Misconfigured APIs Account for Two-Thirds of Cloud Breaches !!!

In 2017, most security incidents in the cloud were caused by shadow IT or misconfigured APIs, says a new report from IBM Security X-Force. X-Force Security gathered four sets of data for the IBM X-Force Cloud Threat Landscape Report 2021, including dark web analysis, pen-test results, investigation reports and threat intelligence. In addition, most of …

Misconfigured APIs Account for Two-Thirds of Cloud Breaches !!! Read More »

A new visual search engine combines design and artificial intelligence!!!

With a collaboration with Northumbria University, a visual search platform is being developed that could revolutionize how the museum, library, and gallery collections are searched. Globally, as collections are increasingly presented online, deep Discoveries will provide a unique offering. In progress, computer vision projects were launched to explore possibilities Identify Identification and matching of photographs …

A new visual search engine combines design and artificial intelligence!!! Read More »

Addressing the issue of using hacked data in research efforts!!!

In a Perspective piece published in Nature Machine Intelligence, two health and ethics scientists have discussed the ethics of using data stolen from hackers to conduct scientific research. One is from the Swiss Federal Institute of Technology, the other is from ETH Zurich. The authors of the paper discuss the ethical considerations surrounding the use …

Addressing the issue of using hacked data in research efforts!!! Read More »

Establishing a culture of security must be a priority!!!

Today’s smart, connected, and the increasingly automated world presents businesses with more risks of exposing sensitive data or being compromised by cybercriminals. Companies are increasingly using cloud services and third-party integrations, posing threats such as disruption of operations, erosion of consumer trust, and ultimately damaging their reputations to the detriment of their bottom line. As …

Establishing a culture of security must be a priority!!! Read More »

Scaling cloud to drive business innovation and the three top strategies!!!

As COVID-19 crept into this millennium, it caused the most disruptive period in the century’s history. However, it also demonstrated the power and importance of cloud computing. Numerous organizations rely on cloud computing to respond to customer needs, even under the most challenging conditions. Despite being a bright spot from the pandemic, many enterprises have …

Scaling cloud to drive business innovation and the three top strategies!!! Read More »

Kaseya ransomware attack !!!

In tribute to American Independence Day weekend, Kaseya announced that it suffered a cyberattack on its MSP and enterprise clients on July 2, over the weekend. As shown in the graph below, attackers leveraged a weakness in Kaseya’s VSA software to target multiple managed services providers (MSP) and their customers in a supply chain ransomware …

Kaseya ransomware attack !!! Read More »

Three organizations that learned to think differently and successfully monetized their data!!!

Dow Chemical had a data problem despite a cutting-edge business insights platform. The company generated hundreds of dashboards and thousands of reports, but none of that information enabled better decision-making. The Dow Chemical D&A team stepped back and looked at what the platform could accomplish and how to achieve them. Typically, organizations continue to invest …

Three organizations that learned to think differently and successfully monetized their data!!! Read More »

Cyberattacks from repeat offenders account for 50% of all attacks !!!

A Ponemon survey reveals that cybersecurity leaders don’t have enough information and awareness to plan security defences effectively, leaving companies exposed to risk. A Ponemon survey reveals that cybersecurity leaders don’t have enough information and awareness to plan security defences effectively, leaving companies exposed to risk. A year from now, CISOs will have to start …

Cyberattacks from repeat offenders account for 50% of all attacks !!! Read More »

Ransomware detection at the silicon level: Intel at CES 2021

With improvements to its Hardware Shield and Threat Detection Technology (TDT), Intel announced its ransomware detecting capabilities for its 11th Gen Core vPro processors today at the 2021 Consumer Electronics Show. Cybereason, based in Boston, also announced a partnership. The safety firm expected to feature support for these new features to its security software within …

Ransomware detection at the silicon level: Intel at CES 2021 Read More »

Pegasus software !!! What is it according to DNA Explainer?

Several journalists and activists were notified that their phones were compromised by Pegasus software in 2019, after receiving WhatsApp notification. An ongoing controversy is centred on the highly sophisticated surveillance software. A media collaboration reportedly uncovered documents that showed a list of phone numbers that were allegedly targeted by an unidentified agency using Pegasus software …

Pegasus software !!! What is it according to DNA Explainer? Read More »

Google’s New Tracking ???

Chrome is about to stop accepting third-party cookies, so does that mean Google will lose out on a huge chunk of its ad revenue? Of course not. Federated Learning of Cohorts (FLoC) is a new tracking method Google is developing. It will place users into groups based on their browsing history, and advertisers will be …

Google’s New Tracking ??? Read More »

MongoDB !! Where is it heading next ???

In its first years, MongoDB was considered to be the “barbarians at the gate”. This was because MongoDB believed that the relational model of data was natural but inefficient. Object-oriented software developers and agile software development professionals liked the simpler alternative aligned with modern agile and DevOps methods. MongoDB’s popularity has greatly increased over the …

MongoDB !! Where is it heading next ??? Read More »