Teckedin - 2023 Curated Analysis, Opinions, Reports
  • 01 Dec 2023
  • 588 Minutes to read
  • Dark
    Light
  • PDF

Teckedin - 2023 Curated Analysis, Opinions, Reports

  • Dark
    Light
  • PDF

Article Summary

Thank you to our sponsor. All columns are sortable

Title/LinkDescriptionCategory
Forbes - Doing More With Less: Cybersecurity Tools And Budget Efficiency
In an industry like cybersecurity that’s full of confusing acronyms and new products that vendors promise will improve your organization’s security, it’s easy to get swayed into spending money on products you don’t actually need. Now more than ever, it’s critical that companies look inward to optimize the cybersecurity tools they already have, using a mathematical, fact-based approach.
Security
Computerworld - The fear and hype around AI is overblown
The LLM-based generative AI (genAI) revolution we’ve all been obsessing over this year is based on what is essentially a word- or number-prediction algorithm. It’s basically Gmail’s “Smart Compose” feature on steroids.
Artificial Intelligence
VentureBeat - A year ago, it was just ChatGPT — now LLMs are everywhere
According to SimilarWeb, in October 2023 alone, ChatGPT saw nearly 1.7 billion visits across mobile and web, with 193 million unique visitors and each visit lasting for about 8 minutes. To put into perspective, this is way more than the engagement witnessed by popular services on the internet, including Zoom and (214M visits) Google Meet (59M visits).
ChatGPT
InfoWorld - The evolution of multitenancy for cloud services
These days we are focused on new, faster processors and reduced power consumption. More gains can be obtained by better optimizing the systems that manage how the processors and storage systems are allocated to tenant processes. If I were the CTO of a cloud provider, I would start there and then move to the CPUs and I/O systems, which are more important.
Cloud
Network Computing - The Growing Middle Mile Networks Funding Debate
Congress appropriated $1 billion for the program and identified two key objectives: to “encourage the expansion and extension of middle mile infrastructure to reduce the cost of connecting unserved and underserved areas to the backbone of the internet” and to “promote broadband connection resiliency through the creation of alternative network connection paths that can be designed to prevent single points of failure on a broadband network.”
Network Management
VentureBeat - AI21 leader: Leading LLMs remain ‘differentiated’, they are not commodities
“It’s very hard to create an excellent language model, and it can take a while to understand how good they are, and their limitations.” Generally available benchmarks, and even prototyping LLMs directly, will only give weak signals on how good a model is, he said.
Artificial Intelligence
SiliconANGLE - Amazon CTO Werner Vogels architects a more frugal future for the enterprise cloud 
“There is new AI and old-fashioned AI,” Vogels noted. “You should keep in mind that not everything needs to be done with these large language models. AI makes predictions, professionals decide.”
AI/Cloud
VentureBeat - Generative AI is reshaping knowledge work. Are you ready?
As an IT leader, your company’s velocity and nautical mileage for adopting new solutions will vary. Yet even if gen AI holds great promise there is a sizeable gap in the number of technology tools available and the capabilities of employees to put them to use.
Artificial Intelligence
Datanami - Scality’s 2024 Data Storage Predictions Reveal Continued HDD Relevance Against SSD Advances
 With the use of generative AI skyrocketing and cyberattacks continuing to infect organizations, ongoing demands to decrease IT complexity with secure, efficient solutions will dominate IT budgets into the new year. In addition, perennial data storage management challenges — growing data volumes, tight budgets, skills shortages, complicated IT installations, and increasing cyber threats — will persist.
Data Storage
Forbes - Unpacking The New SEC Cybersecurity Rules: What Every CXO Needs To Know
Prior to the SEC ruling, cyber was already becoming a bigger priority in the boardroom, though this new development has certainly heightened its visibility. Now, board members and CXOs must not only be aware and knowledgeable on cyber, but they must be able to understand the potential business impacts of a cyber breach, all within the context of managing cyber risk.
Security
World Federation of Advertisers - WFA response to Adalytics report on Google Search advertising
Google does not provide transparency regarding which websites form part of the Search Partner Network, it does not provide transparency to advertisers regarding where their search ads were shown on the Partner Search Network and Google Search is not Media Rating Council (MRC) accredited for brand safety.
Marketing Tech
Information Week - AI Is Deepening the Digital Divide
As a generational event is unfolding, a digital divide between the Global North and South (as imperfect as these designations may be) is growing, and dire consequences are revealing themselves. A pervasive issue has emerged: the widespread absence of participation, voice, skills, literacy, and access is barring most of the world’s population from reaping the rewards of technological progress.
Artificial Intelligence
Computerworld - Super apps: the next big thing for enterprise IT?
“Super apps are designed to sit on top of the library of mini apps that have specific functionalities that users can download and use,” Helmer said. “Users can pick and choose and personalize their experiences by enabling some mini apps, which all have a similar user interface, and removing the ones that they don’t really care about.”
Automation & Productivity
sdxCentral - How AWS uses genAI and LLMs to transform its internal security — and help its customers
“The sheer number of code reviews we’ve conducted over the years and the scale of our code base, make it possible to effectively train and finely tune this model,” he said. “At AWS, we see issues that simply don’t happen in other environments because of the incredible scale of our operation. And this model is understanding of our specific situation helps deliver actionable outputs that accelerate our AppSec review process and the software development process overall.”
AI/Security
CIO Influence - Is Private Cloud the Game-Changer CIOs Have Been Seeking?
Previously seen as a legacy-heavy, poorly managed, and outdated system lacking modern cloud architecture, the private cloud carried a stigma of high costs and inefficiencies. However, recent advancements have transformed this perception. Present-day private cloud infrastructure matches its public counterpart’s sophistication and operational efficiency, excelling notably in specific scenarios.
Cloud
AiThority - 10 AI ML In Banking And Finances Trends To Look Out For In 2024
AI has several uses in the banking and financial services industry, but one of the most important is its application in the identification and prevention of different types of fraud. AI systems can swiftly examine enormous numbers of transactions and identify fraudulent behavior. A further use for AI is in the detection of anomalies and out-of-the-ordinary patterns that might be suggestive of fraud.
AI/ML
TechRepublic - Gartner: By 2028, 70% of Workloads Will Run in a Cloud Computing Environment
“If there’s one fundamental area for enterprises, it is that you need to go house-by-house or closet-by-closet to really look at your application portfolio and decide what is best to do with it, what can be replaced what needs to be replatformed and what needs to be refactored,” Smith said.
Cloud
Network Computing - Understanding Cisco’s Generative Artificial Intelligence Strategy 
Cisco’s approach to AI is multifaceted and deeply integrated across its portfolio. A key element of Cisco’s evolution toward gen AI is the development of Silicon One, a chip designed to handle massive workloads. Silicon One supports Cisco customers and hyperscalers in building AI-based infrastructure, encompassing advanced technology, data center networking, and optics.
Artificial Intelligence
Forbes - Transformative Leadership: Leveraging The Power Of Generative AI
Generative AI's versatility is a game-changer, adapting to the unique needs of organizational functions to increase productivity. The impact of this technology could add trillions of dollars in value to the global economy: McKinsey research estimates that generative AI could add the equivalent of $2.6 trillion to $4.4 trillion annually through use cases that support interactions with customers, generate creative content for marketing and sales, and draft computer code based on natural-language prompts, among many other tasks.
Artificial Intelligence
VentureBeat - AWS re:Invent 2023 defines a resilient vision for cloud security’s future
Amazon Detective reflects AWS’s focus on providing insights into cloud security events and investigations, supporting Identity Access Management (IAM), finding group summaries with generative AI, initiating security investigations with GuardDuty ECS Runtime Monitoring, and integrating with Amazon Security Lake.
Cloud Security
Stanford University HAI - Can Foundation Models Be Safe When Adversaries Can Customize Them?
Foundation models, particularly large language models, can be repurposed for harmful uses in various ways. Imagine that the most capable language models are being used at scale by an extremist organization for recruitment or radicalization. Or perhaps language models are tied to a system that continuously probes vulnerable servers, creating new malware on the fly to adjust to different environments autonomously. So what can model creators do to prevent their models from being repurposed for harmful uses?
Artificial Intelligence
AiThority - Top 15 AI Trends In 5G Technology
The 5G industry has created 22.8 million jobs so far. PWC’s 5G technology report has forecasted a $1.3 trillion addition to the global GDP by 2030.  For companies exploring new opportunities in 2024, kick-starting with 5G technology could amplify the benefits of working with new-gen digitally connected technologies such as artificial intelligence (AI), blockchain, Web 3.0, and the internet of things (IoT).
AI/5G
The Hacker News - Discover Why Proactive Web Security Outsmarts Traditional Antivirus Solutions
To be clear, we're not denying that an antivirus-approach solution is ideal for detecting and responding to threats, but there's no escaping the fact that it's limited by design: it's reactive. A traditional antivirus-approach solution flags known malicious signatures once they're already in your environment, so it only acts when detections match the signatures in its database.
Security
Yahoo News - Los Angeles Times - Opinion: OpenAI's drama marks a new and scary era in artificial intelligence
Sam Altman’s dismissal and rapid reinstatement as CEO of OpenAI, the creator of ChatGPT, confirms that the future of AI is firmly in the hands of people focused on speed and profits, at the expense of all else. This elite will now impose their vision for technology on the rest of humanity. Most of us will not enjoy the consequences.
Artificial Intelligence
Computerworld - GenAI is highly inaccurate for business use — and getting more opaque
Meanwhile, almost all senior bosses (95%) believe genAI tools are regularly used by employees, with more than half (53%) saying it is now driving certain business departments, according to a separate survey by cybersecurity and antivirus provider Kaspersky Lab. That study found 59% of executives now expressing deep concerns about genAI-related security risks that could jeopardize sensitive company information and lead to a loss of control of core business functions.
Artificial Intelligence
AiThority - Kolide Survey Finds 89 Percent of Knowledge Workers Use AI, But Businesses Fail to Provide Governance or Education
68% of companies allow AI use: There is a significant gap between the percentage of employees allowed to use AI (68%) and those who actually use it (89%), indicating a lack of oversight and scrutiny on AI-generated work.
Artificial Intelligence
Information Week - Is the Future of Data Centers Under the Sea?
For one, a limitless supply of cold ocean water is available to cool servers as they churn data -- a process that generates an enormous amount of heat. Cooling is believed to account for around 40% of electricity use. Overheating of servers can significantly reduce their effectiveness and may result in failure. Given that energy costs on the whole amount to some 70% of operating costs in IT, any reduction is a win.
Data Management
Network Computing - How to Speed Cyberattack Discovery
When deploying human-based threat-hunting capabilities, it’s helpful to think about the parallels to physical security leading practices, Morris says. “For example, human security guards, tasked with protecting critical assets, constantly inspect physical infrastructures and maintain the integrity of their responsible spaces by actively patrolling and investigating,” he explains. “The less static, routine, and predictable a defensive team is, the harder it is for attackers to anticipate defenders’ actions.”
Security
Network World - Is anything useful happening in network management?
All 169 said they are interested in AI for network management, and 30 said that they have identified at least one option. Only 9 said that they have a budget for their identified option in 2024, and all of them reported a common problem with AI in network management--the problem of scope. Here, they mean two kinds of scope: the extent to which AI is specialized to their own network data, and the range of devices that AI can actually see.
Network Management
VentureBeat - New technique helps LLMs improve reasoning by ignoring irrelevant information
The latest technique from researchers at Meta, named System 2 Attention (S2A), borrows concepts from psychological research. S2A meticulously revises the user’s prompt, eliminating any misleading or irrelevant information. By focusing solely on the task-relevant data, S2A allows LLMs to perform more accurately in question-answering and reasoning tasks.
Artificial Intelligence
Automation.com - Five Cybersecurity Trends to Expect in 2024
Quantum computing is advancing rapidly, so forward-thinking cybercriminals will be stealing encrypted data that they cannot unlock with today’s technology but that they might soon be able to decrypt. The top targets will be organizations with large volumes of sensitive data, such as government and defense agencies, financial and legal firms, and large corporations with valuable intellectual property. To reduce risk, organizations should not treat encryption as a panacea but instead build a multi-layered strategy that includes data classification, risk assessment and mitigation, and incident detection and response.
Security
SiliconANGLE - Balancing innovation and risk with generative AI: Five things all companies should consider 
Like any new shiny thing, it can be easy to become distracted and spend too much time in research and not enough time actually developing products and services that drive productivity or profitability. Another real danger is going down the proverbial development rabbit hole, exerting time and resources on efforts that will not pay off.
Artificial Intelligence
InfoWorld - Are we too focused on vendors? 
Are we too vendor-focused in the cloud computing market? A better question is, are vendors leading us down the wrong paths? Indeed, instead of tackling the core problems at hand, we’re distracted by the new features and the excellent new tools that are, if we’re honest, more fun to look at than solving actual problems.
Cloud
Datanami - New Dremio Report Highlights Surge in Data Lakehouse Adoption for Enhanced Cost Efficiency and Analytics
Amid the generative AI frenzy, a quieter revolution has been taking place: Open table formats—a foundational component of data lakehouses—are bringing full SQL functionality directly to the data lake. This enables organizations to move away from decades-old data warehouse architectures and their associated inefficiencies.
Data & Analytics
Network World - AI partly to blame for spike in data center costs
"Prices continue to increase across the board. Low vacancies and limited optionality have created a landlord-favorable market, and with demand outpacing supply, asking rates continue to rise. Prices have risen 15% on average, year over year," the report stated.
Data Management
SiliconANGLE - Report reveals overreliance on AI coding tools among developers despite security concerns 
However, the report argues that the ease of use has generated misplaced confidence in AI coding assistants and has created a herd mentality that AI coding is safe, whereas in reality AI coding tools are said to generate insecure code consistently. Among the respondents, 92% said that AI coding tools generate insecure code at least some of the time, but 76% still believe AI-generated code is more secure than human-written code.
Artificial Intelligence
Forbes - 6 Alternatives To ChatGPT
ClickUp claims that its research-based tools ensure high-quality content via user-input prompts tailored to specific roles. Like ChatGPT, the AI language platform can be called upon for everyday tasks such as generating emails, improvising first drafts of presentations or essays, or brainstorming.
ChatGPT
SiliconANGLE - BlackBerry report reveals 70% surge in cyberattacks, financial sector most affected 
Not surprisingly, ransomware continued to be popular. The report highlighted that attackers are increasingly resorting to double-tap or multilayered extortion schemes that involve data not only being encrypted but also stolen, with ransomware gangs threatening to release or sell the data if a ransom is not paid. Some groups were observed launching additional attacks such as distributed denial-of-service to put more pressure on victims to pay up.
Security
sdxCentral - Databricks CISO details how to shepherd a data and AI journey at scale
“They’ve heard the scary stories about AI can cause harm, and when their business wants to utilize AI, they don’t know if it’s in that tiny minority of AI that could likely cause harm, or if it’s in the majority that wouldn’t,” he said. “Security people tend to have a low tolerance for risk just instinctively. And so they’re likely to respond with ‘We shouldn’t do it’.”
AI/Security
SiliconANGLE - Cross-government cybersecurity best practices announced for safer AI development 
The guidelines are broken down into four key areas within the AI system development lifecycle: secure design, secure development, secure deployment, and secure operation and maintenance. These cover the waterfront, including threat modeling, supply chain security, protecting AI and model infrastructure, and updating AI models.
Artificial Intelligence
TechBullion - Artificial Intelligence and Cybersecurity: Safeguarding the Digital Landscape in 2024
In 2024, the integration of behavioral analytics with AI is expected to play a pivotal role in anomaly detection. By establishing a baseline of normal user behavior, AI can swiftly identify deviations that may indicate a security breach. This level of granularity enhances the accuracy of threat detection, reducing false positives and improving overall cybersecurity posture.
AI/Security
VentureBeat - The GAIA benchmark: Next-gen AI faces off against real-world challenges
The researchers said GAIA questions are “conceptually simple for humans yet challenging for most advanced AIs.” They tested the benchmark on human respondents and GPT-4, finding that humans scored 92 percent while GPT-4 with plugins scored only 15 percent.
Artificial Intelligence
Information Week - ChatGPT and the Great App-ocalypse
ChatGPT is plugged into a lot of apps and more so with every passing day. People are plugging into ChatGPT in record numbers. Then OpenAI creates customizable micro GPTs and a store to sell them in. Following that announcement came the debut of a mobile, wearable AI pin by Humane. The AI pin is priced at a modest $699 which is substantially cheaper than many modern smartphones. Traditional apps and websites are squeezed somewhere in the middle of these rapid-fire developments.
ChatGPT
VentureBeat - How generative AI will enhance cybersecurity in a zero-trust world
CISOs and CIOs continue to weigh the benefits of deploying generative AI as a continuous learning engine that constantly captures behavioral, telemetry, intrusion and breach data versus the risks it creates. The goal is to achieve a new “muscle memory” of threat intelligence to help predict and stop breaches while streamlining SecOps workflows.
AI/Security
Forbes Alternatives To ChatGPT: The Complete Guide
While the internal drama may not affect the product’s capabilities, some consumers may see the melee as symptomatic of broader issues at the company, and may be considering alternatives. Indeed, Google and its sales team have launched a campaign to lure ChatGPT users to their AI model, arguing the brouhaha at the helm of OpenAI is a sign of a need to diversify.
ChatGPT
CIO Influence - The Impact of AI on Security Issues
A manipulated data set changes the way the AI will respond to a query for anything related to the data. The input data drives the response and if the data is changed, then the response would change. So if someone wants to provide misinformation to an audience, they just need to change the input data with the misinformation
AI/Security
TechStartups - Q-Learning: Advancing Towards AGI and Artificial Superintelligence (ASI) through Reinforcement Learning
While AGI has gained mainstream attention in recent months due to the popularity of ChatGPT, the concept of artificial superintelligence (ASI) is still relatively new. ASI is one of the three major types of artificial intelligence (AI) which includes artificial narrow intelligence (ANI), artificial general intelligence (AGI), and artificial super intelligence (ASI).
Artificial Intelligence
The Hacker News - Experts Uncover Passive Method to Extract Private RSA Keys from SSH Connections
In other words, a passive adversary can quietly keep track of legitimate connections without risking detection until they observe a faulty signature that exposes the private key. The bad actor can then masquerade as the compromised host to intercept sensitive data and stage adversary-in-the-middle (AitM) attacks.
Security
DarkReading - Researchers Undermine 'Windows Hello' on Lenovo, Dell, Surface Pro PCs
By default, Windows Hello requires that fingerprint readers are "match-on-chip" (MoC), as opposed to "match-on-host" (MoH). MoC means that they have microprocessors and storage built in, eliminating the need to process and store sensitive biometric data on the host computer. That way privacy is maintained, even if the host is compromised.
Security
Information Week - How to Avoid Security Concerns While Implementing Automation
A recent survey reports that the majority of automation projects fail to take off due to their complexity. For those that do manage to reach the execution stage, there is a 50% chance of them failing. A vast majority of business leaders are not happy with their robotic process automation (RPA) implementation speed.
Automation & Productivity
VentureBeat - New technique can accelerate language models by 300x
In experiments conducted on BERT, a transformer model employed in various language tasks, they achieved an astonishing reduction of more than 99% in computations. This innovative technique can also be applied to transformer models used in large language models (LLMs) like GPT-3, opening up new possibilities for faster, more efficient language processing.
Artificial Intelligence
sdxCentral - How to navigate the private network adoption market
This number of choices is good for those that need it, but can be daunting for a decision-maker who is tasked with picking a long-term private network path for a large-scale organization. This difficulty is further enhanced by the private network market’s lack of maturity, which means a decision made today could run into a support void tomorrow.
Network Management
SiliconANGLE - How IT teams can empower every individual to drive their own productivity 
When so many business functions require implementation support, and there aren’t enough technical skills or IT people to address everyone’s needs, many companies are stuck in stop-and-go business patterns. As the demand for automation increases, IT leaders should take a new approach to scaling it across their functions — one that’s composable, accessible, and user-driven.
IT Management
sdxCentral - Gartner names 5 leading access management platforms
Gartner identifies the must-have capabilities including a directory or identity repository for users; identity administration for integrated applications basic life cycle management and profile management capabilities and the system for cross-domain identity management; SSO and session management, compatible with standard identity protocols and APIs for accessing standards-based and legacy apps; and user authentication including commodity MFA and authorization enforcement.
Security
SilconANGLE - Managing in 2024: How generative AI will scale insight 
In addition to this scaled human insight, gen AI may also scale itself, aggregating siloed information into an overall depiction of the business in all its complexities and dependencies, such as the production process, supply chains or external economic events. Insights from one part of the company, such as marketing or manufacturing, can be scaled to a new type of collective insight.
Artificial Intelligence
Network Computing - Candy Alexander Explains Why Bandwidth and Security are Both in High Demand
"Again, it's data that has become more important than ever before. One of the biggest challenges of providing ubiquitous secure access is that users now need to be able to access data from anywhere, at any time, and on any device. This can be difficult to manage due to several factors, such as the ever-increasing volume of data and the velocity at which it is generated."
Network Management
sdxCentral - DNS at 40 keeps improving with better security
“RFC 9461 provides the mapping for the DNS service type, allowing DNS servers to offer alternative endpoints and transports, whereas RFCs 9462 (DDR) and 9463 (DNR) provide endpoints with the capability to discover encrypted resolvers,” Campling explained. “This means that endpoints are not reliant on software having resolver details hard-coded into them and should support much greater choice, ultimately benefiting users.”
Network Management
VentureBeat - How to apply natural language processing to cybersecurity
The overlap between NLP and cybersecurity lies in analysis and automation. Both fields require sifting through countless inputs to identify patterns or threats. It can quickly process shapeless data to a form an algorithm can work with — something traditional methods might struggle to do.
Security
SiliconANGLE - Who will win the battle for AI in the cloud? Maybe everyone
Most market watchers agree that the early-mover phenomenon that rocketed Amazon Web Services Inc. to dominance in the public cloud is unlikely to play out the same way in AI. For one thing, all the major cloud providers already have well-established AI portfolios. Although the success of ChatGPT may have accelerated their urgency to define a strategy, none was unprepared to respond to the recent surge in customer interest.
Artificial Intelligence
VentureBeat - Generative AI is a toddler — don’t let it run your business
Cutting-edge technology and young kids may initially seem completely unrelated, but some AI systems and toddlers have more in common than you might think. Just like curious toddlers who poke into everything, AI learns through data-driven exploration of huge amounts of information. Letting a toddler run wild invites disaster, and as such, generative AI models aren’t ready to be left unattended either.
Artificial Intelligence
SiliconANGLE - Cloud security continues to give IT managers headaches. Here’s why 
The reports show that despite reams of details on best security practices, organizations don’t do well with their implementation, follow-through or consistent application. For example, consider well-known practices such as the usage of complex and unique passwords, collection of access logs and avoidance of hard-coded credentials.
Security
VentureBeat - Prepare for Increased Scrutiny: FTC Expands Investigative Powers Over AI
Given the FTC’s expanded AI resolution mirrors its authority over other industries, tech firms would be wise to take note. Proactively organizing internal records relating to AI claims, product development practices, third-party oversight and more prepares businesses to respond swiftly should scrutiny arise.
Artifical Intelligence
SiliconANGLE - Researchers find vulnerabilities in major laptop makers’ Windows Hello implementations 
“Microsoft did a good job designing Secure Device Connection Protocol (SDCP) to provide a secure channel between the host and biometric devices, but unfortunately device manufacturers seem to misunderstand some of the objectives,” Blackwing Intelligence researchers detailed in this week’s blog post. “Additionally, SDCP only covers a very narrow scope of a typical device’s operation, while most devices have a sizable attack surface exposed that is not covered by SDCP at all.”
Security
Computerworld - Don’t let Apple’s Vision Pro come in by the back door
At least initially, the Vision Pro may not have an obvious use in any workplace. It might well look like an executive’s new tech toy. But that’s exactly the same kind of argument that was made about the iPad, a view that fell apart when doctors, lawyers, and executives instantly saw how they could use it in their professional lives and took it to work.
Automation & Productivity
VentureBeat - OpenAI drama a reflection of AI’s pivotal moment
Altman is the protagonist in this story, while chief AI scientist and board member Ilya Sutskever is the antagonist. An early developer of deep learning and a star former student of AI pioneer Geoffrey Hinton, Sutskever has a strong understanding of the issues in play. He allegedly was the one pushing for a CEO change. Axios suggested that Sutskever may have persuaded board members that Altman’s accelerated approach to AI deployment was too risky, perhaps even dangerous.
Artificial Intelligence
TechBullion - AI Generative Models in Finance: Enhancing Data Analysis and Predictions
The use of AI generative models in algorithmic trading has gained considerable traction. These models analyze historical market data, identify trends, and execute trades at speeds unattainable by human traders. The result is a more efficient and agile trading system that capitalizes on market opportunities in real-time.
Artificial Intelligence
ComputerWeekly - AI productivity gains could result in four-day weeks for millions
In a paper published 20 November 2023, Autonomy forecast that AI-led productivity gains could enable 8.8 million UK workers to have a four-day work week by 2033, while just under 28 million could have their working hours reduced by 10% in the same time, if LLMs are deployed in the right way.
Automation & Productivity
CPO Magazine - CISA Roadmap for AI Cybersecurity: Defense of Critical Infrastructure, “Secure by Design” AI Prioritized
Already at the head of federal cybersecurity programs, CISA will be the conduit for the development of processes from safety to procurement to ethics and civil rights. In terms of privacy and security, the agency will be developing the NIST AI Risk Management Framework (RMF). The agency is also creating an AI Use Case Inventory to be used in mission support, and to responsibly and securely deploy new systems.
AI/Security
Android Authority - What are OpenAI GPTs? A customized ChatGPT for every task
First off, GPT stands for Generative Pretrained Transformer and it refers to the underlying technologies powering ChatGPT. A custom GPT, however, doesn’t mean building your own chatbot or language model. Instead, think of it as a customized version of the chatbot that you can train to complete a specific task.
ChatGPT
TechBullion - Marc Maggisano Explores The Influence Of Technology On Goodness And Ethical Decision-Making
Marc Maggisano delves into the intricate relationship between technology and ethical decision-making, exploring the role of technology in shaping moral values, ethical considerations in technology development, the intersection of technology and social responsibility, as well as strategies for cultivating ethical awareness in the digital age and nurturing a culture of ethical technology use.
Tech for Good
SC Media - Veterans are the key to the cybersecurity talent shortage
Industry-specific knowledge also becomes invaluable, particularly for IT organizations competing for business in the military or other government branches. Security clearances are often a prerequisite for doing business with government entities, and veterans transitioning to the private sector with these clearances in hand can give their new employers a competitive edge.
Tech Jobs
Network Computing - Is Your Infrastructure Ready? What You Need to Know Ahead of an AI Investment 
There are skills, technologies, and practices that need to be put in place to successfully see a return on your AI investment. The AI tech stack is still forming, but it is rapidly shaping up to include a broad range of technologies and capabilities that many organizations today do not possess.
Artificial Intelligence
TechRepublic - Kaspersky’s Advanced Persistent Threats Predictions for 2024
Existing APT techniques will keep being used, and new ones will likely emerge, such as the increase in AI usage, hacktivism and targeting of smart home tech. New botnets and rootkits will also likely appear, and hacker-for-hire services might increase, as will supply chain attacks, which might be provided as a service on cybercriminals’ underground forums.
Security
Information Week - Will More Threat Actors Weaponize Cybersecurity Regulations?
Dikbiyik points out that ALPHV’s SEC complaint suggests that the group may have ties in the US. The group demonstrates a strong command of English and knowledge of American corporate culture, he explains. Its knowledge of the American regulatory system is particularly indicative of potential stateside ties. “ALPHV's clear English on the dark web could be AI, but their quick SEC rule exploit? That suggests boots on the ground,” says Dikbiyik.
Security
VentureBeat - The OpenAI meltdown: Winners and losers in the battle for AI supremacy 
Essentially, Microsoft is the commercial face of OpenAI. The two companies are joined at the hip. In other words, adoption of OpenAI tools directly benefits Microsoft because it’s the exclusive partner for OpenAI’s GPT tooling.
Artificial Intelligence
sdxCentral - How to scale AI-powered RPA for long-term value
His company has now automated 470 processes across 45 business functions using 270 software bots across the network. Mathur estimated that AI-based automation has already saved 1.6 million hours of manual labor. The key to his success in scaling AI-based RPA is constant testing. VMware does an automated test for every change made to software bots, automation process and related network connections, storage locations and upgrades.
Automation & Productivity
Pew Research Center - What the data says about Americans’ views of artificial intelligence
And not everyone brings the same level of understanding. Adults with a college or postgraduate degree are more likely to be familiar with AI than those with less education. There are also significant differences by gender and age, with men and younger adults being more familiar with AI than women and older adults.
Artificial Intelligence
VentureBeat - 2024: The Year Microsoft’s AI-Driven Zero Trust Vision Delivers
Throughout Ignite 2023 sessions, Microsoft clarified that their shift to a trust model is based on identity. Zero trust permeates their security strategy from now on, with their identity-centric approach to defining and delivering a security service edge (SSE) solution reflecting the scale they’re focused on achieving. Their SEE solution is predicated on using Microsoft Entra for internet, private access and Defender for cloud apps.
Security
Datanami - O’Reilly Releases 2023 Generative AI in the Enterprise Report
“But without the proper talent in place to manage it, this rapidly evolving technology can quickly outpace enterprise resources. As this groundbreaking report unveils, we are far from reaching the peak of what generative AI can achieve, and organizations still have time to invest in the critical skills development required to be at the forefront of the AI revolution.”
Artificial Intelligence
TechCrunch - ChatGPT: Everything you need to know about the AI-powered chatbot
GPT-4, which can write more naturally and fluently than previous models, remains largely exclusive to paying ChatGPT users. But you can access GPT-4 for free through Microsoft’s Bing Chat in Microsoft Edge, Google Chrome and Safari web browsers. Beyond GPT-4 and OpenAI DevDay announcements, OpenAI recently connected ChatGPT to the internet for all users. And with the integration of DALL-E 3, users are also able to generate both text prompts and images right in ChatGPT.
ChatGPT
VentureBeat - 5 tech jobs for 2024, and the 3 U.S. cities where you’ll find them
The study ranked 30 global cities across a number of factors, including the number of job vacancies and average salaries. It measured these across the tech industry’s top five in-demand roles of cloud and software engineers; machine learning engineer, data scientist and information security analyst.
Tech Jobs
Windows Central - Microsoft demonstrates how it's training small language models to reason better than ChatGPT and Copilot
And now, it has unveiled Orca 2 (which comes in two sizes - 7 billion and 13 billion parameters) as part of its efforts to tap into the capabilities of smaller LMs. According to Microsoft, Orca 2 sports "improved training signals and methods can empower smaller language models to achieve enhanced reasoning abilities." This is a significant feat, considering these capabilities are often found on larger language models, including ChatGPT and Copilot.
ChatGPT
CFO - CFO - CFOs Must Boost Their Cybersecurity Savvy, Former FBI Agent Says
Today’s executives need to change their mindset and take the time to become cyber savvy, said Cordero. So what does a CFO well-trained in cybersecurity look like? “I define [them] as an executive who understands the different facets of cybersecurity as an enterprise risk,” Cordero said.
Security
TechCrunch - 3 skills could make or break your cybersecurity career in the generative AI era
In addition to its benefits, generative AI introduces data security and privacy concerns that we can’t disregard. While candidates should know how to use this technology to their advantage, they must also understand how large language models (LLMs) can leverage and compromise organizations’ internal data. Unsurprisingly, nearly half of executives worry that the integration of generative AI will result in new attacks against their AI models, services, or data.
AI/Security
The Hacker News - How Multi-Stage Phishing Attacks Exploit QRs, CAPTCHAs, and Steganography
By concealing malicious links within QR codes, attackers can evade traditional spam filters, which are primarily geared towards identifying text-based phishing attempts. The inability of many security tools to decipher the content of QR codes further makes this method a go-to choice for cybercriminals.
Security
VentureBeat - Why the open source community might be the biggest winner of the OpenAI fallout
One thing is clear, however: OpenAI will never be the same. The same can be said for its products, including ChatGPT and its API platform. This upheaval serves as a reminder of the fluid state of the bleeding-edge AI industry. Scientists, engineers, and philosophers will continue to argue over the risks of advanced AI systems and the existential threats of artificial general intelligence (AGI).
Artificial Intelligence
CIO Influence - Evolving Cyber Threats: AI’s Role in Reshaping the Landscape
The importance of AI in cybersecurity cannot be overstated. It acts as a proactive shield, not merely reacting to known threats but actively anticipating and adapting to emerging risks. By leveraging machine learning algorithms, AI systems continuously refine their understanding of evolving attack vectors, enabling security teams to fortify their defenses preemptively.
AI/Security
Network Computing - Zscaler Study Finds Companies are Rushing Towards Generative AI Without Considering the Risks 
The findings are striking: an overwhelming 95 percent of organizations employ gen AI tools like ChatGPT in various capacities. Breaking down the numbers further, 57 percent fully use gen AI, while 38 percent are cautiously approaching their use. The most common use cases are data analysis (78 percent), R&D services development (55 percent), marketing (53 percent), end-user tasks (44 percent), and logistics (41 percent).
Artificial Intelligence
sdxCentral - IT workers still in driver’s seat in volatile IT market
“Even with tech layoffs continuing to make headlines, it’s clear that tech workers are still very much in the driver’s seat with lots of opportunities for work across the nation,” said Scott Dobroski, an Indeed career trends analyst. “Some tech workers are even working two full-time jobs at once, perhaps in hopes of ‘trying out’ two companies to determine which one is really the best fit for them.”
Tech Jobs
Network World - 8 top industries for private 5G
Research firm Analysys Mason recently conducted a review of all publicly announced LTE and 5G deployments, and, in some use cases, 5G is already overtaking LTE. In fact, private 5G networks accounted for 65% of new announcements this year, and 5G’s share of all private wireless networks has risen from 11% in 2019 to 51% in 2022 to 53% so far this year, according to the report.
5G
VentureBeat - OpenAI’s leadership drama underscores why its GPT model security needs fixing
A related problem was observed in March, when Open AI admitted to, and then patched, a bug in an open-source library that allowed users to see titles from another active user’s chat history. It was also possible that the first message of a newly-created conversation was visible in someone else’s chat history if both users were active around the same time
Artificial Intelligence
TechCrunch - ChatGPT: Everything you need to know about the AI-powered chatbot
GPT-4, which can write more naturally and fluently than previous models, remains largely exclusive to paying ChatGPT users. But you can access GPT-4 for free through Microsoft’s Bing Chat in Microsoft Edge, Google Chrome and Safari web browsers. Beyond GPT-4 and OpenAI DevDay announcements, OpenAI recently connected ChatGPT to the internet for all users. And with the integration of DALL-E 3, users are also able to generate both text prompts and images right in ChatGPT.
ChatGPT
AiThority - Thanks To OpenAI, You Can Now Make Your Own Version Of ChatGPT
OpenAI’s GPTs (Generic Purpose Technologies) artificial intelligence agents will be available for purchase in the GPT Store in the coming weeks. OpenAI has promised to pay authors an undefined sum based on the number of times their GPTs are used, but details regarding the store’s appearance and functionality are still few. ChatGPT Plus users and OpenAI corporate clients will be allowed to create GPTs for internal use exclusively.
Artificial Intelligence
The Verge - Meta disbanded its Responsible AI team
According to the report, most RAI members will move to the company’s generative AI product team, while others will work on Meta’s AI infrastructure. The company regularly says it wants to develop AI responsibly and even has a page devoted to the promise, where the company lists its “pillars of responsible AI,” including accountability, transparency, safety, privacy, and more.
Artificial Intelligence
SiliconANGLE - The copilot era takes flight at Microsoft Ignite 2023
Copilots promise a historic software-led productivity increase. Perhaps for the first time in industry history, we’re seeing huge demand for software coincide with the ability to make it easier to write software. Just as Amazon Web Services turned the data center into an application programming interface, copilots are turning software development into natural language, enabling many more people to create. The implications on productivity are massive and we believe will kick off a new wave of growth that will become increasingly noticeable throughout 2024.
Automation & Productivity
VentureBeat - OpenAI’s leadership coup could slam brakes on growth in favor of AI safety
But one thing is clear: Altman and co-founder Greg Brockman, who quit Friday after learning of Altman’s firing, were leaders of the company’s business side – doing the most to aggressively raise funds, expand OpenAI’s business offerings, and push its technology capabilities forward as quickly as possible.
Artificial Intelligence
InfoWorld - A cloud professional’s cloud predictions for 2024
Second, generative AI is getting most of the attention in the cloud space. As I stated before, cloud conferences are now generative AI conferences as cloud providers see a huge windfall in cloud services to support net-new generative AI systems. Generative AI systems need an enormous number of resources compared to other stuff.
Cloud
eWeek - 10 Best Machine Learning Platforms 2023
The autonomous learning capabilities of AI and ML platforms are at the center of today’s enterprises. The technology is increasingly being used to make important decisions and drive automations that improve enterprise operations across disciplines. In recent years, ML technology has also formed the foundation for generative AI models, which are trained to generate new content through larger datasets and more complex ML algorithms.
AI/ML
TechBullion - What Company is Leading in Artificial Intelligence?
This unique technology propels data reliability and machine learning to new heights. It allows them to gain insightful value from large-scale machine-learning projects. Databricks also demonstrates its devotion to open-source technology through several initiatives. Apache Spark, Delta Lake, and MLflow are just a few examples of the powerful tools driving the growth of the AI industry and shaping its future. Databricks is at the forefront of this rapidly expanding field.
Artificial Intelligence
VentureBeat - How Microsoft is reducing its dependence on OpenAI
In turn, OpenAI has leveraged Microsoft’s financial resources, computational power, and market reach to transform from a research lab into an AI company that could be valued at around $86 billion. However, Microsoft is taking strategic steps to reduce its dependence on OpenAI, ensuring it captures as much value as possible in the rapidly evolving market for language models and other generative AI technologies.
Artificial Intelligence
Dark Reading - Detection & Response That Scales: A 4-Pronged Approach
"When you operate completely silent and disjointed, it puts your teams completely out of touch with your organization and inhibits their ability to work side by side with partner teams," he says. "The detection capability doesn't scale. We need the rest of the organization to be in lockstep with us and working alongside us — that's what defines a modern detection and response approach."
Security
SiliconANGLE - Generative AI gets the Microsoft treatment and supercomputers get the AI treatment 
I’ve had doubts about the “fair use” argument by many AI companies trying to justify how they trained their models on all manner of content — like, whole books, websites, music catalogs and art collections — without asking first. So does Ed Newton-Rex, former VP of audio at Stability AI who makes a credible case against the argument in Why I just resigned from my job in generative AI. “Companies worth billions of dollars are, without permission, training generative AI models on creators’ works, which are then being used to create new content that in many cases can compete with the original works.
Artificial Intelligence
sdxCentral - What is machine learning (ML)? Types, models and business use cases
ML and AI are often used interchangeably, as the two are closely connected. However, ML has a more specific, limited scope, while AI is the broader-reaching, more interactive technique that enables computers and models to perform cognitive-like functions, such as solving problems, deducing facts, forecasting, offering advice and performing complex calculations.AI/ML
DarkReading - IT Pros Worry Generative AI Will Be a Major Driver of Cybersecurity Threats
Even with generative AI making the list of top three cybersecurity threats over the next 12 months, it was clear from the report that generative AI is viewed as both a positive and negative development. Respondents say generative AI would increase productivity (43%), ensure the business is more protected against cyber threats (42%), and ensure employees are trained in cybersecurity fundamentals (36%). On the negative side, there are fears that generative AI will open new avenues for attack (67%) and put businesses at greater risk of attacks (58%).
Artificial Intelligence
sdxCentral - How standards will eliminate SASE and zero-trust confusion
Because SASE encompasses both networking and security, it can require a change in how organizations think about security when considering SASE’s integrated approach. The mixture of solutions from different vendors in different departments can lead to siloed thinking and mismatched skill sets between networking and security teams. It is important that a common language set is defined to create tight coupling among these teams. A fragmented vendor ecosystem and lack of common terminology underscores this need.
Security
Forbes - Three Questions To Ask Third-Party Vendors About Cybersecurity Risk
Search for providers that not only have well-defined security policies and procedures in place but are also transparent about these practices. This means the vendor provides public access to their security policies and procedures, and their policies address all aspects of cybersecurity, including incident response, data security and vulnerability management.
Security
Information Week - To AI Hell and Back: Finding Salvation Through Empathy
Dante needed guides to help him on his journey through Hell. In the modern AI landscape, Iannopollo said, business leaders will need their own guides. “Welcome to the nine circles of Hell,” she told the audience. “This is the place where AI hallucinates, where AI produces bias and discrimination … Hell is the place where IP abuse and privacy violations and security breaches happen.”
Artificial Intelligence
Forbes - In Promoting Cybersecurity, Everyone Has A Role
 Nearly every day we learn about a cyber intrusion or creative way that either criminal organizations or state actors are exploiting vulnerabilities. Just last month, researchers discovered a cheap streaming device that came with secretly installed malware right out of the box, which then served as a node in an organized crime scheme.
Security
VentureBeat - Here is how far we are to achieving AGI, according to DeepMind
The path to achieving artificial general intelligence (AGI), AI systems with capabilities at least on par with humans in most tasks, remains a topic of debate among scientists. Opinions range from AGI being far away, to possibly emerging within a decade, to “sparks of AGI” already visible in current large language models (LLM). Some researchers even argue that today’s LLMs are AGI.
Artificial Intelligence
Computerworld - OpenAI's ChatGPT turns one year old; what it did (and didn't do)
In the simplest of terms, LLMs are next-word, image or code prediction engines. For example, ChatGPT (which stands for "chatbot generative pre-trained transformer") is built atop the GPT LLM, a computer algorithm that processes natural language inputs and predicts the next word based on what it’s already seen. Then it predicts the next word, and the next word, and so on until its answer is complete.
ChatGPT
Network Computing - Spider-Man, the Multiverse, and IPv6
Many versions of Linux and Windows now prefer IPv6. Beyond that, embedded versions of Linux are common in IoT devices, and these devices have proliferated across environments. If you are not engaged with that plane when these IoT devices reach out to your network requesting an IPv6 address, you may not even know. It's not unusual for organizations to have a considerable number of these rogue devices that are generally unmanaged, which creates risk within the organization.
Network Management
SiliconANGLE - Google reveals details of Zimbra vulnerability used to target government organizations 
Tracked as CVE-2023-37580, the so-called zero-day vulnerability was first detected in June 2023 when Google TAG noticed it being actively exploited in targeted attacks against Zimbra’s email server. The cross-site scripting, or XSS, vulnerability allowed malicious actors to inject scripts through URL parameters, executing unauthorized commands.
Security
sdxCentral - Forrester debunks generative AI myths and offers 3 use cases
“Generative AI is ultimately a very effective predictor or probabilistic model for the next word, or more often referred to as a token in a sequence. [It’s] very, very good at this, especially for very complex sequences,” Mellen said, adding it offers functions such as content creation, articulation and chatbots, and behavior prediction in the future.
Artificial Intelligence
InfoWorld - Security, privacy, and generative AI
The output of these models might not always be factual, and the variability of their outputs are dependent on a wide variety of technical factors. How can consumers of LLMs validate that a vendor is using the most appropriate models for the desired use case, while respecting privacy, data residency, and security?
Artificial Intelligence
Datanami - HPE Research Highlights Rising Challenges in Meeting Enterprise Data Demands
For many organizations, AI will put their IT organizations at a crossroads. Capturing value from data to thrive in the era age of AI-enabled insight will require enterprises to rapidly mature their approach to hybrid cloud and how they store, manage and protect data across its lifecycle.
Data Management
VentureBeat - Challenges and solutions defining the 2024 marketing landscape
“But recent trends show that there are solutions out there for brands, ways to give them the data they need to engage their customers and deliver powerful, personalized experiences. And first-party data will be the real game changer.”
Sales & Marketing
Information Week - The Rise of Autonomous AI Agents
Soon, an army of autonomous AI agents will be all up in your business, literally, and your life. That being the case, let’s take a look at what these truly are and whether they are friend, foe, or frenemy. At least now that we’re removing their invisibility shields, you’re more likely to see them coming.
Artificial Intelligence
ZDNet - What are Microsoft's different Copilots? Here's what they are and how you can use them 
For example, with Copilot for Microsoft 365 , the suite of Microsoft 365 applications, including Word, Excel, PowerPoint, Outlook, and Teams, will be infused with Copilot to optimize your workflow, such as generating text and tables in Word, summarizing and drafting emails in Outlook, and generating Python visualizations in Excel.
Automation & Productivity
Datanami - edpanda Unveils State of Streaming Data Report on Industry Trends, Ecosystem Components and Challenges
The report shares what’s driving companies to migrate their systems from batch processing to real-time systems and the challenges they face. Based on a third-party survey of 300 engineering organizations familiar with streaming data, the report is the first comprehensive, independent study on the current state of the streaming data industry.
Data Management
Information Week - Top US Gov’t CISO Details Zero-Trust Strategy Race
"The things we’ve been talking about for the past decade and working about … it’s all happening to us right now. We needed to figure out how we’re going to galvanize and try to insert energy and focus into federal agencies to really drive forward on the things that we’d been working on for well over a decade. But we were struggling to make meaningful progress.”
Security
SiliconANGLE - Report finds surge in new multipoint extortion ransomware groups 
WithSecure undertook an analysis of data leaked on sites operated by these ransomware operators and found that many new groups have become active in this space during 2023. Of the 60 multipoint extortion ransomware gangs whose activities WithSecure has tracked during the first nine months of 2023, 29 are new.
Security
CIO Influence - Unlocking the Code: Key Differences Between Networking and Cloud Computing
Cloud networking involves orchestrating and delivering network resources and services utilizing cloud infrastructure. Serving as a form of IT architecture, it empowers organizations to establish connections among users, applications, and data irrespective of their geographical locations. The versatility of cloud networking manifests in its ability to form private cloud networks—segregated from the public Internet—and public cloud networks, accessible to anyone with Internet connectivity
Network Management
Computerworld - Your employees are likely passing off AI-generated work as their own: Report
Interestingly, almost 50% of the surveyed employees said developing expertise in generative AI will help increase their job satisfaction, make them more sought after at the workplace, and improve their earnings.
Artificial Intelligence
Network World - Cisco: Generative AI expectations outstrip enterprise readiness
Industry watchers see huge potential for AI technologies – IDC, for example, says enterprise spending on generative AI services, software and infrastructure will skyrocket over the next four years, jumping from $16 billion this year to $143 billion in 2027. However, the vast majority of companies aren’t ready for it. Just 14% of organizations surveyed in Cisco’s readiness index said they are fully prepared to deploy and leverage AI-powered technologies.
Artificial Intelligence
ZDNet - How (and why) to subscribe to ChatGPT Plus
Plus plan subscribers also get priority access to new features and improvements, including OpenAI's latest and greatest updates, such as GPT-4, ChatGPT plugins, the ability to create custom chatbots, DALL-E 3's image generation, access to the internet, and more.
ChatGPT
CIO Influence - Discover Business Intelligence’s Transformative Role in CIO Leadership
Business intelligence tools have revolutionized the way organizations access and analyze data, making it possible to harness a wealth of information that would have been impenetrable and indecipherable otherwise. In this context, the Chief Information Officer (CIO), who is responsible for managing all the organizational-level information, plays a pivotal role. By leveraging previously untapped data sources and employing advanced BI techniques, a CIO can drive transformation across multiple facets of the organization, fueling its journey toward a data-driven and future-ready future.
Data & Analytics
VentureBeat - Galileo hallucination index identifies GPT-4 as best-performing LLM for different use cases
Though surveys indicate massive interest from the enterprise in using generative AI and LLMs in particular to drive business outcomes, when it comes to actually deploying them as inferences in production, companies can witness performance gaps, where LLM responses are not 100% factually correct, due to the fact that the LLM generates text or performs tasks according to its vector database of which terms and concepts are related — regardless of truth.
Artificial Intelligence
Information Week - Balancing Act: Knowing When AI’s Risk is Worth Reward
In the near term, GenAI will be very attractive for senior-level workers, Mellen said. “Ultimately, generative AI and security tools are going to be very useful for those folks who are experienced and more senior level because they have been itching for a tool that is going to help them validate what’s happening in the environment and respond faster.”
Artificial Intelligence
Forbes - The Cybersecurity Industry Needs Talent: Here’s How To Get It
One way to do this is by exposing employees to different skills in cybersecurity outside of their day-to-day roles by providing opportunities to connect with their peers. By prioritizing meaningful in-person events on a recurring basis, organizations can integrate employees from different departments and at different levels, re-creating those watercooler moments in a new and fun setting
Tech Jobs
Computerworld - The end of the standalone application
That said, in the world of Linux, we still have "our" software. I'm writing this on LibreOffice; when I need to work with images, I use GIMP; and instead of Outlook for e-mail, I use Evolution. Of all the major software vendors in the Windows world, only Microsoft has continued to offer standalone software.
Automation & Productivity
CIO Influence - Shining a Spotlight on User Identity and Device Trust in Cybersecurity
While the rising volume of cyberattacks in financial services and across other industries could be due to increasingly sophisticated cybercriminals, this is largely a misconception. The truth is that hackers are using many of the same tactics they’ve been successfully employing for the last decade, the majority of which are aimed at exploiting user identities or compromising endpoint devices (PCs, laptops, phones, etc.). However, today’s cybercriminals have the advantage of a range of toolkits that open up hacking to “entry-level” threat actors with minimal technical skill
Security
AiThority - Generative AI Is Here to Stay, but Research Highlights User Concerns Around Misinformation and Transparency
Drawing on research conducted in the US, Germany, and Japan, the report examines similarities and differences in how the rise of generative AI (genAI) is being received culturally and between generations, what respondents’ hopes and concerns are for the future of this powerful technology, and practical approaches to online safety, ethics, and parenting.
Artificial Intelligence
Information Week - The IT Jobs AI Could Replace and the Ones It Could Create
Knowledge base managers and data scientists will be essential roles for enterprises as more and more data is fed into large language models (LLMs). “It's still a garbage in, garbage out problem, and if AI will now do more of our work, what we feed them is more important than ever,” says Katz.
Tech Jobs
sdxCentral - What’s Next: Lakshmi Sharma, Fastly chief product officer, talks cloud, privacy and security
Because of the explosion of access to the internet post-COVID, and the resulting distribution of data and access to that data, questions of where you place data, data privacy and user privacy become really important. Where do I keep my data? What is my level of privacy? And every country started to take control of their users’ privacy and information because, during COVID, everyone just wanted to take care of people. And then the problem became, uh-oh, all our information is on the web.
Privacy & Security
AiThority - New Report Finds That More Than 80 Percent of Organizations Across APAC Are Using Artificial Intelligence (AI) to Tackle Fraud
However, the report also found that as fraud and scams become more sophisticated, scams present a growing challenge and concern in the region. Increased operational costs were considered the largest impact of fraud and scams. Those in Australia were most likely to cite increased operational costs as the biggest impact of fraud detection (67% of respondents), while those in Singapore were least likely (38%).
Artificial Intelligence
VentureBeat - How generative AI is defining the future of identity access management
The majority (98%) of security professionals believe AI and machine learning (ML) will be beneficial in fighting identity-based breaches and view it as a pivotal technology in unifying their many identity frameworks. Well over half (63%), predict AI’s leading use case will be greater accuracy in identifying outlier behavior. Another 56% believe AI will help improve the accuracy of alerts, and 52% believe AI will help streamline administrative tasks
Security
Network World - Cloud management skills gap drives hybrid cloud adoption
The responses showed that a technical skills gap continues to concern many organizations deploying cloud. Some 62% of survey respondents said they viewed the lack of cloud management skills at their organization as a “major roadblock for growth.” According to the results, 33% of respondents pointed to a lack of in-house expertise when trying to get maximum value from their cloud investment. Another 15% survey cited a difficulty finding the appropriate talent.
Cloud
Datanami - SAS’s New Study Highlights Consumer Concerns Over Generative AI in Fraud
“Phishing messages are becoming more polished. Replica websites look stunningly like the ones they mean to imitate. It takes just $5 and a few seconds of audio to clone someone’s voice with readily available online tools.”
Security
AiThority - Top 20 Uses of Artificial Intelligence In Cloud Computing For 2024
Automation of tasks including data analysis, data management, security, and decision-making are at the intersection of AI and cloud computing. These efficiencies and potential cost savings may be attributed in large part to AI’s capacity to apply machine learning and extract objective interpretations of data-driven insights.
Artificial Intelligence
Information Week - How CISOs Can Navigate Cybersecurity Regulations: Forrester Panel
“Regulations that come out are really the minimum standard of what you should have,” she said, adding that companies will have an easier time with compliance even as new regulations come out if they try to go beyond minimum regulatory requirements. “If we are doing the right things to begin with, then that’s not really a far jump.”
Security
Datanami - Menlo Ventures Reveals New Data on Sentiment and Adoption Rates, Highlighting Opportunities for Startups
According to the report, enterprise investment in generative AI remains surprisingly small, totaling $2.5 billion this year–significantly less than the $70 billion invested in traditional AI and the $400 billion spent on cloud software. At the same time, the data shows that the number of enterprises using AI increased 7% in 2023, with AI spend growing by 8% and eating into total enterprise tech spend, which only grew by 5%.
Artificial Intelligence
ZDNet - 5 essential traits that tomorrow's AI leader must have
"These are going to be very different roles," he says. "You'll have to think about things from a very deep perspective. Any director of AI will need to be more technical than a director of engineering."
Artificial Intelligence
Computerworld - Q&A: NY Life exec says AI will reboot hiring, training, change management
Last month, New York Life announced the hire of Don Vu, a veteran data and analytics executive, to lead a newly formed artificial intelligence (AI) and data team with responsibility for AI, data, and insights capabilities and aligning data architecture with business architecture in support of the company’s business strategy and objectives.
Artificial Intelligence
VentureBeat - What Meta learned from Galactica, the doomed model launched two weeks before ChatGPT
Galactica survived publicly for only three days. On November 17, Meta took down the demo after an outcry over what was, back then, a word that had not yet made it into the mainstream: Hallucinations. Many were appalled by Galactica’s sometimes very unscientific output, which, like other LLMs, included information that sounded plausible but was factually wrong and in some cases also highly offensive.
ChatGPT
CIO Influence - Benefits of AI Authentication in Preventing Digital Threats
With AI-driven biometric authentication, organizations can confirm a user’s identity anytime, anywhere, and on any device. Since this form of authentication requires a selfie, fingerprint, voice recognition, or other biological characteristic captured at the moment, AI uses liveness detection to confirm the user is present when the transaction occurs – quickly identifying digital or artificially generated biometrics.
Artificial Intelligence
sdxCentral - Capgemini sees 5G’s AI potential and challenges
“I just think that’s the coolest thing,” Sambar said. “Basically, we tell the network if it’s not being used right now … just shut off the radios that aren’t being used. … And then if somebody starts using it, it fires back up. That has saved us the equivalent of 14,000 homes worth of energy in any given year. We like innovative technologies … that we can put into the network and save energy.”
5G
Information Week - How to Choose a Qualified AI Adviser
There are a lot of people who simply know how to make a model work and are more ML engineers rather than AI advisers, he explains. “You want to find an experienced technician who has delivered projects successfully,” Ries recommends. “You need to dig in with the adviser to make sure they’re not just repeating buzzwords.”
Artificial Intelligence
GeekWire - Is artificial intelligence all that intelligent? AI influencers worry about wishful thinking
What’s the harm? One of Chiang’s foremost fears is that the thinking, breathing humans who wield AI will use it as a means to control other humans. In a recent Vanity Fair interview, he compared our increasingly AI-driven economy to “a giant treadmill that we can’t get off” — and during Friday’s forum, Chiang worried that the seeming humanness of AI assistants could play a role in keeping us on the treadmill.
Artificial Intelligence
Information Week - 4 Ways AI Is Rocking This CISO’s World
On one hand, AI is augmenting cybercrime operations with potent new tools to accelerate the weaponization and exploitation of new exposures, streamline attacks at scale, and uplift credibility of social engineering attacks -- often in some scary ways, particularly using deep fakes to execute and “legitimize” targeted attacks.
Artificial Intelligence
sdxCentral - What is a passkey and can it help you ditch your passwords?
Passkeys are cryptographic tokens that use your face, fingerprint or device PIN to sign into accounts. They are stored on a user’s device and can be used to authenticate to websites and apps without the need for a password. Passkeys are more secure than passwords because they are not vulnerable to phishing attacks or data breaches.
Security
ZDNet - These are technology leaders' biggest worries about using AI at work 
Seventy percent indicated they had introduced or were planning to introduce tools that used natural language processing in the coming year, up from 67% in the previous year's survey. Top use cases for AI in the coming year include real-time cybersecurity, increasing supply chain efficiency, aiding and accelerating software development, automating customer service, and speeding up screening of job applicants.
Artificial Intelligence
VentureBeat - Report: Enterprise investment in generative AI shockingly low, while traditional AI is thriving
Barriers continue to revolve around unproven ROI and the “last mile problem,” said Ionita. Other concerns include data privacy, shortage of AI talent, lack of organizational bandwidth, compatibility with existing infrastructure and limited explainability and customizability.
Artificial Intelligence
SC Media - Gone phishing: Hackers leverage automation to launch MFA attacks and SEO poisoning
We’ve seen cybercriminals turn to real-time MFA-bypassing solutions, like “in-the-middle” techniques, MFA fatigue, and OAuth consent phishing. In fact, these types of “in-the-middle” techniques are some of the most frequently-observed methods used to gain access to MFA-secured networks in 2023
Security
AiThority - 77 Percent Of Organizations Are Investing in AI Solutions to Bolster Their Quality Engineering
The 15th edition of the World Quality Report, published by Capgemini, Sogeti2, and OpenText, highlights the rising importance of Quality Engineering (QE)3 to enhance both sustainability in business operations and value delivery to customers and end users. According to the report, 67% of organizations have incorporated QE at the core of their business operations, to ensure that technological advancements adhere to quality standards.
Automation & Productivity
VentureBeat - 7 key factors for cutting down on cloud waste
VMware’s survey found that, on average, about 40% of cloud spending goes to unused applications and storage each year. Due to sunk costs and the amount of resources consumed in the process, cloud waste — or shelfware — poses problems for everyday customers, investors and partners, and the planet.
Cloud
The Verge - The right-to-repair movement is just getting started
Apple stunned the world when it came out in support of California’s right-to-repair law. But software locks and other obstacles seem to signal that the fight is far from over.
Sustainability
Network Computing - How Certified SASE Solutions Build Trust and Resilience 
Adopting SASE’s integrated networking and security approach challenges traditional security paradigms and can necessitate a shift in an organization’s perspective. In addition, the mix of solutions from various vendors across different departments often leads to disjointed thinking and a mismatch of skills between teams. To overcome these challenges, tightly integrating network and security operations and establishing a common language that fosters strong collaboration between these teams is critical to SASE’s success.
Network Security
SiliconANGLE - IBM turns the corner with Watson: Why 2.0 is a breakthrough opportunity 
"I’m particularly amazed by IBM’s pace. Watsonx’s rapid development since its announcement in May 2023 is striking. By June, watsonx.ai and watsonx.data were already generally available, followed by Code Assistant in September, and now watsonx.governance this November. The speed of turning research into commercial products is something I’ve never seen before. IBM has effectively shrunk the time between its research and commercialization."
Artificial Intelligence
TechBullion - Blockchain and Beyond: The Technological Backbone of Metaverse Tokens
The metaverse is not a stagnant concept; it evolves with emerging technologies. Blockchain’s integration with artificial intelligence (AI) and the Internet of Things (IoT) within the metaverse can unlock new dimensions of immersive experiences. Smart environments that respond intelligently to user behavior and preferences can be powered by the combination of blockchain, AI, and IoT.
Blockchain
SiliconANGLE - IT sourcing must adopt an environmental sustainability framework 
Information technology sourcing leaders cannot afford to be bystanders to environmental sustainability. Through the foreseeable future, IT will drive an increase in energy consumption, including extensive impact through generative AI. As IT sourcing enters an environmental revolution, sustainability must be embedded within the fabric of every IT sourcing decision.
Sustainability
VentureBeat - OpenAI’s six-member board will decide ‘when we’ve attained AGI’
But as the very definition of artificial general intelligence is far from agreed-upon, what does it mean to have a half-dozen people deciding on whether or not AGI has been reached — for OpenAI, and therefore, the world? And what will the timing and context of that possible future decision mean for its biggest investor, Microsoft?
Artificial Intelligence
sdxcentral - Do remote workers miss out on career opportunities? (And are employers giving them a choice?)
“In this people-facing career of technology consulting, not having that in-person interaction with clients is challenging, but even more negatively impactful is not having those relationships with our internal EY team(s),’’ Sheldon says. “Not having in-person interactions definitely makes it harder to establish trust with each other and the client, as well as gauge and understand each other’s work habits/styles."
Automation & Productivity
VentureBeat - As Bill Gates invests in personal AI, says agents will be a ‘shock wave’
“In the near future, anyone who’s online will be able to have a personal assistant powered by artificial intelligence that’s far beyond today’s technology,” he wrote. “Agents will be able to help with virtually any activity and any area of life. The ramifications for the software business and for society will be profound.”
Artificial Intelligence
sdxCentral - AI vendors create fear, uncertainty and doubt — especially among information-hungry IT executives
Our content and reader engagement data reveals that very few companies articulate clear value propositions around their AI solutions or product offering. The result is you have little motivation to act and this is shown by limited vendor-specific AI research on SDxCentral.
Artificial Intelligence
VentureBeat - Why developer productivity isn’t all about tooling and AI
The solution is assembling highly skilled product managers, design engineers and engineering managers that developers can trust to steer the ship. For us, that means we think of hiring and maintaining a team of exceptional product managers as an extension of our strategy for maximizing developer productivity.
Automation & Productivity
SiliconANGLE - Big talk and big bucks in generative AI, but is it peaking? 
It was never smart to count Amazon out of the AI race: Amazon reportedly building ‘Olympus’ language model with 2 trillion parameters and Amazon CodeWhisperer now provides enhanced AI-generated code suggestions for MongoDB developers and Real-world generative AI use cases, AWS style
Artificial Intelligence
Network Computing - A Threat Actor’s Playground: Why Security Teams Must Decrypt HTTPS Traffic
Yet many security teams do not enable decryption at the firewall due to the potential complications it can present. Decrypting and then re-encrypting traffic passing through a gateway requires considerable compute resources, including next-gen firewalls (NGFW) or unified threat management (UTM) appliances, and can impact network performance.
Security
sdxCentral - Google Cloud/Mandiant’s 2024 outlook: GenAI’s double-edged sword effect on cybersecurity
GenAI and LLMs are anticipated to revolutionize phishing, short messaging services (SMS) and other social engineering operations. Cybercriminals can use these technologies to make the content and material, including voice and video, appear more legitimate. They can also use LLMs to clean up translations. All of these make it more difficult for users to identify fraud and spot phishing attempts.
Security
SiliconANGLE - Kubernetes security remains a big challenge for enterprise developers 
A recent survey by SpectroCloud found that 83% of those interviewed had between two and more than 10 container collections that were spread across managed services such as Amazon Web Services’ Elastic Kubernetes Service or hosted on a variety of tools such as Red Hat OpenShift or other platforms. And 14% of those surveyed have more than 100 clusters, which just means that there is room for growth for the remaining 86%
Security
TechRepublic - What Are Data Analytics Tools? A Comprehensive Overview
The top data analytics tools use techniques such as data mining to dig deep into the data and uncover useful information that wasn’t evident before. They even use predictive analytics to make educated guesses about the future based on current data. And as they gather more data over time, machine learning and artificial intelligence algorithms enable these tools to improve their performance, which allows them to learn from past results and improve their predictions.
Data & Analytics
VentureBeat - Forrester predicts A.I. code flaws will enable new attacks next year
The research and advisory firm predicts inconsistent compliance and governance practices combined with many Devops teams experimenting with multiple AI-coding assistants simultaneously to increase productivity will lead to flawed A.I. code responsible for at least three publically-admitted breaches in 2024. Forrester also warns that A.I. code flaws will pose API security risks.
Security
techrader pro - Building a cybersecurity strategy on a constrained budget
 Generative AI is increasing the sophistication of cybercriminals’ tactics, while the noisy threat landscape is creating constant challenges for businesses to overcome. This is exacerbated by tighter cybersecurity budgets, which continue to be a challenge for companies building their security strategies. In fact, iomart’s latest security report found that 27% of organizations admitted to thinking their budgets are inadequate to fully protect themselves.
Security
sdxCentral - Do answers to AI infrastructure challenges lie in networking, not GPUs?
“We are the network operating system that can straddle switching and routing; that can straddle cloud, telecom service providers and enterprise; that can bring efficiencies inside the core of a data center, between data center capacities and between GPU clusters; and then extend that into the edge of the network,” Ayyar said.
Network Management
Network Computing - The Bottom Line on Upcoming Non-Terrestrial Network (NTN) Services
A year ago, the focus was on how much time it would take big-name players such as Iridium, SpaceX, OneWeb, AST, Viasat, Amazon (Project Kuiper), and others to launch enough LEOs into space to build constellations of birds to be considered viable for enterprise IT. Delays have slowed some players, such as Amazon, which recently launched its first two LEOs for its internet service into space recently. But by comparison, Musk's SpaceX has launched thousands and is offering services internationally.
Network Management
VentureBeat - Language models can use steganography to hide their reasoning, study finds
In a new study, Redwood Research, a research lab for AI alignment, has unveiled that large language models (LLMs) can master “encoded reasoning,” a form of steganography. This intriguing phenomenon allows LLMs to subtly embed intermediate reasoning steps within their generated text in a way that is undecipherable to human readers.
Artificial Intelligence
The Hacker News - The New 80/20 Rule for SecOps: Customize Where it Matters, Automate the Rest
As more vendors attempt to challenge the dominant players in the SIEM category, demand is increasing for solutions that offer automation, which can cover 80%, while also offering customization capabilities to cover bespoke use cases - the remaining 20%.
Security
VentureBeat - The promise of collective superintelligence
I believe there is. It’s called Collective Superintelligence (CSi) and it’s been my focus as an AI researcher for the last decade. The goal is not to replace human intellect, but to amplify it by connecting large groups of people into superintelligent systems that can solve problems no individual could solve on their own, while also ensuring that human values, morals and interests are inherent at every level.
Artificial Intelligence
Information Week - Latest Okta Breach: Stolen Credentials and Third-Party Risk
The company’s remediation efforts include disabling the compromised service account and enhanced monitoring for its customer support system. Additionally, it released “session token binding based on network location as a product enhancement to combat the threat of session token theft against Okta administrators,” according to the executive report.
Security
Computerworld - How to keep remote workers connected to company culture
A recent Gallup survey of 15,000 US workers pointed to a growing disconnect between remote and hybrid remote workers and their company purpose during the past two years. That’s undercut company loyalty and led to “gig-like” relationships between employees and their employers, Gallup chief scientist Jim Harter said in a blog post. This has implications for “customer and employee retention, productivity, and quality of work,” he said.
Automation & Productivity
Forbes - Five Ways To Use Cybersecurity To Build Your Digital Trust
Using blockchain solutions may help prevent unauthorized data manipulation. Since each element included would have its own unique fingerprint, it could be easily identified when and how a given piece of data was changed and whether it was supposed to happen. Each block contains a cryptographic hash of the previous block, transaction data and a timestamp—forming a chain that makes it difficult to alter the data once recorded
Security
Information Week - Cartman v Jetson: ‘South Park’ Warns of Overreliance on Apps
Electricians, mechanics, and others with the skills to build and maintain infrastructure and devices the world relies on became extremely in-demand because everyone else lacked such knowledge, depending on software to resolve their needs.
Artificial Intelligence
TechRepublic - Google Cloud’s Cybersecurity Trends to Watch in 2024 Include Generative AI-Based Attacks
Threat actors will use generative AI and large language models in phishing and other social engineering scams, Google Cloud predicted. Because generative AI can create natural-sounding content, employees may struggle to identify scam emails through poor grammar or spam calls through robotic-sounding voices. Attackers could use generative AI to create fake news or fake content, Google Cloudwarned.
Security
DarkReading - There's Only One Way to Solve the Cybersecurity Skills Gap
A transient workforce does nobody any favors. It doesn't help individuals achieve their potential when their tenure is so short, and businesses become more vulnerable because they don't have the stability and resilience needed to create a strong security posture. Moreover, those with the deepest pockets will come out on top, making it very difficult for startups and small and midsize businesses to thrive, curtailing economic growth.
Tech Jobs
TechBullion - Cybersecurity Careers in Demand: Assessing the Relevance of a Degree
The key to success in a cybersecurity career lies in a continuous commitment to learning, adapting, and growing in a field where change is the only constant. Regardless of your chosen path, cybersecurity remains a critical and ever-expanding field, offering a wide range of opportunities for those with the passion and skills to protect digital assets in an increasingly interconnected world.
Tech Jobs
VentureBeat - Overcoming the trust, talent and price tag challenges in scaling generative AI
There are a number of challenges when it comes to AI — the cost, ensuring accuracy, maintaining data and personally identifiable information (PII) security, eliminating bias and more. But the biggest challenge that companies have right now, at the point when they’re ready to launch a gen AI initiative, is the difficulty of managing scale, especially in light of the rapidly evolving complexity of the space.
Artifcial Intelligence
SiliconANGLE - There’s more to AI than generative AI 
There’s a danger in viewing AI as gen AI or thinking that this newer form of AI is somehow “better.” But AI isn’t a hammer, and all use cases aren’t nails. There are different forms of AI, each of which are suited for different types of use cases and deliver different types of results. AI is not one big monolithic black box.
Artificial Intelligence
ZDNet - Will AI hurt or help workers? It's complicated
Looking ahead, a Goldman Sachs report stated generative AI could replace up to a quarter of current work tasks. The good news for workers? "Although the impact of AI on the labor market is likely to be significant, most jobs and industries are only partially exposed to automation and are thus more likely to be complemented rather than substituted by AI."
Artificial intelligence
Blocks & Files - Generative AI: It’s not just for the big guys
Fortunately, SMBs wishing to capitalize on the natural language processing prowess of GenAI can do so – with the right approach: Using a small language model (SLM) and a technique called retrieval augmented generation (RAG) to refine results.
Artificial Intelligence
The Verge - The UK just laid out new rules for the internet — it only gets harder from here
Ofcom recommends these platforms implement policies like not allowing strangers to send direct messages to children, using hash matching to detect and remove CSAM, maintaining content and search moderation teams, and offering ways for users to report harmful content.
Privacy & Security
Network Computing - QoS in the Era of Pervasive Video and Edge Apps
Among vendors in the end-to-end network QoS space are Fortinet, Solarwinds, ManageEngine, and others, as well as Opensource providers like OpenNMS. The focus is on providing a single network management framework that can address QoS while also reducing the number of different tools from assorted vendors that network analysts use. The tradeoff for sites using a single, overarching set of tools is that they might sacrifice some network management autonomy and risk vendor lock-in by going for an all-in-one solution.
Network Management
The Hacker News - When Email Security Meets SaaS Security: Uncovering Risky Auto-Forwarding Rules 
SaaS applications are part of the modern supply chain, and as such they should undergo proper vendor risk assessments and user access reviews prior to connecting them to company data. With Shadow IT, breached applications, non-compliant applications or malicious applications go unnoticed.
Security
sdxCentral - AT&T: Our network is the ‘next killer app’
“To date in the wireless industry, and surely in the telecom industry, the connectivity networks have really been closed boxes where partners would provide to us a system that worked great. It was all integrated hardware, software and applications in that system and if you needed help with it you generally had to call the partner: ‘hey, Cisco; hey, Nokia, Ericsson, can you help me with this?’ We’re really working on breaking that up into open disaggregated networks.”
Network Management
Information Week - Considering a Career as an IT Hardware Engineer?
“There are free tools, such as KiCaD, that allow the hobbyist community to thrive alongside professionals. “Even at the high school level there are many associations and clubs, such as FirstRobotics, where students can learn through hands-on experience.”
Tech Jobs
The Verge - Exclusive leak: all the details about Humane’s AI Pin, which costs $699 and has OpenAI integration
We don’t know how long a single battery lasts, but the device ships with two “battery boosters.” It’s powered by a Qualcomm Snapdragon processor and uses a camera, depth, and motion sensors to track and record its surroundings. It has a built-in speaker, which Humane calls a “personic speaker,” and can connect to Bluetooth headphones.
Artificial Intelligence
VentureBeat - Vanta report: AI-powered trust management will help close security compliance gaps
The findings also reveal limited risk visibility and too heavy reliance on manual compliance processes, reducing security teams’ ability to do their work efficiently. Enterprises need new methods to automate and improve their security. Compounding the urgency is ever-evolving global regulation and the growing time-suck of complying with increasing standards.
Security
Harvard Business Review - It’s Time for Boards to Take AI Seriously
Swept up in the enthusiasm to use this new capability, employees may use AI tools in relatively unsupervised ways, despite not being tested at scale. It is way too easy for employees on the front lines to take shortcuts without doing proper reviews. For example: AI was used by junior lawyers in a law firm for research. The problem was that the AI fabricated reference cases.
Artificial Intelligence
VentureBeat - New method reveals how one LLM can be used to jailbreak another
Called Prompt Automatic Iterative Refinement (PAIR), the algorithm can identify “jailbreak” prompts that can trick LLMs into bypassing their safeguards for generating harmful content.
Artificial Intelligence
Information Week - New Tech Horizon: Influence of Women in Security and Privacy
According to the International Association of Privacy Professionals (IAPP), the privacy profession is nearly evenly split of men-to-women, and women are also equally represented in management levels. An even more interesting fact, especially for women who want to ensure they have a career path within their industry, is that there are currently more female chief privacy officers (CPOs) than their male counterparts.
Tech Jobs
CIO Influence - As Companies Eye Generative AI to Improve Productivity, Two-thirds Admit to GenAI-related Security or Misuse Incidents
The newness of these programs is likely why. While the majority (84%) of respondents have invested or are planning to invest in GenAI, 71% of these GenAI operations were launched within the last two years, and nearly half (49%) were launched in just the last 12 months. Of those respondents whose businesses have adopted AI, 85% are concerned about its privacy and security risks.
Privacy & Security
TechRepublic - GPT-4 Cheat Sheet: What Is GPT-4, and What Is it Capable Of?
Like its predecessor, GPT-3.5, GPT-4’s main claim to fame is its output in response to natural language questions and other prompts. OpenAI says GPT-4 can “follow complex instructions in natural language and solve difficult problems with accuracy.” Specifically, GPT-4 can solve math problems, answer questions, make inferences or tell stories
ChatGPT
VentureBeat - What can you make with OpenAI’s GPT Builder? 5 early examples
AI influencer Rowan Cheung, creator of The Rundown AI newsletter, created X Optimizer GPT, which automatically analyzes his proposed text for posts from his account on the social network X (formerly Twitter) and suggests improvements and optimal times to post for maximum engagement from the network.
ChatGPT
SiliconANGLE - Application interfaces become more popular for authorization security exploits 
Application programming interfaces are critical to provide levels of system access permissions for particular groups of users, but they also present a big problem: Authorization using APIs provides a convenient backdoor for potential attacks, not to mention that APIs can become brittle and consume hours to debug and fix.
Security
sdxCentral - HPE program makes, not takes, cybersecurity talent
“With this mindset, the talent pool becomes an ocean,” Ford said. “In the two years that we have been doing this, I can say confidently that we have discovered people with unique and valuable experience who would most certainly have been overlooked had we employed conventional hiring methodologies.”
Tech Jobs
eWeek - 20 Top Artificial Intelligence Certifications 2023
AI certifications demonstrate understanding and competence in various aspects of AI, such as machine learning, natural language processing, computer vision, robotics, and AI software.
Training & Certs
VentureBeat - PayPal’s CISO on how generative AI can improve cybersecurity
Gen AI, like any new technology, must be carefully evaluated and deployed with safety and responsibility as top priorities. Important factors like data quality, intellectual property, security, privacy and compliance are key considerations. To mitigate risks, it’s important for technology leaders to examine these dimensions scrupulously before deploying gen AI to protect customers and preserve their trust.
Security
SiliconANGLE - The generative AI power law: How data diversity will influence adoption 
For our purposes in this Breaking Analysis, we’re not so much interested in the cause-and-effect relationship, rather we want to use the shape of a curve to describe the adoption patterns we see evolving in generative AI and what it might mean for organizations, industries, adoption alternatives and the application of data.
Artificial Intelligence
Computerworld - 5 key benefits of optimizing employee tech tools 
More than half (58%) of respondents to a 2022 Domo survey of employees in the US, UK, Australia, and New Zealand said their need for technology has increased in the past five years, but their organizations’ tech tools aren’t meeting those needs. Some 60% of the 3,000 respondents, a mix of desk-based and deskless workers, said they could be more productive and do better work with better technology tools. And 62% said better access to useful tech would make them happier at work.
Automation & Productivity
ZDNet - What's possible in a zero-ETL future? 
First, ETL frequently requires data engineers to write custom code. Then, DevOps engineers or IT administrators have to deploy and manage the infrastructure to make sure the data pipelines scale. And when the data sources change, the data engineers have to manually change their code and deploy it again.
Data Management
Information Week - What Happens When You Lose Your Cyber Insurance?
Companies may even lose their coverage before the policy period is up if the insurer determines it misrepresented its cybersecurity posture in its application. When a cybersecurity incident occurs, a forensic investigation will most likely be conducted. “Those forensic reports sometimes reveal that things were not as they were represented, at least in the insurer’s view. And the insurer will then seek to rescind the policy,”
Security
SiliconANGLE - AnalystANGLE: dbt Labs’ vision and strategy: a bellwether for data platforms 
He acknowledged that users have varying preferences regarding writing code and managing development environments. Dbt Cloud addresses this by catering to power users through the newly released command-line interface and newcomers via an intuitive integrated development environment and browser-based interface. This flexibility makes it easier for larger organizations to adopt dbt, accommodating users with diverse needs.
Data Management
Information Week - Getting Aggressive with Cloud Cybersecurity
With cloud native infrastructures deployed across the enterprise, typical endpoint and intrusion detection tools are not sufficient to identify attacks or vulnerabilities in a non-VM infrastructure, cautions Accenture Federal Services’ cyber chief technical officer Dave Dalling via email. “Real-time automated responses can quickly shut off attacks and prevent lateral movement through credential stealing and role escalation.”
Security
sdxCentral - Why IPv6 matters for SD-WAN and why vendors are certifying their products
“While there is continued migration to IPv6, at times, it does require an upgrade or replacement of hardware and software,” Sheu said. “This includes upgrading routers, switches, and other network equipment as well as updating software.”
Network Management
Computerworld - Q&A: ServiceNow CIO sees an 'iPhone moment' for genAI
ServiceNow is now implementing genAI through an internal pilot program. Leveraging its own platform and third-party LLMs, the company has gone live with 15 genAI pilots across multiple departments, including customer service, IT, HR, and sales.
Artificial Intelligence
VentureBeat - What OpenAI’s wave of releases says about 2024 | The AI Beat
Whether or not you thought that a six-month pause was a useful or doable idea, it’s clear that for Musk, as well as OpenAI and other LLM companies, there will be no pause. If anything, 2024 will be the year that AI development moves to hyper-speed, especially as enterprise companies get closer to being able to put AI use cases into production (and China makes its own AI money moves at a fast pace).
Artificial Intelligence
Computerworld - It’s time to take your genAI skills to the next level
A new study found that employees with skills in artificial intelligence (AI) can earn salaries as much as 40% higher than peers without AI skills. But the real value, they found, was combining AI skills with a wide range of other skills. The secret to commanding higher salaries is something called “complementarity” — the ability to combine valuable non-AI skills with AI skills
Tech Jobs
AiThority - How Education Must Change to Adapt to an AI World
Many factors are contributing to the skills gap: some candidates lack industry experience, while others have not received the required training or do not have the basic skills to fill open positions. Rapid innovation and digitization are also playing a role. There’s no denying that technology has replaced humans in some sectors of the economy. According to McKinsey, 14% of the workforce worldwide will likely be forced to change jobs in the coming years as improved artificial intelligence, automation, and other technologies push traditional jobs toward obsolescence.
Automation & Productivity
Network World - Survey: Observability tools can create more resilient, secure networks
Digital resilience efforts are growing but inconsistent, according to the survey results. For instance, 40% of respondents have a formal approach to resilience that has been instituted organization-wide, while another 40% have a formal approach that has only been instituted in pockets. Some 16% have a formal approach to resilience that has yet to be instituted, and 4% do not have a formal approach to resilience.
Network Management
Network Computing - Unlocking IT Success: Navigating Talent Shortages with Integrated Solutions
This predicament poses a potential roadblock to a company’s progress. The solution lies in integration. Rather than bringing together disparate, one-off solutions to address various technology needs, IT teams that opt for a unified approach by obtaining hardware, software, and services from a single, trusted partner are poised for greater success. This strategy not only enhances IT’s ability to serve customers but also eases the burden on their internal staff.
IT Management
Network World - How to determine RTOs and RPOs for backup and recovery
When evaluating the design of your backup systems or developing a design of a new backup and recovery system, there are arguably only two metrics that matter: how fast you can recover, and how much data you will lose when you recover. If you build your design around the agreed-upon numbers for these two metrics, and then repeatedly test that you are able to meet those metrics in a recovery, you’ll be in good shape.
Network Management
sdxCentral - What is multifactor authentication (MFA)? How it works, why adopt it and its challenges
“Always, the first thing I say is: Use MFA for 100% of your users, 100% of the time. It is the first thing you should be doing for security posture that will help decrease your risk. We’ve done research that over 90% of breaches have some type of password element in them, whether it’s a brute-force attack or a phishing attack. So, we know that multifactor authentication can help reduce a customer’s exposure.”
Security
Network World - 2024 network plans dogged by uncertainty, diverging strategies 
It seems that in 2023, all the certainties CIOs had identified in their network planning up to now are being called into question. That isn’t limited to networking, either. In fact, 82 of 83 said their cloud spending is under review, and 78 said that their data center and software plans are also in flux. In fact, CIOs said their network pressures are due more to new issues relating to the cloud, the data center, and software overall than to any network-specific challenges.
Network Management
sdxCentral - How Snowflake helps MDR vendors handle data scalability
However, ReliaQuest’s approach to the data problem is to leave the data where it is and dynamically pull it into its data platform, which is built on Snowflake’s Data Cloud. “Because we leave the data where it sits and only pull the data we need, we could be much faster, more efficient in how we use the data and ultimately respond faster to the customer in terms of responding to threats, etc.,” he added.
Data Management
sdxCentral - AT&T’s 5G SA core is core to new services
"Reliability and performance are vital considerations, and any technology issues in the 5G core could cause service degradation over wide areas. This is particularly the case during migration phase, where operators face the most risk to service performance and can encounter issues relating the running of old and new cores together,”
5G
VentureBeat - EY report sheds new light on global AI regulatory landscape
It reveals that despite their different cultural and regulatory contexts, these jurisdictions share many of the same objectives and approaches for AI governance. They all aim to minimize potential harms from AI while maximizing benefits to society, and they all align with the OECD AI principles endorsed by the G20 in 2019, which emphasize human rights, transparency, risk management and other ethical considerations.
Artificial Intelligence
Datanami - Salesforce Outlines 7 Opportunities to Deepen Trust in AI in Response to White House Executive Order
At Salesforce, Trust has always been the number one value. The Company has spent over a decade investing in ethical AI, both in business and with customers. Salesforce’s Office of Ethical & Humane Use has been guiding the responsible development and deployment of AI for years — first through Trusted AI Principles and more recently with Salesforce’s Guidelines for Generative AI. The Company has in-house AI researchers, more than 300 AI patents, and is actively investing in AI startups through a $500 million ventures fund.
Artificial Intelligence
Information Week - What Does the New AI Executive Order Mean for Development, Innovation?
The focus on powerful AI systems aligns with the paper calling for AI risk management. “The most pressing scrutiny should be on AI systems at the frontier: a small number of most powerful AI systems trained on billion-dollar supercomputers -- which will have the most hazardous and unpredictable capabilities,” the co-authors write.
Artificial Intelligence
SiliconANGLE - Unlocking the power of AI while safeguarding personal data sovereignty 
“We’re slowing down when it comes to products that are going to impact our people, whether they be chatbots, or triggering decisions for loan decisions and all those sorts of things and understandably so,” Townsend said. “There is a bit of a wait-and-see around generative largely because of some of the legal dynamics there, as well as the technical dynamic and accuracies. You don’t want to build on a foundation just to see that foundation crumble in [the] next year.”
Artificial Intelligence
Computerworld - Q&A: Cisco CIO sees AI embedded in every product and process
But Cisco's CIO, Fletcher Previn, is also dealing with a scarcity of IT talent to create and tweak large language model (LLM) platforms for domain-specific AI applications. As a result, IT workers are learning as they go, while discovering new places and ways the ever-evolving technology can create value.
Automation & Productivity
Network Computing - Addressing Visibility Blind Spots in Co-los and the Public Cloud
To overcome this barrier, IT teams must look for ways to extend their visibility and utilize end-to-end monitoring that enables the accurate identification, triage, isolation, and collection of evidence of enterprise application problems. This article will delve into how enterprises can address common blind spots introduced during cloud and co-lo migrations, regain visibility of mission-critical applications, and troubleshoot potential performance problems faster.
Cloud
CIO Influence - Snaplogic’s CEO Reveals Insider Secrets to Future-Proofing Career with Artificial Intelligence
The arrival of generative AI has launched us into a sort of second Socratic age. Greek philosopher Socrates notoriously emphasized the importance of asking questions, famously stating that, “the highest form of Human Excellence is to question oneself and others.” Well, the time has come for us to start asking AI questions, and to ask them in droves.
Artificial Intelligence
sdxCentral - What’s Next: Kevin Deierling, senior VP at Nvidia, on AI, networking platforms, frameworks and Morpheus
When asked what artificial intelligence (AI) means to your network, Deierling said, “The fuel for AI is data, and the starting point is getting that data into the system.” Networking, he said, is a critical part of getting data into the data center. Going further, calling the network the backbone of the data center, Deierling said networking was “the foundational element of these new generations of AI computing.”
Network Management
SiliconANGLE - Unpacking the interplay between generative AI and compute efficiency 
“First of all, when we think about AI and its adoption in the enterprise, it is going to drive a thousand times more demand for complex compute,” Inman explained. “And that complex compute is going to be in the form of machine-generated SQL. What that means is we need to get our data story together. We need to come together and figure out how to shore up our infrastructure and drive a lot more efficiency out of our compute.”
Artificial Intelligence
ZDNet - Can ChatGPT predict the future? Training AI to figure out what happens next
One of the most important of those "modalities," as they're known, is what's called time series data -- data that measures the same variables at different points in time to spot trends. Data in a time series format can be important for things such as tracking patient medical history over time with the entries made by a physician in a chart. Doing what's called time series forecasting means taking the historical data and predicting what's happening next; for example: "Will this patient get better?"
Artificial Intelligence
Forbes - Mastering The Art Of Building A Top-Tier Cybersecurity Team
Cybersecurity navigation is a roadmap, workflow or organized process that drives cyber protection. The teams must be organized, monitored, and exhibit a "top-tier attitude." The concept means every employee is cyber-focused, identified as a high-value asset and thinks holistically. Also, the teams are technically driven and operate as human firewalls. If practiced, a leader can master cybersecurity team development and protect their most vital resources.
Security
sdxCentral - What you need to know about Biden’s Executive Order on AI
Brauchler added that AI has substantial potential to increase the effectiveness of security controls in code review, active monitoring and vulnerability detection, but “there is still a long road before this technology will become viable.”
Artificial Intelligence
The Verge - The people who ruined the internet
Doing SEO is less straightforward than buying the advertising space labeled “Sponsored” above organic search results; it’s more like the Wizard of Oz projecting his voice to magnify his authority. The goal is to tell the algorithm whatever it needs to hear for a site to appear as high up as possible in search results, leveraging Google’s supposed objectivity to lure people in and then, usually, show them some kind of advertising.
Automation & Productivity
VentureBeat - Forrester’s 2024 Predictions Report warns of AI ‘shadow pandemic’ as employees adopt unauthorized tools
The 38-page report sees AI platform budgets tripling in 2024 as companies invest in scalable solutions to build, deploy, and monitor AI models. But Forrester cautions this won’t be enough to satisfy employee demand. The report predicts 60% of employees will use their own AI tools at work, introducing new regulatory and compliance challenges.
Artificial Intelligence
Aol - Group representing the New York Times and 2,200 others just dropped a scathing 77-page white paper on ChatGPT and LLMs being an illegal ripoff
By analyzing a sample of datasets believed to be used to train LLMs, the News Media Alliance found that content from news, magazine, and digital media publications were used five to 100 times more frequently than open web data, like that from Common Crawl. The report argued that this is a violation of “fair use” laws, which allow copyrighted material to be reproduced or copied without license for limited purposes.
ChatGPT
Information Week - How IT Can Help Detect Corporate Espionage
The espionage threat isn’t limited to large enterprises. Businesses of all sizes are vulnerable, since they’re part of the supply chain. Smaller businesses often don’t see themselves as a target, but they store data and can also act as a gateway to the larger enterprises businesses they serve, Hural explains. “With smaller budgets and often lower priorities when it comes to cybersecurity, these businesses are generally less fortified, creating viable access points for threat actors.”
Security
SiliconANGLE - Cybersecurity practitioners fret after SEC sues SolarWinds and its CISO 
It’s alleged that in a 2018 presentation prepared by a company engineer and shared internally, including with Brown, that SolarWinds’ remote access set-up was “not very secure.” Someone exploiting the vulnerability “can basically do whatever without us detecting it until it’s too late,” which could lead to “major reputation and financial loss” for SolarWinds, the suit claims.
Security
sdxCentral - How NaaS may be the answer to enterprise private network needs
“Even if you have a fairly technical IT team, there’s a lot of things in running the day-to-day operations that are just mundane tasks, that just I’m not sure they need to do anymore,” Kerravala said. “My advice to IT pros is always if you’re doing things today that aren’t really core to your resume, stop doing them. Find a way to either automate them out of your job or move it to a managed service provider.”
Network Management
SiliconANGLE - Unlocking enterprise value: Harnessing AI to tackle unstructured data challenges 
“Permissions are changing and the RAG approach, the retrieval augment generation, the vector that’s excellent. The vector databases are getting more powerful seemingly every day. There’s a lot of great vector database out there, I think this is going to be a big part, especially in an unstructured data world.”
Data & Analytics
sdxCentral - Why Juniper, HPE Aruba and VMware are losing SD-WAN ground to security vendors
The SDxCentral data reveals a fundamental shift in how our readers view SD-WAN. Traditional SD-WAN is no longer good enough due to increasing security threats that are driving demand for secure SD-WAN or SASE offerings where security is baked in from the design phase. We’re seeing a fundamental shift in reader engagement away from traditional SD-WAN leaders to secure SD-WAN and single-vendor SASE providers.
Security
SiliconANGLE - Biden’s AI executive order is promising, but it may be tough for the US to govern AI effectively 
For example, the Department of Commerce has to coordinate best AI safety practices over the next nine months among three other cabinet agencies. The goal is to develop a generative AI equivalent to the NIST AI 100-1 document, among other reports. Typically, these documents are consensus-based and take years to produce, although this particular working group was created this past summer, so it has a head start. But there are dozens of agencies and various working groups that require coordination throughout the EO.
Artificial Intelligence
Network Computing - How a Focus on Security Blind Spots Can Force Shadow IT out of the Darkness
In a company where shadow IT proliferates, often several cloud services are in use, and these are frequently linked. There is an ease to setting up cloud environments, and coupled with the building and setting up of many environments – some automatically based on scripts – IT and security teams must rush to keep up with the growing attack surface this creates.
Security
SiliconANGLE - Google Brain founder Andrew Ng says threat of AI causing human extinction is overblown 
“When you put those two bad ideas together, you get the massively, colossally dumb idea of policy proposals that try to require licensing of AI,” he explained. “It would crush innovation. There are definitely large tech companies that would rather not have to try to compete with open source [AI], so they’re creating fear of AI leading to human extinction.” He says he’s all for “thoughtful regulation,” but not regulation that stunts development
Artificial Intelligence
Harvard Business Review - 3 Obstacles to Regulating Generative AI
While traditional AI systems make predictions — a “yes” or a “no,” for example, for decisions such as whether to display an ad or to raise a consumer’s credit limit — generative AI creates images, audio, or text (hence the “generative” in its name). As just one example of the challenges in regulating generative AI with existing regulatory tools, a recent Stanford study analyzed the EU AI Act’s impact on the 10 most commonly used generative AI models. The conclusion: Not a single model came close to complying.
Artificial Intelligence
ComputerWeekly - How much is enough to support those who maintain open source?
Amanda Brock, CEO of OpenUK, said many businesses, such as Spotify Starling Bank and Skyscanner, have built entire businesses on open source software: “It forms the infrastructure of their digital services. The beauty of open source software is that there is a free flow of the software (subject to licence compliance it is freely available for use by anyone for any purpose).”
DevOps
SiliconANGLE - Transforming healthcare: The seismic potential of AI-powered healthcare solutions 
Healthcare involves a lot of sensitive information that makes implementing AI-driven solutions tricky. Collaborating with healthcare professionals could allow more guardrails to be put in place, claims Almeida, who envisions a “multidisciplinary team” of software engineers, ethics experts and clinicians that would designate LLMs’ interactions within healthcare databases.
Artificial Intelligence
sdxCentral - Cybersecurity workforce is growing fast, but still 4 million short
Of the nearly 15,000 cybersecurity practitioners and decision-makers surveyed by ISC2, a whopping 92% reported skills gaps at their organization, the top three being in cloud computing security, AI and machine learning (ML), and zero-trust implementation.
Security
TechCrunch - Why ransomware victims can’t stop paying off hackers
There’s also a technical hazard in paying a hacker’s ransom. According to a study by Cybereason, 80% of ransomware victims who paid the ransom were hit by a subsequent ransomware attack, with 68% of compromised organizations saying that the second attack came less than a month later and that the hackers demanded a higher ransom.
Security
VentureBeat - With U.S. tech salaries at a 5-year-low, here’s how to make more money
Though average tech salaries hover at the $158,000 mark (nearly double the average U.S. knowledge worker), the combined impact of layoffs in the tech sector, hiring freezes, inflation and the explosion of generative AI have resulted in salary stagnation across the board.
Tech Jobs
GeekWire - AI in the cloud: Microsoft boosts share; Amazon predicts ‘tens of billions’ in new revenue
Microsoft is seeing customers start new projects driven entirely by AI, which leads to increased consumption of other Azure services (i.e., storage and computing). “AI projects are not just about AI meters; they have lots of other cloud meters as well,”
Cloud
VentureBeat - ChatGPT is combining its different abilities into a single ‘Voltron-style’ chat
“Many startups just died today,” proclaimed p-AI incubator founder Alex Ker on X (formerly Twitter), “Because OpenAI added PDF chat. You can also chat with data files and other document types. We had a wave of products better suited as features rather than stand-alone companies. Wrappers are being squeezed by OpenAI on one side and incumbents on the other. It’s a rough world out there.”
ChatGPT
Datanami - The Five Biggest Threats to Data Democratization
Every time a user enters data into a prompt for ChatGPT, the information is ingested into the service’s Large Language Models (LLMs) used to train the next version of language processing algorithm. The information could be retrieved by unauthorized persons if proper data security isn’t in place.  Enterprises are scrambling to finds ways to leverage the power of the tool without increasing the risk of a data breach.
ChatGPT
SiliconANGLE - SlashNext report uncovers 1,265% increase in phishing emails in a year
On average, 31,000 phishing attacks are sent on a daily basis, with 68% of all phishing emails text-based business email compromise or BEC attacks — those that involve cybercriminals impersonating or hijacking business email accounts to deceive victims into making unauthorized transfers of funds or revealing sensitive information. Some 39% of all mobile-based attacks were also found to involve SMS phishing, also known as smishing.
Security
Information Week - Can AI Ever Become Capable of Original Thought?
While AI can generate novel outputs and solutions by combining existing knowledge in unique ways, it doesn’t “think” in the same way humans do. “It’s more accurate to say that AI can exhibit ‘emergent behaviors,’ or produce results that weren’t explicitly programmed,” Kostello explains. “However, whether this qualifies as original thinking is a matter of philosophical debate.”
Artificial Intelligence
Computerworld - Data poisoning’ anti-AI theft tools emerge — but are they ethical?
The technology can cause damage to image-generating genAI tools by corrupting AI large language model (LLM) training data, which leads platforms like DALL-E, Midjourney, and Stable Diffusion to spew out erroneous pictures or videos. For example, a photo interpreted by AI as a car could actually be a boat; a house becomes a banana; a person becomes a whale, and so on.
Artificial Intelligence
ZDNet - The AI I want to see in the world: 5 ways it could manage my Gmail inbox for me
I also tried filtering on common press release terms, like "for immediate release" or "embargo", but the filter was never universal enough to succeed. AI is smarter than that, and should be able to separate press releases from correspondence, and actually know what email messages are press pitches.
Automation & Productivity
sdxCentral - Why your digital transformation plans are failing
“Despite organizations making investments in engaging their employees, our research shows that almost 70% don’t feel as engaged as they should be and aren’t feeling a meaningful connection to their job,” Keyia Burton, senior principal in Gartner’s HR practice, wrote. “Figuring out how to actually impact employee engagement is a huge priority because it has a significant impact on several key business outcomes.”
Automation & Productivity
Network Computing - Top Tips for a Strong Zero Trust Architecture
Defining your attack surface should be the first item on your zero trust implementation list. This requires you to zero in on the areas your organization needs to protect. Focus on your most valuable digital assets. Otherwise, you may find yourself overwhelmed with implementing policies and deploying tools across your entire enterprise network.
Security
SiliconANGLE - AWS IAM credentials at risk: EleKtra-Leak operation revealed by Unit 42 
EleKtra-Leak leverages automated tools that allow threat actors to clone public GitHub code repositories continuously, scanning for exposed AWS IAM credentials. Once those credentials are detected, they’re exploited to create multiple AWS Elastic Compute Cloud or EC2 instances.
Security
DarkReading - What Lurks in the Dark: Taking Aim at Shadow AI
There is a fundamental tension between IT teams, which want control over apps and access to sensitive data in order to protect the company, and employees, who will always seek out tools that help them get more work done faster. Despite countless solutions on the market taking aim at shadow IT by making it more difficult for workers to access unapproved tools and platforms, more than three in 10 employees reported using unauthorized communications and collaboration tools last year.
Security
AiThority - Enterprises See Technology, Workplace Services Critical for Success, ISG Study Says
“The future of digital business is in implementing technology-driven business models that cut time to market, enhance the employee experience, produce meaningful data insights and improve sustainability in a cohesive and value-added way.”
Automation & Productivity
Blocks & Files - VMware and Nutanix lead pack in Forrester HCI report
After the two leaders comes three strong performers: Microsoft, HPE (SimpliVity), and new entrant Sangfor Technologies. There are four Contenders: Scale Computing, IEIT Systems, Huawei, and new entrant SmartX. Cisco, which has just canned its own HyperFlex product in favor of a Nutanix-powered system, did not participate, and neither did IBM with its Storage Fusion product.
Data Management
SiliconANGLE - When ChatGPT meets big data: How ChaosSearch is changing data analysis using AI 
“We took our data solution, and we integrated well-known LLMs, like ChatGPT and Vertex AI, and now we’re working with Amazon’s LLMs,” Hazel said. “And what we’ve done is use it as a reasoning engine. So, we don’t put data into the LLM; we actually ask the LLM intelligent questions to ask on our database.”
Data & Analytics
Forbes - Forrester Predicts A Turbulent Year For B2B Marketers In 2024
Thinly customized GenAI content will degrade purchase experience for 70% of buyers. The downside of GenAI’s ability to mass produce customized content is can lead to overloading buyers with crappy content. Forrester predicts growing frustration with poorly personalized content will cause more than 70% of business buyers to voice displeasure about the material vendors share, citing specifically that it fails to demonstrate an understanding of their organization’s business conditions or needs.
Marketing
Network World - Hyperscale data-center capacity on pace to triple over next six years
Synergy says the impact of generative AI advances has not so much fueled an increase in the number of data centers but rather led to a substantial increase in the amount of power required to run those data centers. As the number of GPUs in hyperscale data centers skyrockets, driven primarily by AI, the power density of associated racks and data center facilities also needs to increase substantially.
Data Management
SiliconANGLE - Google’s vision for industry transformation in today’s AI revolution 
One such example is Vertex AI, a platform that allows for purpose-built machine learning tools for engineers and data scientists to standardize, automate and manage machine learning projects at scale. A key highlight at the recent Google Next event, the technology is already facilitating the next phase of ML and deep learning innovation and making AI accessible and user-friendly for a wide range of Google customers.
Artificial Intelligence
BBC WORKLIFE - The employees secretly using AI at work
Whether the technology is explicitly banned, highly frowned upon or giving some workers a covert leg up, some employees are searching for ways to keep using generative AI tools discreetly. The technology is increasingly becoming an employee backchannel: in a February 2023 study by professional social network Fishbowl, 68% of 5,067 respondents who used AI at work said they don't disclose usage to their bosses.
Artificial Intelligence
Network World - Infrastructure teams need multi-cloud networking and security guardrails
Cloud operations and DevOps groups will never cede ground, but they will welcome self-service networking and security solutions that provide guardrails that protect them from disaster. Cooperation between traditional infrastructure teams and cloud teams is even more important as enterprises embrace multi-cloud architecture, where complexity and risk are increasing. In fact, my research has found that security risk, collaboration problems, and complexity are the top pain points associated with multi-cloud networking today.
Cloud
Computerworld - Microsoft invested $13B in genAI — does Copilot for Windows show it’s a bad bet?
To say I was underwhelmed by Copilot for Windows would vastly understate just how disappointing I found it. To begin with, it didn’t give Windows a single new capability. The things you can do with Windows that includes Copilot are exactly the same things you can do with Windows without Copilot.
Automation & Productivity
SiliconANGLE - Gen AI meets supercloud to supercharge the enterprise: Supercloud 4 event final analysis 
One of the central themes of the event was the application of the notion of the power law, a concept that Furrier and Vellante have applied to illustrate how the generative AI market is likely to evolve. It highlights the shifting landscape, where specialized AI systems and infrastructure are propelling the technology beyond the initial big winners such as OpenAI LP and its partner and patron Microsoft Corp. The creation of specialized AI models and their associated datasets is a driving force behind this movement.
Artificial Intelligence
Network World - Network complexity, talent shortages drive shift in enterprise IT buying habits
“The old way of looking at networking and security teams was to approach them as siloes. An organization had a network team, a security team and an application team that worked separately,” Zagury said. As technology gets abstracted to platforms, and enterprises adopt a platform approach, the disciplines are coming together, she said.
IT Management
Information Week - How to Speed Cyberattack Discovery
“In particular, threat hunting, during which human defenders actively maneuver through their networks and systems to identify indicators of a network attack and preemptively counter these threats, can speed the discovery of cyberattacks.”
Security
sdxCentral - FTC eyes competitive practices for genAI — concerns include data, talent and compute resources
If a single company or handful of firms controlled one of these essential inputs, “they may be able to leverage their control to dampen or distort competition,” the agency asserts. “And if generative AI itself becomes an increasingly critical tool, then those who control its essential inputs could wield outsized influence over a significant swath of economic activity.”
Artificial Intelligence
Network Computing - Business-Optimized Networks Usher In A New Era For Networking Infrastructure
Networking professionals have an “it’s just plumbing” attitude. Most professionals think of networking infrastructure as a commodity, believing it offers little value than just connecting laptops to servers and acting as the conduit for application traffic generated. Most of the traffic serves a generic set of applications, including customer relationship management (CRM), accounting, email, and voice-over IP (VoIP)
Network Management
Fast Company - Are we being led into yet another AI chatbot bubble?
Her opinion is based on the idea that our expectations for chatbots are either too low or just ill-defined. Today, we mainly use chatbots as internet search helpers or productivity tools, but what enterprises (schools, hospitals, businesses, etc.) really need is something that can actually stand in for a human being.
Artificial Intelligence
SiliconANGLE - Dynamic duo: AI and superclouds continue to transform how businesses approach digital transformations
“In the cloud-native space, there’s a very popular project called Backstage, which came out of Spotify, that helps in that environment,” Miniman said. “We’ve been working in that space at Red Hat for about a year now to help simplify that and allow companies to take access to it. It’s making simpler that platform piece, and developers will then be consumers of that environment.”
Automation & Productivity
AiThority - IONOS Survey Reveals Americans Support AI for Business Use, but Want AI Regulation
When asked about the advantages of AI in the workplace, respondents cited large to very large advantages in simplifying and speeding up processes (49%), relieving staff of standard tasks (46%), developing creative ideas (46%), and providing support for product development and innovations (43%).
Artificial Intelligence
VentureBeat - Surviving a ransomware attack begins by acknowledging it’s inevitable
“Today, many security and IT teams struggle to identify the real-world risks that vulnerabilities pose, and therefore improperly prioritize vulnerabilities for remediation. For example, many only patch new vulnerabilities or those that have been disclosed in the National Vulnerability Database (NVD). Others only use the Common Vulnerability Scoring System (CVSS) to score and prioritize vulnerabilities.“
Security
CIO Influence - Cybercrime Busters: Top 5 Cybersecurity Insights for Enterprise Storage
The gap in many corporate cybersecurity strategies is the absence of cyber storage resilience and recovery. It’s imperative that enterprises shore up their cyber resilience and recovery in their data and storage infrastructure to be properly equipped to combat ransomware attacks. This insight was derived from the fact that the more resilience an enterprise storage infrastructure has, the more it can withstand an attack and bounce back with confidence.
Security
AiThority - The Role of Medical Cybersecurity Regulations in Protecting Patients with the Rise of AI-Driven Healthcare
The medical and healthcare sector is already highly regulated, and it seems inevitable for more regulations to be imposed. However, there are currently no specific laws on AI use in medicine and health services, at least when it comes to major markets like the United States and Europe. There are no laws that target how AI is utilized like requiring a human doctor’s verification when making AI-aided diagnoses and regulating the dispensation of AI-powered automated medical services.
Artificial Intelligence
SiliconANGLE - Google Public Sector CEO weighs in on how to manage the massive shift to AI 
“You start from mainframe,” Dahut said. “You move from mainframe to the personal computer, the personal computer to mobile, mobile to cloud. And, now, the most advanced technology shift probably in our lifetime is the shift to AI. The challenge with the public sector has been, they have not been able to keep pace, funding pace as well as talent pace, with all those technological shifts.”
Artificial Intelligence
Information Week - Integrating Tech in Construction Is an Investment, Not a Cost
The most effective employee engagement strategy is to take a bottom-up approach and engage with the lower-level workers who will be using the technology on a daily basis. Gather their feedback and aim to improve the technology’s integration based on their experiences.
Automation & Productivity
AiThority - 5 Unintelligent AI Strategies to Ditch Immediately
We’ve seen how quickly generative AI, led by OpenAI’s ChatGPT, has transformed the way people think about this technology. Its rapid adoption has also put businesses in the hot seat, sending them scrambling to figure out how to integrate the associated technologies into their organizations. These kinds of disruptive moments are going to come more frequently and with greater intensity. Companies that can’t plug and play at will with the best new technologies in the marketplace at any moment are subject to rapid decay.
Artificial Intelligence
SiliconANGLE - Latest Cloudflare distributed denial-of-service report details record-setting attack 
Along with that new attack, Cloudflare’s report delves into the broader dynamics of the evolving cyberthreat landscape. The company’s insights are derived from its capability to process an average of 64 million HTTP requests per second daily, giving it the ability to observe and mitigate about 140 billion cyberthreats daily.
Security
VentureBeat - Okta’s breach shows why identities come first in a zero trust world
Security teams need to interview their IT teams to understand what data they commonly have to share to resolve support cases.” Spicer advises, “You should also inspect the output for automatically generated troubleshooting data from sensitive systems. You could find anything from certificates and credentials to PII in those data sets.”
Security
SiliconANGLE - Data poisoning is the latest threat for generative AI models 
But although Nightshade is interesting, AI users need to be on guard. The Forcepoint authors suggest being more diligent about the training data, with regular tests for statistical accuracy to detect anomalies and setting up rigid access controls to the data itself. They also suggest implementing a regular way to monitor the model’s performance and accuracy reporting, using cloud observability tools such as Azure Monitor and Amazon SageMaker, among others.
Artificial Intelligence
sdxCentral - AWS on SMBs’ cloud security misconceptions: It’s not as costly, hard or complex as you think
AWS’s survey showed around 30% of respondents admitted to understanding their company’s security, risk and compliance requirements but were unsure how to manage them. A further 40% cited a lack of skilled staff as a barrier to investing in security.
Security
Datanami - Verbal Nonsense Reveals Limitations of AI Chatbots: New Research Urges Caution
In head-to-head tests, more sophisticated AI language models tended to perform better than simpler recurrent neural network models and statistical models that just tally the frequency of word pairs found on the internet or in online databases. But all the models made mistakes, sometimes choosing sentences that sound like nonsense to a human ear.
Artificial Intelligence
BBC Future - The surprisingly subtle ways Microsoft Word has changed the way we use language
The surprisingly subtle ways Microsoft Word has changed the way we use languageThat said, a potential over-reliance on automation could discourage users from actively learning and improving their linguistic and written skills, believes Wolf. If large language models are being trained on decades of increasingly homogenised content, there's the risk this will make things worse, not better.
Automation & Productivity
Network World - Can enterprises trust the internet?
It’s no wonder that enterprise CFOs often have a hard time accepting network prices. One senior network planner at a healthcare conglomerate told me that he got major pushback on a 500 Mbps MPLS VPN connection cost of more than $4,000 per month when the CFO had 1 Gbps home broadband at just over $100 a month. But the deal was approved, because the CFO accepted a simple justification: “You can’t trust the internet.”
Network Management
sdxCentral - 4 questions to answer before you pick a WAN service: SD-WAN, SASE, 5G or something else?
Large enterprises that have already built out WAN infrastructure will be reluctant to walk away from those investments. Similarly, businesses that rely on MPLS to support mission-critical applications may still require SLAs guaranteeing reliable bandwidth, low data loss and low latency. Since SD-WAN vendors do not control the underlying connectivity, they are not able to match those SLAs.
Network Management
NetworkComputing - Cisco Flaw Highlights Dynamic Nature of Vulnerability Management
Hackers quickly exploited the newly discovered critical zero-day bug to hijack thousands of Cisco switches and routers. Sunday, Cisco released free software updates that address the vulnerabilities causing these problems. In addition to the software update, Cisco strongly recommends that enterprises disable the HTTP Server feature on all internet-facing systems.
Security
Information Week - Firms Arm US Against AI Cyberattacks
Adversarial AI uses algorithmic and mathematical approaches to deceive, manipulate and attack AI systems. While published reports of AI attacks are scant, companies, organizations and governments are getting ready for increased attacks as open-source language models proliferate. Gauging the severity of the immediate AI threat is tough, experts say, as companies may not be reporting incidents.
Artificial Intelligence
Computerworld - Android’s new biometric spec for 'strong security' is anything but
Google has released new biometrics specs for Android devices, with the top-level “strong security” option requiring only “a spoof and imposter acceptance rate not higher than 7%.” But most biometrics specialists say that for something to be considered “high security,” that imposter and acceptance rate should be closer to 1%.
Security
DarkReading - Meet Rhysida, a New Ransomware Strain That Deletes Itself
"It stands out for its unique self-deletion mechanism and compatibility with pre-Windows 10 versions of Microsoft. Written in C++ and compiled with MinGW and shared libraries, Rhysida showcases sophistication in its design," Kaspersky said in its findings about the group. "While relatively new, Rhysida faced initial configuration challenges with its onion server, revealing a group's rapid adaptation and learning curve."
Security
NetworkComputing - 7 Strategic Network Automation Steps to Continuously Improve Network Security
While data backups receive significant attention, operational tasks that keep networks secure, such as device backups, OS upgrades, and configuration grooming, often go undone. It's incredible that even today, the majority of these changes are made by hand, which makes them error-prone. Even the simplest misstep can have a ripple effect that brings down a network and/or disrupts a supposedly fault-tolerant business service. No one is immune – not even tech giants like Microsoft and Google.
Network Management
Computerworld - The genAI backlash: Should creative types poison the well? 
Those poison pixels then work to undermine the learning process, causing the AI to generate useless data. MIT Technology Review explains that the results can mean dogs become cats, cats become cows.
Artificial Intelligence
VentureBeat - The crucial link between data, use cases and training models
“We know that the opportunities are vast to apply AI and ML techniques to improve the experience, but a regulated financial institution is treading carefully and gaining learnings, and there is a lot of risk,” Harper says. “How we de-risk is by developing a way to prioritize use cases. Think of a value-based approach to the matrix and rate the different use cases. What is this business challenge?”
AI/ML
SiliconANGLE - Experts from Microsoft, Google and Salesforce discuss AI’s future impact 
“It’s giving him the ability to just have the prompt for the image models and using that he can drive images that I couldn’t even imagine,” Barkley said. “He understands the space. Now you really don’t have to know Python … it’s a natural language. It’s really opening up.”
Artificial Intelligence
Forbes - Three Positive Ways To Protect Against Zero-Day Attacks
Before Labor Day 2023, insiders detected 57 zero-day vulnerabilities, a higher total than all of 2022, and the scope of the attacks has gotten broader. Rather than target vulnerabilities in security or communications programs, now all sorts of software are dealing with zero-day attacks, from email servers to printer software.
Security
Information Week - How Do We Manage AI Hallucinations?
The reasons that LLMs fail in this manner are poorly understood. Current opinion suggests that, whatever they are called, these inaccurate responses will always emerge from AI systems -- and that human feedback will be essential to ensuring that they do not go off the rails entirely.
Artificial Intelligence
Forbes - How Generative AI Can Improve Communication Within An Organization
Accessing this information is possible with the help of large language models (LLMs) and natural language interfaces (“data agents”). Today, to implement a natural language interface, organizations can adopt products like Azure Cognitive Search with ChatGPT or—in cases where sensitive information or complex logic is used—develop their proprietary solutions.
Artificial Intelligence
The Verge - The poster’s guide to the internet of the future
Instead of a half-dozen platforms competing to own your entire life, apps like Mastodon, Bluesky, Pixelfed, Lemmy, and others are building a more interconnected social ecosystem. If this ActivityPub-fueled change takes off, it will break every social network into a thousand pieces. All posts, of all types, will be separated from their platforms.
Social Media
Security Magazine - Report: CISOs’ big worry in new role is inaccurate data on security posture
The issue of data quality was of greater concern to respondents than the lack of security budget (44%) and being scapegoated for a breach (44%).
Security
SiliconANGLE - IBM study indicates near parity between human and AI phishing attempts 
The AI-generated phishing emails were found to be nearly as effective as their human-created counterparts. Human engineers leveraged open-source intelligence to gather information and then used that information to craft emails with a personal touch, emotional intelligence and an authentic feel. The human-created emails also incorporated a sense of urgency into their emails, but despite these advantages, the AI’s performance in the test was close, underscoring its potential in this domain.
Security
Automation.com - Validating IoT Data to Improve Quality and Consistency
However, managing and integrating that data isn’t as straightforward as just bringing data into a cloud data system or on-premise warehouse. IoT data provides greater visibility to an organization but it is still subject to quality issues. In fact, 97% of organizations believe that creating value from IoT data is challenging. For example, a global business has connected devices that speak different languages like kilometers instead of miles or Celsius instead of Fahrenheit. When integrated without validation, these two data sets will tell an inaccurate story.
Data & Analytics
VentureBeat - Meet Nightshade, the new tool allowing artists to ‘poison’ AI models with corrupted training data
But even without filing lawsuits, artists have a chance to fight back against AI using tech. MIT Technology Review got an exclusive look at a new open source tool still in development called Nightshade, which can be added by artists to their imagery before they upload it to the web, altering pixels in a way invisible to the human eye, but that “poisons” the art for any AI models seeking to train on it.
Artificial Intelligence
Blocks & Files - What is the best choice of storage in the container era?
According to the user survey report released by the Cloud Native Computing Foundation (CNCF) in 2020, 78 percent of users have deployed or are about to deploy stateful applications in containers in application scenarios like databases, message queues, logs, and data analysis. The report also showed that storage has become a major factor that affects the commercial deployment of containers.
Data Storage
NetworkComputing - The Evolving Threat Landscape: What’s Next for Security? 
Through more than a decade of use, there have been many high-profile, public-cloud-related breaches. But digging into the details of those breaches, we find a common theme, and it is not public cloud infrastructure or shared compute. The point of entry for attackers has almost always been a misconfiguration that opened a security hole attackers could drive a truck through. Misconfigured S3 buckets, open administrative access to Kubernetes' consoles, and standard API/app vulnerabilities that could have been blocked with a traditional web application firewall. 
Security
GigaOM names Druva and Commvault as cloud-based data protection front-runners
The report authors, Arjan Timmerman and Max Mortillaro, say they looked at cloud-based data protection tools which were hosted in the cloud, built using a cloud back end (such as microservices or a serverless architecture) and used cloud storage. In their view: “Containers, serverless functions, native snapshot capabilities, and immutable object storage available in multiple tiers and flavors are foundational components of cloud-based data protection solutions.”
Data Management
sdxCentral - Why tech companies should consider fractional executives
Fractional work is ideal for SMBs, all startups, all scale-ups, and “anyone financially or resource-constrained can benefit from having a fractional leader,’’ she says. These companies don’t need someone full-time but they do need the expertise. “It’s a growing trend,’’ Mikhli says, however, “too few people in too few companies are aware of [fractional executives], which is the challenge right now.”
Leadership
Computerworld - As M365 Copilot launch looms, businesses likely to move cautiously
But while Microsoft has moved quickly to incorporate genAI into tools such as Word, Excel, and Teams, many Microsoft 365 customers are expected to take a cautious approach to deploying Copilot within their organizations. This means a focus on internal trials to identify use cases, and bolstering data security practices to mitigate the risks of connecting large language models to corporate systems.
Automation & Productivity
sdxCentral - Hyperscale data centers will triple capacity to meet genAI demands
The firm analyzed the data center footprints of 19 hyperscale cloud service providers across software-as-a-service (SaaS), platform-as-a-service (PaaS), infrastructure-as-a-service (IaaS), social networking, ecommerce and gaming. SRG Chief Analyst and Research Director John Dinsdale told SDxCentral those providers account for 926 existing data centers, with another 427 in the pipeline.
Data Management
VentureBeat - Why GPT-4 is vulnerable to multimodal prompt injection image attacks
Multimodal prompt injection image attacks can exfiltrate data, redirect queries, create misinformation and perform more complex scripts to redefine how an LLM interprets data. They can redirect an LLM to ignore its previous safety guardrails and perform commands that can compromise an organization in ways from fraud to operational sabotage.    
Security
SiliconANGLE - Developers are embracing AI-enabled tools. Here’s how that’s changing the way they code 
A survey of more than 90,000 developers from Stack Overflow, released in June, showed that almost 44% used AI tools in their work. That number is most likely even higher by now since an additional 26% at the time were open to using it soon. More than 82% of the respondents said that they used the tools to produce code, 48% on debugging and getting help, and 30% for learning about a particular codebase.
Artificial Intelligence
ZDNet - With AI, organizations are now seeing software developers as great collaborators 
Generative AI will open up development processes to their businesses just as profoundly as methodologies such as Agile and DevOps, KPMG predicts. "In terms of how corporations develop and maintain software, it will prompt changes as big as, and likely even more impactful than, those created by Agile development methods, which enable rapid responses to changing software requirements and customer feedback."
Artificial Intelligence
World Economic Forum - ChatGPT’s web search and the path to AI agents
While less novel, web search is emblematic of an impactful trend in AI system development: tool use. Tool use and the related development of large language model (LLM) -based agents have enormous consequences for AI capability improvements. They are foundational to what OpenAI's Andrey Karpathy dubs a new operating system, contributing to an evolving paradigm shift in engineering that unlocks a new era of applications.
ChatGPT
SiliconANGLE - Akamai research finds more sophisticated phishing threats in hospitality industry 
The hospitality industry as a target means that many attacks are two-pronged in nature: First they aim their phishing lures at hotel staff, such as making a series of online booking requests. The attackers then send followup emails that contain malware-infested links or photos that contain programs to steal data from the hotel site operators.
Security
VentureBeat - How to police the AI data feed
Van Eck radiation analysis looks at the pattern of radiation emitted while a system is running. Because complex systems run a number of parallel processes, radiation is often garbled, making it difficult to pull out specific code. The Van Eck technique, however, can detect major changes (such as new AI) without deciphering any sensitive information the system’s deployers wish to keep private.
Artificial Intelligence
Computerworld - Q&A: The human-machine relationship requires mutual understanding, respect for AI
"Anthropomorphization helps us relate to machines better. It helps us use the interface better. Deep learning and AI has been around for five decades. Someone gave us an anthropomorphic interface to interact with, and that’s where this exploded. It has human-like voice, its versatile, it can interact with me.
Artificial intelligence
VentureBeat - The AI workforce: Coming soon to an office near you
This “teammate” reality could be a permanent state — or it could be a transitory one. One indication this could be a transition phase comes from a recent New York Times story about the emerging capability for chatbots to become autonomous agents: “In time, many researchers say, the AI agents could become far more sophisticated, and could replace office workers, automating almost any white-collar job.”
Automation & Productivity
Information Week - How the Cloud Can Help Enterprises Become More Sustainable
Many cloud clients have spent decades creating IT environments that weren’t built with sustainability as a top priority, Hoecker observes. “These aging infrastructures continue to expand as the demand for computing power grows at a rapid pace.” The cloud gives such organizations the chance for a fresh start. Sustainable cloud environments can lower costs by allowing customers to decommission data centers and consolidating hardware and software footprints.
Sustainability
sdxCentral - Why enterprises need to apply NIST Cybersecurity Framework 2.0
“The overall message of CSF 2.0 is that risk management needs to be elevated to an enterprise-level, with key leadership involvement,” Gartner Distinguished VP Analyst Katell Thielemann told SDxCentral. “Instead of focusing on security controls, security teams need to understand what role security plays in the overall lifecycle of risk management, to include ecosystems like supply chains.”
Security
Information Week - 3 Reasons Why Cloud Migration Fails in Large Enterprises
Failing to involve key stakeholders, such as IT teams, business units, and compliance experts, can result in misalignment with organizational goals. Rushing into migration without thorough planning can lead to data loss, system downtime, and increased costs. Overlooking regulatory requirements and security measures can expose an organization to legal issues and data breaches.
Cloud
Gartner IT Symposium/Xpo: Impact of Generative AI on the Human-Machine Relationship
Scheibenreif highlighted the shift in human perceptions about machines. In the past, machines were considered tools, but now leading companies and businesses are engaging with them as teammates, Scheibenreif said. Gartner predicts that, by 2025, generative AI will be a workforce partner for 90% of companies globally.
Artificial Intelligence
SiliconANGLE - Gen AI is changing everything. Here are just a few examples of how 
“Generative AI will drive a democratized workplace, empowering employees with knowledge and skills to achieve their potential. IT leaders must harness its value to increase productivity, cut costs and create growth opportunities, while also mitigating its significant risks,”
Artificial Intelligence
The Hacker News - Who's Experimenting with AI Tools in Your Organization?
With Nudge Security, you can get an immediate inventory of all the AI tools your employees are using, and set up alerts to notify you whenever a new AI tool is introduced. Nudge Security automatically discovers AI tools and other SaaS applications in your environment, and categorizes them by type for easy filtering, including the free, paid, and trial accounts that you might not be able to discover by relying on procurement processes or combing through expense reports.
Security
VentureBeat - Snoop Dogg, sentient AI and the ‘Arrival Mind Paradox’
Of course, an accidental nuclear launch or autonomous weapons gone rogue are real threats, but they happen to be dangers that governments already take seriously. On the other hand, I am confident that a sentient superintelligence would be able to easily subdue humanity without resorting to nukes or killer robots. In fact, it wouldn’t need to use any form of traditional violence. Instead, a superintelligence will simply manipulate humanity to meet its own interests.
Artificial Intelligence
Stanford University - Human-Centered Artificial Intelligence - Who Is Liable When Generative AI Says Something Harmful?
When interacting with ChatGPT, you may have encountered a response that starts with “As a language model …” before it politely refuses to do your bidding. The model is trained to respond like this to potentially harmful queries. These queries are discovered through what’s called “red teaming” in which a team of people — some technical experts and some not — craft queries to try to trigger harmful behavior from the model, which then helps model developers create safeguards. In fact, the White House helped put together a red teaming effort for some of the most advanced foundation models."
Artificial Intelligence
SiliconANGLE - From hype to reality, the true state of AI adoption
The rub is that as we said in our research note, Lower for Longer, for the past two years, overall enterprise tech spending expectations have decelerated from a high of 7.5% growth expectations to the current 2.9% level. The issue being that chief financial officers and chief executive officers are generally not allocating discretionary spending for chief information officers to pursue AI. Rather the trend appears to be AI initiatives are stealing budget from other sectors, many of which are being deemphasized as AI experiments are funded.
Artificial Intelligence
DarkReading - Change From Within: 3 Cybersecurity Transformation Traps for CISOs to Avoid
CISOs will thrive within this change by focusing on input, empathy, and alignment. This will enable lasting success for the shift by allowing CISOs to fully identify and understand information asymmetries throughout the organization and then remove them to clear the path to optimal communications and awareness.
IT Management
Wikibon - Breaking Analysis: From hype to reality, the true state of AI adoption
In this Breaking Analysis and ahead of Supercloud 4, ETR’s Erik Bradley and Daren Brabham join the program to share the latest trends on AI adoption, how Gen AI is being used, some of the deployment models and the AI leaderboard based on spending momentum and presence in the market. 
Artificial Intelligence
Brookings - The AI regulatory toolbox: How governments can discover algorithmic harms
Governments around the world are implementing foundational policies to regulate artificial intelligence (AI) and algorithmic systems more generally. While legislation is advancing, regulators should not wait idly for legislators to act. Instead, regulators should be actively learning about the algorithmic systems in their regulatory domain and evaluating those systems for compliance under existing statutory authority.
Artificial Intelligence
Computerworld - Does Siri dream of ChatGPT?
Pu tells us that Apple’s response to this will (as I recently speculated upon) be to offer a combination of cloud based “EdgeAI” features you can access (presumably securely and privately) via Siri, while providing more limited tools based on an LLM you can access natively on the handset. As he explains it, Siri will become capable of understanding context, predicting commands, and running complex tasks based around the capabilities of the Shortcuts app.
ChatGPT
One Useful Thing - Centaurs and Cyborgs on the Jagged Frontier
"There is a ton of important and useful nuance in the paper but let me tell you the headline first: for 18 different tasks selected to be realistic samples of the kinds of work done at an elite consulting company, consultants using ChatGPT-4 outperformed those who did not, by a lot. On every dimension. Every way we measured performance."
Artificial Intelligence
NetworkComputing DigiCert Study Finds That Quantum Interest is High, But Security Concerns Exist 
This urgency hasn’t translated into actionable measures for many. A mere 30 percent of organizations have set aside a budget for quantum readiness. Roughly half of the surveyed IT experts expressed uncertainty about the ramifications of quantum computing, and many reported that their leadership is either only somewhat aware or entirely uninformed about the imminent security implications.
Quantum Computing
sdxCentral - Okta reveals surging investment in zero-trust security
Okta’s report also revealed trends across regions and industries. North America is leading the zero-trust charge with 73% of organizations having a defined strategy and Japan and Australia were least likely to have one at 47%. In terms of industries, the financial services sector narrowly edges out the software industry with 71% adoption compared to 69%.
Security
ZDNet - Here come the 'custobots': AI pervades Gartner's top 10 strategic technology trends
AI TRiSM provides tooling for ModelOps, proactive data protection, AI-specific security, model monitoring (including monitoring for data drift, model drift, and/or unintended outcomes), and risk controls for inputs and outputs to third-party models and applications. Gartner predicts that by 2026, enterprises that apply AI TRiSM controls will increase the accuracy of their decision-making by eliminating up to 80% of faulty and illegitimate information.
Artificial Intelligence
Blocks & Files - HPE and Dell diverge on AI strategy
Both rate AI as the biggest driver of IT infrastructure revenue growth in the next few years and both have a strategy that extends across edge sites and hybrid cloud datacenters. Both see x86 servers doing AI inferencing, but Dell’s strategy extends its AI inferencing down to PCs, which it makes and sells but HPE does not. HPE’s strategy extends upwards into supercomputers, which it makes and sells but Dell does not.
Artificial Intelligence
Datanami - Heap Digital Insights Report Reveals Data Stack Challenges and Global Data Regulations Top Concerns for Organizations
The survey additionally revealed that nearly 70% of respondents worry that global data regulations will make it difficult to gather and utilize needed data. 86% of teams find themselves surrounded by data silos. Teams say their silos are created through cross-functional collaboration, the inability of tools to share data, and no culture or mandate for sharing data.
Data Management
Network World - Gartner: IT spending to climb 8% to $5.1 trillion in 2024
Organizations are continuing to invest in AI and automation to increase operational efficiency and bridge IT talent gaps, Lovelock stated. “The hype around GenAI is supporting this trend, as CIOs recognize that today’s AI projects will be instrumental in developing an AI strategy and story before GenAI becomes part of their IT budgets starting in 2025.”
IT Management
VentureBeat - 5 Ways to Rein in Data Center Consumption in 2024
Yet, at the same time, a July 2023 survey from Hitachi Vantara found that tackling data center sustainability is no easy task. It found that two-thirds of IT leaders currently measure their data center’s energy consumption; however, one-third of respondents acknowledged that their data infrastructure uses too much energy and nearly half (46%) admitted their sustainability policies don’t address the impact of storing unused data.
Sustainability
SiliconANGLE - How companies are scrambling to keep control of their private data from AI models 
Sensitive data disclosure is rated sixth of the top 10 threats for LLMs list compiled by the Open Worldwide Applications Security Project. The authors posit a scenario wherein unsuspecting users are legitimately interacting with AI tools, and craft a set of prompts to bypass input filters and other data checks that can cause models to reveal sensitive data. “To mitigate this risk, LLM applications should perform adequate data sanitization to prevent user data from entering the training model data,” the authors of the list recently wrote.
Artificial Intelligence
Information Week - Techno-Optimists, ‘Atlas Shrugged,’ and Elitism of Ideas
Benefits of technology can be seen through medical discoveries, global communication, and access to information via the internet, which he also highlighted in the manifesto. On the other hand, not everyone wants sand to think. Contention about technology can surface from potential physical harms such as contact with hazardous materials, environmental damage through the consumption of natural resources and creation of pollution, and socioeconomic worries such as job displacement and widening wealthy disparity.
Artificial Intelligence
VentureBeat - Gartner: Generative AI will be everywhere, so strategize now
Nearly three-quarters (73%) of CIOs polled by Gartner said their enterprise will increase funding for AI/ML in 2024. Similarly, 80% said their organizations are planning on full gen AI adoption within the next three years.
Artificial Intelligence
CIO Influence - How Backing Up Data Could Endanger Your Organization — and What to Do About It
Even the best of intentions can have unintended consequences. Unfortunately, common cloud backup methods can lead to the growth of shadow data — organizational data that is copied, backed up, or housed in a data store not under the same security structure or governed by security or IT. Because this data is left “in the dark,” it’s a hot target for today’s threat actors — and organizations have taken note. A majority of data security and governance professionals (68%) have named shadow data as the No.1 concern of protecting cloud data.
Data Management
Google Cloud - From turnkey to custom: Tailor your AI risk governance to help build confidence
Google Cloud customers can use our Responsible AI approach to mitigate risks from unintended or unforeseen outputs that models can produce. Vertex’s Explainable AI makes it easier to know how an AI model makes a decision. And, we are currently offering a Model Fairness tool in preview. Finally, features such as Model Evaluation, Model Monitoring, and Model Registry can all help to support data and model governance.
Artificial Intelligence
Information Week - US Lawmakers Mull AI, Data Privacy Regulation
One point repeated throughout the Energy and Commerce subcommittee hearing was the immediate need for passing the American Data Privacy and Protection Act (ADPPA), the bill that would be the first federal-level data privacy law. The consensus between subcommittee members and experts and stakeholders speaking was that data privacy regulation is interwoven with AI regulation needs and should be a priority for congressional action.
Data Privacy
ZDNet - 61% of firms worry they are unprepared for security risks in quantum era 
Some 30% say a budget has been set aside to prepare their organization for a quantum computing era. Just over half, at 52%, currently are making an inventory of the types of cryptography keys used along with their characteristics.
Security
Computerworld - Teaching AI to behave is the fastest-growing career skill
“It’s critical. Prompt engineering is a very important part of what’s coming, not just for OpenAI, Google, Amazon, and Microsoft, but also for all the open-source models,” Brethenoux said. “They’re going to go into the workforce, and they need to master that technology one way or another.”
Tech Jobs
VentureBeat - How AI can help close IoT’s growing security gaps to contain ransomware
IoT attacks seek to take advantage of infrastructure and manufacturing organizations that don’t know how many sensors and endpoints they have, where they are, if they’re current on patches or if they’re secured. IT and security teams in a typical enterprise don’t know where up to 40% of their endpoints are. During Q2 2023, 70% of all ransomware attacks were aimed at the manufacturing sector, followed by industrial control systems (ICS) equipment and engineering (16%).
Security
ZDNet - What is ransomware? Everything you need to know and how to reduce your risk
Other, much larger ransomware campaigns use software exploits and flaws, cracked passwords, and other vulnerabilities to gain access to organizations using weak points such as internet-facing servers or remote desktop logins. The attackers will hunt secretly through the network until they control as much as possible -- before encrypting all they can.
Security
NetworkComputing - SD-WAN vs MPLS: What's The Difference & Which Is Better?
To understand which option better meets your network needs today and tomorrow, it's crucial you understand the key difference between the solutions. SD-WANs are service-provider agnostic. In contrast, MPLS requires enterprises to use the same service provider at all locations.
Network Management
ZDNet - Government officials debate effectiveness of multilateral relations in cybersecurity 
To navigate the world toward a digital order, he underscored the importance of a multi-stakeholder model and partnerships across borders and sectors. He pointed to efforts, such as the United Nations Open-Ended Working Group on Security, which Singapore currently chairs, and discussions around the Global Digital Compact, which aims to outline shared principles for "an open, free, and secure digital future for all".
Security
TechRepublic - Google Brings Generative AI to Search: Here’s What SGE Can Do
Users who opt in to SGE will see an option to create AI-generated images directly in Google Images as part of the model’s testing period. This feature is designed to appear when users are searching for inspiration, said Google (e.g., “minimalist Halloween table settings” or “spooky dog house ideas.” Users can then fine-tune the results by modifying the description.
Automation & Productivity
ZDNet - Can AI detectors save us from ChatGPT? I tried 5 online tools to find out 
When I first tested GPT detectors, I used three: the GPT-2 Output Detector, Writer.com AI Content Detector, and Content at Scale AI Content Detection. The best result was 66% correct, from the GPT-2 Output Detector. This time, I'm adding three more: GPTZero, ZeroGPT (yes, they're different), and Writefull's GPT Detector.
ChatGPT
TechRepublic - Software Supply Chain Security Attacks Up 200%: New Sonatype Research
Because of this huge increase in attacks, many open-source systems have implemented new security policies and improvements, such as mandatory multifactor authentication for developers; however, oftentimes, malicious packages are handled the same as packages with vulnerabilities, meaning they’re taken down the same way as vulnerabilities, which is inappropriate for malicious content, as the packages might stay online longer for that reason.
Security
ZDNet - Organizations are fighting for the ethical adoption of AI. Here's how you can help
One of the main things ForHumanity focuses on is creating auditable rules for AI auditors (people who evaluate AI systems to ensure they work as expected) based on the law, standards, and best practices through a crowd-sourced, iterated, and collaborative process with ForHumanity volunteers. The organization then submits these auditable rules to governments and regulators.
Artificial Intelligence
CIO Influence - Are You Covered? Large Language Models and AI Security in the Enterprise
Observability is rapidly emerging as a critical issue in the LLM security ecosystem. With so many people in an organization using multiple models for myriad uses on all manner of devices, tracking and auditing usage is critical. Typically, administrators do not have the ability to view users’ prompt histories, which means they can only know in the most general terms who is using the model and how often
Artificial Intelligence
Datanami - Dremio’s New Research Demonstrates Data Lakehouse Value with Math-Style Proof and Technical Clarity
The paper decomposes commonly used but overloaded terms like data warehouse, data warehousing, and data lakehouse into discrete components (such as query engine, table format, etc.), then offers clear terms and definitions based on these components to bring clarity to communication that uses these common terms.
Data & Analytics
VentureBeat - Invisible AI watermarks won’t stop bad actors. But they are a ‘really big deal’ for good ones
When it comes to the ethics and values surrounding AI-generated images and text, she explained, one set of values is related to the concept of provenance. “You want to be able to have some sort of lineage of where things came from and how they evolved,” she said. “That’s useful in order to track content for consent credit and compensation. It’s also important in order to understand what the potential inputs for models are.”
Artificial Intelligence
Datanami - NetApp’s 2023 Data Complexity Report Reveals Urgent Need for Unified Data Storage
The report found that 98% of organizations are in the middle of their cloud journey, with three out of four reporting workloads stored on-premises, highlighting the need for a unified approach to hybrid multi-cloud architectures and continued innovation in both on-premises all-flash storage and public cloud storage to enable AI adoption at scale.
Data Storage
CIO Influence - Risk and Compliance Management: Take a Risk-Centric Approach to Manage Security
Compliance and risk are often thought of as separate considerations, and for larger companies, they can serve distinct functions. In reality, risk and compliance share a symbiotic relationship with compliance affecting risk, and risk affecting compliance. Therefore, what you do within your compliance program will directly impact your level of risk.
Risk Management
Network World - Generative AI pervades Gartner’s 2024 predictions for cybersecurity roles, application modernization and more
By 2028, enterprise spend on battling malinformation will surpass $30 billion, cannibalizing 10% of marketing and cybersecurity budgets to combat a multifront threat.
Tech Trends
VentureBeat - How transparent are AI models? Stanford researchers found out.
The Index results were sobering: No major foundation model developer was close to providing adequate transparency, according to the researchers — the highest overall score was 54% — revealing a fundamental lack of transparency in the AI industry. Open models led the way, with Meta’s Llama 2 and Hugging Face’s BloomZ getting the highest scores. But a proprietary model, OpenAI’s GPT-4, came in third — ahead of Stability’s Stable Diffusion.
Artificial Intelligence
sdxCentral - Edge computing survey shows retailers embrace SASE
Forrester noted in its zero-trust edge Wave report that SASE is now well-suited for organizations with distributed small sites like retailers, retail banks and gas stations. Gartner Distinguished VP Andrew Lerner also told SDxCentral in an earlier interview that currently, organizations who are actively investing in SASE tend to be smaller and mid-market ones in healthcare, finance, manufacturing and retail.
Security
Slate - A.I. May Not Get a Chance to Kill Us if This Kills It First
The brain that wrote your favorite novel consumed Dickens and Austen, Pynchon and Didion. The brain that wrote this article devoured Bradbury and Orwell, Ishiguro and Octavia Butler. But the “brain” that powers that chatbot you played around with over the weekend ingested 170,000 books, all so it can spit out language that sounds smart, colorful, or helpful—even if it’s really not.
Artificial Intelligence
SiliconANGLE - Barracuda report reveals 50% of all internet traffic is bot-driven 
In one interesting takeaway, the report also found that a third of bad bot traffic is coming from residential IP addresses. That’s believed to be from bot creators trying to hide in residential traffic by using someone else’s IP address through proxies to bypass IP blocks.
Privacy & Security
Information Week - Developers and the AI Job Wars: Here's How Developers Win
Nerves are already rattled over recent artificial intelligence advances in writing code. Tensions continue to rise alongside unending releases of new programming features. For example, ChatGPT recently went multimodal. ChatGPT Plus and Enterprise versions now have voice and image capabilities, which leads to “napkin developers,” as NativeScripting founder and lead trainer Alex Ziskind called them in this video demo. This upgrade enables ChatGPT to write full code from nothing more than a basic idea scribbled on a napkin.
Artificial Intelligence
Network World - Gartner: Enterprises need to focus on AI priorities and readiness
To that end, Gartner predicts that by 2025, GenAI will be a workforce partner for 90% of companies worldwide. In addition, by 2026, more than 80% of enterprises will have used GenAI application programming interfaces (APIs) or models, and/or deployed GenAI-enabled applications in production environments, up from less than 5% in 2023, Gartner stated. (Also see Gartner's top strategic technology trends for 2024)
Artificial Intelligence
Information Week - Will Encouraging Kids to Become Coders Lead to a Future Coder Glut?
“However, this can be mitigated by promoting a diverse range of skills and encouraging students to explore other areas of interest alongside coding.” By following a multidisciplinary approach, educators can ensure that young students are equipped with a well-rounded skill set that aligns with evolving job market needs, he notes.
Tech Jobs
Computerworld - University of Kentucky unlocks 60% cut in IT costs with Apple
The University of Kentucky recently shared interesting insights that suggest equipping any kind of knowledge worker with these tools should benefit learning and business. The educational institution has been running a Smart Campus iPad initiative for five years, under which all 33,000 students are equipped with iPads, Smart Keyboards, and an Apple Pencil for their studies.
EdTech
Forbes - Why Enterprise Storage Should Be A Key Cybersecurity Focus
Legacy storage systems that have not been fortified by cyber storage resilience technologies, including cyber detection and cyber recovery, have become very weak points, allowing ransomware and malware to infiltrate, like thieves in the night. Too many enterprises have not taken it seriously enough that primary storage and secondary storage need to be protected.
Security
The_Byte - RESEARCHERS JUST FOUND SOMETHING TERRIFYING ABOUT TALKING TO AI CHATBOTS
While cybersecurity researchers and anti-stalking advocates alike urge social media users to practice "information security" — or "infosec" for short — by not sharing too much identifying information online, be it restaurants near your house or who you voted for, the average internet user remains relatively naive to the dangers posed by casual comments posted publicly that could put them at risk
Privacy & Security
Datanami - Two-thirds of SaaS AI Projects Could Be Undermined by Bad Data, Report Warns
Panintelligence’s report shows that the adoption of AI in SaaS picked up pace in 2023, but raises concerns that many companies need to pay more attention to data quality. Just 28% of SaaS companies – around a third of those developing AI functionality – are working on the kind of data quality initiatives required to support highly robust and accurate AI models.
Artificial Intelligence
SiliconANGLE - AI model training rekindles interest in on-premises infrastructure 
Model training and tuning aren’t like conventional IT tasks. Machine learning models must repeatedly churn through large amounts of data – the more, the better. Petabyte-sized data volumes aren’t easily shifted between local data centers and cloud platforms. This “data gravity” issue makes training in-house an attractive option if that’s where the data already lives.
Artificial Intelligence
eWeek - 9 Best Synthetic Data Software 2023
Why is synthetic data important? Approximately 328.77 million terabytes of data are created each day. There are limits to what and how you can use this vast amount of data without breaking compliance laws or compromising privacy.
Data Management
Datanami - Qlik Highlights the Importance of Data Fabric in Boosting Generative AI Outcomes
The report found that while the initial excitement of what generative AI can deliver remains, leaders understand they need to surround these tools with the right data strategies and technologies to fully realize their transformative potential. And while many are forging ahead with generative AI to alleviate competitive pressures and gain efficiencies, they are also looking for guidance on where to start and how to move forward quickly while keeping an eye on risk and governance issues.
Data & Analytics
VentureBeat - Stack Overflow confirms layoffs affecting 28% of workforce
“This may be the first large layoff directly due to AI,” and cited “people asking ChatGPT instead of Stack Overflow” for answers to their questions, posting a graph showing a precipitous decline in Stack Overflow page views beginning in April 2023, when the chatbot was gaining public momentum.
Artificial Intelligence
Datanami - New Data Suggests IT and Security Leaders Are Ignorant to Generative AI Threats
When asked, IT and security leaders are more concerned about getting inaccurate or nonsensical responses (40%) than security-centric issues, like exposure of customer and employee personal identifiable information (PII) (36%), exposure of trade secrets (33%), and financial loss (25%).
Artificial Intelligence
Information Week - Generative AI an Emerging Risk as CISOs Shift Cyber Resilience Strategies
“Often we’re exposing credentials so that anyone who compromises and exploits those can have access to incredibly sensitive content,” he says. “For example, one vendor found their software developers were debugging code in LLMs, and then it was compromised.”
Security
sdxCentral - Netskope report: Social engineering is the attack method of choice
More than half of the malware that users have attempted to download so far this year was delivered via cloud apps. Users were lured into downloading malware from 477 distinct cloud apps, most notably Microsoft.
Security
The Hacker News - Exploring the Realm of Malicious Generative AI: A New Digital Security Challenge
Recently, the cybersecurity landscape has been confronted with a daunting new reality – the rise of malicious Generative AI, like FraudGPT and WormGPT. These rogue creations, lurking in the dark corners of the internet, pose a distinctive threat to the world of digital security. In this article, we will look at the nature of Generative AI fraud, analyze the messaging surrounding these creations, and evaluate their potential impact on cybersecurity.
Security
sdxCentral - Horizontal vs. vertical AI: What do enterprises need to know?
“Vertical AI solutions are designed to provide targeted and specialized functionalities,” said Chen. These tools leverage industry-specific knowledge and expertise to offer more targeted, personalized and reliable results. Specialized algorithms are specifically designed for an industry or use case and are often offered as plug-and-play because they are typically prebuilt.
Artificial Intelligence
Information Week - Doing More With Less: A Guide for IT Leaders
Adapting to this landscape isn’t just about juggling resources, it’s about reshaping mindsets. IT leaders now operate at the intersection of frugality and forward-thinking, emphasizing value-driven solutions while keeping an eye on the horizon.
IT Management
TechRepublic - New CISA and NSA Identity and Access Management Guidance Puts Vendors on Notice
“The publication (it’s hard to call it guidance) highlights the challenges with comparing the features provided by vendors. CISA seems to be putting vendors on notice that they want vendors to be clear about what standards they do and don’t support in their products, especially when a vendor only supports portions of a given standard.”
Security
Network World - Gartner: Top strategic technology trends for 2024
“A lot of the trends are around AI development, but also in protecting the investment that organizations have already made. For example, they’ve invested in machine learning, natural language. And there's a ramp up in software engineering right now where people are building more things because they have access to that data and the development tools are getting better,”
Tech Trends
The Verge - The Meta glassholes have arrived
I do wonder if Meta was prepared for the Quest 3 to be the glasshole’s headset of choice, though. While the company has put considerable thought into making sure its glasses-like Ray-Bans don’t fall into the same trap — publishing privacy explainers and guidelines on using those glasses in public, including proactively letting people know you’re recording — the Quest 3 doesn’t seem to have similar published guidelines.
Privacy
sdxCentral - 4 things you need to know to protect data in multicloud environments
Even though multicloud is the new enterprise reality, it doesn’t mean that enterprises have figured out how to manage that new reality. Recent research from Enterprise Management Associates (EMA) forecasts that 88% of enterprises will adopt multiple cloud services by 2024, up from 72% in 2022. However, EMA found that only 35% of enterprises believe that their multi-cloud networking strategies have been successful, and only 24% of the 351 IT organizations surveyed were satisfied with their multicloud network monitoring and observability capabilities.
Cloud
TechCentral.ie - Thinking about thinking machines
Today’s AIs are not, for instance, going to evolve into machines that can actually think (known as ‘artificial general intelligences’ or AGIs). How could they? Generative AIs, notably the large language model-based chatbots, do not reason. Instead, they make probabilistic assessments of what is the correct word order in a sentence. This is intelligence, but it is very far from human cognition, lacking many basic building blocks, including the ability to make a coherent model of reality.
Artificial Intelligence
Network World - Networking and security teams tasked to converge, collaborate
The goal of shared processes could be a hefty challenge for some organizations. In the Cato Networks survey, 12% of respondents reported that their networking and security teams either have “turf wars or struggle working together,” and another 34% said they “occasionally have problems working together.” The remaining 54% reported that the two teams work well together now.
IT Management
Blocks & Files - DDN’s Paul Bloch: Race to AI has companies making purchase orders just weeks after they decide they need it
GPUs need fast data transfer from storage, with Bloch saying: “As an overall rule, one GPU will require about one to two gigabytes a second of data storage. … If you buy a thousand GPUs, you’re going to need about a terabyte a second.  .. We’re deploying systems today over the past couple quarters that are delivering 5 terabytes, 10 terabytes a second.”
Artificial Intelligence
Computerworld - Prisma chief med officer: AI offers ‘tremendous opportunities’ but shouldn’t replace doctors
Currently, Albano is evaluating a just-launched precision care platform from RhythmX AI, a subsidiary of SAIGroup. The AI-based platform produces patient-specific prescriptive actions and recommendations for clinicians who can further drill down using a genAI-enabled natural language interface and chatbot tools.
Artificial Intelligence

Adapting to this landscape isn’t just about juggling resources, it’s about reshaping mindsets. IT leaders now operate at the intersection of frugality and forward-thinking, emphasizing value-driven solutions while keeping an eye on the horizon.
IT Management
NetworkComputing - The Pillars of Cloud Infrastructure Security in 2023 and Beyond
To take up these challenges, companies must embrace a holistic approach to security, whereby the protection mechanisms are as resilient as the cloud environment itself, and uniform security standards are in place across all aspects of the infrastructure. This article sheds light on the fundamental components of a robust security posture in a world where cloud computing plays an increasingly important role.
Cloud Security
Information Week - How to Get the Most Out of Data Visualization
Data visualizations are frequently built by individuals intimately familiar with the data. “But, often, the person who needs to know the information is much less familiar with it, if at all,” Goranson says. He believes that it’s always a good idea to ask for feedback on early designs, and to remember that it’s the designer’s job to ensure that the data visualization makes sense.
Data & Analytics
AiThority - SAP User Survey Finds Customer Experience, User Productivity and AI/ML as Top Priorities across Business and IT
While internal downtime impacts were said to be experienced much more than external impacts, business user impacts due to SAP downtime were, unsurprisingly, the overriding concern for respondents, with 39% noting a direct impact on customers. Integration challenges were identified as the top contributor to unplanned downtime. In fact, almost all respondents (95%) reported facing integration issues, with data inconsistency representing the most widely experienced challenge.
Automation & Productivity
The Verge - What is Wi-Fi 7 — and do you even need it?
Wi-Fi 7 could be an even bigger speed boost than Wi-Fi 6E was, thanks in part to the wide open spaces of the 6GHz band that 6E unlocked. It’s also supposed to deploy other tricks for speeding things up and bring new ways to cut through interference and drop the latency of your network.
Automation & Productivity
Computerworld - Generative AI spending to reach $143 billion in 2027: IDC
IDC has forecast that by the end of 2027, spending on generative AI will account for 28.1% of overall AI spending, with generative AI infrastructure — which includes hardware, infrastructure as a service (IaaS), and system infrastructure software (SIS) — representing the largest area of investment during the so-called buildout phase of this period.
Artificial Intelligence
SiliconANGLE - SEC chair Gary Gensler warns unregulated AI could lead to financial crisis 
A core focus of the concerns raised by Gensler is that enterprise-grade, cloud-based large language models are currently available from only a handful of tech companies. This limited product choice means that numerous financial institutions could end up using a single supplier’s AI model to make important decisions. If that one AI model makes a mistake, all the financial institutions using it could be affected, which may have a broad impact on the economy.
Artificial Intelligence
VentureBeat - Data optimization is a must for maximum efficiency
Prior to optimizing, you need to evaluate what cloud data platform is the right fit for your use case. Once you have decided, think about potential cost implications for the use case (i.e., storage costs, loading costs, computing power) and balance this against the potential value you can derive from that use case. If it’s a fit, you can then focus on managing the inefficiencies.
Data Management
SiliconANGLE - Gartner’s top 10 strategic technology trends for 2024 highlight growing adoption of AI 
In fact, Gartner forecasts more than 80% of enterprises will have their own generative AI application programming interfaces and models up and running by 2026, up from just 5% earlier this year. “This means the rapid adoption of GenAI will significantly democratize knowledge and skills in the enterprise,” Gartner said.
Artificial Intelligence
VentureBeat - Google Cloud pledges a ‘shared fate’ in AI, offering legal indemnification for customers
This commitment covers Duet AI in Google Workspace, including generated text in Google Docs and Gmail and generated images in Google Slides and Google Meet. It also applies to a range of products across the Vertex AI portfolio.
Artificial Intelligence
TechRepublic - Capital One/Forrester Study: Deploying Self-Service Data Strategies Is Fraught With Challenges
Top challenges cited in the study include maintaining user-friendly environments (49%), increasing data trust and quality (49%) and scaling self-service for decentralized environments (47%).
Data & Analytics
VentureBeat - AI pioneers Yann LeCun and Yoshua Bengio clash in an intense online debate over AI safety and governance
Bengio, founder of Element AI and a professor at the University of Montreal, responded to LeCun’s post, challenging his perspective on AI safety, the importance of governance, and the potential risks of open-source AI platforms. Bengio argued for the importance of prudence, stating that we still do not understand how to design safe, powerful AI systems, and highlighted the need for major investment in AI safety and governance. He also questioned the wisdom of open-sourcing powerful AI systems, likening it to freely distributing dangerous weapons.
Artificial Intelligence
SiliconANGLE - Nine rules for CIOs to optimize IT costs strategically 
IT financial management tracks the total cost of IT and provide multiple views of IT spend to help stakeholders make informed business decisions. Repeated requests from the business to cut IT costs often indicate that the value of the spend is not understood at the business outcome level. To support your strategic cost optimization initiative, ensure that all IT costs are allocated to a business-valued application, product or service. Add cost detail and complexity to the ITFM allocation model only where needed.
IT Management
Information Week - Tech Company Layoffs: The COVID Tech Bubble Bursts
Standard explanations for the cuts were that companies hired too many during the pandemic and they were looking at the specter of a recession in the months ahead. It sounds a lot like the dot-com boom and bust of yore. Not all companies are impacted equally. It’s the ones that hired at an accelerated rate during the boom that seem to be hitting the brakes right now.
Tech Jobs
VentureBeat - Smarter than humans in 5 years? The breakneck pace of AI
“By 2029, computers will have human-level intelligence,” Kurzweil said in an interview several years ago. He further predicted that by 2045, AI will have achieved the “Singularity,” the point when “we will multiply our effective intelligence a billion-fold by merging with the intelligence we have created.”  
Artificial Intelligence
SiliconANGLE - Getting ready for the sixth data platform 
In our previous research we’ve used the metaphor “Uber for everyone” to describe this vision, meaning software-based systems that enable a digital representation of a business. In this model, various data elements, such as people, places and things, are ingested, made coherent and combined to take action in real time. Rather than requiring thousands of engineers to build this system, we’ve said this capability will come in the form of commercial off-the-shelf software.
Data & Analytics
AiThority - Risks Of IT Integration
According to a research, 27 percent of companies said their synergies failed to mmet expectations for acquisitions. Fifty to eighty percent of mergers and acqusitions fail because of poor IT integrations. There is a lot of demand for a merged company to produce immediate commercial value and to deliver return on investment. However, the back-end logistics of IT/Security integration are typically difficult, slow, and hazardous, which impedes progress.
IT Management
sdxCentral - How rival Big Ten CISOs collaborate on cybersecurity
Despite the barriers, these CISOs understand that privacy looms large in their future. Milford went as far as to say that she expects privacy to grow so much in importance that it will dominate – that cybersecurity will be one facet of a broader privacy structure.
Privacy & Security
NetworkComputing - Are Smaller, High-volume Outages Dominating Downtime?
The impact of these incidents can be so big that they have a material, reportable impact on uptime for a significant subsection of users, potentially for the entire user base. Often with quite a bit of collateral damage, and as a result, they're often publicly reported on by news outlets and analyzed in depth by the responsible party.  
Network Management
sdxCentral - 5 tips to get your CISO on board with IAM
Look at how stakeholders — infrastructure, DevOps, IAM teams and others — do their jobs, what processes they’re leveraging and where the pain points are, he advised. Have one-on-ones, understand team members’ backgrounds and determine where their skills are (and if there are deficiencies, do they need to do training or hire additional talent?).
Security
SiliconANGLE - It’s time to put an end to the NTLM network authentication protocol 
“Our end goal is eliminating the need to use NTLM at all to help improve the security bar of authentication for all Windows users,” Palko wrote. And that goes to the heart of why it has such staying power, mainly because NTLM has been at the heart of authenticating numerous other non-Microsoft products, such as web server load balancers and using some network proxies. That has made killing off NTLM difficult, and why it has stayed around for so long.
Security
sdxCentral - What’s possible when you combine 5G, satellite and AI?
Misrahi cited cost efficiencies that have reduced the price of satellites, the launching of those satellites, and using past research and development as a steppingstone toward more advanced technology as now allowing satellite-supported 5G services to become a real opportunity. Use cases include using satellite instead of edge systems, being able to offload multimedia and content, and providing different backhaul options for fixed and mobile applications.
5G
Information Week - Critical Zero-Day Atlassian Bug: What CISOs Must Know
Microsoft Threat Intelligence identified a nation state threat actor (Storm-0062) exploiting this vulnerability in the wild since Sept. 14, according to an update on X (formerly Twitter). Microsoft noted that this threat actor is also tracked as DarkShadow and Oro0lxy. Storm-0062 is a name for Chinese state hackers who have a history of state-sponsored hacking activity.
Security
Computerworld - Why we need to focus AI on relationships
In other words, you start by making the AI into an assistant that enhances and helps the employee, then allow it to become a monitor/mentor as it provides real-time feedback on how the employee is interacting with others in the company. The next phase is the coach, where the AI becomes proactive and able to provide more detailed feedback at times of the employee’s choosing, with the final phase being that the AI becomes a teammate, able to autonomously do things on behalf of the human/AI team.
Automation & Productivity
NetworkComputing At Zoomtopia, Small Businesses Share Transformation Stories 
Fahs believes Zoom could improve by enhancing the visitor experience, while Zietlow wants improved customer relationship management (CRM) integration. Zoom can benefit from directly supporting text messages and emails in existing systems, eliminating the need for manual entry. Meanwhile, Kester’s main request for Zoom is workspace reservations. Given that his office receives numerous visitors, he envisions a system where security clearances, meal orders, and other logistics can be efficiently managed through Zoom.
Automation & Productivity
sdxCentral - Gartner Magic Quadrant reveals SD-WAN leaders, plus SASE and genAI trends
In choosing a vendor, enterprises should always run a proof of concept (PoC) to ensure solutions work as expected and, if they are managing internally, that they are comfortable with that process. Buyers should also be comfortable with vendor roadmaps as the market continues to evolve.
Network Management
SiliconANGLE - The Hamas-Israeli war is also being fought in cyberspace 
Many of these efforts are intended to sow panic among citizens, such as by sending disinformation alerts about potential bomb threats or insecure water supplies. Microsoft has found that Iran has lately broadened its target focus to include NATO member countries in addition to targets in the U.S. and Israel.
Security
Information Week - The Mind of the Inside Attacker
A rough categorization of insider threats has emerged, starting with their roles in the company. While some are permanent employees, others may be part-time or work in contractor roles that nonetheless afford them access to proprietary data. While many insider attacks are motivated by personal spite or revenge, it has become increasingly common for moles to be placed within an organization with the explicit goal of accessing data.
Security
sdxCentral - To pay or not to pay: Why CISOs are the least important in ransom decisions
Notably, in the wake of these events, 18% of the respondents said they paid the ransom directly to the attackers, 37% paid through cyber insurance and 28% used third-party negotiators. The retail sector stands out with a staggering 95% paying the ransom.
Security
VentureBeat - The open-source alternatives to GPT-4 Vision are coming
LLaVA 1.5 combines several generative AI components and has been fine-tuned to create a compute-efficient model that performs various tasks with high accuracy. While it’s not the only open-source LMM, its computational efficiency and high performance can set a new direction for the future of LMM research.
Artificial Intelligence
Computerworld - Q&A: How Discover Financial Services created an AI governance council
"First, you want to ensure responsible AI. So, ensuring there are no biases and it's accurate. My first job is to understand the math behind what I’m using. Within the sphere of AI and ML, we use static supervised learning — known data and known target. We have a very defined problem statement. With that, we use models to assist in acquisitions to get into house and detect fraud."
Artificial Intelligence
Datanami - Ascend.io Survey: Automation Seen as Key Solution for Overburdened Data Teams
Data teams now use five tools on average in their data stack and over two-thirds (68%) plan to maintain or increase this number in the next year. Despite this trend, data teams report stagnation in their overall capacity. Virtually all data professionals surveyed (95%) report being at or above their work capacity for the fourth year in a row, with data engineers reporting being significantly overworked more than three times as often as their peers in data analytics and data architecture.
Data Management
Information Week - Quick Study: The Evolving Roles of CIOs and IT Leaders
The roles and responsibilities of chief information officers have changed dramatically, and will continue to shift as the job itself morphs in the years ahead. Here’s a curated collection of articles that looks at the many hats IT leaders are wearing today.
IT Management
Network World - IBM: Treat generative AI like a burning platform and secure it now
There’s a disconnect between organizations’ understanding of generative AI cybersecurity needs and their implementation of cybersecurity measures, IBM found. “To prevent expensive—and unnecessary—consequences, CEOs need to address data cybersecurity and data provenance issues head-on by investing in data protection measures, such as encryption and anonymization, as well as data tracking and provenance systems that can better protect the integrity of data used in generative AI models,” IBM stated.
Security
Information Week - 6 Pain Points for CISOs and CIOs and What to Do About Them
Many companies are working with a mix of legacy technology, like on-premises servers, and new cloud and SaaS systems. CIOs and CISOs are faced with the operational and security challenges that come with this disparate tech stack and the migration to new systems.
IT Management
TechRepublic - F5 Warns Australian IT of Social Engineering Risk Escalation Due to Generative AI
Global head of intelligence at F5, Dan Woods said he is less worried about AI resulting in “killer robots” or a “nuclear holocaust” than some. But he is “very concerned about generative AI.” Woods says the biggest threat facing both enterprises and people is social engineering.
Security
VentureBeat - How true enterprise generative search revolutionizes customer and employee experiences
“There’s a lot of excitement about the technology of generative AI, but not much talk about the experience,” Chase says. “It’s key to remember why chatbots weren’t successful in the end — we weren’t able to achieve a consistent and effortless experience that allowed customers to find the information that they need.”
Automation & Productivity
NetworkComputing - AI in Data Centers: Increasing Power Efficiency with GaN
Current power conversion and distribution technologies in the data center can't handle the increase in demand posed by the cloud and machine learning—and certainly not from power-hungry Generative AI applications. The quest for innovative data center solutions has never been more critical.
Data Management
sdxCentral - High-severity vulnerability led to largest-ever DDoS attack, say Google, Cloudflare and AWS
The attackers exploited this by flooding websites with hundreds of thousands of “requests” and abruptly canceling them. “By automating this trivial ‘request, cancel, request, cancel’ pattern at scale, threat actors are able to create a denial of service and take down any server or application running the standard implementation of HTTP/2,"
Security
Information Week - Will Quantum Computers Become the Next Cyber-Attack Platform?
The security of today’s public key encryption is based on the fact that huge computational resources are required to solve factoring problems, especially for large integers, says NTT Research CEO, Kazuhiro (Kazu) Gomi. This may no longer be true in the years ahead, he warns. “Shor’s algorithm, running on a scalable quantum computer, will change this environment entirely,” Gomi predicts
Security
SiliconANGLE - Report: Big tech firms still struggling to make money from generative AI services 
There is also an element of overkill in many use cases. For instance, ChatGPT is powered by OpenAI LP’s GPT-4 model, which is said to be one of the world’s most powerful models of all. Yet many ChatGPT enterprise subscribers use it to perform extremely limited tasks. As the Journal put it, using GPT-4 to summarize an email is like delivering a pizza in a Lamborghini.
Artificial Intelligence
Computerworld - The future of augmented reality is AI
In a related announcement, Meta announced a ChatGPT alternative called Meta AI that also supports voice chat, with the responses spoken by any of 28 available synthetic voices. Meta has been baking Meta AI into all its social platforms (including the glasses) — and Meta AI will also be able to search Microsoft’s Bing search engine for more up-to-date information than what the Llama LLM (LLM stands for Large Language Model) has been trained on.
Artificial Intelligence
Network World - Hot (and not) networking skills for 2023
"We're moving to infrastructure as code for efficiency," says Sangillo. "We're embedding in the job description of every network engineer that we want you to be comfortable with software and orchestration solutions, speak the language of APIs, use Python, and use low-code solutions."
Network Management
sdxCentral - How SASE shows that the industry needs standardization for innovation and growth
However, this perspective is not helpful for the adopters of these technologies, as cloud, network and security products differ from consumer products. It is well established that in the networking industry, there are multiple ways in which vendors can differentiate their offerings based on quality, usability, and functions, such as advanced logging, debugging, and user experience enhancements built upon the standardized foundation
Security
Blocks & Files - Building cyber resilience with data vaults
In August 2023, Danish hosting subsidiaries CloudNordic and AzeroCloud were on the receiving end of one of the most serious ransomware attacks ever made public by a cloud services company. During the incident, CloudNordic suffered a complete encryption wipe-out that took with it applications, email services, websites, and databases, and even backup and replication servers. In a memorably frank admission, the company said that all customer data had been lost and would not be recoverable.
Security
The Hacker News - New Report: Child Sexual Abuse Content and Online Risks to Children on the Rise
"Harmful interactions between youth and adults are not isolated to the dark corners of the web. As fast as the digital community builds innovative platforms, predators are co-opting these spaces to exploit children and share this egregious content."
Privacy & Security
Datanami - KNIME Releases a State of Data Science and Machine Learning Survey
Organizations are facing challenges in machine learning projects. For example, some organizations are struggling to successfully integrate machine learning models into their software development lifecycle. The handling of large and complex data sets, managing specialized hardware, the gap between different skill sets, and ensuring availability, scalability, and security in production collectively add to the challenge.
Data Management
NetworkComputing - Apples for Apples: Measuring the Cost of Public vs. Private Clouds
It's no surprise, then, that an increasing focus among IT leaders is on both the absolute cost and the effectiveness of that cloud spend within their organizations. For some, this has been more than a challenge, with one of the very reasons that cloud has become so popular in the first place - the ability for engineers to swipe a credit card and spin up effectively limitless resources, enabling them to commit to elastic levels of spending, often under the radar of any central budgetary control. This has hampered many in their ability to both get a handle on exactly what and where these costs are coming from and also to plan effectively for a more strategic relationship with the hyperscalers.
Cloud
sdxCentral - Why a return to the office brings identity and mental health challenges
Identity remains one of the biggest challenges for organizations with 43% saying that more than 20% of their workforce identities are insufficiently secured, according to Poller’s latest research. A whopping 77% of organizations think or know they’ve experienced credential compromise in the past year, and 76% of those experience multiple compromises And, account compromise leads to cybersecurity attacks more than 70% of the time.
Security
Blocks & Files - How to stop ransomware thieves WORMing their way into your data
One component of this is the 3-2-1-1-0 rule: this means, storing three copies of your data, in addition to the original, across two media types, one of which must be off-site. Ootbi satisfies both of these by storing one in the cloud and the other on the customer’s premises on its own appliance’s NVME flash storage.
Data Protection
sdxCentral - AT&T opens up on open network API challenges and opportunities
Nokia recently unveiled a network-as-code platform that includes an SDK, network API documentation, a sandbox for creating software code, code snippets that can be included in applications, and developer analytics to track usage. Like many others, Nokia’s efforts are based on the GSMA Open Gateway initiative and the Camara Project, but the vendor added its own flavor on top of those efforts.
5G
DarkReading - 10 Routine Security Gaffes the Feds Are Begging You to Fix
The agencies added that software providers need to immediately adopt principles of secure-by-design to prevent these and other misconfigurations.
Security
Computerworld - Here’s where more than half of organizations are piloting generative AI
Forty-five percent of those surveyed said they are scaling genAI investments across multiple business functions, and nearly half of those (22%) are deploying the tech across multiple functions. Software development, marketing, and customer service (chatbots) are the areas seeing the highest rate of genAI adoption or investment.
Artificial Intelligence
Blocks & Files - Interpreting the MLPerf storage benchmark
“What they are showing with their benchmark is a compute system (with GPUs) reading data directly from a storage system.” We should use the number of simulated accelerators as a relative number to compare suppliers’ system and not an absolute number of V100 GPUs supported as it’s a simulated and not physical accelerator. A constraint of the benchmark is that storage systems should keep the simulated V100 90 percent busy.
Data Storage
DarkReading - Legions of Critical Infrastructure Devices Subject to Cyber Targeting
"The systems we identified as Internet-facing could be due to misconfigurations, or neglect of best practices," he explains. "Typically, attackers scan for Internet-facing systems and then gather information to determine if that system has a vulnerability. So if systems are behind a firewall or otherwise not Internet facing, then much of the risk of exploitation is mitigated."
Security
AiThority - How Does The Worst Version Of Claude AI Compare To The Best?
GPT-4, the powerhouse powering ChatGPT Plus and Bing AI, leads Large Language Models with the highest score. As we descend the standings, an unexpected underdog story emerges. Anthropic’s Claude models—Claude 1, Claude 2, and Claude Instant—outperform ChatGPT’s free engine, GPT-3.5. This indicates that every Anthropic Large Language Model outperforms ChatGPT free.
ChatGPT
VentureBeat - Goldman Sachs CIO is ‘anxious to see results’ from GenAI, but moving carefully | The AI Beat
That’s because for all the C-suite executives out there feeling generative AI FOMO and getting pressure from CEOs to move quickly to develop AI-centric strategies, things are actually moving far slower than you might imagine (or AI vendors, who warn companies about falling behind, might want)
Artificial Intelligence
NetworkComputing - Global NaaS Event Roundup: Taking NaaS and SASE Forward
MEF and its member organizations are laying the groundwork to bring a new generation of Network-as-a-Service (NaaS) to market. They envision NaaS as services that combine on-demand connectivity, application assurance, cybersecurity, and multi-cloud-based services. To meet enterprise demands, those providing these services will need a standards-based automated ecosystem.
Network Management
InformationWeek - AI and Overcoming User Resistance
You’re not just retraining an employee on a new set of steps for processing an invoice or taking an order. You’re actually introducing an automated thinking process into what an employee has been doing. Now, technology is going to make or recommend decisions that the employee used to make. This can lead to employees experiencing a loss of empowerment and control.
Automation & Productivity
SiliconANGLE - Lower for longer: Tech spending remains tepid 
Generative artificial intelligence is in some ways both a blessing and a curse. The excitement, potential and magic of large language models is fantastic. It creates urgency and mobilizes teams to focus on creating new forms of value, new business models, restructure processes and the like. But given the economic climate, what we’re seeing is generally not a lot of new money coming into IT budgets at the top line. Rather, there’s a reprioritization happening.
IT Management
InformationWeek - Dispelling 5 Misconceptions About Data
Your business will be judged by how much data you collect. Ever since data became a business imperative, companies have been scrambling to gather as much of it as possible, without a coherent strategy.  Yet, no amount of data can solve a business problem if it’s not the right kind of data. Companies will not be judged on the amount of data they have, but in the business decisions that were derived from it.
Data Management
Network World - Generative AI set to reshape SD-WAN market
There’s a trend toward AI capabilities that enable networking decisions to be made with little or no human intervention. These capabilities can help enterprises to streamline network design, configuration and ongoing management as well as increase agility and improve performance, according to Gartner. The research firm predicts that by 2026, generative AI technology embedded in SD-WAN offerings will be used for 20% of initial network configuration, up from near zero in 2023.
Network Management
VentureBeat - Ten years in: Deep learning changed computer vision, but the classical elements still stand
In contrast, deep learning — specifically convolutional neural networks (CNNs) and region-based CNNs (R-CNNs) — has transformed object detection to be fairly mundane, especially when paired with the massive labeled image databases of behemoths such as Google and Amazon. With a well-trained network, there is no need for explicit, handcrafted rules, and the algorithms are able to detect objects under many different circumstances regardless of angle.
Automation & Productivity
sdxCentral - Hyperscalers push anticompetitive practices, ignore industry cries for multicloud
According to Forrester Principal Analyst Tracy Woo, the move also serves as evidence for the growing sentiment that users want hyperscale cloud providers to be more open, more transparent and willing to adapt to the multicloud mindset. Simplifying the complexity of the multicloud environments in which many organizations accidentally find themselves shouldn’t be left to third-party vendors. That’s “actually the responsibility of the public cloud providers,”
Cloud
VentureBeat - Researchers turn to Harry Potter to make AI forget about copyrighted material
As the debate heats up around the use of copyrighted works to train large language models (LLMs) such as OpenAI’s ChatGPT, Meta’s Llama 2, Anthropic’s Claude 2, one obvious question arises: can these models even be altered or edited to remove their knowledge of such works, without totally retraining them or rearchitecting them?
Artificial Intelligence
Computerworld - Coda bucks trend of additional charges for generative AI tools
One, he said, lies in the Coda’s connectivity to a variety of different data sources, such Salesforce CRM data. This is done in a “permission-compliant” way that Mehrotra claims will ensure the AI has access to only the information that users have pulled into a Coda doc, rather than training on large corporate data sets.
Artificial Intelligence
VentureBeat - StreamingLLM shows how one token can keep AI models running smoothly indefinitely
A new paper published recently by researchers at Meta, the Massachusetts Institute of Technology (MIT), and Carnegie Mellon University (CMU), finds that there is a simple way to help LLMs maintain their performance even for indefinitely long conversations, where the user’s prompts collectively add up to be longer than what the LLM was trained to handle at once.
Artificial Intelligence
eWeek - Companies Divided After Launch of ChatGPT Enterprise
The remaining companies have already decided they will never use OpenAI. This is typically due to data privacy, compliance or business protection reasons. However, these “nevers” may arguably shift their stance as some of these data concerns are addressed, and/or the urgent need to deploy AI drives decision makers to take some calculated risks.
ChatGPT
sdxCentral - Inside global SecOps: A day in the life of a Trellix threat intelligence head
Trellix’s threat intelligence group operates around the clock, collecting and digesting research and intelligence from industry peers and government agencies, analyzing cybercriminal behaviors and attacks, alerting customers, offering threat intelligence services and working with the vendor’s product teams to enhance its cybersecurity services. They also closely collaborate with law enforcement, sharing information and assisting in takedowns of nefarious groups.
Security
The Hacker News - New OS Tool Tells You Who Has Access to What Data
A comprehensive Data Security Platform is essential for full visibility and control of sensitive data. One example is Satori's Universal Data Permissions Scanner (UDPS), an open-source authorization analysis tool. UDPS, available on GitHub, enables universal visibility into data access permissions across various data stores. With this tool, it's easier to identify who has the potential to access sensitive data, which can help organizations take a proactive approach to enhancing their security posture, streamline compliance, and ensure well-governed data access.
Data Management
SiliconANGLE - Outside the 8½-by-11 box: Five thoughts from Zoomtopia 2023 
Zoom isn’t afraid of Microsoft but would like a level playing field. Most of the collaboration vendors have ceded the leadership position to Microsoft Teams. Not because of product quality – almost every collaboration tool is easier to use – but because the Microsoft licensing engine keeps customers locked in. When I attend analyst events or user conferences from other vendors, there is always a heavy dose of Teams interoperability. At Zoomtopia, nary a word was said about Teams coexistence. Zoom believes it has a superior product and, with a level playing field, feels it can win any customer.
Automation & Productivity
AiThority - How Generative AI Is Fuelling 70 Percent Workplace Success
70% of workers use Generative AI (GenAI) at work, yet just half get employer guidance. While experts predict a widespread impact, only 7% of workers anticipate job loss due to GenAI.
Artificial Intelligence
VentureBeat - DeepMind cofounder is tired of ‘knee-jerk bad takes’ about AI
Some of these risks might be distant, they might be small, maybe even unlikely, but it’s better to treat powerful and still only partially understood technologies with a degree of precaution than dismiss its risks outright. My approach is to be careful about buying into any narratives about AI, but also to constantly keep an open mind.
Artificial Intelligence
InformationWeek - US Tech Layoffs Soar 716% in 2023: Report
But the number of job cuts has been falling steadily over the summer, the firm says, with 2,537 cuts in September, the lowest number since June 2022. The 2023 tech layoffs are the second worst totals on record. In 2001, 168,395 cuts were announced in the sector.
Tech Jobs
Computerworld - Are you looking forward to the new age of mobile app insecurity?
But Apple reps are also inundated with requests related to third-party apps over which they have no control. As the EU looks to force Apple into allowing apps from alternative app stores onto its devices, a practice known as sideloading, the user experience with Apple devices — and the flood of inquiries and complaints — is about to get much, much worse.
Security
Network World - What is DNS and how does it work?
DNS is organized in a hierarchy. An initial DNS query for an IP address is made to a recursive resolver. This search first leads to a root server, which has information on top-level domains (.com, .net, .org), as well as country domains. Root servers are located all around the world, so the DNS system routes the request to the closest one.
Network Management
VentureBeat - The case for bringing generative AI on premises
For many organizations, the latter option is the only sensible solution — they either cannot place certain data in the public cloud or cannot risk their sensitive or proprietary data even with additional security controls offered through enterprise generative AI solutions. But by adopting generative AI on their own hardware within their own environments, organizations maintain maximum control over their data and security posture.
Artificial Intelligence
Blocks & Files - Public cloud ephemeral storage can’t be persistent – right?
In summary we could say the ephemeral storage supplied by AWS, Azure, and Google for VMs and containers is unprotected media attached to a compute instance. This storage is typically higher speed than persistent storage, much lower cost, and has no storage services, such as snapshotting, compression, deduplication, or replication.
Data Storage
eWeek - Generative AI: 5 Things Business Leaders Must Know
Cost-effectiveness: While it may initially appear more affordable to develop AI tools internally, it’s essential to factor in expenses related to team building, software acquisition and long-term maintenance. If the tool serves as a crucial competitive advantage for the business, it may justify ongoing costs. However, if similar functionality is already available through a tool the company is currently paying for, it doesn’t make financial sense to build and maintain redundant software.
Artificial Intelligence
CIO Influence - 75 Percent of Companies Struggling with IT Operational Challenges in a Hybrid World, According to HP Study
Companies cited a need for more efficient endpoint software tracking and management (48%). To achieve this, respondents want device backup and restore capabilities (55%), automation of device recovery processes (47%), BIOS update deployment (46%), and device location tracking (46%).
IT Management
InformationWeek - Redefining the Framework of Innovation
The impact of ecosystems on digital disruption today does draw sharp parallels to another important technological evolution. Specifically, it brings to mind the evolution of manufacturing and distribution technology which enabled the transition from vertical integration to multi-tier supply networks. The twist is ecosystem models look forward, not back in the value chain, enabling entire new value chains.
Ecosystems
Canalys - Generative AI a ‘generational opportunity’
“This is going to happen, will be an evolution ... second half of 2024 and 2025. You will see systems that are able to process data at 40 trillion operations per second, and even more. And then, combined with certain software upgrades, the experience will jump to the next level. We are confident this will deliver productivity and spark a significant replacement cycle,” he said.
Artificial Intelligence
The Verge - Google Photos’ new AI tools are as complicated and messy as a memory
 There’s a lot to be proven about how well the new features work, and there are the usual messy questions to ask about the role of generative AI in photography. But you can start to see very clearly how Google is shifting from saving “your photos” to cataloging your messy, complicated memories.
Automation & Productivity
Computerworld - You're probably going to use Microsoft Copilot wrong
You might assume that, because the second biggest company in the world is adding this technology to the taskbar on the latest version of the world’s most widely used PC operating system, this problem has been resolved and the technology is more reliable. Don’t assume that — this is ChatGPT and Bing Chat being just as chaotic as ever.
Automation & Productivity
Freedom House - Advances in Artificial Intelligence Are Amplifying a Crisis for Human Rights Online
“AI can be used to supercharge censorship, surveillance, and the creation and spread of disinformation,” said Michael J. Abramowitz, president of Freedom House. “This is a critical issue for our time, as human rights online are a key target of today’s autocrats. Democratic states should bolster their regulation of AI to deliver more transparency, provide effective oversight mechanisms, and prioritize the protection of human rights.”
AI Ethics
VentureBeat - How AI-powered patch management protects remote and hybrid workers
Cybercrime gangs and state-sponsored Advanced Persistent Threat (APT) threat actors who have launched the largest breaches in history — including the A.P. Møller-Maersk ransomware attack — often understand a target’s network better than admins. Whoever owns identities owns the business, and as devastating ransomware attacks show, threat actors are brazen about shutting an entire business down to meet demands.
Security
Techopedia - 10 Best Cybersecurity Certifications for 2024
Cybersecurity certifications are important because they offer employers' tangible evidence of your knowledge and skills in the field of cybersecurity. They also help you rise above other candidates in the job market or advance your current cyber career. We take a look at 10 certificates that can kick-start or improve your career.
Training & Certs
sdxCentral - Deloitte: What public company execs think of new SEC cyber disclosure rules
For the companies that haven’t started to prepare, Adib suggested conducting an SEC readiness assessment to make sure they have the foundational capabilities and comprehend where companies stand in relation to the requirements, evaluating their incident response capabilities, setting up the coordination and orchestration process and combining legal guidance and cybersecurity expertise to ensure timely and appropriate material incident disclosures.
Security
Network World - Data centers aren’t ready for AI, Schneider warns
Schneider's white paper notes that AI needs ample supply of three things: power, cooling, and bandwidth. GPUs are the most popular AI processors and the most power intensive. Whereas CPUs from Intel and AMD draw about 300 to 400 watts, Nvidia’s newest GPUs draw 700 watts per processor and they are often delivered in clusters of eight at a time.
Artificial Intelligence
Computerworld - Zero trust and why it matters to the Apple enterprise
Apple’s fast-growing position in the enterprise is a huge opportunity for Apple admins. They come to the space relatively less encumbered by the traditional silo-based approach to security and have the advantage that most key Apple device management systems already support the superior security magic that is zero trust.
Security
The Verge - Microsoft CTO Kevin Scott on how AI and art will coexist in the future
I also asked Kevin some pretty philosophical questions about AI: why would you write a song or a book when AI is out there making custom content for other people? Well, it’s because Kevin thinks the AI is still “terrible” at it for now, as Kevin found out firsthand. But he also thinks that creating is just what people do, and AI will help more people become more creative.
Artificial Intelligence
InformationWeek - Increased Greenwashing Stains ESG Efforts: Report
“Greenwashing now goes beyond directly misleading consumers -- its scope extends to include pledges, certifications, and commitments. The lack of accountability helps to further obscure greenwashing, making it possible for companies to benefit from setting future goals, without addressing issues head on,” according to a release from RepRisk.
Sustainability
The Hacker News - API Security Trends 2023 – Have Organizations Improved their Security Posture?
Traditional WAFs mainly focus on protecting against common vulnerabilities like injection attacks or cross-site scripting (XSS). However, they may overlook potential risks associated with business logic flaws specific to an organization's unique application workflow. Protecting against such attacks requires a deeper understanding of the underlying business processes and implementing tailored security measures within the API code itself.
Security
Computerworld - With AI, there’s a trust gap based on gender, age
Only 39% of survey respondents believe AI is safe and secure, down 9% from the November 2022 poll, and 78% worry AI can be used maliciously. The poll indicates more work needs to be done on AI assurance and government regulation.
Artificial Intelligence
NetworkComputing - The Evolution of NaaS APIs and What it Means for the Enterprise
Work on standards-based APIs has been underway for several years. For one, there is the work of the TM Forum, a group of 800+ global companies “working together to break down technology and cultural barriers between digital service providers, technology suppliers, consultancies, and systems integrators.” The organization has created toolkits and frameworks, including Open APIs, used by many cloud service providers. In 2020, the group developed a NaaS API component suite to support functions and capabilities responsible for the complete lifecycle of services.
Network Management
The Hacker News - Researcher Reveals New Techniques to Bypass Cloudflare's Firewall and DDoS Protection
The problem, per the Austrian consulting firm, is the result of shared infrastructure available to all tenants within Cloudflare, regardless of whether they are legitimate or otherwise, thereby making it easy for malicious actors to abuse the implicit trust associated with service and defeat the guardrails.
Security
Computerworld - Microsoft’s Nadella: Google could lock up AI-enabled search
Nadella argued that it’s almost impossible to compete with Google, given the search leader’s massive competitive edge in collecting and analyzing user data. He also warned that Google, with its vast profits and lock on the search market, stands poised to extend its monopoly power in a new era where artificial intelligence technologies will turbocharge the search business.
Automation & Productivity
InformationWeek - Water Scarcity Creates New Business Risks
It’s remarkably easy to underestimate the severity of the problem because many companies haven’t yet encountered severe water shortages. Yet the United Nations predicts a 40% global shortfall in water supply by 2030, based on current water trends, including consumption, economic activity, and population trends.
Sustainability
sdxCentral - Multicloud brings both opportunity and complexity — how to strike a balance
Multicloud presents DevOps teams with a wider variety of tools, platforms and Kubernetes container orchestration strategies to learn. Added complexity of multicloud native development augers use of automated deployments. Moreover, moving programmed workloads from corporate data centers to single or multiple clouds likely requires refactoring of existing code.  Software architects may argue that moving an application to multiple clouds is a fool’s errand.
Cloud
InformationWeek - How to Gain Control Over Shadow Analytics
Shadow analytics is kind of like doing your own home electrical wiring. “You might make [shadow analytics] work, but you risk burning down the building with ungoverned data handling that runs afoul of privacy and risk regulations that could lead to fines and hits to brand reputation,”
Data & Analytics
NetworkComputing - AI Will Soon Transform Network Management and Monitoring
From a network standpoint, AI can be used to input network traffic and telemetry data from switching and routing hardware. Baselines are then formed based on network traffic and health patterns that can then be used to identify, alert, and potentially alter network component configurations to optimize traffic flows or to identify and remediate potential security intrusions.
Network Management
The Hacker News - Protecting your IT infrastructure with Security Configuration Assessment (SCA)
SCA is performed by checking the configurations of your IT assets against known benchmarks such as the Center for Internet Security (CIS) benchmark and compliance standards such as NIST, GDPR, and HIPPA. Regulatory standards provide a global benchmark for best practices to help organizations enhance their IT hygiene and improve customer trust. The CIS benchmark provides a guideline for best practices for security configuration and has recommendations for various vendor products.
Security
SiliconANGLE - Report: Over half of phishing emails now use obfuscation tactics to avoid detection 
HTML smuggling is a practice whereby hackers distribute malware in a dormant form to make it more difficult to detect. Rather than sending a malicious program, hackers send the program’s raw source code as part of a seemingly legitimate HTML page. The code only turns into malware after clearing the corporate network and arriving on the recipient’s computer, which makes it more difficult to spot for network-based cybersecurity tools.
Security
sdxCentral - Google, Azure and AWS battle for the hyperscale data center market
According to Synergy Research Group, the top three cloud providers account for 65% of the worldwide market. At the end of the first quarter of 2023, that meant 32% for AWS, 23% for Microsoft Azure and 10% for Google Cloud Platform (GCP). The next 20 providers have only carved out a combined 26% slice of the pie. Of those, the ones with the highest growth rates are Oracle, Snowflake, MongoDB, Huawei and three Chinese telcos.
Data Management
VentureBeat - This week in data: How to create or destroy value with generative AI
Improving and destroying productivity with gen AI: In the BCG study, 90% of participants improved their performance when using gen AI for creative product innovation, and in fact converged on a level of performance that was 40% higher than that of those working on the same task without gen AI. However, when participants used the technology for business problem solving, they performed 23% worse than those doing the task without GPT-4.
Artificial Intelligence
SiliconANGLE - The rise and fall of Clearview.AI and the evolution of facial recognition 
Clearview wasn’t the only tech firm to develop facial recognition software: Google, Facebook, Microsoft, IBM, Apple and Amazon all had various projects tAuthor Logohat they either developed internally or purchased — Google with Pittsburgh Pattern Recognition and Apple with Polar Rose, for example. In either case, these projects were eventually stopped because they were afraid to deploy them, as Hill writes.
Facial Recognition
SiliconANGLE - After 10 years of crypto scammers, there’s still a rocky road ahead 
Since Ulbricht’s arrest, it has been a turbulent decade for cryptocurrencies. Values have fluctuated: For example, bitcoin rose from about $300 10 years ago to a high of $61,000 in the fall of 2021 and is now trading at $30,000. There are also tens of thousands of different cryptocurrencies, which have become the equivalent of penny stocks in terms of both value and risk.
Blockchain
Network World - Data storage archive options: Batch, real-time and hierarchical storage management
HSM-style archives typically relocate data based on age or the last access timestamp. As data migrates from the filesystem to the archive, it often leaves behind pointers or stubs in the source system, facilitating automated retrieval when required. Some systems, however, opt for a robust search engine instead of stubs. This approach enhances cross-system compatibility but occasionally falls short when users remember where they stored data but not its content, making searches less effective.
Data Storage
Mind Matters - CONFUSING CORRELATION WITH CAUSATION
Artificial intelligence (AI) algorithms are terrific at discovering statistical correlations but terrible at distinguishing between correlation and causation. A computer algorithm might find a correlation between how often a person has been in an automobile accident and the words they post on Facebook, being a good software engineer and visiting certain websites, and making loan payments on time and keeping one’s phone fully charged. However, computer algorithms do not know what any of these things are and consequently have no way of determining whether these are causal relationships (and therefore useful predictors) or fleeting coincidences (that are useless predictors).
Artificial Intelligence
InformationWeek - The Big Threat to AI: Looming Disruptions
There’s plenty of worry about AI threatening mankind. But it’s AI that’s most under threat at the moment -- starting with problems in the semiconductor supply chain. That can be disastrous given the rapid upswing in AI adoption. AI requires “not just one chip and a few components, but rather hundreds of components to build the servers that can perform AI Large-Language Models and other training and inference,”
Artificial Intelligence
AiThority - Social Media Platforms’ New Competitive Advantage is Text
Despite Threads’ attempt to expand its text-based capabilities, the focus on individuality and limitations in searching content make it challenging for Threads users to find like-minded individuals or communities that align with their interests. Its identity remains rooted in visuals, and it’s this visual-centric approach that sets it apart and makes it unlikely to supplant X.
Social Media
VentureBeat - AI assistants boost productivity but paradoxically risk human deskilling
Another significant finding is that AI acts as a skill-leveler. The consultants who scored the worst at the start of the experiment had the biggest jump in their performance (43%) when they used AI. The top consultants still got a boost, but less of one. This suggests AI can help to elevate lower performers closer to the level of top performers.
Automation & Productivity
AiThority - Unlocking Game-Changing Cybersecurity With Open XDR
Gartner recently released their Market Guide for Extended Detection and Response report. The report’s Market Description section states that “XDR can improve Security Operations staff productivity by converting a large stream of alerts into a condensed number of incidents that can be manually investigated efficiently,” and by “reducing training and skills needed to complete operational tasks by providing a common management and workflow experience across security products.”
Security
SiliconANGLE - With the ‘summer of data’ in the rear-view mirror, here are the key takeaways to remember 
With an eye on approaching this challenge, various technological advancements have rolled out in 2023, including a necessity for data storage innovation. Next-generation storage solutions are estimated to be valued at more than $150 billion by 2032, according to a recent study from Global Market Insights Inc.
Data Management
InformationWeek - California’s Delete Act: What, CIOs, CDOs, Businesses Need to Know
The Delete Act would fall under the California Privacy Rights Act (CPRA) and California Data Broker Law and is targeted specifically at data brokers, providing a robust set of guidelines and a registry for such data-collecting businesses. The law would give consumers power to delete information from every data broker registered in the state through a single verifiable request.  
Data Privacy
AiThority - What’s Required to Exploit Generative AI Responsibly?
We know that the data volumes generative AI applications require will increase dramatically. Planning now for this increase in data, both from within the enterprise and from external sources, is vital. Enterprises should start to catalog the data they’ll need to provide to the large language models (LLM) but also ground the LLM responses and condition the questions in facts and truths.
Artificial Intelligence
VentureBeat - How AI can be a ‘multivitamin supplement’ for many industries
Instead of taking the route of eliminating jobs, companies should focus on leveraging AI-human synergy to boost entrepreneurship and business growth. This path leads to job creation, more security for — and loyalty from — existing employees and a better overall job market. Working together with AI means laborers have jobs that are easier and more plentiful, freeing businesses to grow, expand and experiment without worrying about their bottom line as much.
Artificial Intelligence
AiThority - How AI Black Box Models Are Impacting Advertising Returns
The term “AI black box” refers to the inherent opacity or lack of transparency in certain advanced machine-learning models. While these models can make highly accurate predictions, understanding the specific reasons behind those predictions can be challenging. For marketers, this problem applies across all AI and machine learning-driven advertising platforms – whether originating from Google, the Trade Desk, Yahoo, or numerous others — where they remain at the mercy of the all-mighty algorithm.
Marketing Tech
SiliconANGLE - Cisco-Splunk under the microscope: Joint customers weigh in 
OK, let’s get into the customer analysis. First let’s look at the overlap of Splunk accounts in Cisco accounts over time. One of the features of the ETR data set is we can, in real time, create cuts like the one above. It shows a time series of the presence of Splunk accounts inside Cisco accounts. The most recent ETR survey includes 665 Cisco accounts within two sectors: 1) information security; and 2) analytics/business intelligence/big data. As you can see, the overlap is significant.
Network Management
InformationWeek - Analytics and Emotion: An Evolution in Business Intelligence
Essentially, ineffective analytics actively clouds judgement instead of clarifying complex decisions. Users are left confused, lacking the clarity and confidence needed to make data-driven business choices. This widespread dissatisfaction signals an enormously missed opportunity for the majority of SaaS companies today.
Data & Analytics
NetworkWorld - IDC: SD-WAN adoption gets a boost from cloud connectivity requirements, SASE appeal
A second trend is the evolution toward secure access service edge (SASE) architectures that combines SD-WAN and cloud-based network edge security-as-a-service (NESaaS) tools, such as a secure web gateway (SWG), cloud access security broker (CASB), and zero trust network access (ZTNA), according to Butler. “SD-WAN customers can work with their existing SD-WAN vendor to consume NESaaS and build a SASE architecture or use a multivendor approach,” he said
Network Management
The Verge - The synthetic social network is coming
You can imagine the next steps here. A bot that gets to know your quirks; remembers your life history; offers you coaching or tutoring or therapy; entertains you in whichever way you prefer. A synthetic companion not unlike the real people you encounter during the day, only smarter, more patient, more empathetic, more available.
Artificial Intelligence
FedScoop - OSTP director teases upcoming AI executive order as measure to mitigate risks, ‘seize huge opportunities’ 
“I think the one thing that we are all very clear on is none of us wants to live in a future that’s shaped by technologies that have been driven by authoritarian regimes and that’s why we are at a moment where American leadership in the world requires American leadership in AI and that is what is behind everything that you will see.”
Artificial Intelligence
InformationWeek - What Certifications Won’t Teach You About Working in Tech
Many IT certifications focus on theoretical concepts and knowledge domains related to the field of study. However, real IT work involves the practical application of knowledge with the ability to solve problems in real time. Gaining hands-on experience in real-world scenarios is something that most IT certifications do not provide, and this knowledge is critical for those looking to switch to IT roles
Training & Certs
NetworkComputing - How SASE Can Help Enterprises with Network Expansion and Protection
Fast forward to what’s happening with SASE, that ease-of-deployment and auto-provisioning is extending to the security and endpoint side. “On the security side, the user/SASE security policy is now starting to be attached to the network provisioning workflows, which gets us one step closer to secure networks out of the box,”
Network Management
sdxCentral- Behind the SASE sizzle: Identifying the value of the network security architecture
Complexity is a major factor to consider when looking at SASE solutions. “We see complexity rooted in a hardware-centric network security model,” Anderson said. However, he added that the complexity has expanded into a software-as-a-service model. “The average organization has over 76 discrete tools today that they’re using to protect users.”
Network Management
SiliconANGLE - Duplicating the charm of handwritten messages – at scale 
There’s nothing new about automated handwriting. The first autopen was patented in 1803 and descendants of that primitive early device are still widely used today for signing documents and autographs. Handwrytten started out using off-the-shelf autopens but soon realized that the results looked too much like they had been generated by a machine. It switched to robots of its own design that use machine vision to make the output look more human-like (pictured, adjacent).
Automation & Productivity
sdxCentral - A tale of two transformations: Adopting secure access service edge (SASE)
While Elevance Health is a large organization, CSCDGR, a French Catholic School district in Ontario, Canada, is not. “By their very nature, they have limited resources, nevertheless, they strive for a world class-leading approach to security,” moderator Skorupa said. “And they’ve transformed their network to enable the entire student and staff population of 6,400 users and more than 7,000 devices to securely work, teach and learn from anywhere.”
Security
NetworkComputing - The Legacy Systems Lurch
But there is risk when that reliance involves sensitive data. From the risk of accidental exposure of customer information to the risk of exfiltration of code and other trade secrets critical to the success of the business, the reality of relying on a third-party provider for AI is existential. That risk is not just from exposure of sensitive data but from not even knowing if data, once shared with the model, might be impacted by a breach.
IT Management
eWeek - Will AI Replace Me?
Given the dwindling advantages that we humans still have over machines, people who are doing something that can be easily automated are perhaps doing a job that a human shouldn’t be doing in the first place. I believe that the automation of certain jobs, which may lead to human displacement, can be beneficial if we can improve the lives of those affected.
Artificial Intelligence
Computerworld - Meta challenges ChatGPT with chatbot, OpenAI fires back with new features
Meta does have a general-purpose Llama LLM, with more than 400 billion parameters. But a white paper published with the launch of the Meta AI chatbot notes there are smaller 7 billion- and 13 billion-parameter models, among others. The fewer the parameters, the more efficient and customized an LLM can be without placing additional strains on server CPU cycles.
ChatGPT
sdxCentral - IBM: Sustainability data gap is fueled by leadership overconfidence
The research found 55% of respondents think they are ready to report scope 1 emissions, but only 42% claim to be actively measuring that category. Another 61% claim to be ready to share scope 2 emissions data, but just 44% say they are tracking scope 2. For scope 3 (the most difficult category to measure), 45% of business leaders feel ready to report data but just 38% claim to be measuring scope 3 emissions.
Sustainability
InformationWeek - The Search for Certainty When Spotting Cyberattacks
One of the often-raised concerns about quantum computing is the possibility that these powerhouse computers, in theory, would have the capacity to shatter current encryption and other security measures used today, even those deployed by governments. “I guess there should be a mad scramble out there for governments and businesses to take all the data that they have and put it into a safe place,
Security
sdxCentral - Carpet-bombing and DNS water torture DDoS attacks on the rise
He noted that in the past most attacks would target one IP address (i.e., the host), but as time has passed, adversaries have realized that defenders are doing host-based monitoring and looking for high bandwidth/throughput destined for those hosts. The attackers have figured out that instead of targeting one host with a lot of traffic, they can target 100 IP addresses with the same amount of traffic spread across all hosts.
Security
VentureBeat - Why a DevOps approach is crucial to securing containers and Kubernetes
By 2027, 90% of global organizations will be running containerized applications in production — an Olympic-sized jump from less than 40% in 2021. Containers are far more lightweight than virtual machines (VMs), letting developers virtualize at the operating system (OS) level, while orchestrators like Kubernetes run containers at scale. Software can be developed and deployed faster and more efficiently, at greater scale, but they also offer brand new challenges in every step of the development cycle.
Security
InformationWeek - Accenture Report: Cloud and Edge Can Foster Reinvention with AI
There might be pressure to accelerate edge adoption as the world rushes to embrace the capabilities of AI. The report indicates that 98% of executives around the world expect AI foundation models to be important to their organizations’ strategies in the coming three to five years. Edge may be a factor in those strategies because, as the report states, it enables real- or near-real-time data analysis, which can simplify training AI models and improve the performance of AI-driven apps.
Artificial Intelligence
VentureBeat - E-commerce fraud to cost $48 billion globally this year as attacks skyrocket, report says
Telesign’s latest Trust Index shows why CIOs, CISOs, and their teams must first see e-commerce fraud prevention as a core business challenge and consider how AI-based techniques can help. Customer trust is on the line. Sift’s Q3 2023 Digital Trust & Safety Index amplifies Telesign’s Trust Index findings, identifying a 36% increase in online payment fraud in early 2023 driven partly by an epidemic of Account Takeover (ATO) attacks. Sift’s Index found that ATO attacks jumped 354% year-over-year in Q2 2023 across Sift’s global network after reaching a 169% increase year-over-year in 2022.
Privacy & Security
Computerworld - Don’t expect much from Copilot for Windows (yet)
Copilot also doesn’t give Windows any new capabilities. Instead, it makes it easier to use existing features. With Copilot you can accomplish basic tasks without having to drill down through multiple menus or Settings pages. Just type in what you want to do, and Copilot does it for you — in theory, at least. At this point, it’s primarily a way to make it simpler to tweak, customize, and get at Windows features more easily.
Automation & Productivity
TechRepublic - What Is Data Literacy and Why Is It Important?
Data literacy enables everyone in the organization to ask the right questions, gather the right data and connect the right data points to derive meaningful and actionable business insights. It even ensures employees understand how to manage and use data in ways that are ethical and compliant.
Data & Analytics
eWeek - How AI Will Change and Not Change Your Business
As with any disruptive technology, embracing AI comes with challenges. Organizations must address concerns about data privacy, ethics, and the impact on the workforce. They must invest in robust data governance and security frameworks, as well as ensure the transparency and accountability in AI systems, and re-skill or up-skill employees to work alongside AI technologies. Change management becomes crucial to successfully integrate AI into the organization’s fabric.
Artificial Intelligence
SiliconANGLE - Security threats of AI large language models are mounting, spurring efforts to fix them 
The No. 1 threat has to do with attackers manipulating prompts, causing the model to do something malicious even if an LLM has certain guardrails. These could vary “from solicitation of sensitive information to influencing critical decision-making processes under the guise of normal operation,” according to OWASP.
Security
VentureBeat - Google Bard fails to deliver on its promise — even after latest updates
In the week since I reported the announcement, I’ve had a chance to play around with the new offering. Unfortunately, in practice, I find Bard to be a disappointment on many levels. It fails to deliver on its core promise of integrating well with Google apps, and often produces inaccurate or nonsensical responses. It also lacks the creativity and versatility of OpenAI’s GPT-4 (It also has no personality or sense of humor, although some users might not take issue with that). Bard badly falls short of expectations.
Automation & Productivity
NetworkComputing - Overcoming Cybersecurity Overwhelm: How to Take Charge of Limitless Cloud Data
Modern security teams are being stretched to the limit. More organizations are embracing the digital age and taking their operations to the cloud. It is currently estimated that a massive 1.145 trillion MB of data is created per day. The scale of this growth opens up new opportunities but also introduces more risk.
Security
VentureBeat - As AI-enabled fraudster bots wreak havoc, security teams turn to AI data defense strategies
The 2023 Imperva Bad Bot report found that bad bots make up a whopping 30% of automated traffic, with evasive bad bots accounting for 66.6% of all bad bot traffic. Meanwhile, automated attacks targeting APIs are on the rise. To no one’s shock, generative AI has been a significant driver of more sophisticated attacks – fraudsters are out there using ChatGPT to write code for their bots. And the bots are out there hoovering up personal and business data, stealing accounts and tallying up billions of dollars in damages for targeted companies across industries.
Security
NetworkWorld - DNS security poses problems for enterprise IT
The top response (28% of all respondents) is DNS hijacking. Also known as DNS redirection, this process involves intercepting DNS queries from client devices so that connection attempts go to the wrong IP address. Hackers often achieve this buy infecting clients with malware so that queries go to a rogue DNS server, or they hack a legitimate DNS server and hijacks queries as more massive scale
Security
VentureBeat - LLMs are surprisingly great at compressing images and audio, DeepMind researchers find
Their experiments demonstrate that, with slight modifications, LLMs can compress information as effectively, and in some cases, even better than widely used compression algorithms. This viewpoint provides novel insights into developing and evaluating LLMs.
Automation & Productivity
DarkReading - 4 Pillars for Building a Responsible Cybersecurity Disclosure Program
Software vendors have come to appreciate the value of crowdsourced penetration testing. Many have created incentives to reward users and threat researchers for finding and reporting vulnerabilities. However, even as these bug bounty programs grow in prevalence, challenges persist to make the process streamlined, transparent, and beneficial for all parties. The vast number of vulnerability reports also highlights the need for a structured and responsible approach to manage, address, and rectify these vulnerabilities.
Security
VentureBeat - AI needs human insight to reach its full potential against cyberattacks
Case in point: A human in the loop recently stopped a breach of one of the fastest-growing municipalities in the southwestern U.S. after attackers obtained administrative-level privileged access credentials and attempted to breach the city’s infrastructure.
Security
InformationWeek - How to Future-Proof Your IT Organization
Fostering an innovative culture, investing in technology and talent, and forming strategic partnerships are all important steps necessary to prepare teams for technology change, Healy advises. “IT leaders should actively seek out emerging trends and continuously adapt to the evolving technology landscape to ensure their organization remains competitive and innovative.”
IT Management
NetworkComputing - Creating a Network Budget Strategy
If doing this sounds like a "no-brainer," it isn't. Too often, the applications group plans or gets notified about new projects, but other IT areas, like networking, get left out of the communication. This later impacts budgets and creates budget exceptions because no one in networking had an early “heads-up” that would have alerted them to the need to budget.
Network Management
VentureBeat - Enterprise workers gain 40 percent performance boost from GPT-4, Harvard study finds
“The fact that we could boost the performance of these highly paid, highly skilled consultants, from top, elite MBA institutions, doing tasks that are very related to their every day tasks, on average 40 percent, I would say that’s really impressive,”
Automation & Productivity
InformationWeek - 5 Big Cloud Security Deals Shaping the Industry in 2023
The cloud security market is booming. The global cloud security market size stood at $29.26 billion in 2021 and is expected to reach an eye-popping $106.02 billion by 2029 -- an annualized growth rate of 18.1%, according to research from Fortune Business Insights. A 2023 Thales Group cloud security study found that 39% of business experienced a cloud-based breach in 2022. And 89% of survey respondents said 40% of the data stored by their companies is considered sensitive.
Cloud Security
VentureBeat - The top U.S. cities for AI-driven job hunters
These six AI hotspots have been identified by the Brookings Institution, which also found that San Francisco is home to 20 of the best-funded AI companies, a figure that’s more than the rest of the U.S. combined.
Tech Jobs
sdxCentral - What Cisco’s Splunk acquisition means for cybersecurity-observability convergence
Siegfried envisions the full-stack observability data lake could become the foundational platform moving forward. The platform would potentially integrate the front end of both Splunk’s SIEM and observability capabilities, ultimately becoming a replacement for AppDynamics.
Security
SiliconANGLE - Internet’s rapid growth faces challenges amid rising denial-of-service attacks 
The Netscout DDoS Threat Intelligence Report found that since the first week of 2023, there was a 55% increase in daily carpet-bombing attacks — distributed denial-of-service attacks targeting a range of addresses or subnets — from an average of 468 a day to 724 a day.
Security
InformationWeek - Accenture Report: Cloud and Edge Can Foster Reinvention with AI
The report indicates that 98% of executives around the world expect AI foundation models to be important to their organizations’ strategies in the coming three to five years. Edge may be a factor in those strategies because, as the report states, it enables real- or near-real-time data analysis, which can simplify training AI models and improve the performance of AI-driven apps.
Automation & Productivity
SiliconANGLE - Uber for everyone: Bob Muglia on how the future of data apps will evolve 
The premise is that increasingly, organizations are going to want a digital representation of their business with incoming data informing the state of that business and then taking actions in real time. We’re envisioning Uber-like data apps that every company can access via commercial and open-source software. In our view, this represents the evolution of data apps for the masses – those that don’t have 2,000 Uber software engineers at their disposal.
Data & Analytics
VentureBeat - The AI ‘Age of Uncertainty’
The next generation of LLMs will be more sophisticated and more generalized than the current crop that includes GPT-4 (OpenAI), PaLM 2 (Google), LLaMA (Meta) and Claude 2 (Anthropic). It’s likely that there will also be a new and possibly very capable model entrant from xAI, Elon Musk’s new start-up. Capabilities like reasoning, common sense and judgment remain big challenges for these models.
Artificial Intelligence
The Hacker News - Are You Willing to Pay the High Cost of Compromised Credentials?
Attackers use automated tools to test the stolen credentials on numerous sites. To increase their chances of success while reducing the risk of detection, attackers utilize readily available tools that help them match passwords with specific websites. This can be especially easy if the password already contains the name of the website or application.
Security
InformationWeek - Q&A: How one CSO secured his environment from generative AI risks
Through genAI, many of Navan’s 2,500 employees have been able to eliminate redundant tasks and create code far faster than if they’d generated it from scratch. However, genAI tools are not without security and regulatory risks. For example, 11% of data employees paste into ChatGPT is confidential, according to a report from cyber security provider CyberHaven.
Artificial Intelligence
CIODIVE - Innovation spend failing to yield ROI, execs say
Leaders say workplace and cultural issues block enterprise transformation, with collaboration rifts, a skills gap and a risk-averse culture as chief contributors to the problem.
Automation & Productivity
VentureBeat - If you wouldn’t take advice from a parrot, don’t listen to ChatGPT: Putting the tool to the test
The data ChatGPT is trained from, called the Common Crawl, is about as good as it gets when it comes to training data. Yet we never actually know why or how the bot comes to certain answers. And if it’s generating inaccurate information, it will say so confidently; it doesn’t know it’s wrong. Even with deliberate and verbose prompts and premises, it can output both correct and incorrect information.
ChatGPT
CIODIVE - Top engineering chiefs hire software generalists, full-stack engineers
Software engineers are so valuable to an organization that 55% of engineering leaders in 2023 say a strong engineer is worth at least three times their total compensation, according to the report. That statistic is up 10 percentage points since 2020.
Tech Jobs
Computerworld - Could Superhuman be your email savior?
A company called Superhuman claims to have cracked the code. Superhuman has technically been around in some form for almost a decade, but you'd be forgiven for failing to notice — or maybe even for reading about it at some point and immediately writing it off. Up until recently, after all, it was available only on an invite and waitlist basis, and it lacked full cross-platform support.
Automation & Productivity
CIODIVE - Cloud attainable for SMBs as costs come down
Through cloud adoption, SMBs in the healthcare, education and agriculture segments will unlock nearly $80 billion in annual productivity gains in the U.S. and $161 billion globally by 2030, the analysis found.
Cloud
Blocks & Files - Allocating AI and other pieces of your workload placement puzzle
AI workloads comprise two main components – inferencing and training. IT departments can run AI algorithm development and training, which are performance intensive, on premises, IDC says. And the data is trending that way, as 55 percent of IT decision makers Dell surveyed cited performance as the main reason for running GenAI workloads on premises. Conversely, less intensive inferencing tasks can be run in a distributed fashion at edge locations, in public cloud environments or on premises.
Artificial Intelligence
eWeek - How Cisco is Addressing the Widening Skills Gap
Cisco’s approach is multifaceted. The company works with education partners, including its learning partner ecosystem and academies. Notably, in the U.S., Cisco’s outreach extends to an impressive 45 percent of community colleges. There’s also a direct-to-learner model, allowing individuals to engage with and access their resources.
Tech Jobs
NetworkComputing - Empowering Enterprise IT: The Transformative Power of Network-as-a-Service (NaaS)
NaaS offers a compelling alternative. It brings together a comprehensive suite of on-demand managed network services, application assurance, cybersecurity, and multi-cloud-based, all seamlessly orchestrated through automated networks without any capital investment.
Network Management
eWeek - Why Cloud Will Remain Dominant: 4 Reasons
In fact, going forward, generative AI will be a major factor that drives many organization’s tech stack purchase decisions. Whether in the public or private cloud, generative AI is supported by large language models (LLMs) which process data in real time, requiring powerful – and highly scalable – computing power.  When you combine this point with the fact that the best AI solutions are now offered primarily as cloud services, organizations are more motivated than ever to accelerate their transition to the cloud
Cloud
eWeek - 50 Generative AI Startups to Watch in 2023
Larger tech companies like Google, Microsoft, and AWS are working hard to build up their generative AI technologies as well, but many of these tech giants are having trouble keeping up with the agile gen AI startups that are willing to take risks in order to establish their AI niches.
Artificial Intelligence
VentureBeat - How much energy does AI use compared to humans? Surprising study ignites controversy
“I would like to be able to live within the scope of what the environment of the Earth can support,” he said. “Maybe use [AI] as a creative medium without doing a terrible amount of harm… but if it’s doing a lot of harm, I will stop doing AI work.”
Sustainability
AiThority - Enterprises Exploring GenAI with Sense of Urgency, Caution, ISG Study Finds
“However, despite the top-down imperative to embrace generative AI, most enterprises lack the focus to identify the right use cases. Right now, the market is being driven by specialist providers that are actively engaging with enterprises to brainstorm and co-create innovative solutions.”
Artificial Intelligence
VentureBeat - Why Cradlepoint’s acquisition of Ericom predicts the future of SASE in the enterprise
Gartner defines SASE as delivering “converged network and security-as-a-service capabilities, including SD-WAN, secure web gateway (SWG), cloud access security broker (CASB), next generation firewall (NGFW) and zero trust network access (ZTNA). SASE supports branch offices, remote workers, and on-premises secure access use cases.”
Security
The Hacker News - The Rise of the Malicious App
These applications add nothing of value to the hub app. They are designed to connect to a SaaS application and perform unauthorized activities with the data contained within. When these apps connect to the core SaaS stack, they request certain scopes and permissions. These permissions then allow the app the ability to read, update, create, and delete content.
Security
Cybernews - How a $2.4 trillion corporation fails so badly, so often
Microsoft itself warned that China was likely to be stockpiling zero-day vulnerabilities last year. Fast forward to July 12th this year, and Chinese hackers, dubbed Storm-0558, stormed Microsoft with acquired digital encryption keys, taking advantage of “a validation error in Microsoft code.” Hackers gained access to inboxes belonging to 25 organizations, including US government agencies, to steal the emails for intelligence gathering.
Security
InformationWeek - What Are the Biggest Lessons from the MGM Ransomware Attack?
Dikbiyik also notes that ransomware groups’ more nuanced selection of targets is an indication of increased professionalism. “These groups are doing their homework. They have resources. They acquire intelligence tools…they try to learn their targets,” he says.
Security
Computerworld - Generative AI and US copyright law are on a collision course
The answer, for the moment, is that nobody owns the copyright on AI-generated works, because nobody can. The US Copyright Office has taken the position that human authorship is required for copyright to exist on a work, and that no such authorship exists in the case of AI-created writing or images — neither the creator of the AI nor the provider of the prompt used to generate a particular work “owns” that output.
Artificial Intelligence
sdxCentral - What is artificial intelligence (AI)? Its applications, architecture and future
Most of today’s advanced AI models are self-learning, meaning that they have the ability to iteratively improve on themselves through feedback loops. Others that are only just evolving have the ability to generate text, audio, video, code — even music and art thought previously to be solely the domain of humans. This is known as generative AI (genAI).
Artificial Intelligence
SiliconANGLE - Cloud giants and ambitious startups alike expand the AI narrative 
Systrom said today that Artifact is using large language models to understand text and personalize content for its audience, while leveraging AI to find links that will meet user needs for reliable information. “Distribution of content via AI feels like the future to me,” Systrom said.
Artificial Intelligence
InformationWeek - Dialing Down AI Risks While Getting Smarter About Its Uses
“Organizations are suddenly waking up to the fact that serious AI risks exist, and legacy controls don’t suffice. It’s important to implement new controls for a new attack vector.”
Artificial Intelligence
sdxCentral - Data center rack density: How high can it go?
Uptime Institute numbers from just over a decade ago put the average power densities per rack in the 4–5 kW range. By 2020, that was up to 8–10 kW per rack. Note, though, that two-thirds of U.S. data centers surveyed said that they were already experiencing peak demands in the 16–20 kW per rack range. The latest numbers from 2022 show 10% of data centers reporting rack densities of 20–29 kW per rack, 7% at 30–39 kW per rack, 3% at 40–49 kW per rack and 5% at 50 kW or greater.
Data Management
SiliconANGLE - Comparitech report details alarming rise in cyberattacks targeting the education sector 
In the 561 attacks since 2018, more than 6.7 million individual records were breached. Schools, those serving students up to age 16, were the most targeted in recent years and also accounted for the most records stolen. Ransom demands made to educational institutions varied between $1,000 and a staggering $40 million, with hackers on average demanding $1.5 million.
Security
Network World - How network security can save security dollars
External threats, meaning hacking, are a problem for every CIO. Internal threats, from badly behaving employees, are a problem for three out of four. Data theft is a universal fear, and malware that interferes with applications and operations is an important problem for over 90% of CIOs. As far as approaches or targets are concerned, 100% say access security on applications and data is essential and so is regular malware scanning. If you ask CIOs to pick a single thing they think is essential for IT security, it’s access security.
Security
InformationWeek - Weighing the AI Threat By Incident Reports

The AI Incident Database chronicles over 2,000 incidents of AI causing harm. It’s a gulp-worthy number that ominously continues to grow. But the devil is in the details and a mere count does not provide sufficient detail in degrees of harm or malevolent intent. Pretending AI is safe is sheer folly but imagining it the bringer of doom is equally foolish. To get a more realistic read on the damage AI has caused and is likely to cause, here’s a hard look at reported incidents in the real world.

Artificial Intelligence
VentureBeat - Intel CTO highlights open and secure advances for AI deployment
“AI can and should be accessible to everyone to deploy responsibly. If developers are limited in their choice of hardware and software, the range of use cases for global-scale AI adoption will be constrained and likely limited in the societal value they are capable of delivering.”
Artificial Intelligence
SiliconANGLE - Employers take note: HP study finds the business-employee relationship is broken 
 “It’s a fundamental shift in expectations. What are the big drivers of a healthy relationship with work? It boils down to fulfillment, leadership, people-centricity, skills, tools and workspace.”
Automation & Productivity
InformationWeek - Microsoft’s 38TB Leak: How IT Leaders Should Respond
“In addition to the overly permissive access scope, the token was also misconfigured to allow ‘full control’ permissions instead of read-only. Meaning, not only could an attacker view all the files in the storage account, but they could delete and overwrite existing files as well,”
Security
Blocks & Files - HYCU CEO wrote the book on SaaS data apocalypse
His text argues that there is a shared responsibility model between SaaS app suppliers and their customers. The vendors look after the security of their infrastructure and the customers look after the security of their data – or should, because Taylor claims they mostly don’t.
Security
SiliconANGLE - Research warns email rules are being weaponized by cyberattackers 
The research details how once an attacker has access to an account, they can use email rules to hide inbound emails like security alerts or cover their tracks from the owner of the account. Using email rules, an attacker can conceal activities, exfiltrate data by setting rules to forward emails containing specific keywords to external addresses and undertake business email compromise attacks by impersonating senior executives.
Security
Network World - Network observability tools promise benefits, but obstacles hinder results
Observability tools aim to fill those gaps. They are an evolution from performance monitoring technologies that provide IT with data on how various components of their networks are performing. The difference is greater visibility and enhanced analytics that go beyond internal networks and extend to everywhere between end-user devices and service provider environments
Network Management
VentureBeat - Why security and DevOps need to join forces to safeguard containerized environments
Many DevOps engineers leverage infrastructure-as-code (IAC), which means writing the machine learning code that automates things like deployment, monitoring load, autoscaling, exposing ports and more. And this same code can be used to deploy across any number of environments. Security scanning IAC artifacts in the development pipeline, looking for problematic configurations is key — they can be caught and blocked before they’re ever deployed.
IT Management
Computerworld - Experts: 'Quiet cutting' employees makes no sense, and it's costly
As with last year's 'quiet quitting' trend, quiet cutting appears to be a concept originally coined in the media — in this case, by The New York Times. The practice involves reassigning workers to roles that don’t align with their career goals to achieve workforce reduction by voluntary attrition — allowing companies to avoid paying costly severance packages or unemployment benefits.
HR Management
VentureBeat - Why CISOs need zero trust as a ransomware shield
Zero trust security needs to be a mindset that pervades everything from consolidating tech stacks to managing identities at scale. CISOs and their teams must start with the assumption that a breach has already happened, and an organization’s network needs to be designed to limit an intrusion’s blast radius and depth.
Security
AiThority - “What Will Happen to All the Horses?” – Surviving the Coming AI Revolution
The influence AI will have on our daily lives, decision-making processes, and cultural values will also be profound. As these models become more integrated into our lives, they will shape our perceptions, sometimes without us even realizing it’s happening. In fact, it’s already happening as illustrated by the wildfire-like way that misinformation spreads via social media and other internet-powered routes.
Artificial Intelligence
NetworkComputing - The Hidden Costs of Legacy Technology
According to a report from Dell, more than 70% of software used by Fortune 5000 companies was developed 20 or more years ago. Many of these large enterprises are specifically concerned about the immediate financial and temporal costs of transitioning to a new digital architecture, and so continue to utilize their existing systems instead.
IT Management
VentureBeat - Cyber resilience through consolidation part 2: Resisting modern attacks
AI isn’t only being used to mimic human speech, however; it is automating cyberattacks. Attackers can utilize the technology to automate attacks and analyze their own malicious programs to make them more effective. They can also use these programs to monitor and change malware signatures, ultimately skirting detection. There are automated scripts to create and send phishing emails and to check stolen data for user credentials.
Security
VentureBeat - Cyber resilience through consolidation part 1: The easiest computer to hack
These malicious links direct to a well-designed website impersonating another known site and tricking users into giving up credentials or opening unknown attachments that may contain malware. These emails are usually not very sophisticated, but social engineering can be quite convincing, with up to 98% of cyberattacks carried out via social engineering tactics.
Security
Network World - IoT startups fill security gaps
In May, a mother who runs a large TikTok account discovered that an attacker had breached the family’s connected baby monitor and spoken to her children late at night.
Security
SiliconANGLE - How APIs And generative AI supercharge each other 
What should we expect? Plan for scale at a whole new level: More developers, researchers and companies involved. More complex programs and automation. More data moving around. More need than ever for API management systems with more visibility, operability, security and ease of use, at scale, and for people across the value chain.
Automation & Productivity
Computerworld - How companies are putting embedded genAI to good use
But according to Forrester, standalone genAI tools — like ChatGPT — can’t support cross-functional collaboration and don’t work where employees work. “That means that for many use cases, genAI will be more beneficial as an embedded functionality than as a standalone app,”
Automation & Productivity
Network World - IBM X-Force: Use of compromised credentials darkens cloud security picture
“In particular, there was a high frequency of service account credentials stored on endpoints, and many were over-privileged. Excessively privileged users can be defined as those who have more permissions than they need to do their job or task,”
Security
InformationWeek - Do’s and Don’ts of GenAI Spend
The underlying technology in GenAI is evolving rapidly. For example, many projects delivered outstanding results with the initial release of GPT-4. But, as more users started using the system and the response time became too long, OpenAI seemed to adjust the algorithms such that they run faster (and at lower cost to OpenAI) but deliver much worse results. As a result, pilot projects that had been successful started running into trouble and companies had to redo the work on the projects with other models.
Artificial Intelligence
VentureBeat - Riding the AI tsunami: The next wave of generative intelligence
While he warns about potential risks posed by AI — especially in combination with synthetic biology — he also predicted that within five years everyone would have access to an AI personal assistant. He referred to this function as a personal chief-of-staff. In this vision, everybody will have access to an AI that knows you, is super smart, and understands your personal history.
Artificial Intelligence
SiliconANGLE - How organizations can implement a cloud center of excellence to strengthen cloud operating models 
Infrastructure and operations or I&O leaders are responsible for planning the successful execution of their organization’s cloud strategies. A cloud center of excellence, or CCOE, is an effective practice for facilitating and scaling successful cloud adoption in organizations of all sizes and types, regardless of the organization’s cloud strategy.
Cloud
sdxCentral - Startups eye new offshore markets amid IT talent shortage
LATAM’s tech talent workforce has boomed in the past five years, and average wages are about 38% of those in the U.S., the firm said. Its research shows that São Paulo, Mexico City, and Santiago are the three largest Latin American tech talent markets, and San Jose, Costa Rica, is the fastest-growing.
Tech Jobs
SiliconANGLE - Cloud security powers CrowdStrike’s momentum. Gen AI is next 
As we hear at every conference this year, gen AI will be a hot topic at Fal.Con, with the company expected to announce pricing for its Charlotte AI intelligent security operations center assistant. Charlotte is one of the first examples of gen AI specifically for security use cases and was on display at Black Hat this past August.
Security
SiliconANGLE - Deepfake cyberthreats keep rising. Here’s how to prevent them
The posting has an overview of various deepfake media threats, techniques and trends. The document cites numerous examples of how deepfakes have entered the cyber criminal’s toolkit, such as applications that “have the ability to lift a 2D image to 3D to enable the realistic generation of video based on a single image,” and fake audio clips that can be generated with just a few seconds of a genuine recording of a speaker.
Security
sdxCentral - Lack of cloud visibility, machine-speed attacks make every company a target
Per Unit 42, the cloud continues to be the dominant attack surface: The majority (80%) of medium, high or critical exposures were observed on assets hosted in the cloud, compared to those on-premise (19%). Furthermore, more than 75% of publicly accessible software development infrastructure exposures were found in the cloud.
Security
NetworkComputing - Industrial IoT Security Skills and Certifications: The Essentials 
What skills do network managers really need to properly secure industrial networks? What new protocols, frameworks, and regulations are important? And what conferences and certifications can help? Here are five tips to get started.
Network Management
InformationWeek - Leading Kubernetes Mistakes (And How to Avoid Them)
They fall into a few classes: misunderstanding how to use pods effectively, using Kubernetes in a way that makes observability difficult or impossible, getting security wrong, and using Kubernetes without automating the deployment. There are many other common mistakes and, to some extent, these all overlap and interact.
Data Management
VentureBeat - “Embrace cybersecurity automation and orchestration, but in moderation,” says my puppy
Automation refers to the use of technology to automatically perform tasks or actions that were previously done manually by humans. Orchestration, on the other hand, refers to the integration and coordination of different tools and technologies to create a unified security platform. In the case of the automatic pet feeder, automation would be the dispensing of food at scheduled times, while orchestration would be aligning feeding times with Mango’s dietary needs and ordering more food when supplies went low.
Automation & Productivity
Blocks & Files - AI: Intelligent data needs intelligent solutions
To cope with the challenges, while also searching for a competitive edge from AI, the research found 40 percent of leaders are pursuing a multi-pronged approach for mitigating risks from unstructured data in AI, encompassing storage, data management and security tools, as well as using internal task forces to oversee AI use.
Artificial Intelligence
Network World - Cisco shapes its strategy for Ethernet-based AI networks
“Customers want to know what they need to do now on the networking side to be able to run the huge clusters of GPUs they need and handle the volumes of data they create. And for most customers, it's going to be Ethernet,”
Network Management
SiliconANGLE - Remote Desktop Protocol exposures leave 85% of organizations vulnerable to attack 
Notable findings in the report include the ability for attackers to move at “machine speed,” with the ability to scan the entire IPv4 address space for vulnerable targets in minutes. Of more than 30 Common Vulnerabilities and Exposures analyzed, three were exploited within hours of public disclosure and 63% were exploited within 12 weeks of the public disclosure.
Security
eWeek - Challenges of Microsoft Teams: User Experience and Unbundling
The ability to link to a doc from SharePoint is probably not a high priority for people just trying to have a seamless meeting. But those integrations should be relatively easy to maintain. One big step the company could take in improving usability is to acquire a company like Box. One might think that Box and Microsoft OneDrive are overlapping products, but the reality is that Box improves the Microsoft user experience better than Microsoft’s own product.
Automation & Productivity
InformationWeek - Struggling to Build AI Teams? It’s Time to Focus on Skills
As in the early days of programming and the dot-com boom, businesses will need to start fresh to cultivate the skills needed to build AI-focused teams. And, just as in those days, candidates are unlikely to have learned these skills in traditional educational environments, nor are they likely to have field-specific backgrounds.
Tech Jobs
The Verge - Tech leaders want ‘balanced’ AI regulation in private Senate meeting
The New York Times reports several tech leaders remarked on the importance of regulating the technology, with OpenAI’s Altman saying he believes policymakers want “to do the right thing” and is impressed with how fast the government wants to create rules around the technology.
Artificial Intelligence
NetworkComputing - How to Stay Up and Running When the Cloud Goes Down – and Avoid Lock-ins
Relying on one provider anywhere is a risk, so it’s not just the cloud that’s the issue. To achieve genuine redundancy and more robust business continuity, organizations must focus on creating a ‘Multi-X’ strategy: multi-cloud, multi-location, and multi-provider.
Cloud
InformationWeek - Should You Feel Good About Emotion AI?
Emotion AI has multiple possible applications, particularly in customer service. “It can, for example, recognize the difference between an angry or an excited customer call, and route calls to the agent best equipped to address a caller’s concerns,” Armstrong says. The technology can also analyze comparable speech patterns to offer insights in real-time, including recommendations on how to handle a particular customer call. “It’s already used to detect insurance fraud, with AI using voice analysis to help detect whether someone calling to file a claim is lying.”
Artificial Intelligence
sdxCentral - How to make open source software more secure (highlights from SOSS)
“Open source is really a public good, and no one constituent can make it secure on their own, be it public, private sector or the community,” Omkhar Arasaratnam, general manager, at the OpenSSF, told SDxCentral. “Where we are going to continue to focus is on being that bridge between these three stakeholders to ensure that open source software continues to be secure by construction.”
Security
SiliconANGLE - Cloud-based security threats on the rise, according to new IBM X-Force data 
IBM saw a big jump in using compromised plain text cloud credentials this past year, accounting for more than a third of all reported incidents in the past year, up from 9% in the previous year. Many of these credentials were for service accounts that had additional access privileges, making them more attractive for criminals to move about a target’s network more easily
Security
InformationWeek - Forrester CEO on GenAI, ‘Death of the Web’ and ‘Technology Thunderstorms’
“We’ve rarely ever told our clients, ‘You should move forward with a technology,’ we typically tell our clients, ‘Wait, let’s let the vendor environment rationalize. Let’s let other companies make some mistakes. Let’s watch this technology as it develops. But I will tell you in the case of generative artificial intelligence, we are not giving you that advice. We are saying you must do this now,” Colony said.
Artificial Intelligence
AiThority - Five Things You Should Do to Ace your Customer Service Strategy with Artificial Intelligence
According to Salesforce’s “State of the Connected Customer Report”, nearly two-thirds (72%) of customers stay loyal to an organization that provides faster service. The same report also found a correlation between the use of AI technologies, such as Generative AI, and customer sentiments that influence behavior during sales, service, and support.
Automation & Productivity
InformationWeek - How to Minimize Multi-Cloud Complexity
“Perhaps most importantly, the knowledge needed to manage different CSPs is not easily transferrable,” he notes. “There are a lot of AWS folks or Azure folks, and many aren’t certified.” Cloud engineering is highly technical, and integrating enterprise applications across clouds is doubly so, Shirk says. “Having the right talent is extremely important.”
Cloud
SiliconANGLE - In antitrust case, Google insists its dominance of internet search is lawful 
The U.S. Justice Department has accused the Alphabet Inc.-owned company of paying more than $10 billion in annual fees to ensure that device makers such as Apple Inc., browser makers such as the Mozilla Foundation and wireless operators such as AT&T Inc. select Google Search as their default search engine. This is how Google has been able to maintain a market share of more than 90%, the Justice Department says.
Automation & Productivity
TechStartups - 25 Best SaaS Alternatives & Competitors
As of 2023, there are approximately 30,000 SaaS companies, although some estimates suggest the number could be as high as 70,000 worldwide. It’s also not surprising that a majority of these SaaS companies are based in the United States, with well-known SaaS tools like HubSpot, Salesforce, Zendesk, Zapier, Slack, Stripe, Google Analytics, Mailchimp, Asana, and Zoom currently dominating the market.
Automation & Productivity
sdxCentral - Exposed: Cybercriminals jailbreak AI chatbots, then sell as ‘custom LLMs’
SlashNext noted AI jailbreaking is still in its experimental phase, which involves exploiting weaknesses in the public chatbot’s prompting system. Users employ specialized commands or sequences of text to trick the AI into discarding its built-in safety measures and guidelines.
Security
VentureBeat - Five ways CISOs are using AI to protect their employees’ digital devices and identities
Using generative AI to automate scripts seeking unprotected endpoints, ports and infrastructure security gaps, cybercrime gangs offer bounties for targeted organizations’ employee digital device passwords and identities. As many recent identity-based breaches show, putting any trust in identities is a breach waiting to happen.
Security
FastCompany - Why Meta’s Yann LeCun isn’t buying the AI doomer narrative
 “Imagine the future when everyone uses some sort of chatbot as their main interface to the digital realm. You don’t go to Google. You don’t go to Facebook. . . . You just talk to your virtual assistant,” LeCun says. “You want that AI system to be open source and to be transparent, because there’s going to be a lot riding on it.”
Artificial Intelligence
VentureBeat - How data and automation are unlocking the future of subscription businesses
All of this requires a strong investment in data science and data engineering, to build a solid foundation, develop powerful dashboards and ensure high-quality data and data hygiene to make fast decisions, and enable internal collaboration. At Calendy, they’ve also formed a number of operating committees and steering committees to promote this common understanding and shared decision-making.
Automation & Productivity
AiThority - The Role of AI and Machine Learning in Fraud Detection
Companies now have access to AI systems that can mimic human cognition to sniff out emerging fraud like an expert investigator. These technologies are also lightning-fast, adapting on the fly to pinpoint suspicious activity across massive datasets in seconds.
Automation & Productivity
sdxCentral - Dissecting the MOVEit breach: Lessons learned from the ransomware attack
MOVEit file transfer software is used by thousands of organizations around the world. In late May, it was discovered that large amounts of data were being transferred from its deployments. Attackers were exploiting a zero-day software vulnerability — or that which is discovered by threat actors before defenders, meaning there is no known or as-yet developed patch.
Security
SiliconANGLE - The state of building modern data teams 
The driving force behind this demand is not just hype but the tangible impact of large language models or LLMs and the challenges of effectively using them — especially as LLMs become SLMs, or specialized language models, where organizations are building their own language models trained on their proprietary data, their bench strength.
Data Management
Network World - Are HDDs greener than SSDs?
The study claims manufacturing a gigabyte of flash emits 0.16 Kg of CO2 and is a significant fraction of the total carbon emission in the system. HDDs, by comparison, have an average manufacturing emission of 0.02 Kg-CO2e/GB.
Sustainability
VentureBeat - How AI agents are already simulating human civilization
The study, titled “Generative Agents: Interactive Simulacra of Human Behavior,” explores the potential of generative models in creating an AI agent architecture that remembers its interactions, reflects on the information it receives, and plans long- and short-term goals based on an ever-expanding memory stream. These AI agents are capable of simulating the behavior of a human in their daily lives, from mundane tasks to complex decision-making processes.
Artificial Intelligence
Network World - Enterprise DPU advances are spurred by AI, security, networking apps
An early entrant in that category is HPE Aruba’s CX 10000, which combines DPU technology from AMD Pensando with high-end switching capabilities. Available since early 2022, the CX 10000 is a top-of-rack, L2/3 data-center box with 3.6Tbps of switching capacity. The box eliminates the need for separate appliances to handle low latency traffic, security and load balancing, for example.
Network Management
AiThority - Why Managers Should Train More with AI Devices and Intelligent Virtual Assistants
Productive teams are increasingly turning lean with their human resources and fattening on technologies, especially automation and machine-level intelligence. Today, it’s hard to tell where the lines of interaction blur between managers and their resources – man, machine, money, and material. Yet, there exists a certain dichotomy in the ways modern businesses are adopting machine learning across all departments.
Automation & Productivity
VentureBeat - Generative AI: A pragmatic blueprint for data security
Access to these models could help employees in an organization solve business challenges. But for a variety of reasons, not everybody is in a position to access these models directly. Instead, employees often look for tools — such as browser extensions, SaaS productivity applications, Slack apps and paid APIs — that promise easy use of the models.
Artificial Intelligence
InformationWeek - Box and Adobe Talk Next-Gen Work Beyond the AI Horizon
“I think that we’re about to enter a world where digital experiences are far more personalized.” Users may be able to make one million variants of one visual asset, Belsky said, then send them out for email or social media campaigns. However, this might also lead to some brands flooding the market with AI-generated content in unsustainable ways, he said, citing companies producing 1,000 blog posts per hour just to help the brand get noticed for SEO purposes.
Automation & Productivity
VentureBeat - Move over AI, quantum computing will be the most powerful and worrying technology
Quantum computing requires a completely different approach to programming due to its novel logical paradigm. Embracing uncertainty and iterative heuristic approaches are essential for harnessing the potential of this technology effectively. However, one significant challenge in quantum computing is the need to link multiple qubits without increasing the probability of errors. This remains a critical obstacle to the commercial growth of the technology.
Quantum Computing
SiliconANGLE - Report: Data centers guzzling enormous amounts of water to cool generative AI servers 
An article in the Associated Press published Saturday reported that Microsoft’s data center water use increased by 34% from 2021 to 2022. The company slurped up more than 1.7 billion gallons, or 6.4 billion liters, of water last year, which is said to be enough to fill more than 2,500 Olympic-sized swimming pools.
Sustainability
VentureBeat - Why self-regulation of AI is a smart business move
Success will also hinge on well-conceived AI governance. Business and tech leaders must have visibility into, and oversight of, the datasets and language models being used, risk assessments, approvals, audit trails and more. Data teams — from engineers prepping the data to data scientists building the models — must be vigilant in watching for AI bias every step of the way and not allow it to be perpetuated in processes and outcomes.
Artificial Intelligence
NetworkComputing - Wi-Fi 7 May Be Closer Than You Think
Why is any of this a problem? As the number of users grows and traffic increases, performance issues arise. Contention for the limited bandwidth diminishes bandwidth for each user, increases latency, and introduces jitter. All these issues particularly impact modern applications that rely on streaming data and video. Users need more bandwidth and better responsiveness for their apps.
Network Management
Blocks & Files - Increased cloud costs pulls focus of some SMEs to on-site storage
Although more than a quarter (27 percent) of SMEs said they initially adopted cloud to reduce computing expenditure, they now expect a 10 percent increase in the cost of cloud services this year. Several major cloud providers have introduced double-digit price increases for services used by SMEs already.
Data Storage
VentureBeat - As regulators talk tough, tackling AI bias has never been more urgent
Although the term ‘AI bias’ can sound nebulous, it’s easy to define. Also known as “algorithm bias,” AI bias occurs when human biases creep into the data sets on which the AI models are trained. This data, and the subsequent AI models, then reflect any sampling bias, confirmation bias and human biases (against gender, age, nationality, race, for example) and clouds the independence and accuracy of any output from the AI technology.
Artificial Intelligence
Datanami - New AI Usage Data Shows Who’s Using AI — and Uncovers a Population of ‘Super-Users’
The research shows that 49% of people have used generative AI, with over one-third of these users tapping into the technology daily and planning to use it even more. However, the data also shows that half of all people have never used the technology, and 64% of them would use it more if it was safe/secure.
Artificial Intelligence
Computerworld - The Donald Trump deep fake ‘interview’ and the problem with avatars
One of the technologies being explored by videoconferencing software vendors involves the use of Deep Fake avatars to present at, or attend, meetings. The avatars allow a presenter to alter their appearance so they always look sharp and to pre-tape their speech for a more professional result. Eventually, the avatar could do the talk from a script generated by artificial intelligence (AI).
Privacy & Security
sdxCentral - Microsoft vulnerabilities make up 75% of top 20 exploited list
(CVE-2017-11882): This bug, also included in the CISA’s “Additional Routinely Exploited Vulnerabilities in 2022” list, was exploited by 467 malware, 53 threat actors and 14 ransomware. It was trending over the years as recently as August 31, 2023. Qualys researchers noted the vulnerability involves significant memory corruption in Microsoft Office’s Equation Editor, which allows an attacker to execute arbitrary code under the current user’s permissions
Security
SiliconANGLE - Lessons from a ransomware attack: How one healthcare CIO helped her company recover 
The attack took down servers, workstations, network storage and backups, but fortunately not electronic health records, which were hosted offsite. It encrypted the picture archiving and communication system that contains the X-rays vital to orthopedic surgery. The application and database needed to view the images were also hit and the internet protocol phones went down.
Security
sdxCentral - What CISOs need to know about private 5G network security
"The most important is access control. Public 5G networks are designed to provide connectivity to a wide range of users, whereas private 5G is for specific use cases within the boundaries of a company. Access control in a private 5G environment is more centralized and tightly managed,”
Security
Blocks & Files - Five emerging memory technologies, with MRAM in pole position
Two semiconductor analysts have written an Emerging Memories report and suggest MRAM has good prospects for replacing SRAM and NOR flash in edge computing devices needing to process and analyze data in real-time.
Data Management
VentureBeat - Visa’s report makes a case for outsmarting payment fraud with AI now
Visa’s research team also found that fraudsters stole over $1.3 billion in cryptocurrency in early 2022 alone by exploiting vulnerabilities in smart contracts. Enumeration attacks jumped 40% in recent months, and 58% of fraud investigations involved online merchants. Brick-and-mortar retailers accounted for just 20%, proving that e-commerce remains a high-priority target.
Privacy & Security
Blocks & Files - Gartner unveils hottest storage trends for 2023
None of these topics will be news to B&F readers. Each trend is anchored by a strategic planning assumption (SPA), such as “By 2028, consumption-based STaaS will replace over 35 percent of enterprise storage capex, up from less than 10 percent in 2023.”
Data Storage
The Hacker News - Protecting Your Microsoft IIS Servers Against Malware Attacks
Recently, a slew of activity by the advanced persistent threat (APT) group Lazarus has focused on finding vulnerable Microsoft IIS servers and infecting them with malware or using them to distribute malicious code. This article describes the details of the malware attacks and offers actionable suggestions for protecting Microsoft IIS servers against them.
Security
SiliconANGLE - Data and analytics interrupt their programs for generative AI 
Given the scale of LLMs, marshaling the data is no trivial task. Content must be chunked into tokens, which for an LLM could be a word or part of a word. But then processing raw tokens in an LLM can get massive. That’s where vector embeddings come in: They crunch tokens together to generate a meaning, with the meaning physically stored as mathematical representations.
Data & Analytics
InformationWeek - The Benefits and Drawbacks of Hybrid Cloud Storage
“This can be used to test all aspects of utilizing a new storage architecture, including technical feasibility, program governance, and cost management.” He adds that it’s important to be deliberate and thorough about testing specific low-risk scenarios, such as low-cost cloud storage, when archiving legacy data or using redundant storage to introduce high availability.
Data Storage
NetworkComputing - IT Leaders are at a Crossroads – It’s Time They Demand More
In fact, 98% of IT leaders said they were planning to increase their dependence and investment in cloud services. Similarly, 98% said that hybrid work has increased the need for new network and security solutions, with 97% needing hybrid work plans immediately or within the next 12 months.
IT Management
VentureBeat - For CFOs who see past the hype, AI is already improving financial performance management
The pathway to keep up with this pace of change is technology adoption, and increasingly, it’s AI-driven. Unfortunately, too many finance and accounting teams are stuck manually gathering data, pasting it into tables, and painstakingly searching for formula errors. That’s hundreds of hours of effort wasted each month.
Automation & Productivity
Network World - 10 questions to ask about secure service edge (SSE)
On the customer side, a recent Gartner survey of CISOs revealed that “a majority of buyers are planning for a two-vendor strategy for SASE,” with security and networking teams making separate buying decisions rather than opting for single-vendor SASE.
Security
SiliconANGLE - W3LL ‘Phishing Empire’ targets Microsoft 365 accounts
The group, called “W3LL,” runs a hidden underground market known as the W3LL Store that serves a closed community of at least 500 threat actors. On the store, the group sells a custom phishing kit called the W3LL Panel that is designed to bypass multifactor authentication, as well as 16 other customized tools for business email compromise or BEC attacks.
Security
InformationWeek - 10 AI Startups to Watch
“Less than a year after many of these tools debuted, one-third of our survey respondents say their organizations are using gen AI regularly in at least one business function. Amid recent advances, AI has risen from a topic relegated to tech employees to a focus of company leaders: Nearly one-quarter of surveyed C-suite executives say they are personally using gen AI tools for work, and more than one-quarter of respondents from companies using AI say gen AI is already on their boards’ agendas. What’s more, 40% of respondents say their organizations will increase their investment in AI overall because of advances in gen AI.”
Artificial Intelligence
NetworkComputing - Successfully Implement Zero Trust to Secure Hybrid Environments
While they have proven to be valuable for protecting remote workers, this approach only covers part of the problem. Today's ZTNA solutions for remote workers are cloud-delivered, and they typically become inactive when the user is onsite, thereby reverting to less secure, perimeter-based security approaches in the LAN.
Security
sdxCentral - Research shows mainframes are still vital, support teams getting younger
The survey found that there is continued growth and innovation on the mainframe platform. A large majority – 94% of respondents – have a positive view of the mainframe, and 63% reported increased investments in the past year. DevOps and AIOps adoption on the mainframe teams is increasing, with 62% using DevOps and 32% using AIOps. Mainframe users aren’t myopic, either, and typically also use modern server technology and increasingly have an interest in cloud, according to the report
Automation & Productivity
InformationWeek - IT Resilience and How to Achieve It
“Data storage systems lie at the heart of efforts to build IT environments that are resilient to logical data corruption in all its forms.” Protective measures should include technologies designed to avoid downtime, ensure access to critical applications, middleware, and data, and maintain user productivity.
IT Management
sdxCentral - Behind the firewalls: A day in the life of a Palo Alto Networks SOC analyst
Palo Alto Networks’ internal security operations center (SOC) ingests more than 36 billion events and 75 terabytes of data per day, yet it’s run by only 10 analysts. The company’s SOC Operations Specialist Devin Johnstone explained their ’30/30/30” working model and how they leverage new artificial intelligence (AI)-powered cybersecurity technologies to handle the workloads of about 16 analysts for them.
Security
Computerworld - The best multiplatform productivity apps
With that in mind, I thought it’d be helpful to start a collection of the best cross-platform productivity tools — exceptional apps for getting stuff done that work on any type of device and make it easy to move from one platform to another (or to collaborate with anyone on any platform) without missing a beat.
Automation & Productivity
SiliconANGLE - It’s the summer of adversarial chatbots. Here’s how to defend against them 
Both WormGPT and FraudGPT are freed from the ethical guardrails that legitimate chatbot tools have. Typically, those guardrails mean the bots can’t directly answer queries about illegal activity, hacking methods or the like. However, Erzberger was able to manipulate ChatGPT to offer up similar phishing lures and other responses to WormGPT after careful prompt engineering.
Privacy & Security
VentureBeat - 5 emerging tech job titles for 2023, and beyond
But with over 100 million users to date, prompt engineers have become a vital part of the AI ecosystem with remuneration to match — salaries in the U.S. are reported to be between $230,000 and $335,000 — and the number of job posts featuring the term GPT rose 51% between 2021 and 2022.
Tech Jobs
AiThority - Faithful or Deceptive? Evaluating the Faithfulness of Natural Language Explanations
However, for NLEs, which lack this direct mapping, automated extraction of reasons is challenging. In this study, task-dependent automated agents called Rs are proposed to extract the reasons. Rs are built for the e-SNLI and ComVE datasets due to the structure of the NLEs and dataset characteristics. However, constructing an R for the CoS-E dataset was not possible.
Automation & Productivity
Computerworld - Q&A: What ChatGPT Enterprise means for AI business adoption
"I think the enhanced security and privacy features are definitely a step in the right direction, which could see a greater adoption of AI. [While] the debut of ChatGPT was met with a lot of excitement, dominating headlines and signaling a change in the way we interact with technology, there have since been a lot of experts and academics who have raised concerns about the service."
ChatGPT
sdxCentral - New SEC cybersecurity disclosure rules: How enterprises can prepare
Not surprisingly, organizations of all sizes have many questions — from whether they have the right protocols and reporting channels in place, to whether they have the basics of cybersecurity down — while they also point to the vagary of the term “material” and express trepidation about the four-day turnaround.
Security
InformationWeek - To Pay or Not to Pay? The Ransomware Dilemma
”As soon as a ransomware demand is made, a company’s cybersecurity team needs to jump into action. The first step is to inform everyone who will be involved in responding to the incident, inside and outside of the company. “The IT/security team should never be operating in a vacuum when these events occur,”
Security
VentureBeat - Despite growing demand, only 13% of employees offered AI training last year
“It is clear that more employers are seeking talent with AI skills… AI is increasingly an enabler and enhancer of skills, holding a profound impact on productivity and overall performance in the workplace. But the imbalance between skills demanded by businesses and desired by employees, on the one hand, and the training opportunities provided, on the other, has to be addressed,"
Automation & Productivity
AiThority - Transforming Legal Landscape: How AI is Becoming The Ultimate Sidekick for Lawyers
The adoption of AI in law practices offers numerous advantages, including enhanced efficiency, improved research capabilities, and cost reduction. However, it also poses challenges such as limited contextual understanding, ethical considerations, and potential job displacement concerns. By understanding both the benefits and drawbacks, the legal industry can navigate the implementation of AI while ensuring ethical standards, client satisfaction, and effective legal representation.
Automation & Productivity
sdxCentral - Cisco explains why AI networking and Ethernet fabric are a perfect match
As AI clusters grow from 256 accelerators today to somewhere around 4,000 accelerators per cluster in 2025 – “we can probably argue the number of GPUs you need on a cluster” – it’s evident enterprises plan to invest in these specialized processors, he said. And given the need for accelerated communication between cluster nodes, these investments “will have a really important effect on the ROI.”
Network Management
DarkReading - How Companies Can Cope With the Risks of Generative AI Tools
Organizations must be discerning about which data they share with generative AI models. Many employees are stretched thin, and it can be tempting to reduce one's workload by offloading tasks to generative AI. But any data shared with these models can be misused or compromised if it falls into the wrong hands. Things such as sensitive (e.g., financial) data, trade secrets, and other confidential business information need to be protected.
Privacy & Security
InformationWeek - Making Sense of the Commodity We Call Storage
In the survey, 94% of respondents reported that their cloud storage costs were rapidly rising, and 54% said that cloud storage costs were rising at higher rates than other cloud costs. “The survey results confirm that cloud storage costs continue to rise while also showing there is no single prevailing strategy to decide what storage to put in the cloud and what to keep on premises,"
Data Storage
Computerworld - Apple Support prepares to leave X: End of the omni-channel?
On the surface, this is a weird decision given Apple’s visible commitment to omnichannel customer services.  The company has offered customer support via X/Twitter since 2016, when most customer-facing entities began doing so. At that time, customer service teams everywhere flocked to the platform to open up direct and immediate communications with customers.
Automation & Productivity
AI is not a threat to human jobs. It’s a catalyst for growth and innovation
That may seem like a shocking assertion, given the decades of news headlines and science fiction novels predicting how AI would soon replace everything from truck drivers and mall cops to artists and CEOs. However, those fears ignore an important consideration: the people behind the AI joystick and the fact that they will continue to remain driven by human nature.
Automation & Productivity
Computerworld - GenAI in productivity apps: What could possibly go wrong?
And in fact, often the AIs are accurate. The latest releases of some popular genAI chatbots have passed bar exams and medical licensing tests. But this can give some users a false sense of security, as when a couple of lawyers got in trouble by relying on ChatGPT to find relevant case law — only to discover that it had invented the cases it cited.
Artificial Intelligence
AiThority - Money Meets Machine: 5 Game-Changing AI Trends in Finance and Insurance
According to a study by Accenture, a staggering 83% of customers are willing to share their data with insurers if it results in personalized experiences and customized offers. This data-sharing willingness signifies the increasing importance of personalization in establishing a strong customer-business relationship.
Automation & Productivity
Generative AI at an inflection point: What’s next for real-world adoption?
GPUs can execute many calculations simultaneously, making them perfectly suited for tasks like machine learning (ML), where millions of calculations are performed in parallel. GPUs are also particularly adept at certain types of mathematical calculations — such as linear algebra and matrix manipulation tasks — that are fundamental to deep learning and gen AI.
Automation & Productivity
NetworkComputing - The Top 10 Benefits of SD-WAN: Advantages of SD-WAN Explained
When SD-WAN is understood as a conceptual delivery model for services, it can then underpin many best practices for security. It’s not a matter of SD-WAN versus SASE but the knowledge that SD-WAN delivers the foundational building blocks of SASE. The network is still one of the best places for many security controls.
Network Management
Computerworld - With BYOD comes responsibility — and many firms aren't delivering
That’s the biggest take-away from the latest Jamf research, which warns that almost half of enterprises across Europe still don’t have a formal Bring-Your-Own-Device (BYOD) policy in place. That’s bad, as it means companies have no control over how employees connect and use corporate resources, creating a nice, soft attack surface for criminals and competitors alike.
IT Management
Network World - Will RedCap 5G spark IoT gold rush?
“In terms of latency and bandwidth, the vast majority of IoT devices do not need 5G,” says Jason Leigh, Research Manager, 5G & Mobility Research for IDC. “5G is like a Ferrari engine, but most cars don’t need a Ferrari engine.” The advanced capabilities of 5G also come at a price premium, and many IoT use cases cannot support the additional cost."
IoT
NetworkComputing - Private 5G: Not As Scary As You Think 
Private 5G has been a hot topic of late. A recent ZK Research survey found that 92% of organizations have or plan to deploy private cellular. The interest in private 5G is high, but there is some trepidation among enterprises as network engineers fear the complexity to deploy the technology.
Network Management
XM Cyber - Using GenAI to Improve Cybersecurity, with Privacy at the Forefront
For example, when our attack path analysis finds choke points, it recommends ways to remediate. But often, IT cannot perform said remediation, owing to many possible reasons. With the use of Gen AI, security teams can get the ability to negotiate with IT, by locating multiple alternative remediations that provide the same results.
Security
DarkReading - Addressing Cybersecurity's Talent Shortage & Its Impact on CISOs
What's behind this growing shortage? We're seeing organizations shift their approach to cloud-first strategies to achieve greater scale and flexibility. At the same time, they're using more than one cloud technology provider and multiple database providers, resulting in more work, more alerts, and more data. This creates a need for new tools, changes in practice and skill, and overall involvement due to complexity.
Security
VentureBeat - OpenAI launches long-awaited ChatGPT for Enterprise — but is it playing catch-up?
After all, not only are many other companies targeting the same enterprise business audience with generative AI — Cohere offers bespoke Large Language Model (LLM) options for the enterprise; Anthropic partnered with Scale AI to target the enterprise; and even Microsoft Azure has its own OpenAI service — but open source players are in the mix as well. Meta’s LLaMA 2, for instance, is available for commercial use.
ChatGPT
DarkReading - MOVEit Was a SQL Injection Accident Waiting to Happen
We do not have insight into Progress Software's software development life cycle or security practices to ascertain what happened. While a vulnerability assessment system or even a bug hunting program could have potentially identified SQL injection flaws in the code before it was exploited, focusing on producing code that is secure by construction is an even better way to address this class of vulnerability.
Security
Computerworld - Workers are embracing AI but want more guidance on how to use it, says survey
The use cases for this technology have rapidly expanded since the introduction of generative AI tools into the public domain, with most workers using the technology to streamline tasks and reduce so-called busy work. According to the report, 30% of employees surveyed for the report currently use AI for data analysis, and 25% for administrative functions. However, many want to take things even further, with 45% of US respondents saying they want to use AI for brainstorming. In the UK, that figure sits at 32%.
Automation & Productivity
AiThority - Unleashing the Potential of Plugins: The Top 10 ChatGPT Add-ons
ChatGPT has taken AI to unprecedented heights, outperforming its prior capabilities. It’s not only ChatGPT 4; this AI chatbot connects effortlessly with third-party plugins. Plugins are user-friendly and open up a world of opportunities. A sentiment analysis plugin, for instance, enables ChatGPT to evaluate and decipher the emotions underlying text inputs, while a language translation plugin enables it to comprehend and respond in many languages.
ChatGPT
VentureBeat - This is how AI will shape early-career tech jobs
Couple this with the fact that AI is predicted to eliminate 83 million global jobs by 2027 and it’s easy to see why for those starting out in their careers, AI will not only shape their day-to-day but have a massive impact on their overall career trajectory.
Tech Jobs
Blocks & Files - Five steps to mastering multicloud management
This complexity is then magnified when we consider data management challenges. Shuttling data between public clouds and on-premises systems becomes harder with the increase of data gravity, and even container orchestration tools, such as Kubernetes, require deep technical skills when it comes to managing persistent storage. And the data reflects this struggle. According to a recent VMware State of Kubernetes research report published in May, 57 percent of those surveyed citing inadequate internal experience as a main challenge to managing Kubernetes.
Cloud
InformationWeek - Top Cloud Security Mistakes (And How to Avoid Them)
“When you use multiple security tools in parallel, each has its own set of capabilities, security policies, management portals, and logging, so each works a bit differently,” he explains. This leads to inconsistent security policies, varying levels of protection for individual platforms, and disparate logging and reporting. “In essence, it means that the level of protection for each application and service is determined by the platform it resides in, not its threat profile.”
Security
Computerworld - Microsoft, Amazon go head-to-head on genAI in the cloud — here’s who’ll win
GenAI requires supercomputing-like power, the ability to store and tap into monstrous amounts of data, close links to a company’s existing technology infrastructure, and straightforward tools to help users get the most out of it. Those requirements are well beyond the capabilities of all but a few companies, meaning businesses will need to turn to the cloud for them.
Cloud
Network World - Most hyped network technologies and how to deal with them
The appeal of promising network technologies can be jaded by pressure to adopt untested ideas. When I look over the comments I’ve gotten from enterprise technologists this year, one thing that stands out is that almost three-quarters of them said that entrenched views held by company executives is a “significant problem” for them in sustaining their network and IT operations.
Network Management
Computerworld - IDC sees big enterprise shift to Macs over next 12 months
“The commercial PC market is getting very interesting for several reasons,” said IDC in a bit of understatement. “From a processor standpoint, we are arguably seeing some of the biggest shifts in commercial PC history with AMD reaching 11% share in 2022 and Apple just over 5% in 2022.”
Automation & Productivity
sdxCentral - LLMs, generative AI loom large for MLOps practices
Teams now work to tame the new tech both in training and inference modes. The LLMs at the heart of generative AI’s innovations require large-scale hardware and software architectures that support distributed computing. Memory and compute resources must be tuned to reduce latency in human-machine interaction. All this quickly translates into costs that stymie some hopeful projects
Artificial Intelligence
SiliconANGLE - New report finds growing gap in cyber insurance coverage
The increasing difficulty in obtaining cyber insurance is being driven by increasing cyberattacks, with a remarkable 47% of companies polled for the report saying that they made claims on their cyber insurance more than once in the last year. More companies making claims means that the cost of insurance has also increased, with 67% of respondents saying that their cyber insurance rates increased 50% to 100% upon application or renewal in the last 12 months.
Security
Computerworld - Managed Apple IDs, iCloud, and the shadow IT connection
Because Apple Business Manager supports federation with most cloud-based enterprise identity providers such as Azure AD and Google Workspace or  solutions using oAuth or Okta (full Okta support is coming later this year), the creation of managed Apple IDs can be completely automated with the IDs matched to each user’s enterprise credentials.
IT Management
VentureBeat - How to minimize data risk for generative AI and LLMs in the enterprise
Instead of sending your data out to an LLM, bring the LLM to your data. This is the model most enterprises will use to balance the need for innovation with the importance of keeping customer PII and other sensitive data secure. Most large businesses already maintain a strong security and governance boundary around their data, and they should host and deploy LLMs within that protected environment.
Privacy & Security
eWeek - Neural Networks vs. Deep Learning
Many applications don’t need deep learning, with its ability to plumb the depths of AI’s capacity. Neural networks also offer powerhouse performance, though less so; yet  increasingly, even basic AI tools are harnessing relatively simple neural networks as part of their operations. But as complexity rises, deep learning must be introduced to provide the expected level of performance and accuracy.
Artificial Intelligence
VentureBeat - Salesforce survey flags AI trust gap between enterprises and customers
While they highlighted multiple concerns, the most prominent challenges they reported were the lack of transparency and the lack of a human in the loop to validate the output of the AI — demanded by more than 80%. Just 37% of the respondents said they actually trust AI to provide as accurate responses as a human would.
Artificial Intelligence
SiliconANGLE - How the new breed of business virtual private networks will keep them relevant in security 
But the software-centric VPNs bring up an entirely new set of issues, including protecting user privacy, performing regular independent security audits, and having a wide enough access server network across the globe. The leading consumer VPNs have stepped up their game accordingly to be more secure and transparent about their operations. They have also begun to offer business-grade VPNs, such as Proton did this week.
Network Management
Network World - What are network assurance tools and why are they important?
"As networks evolve to accommodate IoT, cloud services, and remote work, the need for reliable and secure connectivity becomes paramount.” Network assurance tools bridge the gap between network visibility and operational excellence. "These tools encapsulate a suite of technologies and methodologies designed to ensure the reliability, performance, and security of complex network infrastructures.”
Network Management
Datanami - Lucidworks’ Benchmark Analysis Reveals Security and Accuracy as Top Concerns in Generative AI Adoption
Although 47% of respondents have a positive view of gen AI, one of the biggest concerns that remains is security. This concern is common across all industries surveyed, followed by the accuracy of AI-generated outputs, transparency in understanding how AI-based decisions are made, job displacement, and ensuring responsiveness in terms of timeliness and tone.
Artificial Intelligence
sdxCentral - AI biases, ‘technochauvinism’ threaten progress, encourage discrimination
At the heart of AI’s potential to contradict common ethics is the idea of technochauvinism – a pro-technology bias that supports technological solutions as superior to all others. But it usually makes far more sense to use the right tool for the task, regardless of how technologically advanced that tool might be, Broussard argued.
Artificial Intelligence
NetworkComputing - Why Distributedness is a Measure of Digital Maturity 
That’s why multi-cloud networking (MCN) exists as a market and why it continues to gain traction. Its entire raison d'être is to establish the capability to seamlessly operate across core, cloud, and edge without requiring a formal IT project with a budget bigger than the 2022 GDP of Vermont. (That’s about $40B, for those wondering).
Network Management
VentureBeat - Why generative AI is a double-edged sword for the cybersecurity sector
That being said, gen AI and LLMs create output based on existing content, whether that comes from the open internet or the specific datasets that they have been trained on. That means they are good at iterating on what came before, which can be a boon for attackers. For example, in the same way that AI can create iterations of content using the same set of words, it can create malicious code that is similar to something that already exists, but different enough to evade detection.
Security
SiliconANGLE - Cloud giants eye a potential windfall in AI at the network edge
There’s no question that edge computing, which IBM Corp. defines as “a distributed computing framework that brings enterprise applications closer to data,” is architecturally the polar opposite of the centralized cloud. But the evolving edge is turning out to be more of an adjunct to cloud services than an alternative.
Edge Computing
sdxCentral - Synthetic identity fraud is at an all-time high — how does it work?
Think of it as the “Frankenstein” of fraud [ed. note: frankenfraud — sorry, couldn’t resist]: A criminal actor steals bits and pieces of personal data from real people — say, a child’s Social Security number, the home address of someone currently incarcerated, the birth date of a recently deceased person — then cobbles them all together to create an all-new fake identity.a
Privacy & Security
InformationWeek - How to Build True Cyber Resilience
Where are organizations in their journeys to cyber resilience today? Cybersecurity awareness has grown in recent years. It is no longer just an IT and security executive concern. The rest of the C-suite and board members are getting onboard, but understanding the need to recognize and respond to cyber threats is just the first step to actually implementing cyber resilience.
Security
sdxCentral - Securing the AI software supply chain starts at the base (image)
Ultimately, it comes down to building on secure base images, which are the starting point for container-based development workflows. As their name suggests, they are layered over with the necessary libraries, binaries and configuration files necessary to run an application.
Artificial Intelligence
VentureBeat - How AI brings greater accuracy, speed, and scale to microsegmentation
Gartner predicts that through 2023, at least 99% of cloud security failures will be the user’s fault. Getting microsegmentation right in multicloud configurations can make or break any zero-trust initiative. Ninety percent of enterprises migrating to the cloud are adopting zero trust, but just 22% are confident their organization will capitalize on its many benefits and transform their business.
Security
How to Make SD-WAN Predictive Automation a Reality
Enterprise network managers must consider three key requirements to ensure automation drives value: End-to-end intelligence, analytics-driven prediction, and predictive automation, all rooted on a solid and consistent telemetry foundation.
Network Management
VentureBeat - This is how generative AI will free up your time at work
Crafting first drafts of text documents is its most popular use at 9%, followed by personalized marketing (8%), summarizing text documents (8%) and identifying trends in customer needs (7%). ChatGPT is also being used by 5% of workers to draft technical documents and forecast trends or anomalies, while 4% are using the tool to create new product designs.
Automation & Productivity
Datanami - Survey: More than 75% of Enterprises Don’t Plan to Use Commercial LLMs in Production Citing Data Privacy as Primary Concern
Less than a quarter of enterprises are comfortable using commercial LLMs. Roughly a third (33%) cite concerns about sharing sensitive or proprietary data with commercial LLM vendors, leading to increased interest in privately hosted, open-source alternatives.
Artificial Intelligence
VentureBeat - Princeton University’s ‘AI Snake Oil’ authors say generative AI hype has ‘spiraled out of control’
When I first started speaking about AI snake oil, it was almost entirely focused on predictive AI. In fact, one of the main things we’ve been trying to do in our writing is make clear the distinction between generative and predictive and other types of AI — and why the rapid progress in one might not imply anything for the other.
Artificial Intelligence
Computerworld - The most in-demand AI skills — and how companies want to use them
The top 10 Generative AI-related skills listed in Upwork job seeker profiles with the largest quarter-over-quarter growth (Q2 2023 vs Q1 2023) were: Large Language Model (LLM); Generative AI; You Only Look Once (YOLO); Object Detection; Stable Diffusion; Prompt Engineering; ChatGPT; Azure OpenAI; AI Chatbot; and AI Text-to-Speech.
Tech Jobs
AiThority - The AI Litmus Test: 10 AI Detection Tools That Separate Human Touch from Machine Brilliance
One notable case where differentiation between human and AI-generated results became challenging was the emergence of deepfake technology. Deepfakes employ AI algorithms to create realistic, yet fabricated, videos or audio recordings, often impersonating real people. These deceptive creations pose significant challenges in discerning truth from fiction and have raised concerns about the potential misuse of AI-generated content.
Artificial Intelligence
Computerworld - The line-blurring brilliance of Google's new ChromeOS-Windows connection
Most of us mere mortals spend most of our time in browser-based apps — or easily could — and especially when you add in the platform's availability of more advanced progressive web apps along with Android apps and even Linux apps, there's very little most people would need to do that they couldn't accomplish on a Chromebook at this point.
Automation & Productivity
TechRepublic - Gartner: How to Expand Your Value as CIO in 4 Ways
Now, CIOs must look to the next evolution of their role. Digitalization is no longer a large, centrally driven effort, but rather a continuous series of efforts within almost every function, with an increased focus on achieving payback from existing investments. CxOs recognize they must also be accountable leaders of technology and want to partner with CIOs to achieve the right structure for technology democratization. Finally, automation and the advancement of AI are rapidly changing the business technology landscape.
IT Management
Network World - Networking vendors highlight AI opportunities as order backlog challenges begin to subside
“The acceleration of AI will fundamentally change our world and create new growth drivers for us,” Robbins said. “Cisco's ASIC design and scalable fabric for AI position us very well to build out the infrastructure that hyperscalers and others need to build AI ML clusters. We expect Ethernet will lead in connecting AI workloads over the next five years.”
Network Management
InformationWeek - Does Your IT Organization Need an AI Team?
“On-site AI experts are especially important for teams that work with potentially sensitive data, such as governance, compliance and risk management, to safeguard operations and proactively address any risks.”
Artificial Intelligence
Network World - Human error in network operations and how to deal with it
You might have been alarmed to read recently that half of all network problems are due to human error. Well, bad news. That’s true of the number of problems. If you look at the hours of degraded or failed operation, three-quarters of all of it is due to human error.
Network Management
VentureBeat - Generative AI datasets could face a reckoning | The AI Beat
It’s an open secret that LLMs rely on the ingestion of large amounts of copyrighted material for the purpose of “training.” Proponents and some legal experts insist this falls under what is known a “fair use” of the data — often pointing to the federal ruling in 2015 that Google’s scanning of library books displaying “snippets” online did not violate copyright — though others see an equally persuasive counterargument.
Artificial Intelligence
TechRepublic - About 2000 Citrix NetScalers Were Compromised in Massive Attack Campaigns
Shadowserver reported the U.S. is the country with the most unique IPs of unpatched systems, with more than 2,600 unique IPs being vulnerable to CVE-2023-3519
Security
VentureBeat - AI in OT: Opportunities and risks you need to know
In Information technology (IT), the consequences are often much less, such as losing data. On the other hand, in OT, if an oil refinery ignites, there is the potential cost of life, negative impacts on the environment, significant liability concerns, as well as long-term brand damage. This emphasizes the importance of making quick — and accurate — decisions during times of crisis. And this is ultimately why relying solely on AI or other tools is not perfect for OT operations, as the consequences of an error are immense.
Artificial Intelligence
TechStartups - AI Wrappers: The rise of AI wrappers and the challenges ahead
However, our findings revealed that many of these products are nothing but AI wrappers built on top of the existing Large Language Models (LLMs) such as OpenAI’s offerings. The differentiating features often involve fine-tuning and a user-friendly visual interface. But that doesn’t really matter to the deep-pocket investors who already bought into the hype.
Artificial Intelligence
InformationWeek - Business Leaders: Asking the Right Questions About Generative AI
We often get asked what the single best use case is to start with. GenAI is so scalable and it’s usually a missed opportunity to focus too closely on any one use case. Instead, focus on how a single, repeatable “pattern” of generative AI deployment can apply across your value chain. For example, generative AI’s capacity for deep retrieval -- extracting actionable insights from unstructured data -- may deliver only modest value in a single function. But if you rapidly roll out deep retrieval in every line of business and every function, from compliance to human resources, the ROI can be spectacular.
Artificial Intelligence
VentureBeat - How businesses can measure the success of AI applications
One fundamental characteristic that distinguishes AI from traditional software is its non-deterministic nature. Even with the same input, different rounds of computing produce different results. While this characteristic contributes significantly to AI’s exciting technological potential, it also presents challenges, particularly in measuring the effectiveness of AI-based applications.
Artificial Intelligence
Computerworld - Why and how to create corporate genAI policies
The bottom line is that large language models (LLMs) and other genAI applications “are not fully baked,” according to Avivah Litan, a vice president and distinguished Gartner analyst. “They still have accuracy issues, liability and privacy concerns, security vulnerabilities, and can veer off in unpredictable or undesirable directions,” she said, “but they are entirely usable and provide an enormous boost to productivity and innovation.”
Artificial Intelligence
NetworkComputing - Adapting to the Cloud Era of Cybersecurity: How CISO’s Priorities Are Evolving
As the CISO role evolves with these moves to the cloud, CyberRatings recommends that CISOs adapt by shifting priorities from operating security programs to overseeing (monitoring and auditing) outsourced security programs. This is where a rigorous certification can help. To that end, MEF and CyberRatings.org recently announced a partnership to launch a new SASE Certification Program to provide confidence to enterprises. Certifications will include SD-WAN, a Zero Trust Framework, and SSE (Threat Protection)
Security
Network World - 9 career-boosting Wi-Fi certifications
The Certified Wireless Network Administrator (CWNA) vendor-neutral certification is more in-depth than the CWT, although there is no prerequisite for this certification beyond the recommendation to have basic knowledge of networking (routers, switches, TCP/IP, etc.) and one year of work experience with wireless LAN technologies. It covers the design and configuration of WLANs and is actually the required base certification you must obtain before proceeding to their higher security, design, analysis, or expert certifications
Training & Certs
NetworkComputing - Understanding Private 5G Deployment Options
The DIY approach comes with significant disadvantages, however. Piecing together a P5G system requires a deep understanding of cellular data technologies and necessitates skilled cellular practitioners to properly deploy, integrate, calibrate, and tune the network. This can be a heavy lift for already overburdened IT staff.
Network Management
sdxCentral - 3 tips for proactive risk management in generative AI
CIOs and technologists know that generative AI is not “thinking” or being creative in a human way, and they also likely know that the outputs are not necessarily as accurate as they might appear. Nontechnical business users, however, may not and may consequently put misplaced trust in the outputs.
Artificial Intelligence
VentureBeat - Want to mitigate cyber risk? Start with zero trust visibility
This idea of getting IT running and letting legacy risk lie, with the only real objective being to “keep the lights on,” has left large swaths of infrastructure and technology within the reach of bad actors. Merely keeping things running, without looking to new functions and opportunities, will provide a wealth of new avenues for cybercrime growth for a long time to come.
Security
Network World - Hybrid mesh firewall platforms gain interest as management challenges intensify
Hybrid mesh firewalls are also different from cybersecurity mesh architecture, says Gartner analyst Adam Hils. A cybersecurity mesh architecture stitches together multiple cybersecurity products from a single vendor, he says, not just firewalls. But a hybrid mesh firewall could be one component of a cybersecurity mesh architecture, or it could be deployed on its own.
Security
TechRepublic - Gartner: Generative AI Will Bring “Transformational Benefit” in the Next 2-5 Years
“Most technology products and services will incorporate generative AI capabilities in the next 12 months, introducing conversational ways of creating and communicating with technologies, leading to their democratization,” she said. “Generative AI will progress rapidly in industry verticals, scientific discovery and technology commercialization.”
Artificial Intelligence
InformationWeek - 4 of the Biggest Vulnerabilities Talked About During Black Hat 2023
Surana tells InformationWeek that vulnerabilities in Azure ML indicate the possibility of security concerns in other MLaaS platforms. “The underlying issues related to insecure logging and storage of sensitive information, sensitive information disclosure, and potential persistence mechanisms could potentially extend to other cloud-based MLaaS platforms as well,” he explains.
Security
Computerworld - China hacks the US military and government — the Feds blame Microsoft
The FBI claims that no classified information was accessed or stolen. That doesn’t mean the breach isn’t serious, though. Being able to read the private emails of Raimondo, State Department officials and others could offer China a tremendous amount of inside information about US plans for dealing with China in the future.
Privacy & Security
VentureBeat - Top 20 cloud native application protection platforms of 2023
CrowdStrike’s 2023 Global Threat Report explains why cloud-first attacks are growing: Attackers are moving away from deactivating antivirus, firewall technologies and log-tampering efforts and toward modifying core authentication processes, along with quickly gaining credentials and identity-based privileges.
Security
InformationWeek - 5 Questions Organizations Should Ask Themselves Before Collecting Data
The rise of APIs means systems and applications are more connected than ever. To keep those APIs up and running, most businesses are collecting as much information as possible and analyzing it after the fact. That might work from an operational standpoint, but it leaves the organization in a precarious position from a data security perspective. If data isn’t being used for a specific purpose, it is effectively an albatross for the organization: protecting it requires energy and resources for little or no tangible gain
Data Management
Computerworld - How old Facebook plus new AI could save remote work
I’m talking about the early version of Facebook that Mark Zuckerberg created as a Harvard student. This social networking tool was designed to help new students create relationships and to better connect them to the school so they felt like they belonged. This is the identical problem that new employees are facing, particularly those who are just out of school and have never worked for a firm before.
Automation & Productivity
sdxCentral - Inside cybersecurity’s mental health crisis: Experts offer advice
That stress goes all the way up the chain: BlackFog found that close to one-third (32%) of CISOs and cybersecurity leaders in the U.S. and UK were considering quitting, citing a lack of work-life balance and too much time spent “firefighting” rather than strategizing, among other factors.
Security
VentureBeat - Tackling the not-so-hidden risks of ChatGPT and generative AI
“Does a pharmaceutical company want to upload its IP and customer information into OpenAI? Of course not,” Têtu says “Do I want my customer service people to start loading it up as prompts into GPT, and let GPT store it and use it for someone else? You must isolate the corpus of data that is secure before you even start generating an answer, and control how the generative platform will use the data.”
Artificial Intelligence
VentureBeat - Gartner Hype Cycle places generative AI on the ‘Peak of Inflated Expectations’
“Every vendor is knocking on the door of an enterprise CIO or CTO and saying, ‘We’ve got generative AI baked into our product,'” he explained, adding that executives are struggling to navigate this landscape, including figuring out the level of customization and the security and privacy practices of various features.
Artificial Intelligence
sdxCentral - CrowdStrike CTO explains adversaries’ focus on identity amid skyrocketing attacks
Kerberoasting is a post-exploitation attack technique that attempts to obtain a password hash of a Microsoft Active Directory (recently rebranded as Entra ID) account that has a service principal name, often resulting in threat actors gaining higher privileges and allowing them to remain undetected in victim environments for longer periods of time, according to CrowdStrike.
Security
eWeek - Risks of Generative AI: 6 Risk Management Tips
Establishing these policies gives your employees a better framework for what they can and cannot do with generative AI and also gives your leadership a clearer understanding of what behaviors they should be monitoring and correcting. If you’re looking for an existing policy to model your own policy after, NIST’s Artificial Intelligence Risk Management Framework is a great option.
Risk Management
Network World - Data replication works best when combined with robust backups
The prime advantage of synchronous replication lies in its ability to ensure a high level of data protection. With the source and target volumes kept in constant synchronization, the risk of data loss due to a disaster or failure is greatly diminished. However, there is a trade-off: The performance of the target system and the data replication path can introduce significant delays in ACK delivery, affecting application response times.
Data Management
InformationWeek - Exploring the Contemporary Place of Graph Databases
Many organizations continue to avoid the additional complexity of graph databases by forcing relationship workloads into relational databases, even though graph databases have been around for decades. The benefits of a graph database for relationship/network/tree-based workloads are substantial, even if an additional database platform is required.
Data & Analytics
DarkReading - Boards Don't Want Security Promises — They Want Action
It's not enough to provide insight around security that the board can understand, even though this is a skill in its own right. The biggest challenge that CISOs face is how to demonstrate that our security processes and updates will reduce risk in measurable and achievable ways. For those of us who have fought to get a seat at the table, this immediate response might seem like a poor return on all that investment.
Security
SiliconANGLE - Analyst ANGLE: What’s happening with cloud-native applications — and what comes next? 
“Sixty-four percent … of the respondents that did our survey are delivering cloud-native applications based on microservices,” he said. “We see that 33% are using multitier or traditional-based cloud-native application approaches, and that’s largely due to the heritage or siloed applications that are being deployed.”
Cloud
sdxCentral - AMD report finds IT leaders unprepared for AI adoption
The researched identified a host of other roadblocks preventing broader enterprise adoption of AI, including compliance concerns and infrastructure needs, “all of which [are] valid,” Unangst pointed out. But as AI shifts further into the mainstream, IT leaders “need to be intentional” about investing in “the right” AI tools and partners, he said.
Artificial Intelligence
SiliconANGLE - How to prevent multifactor authentication fatigue attacks 
That’s what happened in separate attacks at Uber Inc. and Twilio Inc. last year: Attackers persuaded a single employee in both organizations to enter MFA codes into a phony website that was a replica and controller by the attackers. The attackers don’t have to be very sophisticated: In Uber’s case, it was a teen who contacted the target user via WhatsApp and claimed to be from the IT department to give the request more credibility.
Security
InformationWeek - Robotic Process Automation: Is Your Job at Risk?
The good news, he notes, is that most IT positions don’t fit this description. “Even jobs on the IT service desk still, in the main, require a conversation or perhaps the interpretation of a written ticket,” Butterfield says. “That means additional technologies would be needed, along with RPA, to automate even some of these processes.”
Tech Jobs
The Hacker News - What's the State of Credential theft in 2023?
At a little overt halfway through 2023, credential theft is still a major thorn in the side of IT teams. The heart of the problem is the value of data to cybercriminals and the evolution of the techniques they use to get hold of it. The 2023 Verizon Data Breach Investigations Report (DBIR) revealed that 83% of breaches involved external actors, with almost all attacks being financially motivated. Of these breaches by external actors, 49% involved the use of stolen credentials.
Security
SiliconANGLE - New reports show phishing is on the rise – and getting more sophisticated 
Some of these links led potential victims on a series of redirections, such as one email that used the Silicon Valley Bank’s logo to prey on users. It went through a series of four different websites until landing on a phony DocuSign site. It illustrates the effort that attackers will go to hide their criminality. Another sophisticated attack was targeted at Cloudflare employees, which wasn’t successful thanks to its using FIDO-2 hardware keys.
Security
VentureBeat - OpenAI promotes GPT-4 as a way to reduce burden on human content moderators
In fact, according to OpenAI’s research, GPT-4 trained for content moderation performs better than human moderators with minimal training, although both are still outperformed by highly trained and experienced human mods.
Automation & Productivity
eWeek - Generative AI and Data Analytics: Best Practices
The surest way forward here is to rely primarily on first-party data, as your team can easily trace its source and identify any issues with internal resources and users. However, it’s sometimes necessary to use third-party data resources. In those cases, make sure you’re sourcing data from a reputable source, preferably one that is transparent with its data sourcing and security practices. In all cases, assess your data to ensure it is high quality, free of bias, ethically sourced, and compliant with any relevant regulations.
Data & Analytics
Datanami - AMD Study Reveals 75% of IT Leaders Optimistic About AI Benefits But Face Adoption Roadblocks
Today, AMD released the findings from a new survey of global IT leaders which found that 3 in 4 IT leaders are optimistic about the potential benefits of AI — from increased employee efficiency to automated cybersecurity solutions — and more than 2 in 3 are increasing investments in AI technologies. However, while AI presents clear opportunities for organizations to become more productive, efficient, and secure, IT leaders expressed uncertainty on their AI adoption timeliness due to their lack of implementation roadmaps and the overall readiness of their existing hardware and technology stack.
Artificial Intelligence
VentureBeat - How FraudGPT presages the future of weaponized AI
FraudGPT, a new subscription-based generative AI tool for crafting malicious cyberattacks, signals a new era of attack tradecraft. Discovered by Netenrich’s threat research team in July 2023 circulating on the dark web’s Telegram channels, it has the potential to democratize weaponized generative AI at scale.
Security
Blocks & Files - Coughlin: SSDs will not kill disk drives
Barring a significant economic downturn, we expect demand for digital storage to support AI, IoT, media and entertainment as well as genomic and other medical applications to drive increased storage demand. This should bring growth back to HDDs, SSDs and magnetic tape capacity shipments as all of these storage media increase in their per-device storage capacities.”
Data Storage
sdxCentral- How confidential computing is changing cloud data security
It allows sensitive data to be processed securely in a trusted computing environment, such as a public cloud, without revealing the data to anyone who is not authorized to access it. Confidential computing shields unauthorized access, ensuring that the data remains confidential, even if the computing infrastructure is compromised.
Security
VentureBeat - Forget SEO: Why ‘AI Engine Optimization’ may be the future
Last week, OpenAI launched its web crawler to fetch real-time info from the web. But soon, web crawling may not be efficient enough as more and more consumers stay in GPT tools to get information — rather than going to marketing or news sites, Owyang predicts.
Automation & Productivity
SiliconANGLE - Mitigating the latest processor attacks will be a chore on many levels 
Downfall was discovered by Daniel Moghimi, a senior researcher at Google. He presented how the attack works last week at the annual Black Hat Vegas conference, showing how the bug can be used to steal encryption keys from other users running on a specific server, or steal random data from the Linux kernel. Both of these exploits are documented on his attack website.
Security
Computerworld - How to build employee trust as AI gains ground
Most experts agree, however, that newer AI tools are less about replacing people and more about eliminating mundane, manual, or number-crunching tasks that most employees already hate. In fact, the technology will mostly help free up workers to tackle more important jobs such as project management, reach more potential customers and handle more creative tasks.
Automation & Productivity
InformationWeek - Bridging the AI Strategy Gap in the C-Suite
“It’s important to create a clear shared vision of this as part of your enterprise strategy and not as a one-off -- and to assess how your business is going to navigate the disruption and the skills that you’re going to need to drive adoption. The CTO and the CIO have a more nuanced view of where the gaps are in technical skills and infrastructure. They’ll be very instrumental in aligning priorities to manage any potential operation risk of integrating generative AI prematurely.”
IT Management
sdxCentral -Why phishing is still successful — and is AI to blame?
A newer, even more troubling cyberattack method is adversary-in-the-middle (AitM) phishing, said Winterford. As he detailed in a recent blog post, this directs targets to a malicious website configured as a reverse proxy server. Real-time phishing sites relay requests between the user and an impersonated web app. If the user is successfully tricked into signing in, attackers can access credentials and session tokens.
Security
Network World - Hybrid workforce demands change from network ops
“You need secure remote access solutions that offer integrated network security automation, centralized management, and network optimization or network enhancement of some kind. You should consider endpoint monitoring and synthetic monitoring to enhance your overall observability of remote workers,”
Network Management
sdxCentral - Will AI pull the cloud market out its revenue rut?
According to SRG, AWS held onto its 32-34% share of the cloud market in Q2. Rival cloud providers Google Cloud and Microsoft held 22% and 11% of the market, respectively. Combined, the three providers represent 65% of the entire market worldwide.
Cloud
VentureBeat - How businesses and governments can work together to stop cyberattacks before they start
 For starters, the private sector can’t collect intelligence or mitigate threats at the source. They can only stop malicious actors after they’ve been attacked. Governments have a much larger scope and are capable of stopping an attack — or the attackers — at the source.
Security
InformationWeek - 6 Secrets of Cloud Cost Optimization
Potter suggests that a highly effective enterprise cloud FinOps team can partner with application and technology platform teams to develop actionable plans to optimize spend by reducing consumption and enhancing system architectures. “Spend optimization activities that can be driven at the application level are added to the application team’s backlog and tagged so that the cloud FinOps team has visibility into when and how the enhancement was delivered,”
Cloud
The Hacker News - Identity Threat Detection and Response: Rips in Your Identity Fabric
There are a variety of reasons that SaaS security is so complex today. Firstly, there are a diverse range of applications, each having its own UI and terminology. And those environments are dynamic, from SaaS vendors understanding the importance of security and continually enhancing their applications with modern security measures to the ever-evolving user governance required such as onboarding, deprovisioning, adjustments in user access. These controls are effective only when continuously governed, for each app and each user.
Security
Computerworld - As VR headset adoption grows, privacy issues could emerge
Head and hand motion data gathered from virtual reality (VR) headsets could be as effective at identifying individuals as fingerprints or face scans, research studies have shown, potentially compromising user privacy when interacting in immersive virtual environments.
Data Privacy
Network Computing - What’s Causing Cloud Outages? A Network Managers’ Guide
We’re in the age of graphical user interfaces (GUIs) and automation. Yet, many critical IT chores like deploying a new server, provisioning storage for an application, or setting up new router tables are done manually via command line interfaces (CLIs). As one would expect, that can lead to configuration mistakes.
Network Management
InformationWeek - Should IT Reinvent Technical Support for IoT?
There are two “high maintenance” areas for IoT devices. Both relate to the fact that many IoT device producers are startup companies that focus on rapid times to market. Consequently, the companies limit the work they do to ensure devices sold are ruggedized for their intended applications. Additionally, many IoT devices on the market don’t interoperate well with other IT, nor are they well secured against threats.
IT Management
sdxCentral - IPv6 threats are on the rise as adoption grows
Humeau said that he had expected to find that 40%–50% of attack traffic is hidden behind some kind of virtual private network (VPN). The reality in 2023 is, however, somewhat different. Only a paltry 5% of attack traffic is hidden behind a VPN or a proxy service.
Security
Network Computing - More Enterprises Opt for Single-Vendor SASE Solutions
"As single-vendor SASE solution maturity increases, so has the comfort of purchasing it all from a single vendor. The pressure to go after best-of-breed from multiple vendors is slowly diminishing,"
Security
Harvard Business Review - How to Train Generative AI Using Your Company’s Data
Leveraging a company’s propriety knowledge is critical to its ability to compete and innovate, especially in today’s volatile environment. Organizational Innovation is fueled through effective and agile creation, management, application, recombination, and deployment of knowledge assets and know-how.
Artificial Intelligence
Computerworld - Zoom goes for a blatant genAI data grab; enterprises, beware
The consent mechanism of using the product is particularly troublesome for non-customers. Let’s say an enterprise pays for and hosts a call and then invites customers, some contractors and other partners to participate in the meeting. Do those guests understand that anything they say might be fed to generative AI? Other than refusing to attend, how is a guest supposed to decline consent?
Data Privacy
VentureBeat - How businesses can find the cloud’s elusive ROI
Cloud 2.0 — or cloud-powered — is more strategic, aligning a broader vision with business outcomes. Beyond migration means being clear and intentional about when, where and why the organization is leveraging cloud technology. Developing a roadmap to outline the capabilities helps unlock the cloud and shows how operations can be reimagined.
Cloud
SiliconANGLE - Cloud vs. on-premises showdown: The future battlefield for generative AI dominance 
The top-down pressures from the corner office to “figure out” generative AI is an urgent matter. But the actual doing is much more challenging. The chart below shows what customers are doing with gen AI in production environments. Although 34% say they’re not evaluating, that number is way down from last quarter. And while you may think that 34% is very high, we believe there is a difference in the minds of respondents between playing with gen AI and “actively evaluating.”
Artificial Intelligence
DarkReading - As Phishing Gets Even Sneakier, Browser Security Needs to Step Up
Serussi listed a number of modern phishing tactics used by attackers. These included using Cyrillic alphabet characters in a URL to disguise the malicious link the attacker pushes to their would-be victim. "To the human eye, it actually looks like a normal text, right? If we copy and paste it to the command line, we can see the suspicious spaces between the different letters and if we are going to break down the unicode, we can see how the hackers are actually managing to manipulate us," he said
Security
VentureBeat - Machine unlearning: The critical art of teaching AI to forget
With new lawsuits being filed what seems like every other day, the need for ML systems to efficiently ‘forget’ information is becoming paramount for businesses. Algorithms have proven to be incredibly useful in many areas, but the inability to forget information has significant implications for privacy, security and ethics.
Artificial Intelligence
eWeek - 5 Mistakes to Avoid In a Data Storage Refresh
Forrester found that 83 percent of decision-makers are hampered in their ability to leverage data effectively due to challenges like outdated infrastructure, teams overwhelmed and drowning in data, and lack of effective data management across on-premises and cloud storage silos.
Data Storage
SiliconANGLE - Report from Black Hat: Many questions, few answers as cybersecurity world confronts AI threats 
The hands-on research came with a sense of urgency, as the ability of malicious actors to develop and deploy sophisticated new threats has shifted into a higher gear. At one conference presentation, researchers provided a glimpse into humanlike digital twins, the creation of online personas, sometimes even equipped with 100% digitally generated fake photos, that allow for realistic conversational interaction.
Security
DarkReading - Threat Intelligence Efforts, Investment Lagging, Says Opswat
And while few (11%) are currently using artificial intelligence (AI) for threat detection, 56% are optimistic about its uses going forward, while 7% remain skeptical of AI's value. Organizations face common challenges, according to the vendor: detecting known and unknown malware, dealing with inadequate solutions, and making do with compromised tools.
Security
SiliconANGLE - How to overcome the challenges of today’s cybersecurity talent shortage 
One of the top drivers for cyber talent attrition is the lack of development and career opportunities. Organizations must provide structure and guidance that will assist employees in planning their career growth. Leading organizations have made efforts to improve the versatility of their cybersecurity workforce through a systematic talent development strategy that enables continuous learning and career growth.
Tech Jobs
The Verge - The video call revolution is dead
The future of video chat apps isn’t all bleak. Apple has a few interesting ideas that are coming with macOS Sonoma, some of which are borrowed from others: You’ll be able to make your face appear in a little movable bubble, make yourself much larger so that the focus is more on you, and make gestures to set off animated reactions
Automation & Productivity
SiliconANGLE - Unpacking the state of cloud-native applications 
The complexity of multicloud strategies acknowledges that organizations increasingly diversify their cloud providers. Organizations are not merely confined to using a single cloud provider but are venturing into multicloud landscapes to avoid vendor lock-in. This also brings up the notion of repatriation — moving applications from the cloud back to on-premises infrastructure.
Cloud
CIO Influence - 44% of CISOs State Cloud & Infrastructure Security as their Top Priorities in 2023
CISOs are overwhelmed by the massive influx of pre-trained unstructured data for AIops and cybersecurity-related capabilities. These capabilities are meant to catalyze bigger and faster digital transformations within the organization. Moreover, organizations are collecting and processing more data (most of which is unstructured) than ever before. Apart from managing and securing proprietary data and intellectual property (IP), enterprises are also required to reduce attack surfaces that are vulnerable to cyber threats, such as phishing and ransomware
IT Management
eWeek - Reshoring Alleviates Supply Chain Issues – But It Needs Tech to Control Costs
Tech has been quick to respond to the call to deliver the agility and fast “Time to Insight” (TTI) that manufacturers need to better forecast demand and provide a more detailed view of sustainability across product supply chains. Exceptional supply chain management will be a vital part of the move to reshoring. The IFS study showed supply chain management was now seen by 37% of respondents as one of the top three priorities their organization is trying to solve through technology investment.
Automation & Productivity
sdxCentral - How to close the cybersecurity talent gap (and why mentoring may be key)
Another critical factor: An overall lack of mentorship. Enterprises leaders globally must be proactive in offering fellowship programs, co-ops, internships, scholarships and free training (as conferences can be expensive, to the tune of thousands of dollars), Ventura said. They should also consider partnering with local communities and national organizations such as Girls Who Code.Tech Jobs
eWeek - Top Robotic Process Automation Companies
UiPath can help you automate processes with drag-and-drop AI and pre-built templates. Additionally, Uipath offers pluggable integration with Active Directory, OAuth, CyberArk, and Azure Key vault and also complies with regulatory standards such as SOC 2 Type 2, ISO 9001, ISO/IEC 27001, and Veracode Verified.
Automation & Productivity
InformationWeek - Skills Gap in Cloud Tools: Why It Exists and Ways To Address
Business leaders are increasingly recognizing the benefits of building and maturing products and features in the cloud, but as a recent study found, less than 30% have actually taken the steps to modernize their end-to-end workflows. The same study cites skills as one of the top barriers to modernization within organizations -- in fact, leaders feel only 8% of their technical employees have the experience working with cloud-related tools.
IT Management
SiliconANGLE - Need for stronger mobile carrier protections stressed in new Cyber Safety Review Board report 
Lapsus$ capitalized on basic methods to evade well-established security measures, using techniques that do not involve advanced hacking techniques but rather exploited existing system vulnerabilities, particularly within multifactor authentication systems. The board’s report details that the most common entry point for the group involved basic tactics such as phishing and, notably, SIM swapping.
Security
Computerworld - Does Zoom have a death wish?
Were I still a marketing director and working for one of Zoom’s competitors, I’d build a displacement campaign around Zoom’s decision and point out that my product is better because my work-from-home policies remain in place, and I’m not  experiencing the command-and-control problems Zoom is apparently experiencing.
Automation & Productivity
The Hacker News - Researchers Shed Light on APT31's Advanced Backdoors and Data Exfiltration Tactics
Some variants of the second-stage backdoors also come with features designed to look up file names in the Microsoft Outlook folder, execute remote commands, and employ the third-step component to complete the data exfiltration step in the form of RAR archive files.
Security
InformationWeek - Cybersecurity Must Focus on the Goals of Criminals
Firewalls aren’t stopping many breaches, and monitoring technology isn’t protection; it’s a way to watch cybercriminals successfully steal information. Rather than relying on legacy perimeter defenses, such as firewalls, we must adopt an approach emphasizing identity-based security and letting the data protect itself with file-level encryption, which will directly address today’s most significant vulnerabilities.
Security
Moonlock - Remote work is a massive security risk. Are employers keeping up?
The attack that started with a keylogger on Bob’s computer and spread throughout the LastPass system didn’t happen overnight. It came from a hacker who persisted inside the company’s system for months, launching two attacks, one after the other. Not until May 2023 would a LastPass investigation finally acknowledge the full extent of the breach. All 33 million users’ data was at risk.
Security
CIO Influence - Picus Security Analysis of 14 Million Attack Simulations Reveals Organizations Only Prevent 6 Out of Every 10 Attacks
Picus‘ Blue Report data shows that, on average, organizations’ security controls (such as next-gen firewalls and intrusion prevention solutions) only prevent 6 out of every 10 attacks. However, some attack types are prevented far more effectively than others. For instance, organizations can prevent 73% of malware downloads but only 18% of data exfiltration attacks.
Security
The Hacker News - Understanding Active Directory Attack Paths to Improve Security
In 2022, our in-house research found that 73% of the top attack techniques used in the compromising of critical assets involved mismanaged or stolen credentials – and more than half of the attacks in organizations include some element of Active Directory compromise. And once they have a foothold in Active Directory, attackers can perform loads of different malicious actions
Security
Computerworld - Q&A: TIAA's CIO touts top AI projects, details worker skills needed now
"Data and AI is one of the strategic pillars of our strategy to power client-obsessed products, new business opportunities and fuel innovation in our mission to deliver lifetime income for all. Both technical acumen and business acumen hold utmost importance to drive AI’s full potential. We look for talent in three primary areas as we advance our AI agenda — (1) data science, AI/ML and modeling skills, (2) engineering and app dev skills, (3) SME knowledge in financial services with tech integration skills
Tech Jobs
TechRepublic - What Is Data Integrity & Why Is It Important? (Definition & Types)
In data management, human error is a major risk factor for data integrity. Human errors can occur when data is incorrectly input, processed or analyzed. In some industries, like finance or customer service, the reliance on multiple data sources can also lead to data integrity issues as staff members draw data from differing or siloed data sources.
Data Management
SiliconANGLE - VC perspective: Startups ramp up innovation as cloud cybersecurity race intensifies 
“You’ve got a dynamic in cyber that you really don’t have in any other area of technology in that there is an offense in cyber, and the offense actually sets the pace and drives the innovation and is technically quite capable, well-funded and basically unconstrained in their behavior,” he said. “So, you’ve got a very determined adversary that wakes up every day looking for ways to compromise all of our digital infrastructure. It really puts the pressure on the defense to work at the pace of the offense.”
Security
TechRepublic - ChatGPT Security Concerns: Credentials on the Dark Web and More
According to the company, more than 100,000 ChatGPT accounts were stolen between June 2022 and March 2023. More than 40,000 of these credentials have been stolen from the Asia-Pacific region, followed by the Middle East and Africa (24,925), Europe (16,951), Latin America (12,314) and North America (4,737).
Security
The Hacker News - Continuous Security Validation with Penetration Testing as a Service (PTaaS)
PTaaS is a modern approach to delivering penetration testing services. It utilizes a combination of manual human-led pentesting, AI, and automation tools and techniques that accelerate pentesting without false positives. This solution is gaining momentum, as it helps mitigate the cybersecurity skills gap being faced by security leaders at a global level.
Security
CSO - Most businesses to ban ChatGPT, generative AI apps on work devices
Three-quarters of global businesses are currently implementing or considering bans on ChatGPT and other generative AI applications within the workplace, with risks to data security, privacy, and corporate reputation driving decisions to act. That's according to new research from Blackberry which found that 61% of companies deploying/considering generative AI bans view the steps long term or permanent.
ChatGPT
Blocks & Files - Gartner sees shifting players in enterprise backup
Four leading companies – Commvault, Rubrik, Cohesity, and Veritas – are closely positioned. Veeam is distinct due to its superior execution capability but relatively limited vision, while Dell maintains a consistent position from the previous year, marginally trailing the other five.
Data Backup
TechRepublic - Research Eyes Misconfiguration Issues At Google, Amazon and Microsoft Cloud
Smith wrote that Qualys researchers, analyzing misconfiguration issues at Amazon Web Services, Microsoft Azure and Google Cloud Platform, found that within Azure, 99% of the disks are either not encrypted or aren’t using customer-managed keys that give users control of encryption keys that protect data in software as a service applications.
Cloud Security
Computerworld - Hybrid work is entering the 'trough of disillusionment'
The "trough of disillusionment" represents a time when the original excitement about potential value of a product or business practice encounters problems with performance, which leads to missed expectations. For hybrid and remote work, the ongoing polarization of views on where work is best done and uncertain returns on investment in the corporate space have forced hybrid work to descend into the trough, according to Gartner.
Automat
Blocks & Files - Optionality: The key to navigating a multicloud world
What about that bespoke analytics tool your business stakeholders have been wanting to try? Assign it some assets and watch the magic happen. Click some buttons to add more resources as needed. Such efficient development, fueled by composable microservices and containers that comprise cloud-native development, is a big reason why most IT leaders have taken a “cloud-first” approach to deploying applications
Cloud
sdxCentral - Big tech ESG scorecard: Rating Cisco, Dell, HPE, IBM and VMware on sustainability
Gartner analysts predict that by 2026, 75% of organizations will increase the amount of business they do with IT vendors that are focused on specific environmental, social and governance (ESG) goals “and will seek to replace vendors” that don’t demonstrate sustainability progress.
Sustainability
Blocks & Files - Scality claims disk drives can use less electricity than high-density SSDs
Hard disk drives (HDDs) have physical platters that are kept spinning by electric motors and also read/write heads that are moved across platter surfaces by electricity as well. Solid state drives (SSDs), in which data writing and reading relies on electrical currents, have no mechanical moving parts and so, you would assume, need less electricity. The company says this is true when HDDs and SSDs are inactive but not when data is being accessed.
Data Storage
SiliconANGLE - New cyberattack method: tracking typing remotely via keyboard sounds 
They call this an acoustic side channel attack, and it possibly could be used to steal passwords and other critical data from a target’s computer. The accuracy rate drops slightly if the sound is recorded remotely via a Zoom conference via a bad actor participating on the conference call. The combination of better microphones, frequent smartphone usage and machine learning advances have made this possible.
Security
InformationWeek - 5 Pitfalls and Possibilities AI Brings to Cyber Insurance
While companies can greatly benefit from AI’s defensive capabilities, it also introduces risk into their operations. And cyber insurance companies are, naturally, concerned with understanding this risk. Rachel Rossini, product manager, cyber and technology E&O at AXA XL, notes that there is an element of privacy risk with platforms like ChatGPT. What kind of information are employees entering?
Security
VentureBeat - Why people are still key to tech transformation
And while much of the recent conversation surrounding digital transformation has focused on the humans versus robots angle, businesses that ignore their human capital and purely target technology as a means to grow and prosper do so at their peril.
Automation & Productivity
Computerworld - How many jobs are available in technology in the US?
Tech sector companies increased their staffing by 5,432 employees, according to CompTIA’s analysis of BLS data. Leading the way in new IT hires were custom software services and systems design;and PC, semiconductor and components manufacturing.
Tech Jobs
Network World - Who is selling Zero Trust Network Access (ZTNA) and what do you get?
Zero trust also requires buy-in from organizations implementing it. "Zero Trust isn’t just a shopping exercise, however much it helps unlock budget," Holmes says. It’s not something you can simply buy and plug in. An enterprise still needs a cogent approach to data classification, and someone needs to audit employee and third-party privileges. "Both of these are non-trivial, and usually manual tasks,"
Network Management
sdxCentral - Akamai ransomware report shows zero-day exploitation, exfiltration rising
It found ransomware attackers are pivoting from phishing to vulnerability abuse, which has surged both in scope and sophistication. These groups are becoming more aggressive in both extortion and vulnerability exploitation; for example, they started developing zero-day attacks and bug bounty programs in house. They are also willing to pay other hackers for vulnerabilities that can be used in attacks, or to acquire access to their intended targets via initial access brokers, according to the report.
Security
InformationWeek - Teach IT: Why Staff Learning Beats Training
Ron Delfine, executive director of career services at Carnegie Mellon University’s Heinz College, notes that there’s a big difference between training and learning. “IT training is showing individuals how to perform and accomplish a specific task or tasks, while learning can be thought of as a process to apply knowledge across multiple contexts.”
IT Management
Network World - Remote working turbocharged: How WAN Optimization unlocks next-level productivity for remote workers 
According to Andrew Caruth, WAN Optimization is the final piece of the home working jigsaw: “WAN Optimization can accelerate the transition to high-performance remote and hybrid working,” he says. “With the technology in place, home workers will be able to access cloud applications with the same speed and performance as if they had never left the office.”
Automation & Productivity
sdxCentral - 5 reasons why MPLS isn’t dead yet – and won’t be anytime soon
Trust is important for many business decisions, and both business and IT leaders have learned over the years that they can trust MPLS. Thus, for use cases that require high-speed, low-loss connectivity with predictable quality-of-service (QoS), such as video, conferencing and rich media, MPLS remains the top choice.
Network Management
SiliconANGLE - AI as the next computing platform 
What do I mean by the AI platform? Simply put, it is where business requirements and specifications for software converge at a rate higher than could be achieved in the workflows of traditional, more deterministic software. Using generative AI, anyone in an organization can envision a new customer experience and leverage an AI platform to jump start the process of building.
Automation & Productivity
sdxCentral - Red Hat describes how open source and infrastructure at scale drive genAI
No two AI tools are the same, and he hasn’t seen any one vendor emerge as a clear market leader. In order to identify the best AI technologies for specific use cases, Red Hat’s Open Data Hub community works with other partners and open source groups to provide a selection of open source AI tools that are curated to train and “serve up” genAI models.
Artificial Intelligence
AiThority - Machine Learning & Modern Photography: Revolutionizing Visual Art with AI Image Processing
Imagine spending hours manually adjusting color balance, exposure, and contrast in each image. AI-powered editing tools, such as Adobe Sensei, have stepped in to revolutionize this process. With advanced algorithms and deep learning models, these tools can intelligently analyze and enhance images, delivering impressive results in a fraction of the time.
Automation & Productivity
TechRepublic - Google Cloud Study: Big Risk in Proliferating Credentials, Keys
The predominant alerts in the first quarter of 2023, constituting nearly 75% of alerts, were for cross-project abuse of access token generation permissions. Broadly speaking, this is a problem of privilege access management, frequently involving over-provisioned accounts, where IT teams look to increase uptime and reduce complexity by granting too much access to accounts, violating the concept of least privilege.
Security
Harvard Business Review - 3 Steps to Prepare Your Culture for AI
Nearly two-thirds of employees surveyed told us they don’t have enough time or energy to do their job. The cause of this drain is something we identified in the report as digital debt: the influx of data, emails, and chats has outpaced our ability to keep up. Employees today spend nearly 60% of their time communicating, leaving only 40% of their time for creating and innovating. In a world where creativity is the new productivity, digital debt isn’t just an inconvenience — it’s a liability.
Automation & Productivity
AiThority - 10 Plus AI Research Projects That Should Be on Everyone’s Radar
The experiment aimed to enable effective communication between Alice and Bob, ensuring that Bob correctly understood Alice’s messages and that Eve, representing a potential threat, did not intercept them. Bob and Alice had to employ proper encryption and decryption techniques to achieve this. The study revealed an intriguing result: whenever the communication failed in one round, the subsequent round showed a noticeable improvement in the cryptographic abilities of both AI entities.
Artificial Intelligence
TechRepublic - How an 8-character password could be cracked in just a few minutes
Hive found that an 8-character complex password could be cracked in only five minutes if the attacker was to take advantage of the latest graphics processing technology and artificial intelligence. Further, a seven-character complex password could be cracked in 4 seconds, while one with six or fewer characters could be cracked instantly. Shorter passwords with only one or two character types, such as only numbers or lowercase letters, or only numbers and letters, could also be cracked in an instant.
Security
InformationWeek - Why Ambient Computing May Be the Next Big Trend
AI is part of the picture, although perhaps not as much as many people think, Loukides says. Smart thermostats, for instance, learn their users’ preferences. Yet how much learning really goes on? “How often do you actually touch your thermostat?” he asks. “And if you raise the temperature a few degrees because somebody is sick, do you really want the thermostat to ‘learn’ your new ‘preference’ if it’s just a one-time thing?”
EmergingTech
InfoWorld - What is generative AI? Artificial intelligence that creates
Generative AI is called generative because the AI creates something that didn’t previously exist. That’s what makes it different from discriminative AI, which draws distinctions between different kinds of input. To say it differently, discriminative AI tries to answer a question like “Is this image a drawing of a rabbit or a lion?” whereas generative AI responds to prompts like “Draw me a picture of a lion and a rabbit sitting next to each other.”
Artificial Intelligence
VentureBeat - Don’t quit your day job: Generative AI and the end of programming
ChatGPT won’t make the 20% of time programmers spend writing code disappear completely. You still have to write prompts, and we’re all in the process of learning that if you want ChatGPT to do a good job, the prompts have to be very detailed.
Tech Jobs
InformationWeek - Are Public Companies Ready for the New SEC Cybersecurity Rules?
Under the new rules, public companies will be required to disclose information on cybersecurity risk management, strategy, and governance in the annual reports included with their 10-Ks.
Security
AiThority - Top AI Software Companies for Image Recognition
One of the key strengths of the Google Cloud Vision API lies in its robust object detection capabilities. By harnessing cutting-edge algorithms and deep learning models, it can accurately identify and locate objects within images. Whether it’s recognizing common objects, detecting specific products, or identifying complex scenes, the API showcases remarkable accuracy and efficiency.
Automation & Productivity
The Hacker News - MDR: Empowering Organizations with Enhanced Security
Threat Detection Capabilities: The ability to detect both known and unknown threats, coupled with the utilization of the latest threat intelligence, is crucial for an MDR solution's efficacy. Managed XDR solutions that offer extended capabilities should efficiently correlate security telemetry and orchestrate a comprehensive real-time response across the network.
Security
CIO Influence - Why Architecture Matters with Generative AI and Cloud Security
Cloud security encompasses multiple domains – from vulnerabilities, compliance violations, runtime events, to CI/CD security – each with numerous data sources and its own formats and semantics. Most users, including experts, are not experts in all these domains. For AI to be helpful here, it needs to understand the jargon and implications of these knowledge silos and then correlate data from these domains into a cohesive story. It should help users fill their knowledge gap and help them connect the dots between seamlessly unrelated events.
Security
Help Net Security - Cybercriminals can break voice authentication with 99% success rate
After the concept of voiceprints was introduced, malicious actors quickly realized they could use machine learning-enabled “deepfake” software to generate convincing copies of a victim’s voice using as little as five minutes of recorded audio.
Security
sdxCentral - Network slicing maximizes 5G technology, but are security concerns slowing adoption?
A network slice provides specified network capabilities and characteristics – or multiple, isolated virtual networks – to fit a user’s needs. Although multiple network slices run on a single physical network, network slice users are sometimes (depending upon the access level of the individual) authenticated for only one network level, enabling data and security isolation and a much higher degree of security. Individuals can be sanctioned for more than network level.
Network Management
VentureBeat - Why cybersecurity vendors are selling tech stack consolidation with Zero Trust Edge
Forrester’s study reveals that the key drivers behind ZTE adoption include the shift to remote work and distributed assets, increased business speed and disruptive vendors offering integrated network/security, along with profiles of 22 of the leading vendors in the market.
Security
SiliconANGLE - Alarming survey: Many tech experts fail a test of their cybersecurity knowledge 
Two-thirds of the self-described identity management experts did not select the best practices for reducing phishing. The question asked to pick several ways to reduce phishing attacks, and the correct answers were multifactor authentication and tools using the Fast Identity Alliance protocols.
Security
TechRepublic - Could C2PA Cryptography be the Key to Fighting AI-Driven Misinformation?
The C2PA specification is an open source internet protocol that outlines how to add provenance statements, also known as assertions, to a piece of content. Provenance statements might appear as buttons viewers could click to see whether the piece of media was created partially or totally with AI.
Artificial Intelligence
InformationWeek - Is AI Bias Artificial Intelligence’s Fatal Flaw?
AI bias’s impact is far-reaching. “Biased AI systems can reinforce societal stereotypes, discriminate against certain groups, or perpetuate existing inequalities,” observes Alice Xiang, global head of AI ethics at Sony Group, and the lead AI ethics research scientist at Sony AI. “It can result in discriminatory practices in areas such as hiring, healthcare, or law enforcement.” Bias can also erode trust in technology and hinder AI adoption, she notes.
Artificial Intelligence
Computerworld - Apple’s AI strategy should be the same as it's always been
Mail is the essential application everyone kind of hates. Apple has improved it over the last couple of years and new features such as the capacity to delay message sending or remind you of incoming emails make it more useful. But its search facilities are quite limited. An Apple large language model (LLM) could help deliver richer associations between the information you already own, identifying more complex interactions, such as, “Gather all the email that relates to the presentation scheduled for Sept. 19,” for example.
Automation & Productivity
CIO Influence - The State of Upskilling: Tackling the IT Skills Gap
A research study involving more than 1,000 business executives found that organizations are having trouble finding the right candidates because of the skills gap and that the educational system is not doing enough to address the issue. According to the study, 75% of organizations believe the main reason for the difficulty in hiring is the lack of applicant skills. However, 51% claim that the educational system is either making little to no progress or doing nothing at all to address this.
Tech Jobs
TechRepublic - Cybersecurity: How Can Companies Benefit From FBI and Homeland Security Collaboration?
The reasons why large, medium and small companies choose not to report a cyberattack include fear of reputation damage, business disruption and the risks of sharing data with the government. These misconceptions are impacting private companies, as they fail to recognize the benefits of working with federal agencies and law enforcement to respond to cybercrime.
Security
InformationWeek - 6 Challenges and Opportunities for Hybrid and Remote IT Teams
“Protecting the end point (laptop, phone, etc.) has never been more critical. This means that IT teams have an elevated role to play in a hybrid/remote environment,” says Dunne. “I think as work culture continues to shift and evolve, the IT team will be at the forefront of executing its success.”
IT Management
CIO Influence - How to Choose a Third-Party Vendor? by Chris ToddJuly 31, 2023
Rather than relying on multiple-point solutions, invest in higher-value software able to solve multiple problems — and sunset anything extraneous. Organizations prioritizing tech stack consolidation can expect simplified workflows, improved team alignment, higher operational efficiency, and lower costs.
IT Management
eWeek - Generative AI: Enterprise Use Cases
Some enterprises, like marketing and sales-driven companies, have quickly added generative AI use cases into their workflows because of the speed and scale AI tools can bring to content production and customer relationship management efforts. Other industries that have more legal and compliance hoops to jump through — such as healthcare, insurance, and education — have been more hesitant to add generative AI, which is growing quickly but without much transparency or regulation.
Artificial Intelligence
SiliconANGLE - What is a data product? 
In the modern context, data products come in various forms and are accessible to a wide range of users within organizations. These products can be visualized in interactive dashboards in tools such as Tableau or Looker, a recommendation engine behind a retail website, or large language models that interact with users directly.
Data & Analytics
Network Computing - Building Supercloud Starts with Multi-Cloud Networking
Encapsulation solves for a unified control plane and the underlying network and connectivity complexity by taking a platforms approach that exposes operational control of the IT stack as services that require less domain-specific knowledge. This does not rely on a superset of APIs
Network Management
InformationWeek - Developing a Super User Strategy
IT leaders will anticipate pushback from business department managers who don’t want their super users (usually the best performing employees in their departments) to take on new responsibilities. However, in many cases these same super users are already doing the front-line IT job. They do it every time they stop by the desk of an inexperienced employee to help them navigate through a system problem.
IT Management
Blocks & Files - Fortra battles misuse of its cyber security tools
Cobalt Strike is a threat emulation tool provided by cyber security supplier Fortra. It serves as a decoy malware agent known as Beacon, which can reside in an IT environment for an extended period. Acquired in 2020, the tool was designed to aid customers in detecting real malware that has infiltrated their systems. Regrettably, unsupported versions of Cobalt Strike have been co-opted or cracked to distribute actual malware.
Security
CIO Influence - Keeper Security Survey Finds 91% of IT leaders Are Better Protected With Privileged Access Management, but Seek Affordable Solutions Amid Economic Downturn
The report explores global insights from IT and security executives, revealing that while IT leaders consider PAM solutions critical to their security stack, cost constraints and complex solutions are impacting deployment. Fifty-six percent of respondents tried to deploy a PAM solution but did not fully implement it, and 92% cited overly-complex solutions as the main reason. 58% of IT teams have not deployed a PAM solution because traditional platforms are too expensive.
IT Management
InformationWeek - IT Ethics: What It Means for Your Organization
Relatively few IT leaders spend much, if any, time pondering their organization’s values and ethics. Yet as technology continues to integrate itself into virtually every aspect of business and personal life, establishing a moral code is rapidly becoming as important as creating security, employment, asset management, and other fundamental organization policies.
IT Management
VentureBeat - Will law firms fully embrace generative AI? The jury is out | The AI Beat
On the other hand, lawyers tend to be a conservative bunch — and in this case, attorneys would likely be wise to be cautious, with headlines like “New York lawyers sanctioned for using fake ChatGPT cases in legal brief” going viral. Another problem is that their clients may not feel comfortable with law firms using gen AI — a new survey found that one-third of consumer respondents said they’re against any use of gen AI in the legal field.
Artificial Intelligence
Dark Reading - Companies Must Have Corporate Cybersecurity Experts, SEC Says
The original proposal from the SEC in March 2022 said that it wanted companies to publicly declare one cybersecurity expert on the board of directors and one within management. Today the SEC backed off the requirement for the board expert — although it still wants "registrants to describe the board of directors' oversight of risks from cybersecurity threats and management's role and expertise in assessing and managing material risks from cybersecurity threats."
Security
InformationWeek - 10 Reasons for Optimism in Cybersecurity
Executives and boards are more aware of cybersecurity, and so are individual employees and consumers. “We've definitely shifted the thinking that somebody else is going to fix this for us to knowing that we all play a part in keeping our information and our money safe,”
Security
TechRepublic - Gen AI to Increase US Production — With Caveats
Generative AI may increase U.S. labor production, McKinsey found. It could increase productivity by 0.5% to 0.9% annually through 2030. Generative AI is included in a pool of wider automation technology in the survey as well. Total productivity growth could increase by 3% to 4% annually with all automation technologies taken into account.
Automation & Productivity
Computerworld - Return-to-office mandates rise as worker productivity drops
Studies have shown that most bosses believe remote work hurts worker productivity. A survey of 20,000 people in 11 countries by Microsoft this spring found that 85% of business leaders believe the shift to hybrid work has made it harder to have confidence that employees are being productive.
Automation & Productivity
Network World - Flight to cloud drives IaaS networking adoption
IDC describes IaaS cloud networking as a foundational networking layer that allows large enterprises and technology providers to connect data centers, colocation environments, and cloud infrastructure. With IaaS networking, the network infrastructure and services are scalable and available on-demand, provisioned and consumed just like any other cloud service
Network Management
Computerworld - UK intelligence agencies seek to weaken data protection safeguards
Currently, a judge has to approve the examination and retention of BPDs, a process that intelligence agencies have described as “disproportionately burdensome” when applied to “publicly available datasets, specifically those containing data in respect of which the subject has little or no reasonable expectation of privacy.”
Data Privacy
The Hacker News - What is Data Security Posture Management (DSPM)?
Data discovery and classification tools have been around for years. But they've lacked the ability to offer any business context. If you can find sensitive data but don't know whether it's business critical or not, and don't understand its security posture, it's not much help to the security team that's trying to prioritize thousands of alerts from different tools.
Security
Computerworld - Apple plays nice with others for an OpenUSD metaverse
Apple, Adobe, Pixar, Autodesk, NVIDIA, and the Joint Development Foundation have joined forces to develop a standard that can be used to underpin mixed- and virtual-reality experiences — a move that also undermine Meta's efforts in the AR/VR arena.
Metaverse
sdxCentral - Arista Networks predicts Ethernet will power AI networking
Beyond just what is happening with Ethernet, Arista is also building out capabilities in its extensible operating systems (EOS) networking platforms to handle the demands of AI. She explained that AI traffic and performance demands are different from other network traffic as it comprises a small number of synchronized high-bandwidth lanes, making them prone to collisions that slow down the job completion time of AI clusters.
Network Management
AiThority - Wipro’s State of Cybersecurity Report Highlights the Emerging Challenges for CISOs
“Political and economic uncertainties, coupled with the rise of sophisticated new technologies, including generative AI and machine learning, is creating a widening cyber resiliency gap within many enterprises,
Security
sdxCentral - SD-WAN by the numbers: Market size, growth, adoption
“Case in point: some networking and security companies gobbled up the original SD-WAN vendors and have integrated their SD-WAN solutions into routers, WAN-optimization controllers, and cloud-based security solutions such as [cloud access security broker], [secure web gateway (SWG)] and next-generation firewall.”
Network Management
AiThority - Survey Shows Top-Down Pressure to Adopt Generative AI, But Just 30% of Enterprises are Ready to Do So Today
Although nearly 80% of the 900 global executives surveyed had a high or significant level of trust that GenAI could be leveraged for their company’s future offerings and operations, more work is to be done. Eighty-six percent of respondents agree more governance is needed to ensure the quality and integrity of GenAI insights, and 66% also expressed concerns around GenAI’s potential for bias and disinformation.
Artificial Intelligence
VentureBeat - 5 great jobs in VR and AR across the U.S. this week
One of those is the AR, VR and mixed reality (MR) industry. A cornerstone of the forthcoming metaverse, which, despite Meta’s reversal on its stance, is growing. Numerous industries are dipping their toes into AR and AV, including gaming, manufacturing, healthcare, advertising, sports, entertainment, military logistics, education, retail and real estate.
Tech Jobs

SiliconANGLE - Surge in threat activity in OT and IoT environments uncovered by Nozomi Networks
In terms of malware, denial-of-service activity was found to remain prevalent against OT systems. Remote access trojan attacks followed DoS attacks and are noted as being used to establish control over compromised machines. In IoT network domains, distributed denial of service attacks were found to continue to be a top threat.
Security
VentureBeat - Generative AI is quickly infiltrating organizations, McKinsey reports
So far, North America-based respondents lead the globe in terms of gen AI adoption for work, with 28% of them using the tech in their jobs and outside of work, compared to 24% of European respondents and 22% of Asia-Pacific respondents (Greater China was just 19%).
Artificial Intelligence
SiliconANGLE - Google’s Web Environment Integrity project raises a lot of concerns 
These fingerprints have been around for many years and began their life as part of the HTML v5 specifications. They are a very rich and detailed look at the inner workings of a user’s computer, and the data is collected automatically and without the user’s explicit approval with any web server. Readers can get an idea of what is collected with tools such as BrowserLeaks.com or AmIUnique.org.
Data Privacy
VentureBeat - IBM study reveals how AI, automation protect enterprises against data breaches
The more integrated AI, automation and threat intelligence are across tech stacks and SecOps teams, the stronger they make an enterprise against breaches. Follow-on benefits include greater cyber-resilience, and spending less on data breaches than enterprises with no AI or automation defenses at all.
Security
SiliconANGLE - What is a data platform? 
Data represents how the business works and captures its history and current state. With artificial intelligence, data predicts a business’s future state. Increasingly, changes in operational data, not humans interacting with a user interface, drive applications. In addition, as more and more application logic is embodied in AI models, an enterprise’s data actually sets the design-time application logic itself by “programming” the AI at training time.
Data & Analytics
VentureBeat - How CISOs can engage the C-suite and Board to manage and address cyber risk
The role of the CISO is no longer to be a tactical facilitator or pure technologist. It’s about being a transformative leader that tightens the gap between the organization’s cybersecurity and business operations to help drive market adoption and sustained success.
IT Management
SiliconANGLE - Five best practices to capture AI value 
AI benefits are also difficult to plan for because they require business actions, as well as process and behavioral changes, that go beyond the direct control of AI teams. It can also be challenging to attribute benefits specifically to AI model outputs. This often results in a fundamental gap between AI model outputs and business benefits: Organizations could have the best AI models, yet still fail at delivering value.
Automation & Productivity
CIO Influence - Telefónica Tech Identifies The Cybersecurity Landscape Shifts Amidst Rising Threats With The Help Of Recent Stats
In response to escalating cyber threats, a staggering 60% of large UK businesses have opted to outsource their cybersecurity operations. The primary reasons cited for this strategic move include gaining access to specialised expertise, abundant resources, and adherence to stringent security standards.
Security
Blocks & Files - DDN says generative AI/ML work needs balanced read/write IO mix
“It has been typically seen that ML workloads have small read and write access patterns,” and “Most ML jobs are perceived to be read-intensive with a lot of small reads while a few ML jobs also perform small writes.”
Data Storage
CIO Influence - Future Ready Leadership: Fostering the Success of Emerging Leaders
Today, emerging leaders arrive in the workplace with a pre-nurtured skillset from the tech-driven world they have grown up in. As digital natives, emerging leaders are already proficient in new technologies, sometimes more so than existing leaders. With this in mind, young people shouldn’t be patronized and instead encouraged to allow existing skillsets to thrive and inspire their colleagues.
Tech Jobs
CIO Influence - Is ChatGPT Effective in Finding in Vulnerability Discovery?
Recently, ChatGPT was put to an acid test by a leading bug bounty and security services platform for the web3 domain. The results were astonishing when 64% of whitehats surveyed by the company found that ChatGPT provided inconclusive answers in vulnerability discovery.
ChatGPT
sdxCentral - How to use Gartner’s Hype Cycle for your zero-trust and SASE strategies
“Zero trust, it’s similar now to a word like cloud or a word like software-defined, where so many people use it, it means everything to everyone and nothing to everyone at the same time,” he said. “One thing we see is our clients sometimes struggle to delineate things that truly exhibit zero-trust characteristics from just pure vendor marketing,”
Security
VentureBeat - It won’t be long before we are all chatbot prompt engineers
I checked the job boards for prompt engineering openings and wasn’t impressed. On Indeed.com, there were only 13 open positions. On LinkedIn there were 282 listed, with most from head hunting firm Crossover. If you can believe the posted salaries, most were in the low six figures. At the lower end, freelance site Fiverr lists 367 providers, starting at $5 per job
Automation & Productivity
sdxCentral - The 5G paradox: Why increasing IoT efficiency creates new security risks
Additionally, 5G also will speed up the attacks on enterprises that use the IoT inside their corporate systems. The challenge now is for enterprise security to become faster than the attackers, and that has yet to happen on a widespread basis.Security
CIO Influence - Cautious Enterprises Still Eyeing Hybrid Cloud Objectives
Enterprises make outsourcing decisions on cloud services based on factors including attitudes toward data center integration, virtualization, governance, downtime and data loss, ISG says. These decisions are also shaped by each organization’s cloud maturity and goals for cloud implementation.
Cloud
The Hacker News - A Data Exfiltration Attack Scenario: The Porsche Experience
The /charging/WebAjaxGet endpoint of the vulnerable website (campaigns.porsche.com) did not properly sanitize nor encode query string parameter values before including them in the HTML server response. Bad actors could have exploited this issue to inject arbitrary code into the server response, which would end up being executed by the web browser into the victims' session context
Security
AiThority - 15 Important Skills Required to Become an AI Engineer in 2023
Now, don’t confuse them with data scientists, though. Data scientists are all about digging out those valuable insights from big datasets. But our AI engineers come from an IT background and have a mission to create algorithms for AI apps and make them play nicely with the rest of the company’s tech.
Tech Jobs
SiliconANGLE - API cyberattacks projected to jump nearly tenfold by 2030
“APIs and modern microservice architecture are central to nearly all innovation we’ve seen emerge in recent years,” noted Whaley. “That’s everything from generative AI to decentralized blockchain, and the future applications appear limitless. The research, however, indicates poorly managed and leaky APIs have left the back door open to security threats that carry significant individual and macroeconomic consequences.”
Security
AiThority - How AI Is Redefining Application Security
AI-powered software testing is about to revamp the way we develop and secure code. In this article, I want to explain why the rise of AI-powered testing tools is introducing the cultural and procedural change we so desperately need to build secure applications amidst growing complexity.
Security
Computerworld - AI tools could leave companies liable for anti-bias missteps
AI in many forms has been around for decades, but it wasn’t until computer processors could support more sophisticated models and generative AI platforms such at ChatGPT that concerns over biases, security, and privacy escalated. Over the past six months, issues around bias in hiring and employee evaluation and promotion have surfaced, spurring municipalities, states, and the US government to create statutes to address the issue.          
AI Ethics
AiThority - 62 Percent of Legal Professionals Are Not Using AI and Feel The Industry Is Not Ready For The Technology
“But companies can’t ignore the need for integrative platforms, centralized solutions, and cloud-based collaboration that will enable them to accelerate outcomes through the use of AI. By leaping over this foundation, legal businesses will be at risk of giving AI incomplete information to analyze, cutting off automation where it could help make an entire process more efficient, and losing those employees who want advancement but are given a poor experience as a result.”
LegalTech
VentureBeat - What enterprise leaders need to know about generative AI: 8 key takeaways from VB Transform
Most enterprise companies have huge challenges in getting their data in order, and if they ignore or avoid this, they will miss out on the benefits of generative AI. Data is the fuel for the large language models (LLMs) that fuel generative AI, and without clean, reliable and secure data, LLMs will not perform well, or will even cause harm.
Artificial Intelligence
Computerworld - Is generative AI mightier than the law?
The letter made clear how seriously the FTC takes the investigation. It wants vast amounts of information, including technical details about how ChatGPT gathers data, how the data is used and stored, the use of APIs and plugins, and information about how OpenAI trains, builds, and monitors the Large Language Models (LLMs) that fuel its chatbot.
Data Privacy
The Verge - The little search engine that couldn’t
Google reportedly pays Apple as much as $15 billion a year to be the default search engine in Apple’s Safari browser on various devices. Google also pays Mozilla to be the primary search engine in the Firefox browser — reported to be upwards of $450 million a year. It has similar deals with other device makers and browser developers, even with wireless carriers.
Automation & Productivity
Computerworld - Was Steve Jobs right about this?
It seems particularly relevant — as employers everywhere flock to explore generative AI — that Unesco warns that it is critical to ensure digital tech supports humans, rather than replacing them. While that’s essential to society in general, in education it matters to ensure children grow up with good social skills.
Tech 4 Good
VentureBeat - Adobe product leader says AI won’t kill graphic design, even as employees worry
“No; AI will increase the surface area that creatives can consider and explore before finding even better solutions to pursue and iterate. [W]e see this in early research on how creative pros leverage these new tools: they’ll create more and better content … faster. [N]ot less,” he wrote.
Artificial Intelligence
Network World - Is your data center ready for generative AI?
Neural networks require tremendously dense high-performance computing (HPC) clusters of GPU processors running continuously for months, or even years at a time, Martynek says. “They are more efficiently run on dedicated infrastructure that can be located close to the proprietary data sets used for training,” he says.
Automation & Productivity
sdxCentral - VMware hails anti-ESG messages as disadvantageous noise
“Smart companies,” she explained, sift through the noise. This looks like taking action to prepare for evolving regulations, designing for resilience, considering “scenarios for energy in the future” and taking care of human capital. “Our people who create value for our business – our suppliers [and] our customers – those stakeholders are fundamentally important to business viability,” she argued.
ESG
The Hacker News - The Alarming Rise of Infostealers: How to Detect this Silent Threat
RedLine and Vidar, two well-known stealers, took advantage of log-providing services to infiltrate private systems. RedLine primarily targets credentials and cryptocurrency wallets on Windows systems, as well as browser information, FTP connections, game chat launchers, and OS data. Vidar relies on delivery methods such as phishing emails and cracked software for dissemination.
Data Privacy
FedScoop - Building security resilience across global missions with next-gen firewalls 
More than half (55%) of respondents reported that their security tools function moderately to completely independently from their suite of solutions. And 33% said their organization uses between 11 to 40 different vendors across their security technologies, while 11% use more than 50 security vendors.
Security
Tech Startups - Anik Singal Reviews Legit Uses of ChatGPT and Other AI Marketing Tools
By using a mixture of ChatGPT, Speechify, and Invideo, you’re able to rapidly create faceless videos in a matter of minutes. AI tools are fantastic at speeding up processes that you’re already familiar with and creating automatic pathways you can set in motion. For example, you can get ChatGPT to create a script on any topic you want, generate audio with Speechify, then create a background video with Invideo.
Marketing Tech
Cyberscoop - Safeguarding data is our best hope to control AI
“The foundation of any generative AI model is the underlying data . . . exceptionally large datasets.” So it makes sense that we address the current issues related to data management first, before we speculate on how it will be used by AI.
Artificial Intelligence
Network World - Cisco, Arista, HPE, Intel lead consortium to supersize Ethernet for AI infrastructures
AMD, Arista, Broadcom, Cisco, Eviden, HPE, Intel, Meta and Microsoft announced the Ultra Ethernet Consortium (UEC), a group hosted by the Linux Foundation that’s working to develop physical, link, transport and software layer Ethernet advances.
Network Management
Blocks & Files - Backblaze warns of AI-assisted cyber threats
The report provides a comprehensive review of ransomware’s prevalence, attack vectors, the sequence of events during an attack, and the necessary steps for responding to an attack. It stops short of suggesting foolproof methods to prevent attacks from breaching IT infrastructure, as no solution that is 100 percent reliable exists.
Security
AiThority - Explosive Popularity of AI and LLMs—and How They Impact Application Security
Existing LLM technologies still can’t be used to reliably assist in malware detection and scale–in fact, they accurately classify malware risk in barely 5% of all cases. They have value in manual workflows, but will likely never be fully reliable in autonomous workflows. That’s because they can’t be trained to recognize novel approaches, such as those derived through LLM recommendations
Security
CIO Influence - IaaS Cloud Networking Gains in Importance as Organizations Seek Seamless Operations Across Multiple Platforms, According to IDC
IDC defines IaaS networking as public cloud-based IaaS network services in which all the network infrastructure and services are elastic and on demand. They are provisioned and consumed just like other cloud services. The five major segments of the IaaS networking market included in IDC’s research are direct cloud connects/interconnects, cloud WAN (transit), ADCaaS (IaaS load balancing), IaaS service mesh, and cloud VPNs (to IaaS clouds).
Network Management
The Guardian - ‘A certain danger lurks there’: how the inventor of the first chatbot turned against AI
Computer scientist Joseph Weizenbaum was there at the dawn of artificial intelligence – but he was also adamant that we must never confuse computers with humans.
Artificial Intelligence
Harvard Business Review - Boost Your Productivity with Generative AI
Up to 300 million full-time jobs could be replaced by applications powered by these technologies, according to a recent report by Goldman Sachs. At the same time, hundreds of new categories of jobs could be created, and the overall global productivity could be boosted by around 7% annually over a 10-year period.
Automation & Productivity
Forbes - Cyber Certifications Have Failed. There Is A Better Way To Build And Prove Cyber Skills
According to the Cyber Workforce Resilience Trend Report, despite years of security awareness training, almost half of organizations say their employees would fall victim to a phishing email. And certifications are proving to be ineffective: Although almost all (96%) organizations encourage IT and cybersecurity teams to gain industry certifications, only 32% of respondents agree that industry certifications are effective.
Security
sdxCentral - Source code is the most common sensitive data shared to ChatGPT
Netskope’s report also revealed that sensitive data is shared with genAI applications at a troubling frequency within large enterprises: per 10,000 enterprise users, there are approximately 183 incidents of sensitive data being posted to the app monthly.
Security
Network World - The real risk of AI in network operations
One who tried generative AI technology on their own historical network data said that it suggested a configuration change that, had it been made, would have broken the entire network. “The results were wrong a quarter of the time, and very wrong maybe an eighth of the time,” the operations manager said. “
Network Management
Peter H. Diamandis - STAFF ON DEMAND: INCREASING YOUR COMPANY’S GROWTH & IMPACT
In today’s blog, we’ll look at how SoD works, its benefits, some examples of successful SoD platforms, and why this approach to staffing matters in our fast-changing environment.
Automation & Productivity
sdxCentral - Will 5G replace Wi-Fi? (Or will they coexist and complement each other?)
He pointed out that it’s important to understand what 5G means for enterprise. While technically the same as public macro 5G accessed via smartphones and other devices, private 5G networks are what they sound: Private. That is, they are nonpublic and can be licensed, unlicensed or shared.
Network Management
Datanami - Deloitte Survey: Majority of CEOs Exploring Generative AI Despite Rising Geopolitical Uncertainty
The “Fortune/Deloitte CEO Survey” series tracks the perspectives and actions of CEOs from some the world’s largest and most influential companies. The survey gives key insights into CEOs’ priorities, challenges and expectations across more than 19 industries, including technology, finance and health care.
Emerging Tech
Computerworld - It’s time to break the ChatGPT habit
Stanford scientists recently published their work taxonomizing LLMs. They identified — wait for it — 15,821 currently available LLMs. And to help us understand and contextualize them, the researchers built a resource called Constellation, which is what they call an “atlas” of LLMs for visualizing them.
ChatGPT
VentureBeat - The top 10 technologies defining the future of cybersecurity
CISOs from insurance, financial services and professional services enterprises tell VentureBeat that their goal is to access the latest AI and ML technologies to help reduce tool sprawl and alert-fatigue, help close skill gaps and shortages, and eliminate response inefficiencies.
Security
Computerworld - ‘Windows is a declining ecosystem,' Jamf CEO says
Apple's forays into the enterprise are succeeding and likely to push aside Windows over the next decade, according to outgoing Jamf CEO Dean Hager. “...In 10 years’ time, Windows will not be the dominant ecosystem; ...Apple is coming up because it already dominates the mobile enterprise."
Automation & Productivity
SiliconANGLE - Solving cybersecurity complexities in multicloud deployments 
“We are seeing the majority of customers running services in multiple cloud providers,” he said. “That might be a combination of your traditional virtual system, but in many cases they’re using a lot of managed services and serverless technologies as well — database technologies, container hosting environments, serverless functions. Then, of course, don’t forget all your SaaS applications, which are ultimately living in the cloud as well.”
Security
sdxCentral - Top 10 certifications for building a SASE career
The MEF SD-WAN Certified Professional cert has the most value for those in presales, applications teams, product management/marketing, those designing and developing SD-WANs, and those in operations, service and support.
Tech Jobs
SiliconANGLE - On theCUBE Pod: The cloud wars rage on as others declare ‘AI or die!’ 
“You have two cultures. Microsoft’s the big scripted culture, everything about Microsoft is about optics: ‘Look how great we’re doing,’” he said. “They are, as of today, out-marketing and out-PR’ing AWS. It’s not even close. It’s like a shutout. It’s a 10-run rule in baseball, Little League. They’re getting killed. Game over.”
Cloud
SiliconANGLE - NetApp’s chief security officer calls for new approaches to securing the cloud 
NetApps Inc.’s chief security officer (pictured) has written about streamlining data protection and simplifying security processes for cloud architectures. Her approach challenges the security industry to assess the true effectiveness of various practices and create a more secure cloud ecosystem as the technologies surrounding it become more complex.
Security
VentureBeat - AI for execs: How to cut through the noise and deliver results
For decision-makers at large enterprises, LLMs (and AI in general) present a head-scratching number of options. Every single business function can get the AI treatment. The first thing to consider is the differing maturity and development levels of each solution. It can be attractive to experiment with the latest innovation or create your own unique use cases, but this naturally carries some risk.
Automation & Productivity
eWeek - How Cloud Cost Optimization Can Help Solve the Tech Hiring Crisis
For workers outside the tech sector, the Great Resignation is over. Voluntary employee resignations have receded nearly back to pre-pandemic levels, and employers no longer report the deep hiring and retention challenges for most roles that they faced a year or two ago.
Tech Jobs
Blocks & Files - Gartner storage hype cycle has selective memory
Storage Class Memory was rising up the Slope of Enlightenment in 2022 but faced setbacks after Intel discontinued Optane. However, technologies like SCM-class SSDs, MRAM, and RERAM continue to be developed. Notable trends from last year’s storage hype cycle include the disappearance of Copy Data Management, Enterprise Information Archiving, Persistent Memory DIMMs, and Management Software-Defined Storage.
Data Storage
SiliconANGLE - IBM Security report finds data breach costs have hit new highs in 2023 
According to the report, businesses are divided in how they plan to handle the increasing cost and frequency of data breaches. The study found that though 95% of studied organizations have experienced more than one breach, breached organizations were more likely to pass incident costs onto consumers — 57% — than to increase security investments, at 51%.  
Security
Network World - Data centers grapple with staffing shortages, pressure to reduce energy use 
“Digital infrastructure managers are now most concerned with improving energy performance and dealing with staffing shortfalls, while government regulations aimed at improving data center sustainability and visibility are beginning to require attention, investment, and action,”
Data Management
SiliconANGLE - ChatGPT can write ransomware, but what about incident response plans? 
Immediately I noticed significant gaps in the IR plan generated by ChatGPT. It could only outline the definition of an IR plan and provide a general overview of what types of procedures an IR plan should include rather than presenting a detailed, step-by-step playbook on how to manage the specific theoretical incident.
ChatGPT
CIO Influence - Data Monetization in 2023 – Better Late Than Never
People used to think the best approach was bringing an organization’s data into one massive database. That idea has fallen out of fashion. Data is everywhere – on premises, in your cloud and service provider Clouds, at the Edge and elsewhere. And, more non-IT folks in lines of business are now managing and owning data. You need to meet your data where it lives.
Data Management
Blocks & Files - NetApp, Pure Storage witness dip in all-flash market share
Hybrid flash/disk and disk revenues declined 2 percent year-on-year. The total external storage capacity shipped experienced a 24 percent year-on-year growth, with secondary storage capacity witnessing a massive 70 percent increase, backup storage rising by 18 percent, and primary storage capacity seeing a modest 3 percent rise.
Data Storage
Digital Information World - AI Tech is a Huge Threat to Privacy, Here’s Why
The tech needs vast quantities of data in order to be fully functional, yet most users might not know the extent of this data collection. More transparency is needed for the purposes of leaving users better informed, otherwise the industry simply won’t be able to progress without compromising on ethics which are a core component of the tech space.
Artificial Intelligence
Make Use Of - What Are Dark Web Alerts? Know When Your Info Falls Into the Wrong Hands
A dark web alert is a notification you receive when any data associated with you appears on the dark web. A threat monitoring tool generates an automatic message when it detects your personally identifiable information. These alerts inform you about your data being in the wrong hands, and unless you do something to stop them, someone will use the data for illegitimate activities.
Privacy & Security
Computerworld - Apple eyes a late arrival to the generative AI party
But, perhaps even more importantly, any LLM tech Apple does eventually choose to deploy will have access to all of a person’s on-device information and access to the machine intelligence-supporting Neural Engine that sits inside every device.
Artificial Intelligence
The Hacker News - Azure AD Token Forging Technique in Microsoft Attack Extends Beyond Outlook, Wiz Reports
This includes every application that supports personal account authentication, such as OneDrive, SharePoint, and Teams; customers applications that support the "Login with Microsoft functionality," and multi-tenant applications in certain conditions.
Security
VentureBeat - Generative AI and Web3: Hyped nonsense or a match made in tech heaven
While AI and blockchain have both been around for decades, the impact of AI, in particular, is now visible with ChatGPT, Bard and the entire field of generative AI players. Together with Web3’s decentralized power, we’re about to witness an explosion of practical applications that build on progress automating interactions and advancing Web3 in more visible ways.
Emerging Tech
TechStartups - ChatGPT’s accuracy in solving basic math declined drastically, dropping from 98% to 2% within just a few months, study finds
The study identified significant fluctuations in the ChatGPT’s capabilities, referred to as “drift,” while performing specific tasks. The researchers focused on two versions of the technology: GPT-3.5 and GPT-4. Notably, they observed remarkable variations in GPT-4’s ability to solve math problems.
ChatGPT
TechRepublic - What is DevOps Automation?
Several processes can be automated in DevOps to streamline the SDLC. You can automate continuous integration (code compilation, build processes, unit testing, packaging, artifact creation, etc.) and continuous delivery (deployment to staging and production environments, integration and functional testing in multiple environments, smoke tests, etc.)
DevOps
SiliconANGLE - Top sports CIOs provide lessons for IT operations in all industries
One interesting point that did come up was the 5G-Wi-Fi debate. Although 5G is a viable, sometimes preferred option for fans, the data generated by telco-based services is invisible to the team. Some of the CIOs echoed their frustration with the telcos’ inability to provide the same level of granular data as they get from the Wi-Fi network. This is a business opportunity the telcos should capitalize on but to date have not.
IT Management
VentureBeat - How businesses can shape the (safer) future of social media
Take “strengthening and enforcing age minimums” as one example where nuance is easily lost. The goal itself is laudable, but we need to strike a tricky balance: verifying identity to keep young people safe, but without requiring personal information that can be aggregated and used for harm by others.
Social Media
The Verge - The biggest AI release since ChatGPT
Companies will now be able to more easily and cheaply build bespoke bots with proprietary data that would never be accessible externally, like the internal AI bot that Stripe recently rolled out for its employees. This will make AI chatbots of all kinds more useful and personalized, which is an exciting step in the right direction.
Artificial Intelligence
VentureBeat - AI, automation to take center stage as IT demands surge: Salesforce survey
While AI and automation have been helping businesses for quite some time, current IT needs position the technologies squarely for mainstream adoption. In the survey, 78% of IT leaders said the role of AI in their organization is already well-defined, with the top uses being service operations optimization, new AI-based products, customer service analytics and customer segmentation
Automation & Productivity
SiliconANGLE - AI gives cyber attackers the advantage – for now 
Moreover, macro spending headwinds continue to force organizations to make budget tradeoffs, not the least of which is how to fund AI experiments and deployments. Notably, however, 45% of organizations are using LLMs in production for use cases that may very well improve the productivity of security operations teams in the long run and accelerate the cat-and-mouse game back to a state of quasi-equilibrium.
Security
Network World - Gartner: Generative AI not yet influencing IT spending, but enterprises should plan for it
“Generative AI’s best channel to market is through the software, hardware and services that organizations are already using,” Lovelock stated. “Every year, new features are added to tech products and services as add-ons or upgrades. Most enterprises will incorporate generative AI in a slow and controlled manner through upgrades to tools that are already built into IT budgets.”
IT Management
CSO Online - Sophisticated HTTP and DNS DDoS attacks on the rise
These included DDoS attacks launched by pro-Russian hacktivist groups like REvil, Killnet, and Anonymous Sudan against Western websites; a large increase in targeted DNS attacks; UDP amplification attacks leveraging a vulnerability in Mitel MiCollab business phone systems; and an alarming escalation in HTTP attack sophistication, the company said.
Security
VentureBeat - 59% of orgs lack resources to meet generative AI expectations: Study 
The study also found that 66% of respondents cannot fully measure the impact and return on investment (ROI) of their AI/ML projects on the bottom line. This highlights the profound inability of underfunded, understaffed and under-governed AI, ML and engineering teams in large enterprises to quantify results effectively.
IT Management
Computerworld - Microsoft 365 Copilot — a new desktop productivity revolution begins
Bing Chat Enterprise will eventually have a $5 incremental per user price for those not under one of the included licensing programs; it provides the benefits of Bing Chat, but secures internal data. The data is not shared externally or used to train the primary generative AI platform.
Automation & Productivity
VentureBeat - The growing impact of generative AI on cybersecurity and identity theft
For instance, a data breach offers a treasure trove of usernames and passwords, and then bots infiltrate accounts and conduct brute force attacks using that data. With AI’s ability to process large amounts of information, that process is stunningly fast. And with AI, attackers can create combinations of passwords based on PII as well. As an example, it can use your password as a guide to what passwords you might choose across other sites.
Privacy & Security
Computerworld - Apple: Proposed UK law is a ‘serious, direct threat’ to security, privacy
The UK Home Office is pushing proposals to extend the Investigatory Powers Act (IPA) with a range of proposals that effectively require messaging providers such as Apple, WhatsApp, or Meta to install backdoors into their services. All three services are now threatening to withdraw messaging apps from the UK market if the changes move forward.
Privacy & Security
eWeek - Autonomous AI Agents
Unlike other forms of artificial intelligence, autonomous AI does not require repeated human inputs, hands-on guidance, or as much ongoing training to do its work. After its specialized infrastructure – which includes generative AI – is set up and it receives its initial training on massive datasets, an autonomous AI agent can do what it’s trained to do based on environmental and context clues.
Artificial Intelligence
Blocks & Files - Social media’s reaction to generative AI proves just how valuable data is
But perhaps an area that is sparking the biggest seismic shifts is in social media, where typically, the platforms are granted some level of access and assigned rights via terms of service and offer a free platform as a result. The challenge here is that many had built extensions to their platforms using APIs or allowed unfettered access to users, and now they see GenAI as a massive threat to their efforts and valuation.
Data Management
Computerworld - Medical data sharing: Are we there yet?About 70% of all hospitals and ambulatory providers are sharing records electronically over national interoperability networks, says Tripathi, but have fallen short of providing complete access to patient data from all providers. The planned rollout later this year of government-certified Qualified Health Information Networks (QHINs), which Tripathi says will function as a “network of networks” for sharing health data nationwide, should help push participation levels higher.  
MedTech
SiliconANGLE - Empowering innovation through the fusion of AI and security: Supercloud 3 event wrap-up analysis The distribution of value and the emergence of abstractions is a recurring pattern in technology waves, according to Vellante. The supercloud wave follows this pattern, making tasks faster, simpler and easier to use. With the advent of AI, applications powered by human intellect and data become valuable intellectual property. This simplification and democratization of technology will lead to a Cambrian explosion of applications, transforming industries and the way we work.Emerging Technology
sdxCentral - Zero-trust principles stand firm in the face of generative AI threatsWith all the new threats that are coming in, a lot of those zero-trust principles will be automated to an extent. The connectivity that needs to happen and the amount of data that’s available, and building models on top of it, I think that will only become advanced and that will make people’s life easier,” Venkata said.Security
SiliconANGLE - Report: Apple built ‘Apple GPT’ chatbot using internal AI development framework Ajax, Apple’s framework for building large language models, was reportedly created last year. Its purpose is to “unify” the company’s various machine learning development initiatives. That may mean Apple has asked its engineers to standardize their workflows on Ajax instead of using multiple, disparate AI development tools with overlapping feature sets.Artificial Intelligence
SiliconANGLE - Endor Labs report warns AI and LLMs struggle to classify malware risk The rise of services such as OpenAI LP’s ChatGPT application programming interface comes in for particular attention, with the report finding that almost half of all applications make no calls to security-sensitive APIs in their code base.Security
Computerworld - AI-skills job postings jump 450%; here's what companies wantUpwork’s freelance job site lists 294 skills under “AI Services.” Roles gaining steam include prompt engineers, AI content creators, machine learning and deep learning engineers, data scientists, AI chatbot developers, and professionals with model tuning and AI model integration expertise,Tech Jobs
SiliconANGLE - How Google’s AI Red Team is shaping the future of cybersecurity Google released its Secure AI Framework in June to help companies protect artificial intelligence models from hacking. The framework is aimed at ensuring that when AI models are implemented, they are secured by default. SAIF can help companies stave off attempts to steal a neural network’s code and training dataset and can be useful for blocking other types of attacks.Security
Computerworld - This is why personal encryption is vital to the future of businessData encryption is threatened by government forces who haven’t yet recognized that without personal security, you cannot have enterprise security. Because attackers will exploit any available weakness to undermine protection — and if your people or your customers aren't secure, neither is your businessSecurity
sdxCentral - Standalone 5G continues slow simmer — will enterprises spur growth?A 5G SA core, which consists of the user plane, control plane and shared data layer network functions, allows operators to deliver a more resilient core network and support highly-touted 5G services like network slicing, automation, orchestration and mobile edge computing (MEC). This differs from a non-standalone (NSA) 5G core that relies on an operator’s legacy 4G LTE core for base processing and routing, but lacks access to the more advanced 5G features.5G
SiliconANGLE - Gartner: Worldwide cloud infrastructure spending topped $100B for the first time in 2022 AWS continued to lead the IaaS segment by a wide margin in 2022. According to Gartner, $48.12 billion of the $120.3 billion that organizations spent on cloud infrastructure went to buying AWS resources. In percentage terms, the Amazon.com Inc. unit grew its market share to 40% last year from 38.1% at the end of 2021.Cloud
CIO Influence - 10 Things You Should Know About the Modern Data Infrastructure Dynamics in 2023CIOs and CISOs recognize that any chink in their existing data infrastructure management could cost their businesses millions of dollars in wasted resources, lost opportunities, and security incidents. Worse, if left unaddressed, these gaps can result in data breaches and compliance-related penalties. Most leaders understand that data infrastructure is critical to digital transformation, a majority of these front-line professionals also accept that it takes more than just a good data center or a cloud computing platform to address all the issues related to data management.Data Management
SiliconANGLE - The rise of zero-trust architecture and the role of AI in supercloud security He outlined a strategic approach for organizations, including asking key questions such as whether an organization’s zero-trust security solutions reduce external attack surfaces and enforce consistent security with full transport layer security inspection, as well as if companies have measures in place to contain the blast radius in case of a breach and consistently inspect outgoing data to prevent data exploitation.Security
TechRepublic - Can Generative AI Be Used to Apply for a Job?“Not enough job seekers are using AI just to play around with it and to be able to find different versions of their resume,” Chad Sowash, former recruiter and cohost of the HR industry podcast Chad and Cheese, said. “Whether they’re looking for VP of Marketing or CMO or any type of position, they can come up with really great rough drafts from generative AI.”Automation & Productivity
Tech Startups - Indian coders and programmers will lose their jobs in 2 years due to AI, Stability AI CEO saysHowever, in India, Mostaque noted that “outsourced coders up to level three programmers will be gone in the next year or two, whereas in France, you’ll never fire a developer.” He added, “So it affects different models in different countries in different ways in different sectors.”Tech Jobs
AiThority - Biggest AI Trends Transforming the Customer Service Industry (And, How You Can Prepare for the Future)According to the Equinix 2023 Global Tech Trends Survey, business leaders are planning to invest heavily in Artificial Intelligence tools for contact centers (71%), sales (73%), Marketing (75%), Customer Experience Management (79%), and IT Operations (85%). Clearly, customer-centric teams are more likely to adopt AI tools and solutions to stay competitive in the vastly volatile market conditions in 2023Automation & Productivity
SiliconANGLE - The brewing battle for data platform dominance Our Angle is that a data platform is more than a storage solution. It offers comprehensive functionality, including the ability to access data programmatically through SQL queries and RESTful application programming interfaces, built-in virtualization tools, and the capability to extract, transform and load data to and from various sources, such as data warehouses, data lakes, and object storage.Data Management
VentureBeat - Hollywood is on strike over AI, but companies see creative potential in digital humansHowever, a flock of high-flying generative AI video startups, including Synthesia, Hour One and Soul Machines, don’t see it that way. They view AI-generated avatars, or digital humans, as filled with powerful creative potential for business, Hollywood, and celebrities who consent to the use of their AI likenesses.Artificial Intelligence
AiThority - The Rapidly Approaching Gen AI Transformation of Financial MediaBroker and analyst reports will be able to be generated at unprecedented scale. There are a handful of companies who have developed the piping to be able to communicate in real-time with LLMs with analytical financial data. These technologies are not only reshaping how financial information is produced and disseminated but also–and perhaps more importantly–democratizing access to high-quality financial analysis.FinTech
Network World - IDC: Server and storage price hikes fueled cloud infrastructure growthThe research firm’s quarterly enterprise infrastructure tracker finds that spending on compute and storage infrastructure products in the first quarter increased 14.9% year over year to $21.5 billion. Spending on cloud infrastructure continues to outpace the non-cloud segment, which declined 0.9% in 1Q23 to $13.8 billion.Cloud
sdxCentral - Graph databases gain traction as AI uses expand data management stackGraph databases are gaining attention as enterprises work on their next-generation  artificial intelligence (AI) applications. While still a bit of an outlier, graph-oriented databases continue to find a role in the modern data stack. Using the concepts of nodes, edges and properties rather than tables, graph databases represent relationships and store complex data in a way that relational databases can’t.Data &am
SiliconANGLE - Endor Labs report warns AI and LLMs struggle to classify malware risk 
The rise of services such as OpenAI LP’s ChatGPT application programming interface comes in for particular attention, with the report finding that almost half of all applications make no calls to security-sensitive APIs in their code base.
Security
Computerworld - AI-skills job postings jump 450%; here's what companies want
Upwork’s freelance job site lists 294 skills under “AI Services.” Roles gaining steam include prompt engineers, AI content creators, machine learning and deep learning engineers, data scientists, AI chatbot developers, and professionals with model tuning and AI model integration expertise,
Tech Jobs
SiliconANGLE - How Google’s AI Red Team is shaping the future of cybersecurity 
Google released its Secure AI Framework in June to help companies protect artificial intelligence models from hacking. The framework is aimed at ensuring that when AI models are implemented, they are secured by default. SAIF can help companies stave off attempts to steal a neural network’s code and training dataset and can be useful for blocking other types of attacks.
Security
Computerworld - This is why personal encryption is vital to the future of business
Data encryption is threatened by government forces who haven’t yet recognized that without personal security, you cannot have enterprise security. Because attackers will exploit any available weakness to undermine protection — and if your people or your customers aren't secure, neither is your business
Security
sdxCentral - Standalone 5G continues slow simmer — will enterprises spur growth?
A 5G SA core, which consists of the user plane, control plane and shared data layer network functions, allows operators to deliver a more resilient core network and support highly-touted 5G services like network slicing, automation, orchestration and mobile edge computing (MEC). This differs from a non-standalone (NSA) 5G core that relies on an operator’s legacy 4G LTE core for base processing and routing, but lacks access to the more advanced 5G features.
5G
SiliconANGLE - Gartner: Worldwide cloud infrastructure spending topped $100B for the first time in 2022 
AWS continued to lead the IaaS segment by a wide margin in 2022. According to Gartner, $48.12 billion of the $120.3 billion that organizations spent on cloud infrastructure went to buying AWS resources. In percentage terms, the Amazon.com Inc. unit grew its market share to 40% last year from 38.1% at the end of 2021.
Cloud
CIO Influence - 10 Things You Should Know About the Modern Data Infrastructure Dynamics in 2023
CIOs and CISOs recognize that any chink in their existing data infrastructure management could cost their businesses millions of dollars in wasted resources, lost opportunities, and security incidents. Worse, if left unaddressed, these gaps can result in data breaches and compliance-related penalties. Most leaders understand that data infrastructure is critical to digital transformation, a majority of these front-line professionals also accept that it takes more than just a good data center or a cloud computing platform to address all the issues related to data management.
Data Management
SiliconANGLE - The rise of zero-trust architecture and the role of AI in supercloud security 
He outlined a strategic approach for organizations, including asking key questions such as whether an organization’s zero-trust security solutions reduce external attack surfaces and enforce consistent security with full transport layer security inspection, as well as if companies have measures in place to contain the blast radius in case of a breach and consistently inspect outgoing data to prevent data exploitation.
Security
TechRepublic - Can Generative AI Be Used to Apply for a Job?
“Not enough job seekers are using AI just to play around with it and to be able to find different versions of their resume,” Chad Sowash, former recruiter and cohost of the HR industry podcast Chad and Cheese, said. “Whether they’re looking for VP of Marketing or CMO or any type of position, they can come up with really great rough drafts from generative AI.”
Automation & Productivity
AiThority - Biggest AI Trends Transforming the Customer Service Industry (And, How You Can Prepare for the Future)
According to the Equinix 2023 Global Tech Trends Survey, business leaders are planning to invest heavily in Artificial Intelligence tools for contact centers (71%), sales (73%), Marketing (75%), Customer Experience Management (79%), and IT Operations (85%). Clearly, customer-centric teams are more likely to adopt AI tools and solutions to stay competitive in the vastly volatile market conditions in 2023
Automation & Productivity
SiliconANGLE - The brewing battle for data platform dominance 
Our Angle is that a data platform is more than a storage solution. It offers comprehensive functionality, including the ability to access data programmatically through SQL queries and RESTful application programming interfaces, built-in virtualization tools, and the capability to extract, transform and load data to and from various sources, such as data warehouses, data lakes, and object storage.
Data Management
VentureBeat - Hollywood is on strike over AI, but companies see creative potential in digital humans
However, a flock of high-flying generative AI video startups, including Synthesia, Hour One and Soul Machines, don’t see it that way. They view AI-generated avatars, or digital humans, as filled with powerful creative potential for business, Hollywood, and celebrities who consent to the use of their AI likenesses.
Artificial Intelligence
AiThority - The Rapidly Approaching Gen AI Transformation of Financial Media
Broker and analyst reports will be able to be generated at unprecedented scale. There are a handful of companies who have developed the piping to be able to communicate in real-time with LLMs with analytical financial data. These technologies are not only reshaping how financial information is produced and disseminated but also–and perhaps more importantly–democratizing access to high-quality financial analysis.
FinTech
Network World - IDC: Server and storage price hikes fueled cloud infrastructure growth
The research firm’s quarterly enterprise infrastructure tracker finds that spending on compute and storage infrastructure products in the first quarter increased 14.9% year over year to $21.5 billion. Spending on cloud infrastructure continues to outpace the non-cloud segment, which declined 0.9% in 1Q23 to $13.8 billion.
Cloud
sdxCentral - Graph databases gain traction as AI uses expand data management stack
Graph databases are gaining attention as enterprises work on their next-generation  artificial intelligence (AI) applications. While still a bit of an outlier, graph-oriented databases continue to find a role in the modern data stack. Using the concepts of nodes, edges and properties rather than tables, graph databases represent relationships and store complex data in a way that relational databases can’t.
Data & Analytics
VentureBeat - How AI can improve the future of incident response
“I think the future is self-healing software; the future is applying these models to our code bases to discover vulnerabilities and fix them before our attackers can find them,” Zoller told the Transform audience. “Because I can tell you, as a human running a human team, we are not equipped to operate at the velocity of what our attackers are going to bring to us in the next two to three years.”
Security
TechRepublic - Using Snapshots to Improve Data Security
Snapshots are point-in-time copies that provide near-instantaneous data protection. By copying storage metadata rather than on the data itself, they provide a record of where each block of data is stored. Not only does this not take up much space, but it can also typically be done in a few seconds.
Data Management
The Verge - SEC is worried chatbots could fuel a market panic
Gensler said the large demand for data and computing power could mean only a few tech platforms may dominate the field, narrowing the field of AI models companies can use. If a model provides inaccurate or irrelevant information, financial institutions may end up using the same flawed data and making the same bad decisions — creating the risk of something like the 2008 financial crisis, where banks played “follow the leader” based on information from credit raters, or the Twitter-fueled run on Silicon Valley Bank.
Artificial Intelligence
Datanami - Dresner Advisory Services Publishes Inaugural Enterprise, Social, and Governance Reporting Market Study
According to the study, adoption of ESG reporting is currently low, with only 32 percent of organizations using it today. Current usage is highest in EMEA, and in larger organizations. Despite low adoption, there is good awareness of ESG reporting, with a total of 64 percent of respondents regarding it as important to their organization.
ESG
SiliconANGLE - The state of collaboration: It’s the people, not the tech, who make it all work 
With all this technology, it’s easy to lose sight of the fact that what makes for great collaboration is to have people with complementary skills working together on a project. Without a culture of collaboration, all the fancy tools won’t do much to make people more inclined to share their work, their thoughts and their expertise.
Automation & Productivity
VentureBeat - The knowledge economy is dead. Long live the intuition economy
Another way to view it: AI will never replace humans, as the doomsayers fear, but as AI systems grow more intelligent, they will force people to become smarter and more creative too. The value of pure knowledge decreases; the importance of what is done with that knowledge rises.
Artificial Intelligence
The Verge - Christopher Nolan wants Oppenheimer to be a cautionary tale for Silicon Valley
“The rise of companies over the last 15 years bandying about words like ‘algorithm,’ not knowing what they mean in any kind of meaningful, mathematical sense. They just don’t want to take responsibility for what that algorithm does.”
Artificial Intelligence
VentureBeat - The secret to enterprise AI success: Make it understandable and trustworthy
This is where the concept of AI interpretability comes in. It is the process of understanding the reasoning behind decisions or predictions made by machine learning systems and making that information comprehensible to decision-makers and other relevant parties with the autonomy to make changes.
Artificial Intelligence
VentureBeat - 3 ways AI is already transcending hype and delivering tangible results
Today, the hype cycle is so hot that even companies without legitimate AI credentials are trying to align themselves with the technology, prompting the Federal Trade Commission to issue a terse warning to companies: “If you think you can get away with baseless claims that your product is AI-enabled, think again.”
Artificial Intelligence
eWeek - Top 6 AI Trends 2023
However, it’s important to note that the majority of these generative AI companies are fine-tuning or otherwise relying on third-party foundation models rather than building their own infrastructure. In the near future, expect the generative AI market to start to consolidate, with leaders like Google, Microsoft, OpenAI, possibly Amazon, and others vying for preferred provider spots for both foundation models and AI assistant tools.
Artificial Intelligence
SiliconANGLE - AI won’t be a winner-takes-all market
I remember being in Singapore and somebody was telling me they wanted to use those algorithms to do fluid modeling for tsunamis over the surface of the Singapore landmass. I’m like, “That is the wrong use for that.” So, I think those original algorithms had a certain set of utility that are more narrow, and I think the value of LLMs and the range of utility is going to be spectacular, but probably half as big as people actually think.
Artificial Intelligence
eWeek - F5 Report: Hybrid IT Is Here To Stay
Some apps work better in a physical data center, and others work better in one or more clouds. However, public clouds aren’t being used as much as expected. Five years ago, most organizations planned to have half of their apps in the cloud. But three years later, only half of those surveyed had any apps in the cloud. Many are worried about data control, security, or costs.
IT Management
SiliconANGLE - Attackers target the Domain Name System, the internet’s phone book. Here’s how to fight back 
This shift, especially as superclouds, containers and multiple application collections create and destroy virtual instances millions of times a day, puts tremendous stress on the DNS infrastructure. Without a fully functioning DNS, the workloads and workflows can easily get in trouble: packets disappearing or dropped, malicious software supply chains taking control, and web servers brought down, requiring restarting or, worse, rebuilding before they can return to production.
Security
Blocks & Files - Could NAND capacity replace HDDs by 2029?
One of the most important discussions in the storage industry has been opened up by Pure Storage saying no new hard disk drives (HDDs) will be sold after 2028. Pure’s bold claim means that all the capacity of the new HDDs – ones not replacing failed drives – that would have shipped in 2029 will be replaced by shipped SSD capacity. That is a huge number of extra SSD shipments, and raises a question about global NAND manufacturing capacity being able to make enough flash.
Data Storage
sdxCentral - SD-WAN tips from the trenches
“Challenges have been that it’s not recommended to have same subnets on different sites, so that is one thing we have had to clean up,” Hjørland said. “We also still haven’t removed all the old firewalls on the different sites, this is something we will concentrate to do in next phase.”
Network Management
Blocks & Files - We need network air traffic control for files
According to Bleeping Computer, the malware people behind the Forta vulnerability used MFTaaS “to create user accounts in some customer environments.” The accounts then downloaded files, exfiltrating them from the MFTaaS facility. Other malware tools, Netcat and Errors.jsp, were reportedly loaded into some Fortra customers’ systems to facilitate file downloads and backdoor activity.
Security
SiliconANGLE - Understanding these nine ransomware stages can help harden cyber defenses 
A variety of tools come into play through these nine stages — for example, a way to monitor potential intrusions, which can often be as subtle as a few network packets, or a way to examine outbound data flows, which can be an indication of an attack in its later stages. By breaking the attack down into these stages, organizations can assess if their tool collection is adequate or if there are holes that need filling to shore up their defenses.
Security
Network World - New ML benchmarks show best algorithms for training chatbots
The MLPerf Training benchmark suite is a full series of tests that stress machine-learning models, software, and hardware for a broad range of applications. It found performance gains of up to 1.54x compared to just six months ago and between 33x and 49x compared to the first round in 2018.
Automation & Productivity
TechRepublic - Gartner: Due to stress, half of cyber leaders will change jobs, and a quarter will quit the field
Partly due to emerging technologies such as Web 3.0, conversational artificial intelligence, quantum computing and supply chains, along with increasingly sophisticated attacks, security leaders now have more influence in the C-suite. However, as Craig Porter, director advisory for Gartner’s Security Research and Advisory team said, “Threat actors have access to powerful tools like ChatGPT, which can generate polymorphic malware code that can avoid detection, or even better, write a convincing email.
Tech Jobs
VentureBeat - Integrating intelligent automation: Advice from Citi Ventures
Now we’re in a “hyper-automation” phase, he said, which involves performing more complex tasks across multiple systems using multiple technologies. One example: applying optical character recognition to understand what a document is, and natural language processing (NLP) to contextualize it, then feed it into an algorithm so that data can be used to make decisions.
Automation & Productivity
TechRepublic - Generative AI defined: How it works, benefits and dangers
In generative AI, algorithms are designed to learn from training data that includes examples of the desired output. By analyzing the patterns and structures within the training data, generative AI models can produce new content that shares characteristics with the original input data. In doing so, generative AI has the capacity to generate content that appears authentic and human-like.
Artificial Intelligence
AIThority - Operational Efficiency Emerges as Key Driver in Modernization Investments as Enterprise Spending to Hit $33 Million on Average, Couchbase Research Finds
These survey results show how an efficient approach to digital transformation, taking full advantage of advances in data, cloud and AI can help with business resiliency, and at the same time pursue new growth opportunities.And rightly so, empowering developers has emerged as a key priority for enterprises, demonstrating their commitment to innovation.”
Automation & Productivity
VentureBeat - Network, IAM and cloud are the top 3 cybersecurity spending priorities for 2023
Ransomware breach attempts fell by 30% last year as attackers pivoted to new attack strategies that are proving more lucrative and less detectable. As attackers out-innovate the current generation of security platforms, total attack activity continues to grow, despite budgets growing too in an uncertain economic climate.
Security
AIThority - OPSWAT Survey Reveals Only 2 Percent of Organizations Feel Confident with Current Security Strategies
By adopting and combining advanced threat prevention technologies like multi-AV scanning, CDR, DLP and dynamic threat analysis, organizations can effectively establish multiple lines of defense against known and unknown emerging threats and safeguard their critical infrastructure.”
Security
sdxCentral - AWS sees a role for generative AI in the telecom space
“In installation of network equipment today, you have technicians who go through manuals and have procedures to install routers and base stations and connect links and fibers,” Parulkar said. “That all can be now made interactive [using] chat bot, natural language kind of framework.
Network Management
SiliconANGLE - Five thoughts from the Cisco collaboration device tour 
The Cisco devices natively interoperate with Webex, Teams, Zoom and Google Meet so users can join meetings across those platforms without having to reboot the device.
Automation & Productivity
Datanami - Forrester: Generative AI Dominates Top 10 Emerging Technologies In 2023 And Beyond
Conversational AI, enabled by generative AI, is the second top emerging technology that will deliver the fastest ROI. E-commerce, B2B sales, and customer service functions will see the biggest impacts from conversational AI. AWAs will also deliver near-term benefits for most firms, as they are poised today to take over increasingly complex but repetitive human tasks.
Artificial Intelligence
AiThority - Legal Tech Industry Likely to Become a Big Avenue for Generative AI Tools
For example, only 14% of firms think generative AI would have a ‘positive’ impact on their legal practice. In contrast, 8% of respondents see AI having a ‘negative’ impact on their existing practices. 67% of firms have a mixed feeling toward any kind of generative AI involvement.
Artificial Intelligence
Network World - AI is changing server sales but paying off for enterprises
Omdia found that demand for compute resources remains high. However, it also reports that demand for more expensive servers with specialized hardware for AI model training (translation: GPUs) are being prioritized over the typical enterprise server with just a CPU.
Automation & Productivity
sdxCentral - Inside the infrastructure behind Amazon Prime Day: 4 lessons for IT
The resulting fleet handled 11.4 trillion requests per day and transferred 532 petabytes of data per day. More than 5,300 database instances processed 288 billion transactions, stored 1,849 terabytes of data and transferred 749 terabytes of data. Furthermore, Amazon Simple Queue Service set a new traffic record by processing 70.5 million messages per second at peak, the company reported.
IT Management
VentureBeat - AI and cybersecurity: Friends, foes, collaborators
First and foremost, it is critical to educate employees on the risks of AI and implement guardrails to ensure data protection, said Harbison. Models must be well trained with the right datasets that can’t be manipulated. Enterprises also don’t want to have models that may produce hallucinations that can disrupt business decisions.
Security
Computerworld - 7 questions to ask when considering a new Apple MDM platform
Like many parts of IT infrastructure, MDM needs to integrate with a variety of core disciplines, particularly identity management, user support and self-service portals, network management, and security. Investing in the right platform should make the lives of IT administrators, end users, and anyone in between more friction-free, while choosing the wrong MDM can create headaches, bottlenecks, and support tickets.
IT Management
Datanami - Couchbase Study Shows IT Modernization and Business Resilience as Top Priorities for Enterprises
78% of IT decision makers confirm their main priorities for transformation have changed in the last three years. 54% say their digital transformation focus has become more reactive to market changes and customer preferences in order to help the wider organization stay agile.
IT Management
VentureBeat - Why learning the language of humans is key to enable generative AI for automation
“You get the rigor of business logic and you’re still following a business process meticulously,” said Gill. “But then there are places where you need some kind of human judgment. That’s where it will accelerate the human with still require human permission, and over time your business gets faster and faster.”
Automation & Productivity
Computerworld - Microsoft Dev Box — a better path to provisioning and productivity?
Microsoft Dev Box is a cloud workstation instance that can be rapidly configured to the unique needs of a new developer. No hardware needs to be ordered, no capital expenses approved, and there’s no shipping or lengthy setup time. The Dev Box can be deployed from the Dev Portal, configured against guidelines by project, and will immediately be in compliance with data management and security practices.
Automation & Productivity
SiliconANGLE - Managing supercloud authentication remains tricky – with no easy solution in sight 
The situation is made worse yet by sloppy access controls, which were a perennial problem for information technology departments even before clouds were invented. Proofpoint Inc.’s annual Human Factor report, based on its customers’ telemetry from 2022, says that “around 10% of endpoints have an unprotected privileged account password, with 26% of those exposed accounts being domain administrators.” Those percentages can only increase as clouds become more complex and pervasive.
Cloud
VentureBeat - VentureBeat Transform Day 1: Moving fast with care advised for AI adoption
Today’s efforts are mostly focused on technology, model size and data size. But we should focus on human needs if we want everyone to benefit from this new wave of technology.
Artificial Intelligence
TechRepublic - How AI Will Impact the Future of Your Work?
The World Economic Forum’s The Future of Jobs Report 2023 found that AI is expected to be adopted by nearly 75% of surveyed companies, with 50% of organizations expecting it to create job growth. The study found that the fastest-growing roles are driven by technology, digitalization and sustainability.
Artificial Intelligence
Blocks & Files - Veeam CTO on SaaS backup, chatbots and ransomware
And the framework approach? “We have not introduced a framework per se, mostly because we believe that there is value in having specific capabilities around the SaaS service. If you do the generic framework, you end up with generic data protection and generic data recovery, and you’re dependent on the partner to write to it.”
Security
TechStartups - How to improve your startup’s cybersecurity with ChatGPT
Phishing, as the most common kind of cybercrime, has been a prevailing problem for both individuals and companies in various industries. Chat GPT can aid with the analysis of phishing emails or help you create better phishing awareness training.
Security
AiThority - Focus on Upskilling Your Workforce for Generative AI Success
Generative AI is extraordinarily powerful and the whole argument about AI taking our jobs, well, forget about it—it’s ancient history. The real talk now is all about the exciting roles that Generative AI is set to create. We’re talking about AI auditors, AI ethicists, and more, as reported by the Capgemini Research Institute. Generative AI has found a deeper adoption in the marketing, sales and customer service departments, where AI-generated responses are driving better personalization and contextual conversations with customers.
Tech Jobs
Forrester Study Highlights Companies Need to Invest in Zero Trust AI to Protect ML Integrity and Security
Alarmingly though, the majority of respondents noted they currently rely on manual processes to address ML model threats and 86% of respondents were ‘extremely concerned or concerned’ about their organization’s ML model security. To address this challenge, a majority of respondents expressed interest to invest in a solution that manages ML model integrity and security within the next 12 months.
Security
Computerworld - Microsoft wants you to pay for Windows from the cloud — good luck with that
With that in mind, the company is considering doing the same thing for Windows, but with an even stronger focus on the cloud. If Microsoft has its way, not only will people pay an annual subscription for Windows, but they’ll also load Windows directly from the cloud rather than on their own PCs.
IT Management
AiThority - Demystifying Artificial Intelligence vs. Machine Learning: Understanding the Differences & Applications
AI and ML are closely related, but what sets them apart is their scope and specific uses. AI encompasses a broader concept of creating intelligent machines capable of mimicking human intelligence, while ML focuses on enabling computers to learn and improve from data without explicit programming.
AI/ML
Network World - Are AI-powered networks already outperforming SD-WAN?
Comparatively, SD-WAN is able to detect that there is a connectivity issue, but can’t fix it. SD-WAN is dependent on the best efforts of the internet - and can only control the exit point from which the traffic will reach its destination, such as private lines, internet, or DIA.
Network Management
VentureBeat - Embracing responsibility with explainable AI
“I always tell people, ‘Don’t clean your data,’ because lots of data is dirty and messy,” she said. “And that’s just life, and we have to have models that adjust to that.”
Artificial Intelligence
SiliconANGLE - Bugcrowd finds hackers are more skeptical about AI than Silicon Valley investors 
Bugcrowd’s annual Inside the Mind of a Hacker report found that more than half of respondents, 55%, said that AI could already outperform hackers or will be able to do so within the next five years. However, hackers aren’t worried about being replaced, with nearly three out of four respondents, 72%, saying that generative AI will not be able to replicate the creativity of hackers.
Security
sdxCentral - When multicloud becomes reality
While some may arrive at multicloud on purpose, most are getting there organically. In fact, multicloud really is a natural progression of an organization’s requirement to leverage best-of-breed technology from any number of cloud providers to enable innovation. And, as that survey showcased, innovation is the true value of cloud computing.
Cloud
AiThority - World’s Largest Association of Computing Professionals Issues Principles for Generative AI Technologies
Drawing on the deep technical expertise of computer scientists in the United States and Europe, the ACM TPC statement outlines eight principles intended to foster fair, accurate, and beneficial decision-making concerning generative and all other AI technologies. Four of the principles are specific to Generative AI, and an additional four principles are adapted from the TPC’s 2022 “Statement on Principles for Responsible Algorithmic Systems.”
Artificial Intelligence
Network World - Gartner: SSE landscape shifts as vendors add more security services
A security-centric offshoot of SASE is security service edge, or SSE, which is essentially SASE minus the SD-WAN. SSE combines several key security functions – including a cloud-access security broker (CASB), secure web gateway, zero-trust network access (ZTNA), and a next-generation firewall – into a cloud-based service to streamline management.
Security
sdxCentral - AWS and Nokia: It’s time for telcos to overcome SaaS-shift reluctance
“You can imagine the level of scrutiny that public hyperscalers and SaaS providers get — not only our own audits and compliance requirements, internal and external audits by third-party assessors, [and] regulatory assessment that is done routinely, but also supporting customer audits of our infrastructure.”
Security
VentureBeat - Slack’s vision for enterprise AI: Empower ‘everybody to automate’
Slack has embraced automation technologies and leveraged large language models (LLMs) from OpenAI and Anthropic to more efficiently summarize busy channel activity in the instant messaging platform. It also generates new work flows from the contextual information found in a company’s online discussion.
Automation & Productivity
SiliconANGLE - US senators sound slightly overwhelmed at first-ever classified briefing on artificial intelligence 
Although the senators agreed in a chorus that the road ahead will be difficult and it’s a road that needs to be constantly monitored, possibly with new laws around AI, some aired concern that too much legislation could hamper development in the U.S. as other nations surge ahead in AI.
Artificial Intelligence
Computerworld - 4 collaboration security mistakes companies are still making
What’s more, organizations that adopt collaboration platforms such as Microsoft Teams, Slack, Box, Dropbox, GitHub, Jira, Asana, and others are often focused on the productivity benefits. Securing these platforms, communications, and the data that they share is typically an afterthought — if it’s thought about at all,
Security
SiliconANGLE - Unveiling Neeva’s AI search: Maximizing data insights and simplifying retrieval 
“But as I said, generative AI was a big unlock for us, because we said, ‘we can get away from giving you a set of links where you have to do the work to go figure out maybe it’s the 40th paragraph that has the answer to the question that you’re looking for,'” he explained. “What it let us do was figure out the right components of the page that supply the answer for you and give you this really pithy, understandable, but believable summary of what you needed to see.”
Automation & Productivity
VentureBeat - MosaicML CEO Naveen Rao on how to democratize generative AI and why he sold to Databricks for $1.3B
He also made a bold prediction that open source models will eventually overtake closed models, just like Linux did with Solaris. “Open source is really just getting started. So in five years, I think the world will look a bit different.
Artificial Intelligence
SiliconANGLE - Generative AI revolution: Here’s where theCUBE analysts see the tech going next 
“All the insiders, we know, have been doing AI for a long time. Google’s one of them. Google has so much AI. It’s ridiculous how good they are. Now, the question is, can they hold on to their engineers?” Furrier said on a recent episode of theCUBE podcast. “Or will they flee to join a hot startup? Can they get out of their own way to create good products?”
Artificial Intelligence
Network World - Multiple SD-WAN vendors can complicate move to SASE
The SASE model combines network security functions with WAN capabilities, delivering the security elements in the cloud and using SD-WAN at the edge or in the cloud. Key security functions include secure web gateway (SWG), zero trust network access (ZTNA), firewall as a service (FWaaS), and cloud access security broker (CASB).
Security
Blocks & Files - Unsure about your generative AI plans? Start with your data
What’s interesting is that while 70 percent of developers surveyed by Stack Overflow say they are already using or plan to use GenAI in coding, only 42 percent trust the accuracy of the output in their tools. This tells us we’re still relatively early in the GenAI cycle, but the rate of acceleration might keep some leaders up at night.
Artificial Intelligence
Techstartups - Top Generative AI Startups of 2023
By leveraging advanced AI techniques, generative AI startups can generate new content that is both creative and original. This includes generating written text, such as articles or product descriptions, as well as other forms of content like images, videos, or even music. These startups are at the forefront of pushing the boundaries of what AI can accomplish in terms of content creation.
Artificial Intelligence
SiliconANGLE - Pinpoint: Cybersecurity funding dropped 55% in the second quarter 
Sasson explained that though there is an ongoing need for robust cybersecurity measures, the rising trend of established vendors expanding through acquisitions implies that investors are distancing themselves from startups that aren’t performing well. “The industry seems to be shifting its attention to cutting-edge cybersecurity technologies that are poised to fuel both innovation and mergers and acquisitions.
Security
VentureBeat - Maximizing ChatGPT potential: Building business-specific plugins for your company and customers
The Wolfram plugin gives ChatGPT access to computation, math, curated knowledge and real-time data and visualization through Wolfram|Alpha and Wolfram Language. Other plugins can dive into knowledge bases, or perform tasks like booking a flight (see the plugins created by Kayak and Expedia), making reservations (OpenTable’s entry), shopping for groceries (Instacart’s plugin) and more, without a user leaving the chat window.  
ChatGPT
SiliconANGLE - Enterprise-grade generative AI automation: Unpacking the hype, understanding the challenges 
Although generative AI has already spawned much experimentation, most demonstrations are focused on the technology’s ability to generate outputs — text, music, art and even code templates — as guided by human prompts. These outputs, while impressive in their own right, are generally understood to be first drafts, often with varying degree of acceptable errors and omissions, such as an entry-level assistant might provide.
Artificial Intelligence
Computerworld - Q&A: How AI can help enterprise HR automate employee experiences
"We had a high amount of onboarding that needed to be done virtually. When lockdown happened in COVID, we needed to onboard like 800 people…in multiple batches of 200 people each, things like that. So, we gamified it. We made it a spaceship. You're going to take a tour like astronauts and earn gold coins."
Automation & Productivity
sdxCentral - AT&T, Orange, Verizon top two managed SD-WAN ranking lists
ISG labeled those three operators as “leaders” across the five sectors the research firm tracks: managed SD-WAN, SDN transformation services, enterprise networks technology and service suppliers, edge technologies and services, and secure access service edge (SASE) solutions and services. Consulting firm WiPro was also labeled a leader across those same five segments.
Network Management
Computerworld - Annual public cloud revenue reaches half a trillion dollars 
This foundational spending, according to IDC, reflects the growing dependence organizations have on data and AI services, distributed computing and app frameworks. Spending on IaaS and PaaS, in particular, should continue to grow more quickly than the overall public cloud market, which cloud providers have reacted to by deploying increasingly high-performance infrastructure.
Cloud
VentureBeat - Code Interpreter comes to all ChatGPT Plus users — ‘anyone can be a data analyst now’
Code Interpreter allows ChatGPT Plus users to generate charts, maps, data visualizations and graphics, analyze music playlists, create interactive HTML files, clean datasets and extract color palettes from images. The interpreter unlocks a myriad of capabilities, making it a powerful tool for data visualization, analysis and manipulation.
ChatGPT
eWeek - Navigating the Perfect Storm with Applied Intelligence
But humans are slow, much slower than an AI algorithm in the cloud. In the time it takes for a seasoned professional to make one decision, AI can ask thousands of questions, get just as many answers, and then winnow them down to an array of targeted, executed optimizations.
Automation & Productivity
VentureBeat - How AI is reshaping the rules of business
First, we need to update our requirements for businesses developing and deploying AI models. This is particularly important when we question what “responsible innovation” really means. The U.K. has been leading this discussion, with its government recently providing guidance for AI through five core principles, including safety, transparency and fairness.
Artificial Intelligence
eWeek - Best Text Analysis Tools 2023
The primary purpose of text analysis tools is to automate the analysis of large volumes of text, uncover patterns, sentiments, and relationships within the data, and derive valuable insights for decision-making, research, or other purposes.
Data & Analytics
VentureBeat - How generative AI tools like ChatGPT can revolutionize web accessibility
Despite efforts to improve web accessibility over the years, internet accessibility is far from available to everyone. WebAIM’s 2022 accessibility report showed that only one in four websites passed the basic accessibility standards of the Web Content Accessibility Guidelines (WCAG).
Automation & Productivity
eWeek - What is AIaaS? Guide to Artificial Intelligence as a Service
Artificial intelligence as a service, often referred to as AIaaS, is a service artificial intelligence companies provide to customers, offering them access to AI technologies and AI-powered business operations through the cloud without requiring them to invest in their own AI infrastructure.
Artificial Intelligence
SiliconANGLE - Connecting the dots on the emerging Databricks tech stack 
Rather, Snowflake is likely years ahead in terms of operationalizing data. Developers can build applications on one platform, like Oracle Corp. when it won the database market, that perform analysis and take action. Databricks likely has a similar lead in terms of unifying all types of analytic data – business intelligence, predictive analytics and generative artificial intelligence.
Data & Anaytics
TechRepublic - The Importance of Penetration Testing in Cloud Security
Penetration testing simulates real-world attacks. The goal for the penetration tester is to find and exploit vulnerabilities in the cloud infrastructure and report it to the requesting entity, generally the chief information security officer. It’s performed under guidelines from the cloud service providers.
Security
Computerworld - How many jobs are available in technology in the US?
Among the six top tech occupation categories, three have shown positive gains through the first half of 2023: IT and custom software services and systems design; PC, semiconductor and components manufacturing; and cloud infrastructure, data processing and hosting.
Tech Jobs
sdxCentral - What role will mmWave spectrum have in 5G and 6G?
While the FCC has been able to free up some lower-band spectrum resources – most specifically the C-band in the 3.7 GHz to 3.95 GHz band that is currently the basis for Verizon and AT&T to boost their 5G capacity – the more than 1,000 megahertz of new spectrum being requested will have to come from the mmWave band. This is considered spectrum residing above the 20 GHz band, and can span all the way up to 100 GHz.
5G
Computerworld - Annual public cloud revenue reaches half a trillion dollars
The actual figure was $545.8 billion, IDC’s research found, a sum that represents a 22.9% increase over the previous year. Foundational cloud services — which IDC defines as infrastructure, platform and system infrastructure software delivered as services — grew even more quickly, rising by 28.8% in year-on-year terms.
Cloud
sdxCentral - Critical vulnerability still threatens 69% of Fortinet firewalls after a month, exposing patch challenges
Despite the patch release and Fortinet’s advisories, security consulting firm Bishop Fox found only 153,414 devices on the internet have been patched out of nearly 490,000 exposed SSL-VPN interfaces, which means around 69% of Fortinet firewalls are unpatched.
Security
Computerworld - Lawyers and Incident Response can be a dangerous combo
Lawyers and C-suite leaders have the same basic mission: protect the enterprise from bad actors who want to do harm. But they often often approach the job in such polar opposite ways that they wind up fighting each other instead of working together.
Security
VentureBeat - Generative AI’s secret sauce — data scraping— comes under attack
Data scraping practices in the name of training AI have come under attack over the past week on several fronts. OpenAI was hit with two lawsuits. One, filed in federal court in San Francisco, alleges that OpenAI unlawfully copied book text by not getting consent from copyright holders or offering them credit and compensation. The other claims OpenAI’s ChatGPT and DALL·E collect people’s personal data from across the internet in violation of privacy laws.
Data Privacy
Computerworld - Digital transformation, AI, and the productivity problem
When we learn about process optimization, we usually discuss a concept called “the critical path.” This is the path a process has that defines how quickly something can get done. If you improve anything but the critical path, the rate at which the process completes is still gated by the untouched critical path and you’re unlikely to see a productivity improvement.
Automation & Productivity
Network World - Networking, security initiatives dominate IT spending priorities
The most prevalent connectivity concerns that CIOs say they’re dealing with are network performance issues (cited by 37% of respondents), expanding connectivity into new markets (37%), and the constraints of legacy platforms (35%).
IT Management
Datanami - IDC: Compute and Storage Cloud Infrastructure Spending Continued to Grow as Prices Soared in 1Q 2023
For 2023, IDC forecasts cloud infrastructure spending to grow 7.3% compared to 2022 to $96.4 billion – a slight improvement from the prior outlook for the year of 6.9%. Non-cloud infrastructure is expected to decline 6.3% to $60.4 billion. Shared cloud infrastructure is expected to grow 8.4% year over year to $68.0 billion for the full year, while spending on dedicated cloud infrastructure is expected to grow 4.8% to $28.4 billion for the full year.
Cloud
VentureBeat - Gartner survey: Most corporate strategists find AI and analytics critical to success
Conducted between October 2022 and April 2023, the poll highlights enterprises’ growing focus on next-gen technologies. Now, companies are looking at advanced systems not only to handle repetitive or basic tasks but also high-value projects directly related to business growth, such as strategic planning and decision-making.
Artificial Intelligence
sdxCentral - The evolving role of CTOs: Intel research identifies IT investment priorities
The survey polled more than 2,000 CTOs, CEOs and chief sustainability officers (CSOs) from 22 markets and found a global consensus that CTOs are crucial for success in terms of business and environmental aspirations. The survey found 81% of CEOs and CSOs believe tech leaders “must now be sustainability leaders” and 82% believe the CTO role is crucial to reaching net-zero greenhouse gas (GHG) emissions.
IT Management
Network World - 5 ways to boost server efficiency
Upgrading from 2019 to 2021 CPU-based servers will increase efficiency by 32% for Intel servers, and by 47% for AMD servers. The improved efficiency numbers cut across all levels of utilization.
IT Management
SiliconANGLE - State data privacy laws are changing fast – here’s what businesses need to know 
The larger the geographic entity involved, the longer it takes to enact the legislation, and longer still to actually spell out the regulations, enforcement actions and other consequences of noncompliance. One point to realize: each state has enacted multiple laws concerning privacy, making it difficult to suss out a coherent picture.
Data Privacy
CIO Influence - Get an Enterprise Data Storage Solution to Pay for Itself within a Year
Ways you can tell if a storage product may become a problem in the future are complexity, high overhead, the need for constant IT operations management, the lack of autonomous automation, the need for too many storage arrays, the lack of flexibility, the lack of flexible consumption models, hidden costs, and mediocre service and support.
Data Storage
sdxCentral - Zscaler sees sharp increase in ransomware attacks with encryptionless extortion and RaaS
Zscaler listed LockBit, ALPHV/BlackCat, and BlackBasta as the most prevalent ransomware families over the last year based on the number of victims listed on their leak sites. Additionally, manufacturing was the most-targeted market sector globally in 2023, accounting for 14.8% of ransomware attacks.
Security
Computerworld - Of cut cables and the sad state of tech support
Let’s face it: many of us would like to have an extremely knowledgeable person come to our businesses with every tool available, the ability to diagnose any tech issue, and knowledge about what to do. The reality is that it takes time, experience, and communication skills even the best tech support personnel don’t always have.
IT Management
VentureBeat - The best-paying tech jobs in 2023
And despite the stark reality that 2023 has seen 809 tech companies lay off 211,400 employees so far this year, organizations are still hiring at pace to fill roles in emerging sectors like cloud technology, blockchain and cybersecurity.
Tech Jobs
Computerworld - How we know that Apple’s Vision Pro means business
Developers revealed that visionOS enables users to place controls or displays on any surface, such as tables and walls. An app, for example, can be pasted like a poster on a wall. Timers can hover over the activity being timed. Volume sliders can lay flat on a table. Your real desk can get a virtual and fully functional keyboard.
Automation & Productivity
TechRepublic - Aqua Security Study Finds 1,400% Increase in Memory Attacks
The Nautilus team reported that more than 50% of attacks focused on defense evasion and included masquerading techniques such as files executed from /tmp, a location used to store temporary files. The attacks also involved obfuscated files or information, such as dynamic loading of code, which loads libraries – malicious in this case – into memory at runtime, leaving no suspicious digital trail.
Security
VentureBeat - AWS exec downplays existential threat of AI, calls it a ‘mathematical parlor trick’
Generative AI takes AI/ML to a different level, and has generated a lot of excitement and interest among the AWS user base. With the advent of transformer models, Wood said it’s now possible to take very complicated inputs in natural language and map them to complicated outputs for a variety of tasks such as text generation, summation and image creation.
Artificial Intelligence
SiliconANGLE - How organizations can combat AI-equipped attackers 
In February, Gartner published three recommendations in this vein: Have humans review output, favor Microsoft’s branded Azure OpenAI Service ChatGPT over OpenAI’s less-secure public version, and prohibit employees from disclosing confidential enterprise data in a conversation with a chatbot.
Privacy & Security
sdxCentral - How to grow your own SD-WAN and SASE resources
“While we’ve seen IT leaders implement a number of strategies, there is no tried-and-true method for developing and hiring IT talent because the skills profile changes too frequently,” said Evans. “What we’ve seen innovative organizations do is upskill current employees.”
IT Management
The Verge - So where are we all supposed to go now?
Those investors are also asking for real returns on that funding, so all these companies have had to switch from “growth at all costs” to “actually make some money.” Few social networking companies have ever made real money, and so they’re scrambling for new features and pivoting to whatever smells like quarterly results.
Social Media
sdxCentral - How Linux 6.4 Kernel improves Wi-Fi 7 and IPv6 networking
The Linux kernel offers essential capabilities for running operations that are widely used in networking equipment, enterprise, telco and the cloud. The kernel is part of a larger Linux operating system, with various vendors offering supported distributions including Red Hat, SUSE, and Canonical. Linux kernel development follows a rapid pace with new releases every six to ten weeks.
Network Management
SiliconANGLE - Cybersecurity in the AI age: The power, the promise, the peril
Just two months after OpenAI LLC released its ChatGPT large language model into an open beta test, researchers at WithSecure Corp. published a report demonstrating how the chatbot could be used to write convincing email messages that encouraged recipients to share corporate secrets, create tweets that hyped once-in-a-lifetime investment opportunities and even attack individuals through social media.
Privacy & Security
Blocks & Files - Generative AI has democratized AI – what does this mean for COEs?
Centralizing AI functions afforded organizations the ability to dictate strategy and policy and control costs, thereby reducing risks. But COEs’ dedication to rigorous processes had its drawbacks. Typically, the COE received specifications and built a deliverable over several months. Over a long enough timeline, the goal posts moved. As data grew stale, the output rarely resembled the desired outcome.
Artificial Intelligence
VentureBeat - How new AI tools like ChatGPT can transform human productivity in the enterprise
This article dives deeper into how business leaders can use the transformative potential of AI to revolutionize human productivity, providing insightful examples and statistics that demonstrate the technology’s profound impact.
Artificial Intelligence
SiliconANGLE - How AI and large language models can help cybersecurity firms improve their services 
The spread of AI-infused security cuts across startup and established companies alike. For example, Palo Alto Networks Inc. is developing its own large language model or LLM that will use AI to improve its operational efficiencies. SentinelOne Inc. will have an LLM so that security analysts can query potential threats with a simple search box without the need to learn complex jargon or syntax.
Security
Blocks & Files - Dell-commissioned report praises APEX file services speed in AWS cloud
Dell’s APEX File Storage is based on its on-premises PowerScale (Isilon as was) scale-out OneFS software. This was compared to NetApp’s high-availability configuration of its Cloud Volumes ONTAP (CVO). There were several points of comparison, but we want to focus on the performance aspect where Prowess was looking for high performance.
Data Storage
Harvard Business Review - 13 Principles for Using AI Responsibly
 In the world of professional services, for example, PwC announced it is deploying AI chatbots for 4,000 of their lawyers, distributed across 100 countries. These AI-powered assistants will “help lawyers with contract analysis, regulatory compliance work, due diligence, and other legal advisory and consulting services.” PwC’s management is also considering expanding these AI chatbots into their tax practice. In total, the consulting giant plans to pour $1 billion into “generative AI” — a powerful new tool capable of delivering game-changing boosts to performance.Artificial Intelligence
VentureBeat - Why healthcare in the cloud must move to zero trust cybersecurity
Eighty-eight percent of global healthcare decision-makers have adopted public cloud platforms, and 59% are adopting Kubernetes to ensure higher availability for their core enterprise systems. On average, healthcare providers spend $9.5 million annually across all public cloud platforms they’ve integrated into their tech stacks.
Security
TechRepublic - Data Scientist Survey: Do Tech Leaders Believe the AI Hype?
Most (55%) of the data science professionals and IT platform owners Domino Data Lab surveyed prefer to use foundation models from large third parties like OpenAI, Microsoft or Google but create different experiences for their customers on top of the base model. Another 39% want to build their own proprietary generative AI from scratch. Just 6% want to use AI features solely planned and provided by independent software vendors and other third parties.
Artificial Intelligence
SiliconANGLE - Ex-Uber and SolarWinds CISOs are taking the legal rap for attacks (how to avoid the same fate)
CISOs have a good perspective of what needs to be done, but they have to kind of fight to get things prioritized. And there’s always a roadmap of things that you have to do and so I think putting the blame on after the fact is super unfair.”
Security
The Verge - Who killed Google Reader?
Google’s bad reputation for killing and abandoning products started with Reader and has only gotten worse over time. But the real tragedy of Reader was that it had all the signs of being something big, and Google just couldn’t see it. Desperate to play catch-up to Facebook and Twitter, the company shut down one of its most prescient projects; you can see in Reader shades of everything from Twitter to the newsletter boom to the rising social web
Automation & Productivity
The Hacker News - 3 Reasons SaaS Security is the Imperative First Step to Ensuring Secure AI Usage
They raise legitimate questions about the usage and permissions of AI applications within their infrastructure: Who is using these applications, and for what purposes? Which AI applications have access to company data, and what level of access have they been granted? What is the information employees share with these applications? What are the compliance implications?
Security
VentureBeat - Inside the race to build an ‘operating system’ for generative AI
The operating system analogy helps to illustrate the magnitude of the change that generative AI is bringing to enterprises. It is not just about adding a new layer of software tools and frameworks on top of existing systems. It is also about giving the system the authority and agency to run its own process, for example deciding which LLM to use in real time to answer a user’s question, and when to hand off the conversation to a human expert.
Artificial Intelligence
Network World - AI requirements exceed infrastructure capabilities for many IT teams, study finds
Customers often will opt for end-to-end solutions from AI vendors in the cloud, especially initially, “because they make it easy for the customers with a simple button,” Voruganti said. But variable cloud costs – which enterprises incur with each read or write to cloud-based data, or with every data extraction, for example – may cause IT teams to reconsider that approach.
IT Management
SiliconANGLE - ‘Zero trust’ was supposed to revolutionize cybersecurity. Here’s why that hasn’t happened yet. 
Moreover, Watts predicted that “over 60% of organizations will embrace zero trust as a starting place for security by 2025 but more than half will fail to realize the benefits.” A report from Nathan Parde of MIT’s Lincoln Lab last May, meantime, estimated the typical zero-trust deployment will take anywhere from three to five years. That is a depressing thought, to be sure.
Security
Network World - How IT pros can benefit from generative AI safely
We went right to source and asked ChatGPT itself how it can make life easier for enterprise IT. After a pause of no more than a couple of seconds, we got back a numbered list: 1) troubleshooting and issue resolution, 2) documentation and knowledge management, 3) automation and scripting, 4) training and onboarding, 5) security and compliance, 6) project management and planning, 7) stay updated on technology trends.  
Artificial Intelligence
sdxCentral - What role will Cisco play in AT&T’s SD-WAN simplification plans?
Frost and Sullivan recently placed AT&T into a crowded leadership category as part of its latest ranking of managed SD-WAN providers. It noted the carrier provided customers with a “choice of market-leading SD-WAN vendors” such as Cisco, Aruba, VMware, Fortinet and Palo Alto Networks, and “has the most SD-WAN sites deployed in North America.”
Network Management
SiliconANGLE - Exclusive with AWS sales chief Matt Garman: How Amazon aims to lead in generative AI 
The primary concern in generative AI is the security of intellectual property and trust in the data’s results. Garman explains AWS’ approach to ensuring data security, saying, “For our first-party models, we are very careful about which data has been used to build that model.” AWS also provides open-source models within Jumpstart, enabling customers to operate models within its proprietary Virtual Private Cloud.
Artificial Intelligence
Network World - Recovery options: Copy-on write vs redirect-on-write snapshots
This article will deviate from the commonly employed term "volume" and instead uses the phrase "protected entity" to allude to the entity being safeguarded by a specific snapshot. Although it is true that the protected entity is typically a RAID volume, certain object-storage systems eschew RAID and may employ snapshots to protect alternative entities like object stores or NAS shares
Data Management
VentureBeat - How Microsoft Fabric aims to beat Amazon and Google in the cloud war
Even before the announcement Microsoft had already become a leader in data and analytics software, according to Gartner, a research firm. But with Microsoft Fabric, analysts said, the company has taken its offerings to a new level of integration and ease of use that could be hard for its competitors to match anytime soon.
Cloud
Techstartups - The Next Great Leap in Blockchain Interoperability
While the technology now exists for cross-chain communication, more human-level problems persist. There is a significant amount of tribalism in the blockchain sector between rival chains and their proponents, which doesn’t exactly set the stage for interoperability. This phenomenon is exemplified by the so-called Bitcoin maximalists who believe that every chain other than Bitcoin is basically trash.
Blockchain
Bloomberg - Big Tech Wants AI Regulation — So Long as Users Bear the Brunt
The rules governing tech vary dramatically on opposing sides of the Atlantic. The EU has had comprehensive data protection laws on the books for over five years now and is in the process of implementing strict guidelines for competition and content moderation. In the US, however, there’s been almost no regulation for more than two decades.
Artificial Intelligence
Computerworld - AI will kill these jobs (but create new ones, too)
Career fields with the highest exposure to AI automation are administrative positions (46%) and tasks in legal (44%) professions. Not surprisingly, jobs less likely to be affected tend to be in physically intensive areas such as construction (6%) and maintenance (4%).
Tech Jobs
SiliconANGLE - New report highlights security vulnerabilities in open-source AI projects 
The researchers found that many AI models are granted excessive access and authorization, often without adequate security measures. An overall lack of maturity and basic security best practices in the open-source projects adopting these models, combined with excessive access and authorization, is said to create an environment ripe for potential breaches.
Security
AiThority - Enhancing Cybersecurity with AI: This New Approach Identifies Threats, Comprehend The Sources
“Cyber defenders are inundated with information and lines of code. What they need is interpretation and support for prioritization. Where are we vulnerable? What actions can we take?”
Security
TechRepublic - Gartner: 81% of IT Teams Will Grow Despite AI Adoption
Companies working on digital transformation rely on full-time IT workers to do it, Gartner reported. Full-time IT employees perform 56% of this work. Another 21% is done by IT contractors or part-time employees, 9% by IT consultants and 4% by IT gig workers.
IT Management
The Hacker News - 5 Things CISOs Need to Know About Securing OT Environments
In more recent years, an uptick in cyberattacks against industrial facilities and the trend of IT/OT convergence driven by Industry 4.0 have highlighted the vacuum of ownership around OT security. According to a new Fortinet report, most organizations are looking to Chief Information Security Officers (CISOs) to solve the problem.
Security
The Verge - AI is killing the old web, and the new web struggles to be born
The web is always dying, of course; it’s been dying for years, killed by apps that divert traffic from websites or algorithms that reward supposedly shortening attention spans. But in 2023, it’s dying again — and, as the litany above suggests, there’s a new catalyst at play: AI.
Artificial Intelligence
VentureBeat - Enterprises need to control their own generative AI, say data scientists
The data, from data and analytics professionals who attended Domino Data Lab’s recent Rev conference in New York City, found that 90% of data science leaders — who are typically a skeptical bunch – believe that the hype surrounding Generative AI is justified. More than half believe it will have a significant impact on their business within the next 1-2 years.
Data & Analytics
Datanami - Insight Survey Finds Employee Productivity Fueling Generative AI Adoption
finds that within the next three years, most business leaders expect to adopt generative AI to make employees more productive (72%) and enhance customer service (66%). Around half of the respondents for Insight’s generative AI report, released today, say they expect to use the technology to assist with research and development (53%) and/or software development/ testing (50%).
Artificial Intelligence
The Hacker News - How Generative AI Can Dupe SaaS Authentication Protocols — And Effective Ways To Prevent Other Key AI Risks in SaaS
Security and risk teams are already overwhelmed protecting their SaaS estate (which has now become the operating system of business) from common vulnerabilities such as misconfigurations and over permissioned users. This leaves little bandwidth to assess the AI tool threat landscape, unsanctioned AI tools currently in use, and the implications for SaaS security.
Security
VentureBeat - How ChatGPT could replace IT network engineers
So, in the case of configuration management, ChatGPT performed fairly well on basic configuration tasks, and I concluded that it is aware of vendor-specific syntax and can generate configurations. However, the configurations generated by the system should be carefully inspected for accuracy. The generic prompts I tested would be akin to building a quick lab, a task most young networking engineers find tiresome at a minimum and clearly a chore that can be handled by the technology (with, again, some human oversight).
ChatGPT
Network World - How IT pros can benefit from generative AI safely
”Although generative AI is still in its infancy and there are many pitfalls that need to be navigated, Gartner says, “Generative AI provides new and disruptive opportunities to increase revenue, reduce costs, improve productivity and better manage risk. In the near future, it will become a competitive advantage and differentiator.”
Artificial Intelligence
IEEE Spectrum - A CRITICAL LOOK AT AI-GENERATED SOFTWARE
GitHub Copilot, built on top of OpenAI Codex, a system that translates natural language to code, can make code recommendations in different programming languages based on the appropriate prompts. And this is not the only such system: Amazon CodeWhisperer, CodeGeeX, GPT-Code-Clippy, Replit Ghostwriter, and Tabnine, among others, also provide AI-powered coding and code completion [see “Robo-Helpers,” below].”
Artificial Intelligence
Computerworld - M365 Copilot, Microsoft’s generative AI tool, explained
The M365 Copilot “system” consists of three elements: Microsoft 365 apps such as Word, Excel, and Teams, where users interact with the AI assistant; Microsoft Graph, which includes files, documents, and data across the Microsoft 365 environment; and the OpenAI models that process user prompts: OpenAI’s ChatGPT-3, ChatGPT-4, DALL-E, Codex, and Embeddings.
Automation & Productivity
VentureBeat - How ChatGPT and generative AI could bring the Star Trek holodeck to life
For Star Trek fans and tech nerds, the holodeck concept is a form of geek grail. The idea is an entirely realistic simulated environment where just speaking the request (prompt) seemingly brings to life an immersive environment populated by role-playing AI-powered digital humans.
Artificial Intelligence
AiThority - Rocket Software Study Reveals 93 Percent of IT Leaders Believe Hybrid Cloud Solutions are the Future of IT
The report revealed that IT leaders are losing sleep over improving overall IT performance (60%), data security (50%), process risk and compliance (46%), and the need to improve agility (41%). To overcome these challenges, IT organizations are turning to hybrid solutions to leverage the benefits of the cloud and the mainframe.
IT Management
Android Authority - GPT-5: Release date, rumors, and features we expect from ChatGPT 5
Still, the steady march of AI innovation means that OpenAI hasn’t stopped with GPT-4. That’s especially true now that Google has announced its upcoming multimodal Gemini language model. That is rumored to match GPT-4, so OpenAI will have to move quickly if it wants to keep its lead.
Artificial Intelligence
VentureBeat - How ChatGPT can help your business make more money
Unfortunately, there is a chasm between using LLMs for personal productivity gain versus for business profit. Like developing any business software solution, there is much more than meets the eye. Just using the example of creating a chatbot solution with GPT-4, it could easily take months and cost millions of dollars to create just a single chatbot!
ChatGPT
eWeek - 5 Ways Event-Driven Architecture (EDA) Unlocks the Potential of ChatGPT
There are, however, some drawbacks and limitations that are keeping it and AI in general from achieving full potential. This is where event-driven architecture, EDA, can facilitate the flow of information between the systems that “publish” events and the other systems that indicate interest in that kind of information by “subscribing” to topics.
ChatGPT
TechRepublic - How to Get the Most Out of Your Cloud Disaster Recovery Plan
The second major challenge is about cloud capacity. An organization might try to optimize cloud costs by shutting down some of their virtual machines when not in use, but what happens when you need to bring them back up? Even if the cloud is available, there may not be capacity in that cloud region or cloud to accommodate bringing those machines back up again, and that has another chilling effect on productivity.
Cloud
SiliconANGLE - Millions of GitHub projects found vulnerable to exploit
Aqua analyzed a sample of more than a million GitHub code repositories and found almost 3% were vulnerable to an attack called repojacking. The bad actors could take control over an entire GitHub project or a particular piece of software. The issue is that sometimes organizations that own these projects change their name, and then create links to maintain the older account name.
Security
The Hacker News - The Power of Browser Fingerprinting: Personalized UX, Fraud Detection, and Secure Logins
With browser fingerprinting, many pieces of data can be collected about a user's web browser and device, such as screen resolution, location, language, and operating system. When you stitch these pieces together, they reveal a unique combination of information that forms every user's visitor ID or "digital fingerprint." Websites can use the visitor ID in various ways, including personalizing the user's experience, improving fraud detection, and optimizing login security.
Privacy & Security
TechRepublic - Dell Technologies World 2023: Q&A on how Dell sees security at the edge
One of the biggest things that companies are looking to do is there is an interest in being able to consume (cloud) in an as-a-service fashion. They want to take the experiences they are getting from hyperscalers and potentially be able to bring those experiences on-prem, especially toward the edge. Customers want to leverage edge technologies to drive new business outcomes, to be able to act upon data more rapidly
IT Management
sdxCentral - Palo Alto Networks: Operational tech security isn’t one-size-fits-all
As the threat landscape continues to grow, achieving full visibility into the OT network is more critical than ever, Oswal noted. Security teams for those systems must understand what devices are connected to the network and the specifics about each one. This includes the make, model, version of software running, open vulnerabilities and whether it has been patched or not.
Security
Blocks & Files - MinIO: Open source object storage will rule the cloud
The company said its object storage software was frequently downloaded (1.2 billion Docker pulls) and widely deployed. Its thesis starts with the point that the cloud is taking over virtually every IT environment. Kubernetes powers the cloud operating model, providing one abstraction across any computing infrastructure – public, private or edge.
Data Storage
VentureBeat - The next wave of cyber threats: Defending your company against cybercriminals empowered by generative AI
Data breaches that bypass safety checks are made possible by tricking generative AI into writing malicious code that reveals the chat history of active users, personally identifiable information like names, email addresses, payment addresses, and even the last four digits and expiration data of credit cards.
Security
TechRepublic - Shadow SaaS, changing contracts and ChatGPT adoption: SaaS trends to watch
Engineering teams tend to use the most SaaS apps, with an average of 108 apps. The IT and security teams saw the most growth in SaaS app usage between 2022 and 2023, with an increase of 33% mostly in point solution and ROI tools.
Security
SiliconANGLE - The top five cloud cybersecurity threats – and what to do about them 
Why do these hard-coded credentials still exist? Mainly because of lazy DevOps practices, such as providing full access rights to the entire enterprise source code repositories. Unit 42’s report found that more than 80% of their customers used hard-coded credentials in their source control management tools.
Security
Blocks & Files - A last line of defense against ransomware
However, Object First’s Bennett notes that reported attacks represent just the tip of the ransomware iceberg given that so many organizations are typically very reluctant to admit being hit: “Unless they have a legal requirement, organizations are concerned about disclosing their vulnerability to cyber attacks,” he says. “The risk of reputational damage that can come from a data loss incident is enormous.”
Security
sdxCentral - How confidential computing and zero-trust data clean rooms ease AI fears
These new functionalities will allow separate organizations to securely analyze and collaborate on combined raw sensitive data while maintaining confidentiality and allow organizations to use LLMs without revealing their data.
Artificial Intelligence
Computerworld - IT firms expect to increase hiring next quarter, Manpower says
Across all industry verticals in the US, 48% of employers plan to hire in Q3, while just 13% expect staffing decreases, according to the survey. For US tech firms, 55% plan to add to their current headcount, up 10% from the previous quarterly outlook. Even so, Q3 hiring projections are expected to be about 5% less than for the same period in 2022.
Tech Jobs
SiliconANGLE - Antonio Neri on HPE’s cultural transformation: Unlocking the power of hybrid cloud and AI 
While the company excels in organic innovation, evident in the success of GreenLake, it also recognizes the value of external innovation and talent. Strategic acquisitions, such as Aruba, and recent additions, such as OpsRamp and Determined AI, have enhanced HPE’s portfolio and complemented its in-house capabilities.
Cloud
Computerworld - The coming productivity disruption of generative AI
Another problem: the people doing code generally have no idea about the environment in which the application will be used. They don’t know the company culture culture and rarely meet those who will use the application.
Automation & Productivity
SiliconANGLE - Exclusive: MongoDB foresees AI-powered future as it navigates shifting software development landscape 
The database landscape has been a dynamic one, witnessing substantial shifts as industry heavyweights such as Oracle Corp. adapt their services to meet emerging demands. But MongoDB’s roots in document space and its emphasis on availability at scale provide a unique competitive edge, even as others rush to announce MongoDB application programming interfaces.
Data & Analytics
Datanami - Recent Study Highlights Rising Dangers of AI and the Pressing Need for Ethical AI; Majority of Businesses Battle to Keep Up
While more than half (53%) of organizations rely exclusively on third-party AI tools, having no internally designed or developed AI of their own, 55% of all AI-related failures stem from third-party AI tools, according to new research by MIT Sloan Management Review (MIT SMR) and Boston Consulting Group (BCG).
Artificial Intelligence
Blocks & Files - Generative AI and automation: accelerating the datacenter of the future
If time stood still, perhaps the dire prognosticators of the datacenter’s end would have been right. I myself was quite the cloud evangelist before learning more about the other side of the fence. So why hasn’t this extinction-level event come to pass? Because the datacenter has adapted. Sure, there are “aaS” and subscription models now available on-premises; but the real stabilizing force has been automation.
Automation & Productivity
Datanami - Rackspace Survey Unearths IT Leaders’ Concerns Over Legacy Infrastructure Hindering AI Implementation
The survey finds that global IT organizations have been slow to modernize key applications, including customer resource management (CRM), enterprise resource planning (ERP), and human resources (HR) systems. Moreover, the study suggests that failure to modernize key apps and data will limit organizations’ ability to deploy and benefit from cutting-edge technologies such as artificial intelligence (AI).
IT Management
VentureBeat - 5 ways generative AI will help bring greater precision to cybersecurity
Demand for generative AI-based cybersecurity platforms and solutions is predicted to grow at a compound annual growth rate of 22% between 2022 and 2023 and reach a market value of $11.2 billion in 2032, up from $1.6 billion in 2022. Canalys estimates that more than 70% of businesses will have their cybersecurity operations supported by generative AI tools within the next five years.
Security
TechRepublic - One overlooked element of executive safety: Data privacy
All of this data is collected legally by data brokers. Every time you interact with a computer — be that via a smart device, a bar code at checkout or on a website — data about you is being collected. In the U.S. there is essentially no limit to the amount of data companies can collect, and few limits on how they can use it.
Data Privacy
sdxCentral - How to move from VPN to ZTNA (3 best practices)
A common ZTNA myth is that you have to move to the cloud to implement zero trust or that it can only be used for remote employees. Newton noted that sometimes organizations even set up separate solutions: one for cloud access and another one for on-premises.
Security
VentureBeat - 92% of US-based developers already using AI-powered coding tools at work: GitHub report
Yet despite investments in DevOps, developers still face challenges. They report their most time-consuming task as waiting on builds and tests. They also expressed concerns about repetitive tasks such as writing boilerplate code. They aspire to allocate more time to collaborate with peers, acquire new skills and create innovative solutions.
Artificial Intelligence
The Verge - AI Is a Lot of Work
Much of the public response to language models like OpenAI’s ChatGPT has focused on all the jobs they appear poised to automate. But behind even the most impressive AI system are people — huge numbers of people labeling data to train it and clarifying data when it gets confused. Only the companies that can afford to buy this data can compete, and those that get it are highly motivated to keep it secret. The result is that, with few exceptions, little is known about the information shaping these systems’ behavior, and even less is known about the people doing the shaping.
Artificial Intelligence
VentureBeat - Adobe Stock creators aren’t happy with Firefly, the company’s ‘commercially-safe’ gen AI tool
 According to some creators, several of whom VentureBeat spoke to on the record, Adobe trained Firefly on their stock images without express notification or consent. While this is certainly an issue for other text-to-image generative tools such as  DALL-E 2, Stable Diffusion and Midjourney (which were trained on scrapes of imagery posted to the public web, including copyrighted imagery), it is particularly egregious for a company like Adobe, which has been deeply intertwined with the creative economy for decades, they say.
Artificial Intelligence
Synthesis AI - What is synthetic data?
Synthetic data is computer-generated data that models the real world. Synthetic data and generative artificial intelligence (AI) datasets have emerged as a disruptive new approach to solving the data problem in computer vision (CV) and machine learning (ML). By coupling visual effects (VFX) and gaming technologies with new generative artificial intelligence (AI) models, companies can now create data that mimics the natural world.
Data & Analytics
Tech Startups - How to use ChatGPT: 8 ways to use ChatGPT to grow your business and boost your productivity
You may think it would be efficient to use ChatGPT to write informative blog posts and copy for product descriptions on your business website. However, don’t do this, as Google has already stated that AI-generated content is against their terms and conditions. Using ChatGPT to generate text for your website can cause it to be penalized and lose its ranking in the Google search engine, which can result in a major drop in business
ChatGPT
VentureBeat - How generative AI is creating new classes of security threats
Attackers are using AI to improve phishing and fraud. Meta’s 65-billion parameter language model got leaked, which will undoubtedly lead to new and improved phishing attacks. We see new prompt injection attacks on a daily basis.
Security
The Hacker News - Activities in the Cybercrime Underground Require a New Approach to Cybersecurity
The research stems from an analysis of Cybersixgill's collected intelligence items throughout 2022, gathered from the deep, dark and clear web. The report examines the continuous evolution of threat actors' tactics, tools, and procedures (TTPs) in the Digital Age – and how organizations can adapt to reduce risk and maintain business resilience.
Security
VentureBeat - How to navigate the AI jungle with pragmatic steps for enterprise
To simplify this, focus on encouraging experimentation in concrete, manageable areas. Encourage the use of AI in areas like marketing, customer service and other more straightforward applications. Prototype and pilot internally ahead of defining complete solutions or working through every exception case (that is, workflows to manage AI hallucinations).
Artificial Intelligence
SiliconANGLE - Rethinking your college major in the age of AI 
However, the PC relied on explicit instructions from humans to serve as a conduit between humans and technology. AI on the other hand has the capability to not only reason, learn, develop tactics and make decisions, but do so at warp speed. More significantly, AI can make decisions without human input.
Artificial Intelligence
VentureBeat - 5 tips for business leaders to leverage the real potential of generative AI
Generative AI is here, and it’s poised to have a transformational impact on our world. The potential upsides of leveraging it in your business are too great — and the downsides of being a laggard too many — not to get started now. But the very beginning of this journey is making sure you have the right data foundations for AI/ML. In order to train quality models, you must start with quality, unified data from your business.
Artificial Intelligence
Network World - How to navigate the co-management conundrum in MSP engagements
 As a minimum, the client needs an effective contractual framework (and some assigned people) to allow monitoring, feedback, and control levers to keep the service provision commercially and operationally on track. Without these, the enterprise will be left exposed to the potential degradation of MSP service provision over time, and vulnerable to cost increases or scope gaps.IT Management
SiliconANGLE - Uber’s real-time architecture represents the future of data apps: Meet the architects who built it 
Moreover, the company’s productivity metrics are three to five times greater than what you’d find at a typical technology company when, for example, measured by revenue per employee. In our view, Uber’s technology stack represents the future of enterprise data apps where organizations will essentially create real-time digital twins of their businesses and in doing so, deliver enormous customer value.Data & Analytics
Geekwire - Data’s destiny: Former Microsoft and Snowflake exec Bob Muglia on the future of AI and humanity
"Then there’s the question about what happens as this AI that we’re building becomes smarter and smarter, and reaches what we might call the point of an artificial general intelligence, where it’s as smart as an average human."
Artificial Intelligence
TechRepublic - AI vs AI: Next front in phishing wars
Business email compromises, which supplanted ransomware last year to become the top financially motivated attack vector-threatening organizations, are likely to become harder to track. New investigations by Abnormal Security suggest attackers are using generative AI to create phishing emails, including vendor impersonation attacks of the kind Abnormal flagged earlier this year by the actor dubbed Firebrick Ostricth.
Privacy & Security
eWeek - Generative AI Ethics: Concerns and Solutions
In this guide, we’ll discuss what generative AI ethics look like today, the current challenges this technology faces, and how corporate users can take steps to protect their customers, their data, and their business operations with appropriate generative AI ethics and procedures in place.
AiEthics
VentureBeat - Schools should teach AI to every child, according to Andrew Ng and Andrea Pasinetti
To be sure, adding a new pillar to the U.S. education system is no easy task. The system is already stressed by teacher shortages, budget cuts, and political wrangling over curriculum. Introducing AI coding to the curriculum will be worth the effort. There is a way forward. Several states are already making strides in addressing the systemic changes needed to build new curricular offerings through legislation and funding that promote effective computer science strategies for the classroom and professional development for teachers.
Artificial Intelligence
sdxCentral - Regulated industries and large enterprises lag behind in MFA adoption
“Surprisingly, highly-regulated industries tend to lag behind,” Okta noted. The MFA adoption rate of the government (48%) was 16% lower than the private sector (64%). And the rates for health care, financial services and energy are 56%, 60% and 62% respectively.
Security
VentureBeat - This Google leader says ML infrastructure is ‘conduit’ to company’s AI success
I always tell my team that we need to look at the entire journey from the point the researcher has a great idea or product has a need and finds a researcher to solve it — all the way to the point that a billion people’s lives have been changed by that idea. That journey is especially interesting these days because ML is going through an accelerated journey of becoming an industry, while up until two or three years ago, it was just the subject of academic research.
Machine Learning
SiliconANGLE - Databricks’ Data + AI Summit will focus on next-gen data infrastructure for AI and more 
Snowflake is coming from a position of strength in analytics, Databricks from a strong position in data science, and each firm is rapidly innovating to capture the opportunities ahead. Both are vertically and horizontally building and buying features to cover as much of the market as possible.
Data & Analytics
sdxCentral - US federal agencies hit by cyberattack — what you need to know about MOVEit
MOVEit is a popular application developed by Progress Software and used by many healthcare, technology, financial and energy companies as well as government agencies. Progress Software first announced the MOVEit Transfer vulnerability (CVE-2023-34362) on May 31, which allows an attacker to perform an SQL injection in the web application and gain access to MOVEit Transfer’s database.
Security
TechRepublic - Akamai’s new study: Bots, phishing and server attacks making commerce a cybersecurity hotspot
In its new report, Entering through the Gift Shop: Attacks on Commerce, Akamai determined that 14 billion or 34% of all incursions were against commerce sites, driven by bots, API attacks, remote code execution through local file inclusion attacks and server-side exploits. The migration to cloud, availability of dark net apps and the proliferation of IoT devices have also driven a big increase in attacks.
Privacy & Security
VentureBeat - Tribe AI’s CEO on why generative AI is seeing more rapid uptake by enterprises than Web3 and crypto
What I found when I actually left Google was that I was not alone because there were a lot of people who had similarly stepped out of these amazing companies where they had built the cutting-edge AI machine learning technology. And they wanted different things in their career, but they still wanted to monetize their skill sets.
Tech Jobs
Computerworld - Apple’s Vision Pro: The pros and cons of head-mounted hardware
Likely the biggest problem to overcome is the easiest to understand: people don’t particularly like wearing hardware such as eyeglasses or helmets. Sure, they’ll  wear dark glasses, but often because they think they look more attractive with them under certain conditions. This suggests that, unlike most of the virtual reality and augmented reality solutions already on the market, Apple knew it needed to make its headset attractive.
Automation & Productivity
VentureBeat - Why data management matters: Turning analytics insights into income
According to Salesforce’s Connected Customer report, 88% of customers say their experience with the company is as important as its products or services. Meanwhile, 8 in 10 business leaders say data is critical in decision-making at their organization.
Data & Analytics
TechRepublic - CISA advisory on LockBit: $91 million extorted from 1,700 attacks since 2020
In a May 2023 study on the professionalization of ransomware, cybersecurity firm WithSecure noted the RaaS model LockBit uses is a service-oriented system; just like legitimate software: it creates tools, infrastructure and operating procedures — “playbooks” — and sells access to these tools and services to other groups or individuals.
Security
Computerworld - Employees want remote-work tools, not in-office mandates, Atlassian says
But Atlassian — whose Jira, Trello and Confluence applications are geared for hybrid-work environments — pointed to its survey results to conclude that problems with distributed work are not related to the physical separation of employees but rather, that companies aren’t providing their workers with the right tools or ways of working in order to make a success of such a strategy.
Automation & Productivity
VentureBeat - Data collection and privacy: Understanding the legal limits
In parallel with the GDPR — now in its fifth year — roughly 25 states and Puerto Rico have introduced or are considering about 140 consumer privacy bills this year. These include the Virginia Consumer Data Protection Act (effective Jan. 1); the Colorado Privacy Act (effective July 1); the Connecticut Personal Data Privacy and Online Monitoring Act (also effective July 1); and the Utah Consumer Privacy Act (effective Dec. 31).
Data Privacy
The Verge - A storefront for robots
It’s a universal experience for small business owners who’ve come to rely on Google as a major source of traffic and customers. But it’s also led to the degradation of Google’s biggest product, Search, over time. The problem is poised to only continue to spiral as business owners, publishers, and other search-reliant businesses increasingly use artificial intelligence tools to do the search-related busywork
Artificial Intelligence
The Hacker News - Activities in the Cybercrime Underground Require a New Approach to Cybersecurity
This article summarizes a few of the report's findings, including trends in credit card fraud, observations about cryptocurrency, AI developments and how they're lowering barriers to entry to cybercrime, and the rise of cybercriminal "as-a-service" activities
Security
Blocks & Files - GigaOm gurus say three Cs lead large enterprise hybrid cloud backup
GigaOm has published findings showing Cohesity, Commvault and lesser known Cobalt Iron are “outperforming” other suppliers when backing up data in large enterprise hybrid clouds.
Data Storage
sdxCentral - Accenture: High tech has a hidden scope 3 emissions problem
In terms of managing scope 3 value chain emissions, “enterprise tech and consumer tech companies have a very big challenge in terms of the size of scope 3 emissions, but I think semiconductor companies have a bigger challenge,” he said.
Sustainability
AiThority - Global CMOs Are Profiting from the Transformative Power of GenAI, with 91% Reporting a Positive Impact on Efficiency
Some 70% of respondents said their organizations already implement GenAI to address a wide range of marketing challenges, and another 19% said that their organizations are testing it. The greatest focus area is personalization, with roughly two-thirds (67%) pursuing efforts there, followed by insight generation (51%) and content creation (49%)
Automation & Productivity
SiliconANGLE - Management consoles can be a security nightmare, but they still lack good protection 
It doesn’t take much to discover these misconfigured public-facing consoles, as the recent attacks on MOVEIt demonstrated. Victims in these attacks included many state and federal government sites. There are a number of tools, including Shodan, GreyNoise Inc. and Censys Inc., all of which can quickly provide a variety of information on all sorts of devices with just a few mouse clicks
Security
sdxCentral - How digital twins and AI optimize IT and more (and 4 questions to ask before you try)
Rolling out hypothetical 5G infrastructure, optimizing manufacturing workflows, testing experiential new products, even building out a complete – constantly evolving – doppelganger of the entire world. Those are just a few examples of what digital twins make possible.
Automation & Productivity
AiThority - Will ChatGPT Traffic Ever Touch Google’s?
A new report stated that ChatGPT’s traffic is beginning to flatten, even as its closest competitor Google’s BARD is quickly catching up after a slow start. The news about ChatGPT’s meteoric rise overshadowed all other AI-related developments for a good six months, before it hit the wall in terms of website visits.
ChatGPT
SiliconANGLE - New report details how cybercriminals are leveraging AI in email attacks 
Abnormal Security’s researchers analyzed a series of recent attacks and discovered that these AI-generated emails could take various forms, ranging from credential phishing to vendor fraud and sophisticated BEC schemes. In previous years, the presence of grammar mistakes, awkward language or other inconsistencies made phishing emails easier to spot. Now, AI-generated content makes these cyberthreats indistinguishable from normal business communication, amplifying the challenge for companies and individuals.
Security
Computerworld - 5 hot workplace collaboration trends (and 2 going cold)
“They look at email volume versus what’s happening in Teams,” she said. “They would prefer to see more collaboration taking place in Teams than email, [so they are] using that anonymized data to understand where an intervention might need to take place, with more learning and more coaching [to encourage real-time collaboration in Teams].”
Automation & Productivity
VentureBeat - McKinsey report finds generative AI could add up to $4.4 trillion a year to the global economy
The $2.6 trillion to $4.4 trillion economic impact figure marks a huge increase over McKinsey’s previous estimates of the AI field’s impact on the economy from 2017, up 15 to 40% from before. This upward revision is due to the incredibly fast embrace and potential use cases of GenAI tools by large and small enterprises.
Artificial Intelligence
SiliconANGLE - Trustwave report finds attacks targeting Microsoft’s MS SQL are skyrocketing 
The findings came from a four-month study that employed a network of honeypots, or decoy systems, set up in various regions around the world, including Central Europe, Russia, Ukraine, Poland, the U.K., China and the U.S. Nine popular database systems were examined: MS SQL Server, MySQL, Redis, MongoDB, PostgreSQL, Oracle DB, IBM DB2, Cassandra and Couchbase. MS SQL Server experienced significantly more attack activity than the others.
Security
VentureBeat - Top 10 cybersecurity findings from Verizon’s 2023 data breach report
Statistics from 2022 and into 2023 show the cybersecurity industry has more work to do to people-proof attack vectors. Attackers are capitalizing on stolen credentials, privilege misuse, human error, well-orchestrated social engineering, business email compromise (BEC) and, doubling in just a year, pretexting.
Security
sdxCentral - Big Tech reality check: ESG targets, progress and impact
Gartner analysts predict that by 2026, 75% of organizations will increase the amount of business they do with IT vendors that are focused on specific environmental, social and governance (ESG) goals “and will seek to replace vendors” that don’t demonstrate sustainability progress.
Sustainability
ZDNet - GPT-3.5 vs GPT-4: Is ChatGPT Plus worth its subscription fee? 
Don't get me wrong -- ChatGPT-4 can still make blunders, often referred to as "hallucinations". But if you're looking to get some smart answers to some challenging questions, ChatGPT-4 is here to help. With that in mind, here are the technical differences between the free version of GPT-3.5 and the paid-for version of GPT-4 in ChatGPT Plus.
ChatGPT
Datanami - New EY Consulting Survey Finds Majority of US Workers Eager for Emerging Tech, Yet Frustrated by Slow Adoption
The Emerging Tech at Work Survey asked more than 1,000 US employees about their familiarity with and expected impact of 12 emerging technologies — including artificial intelligence (AI)/machine learning (ML), augmented reality (AR)/virtual reality (VR), digital twin, edge and quantum computing, biometrics, among others — revealing crucial insights for business leaders considering the implementation of new technologies and navigating barriers to adoption.
Automation & Productivity
Computerworld - Q&A: For UST’s CTO, AI is ‘a necessary evil’ Niranjan Ramsunder, CTO of UST, has been learning how generative AI 
"There’s a lot of discussion about... blockchains. But none of them translated into business. Right now, generative AI and large language models [LLMs] is definitely a place where we find the buzz and the reality are matching. So, that’s the number one trend in my mind for customers.
Automation & Productivity
Datanami - Latest Research Uncovers Data Quality as Top Concern for Enterprises Seeking to Drive Business Agility through Trusted Data
The findings reveal a concerning disconnect, with 77% of the professionals surveyed naming data-driven decision-making as their top goal for data programs in 2023. This was closely followed by the desire to improve operational efficiency (73%), reduce costs (62%), generate revenue (59%), and improve regulatory compliance (57%) — all of which rely on trusted data to be successful.
Data & Analytics
sdxCentral - Google’s Secure AI Framework: How to build a safer AI future
The Secure AI Framework (SAIF) is a conceptual framework for secure AI systems that aims to help mitigate AI-related risks, including theft of the model, data poisoning of the training data, injecting malicious inputs through prompt injection and extraction of confidential information in the training data, according to Google.
Artificial Intelligence
SiliconANGLE - Snowflake Summit will reveal the future of data apps. Here’s our take. 
We see the world of apps moving from one that is process-centric to one that is data-centric, where business logic is embedded into data versus today’s stovepiped model where data is locked inside application silos.
Data & Analytics
VentureBeat - The AI feedback loop: Researchers warn of ‘model collapse’ as AI trains on AI-generated content
But, as those following the burgeoning industry and its underlying research know, the data used to train the large language models (LLMs) and other transformer models underpinning products such as ChatGPT, Stable Diffusion and Midjourney comes initially from human sources — books, articles, photographs and so on — that were created without the help of artificial intelligence.
Artificial Intelligence
Network World - Network spending priorities for second-half 2023
The average company on my list that predicted just over 4% higher spending on networking this year is now looking for almost exactly the same amount of cost reduction. Spend more, spend less. Does that seem contradictory? No, what it means is that they want to cut the cost of sustaining what they have in order to help fund new initiatives, and that they’re prepared to increase spending to fund the remainder.
Network Management
AiThority - 78% of Digital B2C Marketers say AI Helps Marketing, While 47% Responded That AI is Dangerous: Optimove Survey
“Many may fear that generative AI could be dangerous in marketing. But the operative question is, ‘What task are you asking it to do?’ It is not dangerous if asked to provide information on a subject or suggest viable solutions to a problem. Armed with information, the next action is still in the hands of humans. If asked to take unmonitored action, generative AI could go astray."
Artificial Intelligence
sdxCentral - Hybrid work: What does and doesn’t work (and how security is evolving)
“Cybersecurity and data breaches are the biggest factor by far worrying employers about work from home,” said Fersht. “They need to develop a platform that can secure the business and encrypt data seamlessly and manage it effectively in a compliant way. If you don’t have that, you are not really a hybrid workplace, you are just remote.”
Automation & Productivity
ZDNet - 5 ways to explore the use of generative AI at work 
"I think we are probably in a similar place to lots of people," he says. "We're using it to generate content ideas, whether it's blog posts, marketing posts, or product descriptions. But we're not putting it into a production environment."
Artificial Intelligence
Employees lament lack of automation tools for productivity: monday.com survey 
The results from the Global Productivity Survey, involving 4,000 workers from diverse industries in three countries, reveal that most employees don’t believe their organizations provide enough efficient processes, tools and workflows for maximum productivity.
Automation & Productivity
VentureBeat - The future of AI is unknown. That’s the problem with tech ‘prophets’ influencing AI policy | The AI Beat
The blog post offered revelations, foretold events, warned the world of what is coming, and presented OpenAI as the trustworthy savior. The grand message seemed oddly disconnected from its product-focused PR around how tools like ChatGPT or Microsoft’s Bing might help in use cases like search results or essay writing.
Artificial Intelligence
Network World - How IT pros might learn to believe in AI-driven network-management
In an Enterprise Management Associates (EMA) survey of 250 IT professionals who use AI/ML technology for network management, 96% said those solutions have produced false or mistaken insights and recommendations. Nearly 65% described these mistakes as somewhat to very rare, according to the recent EMA report “AI-Driven Networks: Leveling Up Network Management.” Overall, 44% percent of respondents said they have strong trust in their AI-driven network-management tools, and another 42% slightly trust these tools.
Network Management
eWeek - Generative AI: Enterprise Use Cases
For software developers and programmers, generative AI uses cases include writing, completing, and vetting sets of software code. Quality assurance is perhaps the most important emerging use case in this area, with generative AI models handling bug fixes, test generation, and various types of documentation
Artificial Intelligence
VentureBeat - Why attackers love to target IoT devices
Lacking designed-in security and plagued with chronic default password use, Internet of Things (IOT) devices are quickly becoming attackers’ favorite targets. Add to that the rapid rise of the many different roles and identities assigned to each advanced IoT sensor in an operations technology (OT) network, and their proximity to mission-critical systems running a business, and it is no surprise attackers love to target IoT devices.
Security
VentureBeat - Just 14% of CISOs possess desired traits for cybersecurity-expert board positions: Report
“We identified five traits: infosec tenure, broad experience, scale, advanced education and diversity — as differentiators for CISOs seeking candidacy for cyber-expert roles on boards"
Security
ZDNet - What is Bing Chat? Here's everything you need to know 
In a June 2 release, Microsoft expanded Bing Chat's limit to 30 turns per chat and 300 chats per day. Bing Image Creator support was also expanded to all modes, and travel queries were optimized to give more visual results
ChatGPT
sdxCentral - Apple’s Vision Pro might be the first to fully use 5G tech — or not
“XR devices heavily rely on high-speed, low-latency, reliable connectivity, especially for real-time interactions in XR and, in [the] future for metaverse applications. Connectivity to the device (which includes both the on-premises connectivity and the broadband access connection) becomes crucial when graphics rendering moves to the cloud. This is not so much of a concern for the first-generation Vision Pro but will be important in future. However, good Wi-Fi connectivity is still a potential point of failure for the first-generation Vision Pro.”
Automation & Productivity
Blocks & Files - Seven steps for using zero trust to protect your multicloud estate
Seventy-two percent of 1,000 IT decision makers cited the inability to locate and protect dynamic and distributed data generated by DevOps and cloud development processes, according to the Dell Technologies Data Protection Index. Overall, 67 percent of those surveyed said they are not confident that they can sufficiently cope with ransomware and malware attacks.
Security
VentureBeat - To combat GPU shortage for generative AI, startup works to optimize hardware
According to the company, access to compute is one of the biggest obstacles to AI development, and the scarcity is only going to increase as inference workloads accelerate. By extending the yield of the current AI chip supply and legacy inventory without affecting accuracy, CentML says it can increase access to compute in what it calls a “broken” marketplace for GPUs.
Artificial Intelligence
The Verge - This is what Instagram’s upcoming Twitter competitor looks like
The new standalone app will be based on Instagram and integrate with ActivityPub, the decentralized social media protocol. That will theoretically allow users of the new app to take their accounts and followers with them to other apps that support ActivityPub, including Mastodon.
Social Media
VentureBeat - Sierra Ventures’ Tim Guleri on generative AI: ‘I’ve never been as excited and as scared in my 20 years of doing VC’
“I’m excited because everything that we have done to create value in the industry can be redone 100x better riding on the back of gen AI,” he continued. “I’m scared because of the things that we’re talking about in terms of hallucinations and privacy and all of the things that I believe need to be fixed entirely… and I’m a bit paranoid, I guess, when it comes to the firm because I think we need to lead the way as an early stage venture firm in the way we operate — to catch the best opportunities early enough.”  
Artificial Intelligence
sdxCentral - 2023 Verizon data breach report warns of soaring ransomware, weak credentials – and human failings
Looking specifically at web applications and how they are breached, the 2023 DBIR found that 86% of breaches involved the use of stolen credentials. Only 10% of web application breaches involve the exploitation of an actual software vulnerability.
Security
ZDNet - Should AI come to your doctor's office? OpenAI's co-founder thinks so 
This healthcare provider is trying out AI-assisted 'hands-free charting' to generate notes and visit summaries -- with impressive results, at least in time savings.
Automation & Productivity
Computerworld - WWDC: What’s new for enterprise admins and device management?
These become more versatile this year with updates to Continuity, Apple Wallet, and iCloud Keychain. Administrators also gain additional control to encourage users to sign into the apps and services they need. Managed Apple IDs can also be used in more situations, such as when enrolling a device in order to keep personal and work data separated.
IT Management
The Hacker News - How to Improve Your API Security Posture
It involves identifying potential vulnerabilities and misconfigurations that could be exploited by attackers, and taking the necessary steps to remediate them. Posture management also helps organizations classify sensitive data and ensure that it's compliant with the leading data compliance regulations such as GDPR, HIPAA, and PCI DSS.
Security
sdxCentral - Here’s how AI could destroy the planet
Today’s conversations around AI make assumptions regarding how the technology will be used from an efficiency perspective. It’s fairly expensive to train large language models (LLMs) used in generative AI technology, “so people are assuming … we’re barely going to use it,” he explained.
Sustainability
TechRepublic - Verizon 2023 DBIR: DDoS attacks dominant, while pretexting drives BEC growth
BECs have evolved to include several sophisticated gambits, including one recently reported by Avanan, a unit of Check Point Software, involving the use of legitimate services, like Dropbox, to hide malware.
Security
SiliconANGLE - Report: Just 42% of US workers see generative AI as a threat
“Generative AI is more uniquely suited for augmentation — primarily of knowledge workers — rather than automation,” she said. “At KPMG, we know that to realize the augmentation benefits like increased productivity, people will need to swiftly adopt the technology and learn how to work with it effectively. It’s a mindset and skills shift.”
Artificial Intelligence
TechRepublic - New zero-click threat targets iPhones and iPads
Kaspersky’s zero-click attack report has caused controversy, as the Russian Federal Security Service claims thousands of Russians, including foreign diplomats and government officials, were targeted and compromised by the malware. Russia’s Federal Security Service has accused Apple and the U.S. National Security Agency of masterminding the attacks; Apple has denied this claim.
Security
Network World - What is SDN and where is it going?
 In a traditional network structure, decisions on how network packets get transmitted from one computer to another are made by the physical routers, switches, and firewalls that make up the network infrastructure. The functionality of these network devices is divided conceptually into elements called planes, including the data plane (sometimes called the forwarding plane), the control plane, and the management plane.
Network Management
SiliconANGLE - Actually, AI will save the world, not destroy it, says venture capitalist Marc Andreessen 
He believes that rather than take our jobs, AI “may cause the most dramatic and sustained economic boom of all time.” The article goes on to outline benefits on top of benefits. It’s certainly an interesting and persuasive, if single-minded, argument. His conclusion is that developers and companies should be allowed to reach for the stars and not be held back by “regulatory capture” and a “government-protect cartel.
Artificial Intelligence
sdxCentral - Generative AI can, and will, be used against you
He pointed out that invoice fraud in general is a serious problem — this is when attackers pretend to be an executive or business owner and successfully convince a finance department to pay out a fraudulent invoice. Adding genAI to the mix only makes attacks more convincing; platforms can quickly generate fake text, voice, image and video.
Artificial Intelligence
SiliconANGLE - There’s a lot of enterprise-grade secure browsers out there, but are they ready for prime time? 
One way that the enterprise products — and some of the consumer ones such as Brave — work is by doing a sleight-of-hand trick. When the browser is fired up, the user is transported to the vendor’s data center and runs a virtual session, or a complete Linux virtual machine, so that any phishing or malware attempt can’t touch the endpoint.
Privacy & Security
eWeek - 100+ Top Artificial Intelligence (AI) Companies 2023
To chronicle this growth, this list of AI companies reflects the chaotic and moment-by-moment shifts disrupting the tech industry. It covers the full ecosystem of AI vendors: new generative AI companies, entrenched giants, AI purveyors across verticals, and upstart visionaries with a gleam in their eye.
Artificial Intelligence
SiliconANGLE - How Auto-GPT will revolutionize AI chatbots as we know them 
ChatGPT might seem magical to users for its ability to answer questions and produce content based on user prompts, such as summarizing large documents or generating poems and stories or writing computer code. However, it’s limited in what it can do because it’s capable of doing only one task at a time. During a session with ChatGPT, a user can prompt the AI with only one question at a time and refining those prompts or questions can be a slow and tedious journey.
Automation & Productivity
SiliconANGLE - Oracle’s ‘Starlink’ cloud strategy gets interesting 
Oracle typically doesn’t get first mention, not just among hyperscalers, but on its home turf of databases, its Autonomous Database processes many times more queries per hour than Snowflake Inc., which typically tends to get the spotlight. OK, that encompasses both transaction processing and data warehousing, so Oracle casts a wider net. But specifically, that’s more than 9 billion queries per hour. Who knew?
Data & Analytics
Datanami - IDC Report: The Convergence of Modern Technologies Transforms IT Roles, Fueling Growth in DataOps and MLOps
“The census data shows that a dramatic, once-in-a-generation shift in the composition of the IT workforce is underway. This shift is akin to what took place during the years from 1997 to 2002 when the emergence of the commercial internet and the .com era turned priorities upside down for much of corporate IT and led to the hiring of vast numbers of web developers and networking experts,”
Tech Jobs
Computerworld - IT is driving new enterprise sustainability efforts
For most IT organizations, says Bjoern Stengel, global sustainability research lead at IDC, “the low-hanging fruit is increasing infrastructure performance with equipment that has a lower carbon footprint and is more energy efficient.”
Sustainability
sdxCentral - 4 security myths hindering CISOs effectiveness
“Rather than continuing to pursue more data and more analysis, savvy CISOs engage in a minimum effective insight approach,” Teixeira said. “Determine the least amount of information needed to draw a straight line between the enterprise’s cybersecurity funding and the amount of vulnerability that funding addresses.”
Security
SiliconANGLE - New ways to reduce the chances of ransomware attacks 
The IBM “X-Force Definitive Guide to Ransomware 2023” touches on tactics and is based on examining their customers’ anecdotal incidence response data as part of the company’s X-Force security practice. It found that in the past year, “the average time to complete a ransomware attack diminished from two months to fewer than four days — giving organizations very little time to detect and thwart potential attacks.”
Security
ZDNet - The impact of generative AI on software team productivity is... complicated 
"However, most of the code that is generated is security-vulnerable and might not pass enterprise-grade code. So, while AI can help accelerate coding, care should be taken to analyze the code, find vulnerabilities, and fix it, which would take away some of the productivity increase that AI vendors tout about."
Artificial Intelligence
SiliconANGLE - Six technical security trends CISOs need to know in 2023 
Geopolitical risk continues to affect organizations worldwide in 2023, and many of these risks are emerging as supply chain exposures. This puts enterprises and their supply chains at increased risk for malware attacks, attacks on cloud infrastructure, attacks on system integrity and availability such as distributed denial of service, and data theft or loss.
Security
Network World - How IT pros might learn to believe in AI-driven network-management
But members of network-engineering teams reported more skepticism than other groups—IT tool engineers, cloud engineers, or members of CIO suites—suggesting that people with the deepest networking expertise were the least convinced. In fact, 20% of respondents said that cultural resistance and distrust from the network team was one of the biggest roadblocks to successful use of AI-driven networking.
Network Management
The Verge - Google’s AI-powered search experience is way too slow
If you’ve opted in to SGE, which is only available to people who sign up for Google’s waitlist on its Search Labs, AI summaries will appear right under the search box. I’ve been using SGE for a few days, and I’ve found the responses themselves have been generally fine, if cluttered.
Automation & Productivity
SiliconANGLE - Cloud conundrum: The changing balance of microservices and monolithic applications 
“There is no one-size-fits-all. If there are a set of services that have the exact same scaling and performance requirements, same security vectors, and most importantly, are managed by a single team, it is a worthwhile effort to see if combining them [into a monolithic app] simplifies your architecture
Cloud
Computerworld - How many jobs are available in technology in the US?
Technology companies shed an estimated 4,725 jobs — a figure that includes nontechnical workers — in May, according to an analysis of the latest US Bureau of Labor Statistics (BLS) figures by IT industry group CompTIA. Job postings for open technology positions also eased off, down to about 234,000 from April’s 300,000, according to a new report from CompTIA.
Tech Jobs
TechRepublic - ChatGPT vs Google Bard (2023): An in-depth comparison
ChatGPT and Google Bard are useful tools for producing text –– anything from summaries of information to creating a poem to writing an essay. ChatGPT was trained on text from the internet, and Google bard was trained on a specific dataset for conversations. This leads some to argue that ChatGPT is better at producing paragraphs and summaries and other text-based processing tasks, while Google Bard is better at conversations.
Automation & Productivity
Computerworld - EU, US lawmakers propose AI code of conduct in absence of regulation 
Although both jurisdictions are currently working on formal legislation intended to regulate AI, it could take years for those rules to be finalized and implemented. By comparison, this proposed draft is expected within weeks and would bridge the gap until any legislation has been passed.
Artificial Intelligence
SiliconANGLE - Fixing email security: It’s still a rocky road ahead 
So what accounts for the holdup? First, implementing these protocols — including yet a fourth one called Brand Indicators for Message Identification or BIMI, which brings visible brand logos in inboxes — is devilishly difficult. When I tried to implement them across my own domains, I needed professional help from Valimail to put this all together properly, plus several months of trial and error to get everything right.
Security
Computerworld - Nvidia Neuralangelo: A faster path to the industrial metaverse
Unlike the consumer metaverse, which was largely backed by Facebook and was effectively dead on arrival, the commercial metaverse is doing rather well. Nvidia is currently the darling of Wall Street and is the primary driver for the commercial metaverse. But creating this industrial-grade metaverse and the digital twins of real objects in it requires a lot of heavy lifting in terms of 3D scanning to duplicate real objects in this virtual environment.
Metaverse
sdxCentral - Is XDR another security buzzword? What you should know
Today, endpoint detection and response (EDR) vendors are pivoting their products toward extended detection and response (XDR) solutions. XDR has the potential to become an advanced form of EDR, but the market lacks a universal standard, said Gartner Senior Director Analyst Jon Amato, who predicts that within the next 12 months, dominant players will emerge and shape the definition and standards of the XDR market.
Security
Network World - 6 lessons from the Amazon Prime Video serverless vs. monolith flap
A software-development team caused quite a stir recently with a blog post describing how it abandoned a serverless architecture project in favor of a monolith—and slashed cloud infrastructure costs by 90% in the process.
IT Management
sdxCentral - What is quantum computing? Its architecture, advantages and disadvantages
Error correction is still difficult, making computation sometimes unreliable. Quantum hardware also requires an optimized environment, with many quantum processors only functional at or around absolute zero (-273°C), under no atmospheric pressure, and completely insulated from the earth’s magnetic field. Retrieving quantum results may also corrupt data.
Quantum Computing
Computerworld - ChatGPT creators and others plead to reduce risk of global extinction from their tech
During a Q&A at MIT earlier this month, Hinton went so far as to say humans are nothing more than a passing phase in the development of AI. He also said it was perfectly reasonable back in the ’70s and ’80s to do research on how to make artificial neural networks. But today’s technology is as if genetic engineers decided to improve grizzly bears, allowing them to speak English and improve their “IQ to 210.”
Artificial Intelligence
AiThority - Top 10 Gen AI Platforms that are Driving Transformation In B2B
Generative AI encompasses different algorithms (artificially generated images and texts), usually based on neural network architectures like generative adversarial network (GANs), that are trained on massive amounts of data, images or texts, to produce similar looking images or texts, yet not the same.
Artificial Intelligence
Blocks & Files - Komprise and relevance in the AI age
Several storage suppliers are directly involved in delivering storage capacity to the GPU servers used in generative AI processing, including Dell, DDN, HPE, IBM, NetApp, Panasas, Pure Storage, VAST Data and Weka. Others are fielding data sets for use by the models such as Databricks, Snowflake and their ilk. Building vector databases? Think Pinecone.
Data Storage
The Verge - OpenAI isn’t doing enough to make ChatGPT’s limitations clear
Users deserve blame for not heeding warnings, but OpenAI should be doing more to make it clear that ChatGPT can’t reliably distinguish fact from fiction.
Artificial Intelligence
SiliconANGLE - Coalition of AI leaders sees ‘societal-scale risks’ from the technology’s misuse 
A statement issued today and signed by more than 375 computer scientists, academics and business leaders warns of profound risks of artificial intelligence misuse and says the potential problems posed by the technology be given the same urgency as pandemics and nuclear war.
Artificial Intelligence
Computerworld - The metaverse: Not dead yet 
As the hype spotlight has shifted sharply to generative AI and all its dangers and possibilities, talk of the metaverse — or “Meh-taverse” — these days largely centers on its demise. And not without reason: Meta (formerly Facebook), which changed its name in 2021 to reflect its new focus, has spent billions on VR development with comparatively little return, at least so far.
Metaverse
sdxCentral - The great CISO resignation: Why security leaders are quitting in droves
Recent research from anti data exfiltration and ransomware prevention company BlackFog revealed that nearly a third (32%) of CISOs or IT cybersecurity leaders in the U.S. and UK were considering leaving their current organization. Nine in 10 CISOs report being “moderately” or “tremendously” stressed, according to another study, and average CISO tenure is just two years and two months.
Security
AiThority - Combating the Rise of Deepfakes in Cybercrime: Strategies for Combating the Issue
An Observatory Report from the Europol Innovation Lab found that by 2026, a staggering 90% of web material may have been produced automatically. Deepfakes undermine trust in digital technology and are becoming an increasing danger to organizations since they are frequently used to deceive and carry out social engineering attacks.
Security
The Verge - Top AI researchers and CEOs warn against ‘risk of extinction’ in 22-word statement
The 22-word statement, trimmed short to make it as broadly acceptable as possible, reads as follows: “Mitigating the risk of extinction from AI should be a global priority alongside other societal-scale risks such as pandemics and nuclear war.”
Artificial Intelligence
Computerworld - What are large language models — and how are they used in generative AI?
If you need to boil down an email or chat thread into a concise summary, a chatbot such as OpenAI’s ChatGPT or Google’s Bard can do that. If you need to spruce up your resume with more eloquent language and impressive bullet points, AI can help. Want some ideas for a new marketing or ad campaign? Generative AI to the rescue.
Automation & Productivity
SiliconANGLE - GPUs get all the headlines, but the future of AI is real-time data 
In this Breaking Analysis, we look at the infrastructure of AI examining the action at the silicon layer specifically around Nvidia’s momentum. Since much of AI is about data, we’ll also look at the spending data on two top data platforms, Snowflake and Databricks Inc., to see what the survey data says and examine the future of real-time data and automation as a catalyst for massive productivity growth in the economy.
Artificial Intelligence
Andreessen Horowitz - Who Owns the Generative AI Platform?
We’ve observed that infrastructure vendors are likely the biggest winners in this market so far, capturing the majority of dollars flowing through the stack. Application companies are growing topline revenues very quickly but often struggle with retention, product differentiation, and gross margins. And most model providers, though responsible for the very existence of this market, haven’t yet achieved large commercial scale.
Artificial Intelligence
Datanami - Airbyte’s Pioneering State of Data Survey Sheds Light on Global Data Engineering Practices
The most used data warehouses are Snowflake and Google BigQuery, then AWS Redshift and Databricks with Azure Synapse lagging behind. In the larger organization segments, Databricks popularity is near on par with Snowflake and BigQuery.
Data & Analytics
Tech Startups - ‘Everyone is a programmer’ with generative A.I., Nvidia CEO says
Currently, generative AI tools using like ChatGPT and Google Bard can assist users with programming tasks. Just last month, Alphabet launched Google Bard AI which can write and debug software code. The new chatbot is able to generate, debug, and explain code. Bard supports 20 programming languages, including C++, Java, JavaScript, and Python, and can now integrate with other Google products.
Automation & Productivity
sdxCentral - Password report: 65% spend more money on sites where logging in is easier
When forgetting their login credentials, American respondents (28%) rely heavily on resetting their password or username more than the global average (24%). And only 57% of Americans still have access to all of their accounts and the online products and services they have registered for — 39% of them track their login information and 18% of them use a password manager.
Automation & Productivity
TechRepublic - Gartner releases 4 trends that will impact cloud, data centers and infrastructure in 2023
Refactoring cloud infrastructure should focus on optimizing costs. This can be done through a series of steps that starts with eliminating redundant, overbuilt or unused cloud infrastructure, as well as building business resilience rather than service-level redundancy; using cloud infrastructure as a way to mitigate supply chain disruptions; and modernizing infrastructure.
Cloud
VentureBeat - 4 trends shaping the future of practical generative AI
This use case for generative AI is urgent because access to institutional knowledge is vanishing. Enterprise data is growing at an explosive rate, yet Gartner estimates that over 80% of that data is unstructured (i.e. PDFs, videos, slide decks, MP3 files etc.), which makes it difficult for employees to find and use.
Artificial Intelligence
TechRepublic - Tech Impact: Sustainable solutions to tackle tech plastic waste
For example, the Electronic Product Environmental Assessment Tool and the Global Reporting Initiative Standards have detailed wide-ranging environmental and sustainability benchmarks; these vary widely depending on industry. GRI, for example, takes into account energy use, the rights of indigenous people, biodiversity, waste and much more.
Sustainability
VentureBeat - Generative AI poised to reshape workplace efficiency, revolutionize jobs: KPMG study
The survey findings reveal that a substantial 72% of respondents believe that GenAI has the potential to significantly enhance productivity within their organizations. Additionally, 66% of participants anticipate a transformation in the future work landscape, while 62% recognize the ability of AI to stimulate innovation and facilitate the development of novel products and services.
Artificial Intelligence
Computerworld - The shadow IT fight — 2023 style
Are an enterprise’s employees supposed to report it to IT? Is that partner supposed to? You guessed it: nobody reports it to IT and yet there it is, accessing and interacting with sensitive corporate intellectual property. Is that particular partner interaction shadow IT?
IT Management
SiliconANGLE - Veeam: Ransomware keeps rising, and paying fraudsters is still not the right approach 
One of the most glaring report findings is that one in seven organizations could potentially have over 80% of their data compromised from a ransomware attack. This reflects a major deficiency in the protection measures currently implemented by many businesses. Even worse, 93% of these attacks target backups, and in three out of four cases, the attackers succeed in crippling an organization’s ability to recover.
Security
AiThority - Gartner Data & Analytics Summit 2023: A Brief Day-by-Day Overview
It’s critical to understand that not every choice should or can be automated. We face the risk of developing data-driven businesses without conscience or a clear purpose if we only concentrate on advancing decision automation without taking into account the human aspect.
Data & Analytics
Blocks & Files - ChatGPT, LLMs, and storage
Such GAIs, with their ability to understand text requests and output competent answers, have the potential to be applied across the entire enterprise and public sector IT landscape enabling fundamentally better search and analytics. Their use threatens/promises to replace and/or improve the productivity of knowledge workers of all sorts, ranging from call center and inside sales staff to accountants, lawyers and financial analysts over the next decade.
Tech Trends
The Hacker News - 5 Must-Know Facts about 5G Network Security and Its Cloud Benefits
With its low latency, higher bandwidth, and extensive security measures, 5G strengthens the security of cloud connectivity. This upgrade enables secure and reliable transmission of sensitive information as well as real-time data processing. 5G allows organizations to confidently use cloud services to store and manage their data, reducing the risk of data breaches.
5G
Forbes - Information Technology’s Treasure Map To The Business Value Of Enterprise Storage
You may think it can take years and years for a storage array to attain an appealing return on investment (ROI) and pay for itself, as you venture into the inefficiency-infested, pitfall-strewn caverns of legacy and conventional enterprise storage. You may think it’s too hard to measure. Can you really know the business value of something so technical as enterprise storage?
Data Storage
VentureBeat - How AI is curing advertisers’ privacy problem
As a result, there is a movement towards broader targeting and more creative variations within the social media industry because the algorithms can target sub-segments within the broader audience by using many more creative assets and machine learning (ML). And they can do so much more effectively than human media planners with their manually pre-planned segmentation and message maps.
Marketing Tech
Network World - Converge NOCs with SOCs to save time and effort
At the very least, the lower tiers of separate NOC and SOC operations should be converged, so that there is neither duplication nor a game of hot potato as staff try to figure out what a problem actually is, and whether the response will be network focused, security focused, or both. Maintaining separate or semi-separate escalation paths is supportable given that lower-level convergence.
IT Management
sdxCentral - Don’t pay ransom: US government updates ransomware guide as attacks rise
NCC Group recorded an unprecedented surge in ransomware attacks in March with 459 victims, a  91% increase over February. The all-time high volume was likely associated with the highly publicized GoAnywhere MFT vulnerability being exploited across the world.
Security
ZDNet - All the major Bing Chat and AI announcements from Microsoft Build 2023
As a result, ChatGPT will no longer be limited to information prior to 2021. Rather, ChatGPT will be able to access the web and have information of current events through the use of Bing's search engine.
ChatGPT
TechRepublic - Google Bard cheat sheet: What is Bard, and how can you access it?
In response to a prompt, Bard can pull information from the internet and present a response. The large language model behind Bard delivers the response in natural language — in contrast to a standard Google search, where a result consists of a snippet of information or a list of links
Automation & Productivity
AiThority - A Guide on How MLCopilot is Using LLMs & Empowering Developers to Straighten ML Processes
On the online side, the tool uses a prompt that incorporates pertinent examples from prior studies to determine the most effective strategy for completing a task. This is considered way more accurate than the manual selection and the application of algorithms.
Machine Learning
sdxCentral - How Dell’s NativeEdge has finally solved complicated edge deployments
 “The optimization piece comes in because then they will need less [proof of concepts], they could consolidate multiple applications into the same architecture and yet we will keep it highly open for different [operation technology] systems, IoT frameworks, applications, many partnering opportunities, a lot of customer choice, including the right-sizing of the hardware required with the same experience.”
Edge Computing
Blocks & Files - How to master multicloud from the ground to cloud (and back again)
IT organizations must now grapple with how to manage, govern and rationalize a complex ecosystem that spans across public clouds, on premises, colocation facilities and edge locations. As a result, they may discover the innovation sought by consuming multiple cloud services is stymied by the toil of managing it all. This is what’s known as multicloud by default.
Cloud
SiliconANGLE - US Surgeon General warns social media is driving a mental health crisis in the young 
Murthy talked about the benefits of social media for the young but mirrored what many scientists have said in that there need to be protections regarding what information kids can access and how much time they spend in their social media universe. It’s well-known that children now often sleep less because of tech, exercise less and spend less time physically interacting with their peers – essential to mental growth and well-being.
Social Media
ZDNet - Google's Bard AI says urgent action should be taken to limit (*checks notes*) Google's power 
I asked Bard chatbot whether we should fear Google. It shared concerns about Google you'd never expect would come from an AI created by Google.

Artificial Intelligence
The Hacker News - The Rising Threat of Secrets Sprawl and the Need for Action
The report shows a 67% year-over-year increase in the number of secrets found, with 10 million hard-coded secrets detected in 2022 alone. This alarming surge in secrets sprawl highlights the need for action and underscores the importance of secure software development.
Security
Computerworld - Ethics — what ethics? For Microsoft, it’s full speed ahead on AI
The stakes couldn’t be higher. Microsoft CFO Amy Hood recently told analysts that a single percentage point of market share in search advertising is worth $2 billion. In the first quarter of 2023, Google had an 85% search market share, compared to 9% for Bing. So, there’s a lot of upside for Microsoft to reap billions if it can edge closer to Google. And that’s just in search. Microsoft sees more billions in additional AI-driven money in the cloud, productivity tools and more.
Artificial Intelligence
Network World - 5G network slices could be vulnerable to attack, researchers say 
About 75% of communication service providers worldwide said that they had experienced up to six security breaches of 5G networks within the past year, according to a November 2022 survey by GlobalData and Nokia. Half of the respondents said that they experienced an attack that resulted in the leakage of customer data, and nearly three quarters said that an attack had caused a service outage.
5G
sdxCentral - Top 5 cloud security risks and best countermeasures
Orca found around half of the analyzed organizations have at least one Git repository containing sensitive data, such as database passwords, API keys, encryption keys, hash salts and secrets. If that information is part of organizations’ source code, attackers can potentially extract them and compromise the systems.
Cloud Security
VentureBeat - Forrester predicts 2023’s top cybersecurity threats: From generative AI to geopolitical tensions
The nature of cyberattacks is changing fast. Generative AI, cloud complexity and geopolitical tensions are among the latest weapons and facilitators in attackers’ arsenals. Three-quarters (74%) of security decision-makers say their organizations’ sensitive data was “potentially compromised or breached in the past 12 months” alone. That’s a sobering cybersecurity baseline for any CISO to consider.
Security
Computerworld - G7 leaders warn of AI dangers, say the time to act is now
Leaders of the Group of Seven (G7) nations on Saturday called for the creation of technical standards to keep artificial intelligence (AI) in check, saying AI has outpaced oversight for safety and security.
Artificial Intelligence
Network World - Ethernet turns 50, but its voyage has only begun 
“The most impactful area for Ethernet at this point is inside large cloud data centers which have shown high growth including interconnecting AI/ML clusters which are ramping up quickly,” Bechtolsheim said.
Network Management
sdxCentral - Forrester: Top 3 tips for choosing an MDR vendor
The report noted that some MDR vendors require automation for any vendor-performed response action, but only “assist” customers in non-automated actions. Human expertise still holds a significant value in understanding the threats. “Restricting response to automated actions does help reduce the cost of delivering the service to customers but lets down customers that are unable — or unready — to automate,” they wrote.
IT Management
SiliconANGLE - AI, edge and multicloud lead the conversation in Las Vegas as Dell embraces role as enterprise collaborator 
“We’ve had, over the last several years, roughly 1,000 AI and machine learning projects inside the company,” Dell said. “This is a massive unlock of the power of data. It’s going to accelerate the economy. We think this is a huge wave.”
Artificial Intelligence
Computerworld - Apple bans employees from using ChatGPT. Should you?
“While AI-powered chatbots are trained and further refined by their developers, it isn’t out of the question for staff to access the data that’s being inputted into them. And, considering that humans are often the weakest element of a business’ security posture, this opens the information to a range of threats, even if the risk is accidental.”
ChatGPT
eWeek - Web3 and Smart Contracts Enable a Scalable API Economy
The key is developing your digital service for Web3 is a very different mindset and approach than you might take if you are to develop your digital service for Web2. It will require some expertise in blockchain technologies and considerations for using a public or private blockchain.
Web3
VentureBeat - AI-powered automation enhances job fulfillment for nearly 60% of workers: Report 
These factors are contributing to the emergence of what has been called the “automation generation” — professionals who proactively adopt automation and AI to enhance collaboration, foster creativity and boost productivity, regardless of age or demographic.
Automation & Productivity
SiliconANGLE - The AI-powered hybrid-multi-super cloud 
In this Breaking Analysis, we examine some of the key infrastructure players in hybrid multicloud, with a focus on Red Hat Inc. and Dell Technologies Inc., two firms that increasingly are partnering with each other as VMware Inc.s future evolves. We’ll share recent Enterprise Technology Research survey data on the position of several other hybrid/cross-cloud players, including Cloudflare Inc., Equinix Inc., Hewlett Packard Enterprise Co., IBM Corp., Oracle Corp., VMware and others.
Cloud
ZDNet - Today's AI boom will amplify social problems if we don't act now, says AI ethicist 
She also highlighted the significance of making AI systems transparent, understandable, and accountable while protecting individual privacy. Baxter stresses the need for cross-sector collaboration, like the model used by the National Institute of Standards and Technology (NIST), so that we can develop robust and safe AI systems that benefit everyone.
Artificial Intelligence
VentureBeat - The thing missing from generative AI is the ‘why’
For large brands, it’s likely to be a very different story — and the reason is the “why.” AI can ingest information and spit out new assets. AI can also test creatives and optimize toward the creatives that are performing. But when it comes to knowing why a creative performs better than another, AI falls short. For any enterprise that highly values its brand, AI will play a different role.
Artificial Intelligence
AiThority - Transforming Businesses: Key Components of AI Orchestration and How it Works
The fact is, both automation and orchestration are crucial to establishing a seamless and successful digital transformation. AI Orchestration comes in handy to reduce duplication and streamline any repetitive process through automatization. Orchestration involves advanced logic and decision making and automation combines different elements to form orchestration.
Automation & Productivity
eWeek - Generative AI Landscape: Current and Future Trends
In this guide to the generative AI landscape, we’ll explore what generative AI is capable of and how it emerged and became so popular. We’ll also examine current trends in the generative AI space and predict what consumers should expect from this technology in the near future.
Artificial Intelligence
VentureBeat - How generative AI’s impact on digital advertising methodology is evolving
The current iteration of AI tools offers users unprecedented speed at creating text and visual assets — obviously an interesting proposition for brands and advertisers. But in the near term, the tools’ real benefits are less associated with brand-visibility efforts, and more on paving the way for innovative solutions and quick campaign ideations.
Artificial Intelligence
Datanami - Toggled Survey: Businesses Grapple with Data Analytics in the Race for Greener, Smarter Buildings
 “Most businesses are only scratching the surface of what the technology can do. Once facility managers start to capitalize on what their performance data is telling them and where to adjust, the true business value of a scalable and flexible IoT-enabled smart building network comes to life.”
Data & Analytics
eWeek - Top 10 AI Detector Tools for 2023
Consequently, there is a great need for AI detector tools. AI content detector software uses artificial intelligence (AI) to identify text written with a generative AI model. The software aims to provide readers with transparency and ensure that only quality content is published.
Artificial Intelligence
The Verge - New AI research lets you click and drag images to manipulate them in seconds
Not only can you change the dimensions of a car or manipulate a smile into a frown with a simple click and drag, but you can rotate a picture’s subject as if it were a 3D model — changing the direction someone is facing, for example. One demo even shows the user adjusting the reflections on a lake and height of a mountain range with a few clicks.
Artificial Intelligence
sdxCentral - CEOs cite AI as a priority (now what?) and sustainability gets real
“They talk about cost management, to some extent, but they usually focus elsewhere,” Raskino explained. “The proposition that the world seems to be putting behind AI is substantial augmentation of professionals and potentially replacing certain tasks. But CEOs have not been  driving productivity in terms of output per worker. So we’ve got a powerful tool meeting a relatively unpracticed set of solutions.”
Artificial Intelligence
VentureBeat - 4 priorities B2B technology leaders should strive to meet this year
Optimizing costs doesn’t necessarily mean refusing to sign new software contracts. Often, in fact, the smartest way to curb costs is to replace legacy systems with more modern and flexible tools that better suit the organization’s current business needs. An ecommerce solution that can manage both B2B and B2C applications might replace two separate legacy tools, for instance, dramatically reducing overall IT costsIT Management
sdxCentral - Dell’Oro digs into NaaS market growth indicators, inhibitors
While the firm’s analysis of the market’s total value is still under wraps, Morgan shared that the report evaluates NaaS as a subset of the public cloud–managed LAN market. “Most of these [NaaS] services only make sense” if they’re delivered in a way that allows equipment to be managed from a central point in the cloud, which is a key functionality of true NaaS offerings.
Network Management
VentureBeat - Business leaders investing in generative AI, automation to reinvent physical operations: Report
Leaders are revising their supply chains and technology budgets to address these challenges and build resilience. The study also found that leaders are now embracing generative artificial intelligence (AI) and automation, with 84% planning to use generative AI and 91% automation to modernize their operations by 2024. Additionally, 51% are already using or planning to use autonomous vehicles or equipment this year.
Automation & Productivity
ZDNet - 6 major risks of using ChatGPT, according to a new study 
These risks include fraudulent services generation, harmful information gathering, private data disclosure, malicious text generation, malicious code generation, and offensive content production.
Privacy & Security
VentureBeat - Predicting the future of endpoint security in a zero-trust world
Endpoints must become more intelligent, resilient and self-healing to support the many new identities they need to protect. Even the most hardened endpoints are at risk because they can’t protect against identity-based breaches. Putting any trust in identities is a breach waiting to happen.
Security
Security Magazine - 47% of all internet traffic came from bots in 2022
For the fourth consecutive year, the volume of bad bot traffic — malicious automated software applications capable of high-speed abuse, misuse and attacks — grew to 30.2%, a 2.5% increase over 2021.
Security
Computerworld - Senate hearings see a clear and present danger from AI — and opportunities
Daniel Ho, associate director for Institute for Human-Centered Artificial Intelligence (HAI) at Stanford University, agreed, saying that by one estimate the federal government would need to hire about 40,000 IT workers to address cybersecurity issues posed by AI.
Artificial Intelligence
VentureBeat - Early adopters of data streaming see up to 10x returns, survey finds
Confluent classified respondents into five groups based on the maturity of their data streaming stack. The so-called level 1 respondents (7%) had data streaming experiments in pre-production, level 2 folks (20%) had projects deployed for non-critical applications, level 3 (63%) had deployment for a few critical systems, while levels 4 and 5 (9%) had several deployments in production for critical systems with streams managed as a product.
Data & Analytics
SiliconANGLE - We need more breach transparency, but a lot of obstacles are in the way 
The U.K. authors go on to bust a few myths about transparency. Among them: Coverups are fine (they aren’t because they prevent others from learning tactics and early warning signs), reporting attacks can’t be done without public disclosure (privacy is more the norm now with many agencies), paying the ransoms is the most expedient solution (it often backfires or encourages the attackers to try to leak your data), and fines are only levied if your data is leaked (the two things are independent of each other and organizations can be fined for all sorts of violations).
Security
TechRepublic - Sticking to traditional security playbook is mistake for cloud security: Palo Alto Networks SVP
Recent research by Palo Alto Networks’ Unit 42 found that more than 60% of organizations take over four days to resolve security issues, over 63% of codebases in production have unpatched vulnerabilities, and threat actors exploit a misconfiguration or vulnerability within hours.
Security
SiliconANGLE - Report finds just one unpatched vulnerability increases the risk of a cyber insurance claim by 33% 
Notable insights from the report included that in addition to “human inaction” — not patching software — human error is also a primary risk factor among companies that have cyber insurance. Phishing accounted for 76% of reported incidents, more than six times greater than the next-most popular attack technique. In the case of phishing, nearly all cyber insurance claims were a direct result of employees falling for phishing tricks
Security
The Verge - Meta security analysts warn of malicious ChatGPT imposters
In the company’s new Q1 security report, Meta shares that malware operators and spammers are following trends and high-engagement topics that get people’s attention. Of course, the biggest tech trend right now is AI chatbots like ChatGPT, Bing, and Bard, so tricking users into trying a fake version is now in fashion — sorry, crypto.
Security
TechRepublic - Splunk report sees upsides to observability
Respondents to the study who were leaders were nearly eight times as likely as beginners to say that their ROI on observability tools far exceeded expectations. Approximately 90% of leaders said they were “completely confident” in their ability to meet availability and performance requirements for their applications and were four times as likely to have resolved instances of unplanned downtime or serious service issues in just minutes versus hours or days.
IT Management
Network World - IT pros worry about network data being fed to AI tools
As more IT organizations apply artificial intelligence (AI), machine learning (ML), and so-called AIOps technology to network management, network data is critical to success. AI/ML technology requires more and more data to learn individual networks, derive insights, and offer recommendations. Unfortunately, many organizations encounter problems when trying to feed network data to these AI tools
Network Management
VentureBeat - 5 ways AI-driven patch management is driving the future of cybersecurity
Cyberattackers’ growing tradecraft now includes greater contextual intelligence about which CVEs are most vulnerable. The result: Manual approaches to patch management — or overloading endpoints with too many agents — leaves attack surfaces unprotected, with exploitable memory conflicts.
IT Management
Computerworld - Survey: Most workers would welcome digital monitoring to boost productivity
A whopping 96% of “digital workers” indicated they would be willing to accept electronic monitoring of their online work in exchange for training opportunities or career development (34%); learning more about their job (33%); or gaining proactive help from IT (30%).
Automation & Productivity
Blocks & Files - Storage races to innovate in face of data explosion
The whole area of IT storage is buzzing with innovation, as startups and incumbents race to provide the capacity needed in a world exploding with unstructured data. Chatbot technology, the I/O speed to get data into memory, the memory capacity needed, and the software to provide, manage, and analyze vast lakes of data all create massive opportunities.
Data Storage
VentureBeat - OpenAI is rolling out ChatGPT Plugins to Plus subscribers. Here’s why that’s a big deal.
In March, OpenAI officially announced 11 third-party plugins, including branded offerings from Instacart, Kayak and Zapier. But the more than 70 third-party plugins that will be made available now include ones for chess play, recipe-finding, live soccer and nutrition. For those developers who want to create a ChatGPT plugin, there is a waitlist for access.
ChatGPT
Blocks & Files - 4 ways CIOs can optimize IT and boost business value
Companies are seeking IT leaders who can be surgical about cutting costs and other critical measures for building business resiliency during a downturn, executive recruiters recently told CIO Journal. Also, financial leaders for leading technology providers noted in earnings calls that customers are optimizing their consumption of cloud software in the face of macroeconomic headwinds.
IT Management
VentureBeat - ChatGPT is about to revolutionize cybersecurity
The widely available use of machine learning/artificial intelligence (ML/AI) for cybersecurity practitioners is relatively new. One of the most common use cases has been endpoint detection and response (EDR), where ML/AI uses behavior analytics to pinpoint anomalous activities. It can use known good behavior to discern outliers, then identify and kill processes, lock accounts, trigger alerts and more.
Security
SiliconANGLE - As cloud computing gets more complex, so does protecting it. Here’s what companies need to do 
Authentication isn’t as simple as just maintaining a single sign-on system, requiring integration to protect all kinds of clouds, across all vendors and across all on-premises equipment under a single umbrella. The nature of cloud computing itself is changing as differences among software as a service, platform as a service and infrastructure as a service have blurred together, making it harder to figure out the best protective scheme.
Security
Computerworld - Prepare for generative AI with experimentation and clear guidelines
IT leaders may remember how, in the past 10 years or so, some user departments ran off to the cloud and made their own arrangements for spinning up instances of software — then dumped the whole mess into IT’s lap when it became unmanageable. Generative AI can make that situation look like child’s play, but there are strategies for starting to manage it ahead of time.
IT Management
VentureBeat - The evolution of the chief data officer (CDO) and what it means for businesses today
The expectations of the CDO were tremendous, regardless of where they rolled up. The CDO was at the center, between IT and business leaders, and was responsible for managing the data “currency” that both sides were dependent on.
Data & Analytics
SiliconANGLE - Dear CEO: Your employees are already using AI to do their work. What’s your AI plan? 
Having basic guidelines for your employees to follow will be important. Your IT team may have strong opinions on which AI tools your company should or should not use. Your legal team may raise significant concerns over issues ranging from who owns the intellectual property generated from AI.to prohibited information that your legal team may not want inputted into an AI tool. Do not wait. Get ahead of this situation now.
Artificial Intelligence
AiThority - Couchbase Survey Shows 9 Out of 10 Developers Are at or Over Capacity; Automation and SQL-based Query Capabilities Top Their Productivity Wish Lists
With so many developers at or over their work capacity, only 5.1% responded they have the ability to take on more projects. As developers’ overall workload increases, more developers are also taking on tasks outside of their normal purview. Specifically, when developers were asked if their responsibilities have been affected in the past 12 months, 3 out of 4 shared they sometimes or consistently take on responsibilities outside of their job description
DevOps
SiliconANGLE - How technology service providers can raise their relevance in 2023
Mobilize for change in product, go-to-market investments or other priorities in situations where the change in context or outlook appears significant and structural. This requires discerning the difference between cyclical challenges that will pass with time and sector challenges that will endure. Keep the organization prepared to respond to changes in context.
IT Management
VentureBeat - Executives fear accidental sharing of corporate data with ChatGPT: Report
The State of Generative AI in the Enterprise report found that ChatGPT is the most popular chatbot in use amongst enterprises, with CopyAI (35%) and Anyword (26%) following closely behind as the second and third most commonly used. However, many companies have banned the use of generative AI tools in the workplace, with ChatGPT being the most frequently banned (32%), followed by CopyAI (28%) and Jasper (23%).
ChatGPT
Network World - Multivendor 5G network slicing test claims 70% gain in deployment speeds
The test deployment used cloud-native network functionality provided by Enea, Oracle and Casa Systems, and orchestration systems from Nokia and Red Hat. Security was provided by Palo Alto, and active monitoring by Emblasoft. Services ran on Red Hat OpenShift, on hardware supplied by Intel, Nokia and HPE.
5G
Aithority - Nearly Half of Senior Leaders Believe Colleagues Have Inadvertently Shared Corporate Data with ChatGPT
Love/hate relationship: ChatGPT is both the most used and most banned tool. 47% of respondents (and 52% of respondents in regulated industries) cite using OpenAI’s popular free chatbot at work. CopyAI (35%) and Anyword (26%) were a distant second and third. But companies banning generative AI in the workplace number almost as high: ChatGPT is the most banned (32%), followed by CopyAI (28%) and Jasper (23%).
ChatGPT
The Verge - Exclusive: Google’s Sundar Pichai talks Search, AI, and dancing with Microsoft
The company is very quick to point out that the “T” in ChatGPT stands for transformer, the large language model technology first invented at Google, but OpenAI and others have been first to market with generative AI products, and OpenAI has partnered with Microsoft on a new version of Bing that feels like the first real competitor to Google Search in a long time.
Artificial Intelligence
AiThority - Nearly 40% of Enterprises Surveyed by expert.ai Are Planning to Build Customized Enterprise Language Models
A significant majority of enterprises (78.5%) realize that the efforts required to effectively train a usable and accurate enterprise-specific language model is a significant undertaking which will require dedicated resources and budget. Almost three-quarters of enterprises surveyed have budget or are discussing adding budget to support large language model (LLM) adoption.
Artificial Intelligence
SiliconANGLE - The chief trust officer was once the next hot job on executive row. Not anymore.
But those bromides aside, the report is worth reading for its Cassandra-like warnings. For example, only 24% of the respondents are planning to increase budgets for digital trust activities. Even fewer say that their organization has a dedicated staff role for digital trust. And although the majority of respondents say it is important to have a framework for digital trust practices, only 20% currently use one.
Privacy & Security
SecurityIntelligence - NSA Releases New Best Practices for Securing Home Networks
Many people think of a cyberattack as something that happens to large companies. However, home networks are increasingly the targets of cyber criminals, who use them as a gateway to corporate networks through remote workers. Since you are a remote worker, your habits and setup at home can actually be the cause of a major corporate breach, which is definitely a career-limiting, not career-enhancing, move.
Privacy & Security
sdxCentral - Top 3 open source networking trends for 2023
The challenge now is that organizations realize they have put all the various disaggregated network components back together to enable a full end-to-end stack for enterprise, cloud and telecom service providers.
Network Management
Computerworld - Will Bing and Edge become the center of the Microsoft universe?
In search, Google has a stranglehold with 85% of the worldwide search market share in the first quarter of 2023, compared to 9% for Bing. In browsing, Edge fares even worse: it accounts for a 5% market share compared to 64% for Chrome and 20% for Safari. That’s a far cry from 2003, when Internet Explorer had a 95% market share.  
Automation & Productivity
SiliconANGLE - The future of open source in the age of AI: Analysts break down Open Source Summit insights 
The organizational model, project model, licensing model and human equation are all areas of concern for open source in the face of the AI surge. However, startups, companies and non-profits will all leverage the value of open source, and finding a balance between using open source and making money will be important, Furrier added.
Artificial Intelligence
The Hacker News - Why Honeytokens Are the Future of Intrusion Detection
"There are clear steps organizations can take beyond common safeguards and security tools to strengthen their defenses and increase their chances of detecting, thwarting or minimizing attack [...] Honeypots, or fake accounts deliberately left untouched by authorized users, are effective at helping organizations detect intrusions or malicious activities that security products can't stop".
Security
ZDNet - 70% of employees are happy to delegate work to AI, according to new Microsoft report 
The employees would be open to receiving assistance in all different sectors including administrative tasks (76%), analytical (79%), creative work (73%), finding the right information (86%), summarizing their meetings and action items (80%), and even planning their day (77%).
Automation & Productivity
SiliconANGLE - Desperately seeking cloud repatriation
The post posited that cloud expenses would become an increasingly large component of cost of goods sold for cloud native software-as-a-service companies at scale. And these costs would become so dilutive to profits that it would either force repatriation or a large discount concession from cloud providers. The authors used the Dropbox case study as an example of the potential savings from repatriation where the company saved $75 million by moving infrastructure back on prem.
Cloud
Datanami - New Pure Storage Survey Underscores Importance of IT Modernization to Support New Tech Initiatives
More Than Half of IT Buyers are Prioritizing AI/Machine Learning and Sustainability Technology Investments: IT buyers have cited that their top investments planned for the next five years are AI/machine learning (52%) and sustainable technology (51%). While less than half (46%) predict they’ll invest in infrastructure automation or orchestration.
IT Management
sdxCentral - What is network-as-a-service (NaaS)? Its benefits, its features and what it replaces
NaaS replaces legacy network architecture like hardware-based VPNs and MPLS connections or on-premises networking appliances like firewalls and load balancers. NaaS vendors use software to run networking functions so customers can set up their own networks without using hardware.
Network Management
ZDNet - 8 habits of highly secure remote workers 
To practice safe remote working, if you have to work in a public place, you should avoid connecting to public Wi-Fi. Working in public spaces has its own set of risks, but public Wi-Fi networks will only amplify your risks of getting hacked and put corporate sensitive information at risk.
Privacy & Security