Non-human identities pose security risks for enterprises
Non-human identities (NHIs) refer to things like API keys, service accounts, system accounts, OAuth tokens. You may not give them too much thought, but a new report from Silverfort looks at the impact they have on an organization's cybersecurity.
Active Directory service accounts -- used for machine-to-machine communication within Microsoft’s Active Directory's (AD) environments -- are the most common and regularly compromised NHIs.
Hell freezes over as Microsoft announces it is pulling ads from Skype
Skype is one of those apps that has found numerous ways to irritate users over the years. But in something of a surprise move, Microsoft has announced a change that will instead delight.
Considering that this is a company that has faced complaints and criticism for stuffing ads into its Windows and Office products, the announcement feels very out of character. But the killing off of ads is not the only change in Skype.
Google Maps makes it easier to report cops on the road
Google has announced a series of updates for both Maps and Waze which will help to keep drivers better informed on their journeys. One of the most pleasing updates for Google Maps is an easier way to report when you've seen cops in the area so other drivers can be alerted -- and you can benefit from other drivers' reports.
Another helpful addition to Maps means that when you navigate to an address, the building you are looking for and, importantly, the entrance, will be highlighted for you. New features and options are not limited to Google Maps; Waze also has a number of handy additions.
Companies lack policies to deal with GenAI use
While 27 percent of security experts perceive AI and deepfakes to be the biggest cybersecurity threats to their organisations not all have a responsible use policy in place.
The third part of a survey of over 200 information security professionals carried out at Infosecurity Europe 2024 has been released today by KnowBe4 and it finds 31 percent of security professionals admit to not having a 'responsible use' policy on using generative AI within the company currently in place.
'Yo quiero' Voice AI: Taco Bell enhances U.S. drive-thrus with new technology
Yum! Brands, owner of Taco Bell, has announced the expansion of its Voice AI technology to additional drive-thru locations across the U.S., aiming to equip hundreds of stores by the end of 2024. This development is part of a larger plan to eventually deploy Voice AI technology in Taco Bell drive-thrus worldwide.
The Voice AI technology, already operational in more than 100 Taco Bell drive-thrus across 13 states, seeks to streamline operations for team members and improve the ordering process for customers. The reported benefits include reducing the workload for team members, enhancing order accuracy, providing a consistent and amiable customer interaction, and decreasing wait times, which collectively contribute to Taco Bell's and Yum! Brands' growth objectives.
Get 'Deep Learning Approaches to Cloud Security' (worth $190) for FREE
Covering one of the most important subjects to our society today, Deep Learning Approaches to Cloud Security delves into solutions taken from evolving deep learning approaches, solutions allowing computers to learn from experience and understand the world in terms of a hierarchy of concepts, with each concept defined through its relation to simpler concepts.
Deep learning is the fastest growing field in computer science. Deep learning algorithms and techniques are found to be useful in different areas like automatic machine translation, automatic handwriting generation, visual recognition, fraud detection, and detecting developmental delay in children. However, applying deep learning techniques or algorithms successfully in these areas needs a concerted effort, fostering integrative research between experts ranging from diverse disciplines from data science to visualization.
Samsung launches 1TB PRO Plus and EVO Select microSD cards
Samsung has launched 1TB variants of its PRO Plus and EVO Select microSD cards which are enhanced by the company's eighth-generation V-NAND technology. These new offerings aim to meet the growing demands for high-performance and high-capacity storage solutions, particularly among content creators and tech enthusiasts.
Hangu Sohn, Vice President of Memory Brand Product Biz Team at Samsung Electronics, noted the importance of these advanced storage solutions in today’s tech landscape. "The new high-capacity microSD cards, PRO Plus and EVO Plus, are our response to the demand for storing large amounts of high-quality data in a reliable and secure way," Sohn explained.
Nation-state actors exploit political tension to launch phishing campaigns
A new report from phishing protection specialist Bolster identifies 24 separate nation-state threat actor groups attempting to exploit rising political tensions across the US to interfere with the 2024 presidential elections.
Attackers are leveraging AI to automate mass spam campaigns, and also to reply in real-time. This targeting and interactivity at scale increases their chances of gaining access to more sensitive data. The influx of election-themed spam is a significant cyber threat, causing widespread confusion among citizens and undermining trust in legitimate election communications.
Enterprise AI adoption soars almost 90 percent
For some time now AI has been the go-to technology to enable informed decision making, accelerate innovation, and enhance experiences for both employees and customers.
A new report from Cloudera shows that 88 percent of enterprises are adopting AI in some capacity, but many are still lacking the necessary data infrastructure and employee skills to truly benefit from it.
Report highlights cyber risks to the aviation industry
It's fair to say that no industry is truly safe from cyber attacks these days, the aviation sector is at particular risk due to the volume of customer data it handles and the potential to cause widespread disruption.
A new report from SecurityScorecard focuses on cybersecurity vulnerabilities across the airline industry and its various supply chains.
40 percent of BEC attacks are AI generated
Almost half (49 percent) of all detected spam emails are attributed to business email compromise (BEC) scams, with the CEO, followed by HR and IT, being the most common targets according to a new report.
The research from VIPRE Security Group puts a more sinister complexion on this trend, revealing that a full 40 percent of the BEC emails uncovered were AI-generated, and in some instances, AI likely created the entire message.
Google issues apology for Chrome flaw that broke its password manager
Google has apologized for a Chrome problem that resulted in millions of users being unable to use the browser's password manger.
The issue meant that affected users were not able to access saved passwords for the majority of a day. In issuing its apology, Google explains that a faulty update for the M127 version of Chrome for Windows was to blame, noting that the problem hit users globally.
Why we need to change how we understand cyber risk [Q&A]
Cybersecurity is a high priority for organizations, yet often they're unsure if they're focusing their effort in the right places, and spending too much or too little on protecting themselves.
Robin Oldham, CEO of Cydea, believes current methods of understanding cyber risk are outdated and misrepresent risk and lead to misunderstandings that only promote fear, uncertainty and doubt. We spoke to him to find out what can be done to change this mindset and approach.
AI's impact on emerging risk management trends
AI is exploding, particularly as large language models (LLMs) have infiltrated everyday life. Almost every new mainstream product seems to promote some usage of AI, and industry after industry is being transformed by its capabilities. But despite AI’s potential, some sectors have been slow to adopt it. Risk management is one of them. Fortunately, that is starting to change.
According to a 2023 Deloitte study, only 1.33 percent of insurance companies had invested in AI. Data from this year indicates a shift is underway. In Conning’s 2024 survey, 77 percent of respondents indicated that they are in some stage of adopting AI somewhere within their value chain. This may sound a bit nebulous -- some stage, somewhere -- but it represents a sizable jump from the 61 percent of respondents the prior year. Additionally, 67 percent of insurance companies disclosed they are currently piloting LLMs.
The CISO's guide to effective OT security: Overcoming challenges and fostering collaboration
Operational technology (OT) systems have long been common in industries such as manufacturing, utilities, and healthcare. However, as these systems now increasingly integrate with IT networks, they are becoming the responsibility of the Chief Information Security Officer (CISO). As a result, CISOs in these sectors need to secure OT systems alongside traditional IT systems. This added responsibility has significantly increased the demands on security leaders.
Now, to safeguard both IT and OT systems, CISOs must possess the right knowledge and resources. Understanding the complexities of OT systems is necessary for the protection of vital operations and infrastructures, however it can be difficult to separate genuine expertise from sales hype.
Most Commented Stories
© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.