What's Your IT Question?

Want to know more about this topic or about us? Contact us!

All posts in International

9 out of 10 UK Business Leaders Suffer From Tech Anxiety That Disrupts Their Sleep, BT Study Finds

While rapid digital transformations can result in many business benefits, a new study has revealed that they also take a toll on mental health. Nearly nine out of 10 U.K. business leaders say they suffer from tech-related stress that’s severe enough to disrupt their sleep. BT commissioned a survey of . . . Read more

What Is Single Touch Payroll (STP) and How It Works?

Single touch payroll is a payroll initiative from the Australian government. With single touch payroll, companies report employees’ payroll information directly to the government each time they run payroll. Read on to discover how single touch payroll works and what the benefits are. 3 QuickBooks Company Size Employees per Company . . . Read more

Black Basta Ransomware Struck More Than 500 Organizations Worldwide

A joint cybersecurity advisory from the Federal Bureau of Investigation, Cybersecurity and Infrastructure Security Agency, Department of Health and Human services and Multi-State Information Sharing and Analysis Center was recently released to provide more information about the Black Basta ransomware. Black Basta affiliates have targeted organizations in the U.S., Canada, . . . Read more

U.K.’s AI Safety Institute Launches Open-Source Testing Platform

The U.K.’s AI Safety Institute has released a free, open-source testing platform that evaluates the safety of new AI models. Dubbed Inspect, the toolset should provide a “consistent approach” towards the creation of secure AI applications around the world. Inspect is the first AI safety testing platform created by a . . . Read more

Cisco’s Splunk Acquisition Should Help Security Pros See Threats Sooner in Australia and New Zealand

Cisco announced in 2023 it would acquire Splunk for US $28 billion (AU $42.4 billion). Described as “the Moby Dick” of deals, it aimed to combine Cisco’s extended detection and response systems with Splunk’s security information and event management tech. Because of both Splunk and Cisco’s existing customer bases in . . . Read more

Google Search’s AI Summaries Are Generally Available This Week

AI Overviews, the next evolution of Search Generative Experience, will roll out in the U.S. this week and in more countries soon, Google announced at the Shoreline Amphitheater in Mountain View, CA. Google showed several other changes coming to Google Cloud, Gemini, Workspace and more, including AI actions and summarization . . . Read more

TIOBE Index News (May 2024): Why is Fortran Popular Again?

Fortran was in the top 10 of the TIOBE Programming Community Index in April and May, prompting a question from the TIOBE community. Why is this programming language, created in 1957, popular again in 2024? Otherwise, there hasn’t been much movement in the top 10 rankings compared to last month. . . . Read more

OpenAI Spring Update: Next Flagship Model Is the ‘Natively Multimodal’ GPT-4o

OpenAI’s Spring Update on May 13 brought three major announcements from the AI company: A new flagship AI model called GPT-4o. A desktop ChatGPT app for macOS. ChatGPT users who don’t pay for a subscription can now access more features for free. The coming changes to ChatGPT “brings GPT-4 level . . . Read more

Report: Organisations Have Endpoint Security Tools But Are Still Falling Short on the Basics

Most IT and security teams would agree that ensuring endpoint security and network access security applications are running in compliance with security policies on managed PCs should be a basic task. Even more basic would be ensuring these applications are present on devices. And yet, many organisations still fail to . . . Read more

How Can Businesses Defend Themselves Against Common Cyberthreats?

Today, all businesses are at risk of cyberattack, and that risk is constantly growing. Digital transformations are resulting in more sensitive and valuable data being moved onto online systems capable of exploitation, thus increasing the profitability of a successful breach. Furthermore, launching a cyberattack is becoming more accessible. Exploit kits . . . Read more