How fake data can help to combat breaches [Q&A]
September this year marked five years since the notorious Equifax data breach which exposed the social security numbers, birthdates, credit card details, and more of millions of customers.
But how much has the industry learned from this breach? And what measures can be used to help avoid similar issues in the future? We spoke to Ian Coe, co-founder at Tonic.ai to find out why fake data might be the answer.
AI and metaverse technologies boost training and streamline onboarding for employees
We live in a world where businesses constantly reinvent themselves to remain competitive. Automation and digitization goals feature in well over half of all today’s businesses’ long-term corporate strategies, according to PwC's most recent annual Global CEO Survey. Which is why artificial intelligence (AI) and virtual worlds or 'metaverse' related technologies and tools have risen to prominence, particularly in relation to improving on-the-job training and upskilling new talent.
In 2022, many businesses are now starting to benefit from the application of AI and metaverse technologies in providing streamlined training and onboarding for employees. Combining AI and metaverse technologies affords companies an incredible new opportunity to train and equip people with the necessary skills to navigate the future of work.
The cultural and digital transformation crossroads: Why company culture must intersect with technology
When talking about digital transformation, the emphasis is largely on how a business can be reimagined through technology. But, regardless of cutting-edge tools or best-in-class processes, companies need to transform the culture at the same time -- if they don’t do this, digital transformation simply won’t work in practice.
Cultural transformation underlines all the changes established by digital transformation initiatives, ensuring these changes are implemented and embraced. This requires enterprises to completely shift their way of interacting with employees, partners, and customers -- which is far more difficult than technology adoption alone.
SMB's security spending is not keeping up with threats
A survey of over 1,200 cybersecurity decision-makers from small and medium-sized businesses in Europe and North America shows 74 percent believe that they are more vulnerable to cyberattacks than enterprises.
The study from ESET also reveals that 70 percent of businesses surveyed admit that their investment in cybersecurity hasn't kept pace with recent changes to their operational models such as hybrid working.
Cyber threat activity continues to grow in Q3
New data from managed security service provider Nuspire reveals large increases in overall threat activity in the second quarter of this year continued throughout Q3, with additional growth in both exploits and botnets.
There's been a 236.22 percent jump in Kryptik variants -- a type of trojan malware distributed to victims through phishing campaigns, the goal being to steal information, including cryptocurrency wallets, files and SSH keys.
A foldable iPhone? Yes, please!
It’s been rumored for a while that Apple is working on a foldable device, following in Samsung’s footsteps, but so far we have yet to see anything like that from the Cupertino-based tech giant.
However, the idea of an iPhone that you can fold like the Samsung Galaxy Z Flip has just taken a step closer to reality.
Threat intelligence adoption grows but skills lag behind
A new study from Vulcan Cyber shows 75 percent of organizations have dedicated threat intelligence teams and two-thirds have dedicated threat intelligence budgets.
However, 73 percent of respondents say a lack of skills is their biggest threat intelligence challenge and is keeping organizations from making the most of their investments in threat intelligence resources.
Email is the top vector for cyberattacks
Hot on the heels of a report showing that 40 percent of business emails have unwelcome content, comes another report revealing that email is now the top way of delivering cyberattacks.
The report from Tessian shows that 94 percent of organizations experienced a spear phishing or impersonation attack, and 92 percent suffered ransomware attacks over email this year.
Four out of 10 work emails are unwanted
Analysis of over 25 billion emails from Hornetsecurity reveals that 40.5 percent of work emails are unwanted.
We're tempted to say, "only four out of 10?" but it all depends how you define unwanted. The report looks specifically at the use of email to deliver malicious payloads -- so those emails from your boss that you'd rather not receive don't count!
Google announces long-overdue desktop VPN apps for Windows and macOS
Google has just offered an incentive to subscribe to Google One. The company is launching a desktop client that makes it possible to use its VPN service on Windows and macOS -- something that was previously only possible on iOS and Android devices.
While Google's VPN service and the associated apps are free, you need to be signed up to Google One Premium in order to access it.
Raspberry Pi creates its own Mastodon server -- running on a Raspberry Pi 4
Elon Musk bought Twitter for $44 billion, and he's been doing a terrible job of running things. He made the verification status confusing and nonsensical, but worst of all, he quickly fired thousands of workers. And so, many Twitter users have been abandoning the platform and switching to alternatives. You can find yours truly on Mastodon, for instance.
The folks over at Raspberry Pi are not abandoning Twitter (yet), but they are very alarmed by Musk's erratic behavior. As a result, they have created an account on the Mastodon social network in case they do decide to jump ship. Actually, they took things a step further and have begun running their own Mastodon server (also known as an "instance") at raspberrypi.social.
Got a small head? Shokz OpenRun Pro Mini bone conduction Bluetooth headphones are for you!
Christmas is on the horizon -- it is literally next month! In other words, you had better start your shopping soon. If you have a techie in your life you need to get a gift for, you might be thinking of wireless headphones, such as Apple AirPods. While that is a nice gift idea, maybe you should think outside the box instead and go for bone conduction headphones...
If you aren't familiar, bone conduction headphones don't go in or over your ear canals, but instead, they sort of transmit audio through your skull. It sounds crazy, I know, but it is a really cool technology that allows you to hear your surroundings. These types of headphones are ideal for those that exercise, bike, or walk in the street while listening to music.
Only a quarter of businesses have confidence ex-employees can no longer access infrastructure
Only 24 percent of respondents to a new survey are fully confident that ex-employees no longer have access to their company's infrastructure, while almost half of organizations are less than 50 percent confident that former employees no longer have access.
The study from Teleport also finds infrastructure is becoming more complex, with organizations using on average 5.7 different tools to manage access policy, making it complicated and time-consuming to completely shut off access.
IBM launches managed cloud service solution for VMware
Enterprises are increasingly turning to cloud and hybrid solutions. In order to help them unlock the benefits that this transition offers, today sees the launch of IBM Cloud for VMware as a Service.
The new offering provides an operated, secured and managed service by IBM Cloud, to help enterprises deploy cloud with the VMware software stack and IBM Cloud infrastructure.
Observability's not-so-secret link to revenue
In a lot of companies, observability or monitoring are words that only the technical groups understand. Perhaps the legal team is involved because there are SLAs that products must not breach, or it costs the company money in penalties. This is the wrong way to look at observability though -- it’s not simply a tool that verifies your application is performing properly and lets you avoid penalties. Instead, think of observability as a magnifying lens that helps all of the teams in your company understand how to increase revenue, by understanding the complexities of your product.
There are a couple of different ways to think of proper observability: It quantifies things that weren’t measurable previously. If something is measurable, it can be improved. Secondly, it’s a way to measure an entire, complex system -- both, portions which technology teams traditionally think about ("their code"), and third-party dependencies that no one thinks about until there are customer complaints.
© 1998-2025 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.