Pyramid Analytics, a business intelligence and decision intelligence provider, debuts in Mexico and Latin America. Meanwhile, industry leaders outline how companies can fully exploit their technology investments, among them cloud computing applications.
In the realm of cybersecurity, phishing scams 3.0 have evolved to use legitimate tools, making them particularly dangerous. In Industry 4.0 news, the recent convergence of IT and OT and its accompanying vulnerabilities demands increased vigilance.
This week in Tech news and developments:
Pyramid Analytics, a business intelligence and decision intelligence provider, makes a powerful debut in Mexico and Latin America by signing partnership agreements with top regional technology consultants. Securing these partnerships is part of Pyramid Analytics’ broader strategy to rapidly expand channel partnerships with complementary technology companies.
No matter how much the digital era continues to advance toward, what is not measured cannot be improved, writes Gustavo Brant, GVP LATAM, Docusign. “Only decision-makers who understand in detail how their organization works will have the opportunity to get the most out of the innovations that emerge in time,” writes Brant.
Rodrigo Martinelli, VP and GM, Rackspace Technology Latin America, discusses the opportunities for success the cloud brings to Latin America, the technological disruption and the implications and necessity of multi-cloud solutions.
Check Point Software 2023 Cybersecurity Report indicates that threat-actors are increasingly exploiting legitimate services to conceal malicious payloads. The evolving sophistication of “phishing scams 3.0,” through which attackers use legitimate services, has led to a spike of business email compromise (BEC) attacks, comprising 86% of all file based in-the-wild attacks.
The accelerated adoption of technologies and evolution of the manufacturing sector demands routine testing to ensure the continued protection of their networks, writes Sneer Rozenfeld, CEO, Cyber 2.0. “With the continued growth of interconnected systems, it is more critical than ever to ensure that these systems are adequately secured to prevent potential cyber threats from becoming reality,” writes Rozenfeld.