-
Eight AI trends to prioritise in 2025
Author: Richard Farrell, CIO at Netcall Whilst 2024 saw the adoption of Generative AI (GenAI) accelerate, it also witnessed significant debates and challenges surrounding its use within business from security and data privacy perspectives, with questions surrounding its true value. As CIOs prepare to tackle AI in 2025, Richard Farrell, CIO of Netcall, shares the top trends that…
-
Harnessing Generative AI for Root Cause Analysis
Author: Neha Khandelwal, Software Design Assurance Engineering Manager, Zebra Technologies Root Cause Analysis (RCA) is a critical yet time-consuming process in the realm of software quality assurance (QA). It requires meticulous investigation to pinpoint the underlying cause of defects, often involving sifting through logs, analysing code, and correlating various system behaviours. QA teams spend significant effort…
-
Introducing Labels: A new era of email organization at Tuta Mail
At Tuta Mail, we focus on delivering unparalleled security, privacy, and open source. In 2024, we were the first email provider to upgrade our encryption to quantum-resistant algorithms, ensuring your data stays protected not only now, but also in the future. This was a great achievements and a huge step for your security. Now, in…
-
Goodbye Google, hello privacy! Best Private Calendar Apps For Free
When choosing a secure Google Calendar alternative you’re spoilt for choice – and most are free! However, many opt for Google or Apple Calendar as these are the default free calendar apps on Android or iPhones. While these apps are great for organization by offering useful features and an easy-to-use design, they track your every…
-
Upcoming Speaking Engagements
This is a current list of where and when I am scheduled to speak: I’m speaking on “AI: Trust & Power” at Capricon 45 in Chicago, Illinois, USA, at 11:30 AM on February 7, 2025. I’m also signing books there on Saturday, February 8, starting at 1:45 PM. I’m speaking at Boskone 62 in Boston,…
-
The First Password on the Internet
It was created in 1973 by Peter Kirstein: So from the beginning I put password protection on my gateway. This had been done in such a way that even if UK users telephoned directly into the communications computer provided by Darpa in UCL, they would require a password. In fact this was the first password…
-
Microsoft Takes Legal Action Against AI “Hacking as a Service” Scheme
Not sure this will matter in the end, but it’s a positive move: Microsoft is accusing three individuals of running a “hacking-as-a-service” scheme that was designed to allow the creation of harmful and illicit content using the company’s platform for AI-generated content. The foreign-based defendants developed tools specifically designed to bypass safety guardrails Microsoft has…
-
How Hackers Steal Your Password
Password Crackers – How Hackers Get Passwords In today’s digital business environment, passwords are often the keys to your organization’s most sensitive assets—from financial records and customer accounts to intellectual property. Unfortunately, hackers are constantly developing methods to steal these passwords and gain unauthorized access. Understanding the techniques they use and how employees can protect…
-
Click Up Power BI Connector: Linking Project Management with Data Analytics
Introduction The integration of project management tools with data visualization platforms has become increasingly crucial. One of such integrations that’s garnering attention is the Click Up Power BI connector. While Click Up provides excellent task and project management capabilities, integrating it with Power BI unlocks more advanced reporting, insights and visualization functionality to take effectiveness…
-
Why MSPs must offer 24/7 cybersecurity protection and response — and how OpenText MDR can help
In today’s cyber threat landscape, good enough is no longer good enough. Cyberattacks don’t clock out at 5 PM, and neither can your security strategy. For Managed Service Providers (MSPs), offering customers 24/7 cybersecurity protection and response isn’t just a competitive advantage—it’s an essential service for business continuity, customer trust, and staying ahead of attackers.…