Combatting Deepfakes in Australia: Content Credentials is the Start

Combatting Deepfakes in Australia: Content Credentials is the Start

There is growing consensus on how to address the challenge of deepfakes in media and businesses, generated through technologies such as AI. Earlier this year, Google announced that it was joining the Coalition for Content Provenance and Authenticity as a steering committee member — other organisations in the C2PA include OpenAI, Adobe, Microsoft, AWS and the RIAA. With growing concern about AI misinformation and deepfakes, IT professionals will want to pay close attention to the…

Read More

Udemy Report: Which IT Skills Are Most in Demand in Q1 2024?

Udemy Report: Which IT Skills Are Most in Demand in Q1 2024?

The tech industry courses people are taking online can tell a lot about which IT skills are in demand and what paths to careers look like today. Udemy is an online learning platform that collects data quarterly about which courses on its platform are most in demand. We’ve dialed in on the tech and IT skills from their Q1 2024 report. Explore these in-demand IT skills to help choose where your tech career should go…

Read More

RSA: Google Enhances its Enterprise SecOps Offerings With Gemini AI

RSA: Google Enhances its Enterprise SecOps Offerings With Gemini AI

The RSA Conference, held in San Francisco from May 6-9, brings together cybersecurity professionals from across the world. This year’s conference is buzzing with conversation about generative AI: how to use generative AI to protect against attacks and how to secure generative AI itself. We’re rounding up the enterprise business tech news from RSA that is most relevant for IT and tech decision-makers. This article will be updated throughout RSA with more tech news highlights….

Read More

Androxgh0st Malware Botnet Steals AWS, Microsoft Credentials and More

Androxgh0st Malware Botnet Steals AWS, Microsoft Credentials and More

The Federal Bureau of Investigation and Cybersecurity & Infrastructure Security Agency warned in a joint advisory about a threat actor deploying a botnet that makes use of the Androxgh0st malware. This malware is capable of collecting cloud credentials, such as those from AWS or Microsoft Azure and more, abusing the Simple Mail Transfer Protocol, and scanning for Amazon Simple Email Service parameters. What is the Androxgh0st malware? The Androxgh0st malware was exposed in December 2022…

Read More

Intel Spins Off Enterprise Generative AI Deployment Firm Articul8

Intel Spins Off Enterprise Generative AI Deployment Firm Articul8

Intel and the global investment firm DigitalBridge Group have formed an independent generative AI software stack company, Articul8 AI, Inc. (Articul8); Intel announced the new company on Jan. 3. Articul8 will work with Intel and provide solutions for organizations that wish to build and deploy generative AI. Articul8’s product and capabilities Articul8’s product is “a turnkey GenAI software platform that delivers speed, security and cost-efficiency to help large enterprise customers operationalize and scale AI,” according…

Read More

Google Adds Gemini Pro API to AI Studio and Vertex AI

Google Adds Gemini Pro API to AI Studio and Vertex AI

Starting Dec. 13, developers can use Google AI Studio and Vertex AI to build applications with the Gemini Pro API, which allows access to Google’s new generative AI model. Google’s initial rollout of Gemini was limited to Google Bard and the Pixel 8 Pro, so Wednesday’s general availability of Gemini for Google AI Studio and Vertex AI marks the first test of Gemini for enterprise developers. AI Studio and Vertex AI with Gemini can help…

Read More

AWS Launches New Chips for AI Training and Its Own AI Chatbot

AWS Launches New Chips for AI Training and Its Own AI Chatbot

Amazon Web Services announced an AI chatbot for enterprise use, new generations of its AI training chips, expanded partnerships and more during AWS re:Invent, held from November 27 to December 1, in Las Vegas. The focus of AWS CEO Adam Selipsky’s keynote held on day two of the conference was on generative AI and how to enable organizations to train powerful models through cloud services. Jump to: Graviton4 and Trainium2 chips announced More must-read AI…

Read More

EleKtra-Leak Campaign Uses AWS Cloud Keys Found on Public GitHub Repositories to Run Cryptomining Operation

EleKtra-Leak Campaign Uses AWS Cloud Keys Found on Public GitHub Repositories to Run Cryptomining Operation

In the active Elektra-Leak campaign, attackers hunt for Amazon IAM credentials within public GitHub repositories before using them for cryptomining. Get tips on mitigating this cybersecurity threat. Image: WhataWin New research from Palo Alto Networks’s Unit 42 exposes an active attack campaign in which a threat actor hunts for Amazon IAM credentials in real time in GitHub repositories and starts using them less than five minutes later. The final payload runs customized Monero cryptomining software…

Read More

Amazon Web Services Launches Independent European Cloud as Calls for Data Sovereignty Grow

Amazon Web Services Launches Independent European Cloud as Calls for Data Sovereignty Grow

The AWS Sovereign Cloud will be physically and logically separate from other AWS clouds and has been designed to comply with Europe’s stringent data laws. Image: Stack Commerce Amazon Web Services has launched an independent cloud for Europe designed for public sector customers and companies operating in highly regulated industries within the European Union. The AWS Sovereign Cloud will operate both “physically and logically” separate from AWS’s existing cloud regions and has been engineered specifically…

Read More

SSL vs TLS: Which Should You Be Using?

SSL vs TLS: Which Should You Be Using?

Secure communication protocols like SSL and TLS are the modern Internet’s foundation. They form an invisible yet essential layer to protect all our online activities from ever-increasing, evolving cyber threats. This article reviews differences, use cases, and best practices for each so you can make an informed decision. What is SSL and TLS? The Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols use encryption algorithms to establish a secure connection between two endpoints….

Read More
1 2 3 5