raises a number of implementation and management challenges, especially now as enterprise AI workloads begin to scale.
We spoke to Tzvika Zaiffer, solutions director at Spot by NetApp, to discuss how these challenges can be addressed and the best practices that are emerging to ensure that implementations go smoothly.
Businesses not confident in their ability to detect deepfakes
Nearly half of businesses admit they are only partially confident in their ability to detect deepfakes, leaving them vulnerable to escalating fraud risks according to a new report.
The report from identity solutions company Regula shows 59 percent of businesses consider video deepfakes a serious threat, while 58 percent feel the same about audio deepfakes.
Apple's approach to MDM and what we can learn from it [Q&A]
The rise of hybrid and remote working has put added emphasis on the need for mobile device management (MDM).
We spoke to Weldon Dodd, SVP of global solutions at cloud-based automation and device management specialist Kandji, to find out more about Apple's approach to MDM and the broader lessons businesses can apply from this in order to solve complex IT challenges.
Manufacturing faces a wave of advanced email attacks
New data from Abnormal Security shows that between September 2023 and September 2024, phishing, business email compromise, and vendor email compromise attacks on manufacturers increased significantly.
The number of monthly attacks phishing attacks has grown nearly 83 percent between September 2023 and September 2024. Business email compromise attacks are up 56 percent too.
Supply chain attacks up over 400 percent since 2021
A new report from cyber insurance provider Cowbell shows that supply chain attacks have increased by an astounding 431 percent since 2021.
It also shows that large enterprises (those with greater than $50 million revenue) are 2.5 times more likely to encounter cyber incidents. Manufacturing is the most vulnerable sector, driven by its reliance on automation and exposure to intellectual property threats.
Google calls the AI fuzz to find vulnerabilities
Not familiar with 'fuzzing'? It's a software testing technique that involves feeding invalid, unexpected, or random data into a program to detect coding errors and security vulnerabilities.
Back in August 2023, Google introduced AI-Powered Fuzzing, using large language models (LLM) to improve fuzzing coverage to find more vulnerabilities automatically -- before malicious attackers could exploit them.
HP offers enhanced protection for enterprise endpoints
The rise of remote and hybrid work has increased the risk of PCs being compromised by attackers with brief physical access, underscoring the need for protection and visibility into the integrity of devices throughout their lifetimes.
To combat this, HP is launching a new HP Enterprise Security Edition, a unique suite of capabilities designed to enhance the physical security of PC endpoints.
Ian's Bio
Ian spent almost 20 years working with computers before he discovered that writing about them was easier than fixing them. Since then he's written for a number of computer magazines and is a former editor of PC Utilities. Follow him on Mastodon
© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.