2023

article thumbnail

Predictions 2024: Exploration Generates Progress 

Forrester IT

Our message to clients for 2024 is simple: Don’t wait. Read Predictions 2024 to discover why you need to move on genAI now, plus our takes on dozens of other critical topics.

538
538
article thumbnail

Clock Starts on SEC Cyberattack Rules: What CISOs Should Know

Information Week

New federal rules will require public companies to disclose cybersecurity incidents as well as material risks from threats. Experts say the rules could be tricky to navigate and leave openings for exploitation by threat actors.

Company 535
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

China-Affiliated Hackers Hit Critical U.S. Infrastructure

IT Toolbox

Computer systems for water, power, communications, and transportation bodies have been affected. The post China-Affiliated Hackers Hit Critical U.S. Infrastructure appeared first on Spiceworks.

article thumbnail

Tech predictions for 2024 and beyond

All Things Distributed

The coming years will be filled with innovation in areas designed to democratize access to technology and help us keep up with the increasing pace of every-day life -- and it starts with Generative AI.

218
218
article thumbnail

How to Start Virtual Care the Right Way: A Proven Roadmap for 2025 and Beyond

Speaker: Dr. Christine Gall, DrPH, MS, BSN, RN

The promise of virtual care is no longer theoretical and is now a critical solution to many of healthcare’s most urgent challenges. Yet many healthcare leaders remain unsure how to build a business case for investment and launching the right program at the right time can be the difference between value and failure. For organizations seeking a financially sound, clinically effective entry point, Virtual Patient Observation (VPO) offers a compelling case to lead with.

article thumbnail

AI vs AI: Next front in phishing wars

Tech Republic Security

Threat intelligence firm Abnormal Software is seeing cybercriminals using generative AI to go phishing; the same technology is part of the defense. The post AI vs AI: Next front in phishing wars appeared first on TechRepublic.

Software 543
article thumbnail

Windows 11 23H2 Upgrade using Intune Feature Updates Policy

Anoop

Hello - Here is the new HTMD Blog Article for you. Enjoy reading it. Subscribe to YouTube Channel [link] and Facebook Page to get the latest updates [link] The post Windows 11 23H2 Upgrade using Intune Feature Updates Policy appeared first on HTMD Community Blog #1 Modern Device Management Guides by Jitesh Kumar.

Policies 211

More Trending

article thumbnail

New DDoS Attack is Record Breaking: HTTP/2 Rapid Reset Zero-Day Reported by Google, AWS & Cloudflare

Tech Republic Security

A vulnerability in the HTTP/2 network protocol is currently being exploited, resulting in the largest DDoS attack in history. Find out what security teams should do now, and hear what Cloudflare's CEO has to say about this DDoS.

Google 542
article thumbnail

Enterprise Guide to Data Privacy

Information Week

How can enterprises prepare for the next round of data privacy activity? This curated guide offers information and articles that will help IT leaders stay up to date.

article thumbnail

How to Gain Control Over Shadow Analytics

Information Week

Are unauthorized analytical tools placing your enterprise at risk? Learn how to detect and remove shadow analytics without disrupting productivity.

How To 538
article thumbnail

GPT 3.5 vs GPT 4.0

Doctor Chaos

The ever-expanding realm of artificial intelligence, OpenAI's GPT (Generative Pre-trained Transformer) models have consistently pushed the boundaries of what is possible in natural language processing. With the release of GPT-4.0, the latest iteration of this transformative technology, many are curious about how it differs from its predecessor, GPT-3.5, and what this progression signifies for the future of AI.Understanding the Foundation:GPT-3.

article thumbnail

AI Isnt the Future — Its the Fight Youre Already In: Are You Ready?

The AI era isn’t coming—it’s here. But over 70% of AI projects fail before they scale. Why? No strategy. No alignment. No ROI. We worked with a $50M company that wasted a year and half their budget chasing AI pilots with no payoff. Sound familiar? That’s where our four-step transformation system comes in: Assess, Strategize, Execute, Scale. We help you cut through the hype, find what actually moves the needle, and build a roadmap that delivers results.

article thumbnail

53 Questions Developers Should Ask Innovators

TechEmpower - Information Technology

At TechEmpower, we frequently talk to startup founders, CEOs, product leaders, and other innovators about their next big tech initiative. It’s part of our job to ask questions about their plans, challenge their assumptions, and suggest paths to success. The conversations are interesting and varied because they’re about new, exciting, different things.

article thumbnail

IBM wants drag-and-drop connectivity for hybrid cloud applications

Network World

IBM is developing a SaaS package to help enterprises securely network heterogenous environments, including edge, on-prem and multicloud resources. The IBM Hybrid Cloud Mesh is a SaaS service that implements a virtualized Layer 3-7 environment to rapidly enable secure connectivity between users, applications, and data distributed across multiple locations and environments, according to Andrew Coward, general manager of IBM’s software defined networking group.

IBM 531
article thumbnail

Top 5 Things You Need To Know About How Generative AI Is Used In Security Tools

Forrester IT

We just released a huge new report: How Security Tools Will Leverage Generative AI with collaboration across the entire Forrester Security and Risk team. This report looks at how generative AI will affect six different security domains: detection and response, Zero Trust, security leadership, product security, privacy and data protection, and risk and compliance.

Tools 504
article thumbnail

Fog Computing or Edge Computing — Know the Difference

Doctor Chaos

The world of computing sometimes seems foreign to the average person. While most tech enthusiasts understand the basics of computing and cloud computing, the changing nature of IT means more terminology emerges to describe new network components, such as edge computing and fog computing.These two types of computing have both similarities and differences.

Cloud 130
article thumbnail

Tariffs on the Table: How to Brief the Board and C‑Suite With Confidence

“What should we do about the tariffs?” There’s no straightforward answer — every leader has a different expectation. CFOs want numbers. COOs want action. CEOs want strategy. And supply chain and procurement leaders need to be ready with the right response — fast. That’s why GEP has created a simple three-part framework that will help CPOs and CSCOs brief the board and C-suite with clarity and confidence.

article thumbnail

What You Need to Know About Hybrid Cloud Computing

Information Week

If you’re mixed up about hybrid cloud computing, you’re not alone. Discover if this increasingly popular approach is right for your organization.

Cloud 541
article thumbnail

How to Check If Someone Else Accessed Your Google Account

Tech Republic Security

Review your recent Gmail access, browser sign-in history and Google account activity to make sure no one other than you has used your account.

Google 545
article thumbnail

What CISOs Need to Know About Nation-State Actors

Information Week

Is your organization prepared for a potential nation-state cyberattack? Learn about the biggest threats and how to reduce risk.

How To 538
article thumbnail

Generative AI Can Write Phishing Emails, But Humans Are Better At It, IBM X-Force Finds

Tech Republic Security

Hacker Stephanie "Snow" Carruthers and her team found phishing emails written by security researchers saw a 3% better click rate than phishing emails written by ChatGPT.

IBM 538
article thumbnail

From Curiosity to Competitive Edge: How Mid-Market CEOs Are Using AI to Scale Smarter

Speaker: Lee Andrews, Founder at LJA New Media & Tony Karrer, Founder and CTO at Aggregage

This session will walk you through how one CEO used generative AI, workflow automation, and sales personalization to transform an entire security company—then built the Zero to Strategy framework that other mid-market leaders are now using to unlock 3.5x ROI. As a business executive, you’ll learn how to assess AI opportunities in your business, drive adoption across teams, and overcome internal resource constraints—without hiring a single data scientist.

article thumbnail

Getting Aggressive with Cloud Cybersecurity

Information Week

Cloud cybersecurity should be addressed proactively in order to detect lurking vulnerabilities before threat actors can attack. Here’s what IT leaders need to know to get the upper hand on cloud cybersecurity.

Cloud 537
article thumbnail

4 Big AI Sustainability Prospects, and One Big Problem

Information Week

With the hype swirling around AI’s generative language possibilities, some of the less discussed benefits could drive innovation for a sustainable future. But there’s a snag that needs a solution.

545
545
article thumbnail

For cybercriminal mischief, it’s dark web vs deep web

Tech Republic Security

A new report from cyberthreat intelligence company Cybersixgill sees threat actors swarming to digital bazaars to collaborate, buy and sell malware and credentials. The post For cybercriminal mischief, it’s dark web vs deep web appeared first on TechRepublic.

Malware 544
article thumbnail

9 Questions for IT Leaders to Ask About Cloud Cybersecurity

Information Week

Rapid migration to the cloud continues, but the benefits of a cloud strategy must be balanced with cybersecurity. How can IT leaders assess their organizations’ cloud security posture?

Cloud 544
article thumbnail

Agent Tooling: Connecting AI to Your Tools, Systems & Data

Speaker: Alex Salazar, CEO & Co-Founder @ Arcade | Nate Barbettini, Founding Engineer @ Arcade | Tony Karrer, Founder & CTO @ Aggregage

There’s a lot of noise surrounding the ability of AI agents to connect to your tools, systems and data. But building an AI application into a reliable, secure workflow agent isn’t as simple as plugging in an API. As an engineering leader, it can be challenging to make sense of this evolving landscape, but agent tooling provides such high value that it’s critical we figure out how to move forward.

article thumbnail

3 Ways the Cloud Will Shape AI in 2023

Information Week

Cloud advances will enable AI breakthroughs, shape cybersecurity and compliance strategies, and provide opportunities for the financially savvy and nimble.

Cloud 545
article thumbnail

3 Key Cloud Computing Trends to Consider When Planning Your IT Budget

Information Week

As remote and hybrid work rises in popularity, so will the adoption of technologies that prioritize agile, secure end-user computing.

Budget 545
article thumbnail

Microsoft adds GPT-4 to its defensive suite in Security Copilot

Tech Republic Security

The new AI security tool, which can answer questions about vulnerabilities and reverse-engineer problems, is now in preview. The post Microsoft adds GPT-4 to its defensive suite in Security Copilot appeared first on TechRepublic.

Microsoft 543
article thumbnail

Learn Cybersecurity Skills From Scratch for Just $30 Through January 1

Tech Republic Security

Save on tech services or switch to a lucrative new tech career in 2024 by training at your own pace to develop high-demand cybersecurity skills. On sale from 12/26 through 1/1.

Training 533
article thumbnail

State of AI in Sales & Marketing 2025

AI adoption is reshaping sales and marketing. But is it delivering real results? We surveyed 1,000+ GTM professionals to find out. The data is clear: AI users report 47% higher productivity and an average of 12 hours saved per week. But leaders say mainstream AI tools still fall short on accuracy and business impact. Download the full report today to see how AI is being used — and where go-to-market professionals think there are gaps and opportunities.

article thumbnail

5 Ways a CIO Can Assess the IT Landscape in a New Role

Information Week

Once settled into a new workspace and role, IT leaders can begin to assess how their new department works (and doesn't) in five key areas.

545
545
article thumbnail

New cybersecurity data reveals persistent social engineering vulnerabilities

Tech Republic Security

Ransomware was down last year, though LockBit led threat actors and employees opened a third of the toxic emails in the last six months of 2022. The post New cybersecurity data reveals persistent social engineering vulnerabilities appeared first on TechRepublic.

Social 545
article thumbnail

Machine-Learning Python package compromised in supply chain attack

Tech Republic Security

A nightly build version of a machine-learning framework dependency has been compromised. The package ran malicious code on affected systems and stole data from unsuspecting users. The post Machine-Learning Python package compromised in supply chain attack appeared first on TechRepublic.

System 545
article thumbnail

How AI is Transforming Cloud Computing

Information Week

Artificial intelligence and cloud computing are a natural match. Learn how this power-couple can help your organization reach new heights.

Cloud 536
article thumbnail

The Ultimate Contact Center Buyers Guide: A Crucial Decision

Harness the True Power of your Contact Center In today’s fast-paced business environment, selecting the right contact center solution is critical for enhancing customer experience, improving operational efficiency, and optimizing costs. This comprehensive guide will walk you through the essential factors to consider when choosing a contact center software that aligns with your business needs.