Error message

  • Deprecated function: implode(): Passing glue string after array is deprecated. Swap the parameters in drupal_get_feeds() (line 394 of /home/cay45lq1/public_html/includes/common.inc).
  • Deprecated function: The each() function is deprecated. This message will be suppressed on further calls in menu_set_active_trail() (line 2405 of /home/cay45lq1/public_html/includes/menu.inc).

Feed aggregator

New forum topics

Garmin Forerunner heart rate zones not working? Download this beta update now

TechRadar News - Mon, 01/20/2025 - 05:48
  • Garmin has issued its latest public beta
  • The update includes strength and body battery improvements for Garmin users
  • It also includes an important fix for heart rate zones on the Forerunner range.

Garmin has recently issued the latest public beta for all of the best Garmin watches, and one fix for Forerunner models might be enough to encourage users to download it for themselves.

Public beta version 22.14 has started rolling out to devices this month. While it brings a hefty Body Battery and Strength workout upgrade to some models, the company has since confirmed it also contains a vital fix for its Forerunner models and heart rate zones.

In its release notes, the company says 22.14 includes a fix for potential crashing when editing HR zones. More importantly, it says that it has fixed an incorrect time in HR zones issue, and an incorrect heart zones issue.

Naturally, malfunctioning HR zones aren't a malady you'd expect from the best running watches on the market, so if you've been having any trouble with your Forerunner, you might want to consider enrolling in the public beta so you can get this latest fix.

Garmin's Forerunner fix

(Image credit: Future)

This fix has been issued for the Garmin Forerunner 165, 255, 265, 955, and 965, the 265 and 965 release also includes a fix for missing app icons in the notification glance. If you have been having HR zone issues on your Forerunner, you can sign up for the public beta on Garmin's website, or wait for the full rollout.

As noted, the new beta also includes a slew of exciting new features Garmin users can expect later this quarter.

Garmin is adding strength workouts into its running and cycling plans so you can supplement endurance training with strength work. It's also bringing its TrueUp feature to Body Battery, so your score will be drawn on metrics and data from multiple devices if you happen to have them.

One of the biggest new additions quietly added to this release is the introduction of passcodes to some Garmin watches, specifically the Fenix 8, Enduro 3, the aforementioned Forerunners, Venu 3, and the Vivoactive 5.

You may also like
Categories: Technology

Wi-Fi wireless earbuds with 24-bit hi-res audio are coming 'very soon', confirms Qualcomm

TechRadar News - Mon, 01/20/2025 - 05:34
  • Qualcomm and partners will be announcing products "very, very soon"
  • Lossless audio over Wi-Fi at up to 24-bit/192kHz
  • Rolls back to Bluetooth when Wi-Fi is unavailable or not needed

The best wireless earbuds sound fantastic, but they all face the same limitation: Bluetooth. Bluetooth doesn't have the bandwidth for the highest of hi-res audio streams, and Qualcomm's system to use Wi-Fi as an alternative is finally coming.

The technology is called XPAN, short for 'expanded personal area network', and it uses Wi-Fi to deliver lossless audio that's also very low latency. With Bluetooth, you have to choose between highest quality and lowest latency, but XPAN claims to offer both simultaneously.

The system is part of the Snapdragon Sound technology – particularly the Snapdragon S7 Gen 1 Sound Platform – and that means it won't be coming to iPhones or AirPods any time soon: XPAN requires Snapdragon chips in both the phone/tablet and the headphones.

The first earbuds with XPAN were predicted to launch before the end of 2024, but of course that didn't happen. However, products are imminent: Qualcomm has confirmed to Android Authority that it and its hardware partners will be announcing new headphones "very, very soon".

What sound quality does XPAN deliver?

XPAN promises 24-bit/192kHz lossless audio, and says that power consumption for lossless at 96kHz is identical to that for a lossy Bluetooth stream at the same sampling rate.

24-bit/192kHz is very high resolution. Even the mighty LDAC audio codec tops out at 96kHz, and while aptX Adaptive is also capable of 96kHz, the quality varies by signal strength (hence the "adaptive" bit) and its first generation was only 24-bit/48kHz, so any first-gen products have the same limit.

According to Qualcomm, the new XPAN system will enable you to roam freely around your home without having to stay close to your smartphone or tablet, and if you go out of range of your Wi-Fi network and have your phone on you, your headphones will roll back to Bluetooth.

The main benefit, though, is going to be audio quality. Whether it's hi-res audio, a game soundtrack or just a phone call, the next generation of wireless headphones will potentially sound just as good as some of the best wired headphones.

We've seen Wi-Fi streaming on some of the best wireless headphones already, including the Sonos Ace and the HED Unity Wi-Fi headphones – but it's always extremely power hungry and often awkward to use. Qualcomm's system may fix that… it's just a shame you might need a specific phone and headphones combination to make it work.

You might also like
Categories: Technology

Discover the future of tech in beautiful Barcelona

TechRadar News - Mon, 01/20/2025 - 05:31

There's no better way to start 2025 than talking about the future of tech in the beautiful city of Barcelona, and you can take part too. That's because Techradar will be hosting a live Future Panel Discussion at ISE 2025 in Barcelona on the 4th of February where our panel of experts will reveal the innovations that matter most and where they're going to take us next.

That's not the only reason to attend ISE 2025, although we think it's a pretty good one. ISE is the leading event for the AV industry, and this year's event will feature ground-breaking product launches, expert insights and inspiring keynotes from across the industry. And it's all taking place in Barcelona, whose historic buildings will be transformed with astonishing projection mapping displays for the duration of the event.

(Image credit: ISE) How you can discover the future

The exciting live panel discussion will be followed by a live audience Q&A on the future of tech, and it'll be hosted by our very own managing editor of lifestyle, Josephine Watson. She'll be joined by a panel of the most insightful futurists and technology experts including the globally acclaimed digital analyst and visionary Brian Solis; the innovative multimedia artist, ISE 2025 keynote speaker and chosen artists for this year’s projection mapping at world-heritage Casa Batlló Quayola; Sarah Cox, Founder and Managing Director of Neutral Human; and Fardad Zabetian, global business technologist and CEO of KUDO, whose AI-based real-time language interpretation will be used across the ISE's many stages and events.

The panel discussion will ask the experts: what will the world look like in 20 or 30 years time? How will technology shape our world and evolve around us – and what effects will it have on the live events, concerts and sports of the future? How will technology transform our lives for the better?

(Image credit: ISE) Connection restored

ISE is where the future happens, and its 2024 event was a real record-breaker: 74,000 people from 162 countries came to see innovation in person, the most visitors in the event's 20-year history. And this year's event promises to be even better, with cutting-edge tech from over 1,600 exhibitors and an exceptional content programme too. From smart home tech to high-end audio, education and learning solutions to projectors, it's where you can get up close and personal with the very latest tech and get expert insight from industry insiders too.

ISE is much more than a trade show forum. It's where the audiovisual, systems integration, lighting, live events and IT industries all come together, and when you factor in its online audience as well as its in-person attendees it has an audience impact of over 1.387 billion people.

People come to ISE for three key reasons: to be inspired; to explore trends and developments in the industry for their professional development; and to discover new equipment, products, services and suppliers. It's an exceptional event, and it's exceptionally affordable too.

(Image credit: ISE) See the future for less as an ISE Early Bird

Your attendee ticket to ISE 2025 covers all four days and gives you access to ISE 2025's many attractions, including:

  • Eight halls, seven Technology Zones
  • Innovation Park
  • Discovery Zone
  • Audio Demo Rooms and the Outdoor Sound Experience
  • ISE 2025 Keynotes (Tuesday & Wednesday)
  • Free-to-attend sessions on the ISE Live Events Stage, AVIXA Xchange LIVE, the CEDIA Smart Home Technology Stage and Congreso AVIXA
  • A free public transport pass, collected on-site
  • And much much more…

An attendee ticket is normally just €215, but: use the code ISE2025trmag on the registration page here and you can get your ticket for free.

Once you've registered for the show you can then choose to add a Content Day Pass for as little as €385, which gives you access to all Summits and Track Sessions for that day, or an All-Conference Pass, which gives you access to all Summits, Track Sessions and the Smart Home Technology Conference too. Details of both kinds of conference passes are available online here.

Categories: Technology

Vibration Plates: Do They Actually Help You Lose Weight?

CNET News - Mon, 01/20/2025 - 05:23
Vibration plates are all the rage on social media, but do they do anything for your health?
Categories: Technology

Trump promised dozens of actions on immigration on Day 1. Here's what we know

NPR News Headlines - Mon, 01/20/2025 - 04:15

Trump campaigned on border security promises, and he and his allies argue that his electoral win is an endorsement of his upcoming actions on the issue.

(Image credit: John Moore)

Categories: News

Best Water Guns for 2025

CNET News - Mon, 01/20/2025 - 04:08
There's never a wrong time to get wet. If you're looking for the perfect, harmless water gun, here from Nerf, Spyra and more.
Categories: Technology

With fewer protesters and a renewed focus, activists plan for a second round of Trump

NPR News Headlines - Mon, 01/20/2025 - 04:00

President-elect Donald Trump takes office Monday and Democratic organizers are not seeing the mass-scale opposition they witnessed in 2017. So, they're adjusting with a focus on Trump's agenda.

(Image credit: Brian Munoz)

Categories: News

Inside Trump's Inauguration Day: How, when and what to watch

NPR News Headlines - Mon, 01/20/2025 - 04:00

President-elect Donald Trump will take the oath of office at noon followed by a presidential parade, signing ceremony and inaugural balls.

(Image credit: Morry Gash)

Categories: News

What to know about Ohio State, Notre Dame and college football's championship game

NPR News Headlines - Mon, 01/20/2025 - 04:00

That the Buckeyes and the Fighting Irish, two of the sport's most storied teams, are squaring off in the title game is a TV executive's dream — and a fitting end to the first-ever 12-team playoff.

(Image credit: Alex Slitz)

Categories: News

Prince Harry's case against Rupert Murdoch's British tabloids goes to trial

NPR News Headlines - Mon, 01/20/2025 - 04:00

A trial begins Tuesday over complaints filed by Prince Harry and a senior British lawmaker against Rupert Murdoch's tabloid newspapers. The trial carries high stakes on both sides of the Atlantic.

(Image credit: Kin Cheung/AP)

Categories: News

Quite a lot of Brits have never heard of data centers

TechRadar News - Mon, 01/20/2025 - 03:59
  • Half of Brits aren’t even familiar with data centers, report finds
  • Three in five know they play a role in hybrid work
  • Further education could increase public trust in data centers

Despite efforts to propel the country’s artificial intelligence capabilities, new research from Telehouse has revealed more than half (51%) of Brits aren’t even familiar with the term ‘data center.’

Even the people who have heard of data centers aren’t necessarily clued up on the role they play in artificial intelligence, cloud computing, and even cloud storage.

Two in three (67%) don’t understand the role date centers play, and two in five (42%) are unaware of the scale of people, applications and data supported by such campuses.

British citizens aren’t clued up on data centers

The trend paints a troubling picture for Britain’s intentions to become an AI leader – Prime Minister Sir Keir Starmer wants to make the UK a global leader in artificial intelligence.

In 2024, data centers became classified as Critical National Infrastructure, giving them extra protections and monitoring, and recent years have seen an increase in government focus on data centers, coinciding with AI investments and other plans to expand digital infrastructure. Deputy Prime Minister Angela Rayner recently approved a £670 million data center project in Buckinghamshire which will occupy land on a green belt.

However, although two in three (59%) of the 2,000 UK consumers surveyed acknowledged that data centers are important for remote working, 19% are unsure how the facilities actually support their remote work.

“We realise there’s a significant knowledge gap regarding data centres and their impact on digital lives," noted Telehouse Europe EVP and GM Mark Pestridge.

Pestridge hopes education around data centers will bridge the knowledge divide and therefore increase public trust in digital infrastructure.

You might also like
Categories: Technology

The impact of the cyber insurance industry in resilience against ransomware

TechRadar News - Mon, 01/20/2025 - 03:47

The first ransomware attack took place in 1989 and was made possible by the floppy disk. It wasn’t until cryptocurrencies and ‘untraceable’ payments came along in the 2010s, however, that its prevalence as an attack method exploded.

The growth of cryptocurrency is just one of several major trends that has influenced the ransomware landscape. Elsewhere for example, international relations has played a part. Attackers and victims quite rarely live in the same country, so dealing with the criminals requires cross-border law enforcement collaboration. The US and Russia began working together to address gangs based in Russia before the Ukraine war put an end to that cooperation.

But one of the biggest influences on the state of ransomware in the relatively short period since it really arrived just over ten years ago has been cyber insurance. Though not always to the benefit of victims, years of policy changes and updated requirements for cover have seen it make organizations much more resilient in the long run.

If ransomware is a new phenomenon, so too is cyber insurance

I remember speaking to an insurance company just over ten years ago. They’d just started offering cyber insurance policies but at that point, they were yet to receive a claim.

But as the number of ransomware attacks rocketed, organizations eagerly took out cyber polices to protect themselves. Ransomware attack methods and the ransoms demanded were very different then to how they are today. In the early 2010s the most common ransomware businesses faced were low-cost, mass-market type attacks like CryptoLocker. The ransom demanded by the attackers was just a few hundred dollars.

As attacks became more common, there were significant changes in how criminals operated. ‘Ransomware as a Service’ emerged as a product, offering would-be cyber criminals, without the skills to develop malware themselves, the chance to buy an off-the-shelf kit. Attacks also became more targeted – focusing on industries with weaker cyber defenses such as manufacturing, government and healthcare, where the impact of downtime would be much higher.

Pay up, recover or fail

Historically, victims of ransomware faced a choice: pay the ransom, often hundreds of thousands or millions of pounds, usually by claiming on their cyber insurance policy, or attempt to recover themselves.

Without being able to rely on recovery methods such as backups, some businesses had no option but to pay criminals. In other instances, victims had to weigh the cost of the ransom against the cost of their own recovery, which can quickly become expensive. For example, there are the direct costs like cyber forensic experts, IT consultancies and the likely cost of overtime for your own teams. Then there are business impacts to consider such as lost income, fines from regulators and the long-term costs that come with damage to your reputation.

The majority of organizations chose to pay the ransom and subsequently fed into the vicious cycle of more attacks and more payouts.

While this is bad news for all parties, the pain was felt acutely by the cyber insurers who found suddenly that their fast-selling product was coming back to bite them and exposing them to massive losses.

The biggest problem for businesses was the fact that they weren’t addressing the root cause of attacks. Instead of taking steps to improve their defenses and put processes in place to aid recovery, they found themselves vulnerable and in a position where they had little choice but to pay a ransom.

Insurers responded in the two ways that you’d most expect in this situation: they increased the price of the product and raised their requirements to obtain cover.

When you take out home insurance for example, you answer questions about the security of your home and its various entrance points. But when it comes to obtaining cyber cover, businesses today have far more to account for.

  • Cyber insurance questionnaires, once of no great depth, now assess businesses in each of the following areas: Segregation of production and backup data
  • Encryption of backups
  • Last date of disaster recovery testing
  • Annual budget for IT and cyber security
  • Whether a business has previously suffered a ransomware attack
  • How quickly critical updates are deployed, and whether any software is used beyond end of life

The key difference is that insurers are taking greater care to assess whether or not the company applying for cover is secure and able to respond to a cyber-attack. For them, the best customers are those who are unlikely to make a claim. In the event that they do need to claim, the customer has the capability to respond and bring themselves back online quickly, limiting their costs and leading to a smaller payout.

Crucially, insurance companies also began discouraging payments wherever possible.

These changes had a significant impact on the state of play. Organizations improved both their preventative security measures and their ability to respond. Suddenly, businesses sought to implement immutable backups and segregation of operations and began carrying out frequent DR testing.

The resulting shift is already visible across businesses. More organizations than ever have cyber insurance but fewer are making claims. Instead, businesses are recovering themselves.

The here and now

Taking each attack in isolation, paying a ransom can seem a more attractive option. Paying can mean less downtime, less reputational damage (assuming it is kept under wraps) and a lower overall cost to the business.

Ultimately however, paying will only lead to more attacks. The ransomware problem can’t be improved in isolation, but instead requires a collaborative effort to address the benefits for attackers.

While outright bans on payment are frequently discussed by regulators, they have almost always been abandoned. The only successful ban has prevented payments to known terrorist organisations. The difficulty lies in setting a rule that is effective but doesn’t lead to businesses incurring crippling costs, failing and causing job losses. Cyber insurers originally began influencing the market by discouraging organizations from paying out, and instead encouraging them to improve their response.

Cyber insurance has succeeded where regulation has mostly failed. It has undoubtedly been the most significant positive factor in improving ransomware response and the overall cyber resilience of businesses.

We've compiled a list of the best cloud backup services.

This article was produced as part of TechRadarPro's Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro

Categories: Technology

Village People founder says everybody can enjoy their music, Republican or Democrat

NPR News Headlines - Mon, 01/20/2025 - 03:12

Victor Willis of the Village People says their music is for everyone, defending the group's choice to perform at Trump's inaugural celebrations as a message of inclusivity.

(Image credit: Andrew Chin)

Categories: News

Don’t let holidays be your cybersecurity downfall

TechRadar News - Mon, 01/20/2025 - 01:48

Cybercriminals today are consistently working to find new ways to trap potential victims. From masquerading themselves as legitimate users in a network or using new and evolving techniques to slip past detection mechanisms, the array of sophisticated tools in the arsenals of threat actors continues to grow.

And the timing of attacks is also crucial. A survey of nearly 1,000 security professionals found that 86% of companies targeted by ransomware were attacked on a holiday or weekend, while three quarters of the ransomware victims suffered an attack during a major corporate event, such as a merger, acquisition or IPO. Clearly, ransomware groups are striking outside of normal business hours, looking to take advantage of enterprise defenses that are likely to be either lowered or entirely offline.

Threat actors exercise patience to increase their chance of success

With holidays and weekends providing downtime for most of the working population, it presents a big challenge for most organizations. While most organizations run a security operations center (SOC) on a 24/7/365 basis, we know that many reduce SOC staffing during holidays and weekends – often by as much as 50%. A minority don’t staff their SOC at all during these periods, leaving the doors wide open for attackers. By leaving SOCs understaffed, enterprises increase the likelihood of threat actors being able to carry out successful cyberattacks.

There are numerous examples available to dissect. For instance, the disruptive ransomware attack on Transport for London took place on a Sunday. In the US, meanwhile, the ransomware attack against Colonial Pipeline in 2021 occurred over Mother’s Day Weekend. Once they have gained access to a company network, ransomware gangs are typically patient and methodical with their attack strategies, often laying low for weeks, cementing their foothold and elevating privileges while scouting out key data and business apps to potentially encrypt as part of an extortion plot.

SOC staffing doesn’t align with attack patterns

Unfortunately, SOC staffing often doesn’t align with the attack patterns we are seeing, and there are several reasons for that. Work-life balance is important in many organizations and businesses don’t feel that full staffing is necessary considering most employees work weekday schedules. There is also the common misconception that hackers won’t target businesses of a certain size or type – and many organizations feel safe because they haven’t been targeted before. Furthermore, staffing a SOC 24/7/365 is a significant challenge. Maintaining around-the-clock coverage can require 15-20 team members at a minimum.

This creates a costly dilemma. What starts out as a simple commitment to improving security can snowball into a huge operational expense. To reduce those expenses, many organizations opt to scale back by cutting personnel or limiting hours of coverage, thinking that threats are less likely to occur outside of normal working hours. Unfortunately, that’s not the case.

Just as burglars avoid well-patrolled daytime areas, threat actors also look to carry out attacks when fewer eyes are watching. Assuming that you’re safe out-of-hours provides threat actors with open doors for attack. Instead, enterprises must always assume that attacks are imminent, ensuring that their SOC is not under resourced at any point. I call it having an assumed breach mindset. Never wax, never wane, hackers are persistent and never take time off.

Improving focus on identity security

It’s not just about having the right resources in place, but also using those resources in the most logical and effective ways possible, focusing on those areas that are of the greatest vulnerability or pose the most significant potential impact. Here, identity management must take priority. Today, the identity system has become the new perimeter of enterprise security, with 90% of ransomware attacks ending in identity system compromise.

Active Directory (AD), which forms the foundations of identity and access management for the vast majority of organizations globally, is a particularly common vulnerability that threat actors are consistently working to exploit. As a technology that was originally released in 1999, many companies are now faced with managing outdated AD configurations and excessive user privileges that can be exploited relatively easily. Couple this with the fact that AD often lack sufficient monitoring and security auditing, and it can be a challenge for firms to detect unusual or malicious activities quickly enough.

Attackers know about these problems better than anyone else. They know that if they’re successfully able to compromise AD, they’ll gain control of the keys to an organization's kingdom, providing them access to sensitive data and critical systems. Unfortunately, however, this an area that typically seems to be underestimated or overlooked. Many organizations either don’t have an identity recovery plan at all, or their recovery plan has concerning gaps. Not taking cyberattacks into account, not testing for identity vulnerabilities and testing recovery plans only quarterly or less frequently are common mistakes that can prove costly in case of an attack.

What’s the solution?

For enterprises, it is vital to address these shortcomings, ensuring that key vulnerabilities such as AD are protected and that the security guard isn’t dropped out-of-hours when threat actors are looking to make the most of understaffed SOCs. Businesses must see security as a central part of their business resilience strategy. Just like safety, financial and reputational risk, security can be the difference between an enterprise excelling or collapsing in the face of a catastrophic, game-changing incident.

To achieve this, there are several steps for enterprises to take:

  1. Have a plan in place: Starting from scratch in the event of a catastrophe isn’t a good place to be. By preparing for potential scenarios ahead of time and testing the protocols on a regular basis, enterprises can more quickly and effectively respond should those situations become a reality.
  2. Use budgets wisely: This isn’t necessarily about throwing more money at the problem. It’s about using the budgets that you do have to greatest effect, ensuring that existing resources are scrutinized and optimized.
  3. Adopt ITDR: For organizations looking to use limited resources effectively, identity threat detection and response (ITDR) can be an incredibly useful tool, providing key capabilities such as automated auditing and alerting, attack pattern detection, and the rollback or suspension of unusual changes in AD.
  4. Enhance productivity through automation: This automated support can also help enterprises to support the skilled security staff that they do have, freeing up engineers to spend time on more interesting, higher value-tasks.

By taking these steps to optimize security performance and leverage automation, organizations can simultaneously bridge the gaps that currently exist in both their SOC staffing and identity security capabilities, enabling them to better protect against, identify, respond to and recover from attacks – regardless of whether they strike on a Tuesday or a Sunday.

We've compiled a list of the best endpoint protection software.

This article was produced as part of TechRadarPro's Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro

Categories: Technology

AI security: establishing the first and last layer of defense

TechRadar News - Mon, 01/20/2025 - 01:27

With the global, regular use of generative AI nearly doubling over the last year, according to McKinsey, rapid adoption has created a new lucrative target for cybercriminals. While 'off-the-shelf' solutions have made up a great deal of this adoption, organizations seeing the power of fine-tuned, business-specific responses have directed a great deal of budget towards training their own AI models.

Continuous innovations, like agentic AI, mean adoption is only increasing. The considerable autonomy agentic AI possess allows it to can make decisions, plan actions and learn from its experiences within the specific context of a business, making it applicable across business functions.

However, amid the excitement around AI are considerable cybersecurity risks that all too often aren’t being considered. By adopting any new software solution, businesses are introducing a new attack vector for cybercriminals. The problem with in-house developed AI models is that they are essentially a repository for a company's most valuable data, ranging from intellectual property, customer and employee data, and trade secrets, making it a highly attractive target.

This software runs off hardware likely housed in a data center, so business leaders need to ensure they are equipped with the right tools to have control over all aspects of their network to ensure sensitive company data is safe in the new attack vectors they are adopting.

The challenge to existing frameworks

The fact is that many businesses' existing security setups aren't currently fit for purpose. For years, IT departments have viewed cybersecurity as a compliance hurdle rather than a way to protect company data. This has led to an over-reliance on perimeter defenses and single sign-on solutions, which can create a false sense of security for organizations that believe compliance is equal to security.

Software solutions and more traditional approaches to data security, such as firewalls, still have a place in protecting a company's data security, but a greater depth of defense is required to ensure operations run smoothly. AI, while powerful, is still a type of software running on hardware typically found in a data center. Data centers are complex and sensitive environments. Factors such as power requirements, cooling systems, and physical security make these facilities prime targets. Moreover, the nature of AI development and deployment requires frequent access and updates. This necessitates strict control over who can access these systems and when. Organisations need to ensure they have the right framework in place to ensure their AI models run correctly and are protected at all levels of operation.

Physical segmentation: establishing control and defense

Many will already have some of the components required in place. What the majority are missing is a first and last layer of defense which can be establish via physical network segmentation. Through a hardware-based approach, physical network segmentation enables users to segment all digital assets remotely, instantly and without using the internet. Through the press of a button, from anywhere in the world, organizations can use this technology to physically isolate their chosen segment from the overall network, disconnecting it from the internet. This technology acts as a guardian for AI, controlling access and ensuring its benefits can be reaped. For businesses using AI, it can offer the following benefits:

1. Improved security and reduced risk

In the context of protecting an AI model, this type of protection can act as a guardian, preventing a business’ own AI being poisoned, and preventing the use of AI for malicious purposes. 

With no connection to the internet, physical network segmentation can be used to disconnect the model, preventing a cyber-attack or unwanted access. This will hide assets from view and enhance an organizations' existing depth of defense. For AI models, network segmentation can be used to keep components offline until needed, massively reducing the window of time a hacker has to access the software.

Organizations may be hesitant to adopt this approach, assuming it would cause interruptions in operations. But this doesn’t have to be the case. The key is implementing a process that lays out clever and well-considered timing. A generative AI model doesn't necessarily need to be connected to the internet 24/7 to perform well. A connection is required during a short window when users send a prompt. Once sent, the model can be disconnected and reconnected once the response has been generated and needs to be sent back. This short period of time is not nearly enough for a cybercriminal to clone the model and get their hands on sensitive company data. In terms of user experience, the time taken to connect and reconnect should be short enough that humans will not be aware of a delay.

2. Aiding regulatory compliance

Governments worldwide are adapting to the sensitivity of data. With AI models housing such an array of sensitive data, all eyes are on businesses to prove they are doing everything possible to prevent an attack or breach. With a lack of AI specific regulation, it’s hard to know where to start. Physical network segmentation can support overall compliance because there is no better effort than keeping sensitive data completely off the internet or physically separating it when attacked. 

3. Effective incident response and recovery

In the case of a cyber-attack, reactive network segmentation can be used to impede attack propagation and isolate compromised assets and data quickly, effectively preventing further access for hackers. During the recovery process, leaders will have the ability to then rapidly reconnect previously isolated, known safe, segments after an attack making it possible to ensure AI models can be used as soon as possible and ensure the restoration of services.

Looking ahead

With more and more AI models trained in-house, cybercriminals will more than likely start to target these repositories of sensitive data. Once they have access to the AI, all sorts of havoc can be caused by the ability to clone the data, poison the model to generate harmful responses or lock it down with ransomware, causing significant company damage.

Organizations need to be able to confidently leverage the power of AI without compromising on security. By implementing a framework that allows the individual control of zones through network segmentation, business leaders will be able to not only mitigate threats, but also establish effective response and recovery processes while ensuring maximum performance business wide.

We've set up a comprehensive list of the best AI tools.

This article was produced as part of TechRadarPro's Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro

Categories: Technology

At least 80 people killed in northeast Colombia as peace talks fail, official says

NPR News Headlines - Mon, 01/20/2025 - 00:20

Officials said the attacks happened in the Catatumbo region near the border with Venezuela, following the government's failed attempts to hold peace talks with the National Liberation Army.

(Image credit: Fernando Vergara)

Categories: News

Today's NYT Mini Crossword Answers for Monday, Jan. 20

CNET News - Sun, 01/19/2025 - 22:00
Here are the answers for The New York Times Mini Crossword for Jan. 20.
Categories: Technology

Today's NYT Connections: Sports Edition Hints and Answers for Jan. 20, #119

CNET News - Sun, 01/19/2025 - 22:00
Here are some hints — and the answers — for Connections: Sports Edition No. 119 for Jan. 20
Categories: Technology

Today's NYT Strands Hints, Answers and Help for Jan. 20, #323

CNET News - Sun, 01/19/2025 - 22:00
Here are some hints -- and the answers -- for the Jan. 20 Strands puzzle, No. 323.
Categories: Technology

Photos: Families reunite as the Israel-Hamas ceasefire takes effect

NPR News Headlines - Sun, 01/19/2025 - 20:53

After 15 months war, a ceasefire between Israel and Hamas took effect on Sunday morning.

(Image credit: Mussa Qawasma)

Categories: News

Pages

Subscribe to The Vortex aggregator