Insights

Expedia poised to take flight with generative AI

One implementation enables users to search the web for travel in London and automatically delivers the consumer into a seamless booking experience in Expedia, Murthy...

Deoleo doubles down on sustainability through digital transformation

This implementation has taken place at the Córdoba bottling plant, the company’s headquarters, and in the area of ​​quality, for example, the company has carried...

Resilient data backup and recovery is critical to enterprise success

As businesses digitally transform and leverage technology such as artificial intelligence, the volume of data they rely on is increasing at an unprecedented pace. Analysts...

Democratizing HPC with multicloud to accelerate engineering innovations

Today’s research is crucial because it fuels tomorrow’s innovations. Increasingly, the speed and magnitude of innovations rely on technology-powered research and engineering using high performance...

Survey: Marketers embrace AI at expense of metaverse investments

The B2B marketing landscape is experiencing a seismic shift fueled by the ascent of ChatGPT and other generative AI (GAI) apps. In a testament to...

Zendesk to lay off another 8% of its staff, cites macroeconomic issues

CRM software provider Zendesk is reducing another 8% of its workforce citing macroeconomic uncertainty, just six months after the company laid off 300 staffers for...

Trending News

API security in the spotlight – Week in security with Tony Anscombe | WeLiveSecurity

Given the reliance of today’s digital world on APIs and the fact that attacks targeting them continue to rise sharply, API security cannot be an...

All eyes on APIs: Top 3 API security risks and how to mitigate them | WeLiveSecurity

As APIs are a favorite target for threat actors, the challenge of securing the glue that holds various software elements together is taking on increasing...

5 free OSINT tools for social media | WeLiveSecurity

A roundup of some of the handiest tools for the collection and analysis of publicly available data from Twitter, Facebook and other social media platforms...

Tricks of the trade: How a cybercrime ring operated a multi‑level fraud scheme | WeLiveSecurity

A peek under the hood of a cybercrime operation and what you can do to avoid being an easy target for similar ploys They hacked...

How an innocuous app morphed into a trojan – Week in security with Tony Anscombe | WeLiveSecurity

ESET research uncovers an Android app that initially had no harmful features but months later turned into a spying tool This week, ESET malware researcher...

Shedding light on AceCryptor and its operation | WeLiveSecurity

ESET researchers reveal details about a prevalent cryptor, operating as a cryptor-as-a-service used by tens of malware families In this blogpost we examine the operation...