Error message

  • Deprecated function: implode(): Passing glue string after array is deprecated. Swap the parameters in drupal_get_feeds() (line 394 of /home/cay45lq1/public_html/includes/common.inc).
  • Deprecated function: The each() function is deprecated. This message will be suppressed on further calls in menu_set_active_trail() (line 2405 of /home/cay45lq1/public_html/includes/menu.inc).

Technology

New forum topics

PSA: Here are Netflix’s secret codes to see all its horror movies and shows

TechRadar News - Thu, 10/24/2024 - 10:43

We've all been there: Endlessly scrolling on Netflix, trying to navigate the best streaming service's admittedly huge library. But there's a better way if you're trying to narrow down your search, thanks to Netflix's secret codes.

The codes are actually pretty interesting. These shortcuts date all the way back to 2007, back when Netflix was still a DVD rental service. During that time they came up with a tagging system to categorize movies and TV shows, and these can still be used today.

Nowadays instead of DVDs, they're added onto a URL to fast-track you to find whatever you're looking for. The beginning is always 'https://www.netflix.com/browse/genre/' and then you fill in the blank with any of the codes listed below.

The best Netflix horror codes

The horror genre is huge and it seems to be able to blend effortlessly with pretty much any other. Whether it's comedy horror, sci-fi horror, or even horror romance, there's plenty out there. And while Netflix does have a dedicated 'horror' category on its homepage, you might want to go deeper to find certain titles in the best Netflix movies. There's an impressive number, you might be surprised just how niche some of them go!

Here are the best codes you'll want to use, and where they take you. And if you want specific recommendations, check out TechRadar's Halloween Week for our personal favorites.

  • Horror (general): 8711
  • B-Horror Movies: 8195
  • Creature Features: 6895
  • Cult Horror Movies: 10944
  • Deep Sea Horror Movies: 45028
  • Foreign Horror Movies: 8654
  • Goofy Horror Movies: 4021
  • Horror Comedy: 89585
  • High-Brow Horror: 3261672
  • Monster Movies: 947
  • Satanic Stories: 6998
  • Slasher & Serial Killer Movies: 8646
  • Small Town Scares: 81496215
  • Supernatural Horror Movies: 42023
  • Survival Horror: 2939659
  • Teen Screams: 52147
  • Vampire Horror Movies: 75804
  • Werewolf Horror Movies: 75930
  • Zombie Horror Movies: 75405
You might also like:
Categories: Technology

North Korean hackers use fake game to hack Google Chrome security flaw

TechRadar News - Thu, 10/24/2024 - 10:31

The notorious Lazarus cybercrime gang has been found targeting cryptocurrency users with a “stolen” computer game to attract potential victims.

For those unfamiliar with Lazarus, it’s a North Korean state-sponsored hacking collective known for targeting cryptocurrency companies and users, and has been responsible for some of the biggest crypto heists in history, with the money allegedly going into the country’s government and weapons program.

Cybersecurity researchers from Kaspersky recently found a new campaign that uses a fake game to lure people to a website. Lazarus uses the website to exploit two vulnerabilities in the Chrome browser, and ultimately steal sensitive data from the device.

Cookies, tokens, and more

Kaspersky explained the crooks used a DeFi (decentralized finance) game known as DeFiTankLand, and simply rebranded it into DeTankZone. Users who visit the impersonated site and try to download the game will get a defunct product that doesn’t work past the login/registration screen. However, while visiting the website, a hidden script (index.tsx) will trigger an exploit for a type confusion vulnerability tracked as CVE-2024-4947.

This vulnerability was discovered in V8, Chrome’s JavaScript engine. When exploited, it corrupts the browser’s memory, and overwrites it, granting the crooks access to the address space of Chrome’s process. That, in turn, allows them to grab cookies, authentication tokens, browsing history, and saved passwords.

Since Chrome’s V8 is in a sandbox, and JavaScript execution is isolated from the rest of the system, Lazarus used a different vulnerability for remote code execution, Kaspersky said.

The researchers spotted the flaw in mid-May 2024, and Google came back with a fix two weeks later, on May 25. Cryptocurrency lovers who want to remain secure from Lazarus should bring their Chrome browsers at least to version 125.0.6422.60/.61. Lazarus has been operating this campaign since February, it was concluded.

Via BleepingComputer

More from TechRadar Pro
Categories: Technology

The Cost of Going Solar Is Reaching an All-Time Low

CNET News - Thu, 10/24/2024 - 10:28
Solar panel costs are dropping throughout the nation, with the cheapest systems in Arizona and Texas.
Categories: Technology

Best CD Rates Today, Oct. 24, 2024: The Clock Is Ticking on High APYs

CNET News - Thu, 10/24/2024 - 10:28
Don't sleep on APYs up to 4.75%. They may not be around much longer.
Categories: Technology

Before moving from "analogue to digital," the NHS has to fix its privacy flaws

TechRadar News - Thu, 10/24/2024 - 10:24

Create a centralized database to make patient health records easily accessible by all NHS services, like hospitals, GP surgeries, and ambulances. These so-called "patient passports" are the main innovation of the government plan unveiled on Monday, October 21, to transform the NHS from "analog to digital" over the next decade.

Wes Steering, the health secretary, promises these changes will modernize the country's healthcare institutions to considerably speed up patient care and reduce human errors. A new law, the Data (Use and Access) Bill, is also expected to support this transition and create a standard system where sharing these digital records is the new norm.

At first glance, fixing the issues currently crippling the NHS by embracing the power of digital tools looks like a much-needed step. Some European countries have been using a similar system for years – Estonia began digitalizing all patient records in 2008, for example. Yet, privacy experts (myself included) can see how easy it might be for this ambitious plan to turn into yet another privacy nightmare at the cost of our most sensitive information.

NHS has a bad track record in protecting our data

Let's start with the obvious – so far, the NHS has been really bad at protecting patients' health data against hackers.

The health data of UK citizens has been leaked on several occasions this year, landing on the dark web. On March 15, for example, a ransomware gang hacked Into NHS Dumfries and Galloway's digital database and stole identifying information belonging to both staff and patients, including mental health data of children.

Pathology service provider Synnovis also suffered a major attack in June, resulting in hundreds of gigabytes of sensitive patient data leaking online. A National Cyber Security Centre (NCSC) executive, Professor Ciaran Martin, warned at the time against the risk of further attacks caused by the NHS IT systems being "out of date."

I don't trust that the NHS will take good care of my data anytime soon

More recently, in August, the UK Information Commissioner's Office (ICO) filed a provisional fine of £6 million following the 2022 medical records hack that saw the personal information of almost 83k people compromised.

2023 was also a bad year for people's health data security. Over a million NHS patients have had their sensitive information leaked following a ransomware attack on the University of Manchester – affecting 250 GB, or over a decade’s worth, of patient data. Worse still, the security vulnerabilities of the NHS go back as far as 2012 when the personal information of over 1.8 million patients and staff was exposed.

This trend is only likely to increase considering that cyberattacks are more frequent and destructive than ever thanks to the spread of AI and machine learning software. According to experts, healthcare is among the fields hit the most.

All this is even more worrying considering that, at the time of writing, the government's ambitious plan is at a mere consultation stage – AKA, "we still have to figure out how to make these patient passports hacking-proof."

Well, I don't know about you but, as the situation stands now, I don't trust that the NHS will take good care of my data anytime soon.

No clear plan to escape the "Big Brother" effect

Besides data security, there's also another pressing question: how does the government plan to prevent privacy abuse? The plan is, Steering says, "to ensure patients’ data is protected and anonymized." That's great – on paper, at least. Again, authorities don't have a clue how to do that in practice – and who knows if they ever will.

As health privacy advocates group medConfidential pointed out, these patient records will be accessible by any of the NHS’s 1.5 million staff. "Wes Streeting is planning a ’big brother’ database," said Sam Smith, a spokesperson for the group, according to the Guardian. "A gift to stalkers and creeps who misuse NHS systems to find out the most basic private details that people only tell their doctors."

Such a centralized database also increases the risk of private medical data being sold to big pharma and other companies without patients knowing about it. After all, something similar already happened with today's messy and scattered health record system. Last year, an Observer investigation shed light on how a covert tracking tool placed on the websites of 20 NHS trusts has for years collected browsing information and shared it with Facebook.

I also agree with privacy expert Jamie Akhtar, co-founder and CEO at CyberSmart, when he says that medical records will pass from being managed by healthcare professionals to "the control of politicians, who might decide to sell this sensitive information to the highest bidder," as Yahoo News reported.

NHS APP: now and tomorrow

(Image credit: Photo by Jaap Arriens/NurPhoto via Getty Images )

While an NHS App already exists, this comes with limitations as patients are still held locally (on their GP and visited hospitals system). The new app will de-facto reunite all the information about a patient across all parts of the health service in one place.

As we have seen, there's still a lot that we don't know about the current UK government's plan of action to execute its ambitious goal of making the NHS great again. What we do know, though, is that Britons aren't hopeful about the idea.

A public consultation published in May depicts a grim picture of public trust in the UK's healthcare institutions, with respondents completely lacking confidence in the NHS cybersecurity system. Four out of five patients believe that NHS systems are vulnerable to cyberattacks. Moreover, almost half (49%) strongly believe that the NHS could make mistakes in the handling of their data.

Wes Steering is now urging both NHS staff and patients to take part in the "national conversation.” You have time until the start of next year to voice your concerns and share ideas at change.nhs.uk.

Yes, we all know that the NHS needs to be better, but to do so it's crucial to have a solid plan of action to protect people's data privacy and security. Noble ideas alone won't save our most sensitive information from being leaked and abused.

Categories: Technology

Hauntingly Affordable Ideas for Crafting the Best Halloween Costume on a Budget

CNET News - Thu, 10/24/2024 - 10:13
You know what's actually scary? Overspending on a prepackaged costume you're only going to wear once.
Categories: Technology

Best Apple TV Deals: Save With Direct Discounts and Free Services

CNET News - Thu, 10/24/2024 - 10:00
We found all the best prices available across the Apple TV lineup with discounts and free services on offer.
Categories: Technology

The iPhone 16 Pro 1-Month Later video

CNET News - Thu, 10/24/2024 - 10:00
I tested the iPhone 16 Pro and Pro Max for the past month. They are both impressive even without their marque feature: Apple Intelligence. I've had more time with them to test the batteries, the A17 Pro chip, Camera Control button and iOS 18. Here's what I learned.
Categories: Technology

Best Electric Toothbrushes of 2024

CNET News - Thu, 10/24/2024 - 09:55
Ensure your gums feel as good as your smile with these electric toothbrushes.
Categories: Technology

Apple reportedly prioritizing M4 MacBook Air production for early 2025 launch – new Mac Studio could take a backseat

TechRadar News - Thu, 10/24/2024 - 09:52

Apple’s highly anticipated M4 MacBook Air models are rumored to be in production for launch in 2025, with the brand’s M4 Mac Studio reportedly now being pushed back and becoming a secondary focus.

This rumor comes from well-known Apple hardware leaker Mark Gurman at Bloomberg, months after Apple’s reveal of the brand-new M4 chip, which delivers a dramatic jump in performance across multiple devices – the original announcement showcased the power of the new chip, which we further discuss in our M4 iPad Pro review, improving on the M3’s 10-core GPU and introducing a new CPU with 10 cores.

The new leak suggests that the M4 chip could be present within upcoming new Mac mini and Mac Studio models, but the MacBook Air may be the sole focus for now going into 2025. Apple reportedly has no plans to change the design of the MacBook Air models, with the M4 chip being the primary upgrade.

So what’s the schedule?

As reported by Gurman, Apple had originally planned to work on the enhanced Mac Studio alongside the aforementioned M4 MacBook Air in early 2025. This schedule has apparently now changed to a period between March and June next year – if Gurman is correct, this would be after the expected launch of the MacBook Air M4 models.

Considering the dropping sales of Mac devices, it’s no surprise to see Apple stepping up production of updated MacBook Air models for early next year – if the M4 iPad Pro is anything to go by, then anyone getting their hands on the upcoming laptops should expect substantial performance improvements over the M3 MacBook Air.

The unannounced M4 MacBook Pro is also expected to be unveiled at some point, with a potential reveal in the coming days – though this is only based on different leaks from Gurman. We expect Apple to also reveal new M4 Max chips alongside the upcoming MacBook Pro models, which we anticipate will offer a significant improvement over the M3 Max.

You might also like...

The best MacBook deals in October 2024

MacBook Pro, Mac mini and iMac models are disappearing off the shelves, another sign that Apple’s M4 Mac launch is imminent

Mac users, say goodbye to your Lightning cables: new Magic Mouse, Magic Keyboard, and Magic Trackpad may finally be coming with a USB-C charging port

Categories: Technology

Best Savings Rates Today, Oct. 24, 2024: Don't Let APYs as High as 5.25% Pass You By

CNET News - Thu, 10/24/2024 - 09:50
The sooner you open a high-yield savings account, the more interest you stand to earn.
Categories: Technology

Team Ninja confirms Rise of the Ronin will be enhanced for PS5 Pro

TechRadar News - Thu, 10/24/2024 - 09:47

The list of PS5 Pro-approved games continues to rack up following the console's official announcement as yet another studio confirms upgrades on the way.

In a recent X / Twitter post, Team Ninja announced that Rise of the Ronin, its action role-playing game (RPG) that launched earlier this year, will receive PlayStation 5 Pro support.

Although the developer didn't offer too many details, it did confirm that Rise of the Ronin will get "improved visuals" and "frame rates" on the mid-generation console.

Improved visuals could potentially take advantage of the PS5 Pro's new AI upscaling software, PlayStation Spectral Super Resolution (PSSR), generally enhancing the look of the game in everything from characters, environments, and visual effects.

As for frame rates, the action game could receive additional modes that let players choose what to prioritize, like visuals or performance.

Currently, the PS5 version of Rise of the Ronin features a 60fps Performance mode, 30fps Graphics mode, and a 30fps Ray Tracing mode, so it's possible the PS5 Pro upgrade could improve these options further, allowing players to have the best of both worlds in some capacity.

Experience #RiseoftheRonin with improved visuals and frame rates on #PlayStation5 Pro!Immerse yourself in the vibrant streets of Yokohama, Edo and Kyoto, where breathtaking 19th Century heroes come to life!Forge your fate in the epic world of Bakumatsu Japan. pic.twitter.com/ZFnB0VtmKjOctober 23, 2024

Arrowhead Game Studios has also confirmed that its popular third-person multiplayer shooter, Helldivers 2, will receive a PS5 Pro upgrade in the future, but hasn't provided the specifics just yet.

Alan Wake 2 developer, Remedy, also recently revealed that its horror game will receive Quality and Performance mode upgrades after the mid-gen console launches.

Looking to get your hands on the PS5 Pro ahead of launch? Be sure to check out our PS5 Pro pre-order guide.

You might also like...
Categories: Technology

Never Run Out of Electricity Again With a DJI Power Station, Now Down to Record-Low Price

CNET News - Thu, 10/24/2024 - 09:32
Save $300 on this DJI portable power station thanks to a 25% discount at Amazon, plus a $100 coupon.
Categories: Technology

I Can't Afford a House. So Why Am I Addicted to Zillow?

CNET News - Thu, 10/24/2024 - 09:31
In an expensive housing market, Zillow lets us play pretend.
Categories: Technology

Best Internet Providers in Warwick, Rhode Island

CNET News - Thu, 10/24/2024 - 09:29
Warwick doesn't have too many internet options, but there are a few high-speed internet providers in the city. Here are CNET's picks of the best internet service options in the Rhode Island city.
Categories: Technology

Six ways banks can ensure watertight cybersecurity in a hostile digital world

TechRadar News - Thu, 10/24/2024 - 09:27

70% of UK financial organizations now cite cyberattacks as a main risk to financial stability. This is no surprise, considering financial institutions are 300 times more likely to confront cyberattacks than any other industry. It’s a difficult landscape for leaders in the banking industry to navigate – banks are increasingly interacting with more technology; however, this also increases risk by introducing more entry points for bad actors.

This raises an important question: What are some of the biggest cybersecurity challenges that banks are facing, and how can they safeguard their systems in an increasingly hostile digital environment?

The era of the endpoint

Every device, from servers to employee laptops and mobile phones, represents a potential entry point for attackers. The rise of remote work, and digital consumer banking services, only perpetuates this challenge. In the last couple of years, we’ve witnessed two-thirds of banks offer workers the chance for hybrid work, exposing more remote access for their employees. With this, financial institutions are managing more heterogeneous devices than ever before, which dramatically expands their attack surfaces.

Banking on the cloud

Financial institutions are rushing to reap the rewards of digital transformation through public cloud infrastructure, with 82% of banking executives planning to move over half of their mainframe workloads to the cloud. This introduces another potential attack surface, making the financial sector an increasingly attractive target.

While cloud security follows similar principles as traditional security measures, the principal difference is that it operates over the public internet, leaving security no room for error. Therefore, existing security solutions might not be enough to protect against the unique risks of the cloud. Security teams must update their plans to address the specific needs of the cloud environment.

Thankfully, there are many ways banks can reduce their attack surface and improve their ability to prevent, detect, and respond to attacks regardless of if the endpoint is remote, in a private data center, or in a public cloud.

Here are six steps banks can take to mitigate security threats:

1. Monitor, identify and fix misconfigurations: Misconfigured cloud resources, SaaS applications, or any internet-exposed device can be the root cause of incidents where data is inadvertently exposed or stolen by a threat actor. For financial institutions, this type of threat will have both a monetary impact and can harm their brand and customer trust. To mitigate these risks, banks must not only maintain an accurate inventory of their cloud, SaaS application, and corporate environments but also ensure comprehensive visibility into all endpoints. Active monitoring and detailed visibility allow banks to identify and remediate misconfigurations before they result in serious harm.

2. Enforce multi-factor authentication: Along with strong passwords, multi-factor authentication provides a huge boost to security. The most effective options are hardware security keys or time-based one-time password (TOTP) applications, like Google Authenticator. This ensures that even if a malicious actor obtains a username and password, they won’t be able to log in without access to a physical key or device.

3. Backup data and gain insight: Ransomware is a serious risk to organizations because it brings operations to a screeching halt. To build resilience and ensure access to critical information, even in the event of a successful attack, security and IT teams should not only back up cloud and endpoint data but again, maintain visibility across their environments. By backing up their data and monitoring endpoint activity, banks can better protect themselves and recover more effectively from ransomware attacks.

4. Exercise the principle of least privilege and limit third party access: Compromised user accounts are a leading cause of breaches. Limiting user access to the absolute minimum reduces the impact of a bad actor assuming the identity of a legitimate user. Additionally, overly permissive third-party access can inadvertently expose sensitive information to unintended recipients.

5. Keep patches up to date across all endpoints: Patching is an essential security control. Out-of-date operating systems and applications can leave doors open for intrusion or exploits. To make this easier, banks can use patch management tools to automate numerous updates across all their machines.

6. Use threat detection and response tools: To ensure nothing slips through the cracks, banks should use a threat detection and response tool as part of an in-depth cybersecurity plan. It can also monitor and gain awareness into threats both in the cloud and on endpoints, before they come to fruition, halting them in their tracks.

Cyber attackers commonly target sectors that offer reams of sensitive data and the possibility of lucrative pay outs when held for ransom – making financial services a handsome target. To combat this, IT teams at banks, insurance carriers, and other financial institutions, need to partner with security teams to reduce their attack surface, harden endpoints, and address known vulnerabilities quickly.

By taking a few smart steps and partnering with the right solution providers, banks can rest easy knowing that their data is safe.

We've featured the best business VPN.

This article was produced as part of TechRadarPro's Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro

Categories: Technology

How organizations can tackle inefficient data storage

TechRadar News - Thu, 10/24/2024 - 09:19

Sustainability has never been higher on the boardroom agenda, as both consumers and regulators alike keep a keen eye on how businesses are impacting the environment. Failing to recognize this could cost a business, both financially and reputationally, as individuals no longer want to interact with brands that are failing to become more sustainable. In fact, taking that even further, with recent research from PWC discovering that consumers are willing to pay 9.7% more on sustainable produced or sourced goods, despite ongoing inflationary pressures.

To add to this, regulatory pressures, especially when it comes to reducing greenhouse gas emissions, are only set to increase. The Climate Change Act commits the UK to reach net zero by 2050. However, earlier this year, a high court ruled the UK government’s climate action plan ‘unlawful’, citing that there is currently not enough evidence of sufficient policies in place to reduce greenhouse gas emissions. A revised plan will be created in the next 12 months which ensures that the UK will achieve its pledge to cut emissions by more than two-thirds by 2030. It’s likely that the majority of UK businesses will be expected to play some sort of role in this.

Transitioning away from fossil fuels or decarbonizing emissions-intensive industries are often identified are key pathways to net-zero emissions. Another key area that would have a positive impact on organizations' sustainability is efficient data storage. Today, redundant, obsolete or trivial (ROT) and dark data continues to plague organizations, with minimal or no effort made to address data storage issues. This presents a big opportunity for businesses operating in today’s increasingly sustainability-conscious landscape.

What a waste! Data hoarding and sustainability

With the proliferation of digital devices and online applications, individuals are more aware of their data than ever before. However, whilst the topic of data breaches and how to prevent them is often getting airtime, sustainability and the impact that certain data management practices could have on the environment is not.

For example, waste remains a major concern in data storage. The energy consumption of procured storage remains the same regardless of how much of it is used. Thus, using as much of the available capacity as possible, and procuring no more than is needed, must be a priority if businesses want to achieve both efficiency and sustainability.

Data hoarding is a catalyst for poor decision making. As a business's data pile grows, it becomes harder to keep track of everything and easier for cybercriminals to take advantage. Data breaches have devastating consequences and, whilst we’re all aware of the financial and reputational damage that can follow, many of us might not be so aware of the environmental cost of data hoarding, with data centers currently pumping out tons of emissions to manage global data storage, equivalent of almost 2 percent of the world’s emissions, which is the same as the airline industry.

The message is clear. Businesses need to assume responsibility when it comes to data storing, by turning away from poor data management practices, and considering solutions to lessen their carbon footprint.

Making a positive impact

As the pressure to be more sustainable increases, businesses need to get one step ahead. One way to ensure this is to proactively set up emission tracking systems and explore optimizing services that are both eco-friendly and cost-efficient. It is important to get the balance between ensuring that data is securely protected but also that any solutions are being deployed in a way that limits the environmental impact of long-term data storage and management.

Businesses should begin by taking stock of their current data management and storage practices and assessing how they line up with any wider environmental, social and governance (ESG) goals. Through this, areas for improvement can be identified and business leaders can seek advice from internal or external resources.

To minimize waste in data storage, IT leaders can embrace lean principles with techniques such as data compression, de-duplication and thin provisioning. It is beneficial for organizations to establish an official data lifecycle to understand the relevance of data, archive infrequently used data and purges data that is no longer required.

Of course, when it comes to adopting more sustainable data management practices, organizations can consider partnering with cloud service providers to assist in managing their carbon footprint efficiently. Specifically, by dynamically allocating resources across customers’ workloads, cloud data centers can achieve higher resource utilization and energy efficiency – translating into lower carbon footprint associated with the same workload.

A more sustainable future

Moving forward, business leaders will need to be more conscious about the environmental impact of their operations. Dark data should not be considered a natural consequence of digitalization and data waste and data hoarding are two issues that need to be tackled head on. By adopting cloud-based autonomous data management solutions that combine automation, artificial intelligence and elastic architecture, organizations can pave the way for a more cost-effective and sustainable business model.

We've featured the best green web hosting.

This article was produced as part of TechRadarPro's Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro

Categories: Technology

Cybersecurity teams are being left out of creating the next generation of AI tools

TechRadar News - Thu, 10/24/2024 - 09:18

Despite AI tools now being implemented in organizations of all sizes, cybersecurity professionals have reproted they are being excluded from the development process.

Despite the increasing use of AI in security operations, a new survey from ISACA has revealed almost half (45%) of companies shut out cybersecurity teams from the development, onboarding, and implementation of AI solutions.

The threat landscape is rapidly developing, as are the tools security professionals use to combat them, with the survey showing 28% of cybersecurity teams are now using AI to automate threat detection and response, and 27% use the tech for endpoint security.

Shifting focuses

AI has the potential to be used by cybersecurity teams to streamline tasks and lighten workloads, but there’s also evidence AI tools are being increasingly used in cyberattacks against businesses.

With more and more regulations also being introduced regarding AI software, like Europe’s AI Act, governance is becoming much more significant. Shockingly, only 35% of cybersecurity professionals are actively involved in the development of policy governing the use of AI tech within their business.

“Cybersecurity leaders cannot singularly focus on AI’s role in security operations," said Jon Brandt, ISACA Director, Professional Practices and Innovation.

"It is imperative that the security function be involved in the development, onboarding and implementation of any AI solution within their enterprise – include existing products that later receive AI capabilities.”

Staffing difficulties are a persisting problem in the cybersecurity industry, and the survey reveals that there has been an increase in the use of contractors and consultants to plug the gap.

There is an increased reliance on AI or automation to address shortages - making it even more important for security professionals to be included in implementation stages.

More from TechRadar Pro
Categories: Technology

As Fears of a 'Pharmacy Desert' Spread, Walmart Announces Same-Day Drug Delivery

CNET News - Thu, 10/24/2024 - 09:06
Delivery services can reduce costs and save people time, but pharmacy stores remain an important place for certain health services, such as vaccinations. Here's what to know.
Categories: Technology

Best Internet Providers in Utica, New York

CNET News - Thu, 10/24/2024 - 09:03
Utica has vast parks and cultural diversity, but its broadband options are limited. Here are the best internet service providers in Utica.
Categories: Technology

Pages

Subscribe to The Vortex aggregator - Technology