BetaNews Staff

CSPs align with enterprise cloud strategies

Cloud

Cloud transition plans have dominated the CISO agenda for the past decade, accelerated by the rapid shift to working remotely. Now, cloud infrastructure and strategies have moved far beyond the initial reactive approach of the last few years and into a revenue-generating, proactive investment for all modern businesses. Communications service providers (CSPs) are aligning their services and networks to support this trend and most are reporting a positive outcome related to the cloud transition of their enterprise customers.

As technology evolves and digital transformation plans continue to accelerate, enterprises that want to stay competitive are transitioning a portion of their infrastructure to the cloud, focusing on finding the right mix of cloud services to support their mix of applications as well as their current and future plans. These enterprises are looking to communications service providers to help them manage a complex multi-cloud environment as well as including CSP cloud services in that mix.

Continue reading

How machine learning safeguards organizations from modern cyber threats

machine learning AI

2024 is fast approaching, and it seems likely that the new year heralds the same torrent of sophisticated malware, phishing, and ransomware attacks as 2023. Not only are these long-standing threats showing few signs of slowing down, but they're increasing by as much as 40 percent, with federal agencies and public sector services being the main targets.

Meanwhile, weak points like IoT and cloud vulnerabilities are making it tougher for cybersecurity pros to secure the wide attack surface that these edge devices create.

Continue reading

Generative AI washing: Avoid jumping the gun by laying the groundwork for successful adoption

Quite rightly, many businesses are excited about generative AI and the benefits it can bring. This year ChatGPT reported more than 100 million users, and the market value of generative AI is expected to grow year-on-year.

Currently, it makes sense that businesses want to get in on the act, but many are facing significant challenges navigating generative AI’s rapid emergence. There’s a risk of moving too quickly. It is difficult for businesses to confidently predict how beneficial generative AI will be. In some cases, it could even prove more of a hindrance than a help.

Continue reading

De-risk your business through regulatory resilience

Risk dial

Transatlantic data flows underpin more than $7 trillion in cross-border trade and investment per year, according to the U.S. Department of Commerce. The recently announced EU-US Data Privacy Framework (TADPF), in place as of July 10 2023, is expected to further promote opportunity and economic fruitfulness on both sides of the Atlantic.

However, many are rightfully questioning the staying power of this latest version of the TADPF. Will it be third-time lucky or Groundhog Day all over again? Against this backdrop of uncertainty, many companies must evaluate their short- and long-term regulatory resilience.

Continue reading

Building next-gen operational intelligence at scale

Global data

In today’s digital era, operational visibility is a prerequisite for businesses across sectors such as manufacturing, transportation and retail. However, managing this massive influx of rapid, real-time data can be challenging -- especially for organizations that don’t have the infrastructure in place.

This data generally takes the form of events such as clicks, telemetry, logs and metrics, often collected as time series or machine data. In contrast to transactional data collected via batch ingestion, this data is collected via real-time streaming.

Continue reading

Creating trusted third-party ecosystems with a shared duty to security compliance

cybersecurity

Managing third-party cybersecurity risk across inter-connected supplier ecosystems is becoming increasingly more daunting. Software and systems that used to be managed in-house are now routinely delivered as hosted services by multiple vendors and contractors. Other third parties frequently get brought in at departmental level, often bypassing contracting procedures, and have access to applications that hold sensitive data and business critical information.

A single mistake anywhere in the supply chain could result in data breaches, compliance fines, as well as revenue losses, reputational damage, and a wide range of negative business consequences for months, or even years, down the line.

Continue reading

Guardians of privacy: The promise of fully homomorphic encryption in the AI and blockchain era

The rise of AI has been nothing short of meteoric, especially with the advent of extensive language models like ChatGPT. We're witnessing a technological tide that might not only match, but even eclipse the transformative power of the internet. Every corner of our world, from the intricate complexities of finance to the foundational elements of education, is currently in the throes of a radical transformation catalyzed by artificial intelligence.

Yet, as we march forward in this brave new world of machine learning and digital cognition, there's an ever-looming shadow: the challenge of data privacy. Every digital query, every command we voice, and every interaction we have with these advanced systems invariably deposits bits of our personal information into vast databases. These repositories, managed by the service providers, become de facto vaults of our digital identities. The gravity of this concern hasn't been lost on the world's decision-makers. Countries not yet willing to take the blind leap have started sounding the alarm, and corporate behemoths have begun implementing restrictions on the use of such AI-driven tools.

Continue reading

Hiding undetected: Why security teams can no longer overlook HTTPS decryption

Decrypting HTTPS (TLS/SSL) traffic at the network perimeter is a vital step in protecting against malware and other online threats. Most of today’s web traffic is encrypted and presents an obvious hiding place for threat actors to deliver cyberattacks, since many network security controls aren’t set to inspect encrypted traffic. Consider recent findings from WatchGuard’s Threat Lab in its Q4 2022 Internet Security Report (ISR). While the report showed an apparent decline in overall malware volume, the Threat Lab analysts found a much higher prevalence of malware being delivered over encrypted connections when they looked closer at decrypted HTTPS traffic. These results came from a mere 20 percent of devices decrypting TLS and indicate the other 80 percent would also show malware volume is up, but hidden -- which mirrors findings from previous quarters.

Despite this trend, it’s common for teams not to enable decryption at the firewall due to the complications it can present. The process requires resources to decrypt and then re-encrypt traffic passing through a gateway device, as well as next-gen firewalls (NGFW) or unified threat management (UTM) appliances that use significant computing horsepower, all which impact network performance. Then, introducing decryption while managing the performance of other security tools and their varying uses could be difficult. Today, however, tabletop UTM/NGFW solutions can perform this process at the speed of the incoming WAN connection. So now, users’ main objection is the initial configuration of TLS/SSL decryption, and the need for exceptions for certain applications.

Continue reading

As the cookie crumbles, ID resolution reignites customer experience

In today's digital world, one customer can have multiple identifiers. These identifiers track customer information, transactions, and interactions as they engage with a  business through its web browser, mobile app, and in-store. Each of these touchpoints might capture different data about the customer, creating different identifiers. This can lead to customer data ending up in disconnected silos throughout the organization, impacting the company’s ability to target marketing and advertising efforts.

Without a comprehensive view of a customer's journey, brands struggle to understand consumers’ needs, creating a bad customer experience (CX). In fact, CX quality fell for 19 percent of brands last year, with 49 percent of customers stating they left a brand they had originally been loyal to in the last 12 months due to poor CX. With customer loyalty at stake, it’s more important than ever that brands use identity resolution (ID) resolution to improve CX, increase retention, and drive revenue.

Continue reading

The business-enabling power of privacy enhancing technologies

Data privacy

Over the past few years, there has been an acceleration in the enterprise-level understanding of Privacy Enhancing Technologies (PETs), a category best known for its ability to enable and preserve the security and privacy of data when it is being used or processed. While some technologies within the category, including homomorphic encryption, trusted execution environments, and secure multiparty computation, had previously been academically pursued but not computationally practical, the tide has  changed.

Technological development, surging awareness, and increasing adoption of PETs in recent years have alerted regulators, analysts, and broader industry to their potential impact and opened up a wealth of exciting and transformative opportunities for businesses.

Continue reading

To choose the right solutions, leaders must not get blinded by tech hype

blinded by light

In the tech industry, the phrase 'one size fits all' never applies. The hype surrounding developments such as generative AI may be attractive to companies looking to be innovative. However, integrating the trendiest tech advancements does not always yield benefits for your business.

The allure of a technological silver bullet can sway companies to make decisions without truly understanding the broader business picture. Whether it’s AI or a productivity tool, leaders may adopt the first available solution, assuming it will address all their challenges and boost employee productivity. When that fails, they move onto the next option. In fact, nearly half of the respondents in our recent workplace alignment survey admitted to using five or more productivity applications at work. However, this isn’t always the best solution for employees, with 40 percent saying they find it frustrating to have so many tools at their disposal.

Continue reading

You can't win: Learning to live with security pessimism

cybersecurity

Cybersecurity can, at times, feel like a thankless and invisible task. The punishment for a mistake is immediate and ruthless, the reward for success next to non-existent, because how do you recognize the absence of a breach? But this isn’t a new scenario; the IT industry has dealt with this outlook for decades. The job of an IT department is to be invisible, but when something does go wrong all eyes are inevitably on them to fix it.

In a threat landscape where there exists a constant push to innovate, adapt and breach, there are only three possible outcomes for the IT industry: defeat, indefinite struggle, or complete structural collapse.

Continue reading

Why organizations are taking the leap to backup as a service (BaaS)

Backup as a Service BaaS

As one of the world’s most valuable commodities, data has increasingly been the focus of cybercrime over the past decade. As a core segment of a modernized organization, data-first approaches to business intelligence are extremely common. Its centrality in modern business has led to an average data breach costing over $4.4 million dollars for the attacked company. With this astounding penalty for poor security defenses, the need to backup and protect data has risen to an all-time high.

Typically, companies that wanted to protect their data through backups would do so by creating on-premise storage. However, due to the expanding amount of information that businesses commonly access and utilize, the scope of what organizations needed to save continued to increase. Instead of adding a few external servers and hard drives, or NAS (Network-attached Storage), they now needed to create entire systems, which were costly to install and maintain.

Continue reading

A whole new ball game: How next-gen technology is revolutionizing sports

Sports and technology have long been intertwined, but the advent of next-generation technology is taking this relationship to new heights. Cutting-edge technologies like augmented reality (AR), artificial intelligence (AI), and remote collaboration are unlocking unprecedented opportunities for teams, players, and fans alike. These innovative solutions are changing the face of sports, giving teams a competitive advantage on the field while taking the fan experience to the next level.

As a wide variety of cutting-edge technologies gain importance in sports, it’s worth looking at how they are helping to improve and evolve our favorite games and what we can expect in the future.

Continue reading

Why "AI" can't succeed without APIs

AI-Security-model

Mega tech trends like the cloud, the mobile phone era, metaverse and now AI all depend on enabling technologies sitting right beneath the surface hidden from nearly everyone’s view. Their structural integrity depends on the flawless operation of those enabling technologies, which in many cases are Application Programming Interfaces (APIs). As such, their success depends on API adoption. Nowhere is this truer than in the rapid proliferation of AI technologies, like generative AI, which require a simple and very easy-to-use interface that gives everyone access to the technology. The secret here is that these AI tools are just thin UIs on top of APIs that connect into the highly complex and intensive work of a large language model (LLM).

It’s important to remember that AI models don’t think for themselves, they only appear to be so that we can interact with them in a familiar way. APIs are essentially acting as translators for AI platforms as they’re relatively straightforward, highly structured and standardized on a technological level. What most people think of as "AI" should be viewed through the lens of an API product; and with that mindset, organizations can best prepare for what potential use cases are possible and how to ensure their workforces have the skills to put them into action.

Continue reading

© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.