Latest News

How an AI platform is matching employees and opportunities

Instead of relying on data-driven signals of past accomplishments, Eightfold.ai is using AI to discover the innate capabilities of people and matching them to new opportunities in their own companies. The company's innovative approach of combining their own AI and...

MSPs: Your billing system should not be sitting at their own desk

Despite the economic setbacks shaped by the pandemic, demand for cloud communications services continues to grow. The remote “work-life” arrangement and increased displacement of face-to-face meetings by video conferences has managed service provider (MSP) leaders clamoring to take...

Debunking three sunk cost fallacies in selecting enterprise software

Has your business ever avoided investing in key software systems simply because of perceived high costs? This inaction is an example of a sunk cost fallacy.

Both psychologists and behavioural economists have noted that humans have a stronger natural tendency to avoid losses than to...

Five key ways machine learning can thwart phishing attacks

Global mobile phishing attempts surged by 37% amid shift to work-from-home for the thousands of businesses needing to adhere to shelter-in-place directives. According to Verizon, over 90% of breaches start with a phishing attack and with more than 60% of emails being read on mobile, mobile...

Four key steps to transform cybersecurity into a business enabler

Cybersecurity has traditionally been viewed as the department of ‘no’ – thought to be cautious, restrictive, and restrained. COVID-19 demonstrated this to be far from the truth. When physical offices had to suddenly transform into digital, virtual hubs, cybersecurity became an essential...

10 ways AI is improving new product development

Startups’ ambitious AI-based new product development is driving AI-related investment with $16.5B raised in 2019, driven by 695 deals according to PwC/CB Insights MoneyTree Report, Q1 2020. AI expertise is a skill product development teams are ramping up their recruitment efforts to find,...

Move over BYOD: Meet BYOH – ‘bring your own home’

The Covid-19 pandemic has forced companies around the world to do something most of them were not ready to do – ask all their employees to work from home. A recent Gartner survey showed that 74% of chief financial officer respondents stated they planned to transition at least part of their...

Why cybersecurity remains a key problem across the business

Bottom line: Absolute’s 2020 Endpoint Resilience Report illustrates why the purpose of any cybersecurity program needs to be attaining a balance between protecting an organisation and the need to keep the business running, starting with secured endpoints. Enterprises who have taken a blank...

Why securing endpoints is the future of cybersecurity

86% of all breaches are financially motivated, where threat actors are after company financial data, intellectual property, health records, and customer identities that can be sold fast on the Dark Web.70% of breaches are perpetrated by external actors, making endpoint security a high priority in...

Why automation is changing data science for everyone

A key goal of visual analytics and data science is to identify actionable insights that impact business processes – to grow revenue, improve productivity or mitigate risk. Automated AI, or specifically automated machine learning for data science, can help with this goal. AutoML can...

Gartner issues six-point plan for CIOs to cure Covid-19 cost-cutting

Budgets naturally need to be redrawn and tightened amid the global Covid-19 pandemic - and according to the latest report from Gartner, CIOs need to focus on a multi-faceted plan incorporating business impact and organisational risk to succeed.

The analyst firm has released a six-step...

How to build a business case for endpoint security

Bottom line:  Endpoint security business cases do much more than just quantify costs and benefits; they uncover gaps in endpoint and cyber protection that need urgent attention to avert a breach.

Bad actors and hackers prefer to attack threat surfaces that are isolated, vulnerable...