CyberArk expands SaaS portfolio for privileged access security with new services
CyberArk has expanded its SaaS platform for privileged access security with new services. The platform should provide companies with a cloud-first strategy with better protection and easier management of privileged access, especially in hybrid cloud environments.
The SaaS platform has received an en... Read more
Uber comes up with open-source dev library for evolutionary algorithms
Evolutionary computing is the use of biological evolutionary theory in the development of algorithms. Uber has introduced an open-source dev library for this technique called EvoGrad.
The creation of evolutionary algorithms is the goal of evolutionary computing, in which a large number of variants ... Read more
Hackers can steal business secrets through vulnerabilities in popular corporate VPNs
Security researchers Orange Tsai and Meh Chang have found several vulnerabilities in popular business VPN services. The errors can be misused to secretly break into business networks, thus stealing business secrets.
The vulnerabilities were found in the services of three major business VPN providers... Read more
AP withdraws authorization from Fraud Helpdesk to collect phishing emails in
The Fraud Helpdesk may no longer collect examples of phishing and other forms of fraud from the Authority for Personal Data. The reason is that the organisation does not have its homework in order.
The Fraud Helpdesk is an independent foundation that provides information about phishing and other for... Read more
Google update technology behind Contact Center AI for better voice recognition
Google has announced its Artificial Intelligence (AI) technology behind its Contact Center AI service to update to improve voice recognition. Contact Center AI is based on Dialogflow and Cloud Speech-to-Text.
The first update is for Dialogflow, writes Silicon Angle. Dialogflow is a cloud-based servi... Read more
Fake LinkedIn alerts successful with phishing, research shows
Research by KnowBe4, expert on phishing attacks, shows that the use of LinkedIn in the subject line of phishing messages leads to a high success rate among cybercriminals.
The company reports this in a press release on Tuesday. KnowBe4 has simulated phishing attempts in the study and then measured ... Read more
Red Hat community still concerned about IBM acquisition
The community around open source specialist Red Hat is still very concerned about the recent acquisition by IBM. This is shown by a recent Q&A with Red Hat's CTO Chris Wright on the popular online discussion platform Reddit. According to the CTO, as often communicated, really nothing will change... Read more
New AWS tool helps optimize EC2 resources
Amazon Web Services (AWS) has launched a new tool to simplify the optimization of EC2 resources. It concerns EC2 Resource Optimization Recommendations.
The tool does exactly what its name suggests: it gives recommendations to optimize EC2 resources. The tool looks specifically at the use of EC2 and ... Read more
Microsoft wants to simplify data division between companies with agreements
Microsoft has proposed several agreements that companies can use to share data across different computing systems and services. There are three draft proposals for similarities for different scenarios.
Companies have always been able to share data, but according to Microsoft, this is often chaotic. ... Read more
Facebook comes up with AI tools for OpenStreetMap community
Facebook, with the help of AI, has mapped more than 300,000 miles (about 482,000 km) of roads in Thailand. Also in a number of other countries where digital mapping was still very low, the company has put hundreds of thousands of kilometres of roads literally on the map on OpenStreetMap.
The differe... Read more