Insights
Expedia poised to take flight with generative AI
One implementation enables users to search the web for travel in London and automatically delivers the consumer into a seamless booking experience in Expedia, Murthy...
Deoleo doubles down on sustainability through digital transformation
This implementation has taken place at the Córdoba bottling plant, the company’s headquarters, and in the area of quality, for example, the company has carried...
Resilient data backup and recovery is critical to enterprise success
As businesses digitally transform and leverage technology such as artificial intelligence, the volume of data they rely on is increasing at an unprecedented pace. Analysts...
Democratizing HPC with multicloud to accelerate engineering innovations
Today’s research is crucial because it fuels tomorrow’s innovations. Increasingly, the speed and magnitude of innovations rely on technology-powered research and engineering using high performance...
Survey: Marketers embrace AI at expense of metaverse investments
The B2B marketing landscape is experiencing a seismic shift fueled by the ascent of ChatGPT and other generative AI (GAI) apps. In a testament to...
Zendesk to lay off another 8% of its staff, cites macroeconomic issues
CRM software provider Zendesk is reducing another 8% of its workforce citing macroeconomic uncertainty, just six months after the company laid off 300 staffers for...
Trending News
API security in the spotlight – Week in security with Tony Anscombe | WeLiveSecurity
Given the reliance of today’s digital world on APIs and the fact that attacks targeting them continue to rise sharply, API security cannot be an...
All eyes on APIs: Top 3 API security risks and how to mitigate them | WeLiveSecurity
As APIs are a favorite target for threat actors, the challenge of securing the glue that holds various software elements together is taking on increasing...
5 free OSINT tools for social media | WeLiveSecurity
A roundup of some of the handiest tools for the collection and analysis of publicly available data from Twitter, Facebook and other social media platforms...
Tricks of the trade: How a cybercrime ring operated a multi‑level fraud scheme | WeLiveSecurity
A peek under the hood of a cybercrime operation and what you can do to avoid being an easy target for similar ploys They hacked...
How an innocuous app morphed into a trojan – Week in security with Tony Anscombe | WeLiveSecurity
ESET research uncovers an Android app that initially had no harmful features but months later turned into a spying tool This week, ESET malware researcher...
Shedding light on AceCryptor and its operation | WeLiveSecurity
ESET researchers reveal details about a prevalent cryptor, operating as a cryptor-as-a-service used by tens of malware families In this blogpost we examine the operation...