David Strom
Latest from David Strom
ANALYSIS
Smarter shopping carts are coming but usability and privacy concerns loom
A new version of the smarter shopping cart will be coming to a nearby market this fall. Thanks to various partnerships and technological innovations of Instacart Inc., the latest embodiment of what the company calls Caper Carts will be able to track purchases while shoppers navigate through the aisles. The goal is to make it easier ...
ANALYSIS
ChatGPT detectors still have trouble separating human and AI-generated texts
The growth of ChatGPT and other chatbots over the past year has also stimulated the growth of software that can be used to detect whether a text is most likely to originate from these automated tools. That market continues to evolve, but lately there is some mixed news that not all detector programs are accurate, ...
ANALYSIS
It won’t be long before we are all chatbot prompt engineers
Back in January, Andrej Karpathy, who now works for OpenAI LP and used to be the director of artificial intelligence for Tesla Inc., tweeted: “The hottest new programming language is English.” Karpathy was only semiserious, yet he has identified a new career path: AI chatbot prompt engineer. It could catch on. The term describes the ...
The banking trojan malware Qakbot is surging again. Here’s what it means for defenders
The banking trojan Qakbot has once again risen in popularity, because you just can’t keep well-designed and effective malware down. A new report from Zscaler Inc.’s threat labs provides new details about the trojan virus that has been around since 2007 stealing banking credentials from around the world. Qakbot, which has also been called QBot or Pinkslipbot by ...
That Chinese attack on Microsoft’s Azure cloud? It’s worse than it first looked
The revelations last week that Chinese hackers had breached a number of U.S. government email accounts indicate the problem is a lot worse than was initially thought, according to new research today by Wiz Inc. Indeed, this hack could turn out to be as damaging and as far-reaching as the SolarWinds supply chain compromises of ...
CISA makes more open-source cloud protection tools available
The U.S. Cybersecurity and Infrastructure Security Agency recently augmented its cloud security toolbox of free open-source software, and there are now five programs that can be used to identify threats, evaluate an organization’s cloud security posture, detect unusual network patterns and complement paid security products. This is a welcome trend for two reasons. First, it ...
The state of collaboration: It’s the people, not the tech, who make it all work
Business collaboration is finally fulfilling its promise — but less because of new technology than people finding better ways to use it. The technology has gotten a boost, thanks to post-COVID distributed work teams that have embraced video conferencing and instant messaging. But figuring out the collaboration workflows isn’t just choosing between Microsoft Teams and ...
ANALYSIS
Attackers target the Domain Name System, the internet’s phone book. Here’s how to fight back
The foundational Domain Name System, essentially the phone book for the internet, used to be something nobody using the net much noticed, but lately it has become more of a target, and the cost of attacks against it are huge and growing. Recent events have once again brought issues involving the DNS, as it’s called ...
Understanding these nine ransomware stages can help harden cyber defenses
Ransomware payouts are on track to make 2023 another banner year for criminals, netting more than $440 million since January, according to a recent analysis by Chainalysis. But there are ways for organizations to blunt the impact. First, some background: One of the reasons for ransomware’s continuing success, according to Chainalysis, is the success of ...
Managing supercloud authentication remains tricky – with no easy solution in sight
In the early days of the cloud, authenticating people and apps was a lot simpler. Apps could be authenticated using a fairly static catalog of software-as-a-service and on-premises solutions, using single sign-on or SSO tools from the likes of Ping Identity Holding Corp., Okta Inc. and Cisco Systems Inc.’s Duo. But the growth of the supercloud ...