Rogers Recognized as Canada’s Most Reliable Wireless Network by Opensignal

Posted in Commentary with tags on February 19, 2025 by itnerd

Rogers Communications announced today that it has been awarded Canada’s most reliable wireless network by Opensignal, a global leader in independent network benchmarking.

Opensignal’s study shows that in Canada Rogers holds the top spot for reliability and quality in wireless networks. Rogers also won on 5G Upload Speed and 5G Video Experience, making Rogers the most awarded network by Opensignal. 

Rogers has invested over $40 billion in its networks over the last decade and will invest $4 billion in capital investments this year. Rogers is committed to bringing Canadians the biggest and best wireless networks. The company continues to invest to expand the country’s largest and most reliable 5G network, which now reaches more than 2,500 communities.  

Hobson & Company Analysis of KnowBe4 Finds 200-400% ROI in Reducing Human Risk 

Posted in Commentary with tags on February 19, 2025 by itnerd

 KnowBe4 today released the findings from a new report from Hobson & Company titled “From Risk to Return: How KnowBe4 Helps Deliver Measurable ROI”. 

Despite multiple security layers, breaches remain costly, with IBM reporting a 10% increase in the average data breach cost, reaching $4.88 million in 2024.

The independent analysis from Hobson & Company found that organizations implementing KnowBe4’s Human Risk Management platform can achieve payback in just 3.5 months. For a typical organization with 2,000 employees,  KnowBe4  delivered over $537,000 in operational savings and $415,500 in reduced risk exposure over three years.

Key findings from the study include:

  • 80% reduction in time spent delivering security awareness training
  • 95% reduction in time spent conducting phishing simulations
  • 85% reduction in time investigating and remediating malicious emails
  • 25% decrease in risk of data breaches and ransomware attacks
  • The monthly cost of delaying the implementation of KnowBe4 would be $19,000
  • 20% decrease in cyber insurance premiums and potential compliance fines 

To download the report, visit https://www.knowbe4.com/resources/whitepapers-and-ebooks/risk-to-return-how-knowbe4-delivers-roi

US military and defense contractors systems found to be containing infostealing malware

Posted in Commentary with tags on February 19, 2025 by itnerd

This is not good news at all.

There is a claim that the US Army, Navy, and major defense contractors — Lockheed Martin, Boeing, and Honeywell — have hundreds of computers with active infostealer infections:

For years, the U.S. military and its defense contractors have been considered the gold standard of security — equipped with multi-billion-dollar budgets, classified intelligence networks, and the world’s most advanced cybersecurity measures.

Yet, Global Infostealing Malware Data from Hudson Rock reveals an unsettling reality:

  • Employees at major defense contractors — including Lockheed Martin, Boeing, and Honeywell — have been infected by Infostealer malware.
  • U.S. Army and Navy personnel had their login details stolen — exposing VPN access, email systems, and classified procurement portals.
  • Even the FBI and Government Accountability Office (GAO) have active infections, exposing investigative and cybersecurity personnel.

Each one of these infected employees is a real person — it could be an engineer working on military AI systems, a procurement officer managing classified contracts, a defense analyst with access to mission-critical intelligence.

At some point, these employees downloaded malware on a device they used for work, exposing not just their credentials, but potentially their entire digital footprint: browsing history, autofill data, internal documents, and session cookies for sensitive applications.

And if these organizations — the backbone of U.S. national security — are infected, what does that say about their ability to defend against more sophisticated attacks?

That’s really not good at all. Roger Grimes, Data-Driven Defense Evangelist at KnowBe4 had the following comment:

“The Infostealer is a secondary problem. The real question is how the infostealers are getting on military computers in the first place. Was it social engineering (most common), unpatched software or firmware (second most likely cause), or something else? Either way, the method used to allow the infostealer to gain initial access can be used by bad people to do anything. Adversarial spies, like Russia or China, could gain access. Ransomware taking down the infrastructure could be launched. If the involved department doesn’t take care of how the infostealer is gaining initial access, they are going to have far greater problems than just stolen passwords.”

Needless to say, someone needs to figure out how the bad guys got in so that something like this doesn’t happen again. Because this is not just bad, it’s the worst possible scenario that I can think of based on who the targets apparently are.

The Humane AI Pin Is Dead

Posted in Commentary with tags , on February 19, 2025 by itnerd

At about this time last year, the Humane AI pin was getting all sorts of attention. It was a pin that would answer all sorts of questions that you asked it and help you to move about your day. But it was blasted by reviewers as not working at all. Most notable was YouTuber MKBHD who called it the worst product that he has ever reviewed. It was only downhill from there for Humane who couldn’t give the things away.

Fast forward to today. Actually late yesterday were HP announced that they had acquired Humane for $116 million. In relation to this announcement, Human announced that the pin would no longer work at the end of February as they were shutting down the back end services that the pin connected to. If you bought a pin in the last 90 days, you could get a full refund. But if you were an early adopter, it sucks to be you as no refund will be offered. That is sure to ruffle a few feathers so watch this space as I suspect that that part of the story isn’t over.

I have ask if this was the plan by Humane all along. Start a company, hype it up and cash out? I’m sure that part of the story will eventually come out. Until then, RIP Humane AI pin.

Half of people globally worry about being hacked: NordVPN

Posted in Commentary with tags on February 19, 2025 by itnerd


Around a third of internet users
 say they would like to delete themselves from the internet, with people in the US and Canada being at the top.

According to joint research conducted by the cybersecurity company NordVPN and the personal data removal service Incogni, 45% of respondents are concerned about potentially being hacked. That is one of the main reasons people want to erase their online presence.

People globally also expressed that:

  • Almost half (44%) of people feel hopeless, as they don’t know how to remove themselves from the digital world.
  • 76% of respondents express concern about the potential for hackers or malicious third parties to access their financial information. Statistically, Canadians are notably more likely to fear that such entities could compromise their financial data.
  • 57% of all respondents say they know how to delete their personal information from the internet, or at least some of it.

Additionally, according to the National Privacy Test conducted by NordVPN, with 25,567 respondents from 181 countries, only half of the population claim to know how to secure their privacy online. 

The shift in people’s attitude and their increasing need to delete their presence from the internet highlights a trend: People no longer passively accept the idea that their data should live on the internet forever. There is a growing demand for control, empowerment, and the right to be forgotten. 

Another significant source of worry for individuals is the complexity of recovering from a hack. Regaining control of compromised accounts, securing financial assets, and addressing any harm caused by cybercriminals can be time-consuming and overwhelming. 

Methodology: 2024 survey: Would you delete yourself from the internet? was commissioned by NordVPN and carried out by Cint between June 28 and July 10, 2024. A total of 6,800 respondents aged 18 years old and older from the US, UK, Canada, Germany, France, Spain, and Italy were surveyed. Researchers placed quotas on respondents’ gender, age, and place of residence to achieve a nationally representative sample of internet users.

Neeraj Methi Joins Myriad360 as New Vice President of Cybersecurity Solutions

Posted in Commentary with tags on February 19, 2025 by itnerd

Myriad360 today announced the appointment of Neeraj Methi as its new Vice President of Cybersecurity Solutions. As the company continues to expand its cybersecurity practice, the role of VP of Cybersecurity Solutions remains a key leadership position. Alpesh Shah, who previously held this role, has transitioned into the newly created position of Vice President of Security Alliances to further strengthen the company’s strategic partnerships.

A Philadelphia suburban resident, Methi brings extensive leadership experience in cybersecurity, strategic business growth, and solution architecture, reinforcing Myriad360’s commitment to delivering cutting-edge security solutions to its clients. As VP of Cybersecurity Solutions, Methi will develop and drive the Go-To-Market (GTM) strategy for Myriad360’s cybersecurity practice, setting the vision and direction for the company’s security solutions. He will also develop a roadmap for the growth of cybersecurity practice and identify areas of opportunity for expansion.

Methi joins Myriad360 with over 26 years’ experience in the technology sector, having played key roles in multiple high-growth companies. His career includes contributions to one IPO (Okta), one unicorn (OutSystems), and three successful startups. He is passionate about guiding organizations through complex cybersecurity challenges, fostering business expansion, and driving innovation in security solutions.

Outside of work, Methi enjoys yoga, meditation, healthy eating, and golf when time allows. He is a proud father of a 19-year-old son following in his footsteps in the tech industry, and a 16-year-old daughter who is a talented musician and crew team member.

For more information about Myriad360 and its leadership team, visit www.myriad360.com.

Wallarm Introduces Industry-First Penetration Testing Service for Agentic AI Systems

Posted in Commentary with tags on February 19, 2025 by itnerd

Wallarm, the leader in API and AI security solutions, is pleased to announce a groundbreaking offer for the enterprise security community: penetration testing for Agentic AI systems. This industry-first offer is designed to help organizations assess and secure their AI-driven systems from emerging threats.

As enterprises increasingly turn to Agentic AI — advanced AI systems capable of autonomous decision-making, continuous learning, and sophisticated action-taking — concerns about security vulnerabilities in these complex systems are mounting. In fact, Wallarm’s recent API ThreatStats report demonstrated that 57% of AI powered APIs are available externally, and 89% relied on insecure authentication methods, such as static keys. Wallarm’s penetration testing service focuses on key attack vectors like jailbreaking, injections, and other security threats that can compromise the integrity and performance of Agentic AI.

The service, powered by Wallarm’s advanced cybersecurity analysts, provides businesses with a detailed report highlighting vulnerabilities and offering insights into how to safeguard these cutting-edge technologies. By leveraging Wallarm’s expertise in API security, companies can ensure that their Agentic AI systems remain secure in an increasingly connected world.

With AI agents becoming a cornerstone of enterprise operations, Wallarm’s service is a timely initiative to help organizations understand and mitigate the unique security challenges of this new frontier in AI technology.

How to Learn More

Interested parties can request a free Agentic AI penetration test by following the link below and submitting a request. Wallarm’s security experts will then conduct a thorough analysis of the AI system’s vulnerabilities and provide a detailed report with actionable recommendations. For more information, please visit https://www.wallarm.com/solutions/protect-agentic-ai.

Foxit Announces Launch of PDF SDK for Desktop 10.1.0 and PDF Conversion SDK 2.1.0

Posted in Commentary with tags on February 19, 2025 by itnerd

Foxit today announced the launch of Foxit PDF SDK for Desktop 10.1.0 and Foxit PDF Conversion SDK 2.1.0, featuring powerful new tools and enhancements to streamline PDF processing and empower developers. The new updates introduce advanced compliance tools, improved OCR accuracy, faster processing speeds, enhanced conversion workflows, and expanded APIs for greater flexibility and precision in PDF development.

Foxit PDF SDK 10.1.0 New Features and Functionality:

The latest version of Foxit PDF SDK focuses on improving compliance, enhancing conversion workflows, boosting performance, and adding powerful new features. Key highlights include:

  • Compliance & Standards – New preflight functionality ensures document compliance with PDF/E and PDF/X standards
  • DWG2PDF – Improved conversion progress tracking, output log control, and color conversion policies
  • Libre Office2PDF – Multi-threaded conversion capabilities for Linux, driven by a binary engine
  • Enhanced OCR Capabilities – Upgraded OCR features include skew correction, image denoising, and multi-core processing, enabling faster and more accurate image-based text recognition
  • Performance Boosts – Optimization and form file import speeds have been dramatically improved, reducing processing times from minutes or hours to seconds
  • New APIs and Features – Developers can now access regular expression search, advanced image processing, text processing, and more
  • Foxit PDF2Office – Flexible library initialization, driven by a binary engine

Additional New Features:

  • PDF3D – Support for retrieving and presetting 3D views, along with default view resets
  • Annotations – Separate transparency settings for border and fill colors, JavaScript-based sub-actions in link annotations, and retrieval of annotations by unique IDs
  • TextSearch – Enhanced with regular expression support
  • Rendering – Improved support for rendering PDF pages to 1bpp bitmap and Linux PDF print devices

Foxit PDF Conversion SDK 2.1.0 New Features and Functionality:

Foxit PDF Conversion SDK 2.1.0 introduces significant enhancements for developers working with complex conversion processes. Key updates include:

  • Foxit Office2PDF – Official integration of Foxit Office2PDF as an add-on, with new features like outline conversion in Word2PDF and workbook conversion options in Excel2PDF.
  • Enhanced Conversion Flexibility – More conversion options, including the ability to remove trailing spaces, insert page breaks, and output images during conversion. It also introduces support for restricted PDF file conversion.
  • New Class and API – ConvertCheckCallback, allowing for more flexible conversion checks.
  • Updated APIs – New APIs for handling PDF-to-Office conversions, such as PDF2Office, PDF2Word, PDF2Excel, and PDF2PowerPoint, now offering more control over conversion processes and better handling of complex layouts and formatting.

Foxit PDF SDK for Desktop 10.1.0 and Foxit PDF Conversion SDK 2.1.0 are now generally available (GA). To learn more, please visit: https://developers.foxit.com/news/latest-release/.

Deepgram Achieves Key Milestone on Path to Delivering Next-Gen, Enterprise-Grade Speech-to-Speech Architecture

Posted in Commentary with tags on February 19, 2025 by itnerd

Deepgram has announced a significant technical achievement in speech-to-speech (STS) technology for enterprise use cases. The company has successfully developed a speech-to-speech model that operates without relying on text conversion at any stage, marking a pivotal step toward the development of contextualized end-to-end speech AI systems. This milestone will enable fully natural and responsive voice interactions that preserve nuances, intonation, and emotional tone throughout real-time communication. When fully operationalized, this architecture will be delivered to customers via a simple upgrade from our existing industry-leading architecture. By adopting this technology alongside Deepgram’s full-featured voice AI platform, companies will gain a strategic advantage, positioning themselves to deliver cutting-edge, scalable voice AI solutions that evolve with the market and outpace competitors.

Advancements Over Existing Architectures

Existing speech-to-speech (STS) systems are based on architectures that process speech through sequential stages, such as speech-to-text, text-to-text, and text-to-speech. These architectures have become the standard for production deployments for their modularity and maturity, but eliminating text as an intermediary offers opportunities to improve latency and better preserve emotional and contextual nuances.

Meanwhile, multimodal LLMs like GeminiGPT-4o, and Llama have evolved beyond text-only capabilities to accept additional inputs such as images, videos, and audio. However, despite these advancements, they struggle to capture the fluidity and nuance of human-like conversation. These models still rely on a turn-based framework, where audio input is tokenized and processed within a textual domain, restricting real-time interactivity and expressiveness.

To advance the frontier of speech AI, Deepgram is setting the stage for end-to-end STS models, which offer a more direct approach by converting speech to speech without relying on text. Recent research on speech-to-speech models, such as Hertz and Moshi, has highlighted the significant challenges in developing models that are robust and reliable enough for enterprise use cases. These difficulties stem from the inherent complexities of modeling conversational speech and the substantial computational resources required. Overcoming these hurdles demands innovations in data collection, model architecture, and training methodologies.

Delivering Speech-to-Speech with Latent Space Embeddings

Deepgram is transforming speech-to-speech modeling with a new architecture that fuses the latent spaces of specialized components, eliminating the need for text conversion between them. By embedding speech directly into a latent space, Deepgram ensures that important characteristics such as intonation, pacing, and situational and emotional context are preserved throughout the entire processing pipeline. What sets Deepgram apart is its approach to fusing the hidden states—the internal representations that capture meaning, context, and structure—of each individual function: Speech-to-Text (STT), Large Language Model (LLM), and Text-to-Speech (TTS). This fusion is the first step toward training a controllable single, true end-to-end speech model, enabling seamless processing while retaining the strengths of each best-in-class component. This breakthrough has significant implications for enterprise applications, facilitating more natural conversations while maintaining the control and reliability businesses require.

This technical advancement builds on Deepgram’s expertise in enterprise speech AI, with over 200,000 developers using its platform, more than 50,000 years of audio processed, and over 1 trillion words transcribed. Key benefits of the new architecture include:

  • Optimized latency design for faster, more responsive interactions
  • Enhanced naturalness, preserving emotional context and conversational nuances
  • Native ability to handle complex, multi-turn conversations
  • Unified, end-to-end training across the entire model, creating a more cohesive and inherently adaptive system that fine-tunes its understanding and response generation directly in the audio space

Utilizing Transfer Learning for Cost-Efficient, High-Accuracy Speech-to-Speech

Deepgram’s research in the space is accelerated by its use of transfer learning and best-in-class pre-trained models, allowing it to achieve high accuracy with significantly less training data than traditional methods. Without latent techniques, training a model at the scale needed for speech-to-speech would require over 80 billion hours of audio—more than humanity has ever recorded. However, Deepgram’s latent space embeddings and transfer learning approach achieve superior comprehension while significantly reducing costs, maintaining interpretability, and accelerating enterprise deployment. This efficiency enables Deepgram to deliver scalable, end-to-end speech AI that meets the demands of real-world voice applications.

Empowering Developers with Full Debuggability

One of the requirements in enterprise speech-to-speech modeling is the ability to understand and troubleshoot each step of the process. This is particularly challenging when text conversion between steps isn’t involved, as verifying both the accuracy of the initial perception and the alignment of the spoken output with the intended response is not straightforward. Deepgram recognized this need and addressed it by designing a new architecture that enables debuggability throughout the entire process.

This architecture allows developers to inspect and understand how the system processes spoken dialogue. The design incorporates speech modeling of perception, natural language understanding/generation, and speech production, preserving distinct capabilities during training. Through the ability to decode intermediate representations back to text at specific points, developers can gain insight into what the model perceives, thinks, and generates, ensuring its internal representation aligns with the model output and stays true to the intent of the business user, addressing hallucination concern in scaled business use cases. This capability allows the user to peer into each step throughout generation, helping refine models, improve performance, and deliver more accurate, lifelike, and reliable speech-to-speech solutions.

Beyond Speech-to-Speech – A Complete, Enterprise-Ready Voice AI Stack

While building an advanced speech-to-speech (STS) model is a major technical achievement, enterprises need more than just a model—they need a complete, scalable platform that ensures seamless deployment, adaptability, and cost efficiency. Deepgram delivers not just cutting-edge STS technology, but an enterprise-ready infrastructure designed for real-world applications.

Seamless Integration & Continuous Improvement – Once Deepgram’s end-to-end STS model moves to production, businesses will be able to adopt this breakthrough directly through our developer-friendly voice agent API from within the current Deepgram platform. Through continued innovation, enterprises will benefit from the latest advancements, ensuring seamless integration and a future-proof platform for their voice AI applications.

Enterprise-Grade Performance & Cost Efficiency – Built for low customer COGS, our platform enables enterprises to deploy high-performance voice AI without excessive costs. This ensures scalability, whether for customer service automation, real-time voice agents, or multilingual applications.

Full-Featured Platform and High-Performance Runtime – Deepgram’s platform includes powerful capabilities such as:

  • Adaptability – Dynamically fine-tune models for specific industry language, ensuring high accuracy across diverse applications without needing constant retraining.
  • Automation – Streamline transcription, model updates, and data processing, reducing overhead and accelerating deployment.
  • Synthetic data generation – Generate synthetic voice data to improve model training, even with limited real-world data, enhancing accuracy for niche use cases.
  • Data curation – Clean, manage, and organize training data to ensure high-quality, relevant input, improving model performance.
  • Model hot-swapping – Seamlessly switch between different models to optimize performance for specific tasks.
  • Integrations – Effortlessly integrate Deepgram’s voice AI with cloud platforms, enterprise systems, and third-party applications, embedding it within existing workflows.

With Deepgram, enterprises don’t just get speech-to-speech—they get the most advanced, enterprise-ready voice AI platform, designed for real-world deployment and long-term innovation.

For more information about Deepgram’s novel approach for speech-to-speech, read the technical brief. To learn more about Deepgram’s suite of voice AI infrastructure, visit www.deepgram.com.

XCSSET macOS Malware Reappears With New Attack Strategies

Posted in Commentary with tags on February 18, 2025 by itnerd

Microsoft has warned that a new variant of XCSSET malware is actively targeting macOS users. “The latest XCSSET malware features enhanced obfuscation methods, updated persistence mechanisms, and new infection strategies,”

Roger Grimes, Data-Driven Defense Evangelist at KnowBe4,commented:

“Downloading, running, or re-using any code from any repository is taking a big risk. If you download and reuse code that you yourself or someone you greatly trust did not write, you have to inspect it. This is a lesson the world has known about the threat of reusing other people’s code since the late 1970’s. In 1984, one of the co-creators of Unix, Ken Thompson, wrote a seminal paper on the trustworthiness of code titled Reflections on Trust. He summarized it by stating, “You can’t trust code that you did not totally create yourself.” He footnotes a 1974 paper on software security paper entitled Multics Security Evaluation: Vulnerability Analysis that says the same. Unfortunately, almost none of today’s programmers are taught basic ‘secure code’ skills, and hence each generation of programmers seems to have to learn the same mistakes of the past. We need all of today’s programming curriculums teaching secure coding, including the need to be wary of and inspect others’ code, and we need employers who hire programmers requesting that those programmers come with secure coding skills.”

“It’s a little ironic to see Microsoft pointing out and defending against Mac vulnerabilities and threats, especially before Apple does. But that’s testament to today’s interconnected world and the shift that Microsoft has made in better protecting the entire ecosystem.”

This is a reminder that Mac users are not immune to threats. They need to practise good computing habits such as these. Because threats like this one are starting to become more and more common on the Mac platform. Which means that you need to be on guard at all times.