TECHNOLOGY
Cyber Security Awareness & Beyond with 11:11 Systems

Organizations from SME to Enterprise are reviewing and modernizing their security strategies in a threat landscape that continues to dynamically evolve in scope, scale and sophistication, especially with the rapid advance of digital transformation from hybrid working, to Software-As-A-Service (SaaS) adoption and Bring-Your-Own-Device (BYOD) diffusion.
Resilience to vulnerabilities is an imperative and the focus is on exactly this – raising awareness to build resiliency – with the aim to help support organizations of any size in proactively enhancing their security posture. With the CSAM theme this year being: ‘It’s Easy to Stay Safe Online – See Yourself in Cyber’ we will explore the key vectors of change impacting on Cyber Security today, with resources and tips on actions everyone can take to better negate the risk.
Pillars of Security – Getting the Fundamentals Right
Cyber-attackers will always choose the path of least resistance. So, attention to security at the password level remains a key first step in keeping information safe – putting this into context, over 40% of breaches now involve stolen credentials with the number available on the dark web exceeding a staggering 24 billion! This was recently brought center stage by the extensive ripple effect caused by attacks on Uber, from logistical delays to customer dissatisfaction, through to lost driver income, and of course organizational costs from income to reputation, and ultimately trust. It is understood that the employee corporate credentials of an Uber EXT contractor were purchased on the dark web after their personal device had been compromised with malware. So, what can we learn from this?
Firstly, use unique, complex phrases for passwords with a mix of upper and lowercase letters, numbers and characters, and make sure to change this often, as recently discussed by Laura Shafer, Vice President of Product Marketing at 11:11 Systems. Additionally, using multi-factor authentication (MFA) and two-factor authentication (2FA) can make it harder for attackers to access your device, even if they have your login details. However, not all MFA approaches are made equal! For critical internal accounts within organizations, such as those of the C-Suite who are increasingly subject to attacks, the use of hardware tokens and FIDO passkeys is recommended.
This can especially increase resiliency to techniques such as phishing, to which some 89% of organizations have experienced an attack in the past year alone (HYPR 2022). With MFA or 2FA in place, it becomes much harder for attackers to create fake login pages to collect unsuspecting employee credential information, which appears to have been the case with Uber. Put simply, multi-factor authentication (MFA) is not optional anymore – it’s imperative – and beyond this it also heralds an acceleration in innovation and availability around passwordless Sign-Ins altogether.
Finally, and supporting the ever-present need to couple technology solutions with education and awareness, MFA Fatigue should also be acknowledged. These attacks involve the end user being bombarded with verification notifications and are reliant on their ability to approve a simple SMS, Voice or Push notification without having any context of the session they are actually authenticating. This also formed part of the Uber attack, in which MFA Fatigue combined with social engineering enabled its success – in this case the attacker posing as tech support via WhatsApp and telling the user to accept the MFA verification prompt. This naturally makes Social Engineering our next area of focus!
Social Engineering and Cloud Computing
Employing psychological tricks that exploit vulnerabilities in how people react to specific situations and change their behaviours, social engineering attacks come in 5 core types, namely phishing, watering hole attacks, business email compromise (BEC), physical social engineering and USB Fraud. In 2021, more infections were caused by phishing attacks than any other vector. Innovation in areas such as Deepfakes, which employ AI technology to create fraudulent recordings, videos or images of real people, have made phishing attacks even more difficult to detect.
This attack vector is also a significant contributor to cloud security concerns. In the Foundry’s 2022 Cloud Computing Survey, some 35% of IT decision makers listed data privacy and security as their top cloud challenge. Additional research by Kaspersky Lab finds that around 33% of cybersecurity cloud incidents can be attributed to social engineering techniques. To address this, investment in zero-trust infrastructure can limit the potential damage of these and other threats, both internal and external to your organization. It also heightens focus on the benefits of Infrastructure as a Service (IaaS) platforms which bring together the need for security, agility, flexibility, visibility, and scalability, as exemplified by 11:11 Cloud.
Empowering and educating all staff, not just those in tech facing roles, is also key here – cybersecurity is a shared responsibility for everyone and support to enable this must be addressed across technology, culture, process and skills perspectives. This is especially true in around topics such as Social Engineering which absolutely preys on human nature and trust. As an example, how many people do you know who have received training in psychological manipulation as part of their organization onboarding process?
Probably not many…
Unpatched Software and Testing
Additionally, lapses in appropriate and effective vulnerability management are a leading concern, especially around levels of unpatched software. During the height of the pandemic, research showed many organizations were regularly delaying patch updates (IBM 2021) and now an additional study shows as many as 66% of organizations have a vulnerability backlog of an eye-watering 100K bugs! Reflecting back on the issues discussed related to passwords, this is another example of ensuring that basic cyber hygiene is embedded by design.
And beyond this, greater attention must be placed on testing. As an example, recent research by Noname Security shows a clear disconnect, or even a level of denial here, with just 11% of respondents testing APIs for signs of abuse in real-time – yet 67% stating they are confident that their DAST and SAST tools are capable of testing APIs. Validating the reality of disaster recovery is another area where extensive testing is essential. Recommendations include involving scenario- or event-based testing, even to the level of providing application testing and end-user testing in some cases to ensure a robust, well-planned and validated strategy.
NIST Framework Resource
And finally, the NIST Cybersecurity Framework is highly recommended to help protect your business through shared best practice. Now downloaded over 1.7 million times, the framework outlines a strategy to better understand your organisation’s security risks, protect against them and, in the event of an attack, how to better triage, respond and recover. The framework holistically covers five core function areas – Identify, Protect, Detect, Respond and Recover. Putting this into context to highlight its real-world applicability, and taking Identify as an example, it is critical to know the who/what/where of your data storage, application and system links, role access and more.
Automation tools such as Continuous Risk Scanning can be very effective, helping to discover security vectors that were previously unknown, identifying the most significant risk areas, and ensuring you ‘get on the right path’ for enhanced protection and more active security intelligence. When we consider that half of all organizations have not put a cybersecurity risk plan in place, taking that first step today has never mattered more!
Final Thoughts
Cybercrime exists in a world of constant change and today’s surge in cybercriminal activity directly correlates to the increase in the attack surface. Last year alone, cybercrime rose more than 15% and so, it is abundantly clear that this focus has never been more important, and indeed must be an all year round imperative. A multi-layered approach to both proactive prevention and real-time response is key, combining automated protection and mitigation with a human perspective by design. To find out more about how 11:11 Systems supports Cloud, Connectivity and Security more information is freely available here.
All questions and feedback most welcome, Sally
About the Author
Prof. Sally Eaves is a highly experienced chief technology officer, professor in advanced technologies, and a Global Strategic Advisor on digital transformation specializing in the application of emergent technologies, notably AI, 5G, cloud, security, and IoT disciplines, for business and IT transformation, alongside social impact at scale, especially from sustainability and DEI perspectives.
An international keynote speaker and author, Sally was an inaugural recipient of the Frontier Technology and Social Impact award, presented at the United Nations, and has been described as the “torchbearer for ethical tech”, founding Aspirational Futures to enhance inclusion, diversity, and belonging in the technology space and beyond. Sally is also the chair for the Global Cyber Trust at GFCYBER.
Source link
TECHNOLOGY
BT brings 5G and the cloud to businesses on the move with AWS Wavelength

BT has confirmed it is making a multi-million-pound investment to bring 5G and 4G mobile edge computing services to its UK business customers in collaboration with Amazon Web Services (AWS).
The work combines AWS’s cloud expertise with BT’s market-leading 5G and 4G infrastructure. EE’s national mobile network with AWS Wavelength will bring the power of AWS to the network edge for more business and public sector customers across the UK – opening up faster, secure and high-bandwidth connectivity on the move for use cases like policing, crowd management, healthcare and security.
The effort is part of BT’s investment in its existing mobile networks, to enable 5G-connected infrastructure as a service via AWS Wavelength. This includes switching on a new AWS Wavelength Zone in Manchester, which will service trials for eligible businesses and public sector organisations within a 100-kilometre radius (including cities such as Liverpool, Leeds, Sheffield and Blackpool). BT’s ambition is to roll out AWS Wavelength to business customers across the UK more broadly in the coming years.
AWS Wavelength embeds AWS compute and storage services within 5G and 4G networks, providing mobile edge computing infrastructure for ultra-low-latency applications. Hosting services directly at the edge of EE’s UK network reduces lag, as application traffic can reach application servers running in the AWS Wavelength Zone without leaving BT’s network. This opens up mobile edge computing infrastructure for businesses to develop, deploy, and scale mobile Internet of Things (IoT) applications over BT’s existing 5G network securely.
The collaboration aims to enable high-speed, latency-sensitive and intensive 5G connectivity for BT customers looking to benefit from high-bandwidth IoT use cases in the field. This includes autonomous vehicles, cameras for policing and other public services to help protect communities, live media production for outside broadcast, smart industrial robots, and use in community healthcare (such as in care homes to monitor for falls and accidents).
BT’s Wholesale unit has worked with AWS on the initial trials in Manchester. After the planned national rollout, the service will be available to all BT business customers in the UK – from small businesses to large enterprise and public sector organisations.
Alex Tempest, MD for BT Wholesale, said: “As we continue to build best-in-class 5G infrastructure for the UK, launching the AWS Wavelength service for our business and wholesale customers is a hugely important step on our journey – bringing the power of the cloud to the UK’s best network*. It’s set to unlock use cases like IoT cameras to help first responders keep communities safe: a real-life example of using tech to connect for good.
“By building cloud edge services into our 5G and 4G EE network, we can accelerate innovation across industries, and bring fast, secure data processing closer to where our customers need it most. Ultimately, we want to give businesses and public sector organisations all the power of edge computing, wherever they are.”
Want to learn more about cybersecurity and the cloud from industry leaders? Check out Cyber Security & Cloud Expo taking place in Amsterdam, California, and London. Explore other upcoming enterprise technology events and webinars powered by TechForge here.
TECHNOLOGY
How Artificial Intelligence Can Bring People Together

Artificial intelligence (AI) enables people to spend more time with those that matter the most.
AI is bringing people together, whether it’s assisting in the planning of a family vacation, getting to a place securely, allowing everyone to see each other on a video call, or making gift shopping a little easier.
The continuous evolution of AI has the potential to revolutionize the way we live, work, and interact with each other.
While AI is often portrayed as a divisive force that could lead to job losses and social inequality, it also has the power to bring people together and create new opportunities for collaboration and cooperation. In this article, we will explore some of the ways in which AI can be used to bridge social, cultural, and linguistic barriers and foster greater understanding and empathy among diverse communities.
1. Breaking Down Language Barriers
One of the most significant benefits of AI is its ability to facilitate communication across different languages. Machine learning algorithms can now accurately translate spoken or written language in real-time, allowing people who speak different languages to communicate with each other more easily. This technology has been particularly valuable for businesses operating in global markets, enabling them to connect with customers and partners from different regions and cultures.
The benefits of AI-powered translation extend beyond the business world. For example, the United Nations has been using AI-powered translation to help bring together representatives from different countries and facilitate discussions on important global issues. By breaking down language barriers, AI is helping to promote greater collaboration and understanding among people from diverse backgrounds.
2. Enhancing Cross-Cultural Empathy
Another way in which AI can bring people together is by enhancing cross-cultural empathy. Artificial intelligence can be combined with virtual reality (VR) and augmented reality (AR) technologies to enable people to experience different cultures and perspectives in a more immersive and engaging way. By simulating real-world scenarios and environments, AI can help people to better understand and appreciate different cultures, religions, and ways of life.
AI-powered chatbots are also being used to promote cross-cultural empathy. These chatbots are programmed to engage in conversations with users from different cultures and backgrounds, using natural language processing and machine learning algorithms to understand and respond to different communication styles and cultural norms. By promoting greater empathy and understanding, AI-powered chatbots can help to break down social and cultural barriers and foster greater social cohesion.
3. Improving Access to Healthcare
AI is also being used to improve access to healthcare, particularly in underserved and marginalized communities. For example, AI-powered diagnostic tools can help to identify diseases and conditions more accurately and quickly than traditional diagnostic methods. This technology is particularly valuable in developing countries, where access to healthcare is often limited, and where the burden of disease is highest.
In addition, AI-powered chatbots and virtual assistants are being used to provide healthcare information and support to patients in remote or underserved areas. These chatbots can answer common medical questions, provide basic health advice, and even monitor patients’ symptoms and suggest appropriate treatments. By improving access to healthcare, AI is helping to promote better health outcomes and reduce healthcare disparities, bringing people together by improving the quality of life for everyone.
4. Promoting Social Inclusion
Artificial intelligence can help to promote social inclusion by creating new opportunities for people with disabilities and other marginalized groups. For example, AI-powered assistive technologies can help people with visual or hearing impairments to navigate their environment more easily, communicate with others, and access information more effectively. These technologies can also help to break down barriers to education and employment, providing new opportunities for people who might otherwise be excluded from these areas.
AI-powered social networks and online communities can also help to bring people with similar interests and experiences together, regardless of their physical location or social background. These communities can provide a sense of belonging and support, and can help to break down social barriers by connecting people who might not otherwise have the opportunity to interact with each other.
Conclusion
Artificial intelligence has the potential to bring people together in a variety of ways, from breaking down language barriers to promoting social inclusion and empathy. By harnessing the power of AI, we can create a more connected and inclusive society, where people from diverse backgrounds can come together to collaborate, learn from each other, and share their experiences.
It is important to state that AI is not a panacea for social problems. Like any technology, AI can be used for both good and bad purposes, and its impact depends largely on how it is developed and deployed. It is therefore essential to ensure that AI is developed in a responsible and ethical manner, taking into account the potential risks and unintended consequences of its use.
Moreover, it is important to recognize that AI is not a substitute for human interaction and connection. While AI can help to facilitate communication and understanding across different cultures and languages, it cannot replace the depth and richness of face-to-face interaction and human connection.
Artificial intelligence has the potential to bring people together and create a more connected and inclusive society. By breaking down barriers to communication, promoting cross-cultural empathy, improving access to healthcare, and promoting social inclusion, AI can help to foster greater understanding, collaboration, and social cohesion. However, it is important to ensure that AI is developed and deployed in a responsible and ethical manner, and to recognize that it is not a substitute for human interaction and connection.
TECHNOLOGY
How to Reverse Video with 5 Free Video Editing Software

With so many professional video makers available on the market, it becomes a daunting task to select suitable software for creating a reversed video.
We have rounded up the most popular video editors suitable for professionals with different levels of experience. You can leverage them to produce top-level content without wasting much time.
#1 Movavi
Regardless of the operating system you prefer, this free video reverser is exactly what you need if you prioritize quality and a streamlined interface. After downloading and installing it on your device, you just need to add a video clip that you want to edit by dragging and dropping it onto the timeline. Then, click on the Properties icon and tick the Reverse box. Once you have previewed the result, save it in any supported format that you need to use. The program supports MP4, WMV, MKV, and 3GP formats, among many more.
#2 iMovie
This widely-used video editor stands out for its high-fidelity filters. Using it, you can produce professional-looking reverse clips for improving the online presence of your brand and developing your business. It supports quick file sharing to social media networks and comes with handy file management tools. To reverse your clip, you just need to go to the Project browser, select a video, and double-click on it to open the Clip inspector. Then, you need to select the Reverse checkbox and confirm your choice.
#3 Kinovea
You can use this reverse video editor without paying a dime to perform basic video enhancement tasks. As 97.8% of internet users in the U.S. aged between 18 and 24 years enjoy watching videos online, it becomes crucial to use video editing tools to reach out to a younger audience. Kinovea has a special feature in the Motion menu for creating a reverse effect. You can preview the changes on the main screen. Once you are satisfied with the result, go to the File menu and click Save.
#4 Adobe Premiere Pro
Being one of the most advanced programs for editing videos, Adobe Premiere Pro is included in the Creative Cloud package, which makes it quite affordable. It integrates with other Adobe products, which makes it perfect for professionals and beginners alike. Besides enhancing your videos by adding to them transitions, you can use this software to achieve a reverse video effect.
#5 Blackmagic DaVinci Resolve Studio 18
While you can access this powerful video editor for free, it also has a paid version. It allows you to perform color-grading like a pro, reverse your clips, and edit 8K footage. You just need to right-click on your video, select the option Change Clip Speed, and tick the Reverse Speed checkbox to achieve the desired effect.
Summing Up
Using these free tools, you can quickly reverse your videos to create attention-grabbing content for your followers and subscribers. This effect is easy to emulate even if you don’t have extensive experience in video editing. Using this technique, you can bring your point across more efficiently and create viral videos for your target audience.
-
AMAZON6 days ago
The Top 10 Benefits of Amazon AWS Lightsail: Why It’s a Great Choice for Businesses
-
SEARCHENGINES4 days ago
Google Search Status Dashboard Adds Google Ranking Updates
-
SEO2 days ago
Optimize Your SEO Strategy For Maximum ROI With These 5 Tips
-
WORDPRESS5 days ago
Internal Linking for SEO: The Ultimate Guide of Best Practices
-
SEARCHENGINES3 days ago
Google Search Console Shows If embedURL Page Uses indexifembedded
-
SEARCHENGINES3 days ago
Google Bard Won’t Link To Sources Too Often
-
SEARCHENGINES2 days ago
Google Mars Space Office Design At Belo Horizonte, Brazil
-
PPC6 days ago
PPC Campaign Testing: The Dos & Don’ts to Turn Risks into Rewards