Meet Daisy, the AI granny designed to waste scammers' time
We all know how frustrating it can be to get scam phone calls, whether they're pretending to be your bank or trying to claim your computer needs fixing.
Of course it can be fun to keep them talking and string them along for a while, but most of us don't have the time to do that. Now though UK telco Virgin Media O2 has created an AI pensioner specifically designed to waste the scammers' time so we don't have to.
How enterprises can maximize the value of automation [Q&A]
The idea of automating processes has of course been around since the industrial revolution. But even though we've moved on from the Spinning Jenny to artificial intelligence, automation has lost none of its importance.
So how can enterprises ensure that get the most from their automation in today’s complex world? Devin Gharibian-Saki, SVP of strategic automation at Redwood Software, believes that part of the key is to have an automation fabric. We talked to him to learn more.
New platform protects organizations by assuming they've been breached
Most organizations now recognize that some form of cybersecurity breach is a matter of when rather than if. So why not just assume that the site has been breached in the first place?
That’s exactly what Tide Foundation has done with its new platform. TideCloak is an identity, immunity, and access management system that starts with a 'breach assumed' approach.
AI redefines priorities for IT leaders
A new survey from Flexera shows that 42 percent of IT leaders say they believe if they could integrate AI, it would make the most difference to their organizations.
The study surveyed 800 IT leaders from the US, UK, Germany and Australia to determine how IT decision makers' priorities have evolved over the past 12 months and outline their focus for next year.
Skills gap leads enterprises to outsource cybersecurity
A new survey of over 1,700 senior decision makers and influencers in leadership, technology and security roles across Europe finds that 48 percent manage their security operations in house compared to 52 percent who use a third party.
The study from Logpoint finds more than a quarter (28 percent) of UK businesses intend to outsource security over the course of the next two years.
Bluesky thinking -- why left-wingers are leaving X and why X will get over it
Are you still on Twitter (sorry, X)? You can tell us, we won't judge. If you are you may have noticed something interesting since the recent US election.
Celebrities along with people and organizations of a left-wing persuasion have been announcing -- in a markedly flouncy manner it must be said -- that they're leaving the platform. This peaked yesterday with the UK's standard bearer of the liberal left the Guardian broadcasting its intention to depart X -- on X, ironically.
Three-quarters of most visited websites not compliant with privacy regs
A new report finds that 75 percent of the 100 most visited websites in the US and Europe are not compliant with current privacy regulations.
The study from privacy solution provider Privado.ai shows despite stricter privacy enforcement in Europe a surprising 74 percent of top websites do not honor opt-in consent as required by Europe's General Data Protection Regulation (GDPR).
The challenge of encrypted traffic for network defenders [Q&A]
When it comes to protecting sensitive information like financial data, personal information, and intellectual property, encryption has become a must. By scrambling data through the use of algorithms, only those with access to decryption keys are able to read what's being secured.
Encrypted traffic has fulfilled its intended mission: to lock down data. But, could it simultaneously be helping bad actors slip by undetected? And could encrypted traffic actually make it harder for network defenders to spot threats before it's too late?
Failed security controls cost businesses billions
A new report finds 61 percent of organizations have suffered a security breach in the past year because their policies, governance, and controls failed or were not working effectively. This is costing US businesses $30bn and UK businesses £10bn per year.
The study from security posture management firm Panaseer surveyed 400 security decision makers across the US and UK and found 72 percent have taken out indemnity insurance in response to growing personal liability, whilst 15 percent have considered leaving the industry.
New defense suite is designed to secure AI workloads
As organizations increasingly adopt AI capabilities, the most common and dangerous attacks often go undetected by static code scanning or traditional security methods.
The only effective way to stop common AI attacks, such as prompt injection and zero-day vulnerabilities, is through active runtime detection and defense. Operant AI is launching a new 3D Runtime Defense Suite aimed at protecting live cloud applications, including AI models and APIs in their native environments.
New tool helps prepare workforces for cyber threats
Humans are generally the weakest link in the cybersecurity chain, so training and awareness are essential alongside technology to keep organizations safe.
With the launch of its AI Scenario Generator, Immersive Labs enables organizations to seamlessly generate threat scenarios for crisis simulations to ensure their workforces are ready for the latest threats.
NordVPN launches ID theft protection tool
Although it may not make the headlines as often as other forms of cybercrime, identity theft remains an issue.
Now NordVPN has launched an identity theft protection service called NordProtect. Currently available to NordVPN Prime plan users in the US, it merges years of cybersecurity expertise with cutting-edge technology to offer a solution users can trust.
Navigating the world of disinformation, deepfakes and AI-generated deception [Book Review]
Online scams aren't anything new, but thanks to artificial intelligence they're becoming more sophisticated and harder to detect. We've also seen a rise in disinformation and deepfakes many of them made possible, or at least more plausible, by AI.
This means that venturing onto the internet is increasingly like negotiating a digital minefield. With FAIK, risk management specialist at KnowBe4 Perry Carpenter sets out to dissect what makes these threats work and the motivations behind them as well as offering some strategies to protect yourself.
Mitigating third-party risk in today's cyber ecosystem [Q&A]
As third-party risk continues to be a critical concern for enterprises, the need for effective risk management strategies has never been more pressing.
We spoke with Bob Maley, CISO of third-party risk management specialist Black Kite, to get his insights into effective strategies for managing this challenge along with the nuanced risks and necessary tactics to secure enterprise environments against sophisticated threats.
AI degradation -- what is it and how do we address it? [Q&A]
Many in the industry believe that AI is degrading because it's being starved of human-generated data. This leads to models being trained on the output of older models which increases the risk of hallucinations and errors.
But how big an issue is this and what can we do to fix it? We spoke to Persona CEO and co-founder, Rick Song to find out.
Ian's Bio
Ian spent almost 20 years working with computers before he discovered that writing about them was easier than fixing them. Since then he's written for a number of computer magazines and is a former editor of PC Utilities. Follow him on Mastodon
© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.