Generative AI gold rush drives IT spending — with payoff in question

Generative AI gold rush drives IT spending — with payoff in question

AI promises cost savings, productivity improvements, and better customer experiences, but CIOs need to figure out how to calculate the ROI, McDonald said. “The question then becomes, ‘What am I going to get from this?’” he added. “That investment is not necessarily trivial.” While enterprises look to adopt AI, many software vendors will be flooding the market with AI-based products in the next two years, Lovelock suggested. AI-based email and collaboration tools, content services, and…

Read More

Cloud native platforms: To build or to buy?

Cloud native platforms: To build or to buy?

When it comes to cloud native application platforms, we’re at an important evolutionary point: will the best practice for platforms be to build or to buy? Should you choose the components you need for a platform and integrate them together, or should you buy a pre-integrated platform? Unless you’re a handful of organizations, the practical answer is that you should buy the platform. Before I get to why, what even is a “cloud native platform”?…

Read More

For Cisco Insider Wouter Hindriks, curiosity and passion for problem solving are keys to success.

For Cisco Insider Wouter Hindriks, curiosity and passion for problem solving are keys to success.

Cisco’s advocacy community, Cisco Insider Advocates, brings our customers together and provides a way for them to make powerful connections, expand their professional and personal networks, and learn from top experts in their field. One of our goals with our advocacy community is to deepen our relationships with our customers. Our Q&A series allows us to shine a spotlight on some of our most passionate advocates as we learn more about their stories and backgrounds….

Read More

Cisco marries AI and security with cloud-based data center offering

Cisco marries AI and security with cloud-based data center offering

“This dataplane supports two data paths: a primary (main) and a secondary (shadow). Traffic is replicated between the primary and the secondary,” Connors wrote. “Software updates are first applied to the secondary dataplane, and when fully vetted, the roles of the primary and secondary dataplanes are switched. Similarly, new security policies can be applied first to the secondary dataplane, and when everything looks good, the secondary becomes the primary.” The idea is to allow software…

Read More

Quishing Attacks Jump Tenfold, Attachment Payloads Halve

Quishing Attacks Jump Tenfold, Attachment Payloads Halve

Quishing attacks, a form of phishing that leverages QR codes, have significantly increased, climbing from a mere 0.8% in 2021 to 10.8% in 2024.  The figures come from the latest Egress report, which also suggests a notable decrease in attachment-based payloads, which halved from 72.7% to 35.7% over the same period.  According to the new data published today, impersonation attacks have remained prevalent, with 77% masquerading as well-known brands, notably DocuSign and Microsoft. Social engineering…

Read More

Devices Infected With Data-Stealing Malware Increased by 7 Times Since 2020

Devices Infected With Data-Stealing Malware Increased by 7 Times Since 2020

The number of devices infected with data-stealing malware in 2023 was 9.8 million, a sevenfold increase over the same figure for 2020, according to new research from Kaspersky Digital Footprint Intelligence. However, the researchers believe that the true figure could be as high as 16 million, as credentials from devices infected in 2023 may not be leaked onto the dark web until later this year (Figure A). Figure A: Number of infections of data-stealing malware…

Read More

Russia’s Sandworm Upgraded to APT44 by Google’s Mandiant

Russia’s Sandworm Upgraded to APT44 by Google’s Mandiant

The Russian-backed threat actor known as Sandworm has become such a prominent ally of the Kremlin in the Ukraine war that Mandiant has decided to graduate the group into a named Advanced Persistent Threat (APT) group, APT44. In a new report, the Google-owned cybersecurity firm revealed that Sandworm has been responsible for almost all the disruptive and destructive operations against Ukraine over the past decade. Since the outbreak of the war in Ukraine, Sandworm has…

Read More

Earth Day: How we’re helping our social and environmental systems heal and thrive

Earth Day: How we’re helping our social and environmental systems heal and thrive

Earth Day was founded in the United States on April 22, 1970, to mark the emergence of the modern environmental movement, and it inspired more than 20 million Americans to take action. By 2020, Earth Day had grown to become an international movement, with more than 1 billion worldwide participating in Earth Day actions. More than fifty years later, the world is more connected than ever before, but we’re suffering from new forms of disconnection:…

Read More

New Cyber-Threat MadMxShell Exploits Typosquatting and Google Ads

New Cyber-Threat MadMxShell Exploits Typosquatting and Google Ads

Security researchers have uncovered a new threat actor leveraging fake domains masquerading as authentic IP scanner software sites.  Zscaler ThreatLabz uncovered this sophisticated cyber-threat in March 2024 and described the findings in an advisory published on Wednesday.  The actor registered multiple domains resembling genuine software sites through typosquatting and utilized Google Ads to boost their visibility in search engine results. This strategy aimed to lure unsuspecting victims, primarily IT professionals, into visiting these malicious sites….

Read More

Shredding files on Linux with the shred command

Shredding files on Linux with the shred command

$ file guitar* guitar.png: data guitar.png-save: JPEG image data, JFIF standard 1.01, resolution (DPI), density 72×72, segment length 16, Exif Standard: [TIFF image data, little-endian, direntries=5, xresolution=74, yresolution=82, resolutionunit=2, software=GIMP 2.10.8, datetime=2019:02:04 18:48:41], progressive, precision 8, 512×512, components 3 The shredded file is described simply as “data” while the copy of the original file describes the file’s content with all the numerous details about its format that you would normally expect to see. By default,…

Read More
1 2 3 2,888