Geek-Guy.com

Category: Emerging Tech

Are your noise-canceling headphones messing with your head?

We all know headphones can be bad for your hearing if you listen to sounds too loudly in such close proximity to your ears. But a BBC report suggests that a new health scare could be emerging around the noise-canceling feature that’s hugely popular in modern earphones. The article considers whether the technology could essentially…

CISO success story: How LA County trains (and retrains) workers to fight phishing

It cost neighboring San Bernardino County $1.1 million to resolve a ransomware attack on its sheriff’s department earlier this year. Jeff Aguilar, the chief information security officer for neighboring Los Angeles County, hopes to prevent a similar fate in any of the 38 county departments he’s charged with safeguarding. Aguilar, who has held high-level security…

Data Governance the Key to Increasing Efficiency: EncompaaS CPO

Generative AI adoption has disrupted virtually every market, but it has also renewed interest in strong data governance protocols that comply with various regulatory and efficiency standards. Tech vendor EncompaaS was founded to simplify the often complex processes involved in keeping organizations compliant with data regulations worldwide. Chief Product Officer Jaimie Tillbrook spoke with Channel…

Microsoft: Russian-Linked Hackers Using ‘Device Code Phishing’ to Hijack Accounts

Microsoft is calling attention to an emerging threat cluster it calls Storm-2372 that has been attributed to a new set of cyber attacks aimed at a variety of sectors since August 2024. The attacks have targeted government, non-governmental organizations (NGOs), information technology (IT) services and technology, defense, telecommunications, health, higher education, and energy/oil and gas

DLP solutions vs today’s cyberthreats: The urgent need for modern solutions

Today’s hybrid network environments are more complex than ever. With workforces and offices now widely distributed, data is actively used across thousands of endpoints, managed and unmanaged, on and off the network. In this new complex environment, insider threats, whether intentional data exfiltration or accidental leaks, add significant challenges for organizations. The rapid adoption of…

Beyond the paycheck: What cybersecurity professionals really want

The cybersecurity industry is facing an unprecedented challenge: retaining skilled professionals in the midst of an ever-expanding threat landscape and a significant skills shortage. Organizations are finding themselves in fierce competition to attract and hold onto cybersecurity talent, and failing to do so can have dire consequences. According to recent research by Forrester, neglecting staff…

Tabby doubles valuation to $3.3B in $160M funding as it looks beyond BNPL and plans IPO

Consumer demand for credit options varies across regions, and for fintechs, understanding these differences is key to survival. In developed markets, where credit cards are common, consumers often view buy now, pay later (BNPL) offerings positively because of their flexible installment options. But in emerging markets like the Middle East, where credit card penetration is…

CSO Award and Hall of Fame Nominations Open Now

Has your organization pioneered groundbreaking security initiatives that delivered real business value? If so, now is the time to showcase your achievements and gain industry-wide recognition. As organizations navigate an era defined by evolving threats—including AI-driven attacks, heightened risks, and shifting dynamics of digital trust—the Chief Information Security Officer (CISO) role has never been more…

Projecting the next decade of software supply chain security

With the rapid pace of innovation accelerating under a new administration, discussions over whether software security will be sidelined in favor of speed are heating up. However, security leaders have long been saying that security protocols shouldn’t slow down development plans — and they don’t when done correctly. This perception must be adopted more widely…

Why cyber hygiene remains critical in the era of AI-driven threats

Cyber-attacks are an assumed inevitable for businesses today. As companies increasingly handle large amounts of valuable data, safeguarding operations has never been more important. Now, half (50%) of IT decision-makers report information security as their most time-consuming task[1]. While AI offers a promising solution, security leaders must get the basics right first. Only by practicing…

CISOs: Stop trying to do the lawyer’s job

There’s a joke that’s been floating around boardrooms for years: “What’s the difference between lawyers and engineers? Lawyers don’t think they’re engineers.” This light-hearted jab highlights a fundamental difference between the two professions. Engineers, and by extension CISOs, focus on building and fixing things, learning a wide array of skills, sometimes sticking their hands into…

DOJ disbands foreign influence task force, limits scope of FARA prosecutions 

One of the first acts taken by Pam Bondi after being sworn in as attorney general was to disband an FBI task force  that countered the influence of adversarial foreign governments on American politics. In a memo issued Wednesday, Bondi wrote that the Department of Justice would be shifting resources in its National Security Division,…

7 tips for improving cybersecurity ROI

When it comes to cybersecurity investments, smart money is directed toward initiatives that deliver the greatest protection at the lowest possible cost. But what appears to be a straightforward calculation can often be anything but. CISOs perennially face challenges securing adequate funding to safeguard the enterprise, placing them often in difficult positions attempting to stretch…

39% of IT leaders fear major incident due to excessive workloads

Enterprise security operations teams find themselves stretched thin and contending with an escalating cyber threat landscape today. Many are understaffed and underfunded, leaving CISOs on edge about the consequences for the enterprise — and their careers. A recent survey from Adaptavist about fallout from last summer’s CrowdStrike outage found that two out of five (39%)…

Video: How DeepSeek And Emerging AI Models Could Impact The IT Channel

It’s been a wile week in the world of AI! DeepSeek went from breaking the mold with its new AI models that the Chinese startup reported were cheaper, faster, and less resource intensive to make by using fewer, sub standard GPU chips. Now, OpenAI accuses the emerging AI leader of copying its models. What does…

CISOs are moving closer to the board — but budget hurdles remain

In recent years, CISOs have often felt that their board of directors did not take them seriously. This key issue for cybersecurity, however, is turning around, with 82% of CISOs now reporting directly to their CEOs, versus 47% in 2023, according to a survey by Splunk. Splunk’s report, which surveyed 500 CISOs, CSOs, and similar security…

The cybersecurity skills gap reality: We need to face the challenge of emerging tech

The cybersecurity skills shortage remains a controversial topic. Research from ISC2 states that the current global workforce of cybersecurity professionals stands at 5.5 million, but the workforce currently needs 10.2 million — a gap of 4.8 million people. Skeptics (and there are lots of them) say hogwash! They claim that these numbers are purely self-serving…

10 top XDR tools and how to evaluate them

Little in the modern IT world lends itself to manual or siloed management, and this is doubly true in the security realm. The scale of modern enterprise computing and modern application stack architecture requires security tools that can bring visibility into the security posture of modern IT components and integrate tightly to bring real-time threat…

Is Your Automation Exposing Critical Data?

Is Automation Compromising Your Data Security? In modern business environments, how secure is your automation process? Alarmingly, many companies are unknowingly exposing critical data due to inadequate Non-Human Identity (NHI) and Secrets Management practices. This emerging field is crucial to maintaining data integrity and has become a high-priority concern for many CISOs, IT professionals, and…

25 on 2025: APAC security thought leaders share their predictions and aspirations

As threat actors and security teams harness the growing potential of artificial intelligence (AI), who will prevail? From generative AI (GenAI) to agentic AI, we look through the lens of 25 of Asia-Pacific’s thought leaders in security – and dive into their predictions and goals for the year. src=”https://b2b-contenthub.com/wp-content/uploads/2025/01/Athikom.jpg?quality=50&strip=all” alt=”athikom” loading=”lazy” width=”400px”>Athikom Kanchanavibhu – Chief…

TSA extends cyber requirements for pipeline owners

The Transportation Security Administration is locking in a pair of pipeline directives for additional years ahead of the looming White House transition. In a posting to the Federal Register on Friday, the Department of Homeland Security component said it ratified the Security Directive Pipeline-2021-01 series and the Security Directive Pipeline-2021-02 series and would extend the…

Biden cyber executive order gets mostly plaudits, but its fate is uncertain

A sweeping executive order on cybersecurity released Thursday won largely positive reviews, with the main question being its timing — and what will come of it with the executive branch set to be handed over from president to president. Chris Inglis, the former national cyber director for Joe Biden who has served under both Democrats…

Cisco’s homegrown AI to help enterprises navigate AI adoption

As the world rushes to integrate AI into all aspects of enterprise applications, there’s a pressing need to secure data-absorbing AI systems from malicious interferences. To achieve that, Cisco has announced Cisco AI Defense, a solution designed to address the risks introduced by the development, deployment, and usage of AI. According to Tom Gillis, SVP…

Fifteen Best Practices to Navigate the Data Sovereignty Waters

Fifteen Best Practices to Navigate the Data Sovereignty Waters josh.pearson@t… Tue, 01/14/2025 – 08:04 Data sovereignty—the idea that data is subject to the laws and regulations of the country it is collected or stored in—is a fundamental consideration for businesses attempting to balance harnessing the power of data analytics, ensuring compliance with increasingly stringent regulations,…

LemFi moves remittances further into Asia and Europe with $53M in new funding

For many emerging market economies, remittances have become a lifeline. Inflows surpassed $669 billion in 2023, according to World Bank research, and they now represent significant portions of GDP in these countries, often outpacing foreign direct investment as the primary source of foreign exchange.  Traditional banks and agents maintain a firm grip on the remittance…

Accenture Releases New Report on AI and Autonomy

Global professional services company Accenture made several announcements to coincide with CES 2025. Among these announcements is the release of the Technology Vision 2025 research report, which highlighted AI and autonomy as key areas of development this year. According to the report, leaders in 2025 should “prepare for an imminent world in which AI is…

Six Tech Trends Shaping the Future of Brand Experiences

Six Tech Trends Shaping the Future of Brand Experiences madhav Wed, 01/08/2025 – 12:38 Business success relies on balancing positive brand experiences and maintaining consumer trust. Consumers want efficiency—2024 research from Thales found that 22% of consumers will give up after less than a minute if they’re having a frustrating customer experience—but they are suspicious…

These Are the Members of Congress Who Are Trading Crypto

Three weeks after Donald Trump’s reelection victory sent cryptocurrencies on a bull run, Rep. Mike Collins, R-Ga., spotted an opportunity. Collins started buying thousands of dollars’ worth of a meme coin called Ski Mask Dog. His legally mandated disclosure of those purchases helped drive the coin’s price up more than 100 percent. The purchases once…

A Day in the Life of a Prolific Voice Phishing Crew

Besieged by scammers seeking to phish user accounts over the telephone, Apple and Google frequently caution that they will never reach out unbidden to users this way. However, new details about the internal operations of a prolific voice phishing gang show the group routinely abuses legitimate services at Apple and Google to force a variety…

White House launches cybersecurity label program for consumers

The White House announced Tuesday the official launch of the U.S. Cyber Trust Mark, a cybersecurity labeling initiative aimed at enhancing the security of internet-connected devices.  The initiative tackles rising consumer concerns about the security vulnerabilities of “smart” devices essential to modern homes. As households become more dependent on interconnected gadgets — with a 2023…

CyTwist Launches Advanced Security Solution to identify AI-Driven Cyber Threats in minutes

CyTwist, a leader in advanced next-generation threat detection solutions, has launched its patented detection engine to combat the insidious rise of AI-generated malware. The cybersecurity landscape is evolving as attackers harness the power of artificial intelligence (AI) to develop advanced and evasive threats. The rise of AI-generated malware and AI-enhanced cyberattacks has escalated the threat…

Exit interview: FCC’s Jessica Rosenworcel discusses her legacy on cybersecurity, AI and regulation

On Jan. 20, Jessica Rosenworcel will leave the Federal Communications Commission, capping off a 12-year tenure that saw her rise from commissioner to chairwoman in 2021. Under her leadership, the agency has taken an aggressive approach to regulating cybersecurity, data privacy and emergent artificial intelligence use in the communications sector. Over the past four years,…

Cross-Domain Attacks: A Growing Threat to Modern Security and How to Combat Them

In the past year, cross-domain attacks have gained prominence as an emerging tactic among adversaries. These operations exploit weak points across multiple domains – including endpoints, identity systems and cloud environments – so the adversary can infiltrate organizations, move laterally and evade detection. eCrime groups like SCATTERED SPIDER and North Korea-nexus adversaries such as FAMOUS

Innovation in API Security: What’s New

So, What’s the Deal with Recent API Security Innovations? As companies across the spectrum of industries including finance, healthcare, travel, and more intensify their adoption of digital technologies, there’s an undeniable need for robust security measures to protect their assets in the cloud. More than ever, Non-Human Identities (NHIs) and Secrets Security Management are emerging…

7 biggest cybersecurity stories of 2024

Cybersecurity headlines were plenty this year, with several breaches, attacks, and mishaps drawing worldwide attention. But a few incidents in particular had far-reaching consequences, with the potential to reshape industry protections, shake up how vendors secure customers’ systems, or drive security leaders to reassess their strategies. Longer-term trends such as increased cybersecurity regulations and the…

Top 10 Cybersecurity Trends to Expect in 2025

The 2025 cybersecurity landscape is increasingly complex, driven by sophisticated cyber threats, increased regulation, and rapidly evolving technology. In 2025, organizations will be challenged with protecting sensitive information for their customers while continuing to provide seamless and easy user experiences. Here’s a closer look at ten emerging challenges and threats set to shape the

Cybersecurity Snapshot: CISA Hands Down Cloud Security Directive, While Threat from North Korean IT Workers Gets the Spotlight

Check out the new cloud security requirements for federal agencies. Plus, beware of North Korean government operatives posing as remote IT pros. Also, learn how water plants can protect their HMIs against cyberattacks. And get the latest on the U.S. cyber incident response framework; the CIS Benchmarks; and local and state governments’ cyber challenges. Dive…

LW ROUNDTABLE — How 2024’s cyber threats will transform the security landscape in 2025

Continuing our look back at 2024, part two of Last Watchdog’s year-ender roundtable turns its focus to emerging threats vs. evolving defense tactics. Part two of a four-part series The explosion of AI-driven phishing, insider threats, and business logic abuse … (more…) The post LW ROUNDTABLE — How 2024’s cyber threats will transform the security…

Data Security Predictions for 2025: Putting Protection and Resilience at Center Stage

Data Security Predictions for 2025: Putting Protection and Resilience at Center Stage madhav Tue, 12/17/2024 – 05:10 Cybersecurity is a remarkably dynamic industry. New trends, technologies, and techniques reshape the landscape at an extraordinary pace, meaning keeping up can be challenging. Protecting data, the driving force of modern businesses, will continue to be the primary…

Guarding against AI-powered threats requires a focus on cyber awareness

Threat actors will always find nefarious uses for new technologies, and AI is no exception. Attackers are primarily using AI to enhance the volume and velocity of their attacks. They’re also using the technology to make phishing communications more believable with perfect grammar and context-aware personalization. As cybercriminals harness new technologies to advance their operations,…

Top Cybersecurity Trends to Watch Out For in 2025

As we approach 2025, the cybersecurity landscape is evolving rapidly, shaped by technological advancements, regulatory shifts, and emerging threats. To keep up, organizations must stay ahead of these developments. Below is an exhaustive list of key cybersecurity trends to watch out for in 2025. For cybersecurity leaders and organizations, staying ahead of cybersecurity industry trends…

CyberArk Launches FuzzyAI to Test AI Models for Security Risks

Identity security solution vendor CyberArk has launched its new tool designed to test AI models and determine potential security issues before problems arise. CyberArk said in a press release announcing FuzzyAI that the tool has jailbroken every model it tested, pointing to significant flaws across AI adoption, leaving organizations vulnerable as they utilize emerging technologies.…

Closer to the Edge: Hyperscaling Have I Been Pwned with Cloudflare Workers and Caching

I’ve spent more than a decade now writing about how to make Have I Been Pwned (HIBP) fast. Really fast. Fast to the extent that sometimes, it was even too fast: The response from each search was coming back so quickly that the user wasn’t sure if it was legitimately checking subsequent addresses they entered…

From Passwords to Passkeys: A Secure Future for Business Authentication

Today’s businesses rely heavily on online systems and remote access, making robust authentication super important. Passwords, the traditional method of authentication, are becoming increasingly vulnerable to cyberattacks due to phishing scams, data breaches, and password fatigue.  In this article, we’ll explore the transition from passwords to passkeys, a more secure and user-friendly authentication method that…

WordPress Appliance - Powered by TurnKey Linux