Twitter's new CEO unveiled

Twitter logo and a woman in silhouette

In the past six months, Twitter has experienced considerable upheaval since Elon Musk assumed control. Thousands of employees have been let go, account authentication has been drastically altered, and idle accounts now face deactivation.

Yesterday, Musk revealed that he had found a new leader for the company, but didn't name his hire, disclosing only that it was a woman.

Continue reading

Connecting ATO and transaction fraud dots: Bots are the key

Fraud stop

A wave of credential stuffing, with no attempt to use the accounts. A pause. The accounts are accessed but not leveraged. A pause. Then, a flood of transaction fraud, using either the taken-over accounts or new ones set up with similar personal information.

The catch: The stages of this process may occur days or weeks apart. And they may not all take place on the same websites. What’s happening, and how does bot detection and analysis help clarify and prevent fraud? 

Continue reading

Strapped for talent? Bootcamps are your answer

office-collaboration_contentfullwidth

IT is experiencing a skills gap crisis. According to McKinsey, nearly 90 percent of companies are already experiencing one or will within the next few years.

The previous generation of IT workers has or is aging out of the workforce, taking their expertise with them. As all of their historical knowledge leaves the workforce, demand for talent -- particularly in areas like DevOps, automation, cloud, and cybersecurity -- is heightened. However, the number of tech jobs available continues to outpace the number of hires. One study found nearly 90 percent of leaders feel unprepared to fill that gap.  

Continue reading

Cloud professionals cling to their passwords despite the risks

Cloud login password

Despite the fact that insecure password practices are regularly exploited in cyberattacks worldwide, 83 percent of cloud professionals surveyed at the recent Cloud Expo Europe event say they are confident about passwords' security effectiveness, with 34 percent 'very confident'.

But the study, of over 150 people, carried out by Beyond Identity also reveals frustrations. 60 percent find it frustrating to remember multiple passwords, 52 percent are frustrated by having to regularly change their passwords, and 52 percent by the requirement to choose long passwords containing numbers and symbols.

Continue reading

Best Windows apps this week

speccy

Five-hundred-and-forty-two in a series. Welcome to this week's overview of the best apps, games and extensions released for Windows 10 and 11 on the Microsoft Store and elsewhere in the past seven days.

Microsoft released security updates for Windows 10 and 11 this week. The updates address several critical issues in the operating systems.

Continue reading

The rise of biometrics for identity verification [Q&A]

Biometric scan

As the world increasingly moves away from relying solely on passwords for identity verification, the focus is on alternative technologies. Whether that is passkeys, biometrics or other options, each has its own advantages and adherents.

Ricardo Amper, CEO and founder of next-generation identity verification solution provider Incode, sees biometrics as the key to eliminating discrimination and to creating a world of greater trust. We spoke to him to find out more.

Continue reading

MSI launches SPATIUM M480 PRO series of PCIe 4.0 SSD

m480pro-20230511-2

Today, MSI launches the SPATIUM M480 PRO series of solid state drive, which is comprised of three PRO SSDs -- SPATIUM M480 PRO, SPATIUM M480 PRO HS, and SPATIUM M480 PRO PLAY. With their exceptional speed and cutting-edge features, the SPATIUM M480 PRO series is ready to impress professionals, content creators, and gamers alike.

At the heart of these SSDs lies high-quality, high-density 3D NAND flash memory, which enables the ultimate PRO performance for PCIe 4.0. With impressive sequential read speeds of up to 7400MB/s and sequential write speeds of up to 7000MB/s, the SPATIUM M480 PRO series takes data transfer rates to the next level. But it doesn't stop there -- MSI has also managed to achieve up to 60 percent faster random read/write speeds, ensuring an incredibly responsive experience even under heavy workloads.

Continue reading

Five ways ChatGPT can augment IT operations, without reinventing the wheel

Internet,,Business,,Technology,And,Network,Concept.,Artificial,Intelligence,(ai),,Machine

IT operations (ITOps) teams are finding it increasingly difficult to keep up with the complexity of their technology environments as they continue to grow. Today, the average large enterprise’s tech stack comprises of no less than 187 different applications. As organizations have become more reliant on these applications to support customer experiences and keep revenue flowing, ITOps teams face growing pressure to keep them running smoothly. They need to respond instantly to possible security incidents or service outages before they impact the business, support internal users effectively, and -- where time permits -- support development teams in their efforts to deliver innovation projects. Given the sheer breadth of responsibilities ITOps teams face, it’s no surprise that burnout has become commonplace.

To overcome these challenges and alleviate some of the pressure on ITOps teams, organizations are turning to artificial intelligence (AI) and automation. These capabilities can help by reducing manual workloads and increasing operational efficiency, which in turn boost job satisfaction and often leads to better customer experiences. Organizations have turned to many approaches and tools to drive this automation over the years, but in recent weeks it is ChatGPT, a sophisticated large language model, which has been capturing their attention. Cutting through all the hype, it’s possible to identify clear, practical upsides for businesses that implement ChatGPT in their IT operations.

Continue reading

How does adopting cloud and hybrid environments drive change in managing identities?

Cloud question

Businesses of all sizes have had to accelerate digitization across the entire business in recent years, as the adoption of hybrid working practices forces them to make changes to ensure operational continuity. By digitizing processes and embracing the cloud, businesses have delivered faster, more flexible, and more resilient services for employees and customers.

The rate of cloud adoption shows no signs of relenting. Gartner forecasts worldwide public cloud end-user spending to reach nearly $600 billion in 2023. This growth presents a multitude of opportunities, but the compounded cyber risk that comes with a widening digital footprint presents IT and security teams with an immense challenge.

Continue reading

SMEs underestimate the cost of cyber incidents

Money

A new report from cyber insurance provider Cowbell shows that 90 percent of small business leaders underestimate the cost of a cyber incident.

The study of 500 SME leaders across the US shows that 50 percent of SMEs have experienced a significant cyber incident in the past 12 months and, of those, 90 percent say the attack cost more than they anticipated.

Continue reading

Google brings AI collaboration to work

Google Duet AI

Google used yesterday's Google I/O to announce new services and capabilities across Google Cloud and Workspace.

Among these is Duet AI, an AI-powered collaborator, to enable more users and developers to start seeing the impact AI can have on their organization and help solve day-to-day work challenges.

Continue reading

Bad bot threats present a growing risk to organizations

big red bad bot

A global analysis of automated bot traffic across the internet finds that in 2022, almost half (47.4 percent) of all internet traffic came from bots, a 5.1 percent increase over the previous year. At the same time the proportion of human traffic (52.6 percent) decreased to its lowest level in eight years.

The report from Imperva shows the volume of bad bot traffic has grown for the fourth year in a row, presenting a significant risk for businesses. The level of activity in 2022 is the highest since Imperva produced its first Bad Bot Report in 2013.

Continue reading

Consumers remain hesitant about using biometrics

security eye fingerprint forensics

A new survey of 1,000 global consumers shows that 54 percent think digital authentication methods such as biometrics are revolutionizing the customer experience when it comes to online transactions and payments.

However, the study from Incode Technologies, also reveals that 48 percent of respondents do not see digital authentication as contributing to trust in the online world. This is due to concerns about fraud protections, privacy, and security.

Continue reading

Get 'GPT-3' (worth $27.99) for FREE

GPT-3

GPT-3, by Sandra Kublik and Shubham Saboo, provides a comprehensive guide on how to utilize the OpenAI API with ease. It explores imaginative methods of utilizing this tool for your specific needs and showcases successful businesses that have been established through its use.

The book is divided into two sections, with the first focusing on the fundamentals of the OpenAI API. The second part examines the dynamic and thriving environment that has arisen around GPT-3.

Continue reading

Three lesser-known endpoint vulnerability strategies you might be missing

endpoint protection

Modern IT environments continue to become more and more distributed, driving the growth of endpoints across the enterprise. Some research estimates that enterprises now manage more than 135,000 endpoints and Enterprise Strategy Group estimates that more than 70 percent of employees use more than four devices daily for work. That’s a lot of endpoints. And when you combine this endpoint growth with the fact that 560,000 new pieces of malware are detected every day, how can you not wonder if your organizations is the next target for a ransomware or phishing attack.

Security pros are overwhelmed by endpoints and struggle to find the right mix of solutions and strategies that can effectively secure their organizations. The more diverse they are, the more difficult they are to manage and secure (especially with mobile and IoT device proliferation). Just look at recent attacks against Twitter, Slack, Taco Bell, and more. For many organizations, endpoint security is really hard. This is why their security teams need to constantly assess and adjust their endpoint security strategies.

Continue reading

Load More Articles