Articles
What counts as cheating when using AI?
When it comes to the use of AI by students, there is a lack of clarity as to what constitutes cheating. [ + ]
Hidden data tax affecting businesses
Moving from one cloud provider to another based on specialisation makes sense but the impact of decontextualised data can cause headaches for business. [ + ]
ChatGPT: the legal and insurance implications
With employee adoption of tools like ChatGPT outpacing business policies and broader regulation, is the unfettered use of AI putting employers at risk? [ + ]
Cybercriminals spoofing the financial sector
The financial services sector is a highly lucrative target, so it is no surprise that it's among the top industries targeted by cyber attacks. [ + ]
FinOps reskilling offers opportunities
FinOps is driving crucial 'closeness' between technology, finance and the rest of the business. [ + ]
The impact of a four-day work week on IT security
Security compromise detection relies on an established baseline of behaviour, but how do you establish a baseline when everything is abnormal? [ + ]
The automation generation: the AI-powered workforce
Unlike the previous defining generational categories, the automation generation encompasses all ages and demographics. [ + ]
How to protect low-code from external rogue factors
How important is governance in mitigating the risk and challenges of integrating low-code? [ + ]
Experts divided on need for regulation of AI
Researchers have differing opinions on whether there should be more regulation governing the development of advanced AI tools and products. [ + ]
Reduce the risk of accounts payable fraud
As businesses integrate more flexible, technology-driven tools and processes, they also expose their operations to additional risks. [ + ]
Why you need a cyber crisis management plan
Developing a cyber crisis management plan can help minimise an attack's ongoing damage and also prepare the organisation's response to future threats. [ + ]
Mitigating the rise of double extortion ransomware
Ransomware perpetrators have evolved their business model to include a second catastrophic phase — double extortion ransomware. [ + ]
The future of generative AI in business
As AI continues to evolve, IT leaders need to understand the latest developments and invest in the right technologies and tools to stay ahead of the curve. [ + ]
If data is the new oil, why are we just giving it away?
Despite the proliferation of IT and data specialists working in organisations, most don't have any idea what data they hold and where that data is kept. [ + ]
Threat spotlight: Malicious HTML attachments double
Barracuda Networks CTO Fleming Shi shines a light on the cybercriminal misuse of HTML as an attack tool. [ + ]
