cybersecurity

Why on-device AI Is the future of consumer and enterprise applications

Unless you’re an accountant, the whole end-of-year tax filing can be a nightmare. While you might look forward to your return, you’re probably not too excited about coughing up money to a tax expert or spending a couple of hours filing yourself. But what if the entire process could be completed with a digital assistant…

Why on-device AI Is the future of consumer and enterprise applications Read More »

AI and outsourcing: What’s the future? (Part one)

In this first part of a two-part article, we look at some of the current and future trends and implications of AI for outsourcing, based on our experience as specialist technology and outsourcing lawyers. We’re predicting here how AI will impact “traditional” forms of IT outsourcing and the management and transformation of business processes through…

AI and outsourcing: What’s the future? (Part one) Read More »

How to ensure public cloud services are used safely and securely

By Published: 12 Jun 2024 The public cloud is a cloud computing model that enables resources such as applications, data storage, and virtual machines to be accessed remotely and on demand. While largely a benefit, it also leaves organisations open to public cloud security risks, particularly when they allow users to access on-demand services from…

How to ensure public cloud services are used safely and securely Read More »

Microsoft’s changes AI Recall feature after intense criticism

When Microsoft pulled back the curtain on Copilot Plus PCs in May, one announcement caught the eye of many cautious Windows users. One of the exclusive features coming to Copilot Plus PCs is called Recall, which uses artificial intelligence to take snapshots of the screen, store and analyze them locally, and then allow you to…

Microsoft’s changes AI Recall feature after intense criticism Read More »

Dangerous macOS malware steals browser data and cryptocurrency

Our malware articles typically concern either Android or Windows, but Apple users occasionally have to deal with malicious software of their own. For instance, the Moonlock Lab cybersecurity team recently discovered a macOS malware strain that can easily evade detection.As the researchers explain, the infection chain begins when a Mac user visits a site in…

Dangerous macOS malware steals browser data and cryptocurrency Read More »

How to disable Windows 11 Recall as soon as Microsoft forces it on you

When Microsoft announced its new AI features for AI PCs, I told you that Windows 11’s Recall is the feature I’ve always wanted from AI devices but that it’s also terrifying. Windows 11 Recall will let AI help you remember what you did on your computer and when it happened. It’s a feature we’ll need…

How to disable Windows 11 Recall as soon as Microsoft forces it on you Read More »

Executive interview: AWS’s GenAI innovation opportunity

Amazon has been building artificial intelligence (AI) systems and using machine learning for well over 20 years. Personalisation and recommendations were among the early innovations introduced on the ecommerce site, and these and other technology concepts, such as the Alexa voice assistant, help to drive forward AI innovation in the Amazon Web Services (AWS) public…

Executive interview: AWS’s GenAI innovation opportunity Read More »

Zero Trust: Unravelling the enigma and charting the future

For nearly two decades, the concept of Zero Trust has perplexed and intrigued IT and cybersecurity professionals alike. It’s been labelled a vulnerability, a decision, a mindset, and even a paradigm shift. Its definition is as elusive as its application is broad, underpinning a diverse array of technologies. But what exactly is Zero Trust? What…

Zero Trust: Unravelling the enigma and charting the future Read More »

Better hygiene may mitigate the need to ban ransomware payments

The general belief that a cyber breach is a matter of ‘if’ not ‘when’ means all organisations potentially face the highly unwelcome prospect of being infected by ransomware, with critical data and operational capabilities only being released following payment to the attacker. Handling a ransomware attack calls for the enterprise to weigh up the value…

Better hygiene may mitigate the need to ban ransomware payments Read More »

Security Think Tank: Maybe let’s negotiate with terrorists

Okay, hear me out.  In the 1960s and 70s, the UK began to develop the policy of non-negotiation in response to the increasing number of terrorist incidents primarily from Northern Ireland; though another, more famous example of not negotiating, would be the siege of the Iranian Embassy in 1980. In the US, the position started…

Security Think Tank: Maybe let’s negotiate with terrorists Read More »

Shopping Cart
Scroll to Top