January 25, 2023

January 25, 2023

How Quantum Metric is using data analytics to optimize digital teams

Quantum Metric was Ciabarra’s attempt to solve problems he personally faced while running his online app store, Intelliborn. As the company grew to over one million active users per day, he uncovered how difficult it was to see and understand all of his customers at scale, and in real time. “I had used Google Analytics, which was great to see how traffic was growing, but it couldn’t tell me where my customers were struggling, and why. I would fix something that someone on Twitter was ‘yelling’ at me about, but it sometimes would impact my business, and sometimes it wouldn’t,” Ciabarra told VentureBeat. “I thought — why is this so hard? Maybe addressing the squeaky wheel didn’t make sense from a business perspective.” That sparked the idea for Quantum Metric. So, with his cofounding engineer, David Wang, alongside his cat, Indy, Ciabarra went on to develop the first version of the Quantum Metric platform. It focused on surfacing customer frustrations and helping organizations see their customer experience through session replays.


Creating a competitive edge with a cloud maturity strategy

Companies cannot become cloud mature overnight. Cloud maturity involves a strategic effort from all levels of the businesses to look carefully at cloud spend, mitigate cloud-related risks, and upskill workers in cloud technologies. Those that manage to achieve a high level of cloud maturity remain much more competitive than firms that stop at merely adopting cloud technologies. According to McKinsey, Fortune 500 companies could earn more than $1 trillion dollars by 2030 as a result of cloud adoption and optimisation.?Deutsche Bank recognised that in order to keep up with the future of banking and remain competitive, it needed to become more cloud mature. ... Cloud maturity is essential to a company’s success – but first leaders need to make sure their employees are equipped with the skills required to solve security issues. Only then will businesses be ready to implement the right strategies to maximise their return on investment and realise the full potential of cloud computing.


CNET Is Testing an AI Engine. Here's What We've Learned, Mistakes and All

Over the past 25 years, CNET built its expertise in testing and assessing new technology to separate the hype from reality and help drive conversations about how those advancements can solve real-world problems. That same approach applies to how we do our work, which is guided by two key principles: We stand by the integrity and quality of the information we provide our readers, and we believe you can create a better future when you embrace new ideas. The case for AI-drafted stories and next-generation storytelling tools is compelling, especially as the tech evolves with new tools like ChatGPT. These tools can help media companies like ours create useful stories that offer readers the expert advice they need, deliver more personalized content and give writers and editors more time to test, evaluate, research and report in their areas of expertise. In November, one of our editorial teams, CNET Money, launched a test using an internally designed AI engine – not ChatGPT – to help editors create a set of basic explainers around financial services topics.?


Common Misconceptions About Modern Ransomware

Not too long ago, if someone decided to pay a ransom, they might not receive the decryption keys after doing so. However, today, ransom payers usually do receive the keys. This was a quiet shift that took place over several years. Before this shift took place, the unsophisticated encryption process could be considered hit or miss. Today, ransomware and threat actors hit more than they miss. Often, they can encrypt most of the data—and do so quickly. Just several years ago, a threat group would take many months to move around in a network, find data sources, monitor traffic and begin an encryption process. Fast forward to today, and the average attack-to-encryption time is 4.5 days.?During the early days of ransomware attacks, threat groups would occasionally move to a domain controller and gain access to an active directory. This granted them the keys to the kingdom and had a detrimental effect on the victim organization. Today, because of poor active directory security and configurations, threat groups can often elevate their credentials and their own active directory rapidly.


Can AI replace cloud architects?

The most likely path is that tactical AI tools will continue to appear. These tools will focus on specific architectural areas, such as network design, database design, platform selection, cloud-native design, security, governance, use of containers, etc. The output should be as good as, if not better than what we see today because these tools will leverage almost perfect data and won’t have those pesky human frailties that drive some architecture designs—emotions and feelings. Of course, some of these AI tools exist today (don’t tell me about your tool) and are progressing toward this ideal. However, their usefulness varies depending on the task. Tactical AI tools must still be operated by knowledgeable people who understand how to ask the right questions and validate the designs and recommendations the tool produces. Although it may take fewer people to pull off the tactical component design of a large cloud architecture, the process will not likely eliminate all humans. Remember, many of these mistakes occur because enterprises have difficulty finding skilled cloud pros.?


Chinese threat actor DragonSpark targets East Asian businesses

SparkRAT uses WebSocket protocol to communicate with the C2 server and features an upgrade system. This allows the RAT to automatically upgrade itself to the latest version available on the C2 server upon start-up by issuing an upgrade request. “This is an HTTP POST request, with the commit query parameter storing the current version of the tool,” researchers noted. In the attacks analyzed by the researchers, the SparkRAT version used was built on November 1, 2022, and deployed 26 commands. “Since SparkRAT is a multi-platform and feature-rich tool, and is regularly updated with new features, we estimate that the RAT will remain attractive to cybercriminals and other threat actors in the future,” researchers said. DragonSpark also uses Golang-based m6699.exe, to interpret runtime encoded source code and launch a shellcode loader. This initial shellcode loader contacts the C2 server and executes the next-stage shellcode loader.

Read more here ...

要查看或添加评论,请登录

Kannan Subbiah的更多文章

  • March 12, 2025

    March 12, 2025

    Rethinking Firewall and Proxy Management for Enterprise Agility Firewall and proxy management follows a simple rule:…

  • March 11, 2025

    March 11, 2025

    This new AI benchmark measures how much models lie Scheming, deception, and alignment faking, when an AI model…

  • March 10, 2025

    March 10, 2025

    The Reality of Platform Engineering vs. Common Misconceptions In theory, the definition of platform engineering is…

  • March 09, 2025

    March 09, 2025

    Software Development Teams Struggle as Security Debt Reaches Critical Levels Software development teams face mounting…

  • March 08, 2025

    March 08, 2025

    Synthetic identity blends real and fake data to enable fraud, demanding new protections Manufactured synthetic…

  • March 07, 2025

    March 07, 2025

    Operational excellence with AI: How companies are boosting success with process intelligence everyone can access The…

  • March 06, 2025

    March 06, 2025

    RIP (finally) to the blockchain hype Fowler is not alone in his skepticism about blockchain. It hasn’t yet delivered…

  • March 05, 2025

    March 05, 2025

    Zero-knowledge cryptography is bigger than web3 Zero-knowledge proofs have existed since the 1980s, long before the…

  • March 04, 2025

    March 04, 2025

    You thought genAI hallucinations were bad? Things just got so much worse From an IT perspective, it seems impossible to…

  • March 03, 2025

    March 03, 2025

    How to Create a Winning AI Strategy “A winning AI strategy starts with a clear vision of what problems you’re solving…

社区洞察

其他会员也浏览了