AI in action: How enterprises are scaling AI for real business impact

AI in action: How enterprises are scaling AI for real business impact

To capitalize on the enormous potential of artificial intelligence (AI) enterprises need systems purpose-built for industry-specific workflows. Strong domain expertise, solid data foundations and innovative AI capabilities will help organizations accelerate business outcomes and outperform their competitors. Enterprise technology leaders discussed these issues and more while sharing real-world examples during EXL’s recent virtual event, “AI in Action: Driving the Shift to Scalable AI.” “The key to driving real impact lies in seamlessly integrating data and…

Read More

Blind Eagle Targets Colombian Government with Malicious .url Files

Blind Eagle Targets Colombian Government with Malicious .url Files

A new cyber-threat campaign targeting Colombian government institutions and organizations since November 2024 has been linked to the threat group Blind Eagle, also known as APT-C-36. The attackers have been distributing malicious .url files that mimic the effects of the recently patched CVE-2024-43451 vulnerability. The vulnerability CVE-2024-43451, patched by Microsoft on November 12 2024, allowed attackers to extract NTLMv2 hashes, which could be used for authentication attacks.  While Blind Eagle’s .url variant does not exploit this vulnerability directly,…

Read More

New York Sues Allstate Over Data Breach and Security Failures

New York Sues Allstate Over Data Breach and Security Failures

New York attorney general, Letitia James, has filed a lawsuit against Allstate’s National General unit, alleging the company failed to adequately protect consumer data and neglected to report data breaches that exposed thousands of driver’s license numbers. The lawsuit, filed in a Manhattan state court on Monday, seeks financial penalties and improved security measures. The breaches, which occurred in 2020 and 2021, stemmed from vulnerabilities in National General’s online auto insurance quoting tools. Hackers exploited…

Read More

2025 Cybersecurity Trends and Predictions: Adapting To An Era Of Evolving Threads And Technology

2025 Cybersecurity Trends and Predictions: Adapting To An Era Of Evolving Threads And Technology

All organizations today rely on technology. Whether you’re a small non-profit, a government agency, a hospital, or a traditional business, digital tools power everything from communications to service delivery to data management. This dependency means that every organization, regardless of its mission or sector, faces cyber risks. For organizations heading into 2025, these cybersecurity challenges are both a pressing concern and a strategic priority. As we look toward the future, organizations must prepare for both…

Read More

88% of security teams are reaching or exceeding performance goals

88% of security teams are reaching or exceeding performance goals

A survey from Tines reveals that 88% of security teams are reaching or exceeding performance goals. This is despite limited staff and greater workloads, as 60% of security teams contain less than 10 people and 72% of workers report increased workloads from the previous year. Furthermore, 72% of security leaders can perform their role without working extended hours, and 83% report having a healthy work-life balance. This survey consulted more than 900 security decision makers…

Read More

Cisco IT deploys AI-ready data center in weeks, while scaling for the future

Cisco IT deploys AI-ready data center in weeks, while scaling for the future

Cisco IT designed AI-ready infrastructure with Cisco compute, best-in-class NVIDIA GPUs, and Cisco networking that supports AI model training and inferencing across dozens of use cases for Cisco product and engineering teams.  It’s no secret that the pressure to implement AI across the business presents challenges for IT teams. It challenges us to deploy new technology faster than ever before and rethink how data centers are built to meet increasing demands across compute, networking, and…

Read More

Observe links end-user experience with back-end troubleshooting

Observe links end-user experience with back-end troubleshooting

Frontend Observability uses a capability called Browser Real User Monitoring (RUM) to enable IT and developer teams to quickly identify and diagnose performance issues across browsers, devices, and locations. For instance, RUM identifies anomalies in page load times, core web vitals, and JavaScript or HTTP errors. RUM also provides developers visibility into mobile app performance and mobile user experiences. “Developers increasingly view end-user experience as essential to an application’s success,” said Kate Holterhoff, senior analyst…

Read More

Microsoft’s March 2025 Patch Tuesday Addresses 56 CVEs (CVE-2025-26633, CVE-2025-24983, CVE-2025-24993)

Microsoft’s March 2025 Patch Tuesday Addresses 56 CVEs (CVE-2025-26633, CVE-2025-24983, CVE-2025-24993)

6Critical 50Important 0Moderate 0Low Microsoft addresses 56 CVEs, including seven zero-day flaws, with six of those being exploited in the wild. Microsoft patched 56 CVEs in its March 2025 Patch Tuesday release, with six rated critical, and 50 rated as important. This month’s update includes patches for: .NET ASP.NET Core & Visual Studio Azure Agent Installer Azure Arc Azure CLI Azure PromptFlow Kernel Streaming WOW Thunk Service Driver Microsoft Local Security Authority Server (lsasrv) Microsoft…

Read More

The Rise Of AI-Powered Cyber Threats: How Adversaries Are Using “Good Enough” Tactics to Outsmart Defenders

The Rise Of AI-Powered Cyber Threats: How Adversaries Are Using “Good Enough” Tactics to Outsmart Defenders

As we move into 2025, organizations are laser-focused on maximizing resources and achieving better business outcomes. Increasingly, this translates into leveraging AI and automation to streamline operations, improve efficiency, and enhance cybersecurity efforts. While we’re not on the brink of AI achieving sentience, its role in cybersecurity is undeniable—particularly in automating repetitive, time-consuming tasks. However, the same tools that empower defenders can be easily weaponized by adversaries, leading to a heightened and more complex threat…

Read More
1 171 172 173 174 175 3,974