BetaNews Staff

How biometrics is moving from verifying identity to verifying humanity

Biometrics

Even though 'face spoof' sounds like a piece of skateboarder terminology used to describe a particularly vicious wipeout, it’s actually something more commonly dealt with by InfoSec professionals who work for huge banks, telecommunications companies, and healthcare providers. 

Simply put: it’s when a scammer uses a 3D mask -- or a printed or on-screen image -- to fool biometric security measures a la "Mission Impossible" in order to gain access to the system those security measures are in place to protect.

Continue reading

How to reduce the carbon footprint of AI?

Artificial intelligence

Can artificial intelligence be deployed to slow down global warming, or is AI one of the greatest climate sinners ever? That is the interesting debate that finds (not surprisingly) representatives from the AI industry and academia on opposite sides of the issue.

While PwC and Microsoft published a report concluding that using AI could reduce world-wide greenhouse gas emissions by 4 percent in 2030, researchers from the University of Amherst Massachusetts have calculated that  training a single AI model can emit more than 626,000 pounds of carbon dioxide equivalent—nearly five times the lifetime emissions of the average American car. Who is right?

Continue reading

The advancement of penetration testing throughout the pandemic

penetration testing

COVID-19 threw the spotlight on cybersecurity like never before. The unprecedented global shift to remote working and subsequent surge in cyber crime, drove a priority focus amongst business leaders to ensure a robust cybersecurity posture across every part of their newly extended network. Many organizations had to make this transition rapidly, which increased the likelihood of misconfigurations and other errors, while the drastically increased attack surface presented fresh cybersecurity challenges around remote network connections, VPN connections, phishing, and many other types of network attacks.

Ensuring adequate protection against this wave of new security threats facing every size and shape of business became paramount and challenged CISOs to balance reduced budgets and staff against the requirement for increased technology investment.

Continue reading

Communications service providers: Don't let IPv4 exhaustion stop your growth

As rural broadband initiatives help bridge the digital divide, communications service providers have a wealth of opportunities to add subscribers, expand territory, and grow their business. However, they will first need to address the challenges posed by IPv4 exhaustion -- and its impact on the cost of new subscriber IP addresses.

Since November 2019, when the final allocation of publicly available IPv4 addresses was made, new IPv4 addresses have been obtainable only at high open market prices. There is a virtually unlimited stock of IPv6 addresses available, but migration to the new standard is a highly complex prospect and impractical in the short term for many communications service providers. They need a more feasible and affordable way to support new subscribers.

Continue reading

4 surprising ways COVID-19 has forced the world to innovate

Digital transformation is a conversation that is and was taking place before COVID-19. Businesses wanted to know how to become more competitive, reactive, and efficient, and how services for users can be improved. McKinsey’s global survey of 889 executives reported that COVID-19 certainly accelerated digital transformation by several years in some sectors. Many of these changes are expected to remain in place long-term.

Here, we take a look at the top COVID-19 tech trends and how they will remain part of our lives in the future, post-pandemic.

Continue reading

5 amazing new uses for AI in 2021

Artificial Intelligence (AI) has quickly emerged as a game-changing technology, often helping researchers uncover insights much faster than they otherwise could.

Here are five impressive ways that researchers have already capitalized on AI this year.

Continue reading

Predictive maintenance can save millions for process manufacturers

Industrial computer system

Predictive maintenance, or PdM, is a rising star for process plants. It’s a new approach to maintenance planning that uses industrial Internet of Things (IIoT), big data, and machine learning to track the condition of plant equipment and detect the first signs of impending part failure.

Predictive maintenance is a specific application of predictive analytics for plant equipment. By issuing early alerts about potential failures, PdM enables maintenance crews to schedule repairs before the part breaks down entirely, at a time that’s convenient for them. PdM really showed its worth during COVID-19, as many plants operated on a skeleton staff with maintenance teams only coming on-site at intervals.

Continue reading

How FinTech and digital currency unfolds global technology disruption

The term FinTech has been coined quite recently. However, this does not change the fact that Finance and technology have always been intertwined. Way back in 1866 the first transatlantic cable was laid, which then became the backbone for the globalization of finance. Next in 1918, the first electronic transfer of money was conducted using Morse code technology. In the 1950s, credit cards, another digital payment medium, was launched by American Express and Diners Club. This event can officially be called FinTech 1.0.

The actual beginning of modern FinTech effectively dates back to 1967 when the first ATM machine was used by Barclays in 1967 and the period was called FinTech 2.0. Owing to the development of technologies in communication and transaction, the world saw its first digital stock market, which marked the beginning of online financial markets. The advances didn’t stop there.

Continue reading

Don't be fooled into not backing up your data!

Data folders backup

We celebrated World Backup Day last month.  Started in 2011 by digital consultant Ismail Jadun it is observed on March 31st every year -- a date chosen because it’s the day before April Fools Day… and of course you’d have to be a fool not to backup your data!

This especially recognized day is a strong reminder of the increasing role data plays in our lives and of how critical it is to backup all of your data. Regardless of the size of your organization, it’s likely that data is an essential aspect of running it. If you don’t yet have a solid plan to keep your data safe, there are four things you should consider:

Continue reading

Interaction Analytics supports compliance in your contact centers

call center

Every contact center needs to track its compliance with laws and regulations, yet so many make it tougher on themselves to do so. Reviewers screen call after call, checking off compliance steps and ensuring agents meet expectations. But with potentially millions of calls to screen, manual compliance tracking becomes an impossible task -- and workaround solutions can leave centers open to damaging compliance failures, potentially costing companies millions of dollars in fines.

The cost of human error is too high, but manual processes are too overwhelming, time-consuming and expensive. Automating compliance monitoring can remove much of the burden from compliance managers and officers and decrease their chances of human error. Technology like Interaction Analytics helps reduce the traditional pain-points and limitations in reviewing contact center compliance while also unlocking insights on larger trends and ways to improve contact center operations.

Continue reading

Save 60% on the updated Avast Antivirus 21.3 which boasts better scanning performance, Rescue Disk improvements and more

Avast Antivirus 2021 has just received its April update, and it's an important one. In addition to the usual array of bug fixes and improvements, there are also some serious changes and additions to enjoy. Chief among these are big improvements to scanning, helping to boost the overall performance of the software.

There have also been changes to the way notifications work in the app. While you, of course, want to be made aware of things that need your attention, an overload of notifications can be annoying. And it is with this in mind that the latest version of the app will no longer show you pop-up messages when you have the antivirus tool open. But it does not end there.

Continue reading

Telematics: 10 must-have features in 2021

Vehicle-tracking software has been evolving to a point where real-time data is not only available centrally but easily accessible to a mobile team of drivers and fleet professionals. On-board tracking, video, and sensors are now being combined with AI processors that interpret as well as record the road ahead. Simply put, our vehicles are now smarter than us -- in a good way.

By using data, connectivity, and AI-powered analysis, companies can have a huge competitive advantage if they can act on the issues at hand. Drivers have access to predictive technology that identifies road signage, driver behavior, weather conditions, and road condition to help guide them to the safest path through traffic, as well as the most efficient overall route.

Continue reading

Overhauling Zero Trust: How to enforce the security you need

The need for organizations to recalibrate and reprioritize their Zero Trust efforts has been abundantly clear for years, and recent vulnerabilities like those with Microsoft Exchange and Google Chrome have further magnified the need for improvement. However, the conversations surrounding how to mitigate these threats and adopt a framework of actual Zero Trust have become increasingly oversaturated.

Rather than throwing around industry buzzwords and "talking the talk," the cybersecurity community must understand that the luck they’ve encountered playing one of security’s most dangerous zero day games is likely to run out in short order. Instead, they must focus their efforts on "walking the walk" by implementing a model of Zero Trust. Thanks to a recent industry survey and accompanying report, there are a handful of trends that are already in motion as organizations and cybersecurity professionals alike work towards adopting a true Zero Trust environment.

Continue reading

The emergence of an alternative internet

Wow, 2020 was quite the year! Not just because of the pandemic that stopped the offline world, but because of some of the terrifying things that rocked our online world as well.

These are the ones that disturbed me the most:

Continue reading

Punishing the victim won't stop ransomware

Imagine, for a moment, that you own a small business -- say, a regional dairy farm producing milk, ice cream, yogurt, and other products. And, like so many companies in the food manufacturing sector, you get hit by ransomware. You can’t access any of the data you need to run your business -- so you don’t know which products to ship, where to ship them, what prices you’ve negotiated, who’s paid and who hasn’t… everything is locked up. And, the clock is ticking -- you can’t tolerate extended downtime or products will spoil and customers will defect to other vendors.

The ransomware threat actor wants $50,000 to give you the decryption keys for your data. Your cyber insurance company tells you to just pay the ransom and they’ll cover most of it, as long as it doesn’t violate the rules set up by the US Treasury Department’s Office of Foreign Assets Control (OFAC) against paying ransom to gangs or nation states that are under economic sanctions. But, they do some research and determine the ransomware threat actor would fall under these rules, so they rescind the recommendation and will only partially offset what would be an enormously expensive IT consulting engagement to restore the systems in an acceptable period of time.

Continue reading

© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.