Wed.Apr 09, 2025

article thumbnail

What are AI agents? How to access a team of personalized assistants

Collaboration 2.0

Agentic AI is all the rage, but what can it actually do for you or your company? Here's everything you need to know.

Access 315
article thumbnail

Microsoft Warns Ransomware Actors Exploiting Windows Flaw

Data Breach Today

Tech Giant Says Threat Actors Are Exploiting a Flaw in Widely-Targeted Windows Tool Ransomware threat actors are exploiting a zero-day vulnerability discovered in a highly targeted Windows logging system tool in a campaign in part targeting U.S. IT and real estate sectors, Microsoft confirmed in a Tuesday blog post urging customers to apply available patches.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Google reveals new Kubernetes and GKE enhancements for AI innovation

Collaboration 2.0

Google unveils Google Kubernetes Engine updates with a big focus on AI.

article thumbnail

SOC It to Me: Planning Your Career in an AI-Driven World

Data Breach Today

Emerging AI Tools Can Transform SOC Analysts' Jobs But Require New Sets of Skills In a job market known for its talent shortage and skills gap, the shift to AI-based solutions represents both an opportunity and a call to action. While AI can tackle grunt work with remarkable accuracy, it also demands a new set of skills from the cybersecurity workforce.

IT 147
article thumbnail

Automation, Evolved: Your New Playbook For Smarter Knowledge Work

Speaker: Frank Taliano

Document-heavy workflows slow down productivity, bury institutional knowledge, and drain resources. But with the right AI implementation, these inefficiencies become opportunities for transformation. So how do you identify where to start and how to succeed? Learn how to develop a clear, practical roadmap for leveraging AI to streamline processes, automate knowledge work, and unlock real operational gains.

article thumbnail

Your Galaxy Watch could get a major sleep apnea upgrade, thanks to AI and Stanford

Collaboration 2.0

Here's how Stanford and Samsung are using AI to turn the Galaxy Watch into a more helpful sleep apnea monitor.

265
265

More Trending

article thumbnail

4 reasons why I just panic-bought a $5,300 Apple Mac Studio way before I wanted to

Collaboration 2.0

When economic uncertainty meets mission-critical hardware needs, what do you do? I crunched the numbers, and waiting just didn't seem worth the risk.

Risk 264
article thumbnail

Teaching Cybersecurity With Principles That Endure

Data Breach Today

Academics Map Out Holistic Cyber Education for Future Defenders in the Age of AI Cybersecurity education can't be built on tools alone. It must prepare students to think critically, navigate complex systems and address the human dimensions of security. That's the vision behind the new textbook "Cyber Security Foundations: Fundamentals, Technology and Society.

article thumbnail

How to get Apple TV+ for less than $3 a month - even if you already subscribe

Collaboration 2.0

Who couldn't use a little extra savings right now?

258
258
article thumbnail

The Real Time Threat Intel Imperative for OT Systems

Data Breach Today

OT Operators Can't Count on Isolation to Protect Network Rare is the OT environment truly isolated from a business network. Experts say real-time, contextual threat intelligence is now essential for securing OT systems, enabling faster detection, more accurate responses and coordinated action across IT and OT teams.

Security 130
article thumbnail

State of AI in Sales & Marketing 2025

AI adoption is reshaping sales and marketing. But is it delivering real results? We surveyed 1,000+ GTM professionals to find out. The data is clear: AI users report 47% higher productivity and an average of 12 hours saved per week. But leaders say mainstream AI tools still fall short on accuracy and business impact. Download the full report today to see how AI is being used — and where go-to-market professionals think there are gaps and opportunities.

article thumbnail

Microsoft is offering free AI skills training for all - and it's not too late to sign up

Collaboration 2.0

Microsoft's 50-day AI Skills Fest offers free AI lessons for beginners and pros, as well as prizes to win and discounts to check out. Register now for free access through May 28th.

IT 247
article thumbnail

Compliance Needs Financial Metrics, Not Just Dashboards

Data Breach Today

Elliott of Zurich Insurance on Why Business Leaders Need Quantifiable Cyber Risks Many compliance programs rely on vague risk scores and dashboards. These don't always help business leaders make decisions. Dan Elliott, head of cyber resiliency, Zurich Resilience Solutions, ANZ, at Zurich Insurance, said organizations should frame compliance through financial metrics.

article thumbnail

Google's latest chip is all about reducing one huge hidden cost in AI

Collaboration 2.0

The 'Ironwood' chip marks a major shift in focus for Google. as performance and efficiency are taking a backseat.

238
238
article thumbnail

Making Compliance a Strategic Business Driver With AI

Data Breach Today

UNSW's Pranit Anand on Personalizing Cyber Awareness Programs Compliance programs can be more than tick-box exercises. When aligned with business strategy, cybersecurity awareness efforts become tools for improving continuity, profitability and risk management, said Pranit Anand, chief investigator at UNSW Business School.

article thumbnail

How to Achieve High-Accuracy Results When Using LLMs

Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage

When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m

article thumbnail

This $400 Motorola phone leaves me with little Pixel 9a envy - and it has a stylus

Collaboration 2.0

Motorola's latest phone may resemble the Moto G, but it offers more capable performance while still keeping costs down.

IT 228
article thumbnail

Hackers Stole 'Highly Sensitive' US Banking Regulator Emails

Data Breach Today

Microsoft Reportedly Alerted Office of the Comptroller of the Currency to Breach For nearly two years, hackers reportedly spied on 150,000 "highly sensitive" emails sent and received by America's banking regulator, the Office of the Comptroller of the Currency. The OCC said it's continuing to probe the "major information security incident.

article thumbnail

AI will change the trades too - and field service technicians can't wait

Collaboration 2.0

81% of technicians believe AI agents can help them do their jobs more efficiently. Here's why.

224
224
article thumbnail

Not ready for ITDR? You can still go adaptive

OpenText Information Management

A couple of weeks ago, Harley Adams and I reviewed Dark Reading's state of identity threat detection and response (ITDR) report, walking through several of the more interesting stats. OpenText commissioned Dark Reading to survey executives and hands-on security professionals, and this report is the result of that survey. It includes responses from individuals from 117 organizations in the U.S.

article thumbnail

The GTM Intelligence Era: ZoomInfo 2025 Customer Impact Report

ZoomInfo customers aren’t just selling — they’re winning. Revenue teams using our Go-To-Market Intelligence platform grew pipeline by 32%, increased deal sizes by 40%, and booked 55% more meetings. Download this report to see what 11,000+ customers say about our Go-To-Market Intelligence platform and how it impacts their bottom line. The data speaks for itself!

article thumbnail

5 ways to avoid spyware disguised as legit apps - before it's too late

Collaboration 2.0

You may not be the intended target of these malicious apps masquerading as legitimate programs - but you can still be their victim.

IT 221
article thumbnail

How to Leak to a Journalist

Schneier on Security

Neiman Lab has some good advice on how to leak a story to a journalist.

97
article thumbnail

Why Google Code Assist may finally be the programming power tool you need

Collaboration 2.0

Google Code Assist now includes Gemini 2.5 in its free tier, but Google's press team left one crucial question unanswered: who exactly gets to use the new AI agents?

IT 219
article thumbnail

The Real Deal: How Cybercriminals Exploit Legitimate Domains

KnowBe4

When it comes to secure email gateways (SEGs), the narrative is quite simple. For years, organizations have relied on SEGs as the foundation of their email security.

article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

The easiest way to try out Ubuntu Linux

Collaboration 2.0

Don't have a spare computer? Afraid the installation will be too difficult? Here's a simple way to try out the OS without so much as a reboot.

209
209
article thumbnail

North Korea Expands Its Fraudulent IT Worker Operations

KnowBe4

North Koreas fraudulent employment operations have expanded to hit countries around the world, with a particular focus on Europe, according to researchers at Googles Threat Intelligence Group.

IT 74
article thumbnail

Adobe Photoshop is getting its first AI agent - here's what it can do for you

Collaboration 2.0

Adobe Acrobat, Express, Photoshop, and Premiere Pro are slated to get agentic AI workflows. Here's what's new.

IT 207
article thumbnail

The US Treasury’s OCC disclosed an undetected major email breach for over a year

Security Affairs

The US Office of the Comptroller of the Currency (OCC) disclosed a major email breach compromising 100 accounts, undetected for over a year. The US Treasurys Office of the Comptroller of the Currency (OCC) disclosed an undetected major email breach for over a year. The cybersecurity incident involved unauthorized access to emails via a compromised admin account.

Access 302
article thumbnail

Maximizing Profit and Productivity: The New Era of AI-Powered Accounting

Speaker: Yohan Lobo and Dennis Street

In the accounting world, staying ahead means embracing the tools that allow you to work smarter, not harder. Outdated processes and disconnected systems can hold your organization back, but the right technologies can help you streamline operations, boost productivity, and improve client delivery. Dive into the strategies and innovations transforming accounting practices.

article thumbnail

5 simple ways to regain your data privacy online - starting today

Collaboration 2.0

A new survey from Malwarebytes reveals that most people are worried about their personal data being misused by corporations. But it doesn't have to be a losing battle. Here's how to better protect yourself.

article thumbnail

Critical Fortinet FortiSwitch flaw allows remote attackers to change admin passwords

Security Affairs

Fortinet addressed a critical vulnerability in its FortiSwitch devices that can be exploited to change administrator passwords remotely. Fortinet has released security updates to address a critical vulnerability, tracked as CVE-2024-48887 (CVSS score 9.8), in its FortiSwitch devices. A remote attacker can exploit the vulnerability to change administrator passwords. “An unverified password change vulnerability [CWE-620] in FortiSwitch GUI may allow a remote unauthenticated attacker to modif

Passwords 179
article thumbnail

I found an AirTag wallet that's functional, relatively affordable, and looks fantastic

Collaboration 2.0

The Titan X Trifold AirTag wallet packs value and function. The best? It's cheaper than Ridge, and 20% off for first-time customers.

IT 201