
Harnessing the Full Power of Technology

Pyramid Analytics, a business intelligence and decision intelligence provider, debuts in Mexico and Latin America. Meanwhile, industry leaders outline how companies can fully exploit their technology investments, among them cloud computing applications.
In the realm of cybersecurity, phishing scams 3.0 have evolved to use legitimate tools, making them particularly dangerous. In Industry 4.0 news, the recent convergence of IT and OT and its accompanying vulnerabilities demands increased vigilance.
This week in Tech news and developments:
Mexico
Pyramid Analytics Makes Powerful Debut in Mexico, Latin America
Pyramid Analytics, a business intelligence and decision intelligence provider, makes a powerful debut in Mexico and Latin America by signing partnership agreements with top regional technology consultants. Securing these partnerships is part of Pyramid Analytics’ broader strategy to rapidly expand channel partnerships with complementary technology companies.
Executive Perspective
Metrics: How Companies Can Make the Most of Technology
No matter how much the digital era continues to advance toward, what is not measured cannot be improved, writes Gustavo Brant, GVP LATAM, Docusign. “Only decision-makers who understand in detail how their organization works will have the opportunity to get the most out of the innovations that emerge in time,” writes Brant.
Multi-Cloud: The Ultimate Enabler
Rodrigo Martinelli, VP and GM, Rackspace Technology Latin America, discusses the opportunities for success the cloud brings to Latin America, the technological disruption and the implications and necessity of multi-cloud solutions.
Cybersecurity
Phishing Scams 3.0 Are Exploiting Legitimate Services, Be Careful
Check Point Software 2023 Cybersecurity Report indicates that threat-actors are increasingly exploiting legitimate services to conceal malicious payloads. The evolving sophistication of “phishing scams 3.0,” through which attackers use legitimate services, has led to a spike of business email compromise (BEC) attacks, comprising 86% of all file based in-the-wild attacks.
Operational Tech Now a Prime Target for Cyberattacks
The accelerated adoption of technologies and evolution of the manufacturing sector demands routine testing to ensure the continued protection of their networks, writes Sneer Rozenfeld, CEO, Cyber 2.0. “With the continued growth of interconnected systems, it is more critical than ever to ensure that these systems are adequately secured to prevent potential cyber threats from becoming reality,” writes Rozenfeld.