Addressing the demographic divide in AI comfort levels


Today, 37 percent of respondents said their companies were fully prepared to implement AI, but looking out on the horizon, a large majority (86 percent) of respondents said that their AI initiatives would be ready by 2027.
In a recent Riverbed survey of 1,200 business leaders across the globe, 6 in 10 organizations (59 percent) feel positive about their AI initiatives, while only 4 percent are worried. But all is not rosy. Senior business leaders believe there is a generational gap in the comfort level of using AI. When asked who they thought was MOST comfortable using AI, they said Gen Z (52 percent), followed by Millennials (39 percent), Gen X (8 percent) and Baby Boomers (1 percent).
The five steps to network observability


Let's begin with a math problem -- please solve for “X.” Network Observability = Monitoring + X.
The answer is “Context.” Network observability is monitoring plus context. Monitoring can tell the NetOps team that a problem exists, but observability tells you why it exists. Observability gives the Network Operations (NetOps) team real-time, actionable insights into the network’s behavior and performance. This makes NetOps more efficient, which means lower MTTR, better network performance, less downtime, and ultimately better performance for the applications and business that depend on the network. As networks get more complex and IT budgets stay the same size, observability has become very important. In the past two years, I’ve heard the term used by engineers and practitioners on the ground much more often. Gartner predicted that the market for network observability tools will grow 15 percent from 2022 to 2027.
Shining a light on spyware -- how to keep high-risk individuals safe


With elections across the world, there is a tremendous amount of attention placed on the threat posed by AI and digital misinformation. However, one threat we need to have more focus on is spyware.
Spyware has already been used by nation states and governments during elections to surveil political opponents and journalists. For example, the government of Madagascar has been accused of using the technology to conduct widespread surveillance ahead of its elections.
The five stages of vulnerability management


Nearly every organization today builds a lot of software, and the majority of that software is developed by cobbling together open source components. When using open source and trying a software composition analysis (SCA) scanner for the first time, it is not uncommon for those organizations to be surprised at what they learn about their open source usage. Many times it quickly comes to light that they have a large load of new and unplanned work to address in the form of security issues in dependencies. They need to fix these issues not just for the organization itself but also to stay compliant with certifications such as PCI or SOC2.
That’s when these organizations begin to experience the five stages of vulnerability management.
How CISOs should tackle the year of deepfakes


Deepfakes are picking up steam and no one is safe -- not even the President of the United States, who was recently the subject of an election-based audio deepfake scandal. And with an unavoidably heated year ahead with the impending presidential election, I anticipate deepfakes will continue to proliferate.
Deepfakes are a unique cybersecurity topic. They stem from social engineering and are always evolving, but there’s a responsibility for CISOs to position their organizations to combat them.
Closing the gap between cyber risk strategy and execution


Effective cyber risk management is more crucial than ever for organizations across all industries as threat actors are constantly evolving their tactics. Yet, the latest Cyber Risk Peer Benchmarking Report from Critical Start unveils a striking dichotomy between strategy and execution in cyber risk management. While 91 percent of organizations acknowledge the criticality of having a robust risk management strategy, the execution of these strategies appear to fall short.
This gap between cyber risk strategy and execution widens as organizations grow larger. To fully comprehend an organization’s risk and executive strategies effectively, IT leaders must first understand the lifecycle of cyber risk and ensure each stage is addressed.
Identity governance: Balancing cost reduction with effective risk management


Cost reduction is a top priority for many organizations, leading to the adoption of various technologies to automate tasks and improve efficiencies for cost savings. However, minimizing risk should also be a key objective for every business.
To achieve this, companies are looking into Identity Governance and Administration (IGA), which is a policy framework and security solution for automating the creation, management, and certification of user accounts, roles, and access rights. This ensures consistency, efficiency, and improved awareness, all of which are essential for reducing security risks. However, implementing IGA can often be seen as a laborious task that gets abandoned before the business experiences the benefits it has to offer.
Companies aren't 'owning' their data


With a rapidly developing threat landscape, an increase in high-profile data breaches, the introduction of new legislation, and customer tolerance for poor data handling at an all-time low, the stakes are high for companies to have robust cybersecurity in place. However, despite their best efforts, companies are often found to not be doing enough to protect their assets.
Often, this is due to a case of ‘too much, too fast’. As businesses invest in new technologies, their day-to-day operations are being supported by ever more complex and fragmented technology platforms. At the same time, the amount of customer data available to them is growing and constantly streaming in, and bad actors are consistently launching more sophisticated attacks. Meanwhile, leaders are not fully aware of or own responsibility for their cybersecurity plans. As the digital world evolves with new threats and regulations, business leaders must recognize the importance of data protection. If they do not, they cannot adequately protect their customer's data and are in danger of losing their trust and even their continued existence in business.
Why businesses can't go it alone over the EU AI Act


When the European Commission proposed the first EU regulatory framework for AI in April 2021, few would have imagined the speed at which such systems would evolve over the next three years. Indeed, according to the 2024 Stanford AI Index, in the past 12 months alone, chatbots have gone from scoring around 30-40 percent on the Graduate-Level Google-Proof Q&A Benchmark (GPQA) test, to 60 percent. That means chatbots have gone from scoring only marginally better than would be expected by randomly guessing answers, to being nearly as good as the average PhD scholar.
The benefits of such technology are almost limitless, but so are the ethical, practical, and security concerns. The landmark EU AI Act (EUAIA) legislation was adopted in March this year in an effort to overcome these concerns, by ensuring that any systems used in the European Union are safe, transparent, and non-discriminatory. It provides a framework for establishing:
The $13 billion problem: Tackling the growing sophistication of account takeovers


Fraudsters have used account takeovers (ATOs) to victimize 29 percent of internet users, resulting in $13 billion in losses in 2023. Over three-quarters of security leaders listed ATOs as one of the most concerning cyber threats, and the danger grows as bad actors leverage AI to launch more potent attacks.
The Snowflake breach demonstrates the devastating consequences of ATOs. Attackers gained access to 165 of the data platform’s customers’ systems, including AT&T and Ticketmaster, and exfiltrated hundreds of millions of records containing sensitive data. The attack wasn’t some brilliant hacking scheme -- the bad actors simply used legitimate credentials to log into the platform.
Why third-party email filters may be ineffective in Microsoft 365 environments


Because email is the primary source of initial entry in many breaches, many organizations pay for sophisticated, third-party email filtering solutions on top of the protections afforded by Microsoft 365. This is a wise investment; having layers of protection by different vendors helps eliminate blind spots found in any one vendor solution and provides complexity that can foil attack attempts.
Yet, few know that threat actors can easily bypass these third-party filtering products by directing emails to onmicrosoft.com domains that are an inherent part of the Microsoft 365 configuration.
Think rebuild, not recovery, after a supply chain attack


We are living in a time when siloed businesses are increasingly rare. Supply chains are the lifeblood of modern organizations, enabling the seamless flow of goods, services, and information. This interconnected network creates a trade ecosystem vital to the survival of both businesses and consumers.
So, understandably, when a cyberattack disrupts this critical process, the immediate response is often panic-driven -- focusing solely on getting operations back online as quickly as possible. While restoring functionality is essential, this approach frequently overlooks a crucial aspect: rebuilding security.
How will AI change the future of software development teams?


AI is revolutionizing the landscape of software development, but it isn’t about replacing human developers. Instead, we are entering an era of “AI-augmented development,” where AI tools are becoming invaluable allies, enhancing human abilities across the software lifecycle. AI will help close the gap between the high demand for custom software and the limited engineering capacity worldwide.
In this new paradigm, AI is stepping in to assist with repetitive and time-consuming tasks, allowing developers to focus on more complex problems. The evolution of software teams will include a new breed of AI-native developers specializing in integrating AI into applications and leveraging AI tools. With AI, the potential productivity boost for developers is extraordinary, allowing them to work faster and smarter. However, while AI can amplify a developer's capabilities, it cannot replace the human creativity, problem-solving, and decision-making that are essential to successful software development. The future belongs to teams that can skillfully blend AI with human expertise.
The magic of RAG is in the retrieval


Any leading large language model will do. To succeed with retrieval-augmented generation, focus on optimizing the retrieval model and ensuring high-quality data.
The decades-long pursuit to capture, organize and apply the collective knowledge within an enterprise has failed time and again because available software tools were incapable of understanding the noisy unstructured data that comprises the vast majority of the enterprise knowledge base. Until now. Large language models (LLMs) that power generative AI tools excel at processing and understanding unstructured data, making them ideal for powering enterprise knowledge management systems.
Supercharge your SaaS with an integration marketplace


The average company uses 342 SaaS apps prompting B2B software buyers to consider integrations a top priority in their purchasing decisions. However, simply providing connections between platforms is not enough for SaaS companies to deliver a good user experience. Customers should be able to discover, activate and monitor integrations without calling customer support.
An integration marketplace offers an elegant solution to software connectivity challenges. This feature provides a centralized, self-service hub for integrations that delivers a seamless experience for customers connecting your application to their other tools. Users can create a more cohesive tech stack with just a few clicks. Marketplaces save customers time and resources and position your company as a more flexible, scalable and indispensable partner, driving higher product adoption and customer retention.
© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.