Categories
Computers & Software Technology Telecom U.K U.S

Mobile Technology Is Changing the Face of Marketing in the UK

There are an estimated 7.33 billion mobile users in the world, according to Statista. A lot of these are smartphones, especially in the UK. 

Since people always have their phones or tablets with them, they can read, browse, watch videos, and listen to music on the move.

The way content is consumed has changed. As a result, the way businesses communicate with their customers has also changed.

Telemedia Online discusses how changing mobile technology is affecting the future of marketing.

Harnessing the Power of Mobile Marketing

Because mobile phones are so ubiquitous and mobile search is growing, marketing for mobile has become an integral part of any marketing strategy, states the article. 

Since mobile marketing has the potential to reach directly into the pockets/hands/eyes of the consumer, it makes sense to make the most of it.

Here are some strategies that are commonly used in mobile marketing.

Mobile Apps

Mobile apps are a great way of personalising the customer’s experience when interacting with a business. This platform can be used to provide them with tailored content, rewards and offers specific to app users, and a smoother user journey.

Regardless of the size of the business, an app can be a powerful tool in its marketing arsenal, simply because it’s a larger product type, not a specific category.

For example, a large lifestyle store could offer an e-commerce app whilst a small restaurant could offer an app on which customers could order food or make reservations. Both are apps, even if they fulfil different functions.

Mobile Videos

When Facebook was at its height of popularity, it became obvious that video content did much better than text-only. Now, with mobile browsing, videos are even more popular. Consider the meteoric rise of TikTok, which is nothing but user-generated videos.

Even B2B marketing videos, which might be significantly different from TikTok videos are handy for delivering powerful messages. In fact, businesses like Bold Content specifically offer video production services for B2B marketing.

Videos can make products come to life, customer testimonials can pack more of a punch, and even if purely for entertainment, video content for mobiles can deliver better marketing results.

Plus, video technology is changing rapidly with artificial intelligence (AI) and cloud-based filmmaking. Creating videos for a business’s marketing is now easier—and more cost-effective—than ever.

It is also a way of keeping a company’s marketing recession-ready.

Using Mobile in the Digital Marketing Strategy

If a company wants to use mobile marketing in its strategy, there are a few steps it could take.

Start With a Mobile-First Strategy

It is quite difficult to take an existing (non-mobile) strategy and tweak it into an effective mobile strategy. 

For example, a website built for a desktop screen technically can be converted into a responsive, mobile-friendly one, but it might never be as user-friendly as one that was specifically designed for a smaller screen.

That is why, for a business’s mobile marketing strategy to be successful, it needs to be built from the ground up.

Personalising the Customer Experience

The biggest benefit that a mobile strategy offers is the fact that it can be customised for each customer. Unlike a desktop computer, people don’t tend to share phones, which means the information associated with each device will correspond to one individual.

This can be a powerful tool for presenting highly relevant marketing messages to customers.

In order to make the most of one’s mobile marketing strategy, one must consider content personalisation as part of the overall plan.

Invest in Mobile Apps

As discussed above, mobile apps are a great way of delivering customised offers and content. 

This customer-centric solution can be very useful for increasing customer loyalty and engagement.

That, in turn, helps drive sales.

Use Videos

A high-quality marketing video—whether describing a product, a customer’s review, or simply an entertaining social media short—can help a business get more customer engagement. These can then be used to convert.

Incorporate Mobile Payment

Whether a business has customers visiting a brick-and-mortar store, an app on their mobile, or the company website, making transactions easier can help conversion. Easy mobile payment is one such way of simplifying the buying process.

It can be in the form of an online store or a physical store that accepts mobile payment forms, like Apple Pay or Google Pay.

No matter how one uses plans their marketing strategy, it is obvious that making it mobile-friendly is essential. It’s no longer a “good to have”—people expect it. 

Not having a mobile marketing strategy means a business loses out on a huge opportunity.

Categories
Computers & Software Technology U.K U.S

Understanding the Relationship Between Space Systems, Climate Change, and Cybersecurity

Cybersecurity has been a concern for businesses and entities since the dawn of the internet. And, as communications technology evolves, so do the attack vectors. 

A quick response enabled by immediate detection is often key with a cyber attack. If businesses can’t have their own detection and response teams, they may employ the Security Operations Centre (SOC) services of Managed Security Service Providers (MSSPs) like DigitalXRAID.

However, technology has been evolving rather rapidly, which means newer threats are emerging. And, as businesses adopt digital transformation, they need to be aware of potential dangers they might face.

Two such cyber security issues recently discussed have been cybersecurity in space and cyber risk due to climate change.

Cybersecurity in Space Deemed “Urgent”, Needing “High-Level Attention”, Says US National Cyber Director

The US National Cyber Director, Kemba Walden, spoke to reporters at the RSA conference on the 26th of April 2023. 

She said cybersecurity in outer space was a pressing issue that was to be discussed in the first space industry cybersecurity workshop hosted by the White House.

We are all aware that the first ‘shot’ in the current Ukraine conflict was a cyberattack against a US space company,” Walden said.

She was, of course, referring to Russia’s attempt to jam SpaceX’s Spacelink, which was being used to provide Ukraine with internet connectivity.

Walden called space systems cybersecurity “an incredibly complex and unique space ecosystem”, which required “a very close public-private partnership”.

She went on to explain that nation-state threat actors like China and Russia are being considered cyber threats to space systems, and calling such attacks—that on Starlink and the one on Viasat—“acts of war”.

Secure-by-design space technology is something that the White House has been talking about a lot recently. 

Released last month, the White House’s Cybersecurity Strategy mentioned how space-based systems—including navigation, positioning, and environmental monitoring—needed to be secure.

Walden also mentioned that the US Space Policy Directive 5, which outlines cybersecurity design principles for space systems, is something they want to focus on.

The principles are being decided and the next steps would be to collaborate with the industry to put these into action.

How Climate Change Is Increasing Cyber-Risks

One would assume that climate change and cybersecurity are topics that are poles apart. However, there are several connections between these two issues.

These connections were highlighted by Chloe Messdaghi, CEO and Founder of Global Secure Partners.

According to Ms Messdaghi, issues caused by climate change provided more opportunities for threat actors to attack.

Attacks on Green Energy Sources

In order to reduce greenhouse emissions, the world is shifting towards green energy sources. These energy sources rely on new technologies. Since they are new, they may not have a well-rounded defence against cyber attacks.

For instance, electric vehicles are reliant on a network of charge points. These would be connected to the grid and managed through a central system. This could be targeted by threat actors.

Whilst this was a hypothetical example, Ms Messdaghi also brought up the cyber-incident at Vestas Wind Systems. That attack forced the world’s largest manufacturer of wind turbines to stop IT operations across a number of locations.

Extreme Weather Conditions Damaging Critical Digital Systems

Another risk that accompanies climate change that would affect cybersecurity is extreme weather events.

Climate change can result in more frequent and devastating hurricanes and tsunamis. These could affect critical digital systems—damaging underwater communications cables or off-site servers.

Any disruptions such damage would cause could be used as an opportunity by threat actors to attack.

Such weather events might also lead to an increase in remote working. If workers are not careful, they can be targeted for phishing attacks. These, in turn, could be used to get into the employers’ systems and data.

Deteriorating Relationships Between Countries

Climate change can lead to rising temperatures, which then affect geopolitical stability. As people are displaced due to famines caused by rising temperatures, the resulting migration could lead to tensions between countries.

These tensions could then be used as an excuse to conduct cyber attacks on the rival nation’s infrastructure.

It might sound incredible right now, but the pace at which technology is evolving means that we constantly need to look at cybersecurity from all angles. Because, even if we don’t, threat actors would definitely be trying to find any chinks in the cybersecurity armour.

(Threat actors are already using AI for creating malware, whilst cybersecurity experts are considering it for penetration testing.)

And, whilst things seem unrelated, nothing exists in isolation. We need to look at how changes in one system could affect the way it interacts with other systems.

Categories
Computers & Software Technology U.K U.S

Can ChatGPT Be Used to Improve SEO Content in Marketing?

Anyone who has used ChatGPT has been amazed by how it can “talk” to them. This AI-powered chatbot can give answers to any question it is asked. And, it does it in a conversational way.

On the face of it, the answers look and sound original. That means if one were to give it a topic, the answer could easily be used as an article.

In fact, one of the jobs it is supposed to “steal” is that of the content writer. The argument is, why should anyone pay for writers when ChatGPT can do the same thing faster and for a much lower cost?

Can ChatGPT Replace Content Writers?

And, everyone knows that SEO content can be difficult for businesses, especially IT businesses. In fact, IT marketing agencies, like Geeky Tech, are inundated with clients who don’t know what sort of content will work best for them.

Would ChatGPT make things easier for such companies?

Well, the honest answer is, the chatbot cannot replace a human writer. It can’t come up with original ideas. And, it can only regurgitate information that is already published on the web.

So, no, if a company relies solely on ChatGPT for writing content, it will soon realise the content quality is not quite adequate.

(In some cases, the information it generates might even be wrong.)

However, the tool can be used as a tool in an organisation’s marketing efforts. The Entrepreneur lists three ways in which ChatGPT can be used to support a business’s content production.

Three Ways in Which ChatGPT Could Support a Business’s Marketing Content

According to the article, whilst there are limitations to what ChatGPT can do, the one thing it can do really well is respond to questions (or prompts) in a natural, human-like, way. 

The other thing it can do well is analysing information provided to give the prompter a reasoned response.

With these traits in mind, here’s how one can use ChatGPT in content production for their marketing.

1. Be Realistic With Expectations

It is easy to assume the answer generated by the AI is usable as SEO content in its original form. 

However, as expressed earlier, regurgitated data, even if it sounds fresh, is neither original nor creative.

So, one needs to be realistic about the capabilities of the AI. It can’t offer creative thoughts but it can be used to kickstart the creative process.

2. Be Clear and Comprehensive With Your Input

It’s easy to fall into the trap of thinking the chatbot is a smart person. 

It is not.

It is a computer—a smart computer capable of some form of learning, but a machine nonetheless.

As such, the concept of “Garbage In, Garbage Out”, or GIGO, applies to it as it does to any computer.

If marketers need a viable solution from ChatGPT, they would need to give it all the information. The article compares the chatbot to a freelance content writer. 

The professional’s skill is writing, not expertise in the client’s business. If the company wants the writer to produce high-value content, they would need to provide them with the relevant information.

Detailed Prompts Are Important

To avoid incomplete or irrelevant output, one needs to ensure that the chatbot is provided with detailed prompts.

The tool requires not only the right data points but also the right questions.

That would mean the marketing team would need to do its due diligence when it comes to research. It would need to identify the questions the company’s audiences are asking and the points to cover before it can ask the chatbot to come up with the answer.

3. Use ChatGPT As a Starting Point

As would be obvious from the previous points, ChatGPT may not replace human writers, but it can help them get started on content.

Using the right prompts, the chatbot can help provide topic ideas and suggestions. It can also generate an outline for the kind of content marketers need to write.

At a stretch, the tool can be used to generate a first draft which is then heavily edited by a human writer.

In short, ChatGPT is not a hack that will help marketers get easy results. However, it is a powerful tool that, if used correctly, can help make content generation much easier.

Read more about how ChatGPT could be used for keyword research.

Categories
Computers & Software Technology U.K U.S

AMD Successfully Migrates to SAP S/4HANA Cloud Private Edition; Aims to Make the Company More Resilient

Advanced Micro Devices, Inc. (AMD), the leader in driving innovation in high-performance computing, visualisation technologies, and graphics, has reportedly migrated to SAP S/4HANA Cloud, Private Edition.

Adopting RISE with SAP is part of AMD’s robust cloud strategy and is expected to help the company efficiently consolidate existing SAP services onto a single enterprise platform, reported beststocks.

“AMD needs software that can scale with our business and provide the necessary resilience across our mission-critical applications. RISE with SAP was the perfect solution,” explained the CIO of AMD, Hasmukh Ranjan. “It’s a catalyst to productivity that removes barriers to innovation and helps us strategically position our technology investments for the future.”

The partnership between AMD and SAP is expected to help both companies deliver their promise of digital transformation to customers.

AMD’s Digital Transformation Journey Powered by SAP

AMD announced its move to SAP S/4HANA on April 20, 2023, and marked it as a milestone that will strengthen the strategic partnership of 25 years between the two companies.

In collaboration with SAP, 4th Gen AMD EPYC™ processors are providing some of the world’s largest businesses with accelerated results while slashing costs, power, and server footprint.

This shift to S/4HANA is hugely influenced by the tremendous success the company has seen after adopting SAP Signavio and SAP SuccessFactors solutions, SAP Ariba, and SAP Business Technology Platform (SAP BTP).

RISE with SAP S/4HANA Cloud, Private Edition

Cloud-based system implementation is gaining momentum among SAP-focused companies striving to drive business agility.

Again, with SAP’s ECC software support looming in 2027, more and more businesses are looking to transition to SAP S/4HANA.

Such a transformation requires high-level scalability, and RISE with SAP, a complete and one-stop cloud-based solution, offers a pathway.

S/4HANA Cloud ERP—RISE with SAPs—can be deployed as a private cloud solution or can be contracted to hyperscalers—Google Cloud, Amazon Web Services (AWS), Microsoft Azure, etc.

By allowing businesses to opt for a subscription-based model and pay only for the resources they use, RISE with SAP Cloud, Private Edition helps keep the total cost of ownership (TCO) as low as possible. 

As a result, SAP enterprises can standardise on high-level business suites to boost productivity at scale while keeping measurable rolling in the business.

Coming as a bundled offering along with Hyperscaler Infrastructure, Network Starter Pack, Business Intelligence Processes, and Business Technology Platform, RISE with SAP S/4HANA Cloud, Private Edition helps enterprises unlock the untapped potential of an enterprise.

However, driving digital transformation and modernising business operations requires strategic technical and functional SAP support. 

For SAP businesses looking to leverage the full benefits of the SAP S/4HANA environment and turn into intelligent enterprises, investing in high-end SAP consulting services like Protera is a sensible decision.

A high-end SAP consulting service ensures a safe and right-sized migration to SAP S/4HANA, seamlessly integrated with ancillary SAP solutions.

Wrapping Up

AMD expects its transition to SAP S/4HANA Cloud, Private edition, will accelerate the company’s journey towards digital transformation while making it highly resilient.

Categories
Computers & Software Media & Communications Technology Website & Blog

How Search Engine Optimisation Specialists Can Use AI and ChatGPT for Keyword Research and Analysis

Since the release of ChatGPT, many digital marketers have been wondering if AI will kill SEO (search engine optimisation)? The answer seems to be a definite no for now, with the caveat that it will change the way websites are optimised for search.

Additionally, marketers should start focusing on AEO (answer engine optimisation) instead of SEO.

Of course, AI will become an integral part of the way the world operates. What one needs to remember is that it’s a tool. And just like any other tool, it can be used to make one’s life easier.

So, how can AI be used to enable better digital marketing?

Well, according to Search Engine Journal, it can help SEOs with keyword research.

Using ChatGPT for Keyword Research and Analysis

There is one school of thought that says AI-powered chatbots like ChatGPT are a threat to search engines. However, others believe that using ChatGPT for search is not the right way to use it. 

According to these people, in its current form, ChatGPT cannot be relied upon to give factually correct answers to certain questions. It can, however, be used as a tool for analysis.

Keyword research, of course, is one such avenue where this analysis can be handy.

SEJ is very clear that ChatGPT cannot be used as a replacement for keyword research tools. It can, however, be used to verify and refine the results.

Here are the prompts one might use to get great results in keyword research with ChatGPT.

ChatGPT Prompts for Keyword Ideas

The SEJ article uses “SEO” as an example in a series of prompts for keyword ideas. However, the formulas can be applied to any term one wants.

What Are the {Number} Most Popular Topics Related to {Topic}?

In the article, when replacing {Number} and {Topic} with “4” and “SEO”, the author got “Keyword Research”, “On-page SEO”, “Off-page SEO” and “Technical SEO” as suggestions.

Using this prompt, one can get an idea of the various niches within a topic.

Then, ChatGPT can be used to drill deeper into the sub-topic for more targeted ideas.

What Are the {Number} Most Popular Sub-Topics Related to {Sub-Topic}?

Again, sticking to the theme of both the article and the query, the author used the “Keyword research” suggestion from the previous prompt. Again, they replaced the {Number} with “4”.

The keyword suggestions thus generated were “Search Volume Analysis”, “Keyword Difficulty Assessment”, “Long-Tail Keywords”, and “Keyword Intent”.

In both of the above prompts, the keywords came with a short description. In order to get a list only, one could instruct the chatbot to provide a “list without description”.

For example…

List Without Description the Top {Number} Most Popular Keywords for the Topic of {Topic}

Using “5” instead of {Number} and “Keyword Intent” instead of {Topic}, the author got a list of the following keywords:

  • Keyword Intent Types
  • User Search Intent
  • Match Content with Intent
  • Understanding Keyword Intent
  • SEO and Search Intent

These keywords can then be used to generate long-tail keywords related to the topic.

List Without Description the Top {Number} Most Popular Keywords for the Topic of {Topic}

This prompt generated “5” long-tail keywords for the topic “Keyword Intent Types”:

  • Types of Keyword Intent in SEO
  • How to Identify Keyword Intent Types
  • Optimising Content for Different Keyword Intents
  • Strategies for Targeting Keyword Intent Categories
  • Understanding User Search Intent for SEO Success

In addition to long-tail keywords, ChatGPT could also be used to generate semantically related keywords.

List Without Description the Top Semantically Related Keywords and Entities for the Topic {Topic}

This prompt was used to generate semantically related keywords for “Types of Keyword Intent in SEO”:

  • Informational Intent
  • Navigational Intent
  • Transactional Intent
  • Commercial Investigation Intent
  • User Search Behaviour
  • Content Optimisation
  • SEO Strategies
  • Search Query Analysis
  • User Intent Targeting
  • Search Engine Ranking Factors

Finally, instead of using each of these as a separate prompt, the digital marketer could combine them into one query, which the article calls the “onion method”.

The article delves into other prompts for strategic keyword research, including generating keyword ideas based on user personas, generating ideas using the alphabet soup method, and generating keyword ideas using a question.

Of course, for technology companies and startups, keyword research might not be as straightforward. And, again, the article does state that ChatGPT is by no means a replacement for traditional keyword research tools.

So, if in doubt, technology businesses might need to stick with knowledgeable agencies like Geeky Tech.

However, if the company has an experienced digital marketer working in-house, these tips could help them generate better ideas for both keyword focus and content.

Categories
Computers & Software Media & Communications Technology Telecom

Reverse Number Lookup App: Innovative Solution for Instant Caller Identification and Enhanced Phone Privacy

Introducing the Revolutionary Reverse Number Lookup App: A Groundbreaking Solution for Instant Phone Number Identification and Enhanced Privacy

[City, Date] – Today marks the official launch of the game-changing Reverse Number Lookup App, a state-of-the-art solution designed to instantly identify unknown phone numbers and safeguard user privacy. Now available for download on the Google Play Store, this revolutionary app harnesses cutting-edge technology and a vast database of phone numbers to provide users with unparalleled insights into the identity of unknown callers, telemarketers, and potential scammers.

In an era where unsolicited calls and privacy invasions are rampant, the Reverse Number Lookup App offers a much-needed solution for individuals seeking to protect their personal information and avoid unwanted communication. The app boasts a user-friendly interface and innovative features, ensuring a seamless and efficient user experience.

A Powerful Tool for Identifying Unknown Callers

The Reverse Number Lookup App leverages its extensive database and advanced algorithms to provide users with real-time identification of unknown callers. By simply entering the phone number in question, users can access detailed information about the caller, including their name, location, and possible affiliations. This feature empowers users to make informed decisions about whether to answer or ignore incoming calls, significantly reducing the risk of falling prey to scams or unsolicited marketing efforts.

Key Features of the Reverse Number Lookup App

1. Comprehensive Database and Accurate Results

The app’s extensive database includes millions of phone numbers from various sources, ensuring accurate and up-to-date information for users. The advanced search algorithms employed by the Reverse Number Lookup App guarantee precise and reliable results, enabling users to confidently identify unknown callers and maintain their privacy.

2. User-Friendly Interface and Seamless Experience

Designed with user experience in mind, the Reverse Number Lookup App features an intuitive and easy-to-navigate interface. Users can effortlessly input phone numbers and receive instant results, ensuring a smooth and hassle-free experience when identifying unknown callers.

3. Caller Identification and Spam Protection

The app’s caller identification feature not only provides information about the caller’s identity but also identifies potential spam calls. By detecting and flagging potential spam callers, the Reverse Number Lookup App helps users avoid time-consuming and potentially dangerous interactions with scammers or unsolicited marketers.

4. Call Blocking and Customized Blacklists

The Reverse Number Lookup App allows users to block unwanted calls directly within the app, creating a personalized blacklist of unwanted phone numbers. This feature enables users to maintain their privacy and avoid unwanted communication more effectively.

5. Regular Database Updates and Maintenance

The app’s development team is dedicated to ensuring that the Reverse Number Lookup App’s database is regularly updated and maintained. This commitment guarantees that users receive the most accurate and up-to-date information when identifying unknown callers.

6. Responsive Customer Support

Committed to providing exceptional customer support, the Reverse Number Lookup App team ensures users have access to timely assistance and guidance throughout their experience. Users can reach out to the customer support team via in-app chat or email for prompt and professional support.

Privacy and Security at the Forefront

The Reverse Number Lookup App prioritizes user privacy and security by employing industry-standard security measures, such as SSL encryption, to protect user data and guarantee secure transactions. The app’s developers have worked diligently to ensure that user information remains confidential and that the app adheres to strict privacy guidelines and regulations.

Transforming the Phone Number Lookup Experience

The Reverse Number Lookup App is set to revolutionize the way users identify unknown callers and protect their privacy. By offering an all-in-one solution for instant phone number identification and advanced privacy features, the app empowers users to take control of their communication and maintain a secure and private phone experience.

As the demand for accessible and transparent phone number identification services continues to grow, the Reverse Number Lookup App is poised to become a game-changer in the industry. The app’s development team is committed to continuously improving and expanding the range of services and features offered, ensuring that users have access to the most cutting-edge phone number lookup solutions available.

The Reverse Number Lookup App is not only a platform for identifying unknown callers but also a powerful tool for promoting privacy and security. The app offers educational resources, including informative articles and expert tips, to help users better understand the importance of privacy protection and make the most of the services provided.

Upcoming Features and Services

In the coming months, the Reverse Number Lookup App team plans to roll out additional features and services, including integration with other popular communication apps and enhanced spam call filtering options. These updates will further enhance the user experience and solidify the app’s position as a leader in the phone number lookup industry.

For more information on the Reverse Number Lookup App or to download the app, visit the Google Play Store today. Join the thousands of satisfied users who have already discovered the convenience and security of managing their phone privacy through the Reverse Number Lookup App.

Contact Information

For media inquiries, please contact:

JBrad Otman
Public Relations Manager
Reverse Number Lookup App
Email: contact@reversenumberlookup.com
Phone: 235-8749-6524
Website: Reverse Number Lookup App

Categories
Computers & Software Human Resources Media & Communications Technology

Microsoft Announces 365 Copilot Integration with AI-Powered Features; Aims to Streamline Complex Excel Tasks

On 16th March, Microsoft announced the debut of Microsoft 365 Copilot as part of its effort to integrate generative AI capabilities into all of its productivity apps, reported MAKE USE OF.

“Today marks the next major step in the evolution of how we interact with computing, which will fundamentally change the way we work and unlock a new wave of productivity growth,” explained Satya Nadella, CEO of Microsoft. “With our new copilot for work, we’re giving people more agency and making technology more accessible through the most universal interface — natural language.” 

What Is Microsoft 365 Copilot?

Microsoft 365 Copilot is a sophisticated orchestration and processing engine that is powered by OpenAI’s GPT4 — OpenAI’s multi-modal large language model (LLM).

GPT-4 is considered a more reliable and creative language model, capable enough to process nuanced instructions more efficiently compared to GPT-3.5. 

Microsoft claims its Copilot System is capable of responding to images and writing descriptions while also processing around 2500 words—eight times more than ChatGPT. 

Built on Microsoft Corp’s patented approach to security, the permissions model of Microsoft’s Copilot System can prevent data leaks and automatically sync with a company’s inherent privacy and compliance policies.

This AI assistant can leverage massive troves of business data in the Microsoft Graph and other Microsoft Office apps data to help organisations get actionable insights in a fraction of the time. 

“Microsoft 365 Copilot has real-time access to both your content and context in the Microsoft Graph. This means it generates answers anchored in your business content — your documents, emails, calendar, chats, meetings, contacts, and other business data — and combines them with your working context — the meeting you’re in now, the email exchanges you’ve had on a topic, the chat conversations you had last week — to deliver accurate, relevant, contextual responses,” explained Microsoft Corp.

Besides Excel, Copilot is embedded in other Microsoft 365 apps: Word, PowerPoint, Outlook, Teams, and more.

How Can Copilot Revolutionise Excel?

Leveraging Excel’s built-in data systems (e.g. Power Query) and functions, Excel helps users speed up calculations.

By integrating this high-end assistive AI into Excel, Microsoft is committed to helping users significantly bolster their productivity. 

The Copilot System by Microsoft is expected to provide users with formula suggestions to help accurately write complex functions.

While Copilot’s Formula debugging functionality will enable users to track down errors efficiently and with ease, the formatting assistance using this AI assistant is expected to make data formatting as effortless as possible.

According to Microsoft, the data analysis functionality with its Copilot System will facilitate data visualisation by offering suggestions of relevant charts and graphs.

Copilot in Excel will allow users to ask questions about their data sets in natural language and will create visualisation based on these queries.

Microsoft is committed to enhancing the Copilot functionality by introducing the new Business Chat feature.

Powered by Bing, Business Chat integrates LLM with all Microsoft 365 apps to surface essential data and insights whenever a user requires.

Even though Microsoft is contemplating equipping Excel with AI, the built-in functionalities with some Excel charts are still overwhelming to deal with. 

On top of that, building charts in Excel requires a lot of clicks and manual effort, which make the process of creating professional-looking PowerPoint presentations really arduous. For professionals looking to impress the audience with stunning presentations, investing in a high-end PowerPoint add-in such as think-cell is a sensible business decision. 

With fewer clicks, these add-ins enable users to create professional-looking PowerPoint presentations as quickly and as seamlessly as possible. 

Wrapping Up

Microsoft 365 Copilot is currently only available to Microsoft Office Insiders. 

This AI-powered LLM-bases system is being rolled out focusing on boosting user productivity, with 20 initial testers as of 16th March.

Microsoft Corp expects to make this high-end system soon available for mass use. 

Categories
Computers & Software Media & Communications Professional Services Technology

The Massive Data Breach at LastPass Tied to Hack of Senior DevOps Engineer’s Home Computer; Users Urged to Change their Passwords

On the 28th of February, the password manager maker LastPass revealed that the massive data breach it encountered last November involved the compromise of a DevOps engineer’s home computer.

The breach was the result of one of the engineer’s forgetting to upgrade Plex on their home computer, which put a decrypted vault available to only a handful of developers into a hacker’s hands. The vault allowed the threat actor to hold sway over a shared cloud-storage environment among others and ultimately, exfiltrate Amazon S3 vault backup encryption keys, reported The Hacker News.

Breaking Down the Breach at LastPass

Before this massive hacking at LastPass, the company experienced a security incident disclosed last August. In this incident, an unauthorised third-party exploited a developer’s compromised account to steal source code and “proprietary LastPass technical information”.

On 22nd December, the password manager service detailed that the threat actor infiltrated the company’s system during the second incident by exploiting data stolen from the first incident. The backup of partially encrypted user vault information that the hacker managed to copy included passwords, website URLs, and usernames. 

“The second incident saw the threat actor quickly make use of information exfiltrated during the first incident, prior to the reset completed by our teams, to enumerate and ultimately exfiltrate data from the cloud storage resources,” LastPass said.

Now, in Monday’s update, the company said that even though the first incident ended on 12th August, the hacker “was actively engaged in a new series of reconnaissance, enumeration, and exfiltration activity” up to 26th October.

According to the company, during this time, the hacker managed to execute the second attack. 

This second intrusion particularly singled out one of the four senior DevOps engineers with access to the corporate data vault executing a keystroke logger malware on their computer. The target was to steal the master password as it was entered by the hacked engineer to access the corporate vault. 

The threat actor exploited a three-year-old, now-patched security vulnerability on Plex Media Server software to gain code execution on the engineer’s computer.

“This was accomplished by targeting the DevOps engineer’s home computer and exploiting a vulnerable third-party media software package, which enabled remote code execution capability and allowed the threat actor to implant keylogger malware,” explained LastPass officials. “The threat actor was able to capture the employee’s master password as it was entered after the employee authenticated with MFA and gained access to the DevOps engineer’s LastPass corporate vault.”

Tracked as CVE-2020-5741 (CVSS score: 7.2), the vulnerability was patched by Plex in version 1.19.3.2764 released in May 2020. 

“Unfortunately, the LastPass employee never upgraded their software to activate the patch,” Plex said in a statement. “For reference, the version that addressed this exploit was roughly 75 versions ago.”

In Monday’s update, the password manager company said that the tactics, techniques, and procedures (TTPs) used to execute the first breach were different from those used in the second one, making it tough for the investigators to correlate these two incidents. 

Educating Employees on Cyber Behavior Can Help Dodge Breaches

Ensuring employees have access to essential tools and providing them with training on cyber behaviour is critical to minimising the risk of cyber threats. 

For organisations looking to develop a security culture improvement program to ensure no cybercriminal can hold sway over sensitive business information, leveraging a human risk management solution such as CultureAI is a sensible decision. 

Wrapping Up

LastPass detailed the steps it has taken as part of the company’s effort to investigate and respond to the security incident. The company also suggested its customers reset their passwords as an additional security measure.

Categories
Computers & Software Technology

JFrog Brings Canon 2.0 into Action to Revolutionise C/C++ Development

Earlier this March, the leading liquid software company, JFrog has reportedly brought Conan 2.0—a major new version of the open source C/C++ package manager—into action.

With this release, JFrog is committed to helping developers reproduce artefact builds securely while speeding up product delivery at scale, reported Yahoo!Finance.

“For organisations designing applications for high-performance, embedded, and IoT use cases, Conan 2.0 gives visibility of dependencies across their entire software supply chain so they can move forward with confidence and peace of mind that their software supply chain is secure.” explained Diego Rodriguez-Losada, lead architect at JFrog and co-founded of Conan.io. “Conan 2.0 was built with and by the C/C++ community. At JFrog, we are honoured to be fuelled by open source and excited to give back this powerful version of the package and binary management.”

The beta version of Conan 2.0 was released in June 2022. JFrog released the first version of Conan in March 2018.

What Is Conan 2.0?

Featuring a new public Python API, cleaner syntax, a new graph model, and new build system integrations, Conan 2.0 facilitates the modelling of sophisticated C and C++ application dependency graphs and software binary packages.

Conan 2.0 New Features & Capabilities

This release offers an advanced enterprise-ready package management framework that brings next-gen flexibility and high-end security, offering new custom commands, public Python APIs, and multiple new extension points for app development. 

With its high-end C/C+ artefact management functionality, developers can create safe and optimal builds with significant enhancements.

The Requirement Traits, enhanced Graphs, and Package Types help developers comprehend the relationship between dependencies effortlessly. JFrog claims this feature will allow developers to reuse binaries efficiently.

By incorporating new tools, Conan 2.0 release can enable seamless and continuous integration for large and involved C/C++ projects.

Lastly, lockfiles allow users to ‘pin down’ all types of software dependencies and tap into better security and scalability. This release provides companies with a solid framework for reproducing builds and accelerating CI/CD pipelines without compromising agility. 

Conan is a fully decentralised dependency manager that allows developers to encapsulate all artefacts of a C/C++ project while also helping distribute and consume them in other projects. Users can store these project artefacts as a Conan Package that can be searched and accessed via the central repository called Conan Center.

Brief Overview of the JFrog Platform

Compatible with on-prem, self-managed, or cloud environments, the JFrog platform helps automate, orchestrate and attest to a user’s pipeline’s integrity across self-managed, on-prem and cloud environments.

Enabling 50+ tech integration, this leading software supply chain platform ensures effortless and accelerated software development pipeline. 

For organisations looking to evaluate or optimise their JFrog products, investing in a JFrog software partner like Automation Consultants is a sensible business decision. 

A high-end JFrog licensing service helps save time and money on procurement while ensuring simplifed software management. 

Wrapping Up

In its recent Software Artefact State of the Union report, JFrog shed light on the fast adoption of the new release of Conan among companies dealing with designing IoT, embedded, and edge applications. JFrog registered a 5.2X increase in Conan 2.0 users last year.

Categories
Computers & Software Technology Telecom U.K U.S

Can Artificial Intelligence Carry Out Penetration Tests Without Human Intervention?

Penetration testing, or pen testing, is part of any business’s cybersecurity arsenal. It helps organisations identify ways in which threat actors could exploit the weaknesses in their IT infrastructure.

Once identified, these vulnerabilities can be patched or mitigation plans put in place.

However, with artificial intelligence (AI) being used by cybercriminals to create malware, one might wonder if the reverse could be true as well.

That is, could AI help bolster cybersecurity?

The thing is, pen testing requires a human. But, we’ve seen how ChatGPT interacts with people. Could the chatbot also make decisions like a person to “attack” a system to find out how secure it is?

What Is Pen Testing and How Is it Different From Vulnerability Scanning?

A strong cybersecurity stance requires active as well as passive measures. Passive security is taken care of by firewalls and antivirus software. 

Active security, on the other hand, requires the business to constantly assess its systems for weaknesses. Any that are found can then be fixed.

Two of the active measures for cybersecurity are pen testing and vulnerability scanning.

Pen testing is undertaken by a skilled ethical hacker. The person—actively and creatively—tests the organisation’s network, application, and endpoints. If they find any exploitable vulnerabilities, they carry out attacks to see how successful they are.

In short, they simulate what an actual hacker would do if they were trying to attack the business.

Vulnerability scans, on the other hand, are automated. They simply help the business identify potential issues. These scans don’t offer any insights into how the weaknesses could be exploited.

It will, however, rank the identified vulnerabilities in terms of priority. However, because it cannot determine how a hacker would use the weakness, it is up to humans to decide whether a vulnerability needs remediation and mitigation.

So, Can AI Be Used for Penetration Testing?

The thing is, AI can be a handy tool in the quest for cybersecurity. It uses big data and machine learning (ML) to understand regular traffic patterns. 

Then, armed with this information, it can identify “abnormal” behaviour.

The best part is, AI can process vast quantities of incoming information in a matter of seconds. It would take a human several hours—even days—to go through such quantities of data.

That makes AI perfect for adaptive cybersecurity, where it can block users based on their behaviour.

What AI Can Do for Cybersecurity

It can also be very effective at vulnerability scanning, where it can spot and flag problems in code, systems, and networks.

It may also offer cybersecurity support. For example, it could be used for source code analysis. AI could scan the code and identify potential flaws that could be exploited.

It may also be used for brute force attack testing by, say, generating potential passwords and entering them.

It might also be possible to teach AI how to exploit a list of weaknesses and use them in a simulated cyber attack. Businesses could also use AI for quicker detection and response if they are attacked.

What it might not be able to do is creatively identify vulnerabilities that it hasn’t been “taught”. Since penetration testing does require some creativity, AI might not be as effective at pen testing as a person…yet.

For now, we need to rely on penetration testing services of reliable providers like DigitalXRAID.

Having a strong cybersecurity posture is essential for any business. Without it, threat actors could have a field day with even the tiniest vulnerability. By being proactive, one can reduce the attack surface as well as the amount of damage threat actors could do.