The coming productivity disruption of generative AI
It surprises me that as recently as December, Generative AI wasn’t even on my radar. Now, it’s what...
National Artificial Intelligence Advisory Committee Releases First Report
NAIAC’s work supports the Biden-Harris administration’s ongoing efforts to advance a comprehensive approach to AI-related risks and opportunities....
Biden-Harris Administration Announces New NIST Public Working Group on AI
The group will build on NIST’s Risk Management Framework to tackle risks of rapidly advancing generative AI. Source::...
Standards for Tracking PFAS Contaminants
Aqueous film forming foams (AFFFs) containing PFAS have been used since the 1960s for fire control and training...
LockBit Green and phishing that targets organizations
Introduction In recent months, we published private reports on a broad range of subjects. We wrote about malware...
IT firms expect to increase hiring next quarter, Manpower says
While organizations across all US industries are expected to boost hiring in the third quarter, employers in the...
Tech battle: Musk and Zuckerberg agree to hold cage fight
Earlier this month, Meta showed staff plans for a text-based social network designed to compete with Twitter. Source::...
Elon Musk: Australia issues legal warning to Twitter over online hate
Elon Musk bought the firm last year for $44bn and promised to protect free speech on the platform....
Threats and key takeaways for the legal sector
New NCSC report outlines the growing threat to the legal sector, with recommendations to improve cyber resilience. Source::...
Cyber Threat Report: UK Legal Sector
An updated report from the NCSC explaining how UK law firms – of all sizes – can protect...
Cisco Secure Email Gateway, Cisco Secure Email and Web Manager, and Cisco Secure Web Appliance Cross-Site Scripting Vulnerabilities
Multiple vulnerabilities in the web-based management interface of Cisco AsyncOS Software for Cisco Secure Email and Web Manager;...
Cisco Duo Two-Factor Authentication for macOS Authentication Bypass Vulnerability
A vulnerability in Cisco Duo Two-Factor Authentication for macOS could allow an authenticated, physical attacker to bypass secondary...
Tagging support for AWS Purchase Order Management
Today, AWS Purchase Order Management announces the general availability of ‘Attribute-based & Resource-based access control’ for purchase orders...
AWS Elemental MediaConvert releases bandwidth reduction filter for HEVC and AVC
Today, AWS announces the general availability of bandwidth reduction filtering for the AVC and HEVC encoders in AWS...
AWS Lambda supports starting from timestamp for Kafka event sources
AWS Lambda now supports starting from a specific timestamp when using Amazon Managed Streaming for Apache Kafka (MSK)...
Webinar: Unleash the Power of Vision Transformers
Learn how Vision Transformers are revolutionizing AI applications with image understanding and analysis. Learn how Vision Transformers are...
Amazon EC2 M6gd instances are now available in Europe (Paris) region
Starting today, Amazon Elastic Compute Cloud (Amazon EC2) M6gd instances are available in Europe (Paris) region. These instances...
Amazon accused of tricking Prime customers
The US has sued Amazon for allegedly manipulating customers during the Prime sign-up process. Source:: BBC News –...
Amazon Redshift improves the experience for encrypting the data warehouse
Amazon Redshift offers comprehensive encryption capabilities to protect your data at rest. Now, Amazon Redshift further enhances the...
New EU security strategy aims to safeguard tech supply chains
A draft strategy published this week by the EU would impose export controls on critical technology and protect...