Only 3 of 24 leading cryptocurrency exchanges earn an A for their cybersecurity 

Posted in Commentary with tags on December 15, 2025 by itnerd

Business Digital Index has released a research report in which our team analyzed the external cybersecurity posture of 24 leading cryptocurrency exchanges.

Some of the key findings include:

  • Only 3 of the 24 analyzed cryptocurrency exchanges earned an A grade for cybersecurity.
     
  • The top-rated exchanges — Biconomy, Toobit, and Deepcoin — exhibited almost no externally visible security weaknesses and (almost) no evidence of corporate credentials circulating on the dark web.
  •  Password reuse remains widespread, as 63% of exchanges were found to have employees who have reused their passwords across multiple services in the past.
  •  Coinbase ranked second-to-last in the analysis, with 24 unpatched vulnerabilities identified in its externally-facing systems, alongside thousands of exposed corporate credentials and numerous SSL/TLS configuration issues.
  •  LBank was flagged for particularly poor security, with 11 critical vulnerabilities left unpatched.

The full report, which includes cybersecurity scores for each analyzed cryptocurrency exchange and more, is available here:

https://businessdigitalindex.com/research/only-3-of-24-leading-cryptocurrency-exchanges-earn-an-a-for-their-cybersecurity/ 

Strada Receives Strategic Investment from OWC

Posted in Commentary with tags on December 15, 2025 by itnerd

Strada, the media collaboration start-up co-founded by brothers Michael Cioni & Peter Cioni, today announced a significant investment from Other World Computing (OWC). This investment marks a key milestone in Strada’s current fundraising program, further accelerating the Company’s product roadmap.

Strada’s peer-to-peer collaboration platform enables video content professionals to access, share, and review large video files stored on local drives anywhere in the world without needing to upload anything to the cloud. OWC provides innovative, high performance technology solutions that empower creative professionals to achieve their creative and business goals. OWC aims to create a world where technology enables imagination, offering tools from capture to collaboration to completion with minimal environmental impact.

Over the coming months, OWC and Strada will commence co-marketing initiatives, including events and social media collaboration, and will extend special incentives to customers who purchase packages of OWC and Strada products. In addition, both companies will share a booth at NAB 2026.

2026 Tech Predictions from Richard Copeland, CEO Leaseweb USA

Posted in Commentary with tags on December 13, 2025 by itnerd

I have three 2026 Predictions from Richard Copeland who is the CEO of Leaseweb USA. They are as follows:

Prediction 1: Trusted Execution Environment Technology Will Reshape Distributed Compute and Multi-Cloud Architecture

“In 2026, Trusted Execution Environment (TEE) technologies will finally move from ‘interesting concept’ to real-world game changer. We’re going to see organizations secure memory and hardware in a way that simply wasn’t practical before, which opens the door for decentralized compute in a very big way. Companies will be able to safely split compute across multiple clouds, regional providers, and even on-prem environments, instead of keeping all their workloads under one hyperscaler’s roof. This will bring a level of flexibility and resilience that hasn’t been possible until now.

What is interesting to note here is that the shift isn’t driven by budgets or hype, but by behavior. When you can secure workloads at the hardware level, you’re suddenly free to architect systems around business needs instead of who owns the data center. It unlocks more creative architectures for blockchain, AI, and high-performance computing, and gives organizations confidence that they can spread their risk without compromising security.”

Prediction 2: AI Becomes Truly Agentic – Replacing Tasks, Not People – and Drives a New Phase of Cloud Repatriation

“AI is no longer just a tool for optimization. In 2026, agentic AI starts replacing full workflows, and that shift will separate companies that understand how to use AI from those that fight it. The real impact isn’t that AI replaces jobs, but that it replaces the tasks people shouldn’t be doing in the first place – the repetitive, time-sucking operations that drain teams. Organizations that lean into agentic AI will run faster, make decisions earlier, and redirect people into work that actually moves the business. 

As AI becomes more embedded in day-to-day operations, more companies will realize that complexity and cost are pushing them away from the hyperscalers. They’re seeing outages, noisy-neighbor issues, unpredictable billing, and environments so complex that one failure cascades through the whole stack. AI workloads, especially GPU-heavy ones, run better, and more cost-effectively, when the infrastructure is simpler, more transparent, and built for their exact workloads. That’s why 2026 will be a major year for cloud repatriation back to regional providers and bare-metal platforms built for performance.”

Prediction 3: GPU Optimization and AI-Driven Attacks Will Push Companies Toward Regional Cloud Providers for Security and Stability

“GPU optimization becomes a headline topic in 2026. Today, most companies only use about 60 percent of the GPU power for which they are paying. Next-gen optimization software is going to flip that on its head, giving organizations the ability to squeeze full value out of their infrastructure. That matters not just for cost control, but for AI reliability. When your model performance becomes a competitive advantage, you can’t afford wasted compute, unpredictable throttling, or hardware carved into fractional units you can’t see. This is where optimized IaaS and regional GPU clouds start to shine. 

At the same time, attackers are getting smarter, and they’re starting to use AI too. The largest, most complex cloud environments become the biggest targets – when bad actors can spin up their own LLMs. Hyperscalers have hundreds of thousands of tenants, which means hundreds of thousands of potential attack surfaces (and pockets to pick). Regional providers have tighter vetting, cleaner environments, and fewer noisy neighbors. In 2026, security-conscious organizations will realize that the safest place to run AI and high-value workloads often isn’t the biggest cloud, it’s the one that actually keeps out the wrong people.”

LastPass Smacked Down In The UK For Being Pwned

Posted in Commentary with tags , on December 12, 2025 by itnerd

The UK ICO has fined LastPass £1.2 million following a 2022 breach that exposed personal data and encrypted password vaults belonging to up to 1.6 million UK users. Regulators found the incident stemmed from a chain of failures, beginning with the compromise of an employee’s personal device and escalating through reused credentials, third-party software vulnerabilities, and stolen cloud access keys. While LastPass’ zero-knowledge encryption remained intact, attackers were able to exfiltrate encrypted vaults and sensitive metadata, highlighting how human and personal-device risks can undermine even well-designed security architectures. The ruling reinforces regulators’ growing focus on executive access, remote work exposure, and the need to secure the human attack surface.

If you want to know more, this will help: UK fines LastPass over 2022 data breach impacting 1.6 million users

Chris Pierson, CEO, BlackCloak had this to say:

     “This case is a clear reminder that today’s most damaging breaches often begin far outside traditional enterprise controls. Attackers did not defeat encryption or zero-knowledge architecture head-on; they targeted a trusted individual, exploited a personal device, and patiently chained together small gaps until they reached high-value access. For executives and privileged users, personal and professional digital lives are inseparable, and adversaries know it. Controls within the enterprise remain critical, but they must be paired with the continuous protection of personal devices, privacy enhancements, and home network protection. Organizations that fail to secure the digital attack surface for key persons and executives in their personal lives are effectively leaving the back door open to attacks.”

The LastPass incidents (as they’ve been pwned multiple times) illustrate how important it is for organizations to close the holes that lead to this sort of thing happening. And if organizations won’t do this by default, then they need to be punished until they get the message.

Intel Serves Up An Extra Special Promotion As Part Of Their Holiday Bundle

Posted in Commentary with tags on December 12, 2025 by itnerd

This year, Intel’s Holiday Bundle promotion gives anyone who purchases a qualifying Intel-powered gaming laptop a complimentary AAA game title from 2025. Recipients get to pick one of four major titles that have each made big waves this year: the adrenaline-charged Battlefield™ 6, the zombie-packed thrill ride Dying Light: The Beast, the sweeping adventure Assassin’s Creed® Shadows, or the iconic strategy sequel Sid Meier’s Civilization® VII

With the gift of Intel’s Holiday Gaming bundle, Canadians can unwrap a powerful new laptop built for gaming and creativity alongside a blockbuster game that keeps the fun going long after the holidays. 

 You can explore the full promotion here. And if you want to see what Intel has on offer, have a look here.

CData Recognized for Second Consecutive Year in the 2025 Gartner Magic Quadrant™ for Data Integration Tools

Posted in Commentary with tags on December 12, 2025 by itnerd

 CData Software today announced that it has been recognized in the 2025 Gartner® Magic Quadrant™ for Data Integration Tools. This marks the second consecutive year that CData has been included in the report.

The company’s unified platform delivers real-time access, semantic intelligence, and comprehensive governance across diverse data sources, empowering organizations to activate their complete data landscape for use in AI, and analytics. Guided by its vision to make data more accessible and actionable for both humans and AI, CData continues to advance innovation in data integration. Ongoing investments in AI integration are focused on addressing one of today’s most critical enterprise challenges: connecting fragmented data to AI systems to enable conversational analytics and agentic platforms.

CData continues to gain industry recognition for its innovation and momentum in data integration and connectivity. Based on real customer reviews, CData positioned again in the Strong Performers quadrant in the 2025 Gartner Peer Insights™. Other recent honors include 2025 Inc. 5000 list, the Accel 2025 Globalscape Top 100 report, The Software Report’s Top 25 Data Management and Analytics Companies of 2025, and the DBTA 100 2025: The Companies That Matter Most in Data.

Access a complimentary copy of the full report here: https://www.cdata.com/lp/gartner-magic-quadrant-data-integration-2025/

Samsung Galaxy Z Fold7 Gains Nano Banana & VEO3 AI Integration

Posted in Commentary with tags on December 12, 2025 by itnerd

Samsung’s Galaxy Z Fold7 recently unlocked a major upgrade: seamless integration of Nano Banana and VEO3 AI features. The addition of these features brings an entirely new level of intelligence, personalization, and creative capability to the foldable experience.

With this collaboration, users get:

  • Video generation from text or images with VEO3
  • New generative features that let users create, edit, and transform content with Nano Banana
  • Smarter, faster on-device assistance with Google Gemini optimized for the Z Fold7’s dual-screen workflow.

Together, these features turn the Galaxy Z Fold7 into an ideal tool for content creators, multi-taskers and creatives alike.

2026 Industry Predictions from The Head of Information Security at Exclaimer 

Posted in Commentary with tags on December 12, 2025 by itnerd

Here’s some 2026 industry predictions from Karl Bagci, Head of Information Security at email signature management software provider, Exclaimer for your review. 

1. The major 2026 security shift most organizations aren’t prepared for

The biggest unacknowledged shift heading into 2026 is that the authentication layer is no longer the perimeter. Attackers aren’t breaking in, they’re logging in. Session hijacking, token theft, infostealer malware harvesting credentials at scale. Most organizations still treat successful authentication as proof of legitimacy. In 2026, that assumption will cost them. Continuous verification throughout a session, not just at login, is where we need to be and almost nobody’s there yet.

2. Where the shared responsibility model will fail next

The next fault line in the already strained shared-responsibility model will arise from AI features embedded in SaaS. Every vendor is bolting on AI capabilities, often using third-party models and often processing customer data in ways that aren’t transparent. The shared responsibility model assumes clear boundaries. AI blurs them completely. When your CRM’s AI assistant summarizes confidential deal notes and that data trains a model or leaks across tenants, whose responsibility is that? The contracts will say yours. The reality is you had no visibility or control.

3. How attacker behavior will escalate in 2026

The next evolution in attacker strategy will be AI-powered social engineering at scale. Today’s business email compromise (BEC) is still largely manual. Tomorrow’s is automated and personalized. AI scrapes LinkedIn, correlates with breached data, and generates contextually relevant messages for thousands of targets at once. Each one referencing real projects, real colleagues, real details. Attack quality goes up. Volume goes up. Current defenses are calibrated for neither.

4. Why compliance will have to extend beyond email

A major compliance shift is coming for regulated industries as regulators begin questioning why email is compliant, but other business channels are not. Organizations spent years building email retention, disclaimers, legal holds, and audit trails, then moved half their communication to Teams and Slack with none of that infrastructure. Financial services, legal, and healthcare all have strict requirements around communication records. The regulatory expectation is forming and extending compliance controls across all digital communication channels is no longer optional. I believe enforcement will follow.

TELUS partners with AMC-FNFAO and Ka Ni Kanichihk to bring essential connectivity to Indigenous women at risk in Manitoba

Posted in Commentary with tags on December 11, 2025 by itnerd

Today, TELUS announced the launch of its Mobility for Good for Indigenous Women at Risk program in Manitoba, in partnership with Assembly of Manitoba Chiefs – First Nations Family Advocate Office (AMC-FNFAO) and Ka Ni Kanichihk, providing wireless services to Indigenous women that may be at risk of or experiencing violence across the province. This partnership against gender-based violence aims to empower First Nations, Métis and Inuit women through access to free phones and wireless plans, helping them stay connected to their support networks, resources and emergency services. While First Nations, Métis and Inuit women and girls comprise only four per cent of the total female population in Canada, they represent 24 per cent of female homicide victims. According to the Native Women’s Association of Canada (NWAC), Manitoba has the third highest number of female homicides in Canada.

Developed in partnership with Indigenous-led organizations, Mobility for Good for Indigenous Women at Risk provides free smartphones and talk, text and data plans to Indigenous women, girls or gender diverse people, serving as a critical lifeline to Indigenous-led services and wellness resources. TELUS is proud to partner with the AMC-FNFAO and Ka Ni Kanichihk to expand this important program to Manitoba, furthering our commitment to serving at-risk Indigenous women and girls. 

AMC-FNFAO and Ka Ni Kanichihk have begun distributing smartphones and plans from TELUS to support Indigenous women in Manitoba who are at risk of or surviving violence. Since TELUS launched the program in 2021, more than 6,000 individuals have been supported through 39 partner organizations.  This program reflects TELUS’ longstanding commitment to strengthening relationships with Indigenous Peoples, including First Nations, Métis, and Inuit communities, acknowledging that our work spans many Traditional Territories and Treaty areas.

TELUS Mobility for Good for Indigenous Women at Risk is part of the TELUS Connecting for Good portfolio of programs that gives low-income seniors and families, youth aging out of care, and other individuals in need in Canada access to TELUS’ world-leading technology. To date, TELUS’ Connecting for Good and TELUS Wise programs have supported 1.5 million individuals. 

For more information on TELUS’ Reconciliation commitment, please visit telus.com/reconciliation.

Microsoft bounty program now includes any flaw impacting its services

Posted in Commentary with tags on December 11, 2025 by itnerd

 Microsoft today announced that it is expanding its bug bounty program to now include any flaw impacting its services, regardless of whether the code was written by Microsoft or not:

In an AI and cloud-first world, threat actors don’t limit themselves to specific products or services. They don’t care who owns the code they try to exploit. The same approach should apply to the security community who continue to partner with us to provide critical insights that help protect our customers.  

Security vulnerabilities often emerge at the seams where components interact or where dependencies are involved. We value research that takes this broader perspective, encompassing not only Microsoft infrastructure but also third-party dependencies, including commercial software and open-source components. 

Starting today, if a critical vulnerability has a direct and demonstrable impact to our online services, it’s eligible for a bounty award. Regardless of whether the code is owned and managed by Microsoft, a third-party, or is open source, we will do whatever it takes to remediate the issue. Our goal is to incentivize research on the highest risk areas, especially the areas that threat actors are most likely to exploit.  Where no bounty programs exists, we will recognize and award the diverse insights of the security research community wherever their expertise takes them. This includes domains and corporate infrastructure that are owned and managed by Microsoft.  

We call this approach In Scope by Default. It gives clarity to researchers and ensures that we incentivize responsible research wherever our customers may be impacted. Historically, our bounty program has had a defined scope for each eligible product or service. Our new approach expands the program to include all online services by default. It also means new services will be in scope as soon as they are released. 

 Martin Jartelius, AI Product Director at Outpost24 had this to say:

“For organizations that rely on bug bounty programs to keep themselves and their customers secure, this is an important step, as it focuses on the full attack surface of an organization. A very common mistake in security is the careless use of scope, or rather de-scoping, of what is included. As Mr. Gallagher notes, attackers do not care whether they gain access through ReactToShell or a novel vulnerability in Microsoft components. Microsoft will likely find itself paying out more bounties for a while, but the resulting security improvements will ultimately be a cost-efficient way to strengthen the organization’s overall security posture.”

This is a very good move by Microsoft as supply chain attacks are far more pervasive than they should be. Hopefully other vendors do something similar as this will make us all safer.