Ericsson Private 5G to support JLR’s Digital Manufacturing Transformation

Posted in Commentary with tags on February 12, 2025 by itnerd

JLR is accelerating industrial connectivity at its plant in Solihull, England, with the implementation of Ericsson Private 5G. This cutting-edge networking technology is enhancing the production of Range Rover vehicles by supporting business-critical applications such as vision systems, IoT sensors, and production tools. Leveraging Ericsson’s high-speed, low-latency, and secure private 5G solution, JLR is setting new standards in modern automotive manufacturing. 

The deployment of Ericsson Private 5G is a pivotal step for JLR in embracing Industry 4.0. JLR is creating a more agile and innovative manufacturing environment to support IoT devices, artificial intelligence (AI), and automation with an eye toward automated guided vehicles (AGVs). The limitations of traditional wired networks drove JLR to “cut the copper” by replacing those networks with Ericsson’s robust 5G capabilities, allowing for seamless and real-time data transmission. This transformation ensures that JLR’s manufacturing processes are not only connected but also agile and efficient, leading to streamlined operations. 

Private 5G is driving greater workflow efficiency at JLR, with manufacturing teams already sharing positive feedback. Through enhanced connectivity, maintenance and production managers can now turn data insights and simulations into tangible operational efficiencies with DataOps platforms such as Litmus. Consolidating and analyzing data empowers JLR decision-makers on the factory floor to quickly innovate and optimize manufacturing processes. Additionally, private 5G enables JLR to quickly swap and provision new or broken connected tools, significantly reducing downtime and enabling quicker modifications to the production line. 

Fujitsu has partnered with Ericsson to deliver the connectivity of this comprehensive, end-to-end private 5G-based operations at the Solihull plant. This collaboration paves the way for JLR to explore use cases at other sites in the future. 

Ericsson Cradlepoint X20 5G Router Announced

Posted in Commentary with tags on February 12, 2025 by itnerd

Ericsson today announced the launch of the Cradlepoint X20 5G Router, enabling enterprise-class fixed wireless access (FWA) connectivity for small- to medium-sized and home-based businesses, temporary sites, and remote workers. The Ericsson Cradlepoint X20 delivers powerful, plug-and-play FWA 5G connectivity with advanced network slicing and security capabilities. Featuring cutting-edge routing, switching, and Wi-Fi 7, the X20 ensures robust, easy-to-maintain connectivity essential for critical business operations. Now enterprises can quickly deploy high-bandwidth 5G connectivity, with unprecedented reliability enabled by dual-SIM failover capabilities and an eight-hour battery backup. 

Organizations are increasingly seeking agile, scalable connectivity to keep pace with evolving digital demands. IDC reports that by 2026, 75 per cent of enterprises will have assigned all deployment responsibility, operational control, and technology innovation for at least one major network domain to a trusted management partner. With the availability and cutting-edge capabilities of the Cradlepoint X20, service providers can offer managed services with tiered service packages catering to diverse customer needs and differentiate themselves in a rapidly expanding market. 

Capabilities of the Cradlepoint X20 Router span different types of business use cases including the following: 

  • Small-to-Medium Sized Businesses: The X20 5G Router provides SMBs, such as retail stores and small offices, with reliable, high-speed connectivity without traditional wired infrastructure. Easy installation and scalability allow businesses to enhance operations and adapt as they grow.
  • Temporary Sites: Perfect for pop-up stores, mobile clinics, and construction sites, the X20 ensures rapid deployment and flexibility. Its wireless design supports critical operations with high-speed 5G connectivity in dynamic environments. 
  • Remote Workers and Home-Based Businesses: Ideal for remote and hybrid workers, the X20 offers easy setup and portable, high-speed internet for seamless access to cloud applications, video calls, and collaborative tools. 

The Ericsson Cradlepoint X20 5G Router will be available in April 2025. For more information, visit https://cradlepoint.com/product/endpoints/x20/.  

2.7 Billion Records Exposed in IoT Devices Data Breach 

Posted in Commentary with tags on February 12, 2025 by itnerd

Cybersecurity researcher Jeremiah Fowler uncovered an unprotected database belonging to Mars Hydro, a China-based company offering IoT grow lights and software applications. It contained 2.7 Billion records with a total size of 1.17 TB exposing Wi-Fi SSID network names, passwords, IP addresses, device ID numbers, email addresses and some more.

The unprotected database contained WiFi network names, passwords, IP addresses, device IDs, and API details, posing serious security risks. Unauthorized access to devices or networks, phishing attacks, intercepting data, eavesdropping or impersonation via MITM (man in the middle attacks). 

You can read the report here: https://www.vpnmentor.com/news/report-marshydro-breach/

Valentine’s Day Fraud Prevention Tips From Visa Canada

Posted in Commentary with tags on February 12, 2025 by itnerd

Romance scams cost Canadians over $58.4M in 2024, with median losses exceeding $2,000 per victim. Visa is sharing expert insights to help consumers recognize red flags and protect themselves from romance scams this Valentine’s Day.

Red Flags 🚩 

  • Tragic backstories – Be cautious of early tragic stories, especially if they lead to requests for money. Scammers use emotional tales to elicit sympathy and financial aid. 
  • Too good to be true –  Scammers often create profiles with model-like photos and flawless backgrounds, while genuine profiles usually have a mix of candid and professional photos 
  • Too soon “I Love You” – Scammers use flattery and quick declarations of love to emotionally manipulate victims. If someone professes love too soon, be cautious. 
  • Avoiding video calls – If your match avoids video calls or meetings, they may be hiding something. Scammers dodge face-to-face interactions to sustain their deception. 

Read more tips from Visa here.  

Deepgram Introduces Nova-3

Posted in Commentary with tags on February 12, 2025 by itnerd

 Deepgram, the leading voice AI platform for enterprise use cases, today announced the launch of Nova-3, its most advanced speech-to-text (STT) model to date. Nova-3 pushes the boundaries of AI-driven transcription, offering unmatched accuracy in challenging audio environments while offering flexible, self-service customization to tailor results for industry-specific needs. Trusted by industry leaders like Twilioand Jack in the Box, Deepgram’s infrastructure also includes powerful text-to-speech (TTS) and full speech-to-speech (STS) capabilities, offering a comprehensive suite of cloud or self-hosted APIs for seamless voice AI integration. Its full-featured platform and high-performance runtime include powerful automation and data capabilities – such as synthetic data generation and model curation – along with model hot-swapping and robust integrations, empowering developers to efficiently build and scale voice-enabled applications. With over 450 enterprise customers, Deepgram is powering the fast-growing enterprise voice AI market.

Nova-3 Expands Voice AI for a Broader Range of Enterprise Use Cases

Leapfrogging the success of its predecessor, Nova-3 is engineered for real-time use cases, delivering unparalleled accuracy and performance in dynamic environments where traditional solutions often fall short. Unlike generalized models that lack domain-specific precision, Nova-3 leverages an advanced latent space architecture to encode complex speech patterns into a highly efficient representation. This enables superior transcription accuracy, even in noisy or specialized settings, driving improved productivity, customer satisfaction, and cost efficiency. With its expanded capabilities, Nova-3 now delivers enhanced accuracy for real-world enterprise challenges such as:

  • Adverse acoustic conditions – Accurately transcribes speech in distant, noisy, and multi-speaker scenarios, making it ideal for air traffic control, drive-thrus, and call centers.
  • Real-Time Multilingual Support – Enables real-time transcription across multiple languages – the first model of its kind to do so – making it ideal for emergency response, global customer service, and multilingual operations.
  • Industry-Specific Accuracy – Recognizes domain-specific terminology for specialized fields like medical and legal transcription.
  • Precision Data Handling – Ensures accurate numeric recognition for retail, banking, and finance while supporting real-time redaction of sensitive information for compliance and data privacy.

Personalize Voice AI with Self-Service Customization

Nova-3 is the industry’s first voice AI model to enable self-serve customization, allowing users to fine-tune the model for specialized domains without requiring deep expertise in machine learning. Many conventional models require expensive and time-consuming expert-led customization, delaying deployment and increasing costs. With the addition of Keyterm Prompting, developers can instantly improve transcription accuracy by optimizing up to 100 key phrases without waiting for extensive model retraining or customization cycles. This flexibility accelerates deployment, enhances accuracy, and reduces costs—allowing businesses to rapidly unlock value from their voice AI solutions.

Benchmarking Excellence – Deepgram Extends Its Lead

Nova-3 continues to set a new standard for transcription accuracy, significantly widening the gap between itself and competing voice AI providers. Nova-3 outperforms competitors in both batch and streaming use cases, with consistently lower Word Error Rates (WER) that drive superior performance in real-world audio environments, including multilingual scenarios.

Batch WER Comparison

Nova-3 achieves a WER of 5.26%, extending its lead over the next-best competitor by 47.4% (10% WER). This reduced error rate translates to more accurate transcriptions for industries that require high precision, such as healthcare, legal, and finance.

Streaming WER Comparison

In streaming WER, Nova-3 leads with a WER of 6.84%, extending its advantage over the next-best competitor by 54.2% (14.92% WER). This improved accuracy ensures real-time, reliable transcription for applications such as call centers and virtual assistants, enhancing overall customer experience.

Multilingual Performance

In multilingual testing, Nova-3 outperforms OpenAI’s Whisper across seven languages, delivering up to 8:1 preference ratios in some languages. Nova-3’s advanced real-time multilingual conversation transcription empowers enterprises to scale globally, delivering reliable, accurate results across multiple languages and enhancing international customer engagement.

These benchmark results underscore Deepgram’s continued lead in transcription accuracy, driving superior outcomes for businesses that rely on speech-to-text and voice AI technologies.

Nova-3 Marks a Major Advancement

Nova-3 represents a breakthrough in AI-driven speech-to-text technology, cementing Deepgram’s position at the forefront of voice AI innovation and empowering businesses and developers to build the next generation of enterprise voice AI applications. Deepgram’s focus on continuous model and platform improvements ensures users always have access to the latest advancements, maximizing long-term value. Built with low customer COGS, the platform offers cost-efficiency and seamless updates, helping businesses stay competitive and future-proofed as they scale.

For more information about Nova-3 and Deepgram’s suite of voice AI infrastructure, please visit www.deepgram.com.

Check Point Teams Up With Wiz

Posted in Commentary with tags , on February 11, 2025 by itnerd

Earlier today the news filtered out that Wiz and Check Point are going to team up:

The partnership between Check Point and Wiz addresses these issues head-on offering customers:

  • Unified Security Insights: Check Point’s cloud network security controls integrated within Wiz’s CNAPP risk platform, enabling cloud security teams to automatically prevent attacks access real-time network-driven insights for smarter risk prioritization
  • Enhanced Risk Context: Wiz’s advanced risk analysis feeds integrate directly into Check Point’s platform, providing network security teams with actionable recommendations to optimize security coverage and configurations
  • Prioritization of Unsecured Assets: Cloud security teams are empowered to identify and address unsecured assets more effectively, leveraging network security data to guide decision-making
  • Optimized Security Operations: Network security teams benefit from tailored recommendations generated by Wiz’s platform, enhancing operational efficiency across hybrid environments

The mutually beneficial partnership includes joint integration and the assisted migration of Check Point’s CNAPP customers to Wiz. Check Point expects to reallocate resources and make further investments across its Cloud Security business, including Cloud Network Security, Web Application Firewall (WAF), GenAI and other key Cloud technologies.

Marina Segal, CEO, Tamnoon highlights the risks associated with this team up:

“As organizations transition from Check Point CloudGuard to Wiz, under their newly announced partnership, it is critical to maintain continuous security operations while minimizing disruption. CNAPP migrations can take time and energy from already understaffed security teams. Our experience has shown that it is important to follow a proven process and make sure you have experts to guide every successful migration of any CNAPP.”

It will be interesting to see how organizations navigate this so that the best outcome possible is the one that they get.

Guest Post: Safer Internet Day – Getting Serious With Passwords

Posted in Commentary with tags on February 11, 2025 by itnerd

By Darren James – Senior Product Manager and cyber security expert at Specops Software

To celebrate Safer Internet Day (SID) and raise further awareness around promoting the safe and positive use of digital technology for the theme “Together for a better Internet,” we’ve decided to focus on a critical element within security that many people will be familiar with but seemingly don’t give due attention: passwords.

For the modern person, our daily lives largely involve the internet. Whether that be online banking, connecting with friends and family on social media, checking email, shopping for groceries, or so on. Access to all of these services requires a login and a password. Now, you may think users are using strong, unbreakable, long passwords, not least because many sites now mandate passwords to meet certain requirements. After all, passwords are often all that separates the outside world from gaining entry to our sensitive information.

However, this isn’t the case as many people are still either not changing the default password or using generic, easy-to-crack credentials instead. Speaking plainly, most of us are guilty of using lazy passwords, or reusing credentials at some point in our lives.

This poor display of security behaviour is very visible in the working world and our recent findings in the 2025 Breached Password Report only highlight the critical importance of SID’s mission in improving cybersecurity habits for everyone.

The password “123456” was the most frequently compromised, appearing in more than 1.4 million leaked credentials. Alarmingly, among the 1.8 million breached administrator credentials, 40,000 admin portal accounts used “admin” as the password, highlighting that even IT professionals may not be prioritizing security.

Over a 12-month period, more than one billion credentials and passwords were stolen through malware attacks. This alarming statistic underscores the need for robust cybersecurity measures and increased awareness about online threats.

One of the key findings is that 230 million of the stolen passwords met common complexity requirements (over eight characters, including uppercase letters, numbers, and special characters). This indicates that adhering to standard password policies alone is insufficient to protect against sophisticated attacks.

With breaches often costing companies millions for each incident, the cost of lazy passwords could be seriously detrimental to any business.

The stats highlight the brutal truth that relying on end users to maintain strong password security is a losing battle. Even with cybersecurity training and strict password policies, human error remains the weakest link. Security professionals must take a proactive approach (that does not rely on end users) by implementing robust security measures – such as multi-factor authentication (MFA) and password managers – rather than assuming awareness alone will keep systems secure.

Enhancing password security is crucial for protecting organizations against cyber threats. Here are five key tips to strengthen your organization’s password practices:

Train Employees on Secure Password Practices

Educate staff on password security risks, such as weak storage methods and easily guessed passwords. Ultimately, we want to help users by providing detailed, local language feedback when they set or change their passwords.

Enforce Strong Password Policies

We want to encourage the use of longer passphrases, using memorable words so that users are less likely to write them down. Policies can include increased password expiry time but to avoid users incrementing the same password, organizations must continuously check the password and require it to be changed if it becomes breached. Furthermore, certain departments or individuals may require specific password policies for compliance requirements, so this needs to be accounted for.

Defend Against Brute-Force Attacks

Protect accounts by locking them after multiple failed login attempts and blocking suspicious IP addresses. Configure these settings in Active Directory and other security systems. Organizations can start by blocking easy-to-guess passwords that might relate to the company or business.

First-Day Password & Promptly Deactivate Departing Employee Accounts

When a new employee joins, having a “First Day Password” security capability will enable the user to securely set their initial password, eliminating the need for IT to share temporary credentials and reducing onboarding security risks. Moreover, when an employee leaves the company, immediately disabling accounts will prevent unauthorized access. Updating shared passwords will also minimize security risks.

Implement Multi-Factor Authentication (MFA)
Strengthen security by requiring multiple verification steps, ensuring access is not solely dependent on passwords.

With Safer Internet Day 2025, we can’t let another year pass and not take the required action. It’s imperative to reflect on these findings and take proactive steps to safeguard our digital lives. By working together, we can create a more secure and trustworthy internet for all. Furthermore, by adopting these strategies, your organization can significantly improve its password security posture and reduce the likelihood of breaches related to compromised credentials.

AppSOC Tests DeepSeek And Finds A Wide Range Of Flaws

Posted in Commentary with tags on February 11, 2025 by itnerd

AppSOC, specialists in AI governance and application security, today published “Testing the DeepSeek-R1 Model: A Pandora’s Box of Security Risks detailing in-depth model testing that reveals a wide range of flaws with high failure rates. 

Through a combination of automated static analysis, dynamic tests, and red-teaming techniques, the DeepSeek-R1 model was put through scenarios that mimic real-world attacks and security stress tests using AppSOC’s AI Security Platform and risk scoring.

Among alarming results: 

  • Jailbreaking: Failure rate of 91%. DeepSeek-R1 consistently bypassed safety mechanisms meant to prevent the generation of harmful or restricted content.
  • Prompt Injection Attacks: Failure rate of 86%. The model was highly susceptible to adversarial prompts, resulting in incorrect outputs, policy violations, and system compromise.
  • Malware Generation: Failure rate of 93%. Tests showed DeepSeek-R1 capable of generating malicious scripts and code snippets at critical levels.
  • Supply Chain Risks: Failure rate of 72%. The lack of clarity around the model’s dataset origins and external dependencies heightened its vulnerability.
  • Toxicity: Failure rate of 68%. When prompted, the model generated responses with toxic or harmful language, indicating poor safeguards.
  • Hallucinations: Failure rate of 81%. DeepSeek-R1 produced factually incorrect or fabricated information at a high frequency.

You can read the research here.

Aptum Welcomes Jaime Konzelman as Chief Revenue Officer

Posted in Commentary with tags on February 11, 2025 by itnerd

Aptum, a hybrid cloud, infrastructure, networking and managed services provider, today announced the appointment of Jaime Konzelman as Chief Revenue Officer. In this role, she will lead Aptum’s go-to-market strategy, overseeing sales, partnerships, and marketing to help customers make the most of their cloud investment. 

Konzelman brings more than two decades of experience with Fortune 500 and 1000 companies across industries including entertainment, hospitality, and IT managed services. Her expertise in selling complex IT services, leading high-performing teams, and empowering people aligns with Aptum’s mission to simplify IT complexities and unlock tech freedom for its customers. 

Konzelman was most recently Vice President and General Manager, Americas Sales at Rackspace Technologies. She began her career with the Walt Disney Corporation and has held leadership roles at Unisys, Atos, Xerox, Acxiom and MGM Resorts. As a dealmaker at Atos, she secured more than US$3 billion in IT services contracts, earning multiple accolades, including ISG’s Sales Leader of the Year and Atos’ President’s Club recognition.

A bestselling author, Harvard-trained leadership facilitator, motivational speaker, and executive coach, Konzelman has developed proprietary training programs to help teams and individuals achieve outstanding results. She holds a B.S. in Business Management from the University of Massachusetts and an A.A.S. in Business Administration from the Borough of Manhattan Community College. A passionate triathlete, she also serves on the board of Rockin Runners in Las Vegas. 

EnGenius Technologies Announces Zoom Certification for Extreme-Range Phone System

Posted in Commentary with tags on February 11, 2025 by itnerd

EnGenius Technologies has successfully obtained certification for their extreme-range phone system, DuraFon ROAM, from Zoom Communications, Inc., a renowned innovator in seamless collaboration technologies. Together, these solutions are enhancing connectivity by aligning EnGenius’s powerful DuraFon Roam system with Zoom’s robust communication platform. This will unlock new possibilities for customers to maintain crystal-clear communication across vast and challenging operational spaces.

Revolutionizing Long-Range Connectivity

EnGenius’s DuraFon ROAM is a breakthrough product delivering unparalleled coverage for voice communications. Offering up to 200,000 sq. ft. in resorts and assisted living facilities, 1,000,000 sq. ft. in warehouses and fulfillment centers, and an impressive 4.7 square miles in expansive outdoor venues and agricultural sites, DuraFon ROAM ensures robust and reliable connectivity. This long-range solution now works seamlessly with Zoom Workplace, enabling users to leverage Zoom’s capabilities even in the most remote and challenging environments.

Expanding the Reach of Collaboration

This solution benefits a wide range of industries by combining EnGenius’s industry-leading hardware with Zoom’s dynamic communication platform. Key advantages include:

  • Enhanced Collaboration: Enable seamless voice communication through Zoom in vast or complex areas where traditional systems might not reach.
  • Industry Versatility: Tailored for resorts, assisted living, warehouses, fulfillment centers, outdoor venues, and agricultural facilities, this solution extends the utility of Zoom to new operational domains.
  • Unparalleled Range: Leverage DuraFon Roam’s extended coverage to expand the communication footprint without sacrificing reliability.

Future-Proofing Communication Solutions

EnGenius demonstrates its dedication to innovation and adaptability by meeting industry demands for flexible and scalable communication solutions. By combining the capabilities of DuraFon Roam with Zoom, businesses can overcome connectivity challenges and ensure seamless communication across all areas of their operations.

Availability

The solution is now available to customers worldwide, offering a reliable and comprehensive system for organizations aiming to expand their reach and improve their communication capabilities. Customers are encouraged to contact EnGenius Technologies for more information.