• Over 8M patient records leaked in healthcare data breach

    Published
    June 15, 2025 10:00am EDT close IPhone users instructed to take immediate action to avoid data breach: 'Urgent threat' Kurt 'The CyberGuy' Knutsson discusses Elon Musk's possible priorities as he exits his role with the White House and explains the urgent warning for iPhone users to update devices after a 'massive security gap.' NEWYou can now listen to Fox News articles!
    In the past decade, healthcare data has become one of the most sought-after targets in cybercrime. From insurers to clinics, every player in the ecosystem handles some form of sensitive information. However, breaches do not always originate from hospitals or health apps. Increasingly, patient data is managed by third-party vendors offering digital services such as scheduling, billing and marketing. One such breach at a digital marketing agency serving dental practices recently exposed approximately 2.7 million patient profiles and more than 8.8 million appointment records.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join. Illustration of a hacker at work  Massive healthcare data leak exposes millions: What you need to knowCybernews researchers have discovered a misconfigured MongoDB database exposing 2.7 million patient profiles and 8.8 million appointment records. The database was publicly accessible online, unprotected by passwords or authentication protocols. Anyone with basic knowledge of database scanning tools could have accessed it.The exposed data included names, birthdates, addresses, emails, phone numbers, gender, chart IDs, language preferences and billing classifications. Appointment records also contained metadata such as timestamps and institutional identifiers.MASSIVE DATA BREACH EXPOSES 184 MILLION PASSWORDS AND LOGINSClues within the data structure point toward Gargle, a Utah-based company that builds websites and offers marketing tools for dental practices. While not a confirmed source, several internal references and system details suggest a strong connection. Gargle provides appointment scheduling, form submission and patient communication services. These functions require access to patient information, making the firm a likely link in the exposure.After the issue was reported, the database was secured. The duration of the exposure remains unknown, and there is no public evidence indicating whether the data was downloaded by malicious actors before being locked down.We reached out to Gargle for a comment but did not hear back before our deadline. A healthcare professional viewing heath data     How healthcare data breaches lead to identity theft and insurance fraudThe exposed data presents a broad risk profile. On its own, a phone number or billing record might seem limited in scope. Combined, however, the dataset forms a complete profile that could be exploited for identity theft, insurance fraud and targeted phishing campaigns.Medical identity theft allows attackers to impersonate patients and access services under a false identity. Victims often remain unaware until significant damage is done, ranging from incorrect medical records to unpaid bills in their names. The leak also opens the door to insurance fraud, with actors using institutional references and chart data to submit false claims.This type of breach raises questions about compliance with the Health Insurance Portability and Accountability Act, which mandates strong security protections for entities handling patient data. Although Gargle is not a healthcare provider, its access to patient-facing infrastructure could place it under the scope of that regulation as a business associate. A healthcare professional working on a laptop  5 ways you can stay safe from healthcare data breachesIf your information was part of the healthcare breach or any similar one, it’s worth taking a few steps to protect yourself.1. Consider identity theft protection services: Since the healthcare data breach exposed personal and financial information, it’s crucial to stay proactive against identity theft. Identity theft protection services offer continuous monitoring of your credit reports, Social Security number and even the dark web to detect if your information is being misused. These services send you real-time alerts about suspicious activity, such as new credit inquiries or attempts to open accounts in your name, helping you act quickly before serious damage occurs. Beyond monitoring, many identity theft protection companies provide dedicated recovery specialists who assist you in resolving fraud issues, disputing unauthorized charges and restoring your identity if it’s compromised. See my tips and best picks on how to protect yourself from identity theft.2. Use personal data removal services: The healthcare data breach leaks loads of information about you, and all this could end up in the public domain, which essentially gives anyone an opportunity to scam you.  One proactive step is to consider personal data removal services, which specialize in continuously monitoring and removing your information from various online databases and websites. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here. GET FOX BUSINESS ON THE GO BY CLICKING HEREGet a free scan to find out if your personal information is already out on the web3. Have strong antivirus software: Hackers have people’s email addresses and full names, which makes it easy for them to send you a phishing link that installs malware and steals all your data. These messages are socially engineered to catch them, and catching them is nearly impossible if you’re not careful. However, you’re not without defenses.The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.4. Enable two-factor authentication: While passwords weren’t part of the data breach, you still need to enable two-factor authentication. It gives you an extra layer of security on all your important accounts, including email, banking and social media. 2FA requires you to provide a second piece of information, such as a code sent to your phone, in addition to your password when logging in. This makes it significantly harder for hackers to access your accounts, even if they have your password. Enabling 2FA can greatly reduce the risk of unauthorized access and protect your sensitive data.5. Be wary of mailbox communications: Bad actors may also try to scam you through snail mail. The data leak gives them access to your address. They may impersonate people or brands you know and use themes that require urgent attention, such as missed deliveries, account suspensions and security alerts. Kurt’s key takeawayIf nothing else, this latest leak shows just how poorly patient data is being handled today. More and more, non-medical vendors are getting access to sensitive information without facing the same rules or oversight as hospitals and clinics. These third-party services are now a regular part of how patients book appointments, pay bills or fill out forms. But when something goes wrong, the fallout is just as serious. Even though the database was taken offline, the bigger problem hasn't gone away. Your data is only as safe as the least careful company that gets access to it.CLICK HERE TO GET THE FOX NEWS APPDo you think healthcare companies are investing enough in their cybersecurity infrastructure? Let us know by writing us at Cyberguy.com/ContactFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/NewsletterAsk Kurt a question or let us know what stories you'd like us to coverFollow Kurt on his social channelsAnswers to the most asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com.  All rights reserved.   Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    #over #patient #records #leaked #healthcare
    Over 8M patient records leaked in healthcare data breach
    Published June 15, 2025 10:00am EDT close IPhone users instructed to take immediate action to avoid data breach: 'Urgent threat' Kurt 'The CyberGuy' Knutsson discusses Elon Musk's possible priorities as he exits his role with the White House and explains the urgent warning for iPhone users to update devices after a 'massive security gap.' NEWYou can now listen to Fox News articles! In the past decade, healthcare data has become one of the most sought-after targets in cybercrime. From insurers to clinics, every player in the ecosystem handles some form of sensitive information. However, breaches do not always originate from hospitals or health apps. Increasingly, patient data is managed by third-party vendors offering digital services such as scheduling, billing and marketing. One such breach at a digital marketing agency serving dental practices recently exposed approximately 2.7 million patient profiles and more than 8.8 million appointment records.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join. Illustration of a hacker at work  Massive healthcare data leak exposes millions: What you need to knowCybernews researchers have discovered a misconfigured MongoDB database exposing 2.7 million patient profiles and 8.8 million appointment records. The database was publicly accessible online, unprotected by passwords or authentication protocols. Anyone with basic knowledge of database scanning tools could have accessed it.The exposed data included names, birthdates, addresses, emails, phone numbers, gender, chart IDs, language preferences and billing classifications. Appointment records also contained metadata such as timestamps and institutional identifiers.MASSIVE DATA BREACH EXPOSES 184 MILLION PASSWORDS AND LOGINSClues within the data structure point toward Gargle, a Utah-based company that builds websites and offers marketing tools for dental practices. While not a confirmed source, several internal references and system details suggest a strong connection. Gargle provides appointment scheduling, form submission and patient communication services. These functions require access to patient information, making the firm a likely link in the exposure.After the issue was reported, the database was secured. The duration of the exposure remains unknown, and there is no public evidence indicating whether the data was downloaded by malicious actors before being locked down.We reached out to Gargle for a comment but did not hear back before our deadline. A healthcare professional viewing heath data     How healthcare data breaches lead to identity theft and insurance fraudThe exposed data presents a broad risk profile. On its own, a phone number or billing record might seem limited in scope. Combined, however, the dataset forms a complete profile that could be exploited for identity theft, insurance fraud and targeted phishing campaigns.Medical identity theft allows attackers to impersonate patients and access services under a false identity. Victims often remain unaware until significant damage is done, ranging from incorrect medical records to unpaid bills in their names. The leak also opens the door to insurance fraud, with actors using institutional references and chart data to submit false claims.This type of breach raises questions about compliance with the Health Insurance Portability and Accountability Act, which mandates strong security protections for entities handling patient data. Although Gargle is not a healthcare provider, its access to patient-facing infrastructure could place it under the scope of that regulation as a business associate. A healthcare professional working on a laptop  5 ways you can stay safe from healthcare data breachesIf your information was part of the healthcare breach or any similar one, it’s worth taking a few steps to protect yourself.1. Consider identity theft protection services: Since the healthcare data breach exposed personal and financial information, it’s crucial to stay proactive against identity theft. Identity theft protection services offer continuous monitoring of your credit reports, Social Security number and even the dark web to detect if your information is being misused. These services send you real-time alerts about suspicious activity, such as new credit inquiries or attempts to open accounts in your name, helping you act quickly before serious damage occurs. Beyond monitoring, many identity theft protection companies provide dedicated recovery specialists who assist you in resolving fraud issues, disputing unauthorized charges and restoring your identity if it’s compromised. See my tips and best picks on how to protect yourself from identity theft.2. Use personal data removal services: The healthcare data breach leaks loads of information about you, and all this could end up in the public domain, which essentially gives anyone an opportunity to scam you.  One proactive step is to consider personal data removal services, which specialize in continuously monitoring and removing your information from various online databases and websites. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here. GET FOX BUSINESS ON THE GO BY CLICKING HEREGet a free scan to find out if your personal information is already out on the web3. Have strong antivirus software: Hackers have people’s email addresses and full names, which makes it easy for them to send you a phishing link that installs malware and steals all your data. These messages are socially engineered to catch them, and catching them is nearly impossible if you’re not careful. However, you’re not without defenses.The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.4. Enable two-factor authentication: While passwords weren’t part of the data breach, you still need to enable two-factor authentication. It gives you an extra layer of security on all your important accounts, including email, banking and social media. 2FA requires you to provide a second piece of information, such as a code sent to your phone, in addition to your password when logging in. This makes it significantly harder for hackers to access your accounts, even if they have your password. Enabling 2FA can greatly reduce the risk of unauthorized access and protect your sensitive data.5. Be wary of mailbox communications: Bad actors may also try to scam you through snail mail. The data leak gives them access to your address. They may impersonate people or brands you know and use themes that require urgent attention, such as missed deliveries, account suspensions and security alerts. Kurt’s key takeawayIf nothing else, this latest leak shows just how poorly patient data is being handled today. More and more, non-medical vendors are getting access to sensitive information without facing the same rules or oversight as hospitals and clinics. These third-party services are now a regular part of how patients book appointments, pay bills or fill out forms. But when something goes wrong, the fallout is just as serious. Even though the database was taken offline, the bigger problem hasn't gone away. Your data is only as safe as the least careful company that gets access to it.CLICK HERE TO GET THE FOX NEWS APPDo you think healthcare companies are investing enough in their cybersecurity infrastructure? Let us know by writing us at Cyberguy.com/ContactFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/NewsletterAsk Kurt a question or let us know what stories you'd like us to coverFollow Kurt on his social channelsAnswers to the most asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com.  All rights reserved.   Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com. #over #patient #records #leaked #healthcare
    WWW.FOXNEWS.COM
    Over 8M patient records leaked in healthcare data breach
    Published June 15, 2025 10:00am EDT close IPhone users instructed to take immediate action to avoid data breach: 'Urgent threat' Kurt 'The CyberGuy' Knutsson discusses Elon Musk's possible priorities as he exits his role with the White House and explains the urgent warning for iPhone users to update devices after a 'massive security gap.' NEWYou can now listen to Fox News articles! In the past decade, healthcare data has become one of the most sought-after targets in cybercrime. From insurers to clinics, every player in the ecosystem handles some form of sensitive information. However, breaches do not always originate from hospitals or health apps. Increasingly, patient data is managed by third-party vendors offering digital services such as scheduling, billing and marketing. One such breach at a digital marketing agency serving dental practices recently exposed approximately 2.7 million patient profiles and more than 8.8 million appointment records.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join. Illustration of a hacker at work   (Kurt "CyberGuy" Knutsson)Massive healthcare data leak exposes millions: What you need to knowCybernews researchers have discovered a misconfigured MongoDB database exposing 2.7 million patient profiles and 8.8 million appointment records. The database was publicly accessible online, unprotected by passwords or authentication protocols. Anyone with basic knowledge of database scanning tools could have accessed it.The exposed data included names, birthdates, addresses, emails, phone numbers, gender, chart IDs, language preferences and billing classifications. Appointment records also contained metadata such as timestamps and institutional identifiers.MASSIVE DATA BREACH EXPOSES 184 MILLION PASSWORDS AND LOGINSClues within the data structure point toward Gargle, a Utah-based company that builds websites and offers marketing tools for dental practices. While not a confirmed source, several internal references and system details suggest a strong connection. Gargle provides appointment scheduling, form submission and patient communication services. These functions require access to patient information, making the firm a likely link in the exposure.After the issue was reported, the database was secured. The duration of the exposure remains unknown, and there is no public evidence indicating whether the data was downloaded by malicious actors before being locked down.We reached out to Gargle for a comment but did not hear back before our deadline. A healthcare professional viewing heath data      (Kurt "CyberGuy" Knutsson)How healthcare data breaches lead to identity theft and insurance fraudThe exposed data presents a broad risk profile. On its own, a phone number or billing record might seem limited in scope. Combined, however, the dataset forms a complete profile that could be exploited for identity theft, insurance fraud and targeted phishing campaigns.Medical identity theft allows attackers to impersonate patients and access services under a false identity. Victims often remain unaware until significant damage is done, ranging from incorrect medical records to unpaid bills in their names. The leak also opens the door to insurance fraud, with actors using institutional references and chart data to submit false claims.This type of breach raises questions about compliance with the Health Insurance Portability and Accountability Act, which mandates strong security protections for entities handling patient data. Although Gargle is not a healthcare provider, its access to patient-facing infrastructure could place it under the scope of that regulation as a business associate. A healthcare professional working on a laptop   (Kurt "CyberGuy" Knutsson)5 ways you can stay safe from healthcare data breachesIf your information was part of the healthcare breach or any similar one, it’s worth taking a few steps to protect yourself.1. Consider identity theft protection services: Since the healthcare data breach exposed personal and financial information, it’s crucial to stay proactive against identity theft. Identity theft protection services offer continuous monitoring of your credit reports, Social Security number and even the dark web to detect if your information is being misused. These services send you real-time alerts about suspicious activity, such as new credit inquiries or attempts to open accounts in your name, helping you act quickly before serious damage occurs. Beyond monitoring, many identity theft protection companies provide dedicated recovery specialists who assist you in resolving fraud issues, disputing unauthorized charges and restoring your identity if it’s compromised. See my tips and best picks on how to protect yourself from identity theft.2. Use personal data removal services: The healthcare data breach leaks loads of information about you, and all this could end up in the public domain, which essentially gives anyone an opportunity to scam you.  One proactive step is to consider personal data removal services, which specialize in continuously monitoring and removing your information from various online databases and websites. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here. GET FOX BUSINESS ON THE GO BY CLICKING HEREGet a free scan to find out if your personal information is already out on the web3. Have strong antivirus software: Hackers have people’s email addresses and full names, which makes it easy for them to send you a phishing link that installs malware and steals all your data. These messages are socially engineered to catch them, and catching them is nearly impossible if you’re not careful. However, you’re not without defenses.The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.4. Enable two-factor authentication: While passwords weren’t part of the data breach, you still need to enable two-factor authentication (2FA). It gives you an extra layer of security on all your important accounts, including email, banking and social media. 2FA requires you to provide a second piece of information, such as a code sent to your phone, in addition to your password when logging in. This makes it significantly harder for hackers to access your accounts, even if they have your password. Enabling 2FA can greatly reduce the risk of unauthorized access and protect your sensitive data.5. Be wary of mailbox communications: Bad actors may also try to scam you through snail mail. The data leak gives them access to your address. They may impersonate people or brands you know and use themes that require urgent attention, such as missed deliveries, account suspensions and security alerts. Kurt’s key takeawayIf nothing else, this latest leak shows just how poorly patient data is being handled today. More and more, non-medical vendors are getting access to sensitive information without facing the same rules or oversight as hospitals and clinics. These third-party services are now a regular part of how patients book appointments, pay bills or fill out forms. But when something goes wrong, the fallout is just as serious. Even though the database was taken offline, the bigger problem hasn't gone away. Your data is only as safe as the least careful company that gets access to it.CLICK HERE TO GET THE FOX NEWS APPDo you think healthcare companies are investing enough in their cybersecurity infrastructure? Let us know by writing us at Cyberguy.com/ContactFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/NewsletterAsk Kurt a question or let us know what stories you'd like us to coverFollow Kurt on his social channelsAnswers to the most asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com.  All rights reserved.   Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    Like
    Love
    Wow
    Sad
    Angry
    507
    0 Comentários 0 Compartilhamentos
  • The Role of the 3-2-1 Backup Rule in Cybersecurity

    Daniel Pearson , CEO, KnownHostJune 12, 20253 Min ReadBusiness success concept. Cubes with arrows and target on the top.Cyber incidents are expected to cost the US billion in 2025. According to the latest estimates, this dynamic will continue to rise, reaching approximately 1.82 trillion US dollars in cybercrime costs by 2028. These figures highlight the crucial importance of strong cybersecurity strategies, which businesses must build to reduce the likelihood of risks. As technology evolves at a dramatic pace, businesses are increasingly dependent on utilizing digital infrastructure, exposing themselves to threats such as ransomware, accidental data loss, and corruption.  Despite the 3-2-1 backup rule being invented in 2009, this strategy has stayed relevant for businesses over the years, ensuring that the loss of data is minimized under threat, and will be a crucial method in the upcoming years to prevent major data loss.   What Is the 3-2-1 Backup Rule? The 3-2-1 backup rule is a popular backup strategy that ensures resilience against data loss. The setup consists of keeping your original data and two backups.  The data also needs to be stored in two different locations, such as the cloud or a local drive.  The one in the 3-2-1 backup rule represents storing a copy of your data off site, and this completes the setup.  This setup has been considered a gold standard in IT security, as it minimizes points of failure and increases the chance of successful data recovery in the event of a cyber-attack.  Related:Why Is This Rule Relevant in the Modern Cyber Threat Landscape? Statistics show that in 2024, 80% of companies have seen an increase in the frequency of cloud attacks.  Although many businesses assume that storing data in the cloud is enough, it is certainly not failsafe, and businesses are in bigger danger than ever due to the vast development of technology and AI capabilities attackers can manipulate and use.  As the cloud infrastructure has seen a similar speed of growth, cyber criminals are actively targeting these, leaving businesses with no clear recovery option. Therefore, more than ever, businesses need to invest in immutable backup solutions.  Common Backup Mistakes Businesses Make A common misstep is keeping all backups on the same physical network. If malware gets in, it can quickly spread and encrypt both the primary data and the backups, wiping out everything in one go. Another issue is the lack of offline or air-gapped backups. Many businesses rely entirely on cloud-based or on-premises storage that's always connected, which means their recovery options could be compromised during an attack. Related:Finally, one of the most overlooked yet crucial steps is testing backup restoration. A backup is only useful if it can actually be restored. Too often, companies skip regular testing. This can lead to a harsh reality check when they discover, too late, that their backup data is either corrupted or completely inaccessible after a breach. How to Implement the 3-2-1 Backup Rule? To successfully implement the 3-2-1 backup strategy as part of a robust cybersecurity framework, organizations should start by diversifying their storage methods. A resilient approach typically includes a mix of local storage, cloud-based solutions, and physical media such as external hard drives.  From there, it's essential to incorporate technologies that support write-once, read-many functionalities. This means backups cannot be modified or deleted, even by administrators, providing an extra layer of protection against threats. To further enhance resilience, organizations should make use of automation and AI-driven tools. These technologies can offer real-time monitoring, detect anomalies, and apply predictive analytics to maintain the integrity of backup data and flag any unusual activity or failures in the process. Lastly, it's crucial to ensure your backup strategy aligns with relevant regulatory requirements, such as GDPR in the UK or CCPA in the US. Compliance not only mitigates legal risk but also reinforces your commitment to data protection and operational continuity. Related:By blending the time-tested 3-2-1 rule with modern advances like immutable storage and intelligent monitoring, organizations can build a highly resilient backup architecture that strengthens their overall cybersecurity posture. About the AuthorDaniel Pearson CEO, KnownHostDaniel Pearson is the CEO of KnownHost, a managed web hosting service provider. Pearson also serves as a dedicated board member and supporter of the AlmaLinux OS Foundation, a non-profit organization focused on advancing the AlmaLinux OS -- an open-source operating system derived from RHEL. His passion for technology extends beyond his professional endeavors, as he actively promotes digital literacy and empowerment. Pearson's entrepreneurial drive and extensive industry knowledge have solidified his reputation as a respected figure in the tech community. See more from Daniel Pearson ReportsMore ReportsNever Miss a Beat: Get a snapshot of the issues affecting the IT industry straight to your inbox.SIGN-UPYou May Also Like
    #role #backup #rule #cybersecurity
    The Role of the 3-2-1 Backup Rule in Cybersecurity
    Daniel Pearson , CEO, KnownHostJune 12, 20253 Min ReadBusiness success concept. Cubes with arrows and target on the top.Cyber incidents are expected to cost the US billion in 2025. According to the latest estimates, this dynamic will continue to rise, reaching approximately 1.82 trillion US dollars in cybercrime costs by 2028. These figures highlight the crucial importance of strong cybersecurity strategies, which businesses must build to reduce the likelihood of risks. As technology evolves at a dramatic pace, businesses are increasingly dependent on utilizing digital infrastructure, exposing themselves to threats such as ransomware, accidental data loss, and corruption.  Despite the 3-2-1 backup rule being invented in 2009, this strategy has stayed relevant for businesses over the years, ensuring that the loss of data is minimized under threat, and will be a crucial method in the upcoming years to prevent major data loss.   What Is the 3-2-1 Backup Rule? The 3-2-1 backup rule is a popular backup strategy that ensures resilience against data loss. The setup consists of keeping your original data and two backups.  The data also needs to be stored in two different locations, such as the cloud or a local drive.  The one in the 3-2-1 backup rule represents storing a copy of your data off site, and this completes the setup.  This setup has been considered a gold standard in IT security, as it minimizes points of failure and increases the chance of successful data recovery in the event of a cyber-attack.  Related:Why Is This Rule Relevant in the Modern Cyber Threat Landscape? Statistics show that in 2024, 80% of companies have seen an increase in the frequency of cloud attacks.  Although many businesses assume that storing data in the cloud is enough, it is certainly not failsafe, and businesses are in bigger danger than ever due to the vast development of technology and AI capabilities attackers can manipulate and use.  As the cloud infrastructure has seen a similar speed of growth, cyber criminals are actively targeting these, leaving businesses with no clear recovery option. Therefore, more than ever, businesses need to invest in immutable backup solutions.  Common Backup Mistakes Businesses Make A common misstep is keeping all backups on the same physical network. If malware gets in, it can quickly spread and encrypt both the primary data and the backups, wiping out everything in one go. Another issue is the lack of offline or air-gapped backups. Many businesses rely entirely on cloud-based or on-premises storage that's always connected, which means their recovery options could be compromised during an attack. Related:Finally, one of the most overlooked yet crucial steps is testing backup restoration. A backup is only useful if it can actually be restored. Too often, companies skip regular testing. This can lead to a harsh reality check when they discover, too late, that their backup data is either corrupted or completely inaccessible after a breach. How to Implement the 3-2-1 Backup Rule? To successfully implement the 3-2-1 backup strategy as part of a robust cybersecurity framework, organizations should start by diversifying their storage methods. A resilient approach typically includes a mix of local storage, cloud-based solutions, and physical media such as external hard drives.  From there, it's essential to incorporate technologies that support write-once, read-many functionalities. This means backups cannot be modified or deleted, even by administrators, providing an extra layer of protection against threats. To further enhance resilience, organizations should make use of automation and AI-driven tools. These technologies can offer real-time monitoring, detect anomalies, and apply predictive analytics to maintain the integrity of backup data and flag any unusual activity or failures in the process. Lastly, it's crucial to ensure your backup strategy aligns with relevant regulatory requirements, such as GDPR in the UK or CCPA in the US. Compliance not only mitigates legal risk but also reinforces your commitment to data protection and operational continuity. Related:By blending the time-tested 3-2-1 rule with modern advances like immutable storage and intelligent monitoring, organizations can build a highly resilient backup architecture that strengthens their overall cybersecurity posture. About the AuthorDaniel Pearson CEO, KnownHostDaniel Pearson is the CEO of KnownHost, a managed web hosting service provider. Pearson also serves as a dedicated board member and supporter of the AlmaLinux OS Foundation, a non-profit organization focused on advancing the AlmaLinux OS -- an open-source operating system derived from RHEL. His passion for technology extends beyond his professional endeavors, as he actively promotes digital literacy and empowerment. Pearson's entrepreneurial drive and extensive industry knowledge have solidified his reputation as a respected figure in the tech community. See more from Daniel Pearson ReportsMore ReportsNever Miss a Beat: Get a snapshot of the issues affecting the IT industry straight to your inbox.SIGN-UPYou May Also Like #role #backup #rule #cybersecurity
    WWW.INFORMATIONWEEK.COM
    The Role of the 3-2-1 Backup Rule in Cybersecurity
    Daniel Pearson , CEO, KnownHostJune 12, 20253 Min ReadBusiness success concept. Cubes with arrows and target on the top.Cyber incidents are expected to cost the US $639 billion in 2025. According to the latest estimates, this dynamic will continue to rise, reaching approximately 1.82 trillion US dollars in cybercrime costs by 2028. These figures highlight the crucial importance of strong cybersecurity strategies, which businesses must build to reduce the likelihood of risks. As technology evolves at a dramatic pace, businesses are increasingly dependent on utilizing digital infrastructure, exposing themselves to threats such as ransomware, accidental data loss, and corruption.  Despite the 3-2-1 backup rule being invented in 2009, this strategy has stayed relevant for businesses over the years, ensuring that the loss of data is minimized under threat, and will be a crucial method in the upcoming years to prevent major data loss.   What Is the 3-2-1 Backup Rule? The 3-2-1 backup rule is a popular backup strategy that ensures resilience against data loss. The setup consists of keeping your original data and two backups.  The data also needs to be stored in two different locations, such as the cloud or a local drive.  The one in the 3-2-1 backup rule represents storing a copy of your data off site, and this completes the setup.  This setup has been considered a gold standard in IT security, as it minimizes points of failure and increases the chance of successful data recovery in the event of a cyber-attack.  Related:Why Is This Rule Relevant in the Modern Cyber Threat Landscape? Statistics show that in 2024, 80% of companies have seen an increase in the frequency of cloud attacks.  Although many businesses assume that storing data in the cloud is enough, it is certainly not failsafe, and businesses are in bigger danger than ever due to the vast development of technology and AI capabilities attackers can manipulate and use.  As the cloud infrastructure has seen a similar speed of growth, cyber criminals are actively targeting these, leaving businesses with no clear recovery option. Therefore, more than ever, businesses need to invest in immutable backup solutions.  Common Backup Mistakes Businesses Make A common misstep is keeping all backups on the same physical network. If malware gets in, it can quickly spread and encrypt both the primary data and the backups, wiping out everything in one go. Another issue is the lack of offline or air-gapped backups. Many businesses rely entirely on cloud-based or on-premises storage that's always connected, which means their recovery options could be compromised during an attack. Related:Finally, one of the most overlooked yet crucial steps is testing backup restoration. A backup is only useful if it can actually be restored. Too often, companies skip regular testing. This can lead to a harsh reality check when they discover, too late, that their backup data is either corrupted or completely inaccessible after a breach. How to Implement the 3-2-1 Backup Rule? To successfully implement the 3-2-1 backup strategy as part of a robust cybersecurity framework, organizations should start by diversifying their storage methods. A resilient approach typically includes a mix of local storage, cloud-based solutions, and physical media such as external hard drives.  From there, it's essential to incorporate technologies that support write-once, read-many functionalities. This means backups cannot be modified or deleted, even by administrators, providing an extra layer of protection against threats. To further enhance resilience, organizations should make use of automation and AI-driven tools. These technologies can offer real-time monitoring, detect anomalies, and apply predictive analytics to maintain the integrity of backup data and flag any unusual activity or failures in the process. Lastly, it's crucial to ensure your backup strategy aligns with relevant regulatory requirements, such as GDPR in the UK or CCPA in the US. Compliance not only mitigates legal risk but also reinforces your commitment to data protection and operational continuity. Related:By blending the time-tested 3-2-1 rule with modern advances like immutable storage and intelligent monitoring, organizations can build a highly resilient backup architecture that strengthens their overall cybersecurity posture. About the AuthorDaniel Pearson CEO, KnownHostDaniel Pearson is the CEO of KnownHost, a managed web hosting service provider. Pearson also serves as a dedicated board member and supporter of the AlmaLinux OS Foundation, a non-profit organization focused on advancing the AlmaLinux OS -- an open-source operating system derived from RHEL. His passion for technology extends beyond his professional endeavors, as he actively promotes digital literacy and empowerment. Pearson's entrepreneurial drive and extensive industry knowledge have solidified his reputation as a respected figure in the tech community. See more from Daniel Pearson ReportsMore ReportsNever Miss a Beat: Get a snapshot of the issues affecting the IT industry straight to your inbox.SIGN-UPYou May Also Like
    Like
    Love
    Wow
    Sad
    Angry
    519
    2 Comentários 0 Compartilhamentos
  • Alec Haase Q&A: Customer Engagement Book Interview

    Reading Time: 6 minutes
    What is marketing without data? Assumptions. Guesses. Fluff.
    For Chapter 6 of our book, “The Customer Engagement Book: Adapt or Die,” we spoke with Alec Haase, Product GTM Lead, Commerce and AI at Hightouch, to explore how engagement data can truly inform critical business decisions. 
    Alec discusses the different types of customer behaviors that matter most, how to separate meaningful information from the rest, and the role of systems that learn over time to create tailored customer experiences.
    This interview provides insights into using data for real-time actions and shaping the future of marketing. Prepare to learn about AI decision-making and how a focus on data is changing how we engage with customers.

     
    Alec Haase Q&A Interview
    1. What types of customer engagement data are most valuable for making strategic business decisions?
    It’s a culmination of everything.
    Behavioral signals — the actual conversions and micro-conversions that users take within your product or website.
    Obviously, that’s things like purchases. But there are also other behavioral signals marketers should be using and thinking about. Things like micro-conversions — maybe that’s shopping for a product, clicking to learn more about a product, or visiting a certain page on your website.
    Behind that, you also need to have all your user data to tie that to.

    So I know someone took said action; I can follow up with them in email or out on paid social. I need the user identifiers to do that.

    2. How do you distinguish between data that is actionable versus data that is just noise?
    Data that’s actionable includes the conversions and micro-conversions — very clear instances of “someone did this.” I can react to or measure those.
    What’s becoming a bit of a challenge for marketers is understanding that there’s other data that is valuable for machine learning or reinforcement learning models, things like tags on the types of products customers are interacting with.
    Maybe there’s category information about that product, or color information. That would otherwise look like noise to the average marketer. But behind the scenes, it can be used for reinforcement learning.

    There is definitely the “clear-cut” actionable data, but marketers shouldn’t be quick to classify things as noise because the rise in machine learning and reinforcement learning will make that data more valuable.

    3. How can customer engagement data be used to identify and prioritize new business opportunities?
    At Hightouch, we don’t necessarily think about retroactive analysis. We have a system where we have customer engagement data firing in that we then have real-time scores reacting to.
    An interesting example is when you have machine learning and reinforcement learning models running. In the pet retailer example I gave you, the system is able to figure out what to prioritize.
    The concept of reinforcement learning is not a marketer making rules to say, “I know this type of thing works well on this type of audience.”

    It’s the machine itself using the data to determine what attribute responds well to which offer, recommendation, or marketing campaign.

    4. How can marketers ensure their use of customer engagement data aligns with the broader business objectives?
    It starts with the objectives. It’s starting with the desired outcome and working your way back. That whole flip of the paradigm is starting with outcomes and letting the system optimize. What are you trying to drive, and then back into the types of experiences that can make that happen?
    There’s personalization.
    When we talk about data-driven experiences and personalization, Spotify Wrapped is the North Star. For Spotify Wrapped, you want to drive customer stickiness and create a brand. To make that happen, you want to send a personalized email. What components do you want in that email?

    Maybe it’s top five songs, top five artists, and then you can back into the actual event data you need to make that happen.

    5. What role does engagement data play in influencing cross-functional decisions such as those in product development, sales, or customer service?
    For product development, it’s product analytics — knowing what features users are using, or seeing in heat maps where users are clicking.
    Sales is similar. We’re using behavioral signals like what types of content they’re reading on the site to help inform what they would be interested in — the types of products or the types of use cases.

    For customer service, you can look at errors they’ve run into in the past or specific purchases they’ve made, so that when you’re helping them the next time they engage with you, you know exactly what their past behaviors were and what products they could be calling about.

    6. What are some challenges marketers face when trying to translate customer engagement data into actionable insights?
    Access to data is one challenge. You might not know what data you have because marketers historically may not have been used to the systems where data is stored.
    Historically, that’s been pretty siloed away from them. Rich behavioral data and other data across the business was stored somewhere else.
    Now, as more companies embrace the data warehouse at the center of their business, it gives everyone a true single place where data can be stored.

    Marketers are working more with data teams, understanding more about the data they have, and using that data to power downstream use cases, personalization, reinforcement learning, or general business insights.

    7. How do you address skepticism or resistance from stakeholders when presenting data-driven recommendations?
    As a marketer, I think proof is key. The best thing is if you’ve actually run a test. “I think we should do this. I ran a small test, and it’s showing that this is actually proving out.” Being able to clearly explain and justify your reasoning with data is super important.

    8. What technology or tools have you found most effective for gathering and analyzing customer engagement data?
    Any type of behavioral event collection, specifically ones that write to the cloud data warehouse, is the critical component. Your data team is operating off the data warehouse.
    Having an event collection product that stores data in that central spot is really important if you want to use the other data when making recommendations.
    You want to get everything into the data warehouse where it can be used both for insights and for putting into action.

    For Spotify Wrapped, you want to collect behavioral event signals like songs listened to or concerts attended, writing to the warehouse so that you can get insights back — how many songs were played this year, projections for next month — but then you can also use those behavioral events in downstream platforms to fire off personalized emails with product recommendations or Spotify Wrapped-style experiences.

    9. How do you see the role of customer engagement data evolving in shaping business strategies over the next five years?

    What we’re excited about is the concept of AI Decisioning — having AI agents actually using customer data to train their own models and decision-making to create personalized experiences.
    We’re sitting on top of all this behavioral data, engagement data, and user attributes, and our system is learning from all of that to make the best decisions across downstream systems.
    Whether that’s as simple as driving a loyalty program and figuring out what emails to send or what on-site experiences to show, or exposing insights that might lead you to completely change your business strategy, we see engagement data as the fuel to the engine of reinforcement learning, machine learning, AI agents, this whole next wave of Martech that’s just now coming.
    But it all starts with having the data to train those systems.

    I think that behavioral data is the fuel of modern Martech, and that only holds more true as Martech platforms adopt these decisioning and AI capabilities, because they’re only as good as the data that’s training the models.

     

     
    This interview Q&A was hosted with Alec Haase, Product GTM Lead, Commerce and AI at Hightouch, for Chapter 6 of The Customer Engagement Book: Adapt or Die.
    Download the PDF or request a physical copy of the book here.
    The post Alec Haase Q&A: Customer Engagement Book Interview appeared first on MoEngage.
    #alec #haase #qampampa #customer #engagement
    Alec Haase Q&A: Customer Engagement Book Interview
    Reading Time: 6 minutes What is marketing without data? Assumptions. Guesses. Fluff. For Chapter 6 of our book, “The Customer Engagement Book: Adapt or Die,” we spoke with Alec Haase, Product GTM Lead, Commerce and AI at Hightouch, to explore how engagement data can truly inform critical business decisions.  Alec discusses the different types of customer behaviors that matter most, how to separate meaningful information from the rest, and the role of systems that learn over time to create tailored customer experiences. This interview provides insights into using data for real-time actions and shaping the future of marketing. Prepare to learn about AI decision-making and how a focus on data is changing how we engage with customers.   Alec Haase Q&A Interview 1. What types of customer engagement data are most valuable for making strategic business decisions? It’s a culmination of everything. Behavioral signals — the actual conversions and micro-conversions that users take within your product or website. Obviously, that’s things like purchases. But there are also other behavioral signals marketers should be using and thinking about. Things like micro-conversions — maybe that’s shopping for a product, clicking to learn more about a product, or visiting a certain page on your website. Behind that, you also need to have all your user data to tie that to. So I know someone took said action; I can follow up with them in email or out on paid social. I need the user identifiers to do that. 2. How do you distinguish between data that is actionable versus data that is just noise? Data that’s actionable includes the conversions and micro-conversions — very clear instances of “someone did this.” I can react to or measure those. What’s becoming a bit of a challenge for marketers is understanding that there’s other data that is valuable for machine learning or reinforcement learning models, things like tags on the types of products customers are interacting with. Maybe there’s category information about that product, or color information. That would otherwise look like noise to the average marketer. But behind the scenes, it can be used for reinforcement learning. There is definitely the “clear-cut” actionable data, but marketers shouldn’t be quick to classify things as noise because the rise in machine learning and reinforcement learning will make that data more valuable. 3. How can customer engagement data be used to identify and prioritize new business opportunities? At Hightouch, we don’t necessarily think about retroactive analysis. We have a system where we have customer engagement data firing in that we then have real-time scores reacting to. An interesting example is when you have machine learning and reinforcement learning models running. In the pet retailer example I gave you, the system is able to figure out what to prioritize. The concept of reinforcement learning is not a marketer making rules to say, “I know this type of thing works well on this type of audience.” It’s the machine itself using the data to determine what attribute responds well to which offer, recommendation, or marketing campaign. 4. How can marketers ensure their use of customer engagement data aligns with the broader business objectives? It starts with the objectives. It’s starting with the desired outcome and working your way back. That whole flip of the paradigm is starting with outcomes and letting the system optimize. What are you trying to drive, and then back into the types of experiences that can make that happen? There’s personalization. When we talk about data-driven experiences and personalization, Spotify Wrapped is the North Star. For Spotify Wrapped, you want to drive customer stickiness and create a brand. To make that happen, you want to send a personalized email. What components do you want in that email? Maybe it’s top five songs, top five artists, and then you can back into the actual event data you need to make that happen. 5. What role does engagement data play in influencing cross-functional decisions such as those in product development, sales, or customer service? For product development, it’s product analytics — knowing what features users are using, or seeing in heat maps where users are clicking. Sales is similar. We’re using behavioral signals like what types of content they’re reading on the site to help inform what they would be interested in — the types of products or the types of use cases. For customer service, you can look at errors they’ve run into in the past or specific purchases they’ve made, so that when you’re helping them the next time they engage with you, you know exactly what their past behaviors were and what products they could be calling about. 6. What are some challenges marketers face when trying to translate customer engagement data into actionable insights? Access to data is one challenge. You might not know what data you have because marketers historically may not have been used to the systems where data is stored. Historically, that’s been pretty siloed away from them. Rich behavioral data and other data across the business was stored somewhere else. Now, as more companies embrace the data warehouse at the center of their business, it gives everyone a true single place where data can be stored. Marketers are working more with data teams, understanding more about the data they have, and using that data to power downstream use cases, personalization, reinforcement learning, or general business insights. 7. How do you address skepticism or resistance from stakeholders when presenting data-driven recommendations? As a marketer, I think proof is key. The best thing is if you’ve actually run a test. “I think we should do this. I ran a small test, and it’s showing that this is actually proving out.” Being able to clearly explain and justify your reasoning with data is super important. 8. What technology or tools have you found most effective for gathering and analyzing customer engagement data? Any type of behavioral event collection, specifically ones that write to the cloud data warehouse, is the critical component. Your data team is operating off the data warehouse. Having an event collection product that stores data in that central spot is really important if you want to use the other data when making recommendations. You want to get everything into the data warehouse where it can be used both for insights and for putting into action. For Spotify Wrapped, you want to collect behavioral event signals like songs listened to or concerts attended, writing to the warehouse so that you can get insights back — how many songs were played this year, projections for next month — but then you can also use those behavioral events in downstream platforms to fire off personalized emails with product recommendations or Spotify Wrapped-style experiences. 9. How do you see the role of customer engagement data evolving in shaping business strategies over the next five years? What we’re excited about is the concept of AI Decisioning — having AI agents actually using customer data to train their own models and decision-making to create personalized experiences. We’re sitting on top of all this behavioral data, engagement data, and user attributes, and our system is learning from all of that to make the best decisions across downstream systems. Whether that’s as simple as driving a loyalty program and figuring out what emails to send or what on-site experiences to show, or exposing insights that might lead you to completely change your business strategy, we see engagement data as the fuel to the engine of reinforcement learning, machine learning, AI agents, this whole next wave of Martech that’s just now coming. But it all starts with having the data to train those systems. I think that behavioral data is the fuel of modern Martech, and that only holds more true as Martech platforms adopt these decisioning and AI capabilities, because they’re only as good as the data that’s training the models.     This interview Q&A was hosted with Alec Haase, Product GTM Lead, Commerce and AI at Hightouch, for Chapter 6 of The Customer Engagement Book: Adapt or Die. Download the PDF or request a physical copy of the book here. The post Alec Haase Q&A: Customer Engagement Book Interview appeared first on MoEngage. #alec #haase #qampampa #customer #engagement
    WWW.MOENGAGE.COM
    Alec Haase Q&A: Customer Engagement Book Interview
    Reading Time: 6 minutes What is marketing without data? Assumptions. Guesses. Fluff. For Chapter 6 of our book, “The Customer Engagement Book: Adapt or Die,” we spoke with Alec Haase, Product GTM Lead, Commerce and AI at Hightouch, to explore how engagement data can truly inform critical business decisions.  Alec discusses the different types of customer behaviors that matter most, how to separate meaningful information from the rest, and the role of systems that learn over time to create tailored customer experiences. This interview provides insights into using data for real-time actions and shaping the future of marketing. Prepare to learn about AI decision-making and how a focus on data is changing how we engage with customers.   Alec Haase Q&A Interview 1. What types of customer engagement data are most valuable for making strategic business decisions? It’s a culmination of everything. Behavioral signals — the actual conversions and micro-conversions that users take within your product or website. Obviously, that’s things like purchases. But there are also other behavioral signals marketers should be using and thinking about. Things like micro-conversions — maybe that’s shopping for a product, clicking to learn more about a product, or visiting a certain page on your website. Behind that, you also need to have all your user data to tie that to. So I know someone took said action; I can follow up with them in email or out on paid social. I need the user identifiers to do that. 2. How do you distinguish between data that is actionable versus data that is just noise? Data that’s actionable includes the conversions and micro-conversions — very clear instances of “someone did this.” I can react to or measure those. What’s becoming a bit of a challenge for marketers is understanding that there’s other data that is valuable for machine learning or reinforcement learning models, things like tags on the types of products customers are interacting with. Maybe there’s category information about that product, or color information. That would otherwise look like noise to the average marketer. But behind the scenes, it can be used for reinforcement learning. There is definitely the “clear-cut” actionable data, but marketers shouldn’t be quick to classify things as noise because the rise in machine learning and reinforcement learning will make that data more valuable. 3. How can customer engagement data be used to identify and prioritize new business opportunities? At Hightouch, we don’t necessarily think about retroactive analysis. We have a system where we have customer engagement data firing in that we then have real-time scores reacting to. An interesting example is when you have machine learning and reinforcement learning models running. In the pet retailer example I gave you, the system is able to figure out what to prioritize. The concept of reinforcement learning is not a marketer making rules to say, “I know this type of thing works well on this type of audience.” It’s the machine itself using the data to determine what attribute responds well to which offer, recommendation, or marketing campaign. 4. How can marketers ensure their use of customer engagement data aligns with the broader business objectives? It starts with the objectives. It’s starting with the desired outcome and working your way back. That whole flip of the paradigm is starting with outcomes and letting the system optimize. What are you trying to drive, and then back into the types of experiences that can make that happen? There’s personalization. When we talk about data-driven experiences and personalization, Spotify Wrapped is the North Star. For Spotify Wrapped, you want to drive customer stickiness and create a brand. To make that happen, you want to send a personalized email. What components do you want in that email? Maybe it’s top five songs, top five artists, and then you can back into the actual event data you need to make that happen. 5. What role does engagement data play in influencing cross-functional decisions such as those in product development, sales, or customer service? For product development, it’s product analytics — knowing what features users are using, or seeing in heat maps where users are clicking. Sales is similar. We’re using behavioral signals like what types of content they’re reading on the site to help inform what they would be interested in — the types of products or the types of use cases. For customer service, you can look at errors they’ve run into in the past or specific purchases they’ve made, so that when you’re helping them the next time they engage with you, you know exactly what their past behaviors were and what products they could be calling about. 6. What are some challenges marketers face when trying to translate customer engagement data into actionable insights? Access to data is one challenge. You might not know what data you have because marketers historically may not have been used to the systems where data is stored. Historically, that’s been pretty siloed away from them. Rich behavioral data and other data across the business was stored somewhere else. Now, as more companies embrace the data warehouse at the center of their business, it gives everyone a true single place where data can be stored. Marketers are working more with data teams, understanding more about the data they have, and using that data to power downstream use cases, personalization, reinforcement learning, or general business insights. 7. How do you address skepticism or resistance from stakeholders when presenting data-driven recommendations? As a marketer, I think proof is key. The best thing is if you’ve actually run a test. “I think we should do this. I ran a small test, and it’s showing that this is actually proving out.” Being able to clearly explain and justify your reasoning with data is super important. 8. What technology or tools have you found most effective for gathering and analyzing customer engagement data? Any type of behavioral event collection, specifically ones that write to the cloud data warehouse, is the critical component. Your data team is operating off the data warehouse. Having an event collection product that stores data in that central spot is really important if you want to use the other data when making recommendations. You want to get everything into the data warehouse where it can be used both for insights and for putting into action. For Spotify Wrapped, you want to collect behavioral event signals like songs listened to or concerts attended, writing to the warehouse so that you can get insights back — how many songs were played this year, projections for next month — but then you can also use those behavioral events in downstream platforms to fire off personalized emails with product recommendations or Spotify Wrapped-style experiences. 9. How do you see the role of customer engagement data evolving in shaping business strategies over the next five years? What we’re excited about is the concept of AI Decisioning — having AI agents actually using customer data to train their own models and decision-making to create personalized experiences. We’re sitting on top of all this behavioral data, engagement data, and user attributes, and our system is learning from all of that to make the best decisions across downstream systems. Whether that’s as simple as driving a loyalty program and figuring out what emails to send or what on-site experiences to show, or exposing insights that might lead you to completely change your business strategy, we see engagement data as the fuel to the engine of reinforcement learning, machine learning, AI agents, this whole next wave of Martech that’s just now coming. But it all starts with having the data to train those systems. I think that behavioral data is the fuel of modern Martech, and that only holds more true as Martech platforms adopt these decisioning and AI capabilities, because they’re only as good as the data that’s training the models.     This interview Q&A was hosted with Alec Haase, Product GTM Lead, Commerce and AI at Hightouch, for Chapter 6 of The Customer Engagement Book: Adapt or Die. Download the PDF or request a physical copy of the book here. The post Alec Haase Q&A: Customer Engagement Book Interview appeared first on MoEngage.
    0 Comentários 0 Compartilhamentos
  • FBC: Firebreak developers discuss the inspiration and challenges creating their first multiplayer title

    Things are warming up as Remedy’s FBC: Firebreak approaches its June 17 launch on PlayStation 5 as part of the PlayStation Plus Game Catalog. We chatted with Communications Director Thomas Puha, Lead Level Designer Teemu Huhtiniemi, Lead Designer/Lead Technical Designer Anssi Hyytiainen, and Game Director/Lead Writer Mike Kayatta about some of the fascinating and often hilarious development secrets behind the first-person shooter.

    PlayStation Blog: First, what PS5 and PS5 Pro features did you utilize?

    Thomas Puha: We’ll support 3D Audio, and we’re prioritising 60 FPS on both formats. We’re aiming for FSR2 with an output resolution of 2560 x 1440on PS, and PSSR with an output resolution of 3840×2160on PS5 Pro.

    Some of the DualSense wireless controller’s features are still a work in progress, but we’re looking to use haptic feedback in a similar way to our previous titles, such as Control and Alan Wake 2. For example, we want to differentiate the weapons to feel unique from each other using the adaptive triggers.

    Going into the game itself, were there any other influences on its creation outside of Control?

    Mike Kayatta: We looked at different TV shows that had lots of tools for going into a place and dealing with a crisis. One was a reality show called Dirty Jobs, where the host Mike Rowe finds these terrible, dangerous, or unexpected jobs that you don’t know exist, like cleaning out the inside of a water tower.

    We also looked at PowerWash Simulator. Cleaning dirt is oddly meditative and really fulfilling. It made me wish a zombie attacked me to break the Zen, and then I’d go right back to cleaning. And we were like, that would be pretty fun in the game.

    Play Video

    Were there specific challenges you faced given it’s your first multiplayer game and first-person shooter?

    Anssi Hyytiainen: It’s radically different from a workflow point of view. You can’t really test it alone, necessarily, which is quite a different experience. And then there are times when one player is missing things on their screen that others are seeing. It was like, “What are you shooting at?”

    What’s been your favorite moments developing the game so far?

    Teemu Huhtiniemi: There were so many. But I like when we started seeing all of these overlapping systems kind of click, because there’s a long time in the development where you talk about things on paper and have some prototypes, but you don’t really see it all come together until a point. Then you start seeing the interaction between the systems and all the fun that comes out of that.

    Kayatta: I imagine there’s a lot of people who probably are a little skeptical about Remedy making something so different. Even internally, when the project was starting. And once we got the trailer out there, everyone was so nervous, but it got a pretty positive reaction. Exposing it to the public is very motivating, because with games, for a very long time, there is nothing, or it is janky and it’s ugly and you don’t find the fun immediately.

    Were there any specific ideals you followed while you worked on the game?

    Kayatta: Early on we were constantly asking ourselves, “Could this only happen in Control or at Remedy?” Because the first thing you hear is, “Okay, this is just another co-op multiplayer shooter” – there’s thousands of them, and they’re all good. So what can we do to make it worth playing our game? We were always saying we’ve got this super weird universe and really interesting studio, so we’re always looking at what we could do that nobody else can.

    Huhtiniemi: I think for me it was when we chose to just embrace the chaos. Like, that’s the whole point of the game. It’s supposed to feel overwhelming and busy at times, so that was great to say it out loud.

    Kayatta: Yeah, originally we had a prototype where there were only two Hiss in the level, but it just didn’t work, it wasn’t fun. Then everything just accidentally went in the opposite direction, where it was super chaos. At some point we actually started looking at Overcooked quite a bit, and saying, “Look, just embrace it. It’s gonna be nuts.”

    How did you finally decide on the name FBC: Firebreak, and were there any rejected, alternate, or working titles?

    Kayatta: So Firebreak is named after real world firebreaks, where you deforest an area to prevent a fire from spreading, but firebreaks are also topographical features of the Oldest House. And so we leaned into the term being a first responder who stops fires from spreading. The FBC part came from not wanting to put ‘Control’ in the title, so Control players wouldn’t feel like they had to detour to this before Control 2, but we didn’t want to totally detach from it either as that felt insincere.

    An external partner pitched a title. They were very serious about talking up the game being in the Oldest House, and then dramatically revealed the name: Housekeepers. I got what they were going for, but I was like, we cannot call it this. It was like you were playing as a maid!  

    FBC: Firebreak launches on PS5 June 17 as a day on PlayStation Plus Game Catalog title.
    #fbc #firebreak #developers #discuss #inspiration
    FBC: Firebreak developers discuss the inspiration and challenges creating their first multiplayer title
    Things are warming up as Remedy’s FBC: Firebreak approaches its June 17 launch on PlayStation 5 as part of the PlayStation Plus Game Catalog. We chatted with Communications Director Thomas Puha, Lead Level Designer Teemu Huhtiniemi, Lead Designer/Lead Technical Designer Anssi Hyytiainen, and Game Director/Lead Writer Mike Kayatta about some of the fascinating and often hilarious development secrets behind the first-person shooter. PlayStation Blog: First, what PS5 and PS5 Pro features did you utilize? Thomas Puha: We’ll support 3D Audio, and we’re prioritising 60 FPS on both formats. We’re aiming for FSR2 with an output resolution of 2560 x 1440on PS, and PSSR with an output resolution of 3840×2160on PS5 Pro. Some of the DualSense wireless controller’s features are still a work in progress, but we’re looking to use haptic feedback in a similar way to our previous titles, such as Control and Alan Wake 2. For example, we want to differentiate the weapons to feel unique from each other using the adaptive triggers. Going into the game itself, were there any other influences on its creation outside of Control? Mike Kayatta: We looked at different TV shows that had lots of tools for going into a place and dealing with a crisis. One was a reality show called Dirty Jobs, where the host Mike Rowe finds these terrible, dangerous, or unexpected jobs that you don’t know exist, like cleaning out the inside of a water tower. We also looked at PowerWash Simulator. Cleaning dirt is oddly meditative and really fulfilling. It made me wish a zombie attacked me to break the Zen, and then I’d go right back to cleaning. And we were like, that would be pretty fun in the game. Play Video Were there specific challenges you faced given it’s your first multiplayer game and first-person shooter? Anssi Hyytiainen: It’s radically different from a workflow point of view. You can’t really test it alone, necessarily, which is quite a different experience. And then there are times when one player is missing things on their screen that others are seeing. It was like, “What are you shooting at?” What’s been your favorite moments developing the game so far? Teemu Huhtiniemi: There were so many. But I like when we started seeing all of these overlapping systems kind of click, because there’s a long time in the development where you talk about things on paper and have some prototypes, but you don’t really see it all come together until a point. Then you start seeing the interaction between the systems and all the fun that comes out of that. Kayatta: I imagine there’s a lot of people who probably are a little skeptical about Remedy making something so different. Even internally, when the project was starting. And once we got the trailer out there, everyone was so nervous, but it got a pretty positive reaction. Exposing it to the public is very motivating, because with games, for a very long time, there is nothing, or it is janky and it’s ugly and you don’t find the fun immediately. Were there any specific ideals you followed while you worked on the game? Kayatta: Early on we were constantly asking ourselves, “Could this only happen in Control or at Remedy?” Because the first thing you hear is, “Okay, this is just another co-op multiplayer shooter” – there’s thousands of them, and they’re all good. So what can we do to make it worth playing our game? We were always saying we’ve got this super weird universe and really interesting studio, so we’re always looking at what we could do that nobody else can. Huhtiniemi: I think for me it was when we chose to just embrace the chaos. Like, that’s the whole point of the game. It’s supposed to feel overwhelming and busy at times, so that was great to say it out loud. Kayatta: Yeah, originally we had a prototype where there were only two Hiss in the level, but it just didn’t work, it wasn’t fun. Then everything just accidentally went in the opposite direction, where it was super chaos. At some point we actually started looking at Overcooked quite a bit, and saying, “Look, just embrace it. It’s gonna be nuts.” How did you finally decide on the name FBC: Firebreak, and were there any rejected, alternate, or working titles? Kayatta: So Firebreak is named after real world firebreaks, where you deforest an area to prevent a fire from spreading, but firebreaks are also topographical features of the Oldest House. And so we leaned into the term being a first responder who stops fires from spreading. The FBC part came from not wanting to put ‘Control’ in the title, so Control players wouldn’t feel like they had to detour to this before Control 2, but we didn’t want to totally detach from it either as that felt insincere. An external partner pitched a title. They were very serious about talking up the game being in the Oldest House, and then dramatically revealed the name: Housekeepers. I got what they were going for, but I was like, we cannot call it this. It was like you were playing as a maid!   FBC: Firebreak launches on PS5 June 17 as a day on PlayStation Plus Game Catalog title. #fbc #firebreak #developers #discuss #inspiration
    BLOG.PLAYSTATION.COM
    FBC: Firebreak developers discuss the inspiration and challenges creating their first multiplayer title
    Things are warming up as Remedy’s FBC: Firebreak approaches its June 17 launch on PlayStation 5 as part of the PlayStation Plus Game Catalog. We chatted with Communications Director Thomas Puha, Lead Level Designer Teemu Huhtiniemi, Lead Designer/Lead Technical Designer Anssi Hyytiainen, and Game Director/Lead Writer Mike Kayatta about some of the fascinating and often hilarious development secrets behind the first-person shooter. PlayStation Blog: First, what PS5 and PS5 Pro features did you utilize? Thomas Puha: We’ll support 3D Audio, and we’re prioritising 60 FPS on both formats. We’re aiming for FSR2 with an output resolution of 2560 x 1440 (1440p) on PS, and PSSR with an output resolution of 3840×2160 (4K) on PS5 Pro. Some of the DualSense wireless controller’s features are still a work in progress, but we’re looking to use haptic feedback in a similar way to our previous titles, such as Control and Alan Wake 2. For example, we want to differentiate the weapons to feel unique from each other using the adaptive triggers. Going into the game itself, were there any other influences on its creation outside of Control? Mike Kayatta: We looked at different TV shows that had lots of tools for going into a place and dealing with a crisis. One was a reality show called Dirty Jobs, where the host Mike Rowe finds these terrible, dangerous, or unexpected jobs that you don’t know exist, like cleaning out the inside of a water tower. We also looked at PowerWash Simulator. Cleaning dirt is oddly meditative and really fulfilling. It made me wish a zombie attacked me to break the Zen, and then I’d go right back to cleaning. And we were like, that would be pretty fun in the game. Play Video Were there specific challenges you faced given it’s your first multiplayer game and first-person shooter? Anssi Hyytiainen: It’s radically different from a workflow point of view. You can’t really test it alone, necessarily, which is quite a different experience. And then there are times when one player is missing things on their screen that others are seeing. It was like, “What are you shooting at?” What’s been your favorite moments developing the game so far? Teemu Huhtiniemi: There were so many. But I like when we started seeing all of these overlapping systems kind of click, because there’s a long time in the development where you talk about things on paper and have some prototypes, but you don’t really see it all come together until a point. Then you start seeing the interaction between the systems and all the fun that comes out of that. Kayatta: I imagine there’s a lot of people who probably are a little skeptical about Remedy making something so different. Even internally, when the project was starting. And once we got the trailer out there, everyone was so nervous, but it got a pretty positive reaction. Exposing it to the public is very motivating, because with games, for a very long time, there is nothing, or it is janky and it’s ugly and you don’t find the fun immediately. Were there any specific ideals you followed while you worked on the game? Kayatta: Early on we were constantly asking ourselves, “Could this only happen in Control or at Remedy?” Because the first thing you hear is, “Okay, this is just another co-op multiplayer shooter” – there’s thousands of them, and they’re all good. So what can we do to make it worth playing our game? We were always saying we’ve got this super weird universe and really interesting studio, so we’re always looking at what we could do that nobody else can. Huhtiniemi: I think for me it was when we chose to just embrace the chaos. Like, that’s the whole point of the game. It’s supposed to feel overwhelming and busy at times, so that was great to say it out loud. Kayatta: Yeah, originally we had a prototype where there were only two Hiss in the level, but it just didn’t work, it wasn’t fun. Then everything just accidentally went in the opposite direction, where it was super chaos. At some point we actually started looking at Overcooked quite a bit, and saying, “Look, just embrace it. It’s gonna be nuts.” How did you finally decide on the name FBC: Firebreak, and were there any rejected, alternate, or working titles? Kayatta: So Firebreak is named after real world firebreaks, where you deforest an area to prevent a fire from spreading, but firebreaks are also topographical features of the Oldest House. And so we leaned into the term being a first responder who stops fires from spreading. The FBC part came from not wanting to put ‘Control’ in the title, so Control players wouldn’t feel like they had to detour to this before Control 2, but we didn’t want to totally detach from it either as that felt insincere. An external partner pitched a title. They were very serious about talking up the game being in the Oldest House, and then dramatically revealed the name: Housekeepers. I got what they were going for, but I was like, we cannot call it this. It was like you were playing as a maid!   FBC: Firebreak launches on PS5 June 17 as a day on PlayStation Plus Game Catalog title.
    0 Comentários 0 Compartilhamentos
  • Study the Secrets of Early American Photography at This New Exhibition

    Study the Secrets of Early American Photography at This New Exhibition
    “The New Art: American Photography, 1839-1910” at the Metropolitan Museum of Art will feature more than 250 photographs

    Lillian Ali

    - Staff Contributor

    June 6, 2025

    This image, taken by an unknown photographer in 1905, is an example of a cyanotype.
    The Metropolitan Museum of Art, William L. Schaeffer Collection

    A new exhibition at the crossroads of art, history and technology chronicles the beginnings of early American photography.
    Titled “The New Art: American Photography, 1839-1910,” the show at the Metropolitan Museum of Art in New York City features more than 250 photographs that capture “the complexities of a nation in the midst of profound transformation,” says Max Hollein, the Met’s CEO, in a statement.
    Curator Jeff Rosenheim tells the Wall Street Journal’s William Meyers that the exhibition focuses “on how early artists used the different formats to record individuals and the built and natural environments surrounding them.”

    A daguerrotype from around 1850 depicts a woman wearing a tignon, a headcovering popular among Creole women of African descent.

    The Metropolitan Museum of Art, William L. Schaeffer Collection

    The oldest photographs on display are daguerreotypes, named for inventor Louis Daguerre, which were introduced in 1839 as the first publicly available form of photography. Creating a daguerreotype was a delicate, sometimes painstaking process that involved several chemical treatments and variable exposure times. The process yielded a sharply detailed picture on a silver background and was usually used for studio portraiture.
    The exhibition moves through the history of photography, from daguerreotypes and other photographs made on metal to those made on glass and, eventually, paper. It even features stereographs, two photos showing an object from slightly different points of view, creating an illusion of three-dimensionality.

    Installation view of "The New Art: American Photography, 1839-1910"

    Eugenia Tinsely / The Met

    Rosenheim believes that early photographic portraits empowered working-class Americans. “Photographic portraits play a role in people feeling like they could be a citizen,” Rosenheim tells the Guardian’s Veronica Esposito. “It’s a psychological, empowering thing to own your own likeness.”
    Photographs in the exhibition also spotlight key moments in American history. Items on view include a portrait of formerly enslaved individuals and an image of a conspirator in the assassination of Abraham Lincoln.
    The exhibition features big names in American photography, such as John Moran, who advocated for the recognition of photography as an art form, and Alice Austen, a pioneering landscape photographer.

    Group on Petria, Lake Mahopac​​​​​​, photographed in 1888 by Alice Austen

    The Metropolitan Museum of Art, William L. Schaeffer Collection

    Many of the photographs on display were taken by unknown artists. One of the most recent photos in the exhibition, taken by an unknown artist in 1905, is a cyanotype depicting figures tobogganing on a hill in Massachusetts. Cyanotypes were created by exposing a chemically treated paper to UV light, such as sunlight, yielding the blue pigment it was named for.
    Beyond portraits and landscapes, the exhibition features several enigmatic images, such as one of a boot placed in a roller skate and positioned on top of a stool. Rosenheim tells the Guardian that the mysterious photo “asks more questions than it answers.”

    An unknown photographer took this unconventional still life in the 1860s.

    The Metropolitan Museum of Art, William L. Schaeffer Collection

    “It’s very emblematic of the whole of 19th-century American photography,” he adds. The exhibition features photographs from across time and economic divides, with portraits of the working-class and wealthy alike.
    “The collection is just filled with the everyday stories of people,” Rosenheim tells the Guardian. “I don’t think painting can touch that.”
    “The New Art: American Photography, 1839-1910” is on view at the Metropolitan Museum of Art in New York City through July 20, 2025.

    Get the latest stories in your inbox every weekday.
    #study #secrets #early #american #photography
    Study the Secrets of Early American Photography at This New Exhibition
    Study the Secrets of Early American Photography at This New Exhibition “The New Art: American Photography, 1839-1910” at the Metropolitan Museum of Art will feature more than 250 photographs Lillian Ali - Staff Contributor June 6, 2025 This image, taken by an unknown photographer in 1905, is an example of a cyanotype. The Metropolitan Museum of Art, William L. Schaeffer Collection A new exhibition at the crossroads of art, history and technology chronicles the beginnings of early American photography. Titled “The New Art: American Photography, 1839-1910,” the show at the Metropolitan Museum of Art in New York City features more than 250 photographs that capture “the complexities of a nation in the midst of profound transformation,” says Max Hollein, the Met’s CEO, in a statement. Curator Jeff Rosenheim tells the Wall Street Journal’s William Meyers that the exhibition focuses “on how early artists used the different formats to record individuals and the built and natural environments surrounding them.” A daguerrotype from around 1850 depicts a woman wearing a tignon, a headcovering popular among Creole women of African descent. The Metropolitan Museum of Art, William L. Schaeffer Collection The oldest photographs on display are daguerreotypes, named for inventor Louis Daguerre, which were introduced in 1839 as the first publicly available form of photography. Creating a daguerreotype was a delicate, sometimes painstaking process that involved several chemical treatments and variable exposure times. The process yielded a sharply detailed picture on a silver background and was usually used for studio portraiture. The exhibition moves through the history of photography, from daguerreotypes and other photographs made on metal to those made on glass and, eventually, paper. It even features stereographs, two photos showing an object from slightly different points of view, creating an illusion of three-dimensionality. Installation view of "The New Art: American Photography, 1839-1910" Eugenia Tinsely / The Met Rosenheim believes that early photographic portraits empowered working-class Americans. “Photographic portraits play a role in people feeling like they could be a citizen,” Rosenheim tells the Guardian’s Veronica Esposito. “It’s a psychological, empowering thing to own your own likeness.” Photographs in the exhibition also spotlight key moments in American history. Items on view include a portrait of formerly enslaved individuals and an image of a conspirator in the assassination of Abraham Lincoln. The exhibition features big names in American photography, such as John Moran, who advocated for the recognition of photography as an art form, and Alice Austen, a pioneering landscape photographer. Group on Petria, Lake Mahopac​​​​​​, photographed in 1888 by Alice Austen The Metropolitan Museum of Art, William L. Schaeffer Collection Many of the photographs on display were taken by unknown artists. One of the most recent photos in the exhibition, taken by an unknown artist in 1905, is a cyanotype depicting figures tobogganing on a hill in Massachusetts. Cyanotypes were created by exposing a chemically treated paper to UV light, such as sunlight, yielding the blue pigment it was named for. Beyond portraits and landscapes, the exhibition features several enigmatic images, such as one of a boot placed in a roller skate and positioned on top of a stool. Rosenheim tells the Guardian that the mysterious photo “asks more questions than it answers.” An unknown photographer took this unconventional still life in the 1860s. The Metropolitan Museum of Art, William L. Schaeffer Collection “It’s very emblematic of the whole of 19th-century American photography,” he adds. The exhibition features photographs from across time and economic divides, with portraits of the working-class and wealthy alike. “The collection is just filled with the everyday stories of people,” Rosenheim tells the Guardian. “I don’t think painting can touch that.” “The New Art: American Photography, 1839-1910” is on view at the Metropolitan Museum of Art in New York City through July 20, 2025. Get the latest stories in your inbox every weekday. #study #secrets #early #american #photography
    WWW.SMITHSONIANMAG.COM
    Study the Secrets of Early American Photography at This New Exhibition
    Study the Secrets of Early American Photography at This New Exhibition “The New Art: American Photography, 1839-1910” at the Metropolitan Museum of Art will feature more than 250 photographs Lillian Ali - Staff Contributor June 6, 2025 This image, taken by an unknown photographer in 1905, is an example of a cyanotype. The Metropolitan Museum of Art, William L. Schaeffer Collection A new exhibition at the crossroads of art, history and technology chronicles the beginnings of early American photography. Titled “The New Art: American Photography, 1839-1910,” the show at the Metropolitan Museum of Art in New York City features more than 250 photographs that capture “the complexities of a nation in the midst of profound transformation,” says Max Hollein, the Met’s CEO, in a statement. Curator Jeff Rosenheim tells the Wall Street Journal’s William Meyers that the exhibition focuses “on how early artists used the different formats to record individuals and the built and natural environments surrounding them.” A daguerrotype from around 1850 depicts a woman wearing a tignon, a headcovering popular among Creole women of African descent. The Metropolitan Museum of Art, William L. Schaeffer Collection The oldest photographs on display are daguerreotypes, named for inventor Louis Daguerre, which were introduced in 1839 as the first publicly available form of photography. Creating a daguerreotype was a delicate, sometimes painstaking process that involved several chemical treatments and variable exposure times. The process yielded a sharply detailed picture on a silver background and was usually used for studio portraiture. The exhibition moves through the history of photography, from daguerreotypes and other photographs made on metal to those made on glass and, eventually, paper. It even features stereographs, two photos showing an object from slightly different points of view, creating an illusion of three-dimensionality. Installation view of "The New Art: American Photography, 1839-1910" Eugenia Tinsely / The Met Rosenheim believes that early photographic portraits empowered working-class Americans. “Photographic portraits play a role in people feeling like they could be a citizen,” Rosenheim tells the Guardian’s Veronica Esposito. “It’s a psychological, empowering thing to own your own likeness.” Photographs in the exhibition also spotlight key moments in American history. Items on view include a portrait of formerly enslaved individuals and an image of a conspirator in the assassination of Abraham Lincoln. The exhibition features big names in American photography, such as John Moran, who advocated for the recognition of photography as an art form, and Alice Austen, a pioneering landscape photographer. Group on Petria, Lake Mahopac​​​​​​, photographed in 1888 by Alice Austen The Metropolitan Museum of Art, William L. Schaeffer Collection Many of the photographs on display were taken by unknown artists. One of the most recent photos in the exhibition, taken by an unknown artist in 1905, is a cyanotype depicting figures tobogganing on a hill in Massachusetts. Cyanotypes were created by exposing a chemically treated paper to UV light, such as sunlight, yielding the blue pigment it was named for. Beyond portraits and landscapes, the exhibition features several enigmatic images, such as one of a boot placed in a roller skate and positioned on top of a stool. Rosenheim tells the Guardian that the mysterious photo “asks more questions than it answers.” An unknown photographer took this unconventional still life in the 1860s. The Metropolitan Museum of Art, William L. Schaeffer Collection “It’s very emblematic of the whole of 19th-century American photography,” he adds. The exhibition features photographs from across time and economic divides, with portraits of the working-class and wealthy alike. “The collection is just filled with the everyday stories of people,” Rosenheim tells the Guardian. “I don’t think painting can touch that.” “The New Art: American Photography, 1839-1910” is on view at the Metropolitan Museum of Art in New York City through July 20, 2025. Get the latest stories in your inbox every weekday.
    Like
    Love
    Wow
    Angry
    Sad
    623
    0 Comentários 0 Compartilhamentos
  • After the flood: Malecón de Villahermosa in Villahermosa, Mexico, by Taller Mauricio Rocha, TaAU and Alejandro Castro

    With reclaimed land previously allocated to cars, the Grijalva River boardwalk offers generous public spaces and reconnects the Mexican city of Villahermosa to its river
    In Villahermosa, nature reigns supreme. Surrounded by rivers, lagoons, wild vegetation and the scorching heat of a humid tropical climate, the city’s identity is shaped by intense and unpredictable natural forces. The capital of the Mexican state of Tabasco was founded in 1564 on the banks of the Grijalva River, a vital trade route that has significantly shaped the city’s development. For locals, the river has long been both blessing and threat; major floods have been recorded since the 17th century. A devastating flood in 2007 submerged what officials estimated to be 80 per cent of the city, damaging or destroying more than 120,000 homes.
    In the aftermath of the inundation, high concrete retaining walls were built along both banks of the Grijalva River to prevent further flooding. While this was an understandable measure at first glance, it consequently caused residents to lose both their visual and physical connection with the river. As a result, people moved, particularly from the western bank where the historical centre is located, to new areas further away from the Grijalva River. The riverfront was left to deteriorate into a troubled zone. On the eastern bank, the neighbourhood of Gaviotas was already considered unsafe before the flood, yet it maintained more of its residential character.
    In 2022, 15 years after the dramatic flood, then‑president Andrés Manuel López Obrador, more commonly known as AMLO, announced the construction of a new 6km‑long riverfront promenade in Villahermosa, the capital of his home state. The idea was to enable the population to once again take pride in and live with their river, looking to Paris and Rome as examples. The monumental task, with its large urban scale and the population’s psychological trauma, was entrusted to the Ministry of Agricultural, Territorial and Urban Developmentas part of their Programa de Mejoramiento Urbano. This programme aimed to use architecture as an ‘instrument of social transformation’. High expectations were placed on these projects; architects were asked to create ‘places of national pride’ while improving everyday living conditions.
    The architectural trio of Alejandro Castro Jiménez Labora, Mauricio Rocha Iturbide, and Óscar Rodríguez Castañeda, along with their teams, were commissioned to design a linear park along both banks of the Grijalva. Each architect contributed their strength: Castro brought his expertise in poetic urban furniture; Rocha his sensitive and atmospheric architectural approach; and Rodríguez his thoughtful urban and traffic planning skills. The SEDATU team provided technical and participatory expertise, enabling contextual sensitivity by sharing essential information about the site’s topography, soil conditions and water flows.
    From the city’s existing observatory, the Torre del Caballero landmark, visitors enjoy an excellent view over the redesigned riverbanks. The historical centre and the Gaviotas neighbourhood now form a single ensemble, while the intervention carefully responds to the different conditions found along the length of the river. The project’s main objective is to reclaim some of the land previously allocated to cars and create a promenade for pedestrians and slower vehicles, punctuated with public spaces and facilities. On both sides of the river, cars are now limited to just one or two grey asphalt lanes. Running alongside are generous cycle paths and pedestrian walkways made of earth‑coloured concrete. Speed bumps in the same material and colour connect the pavements on either side of the road while helping to limit traffic speed to 30km/h, further enhancing pedestrian safety.
    Several design elements are found along almost the entire promenade. A ribbon of light‑grey benches delineates the edge of the elevated riverfront; stone walls, steps and ramps are used to negotiate the slight changes in level; planters and lush vegetation soften the transition to the walkways, creating a welcome buffer from street traffic. The most visually striking components are the tall, red‑pigmented concrete light poles on the elevated path, adorned with elegant L‑shaped steel light fixtures, which establish a strong and cohesive visual rhythm.
    Only upon closer inspection you notice the 2007 retaining walls peeking through the dense tropical vegetation. Removing these unattractive concrete barriers was never an option; they stand as a symbol of successful flood protection for the local population. The architectural team ingeniously built the elevated promenade atop the existing wall – an effective concealment from the street side while simultaneously inviting residents to reconnect with the Grijalva. 
    At the foot of the observatory, directly below the retaining wall, the earth‑toned concrete platforms of the Carlos A Madrazo Becerra Park stretch towards the river. Visitors can access the park via a ramp from the promenade on the western bank or by ferry from the opposite side. In the park, concrete furnishings invite visitors to linger among tropical vegetation set against tall natural stone walls. Importantly, it is a space that is durable and requires minimal maintenance – a survival formula for public parks in the Mexican context. Small traces on the concrete benches reveal that the park weathered its baptism of fire last year: the design accommodates the river’s natural dynamics, adapting to fluctuating water levels without compromising public safety. Beyond providing much‑needed shade, the extensive planting of native, low‑maintenance plants on both riverbanks has improved soil stability.
    Above the park, on a broad extension of the elevated pathway, stand three long, elegant buildings with large cantilevered roofs supported by hefty beams resting on distinctive double columns. The tall glass walls that enclose the interiors are set back, creating a visual flow between interior and exterior spaces. While the beams evoke timber construction, they – like the columns – are made of the same pigmented concrete used for the promenade paving. Despite their refined composition, these structures have remained largely unused since their completion over a year ago, neither serving their intended function as restaurants nor hosting alternative uses. Even the beautifully designed park sees only limited public engagement. The ambitious goal of SEDATU with the PMU projects to ‘counteract violence and strengthen the social fabric’ appears, for now, to have fallen short in this area. According to national statistics, Villahermosa ranks first in perceived insecurity among Mexican cities. This sense of insecurity is tangible on the promenade by the city centre, where buildings that look abandoned contribute to an atmosphere of neglect.
    The situation is markedly different on the opposite riverbank, in the Gaviotas neighbourhood. Construction of the 3.5km promenade on this side began in 2021 with three open pavilions housing several small kiosks, which quickly evolved into popular taco stands. The Plaza Solidaridad, revitalised by the architectural trio, draws people from the surrounding vibrant neighbourhood. Further south, the final section that was built is a large sports area and children’s playground, which were embraced by the local community even before their official inauguration in February 2024. Especially after sunset, when the air cools, the well‑lit Gaviotas riverfront comes to life. During daylight hours, however, air‑conditioned shopping centres remain the preferred gathering places for the residents of Villahermosa.
    Rocha describes the city’s new promenade as a ‘jazz composition’, a striking metaphor that speaks of rhythmic complexity and the freedom to improvise. With just a few designed elements and carefully selected colours, the architects have harmoniously layered the river’s urban spaces. The project is earning international recognition but, in Mexico, it faced sharp criticism and was overshadowed by accusations of nepotism. Castro is a friend of AMLO’s son, and the fact that the intervention took place in the home state of the then‑president, coupled with its substantial budget by local standards, drew considerable attention. According to residents, this undermined public acceptance. When asked about the negative press, Rocha speaks of the need to develop a ‘crisis muscle’; he says architects working on public projects in Mexico must ‘let go of perfectionism’ as much lies beyond their control. 
    During AMLO’s six‑year term, which ended in 2024, SEDATU implemented 1,300 PMU projects in 193 highly marginalised municipalities across the country. While many of these interventions undoubtedly improved people’s quality of life, the Villahermosa riverside project also reveals architecture’s limitations, exposing some of the programme’s weaknesses: architectural interventions often act as sticking plasters on an extensively damaged urban fabric. They are handed over from a national ministry with comprehensive expertise and funding to local governments lacking the means to sustain them. Although SEDATU conducted participatory consultations during the project’s implementation, this engagement was absent once the project was completed. Public acceptance and appropriation can take time; what this project does is send an invitation out.

    2025-06-05
    Reuben J Brown

    Share

    AR June 2025RoadsBuy Now
    #after #flood #malecón #villahermosa #mexico
    After the flood: Malecón de Villahermosa in Villahermosa, Mexico, by Taller Mauricio Rocha, TaAU and Alejandro Castro
    With reclaimed land previously allocated to cars, the Grijalva River boardwalk offers generous public spaces and reconnects the Mexican city of Villahermosa to its river In Villahermosa, nature reigns supreme. Surrounded by rivers, lagoons, wild vegetation and the scorching heat of a humid tropical climate, the city’s identity is shaped by intense and unpredictable natural forces. The capital of the Mexican state of Tabasco was founded in 1564 on the banks of the Grijalva River, a vital trade route that has significantly shaped the city’s development. For locals, the river has long been both blessing and threat; major floods have been recorded since the 17th century. A devastating flood in 2007 submerged what officials estimated to be 80 per cent of the city, damaging or destroying more than 120,000 homes. In the aftermath of the inundation, high concrete retaining walls were built along both banks of the Grijalva River to prevent further flooding. While this was an understandable measure at first glance, it consequently caused residents to lose both their visual and physical connection with the river. As a result, people moved, particularly from the western bank where the historical centre is located, to new areas further away from the Grijalva River. The riverfront was left to deteriorate into a troubled zone. On the eastern bank, the neighbourhood of Gaviotas was already considered unsafe before the flood, yet it maintained more of its residential character. In 2022, 15 years after the dramatic flood, then‑president Andrés Manuel López Obrador, more commonly known as AMLO, announced the construction of a new 6km‑long riverfront promenade in Villahermosa, the capital of his home state. The idea was to enable the population to once again take pride in and live with their river, looking to Paris and Rome as examples. The monumental task, with its large urban scale and the population’s psychological trauma, was entrusted to the Ministry of Agricultural, Territorial and Urban Developmentas part of their Programa de Mejoramiento Urbano. This programme aimed to use architecture as an ‘instrument of social transformation’. High expectations were placed on these projects; architects were asked to create ‘places of national pride’ while improving everyday living conditions. The architectural trio of Alejandro Castro Jiménez Labora, Mauricio Rocha Iturbide, and Óscar Rodríguez Castañeda, along with their teams, were commissioned to design a linear park along both banks of the Grijalva. Each architect contributed their strength: Castro brought his expertise in poetic urban furniture; Rocha his sensitive and atmospheric architectural approach; and Rodríguez his thoughtful urban and traffic planning skills. The SEDATU team provided technical and participatory expertise, enabling contextual sensitivity by sharing essential information about the site’s topography, soil conditions and water flows. From the city’s existing observatory, the Torre del Caballero landmark, visitors enjoy an excellent view over the redesigned riverbanks. The historical centre and the Gaviotas neighbourhood now form a single ensemble, while the intervention carefully responds to the different conditions found along the length of the river. The project’s main objective is to reclaim some of the land previously allocated to cars and create a promenade for pedestrians and slower vehicles, punctuated with public spaces and facilities. On both sides of the river, cars are now limited to just one or two grey asphalt lanes. Running alongside are generous cycle paths and pedestrian walkways made of earth‑coloured concrete. Speed bumps in the same material and colour connect the pavements on either side of the road while helping to limit traffic speed to 30km/h, further enhancing pedestrian safety. Several design elements are found along almost the entire promenade. A ribbon of light‑grey benches delineates the edge of the elevated riverfront; stone walls, steps and ramps are used to negotiate the slight changes in level; planters and lush vegetation soften the transition to the walkways, creating a welcome buffer from street traffic. The most visually striking components are the tall, red‑pigmented concrete light poles on the elevated path, adorned with elegant L‑shaped steel light fixtures, which establish a strong and cohesive visual rhythm. Only upon closer inspection you notice the 2007 retaining walls peeking through the dense tropical vegetation. Removing these unattractive concrete barriers was never an option; they stand as a symbol of successful flood protection for the local population. The architectural team ingeniously built the elevated promenade atop the existing wall – an effective concealment from the street side while simultaneously inviting residents to reconnect with the Grijalva.  At the foot of the observatory, directly below the retaining wall, the earth‑toned concrete platforms of the Carlos A Madrazo Becerra Park stretch towards the river. Visitors can access the park via a ramp from the promenade on the western bank or by ferry from the opposite side. In the park, concrete furnishings invite visitors to linger among tropical vegetation set against tall natural stone walls. Importantly, it is a space that is durable and requires minimal maintenance – a survival formula for public parks in the Mexican context. Small traces on the concrete benches reveal that the park weathered its baptism of fire last year: the design accommodates the river’s natural dynamics, adapting to fluctuating water levels without compromising public safety. Beyond providing much‑needed shade, the extensive planting of native, low‑maintenance plants on both riverbanks has improved soil stability. Above the park, on a broad extension of the elevated pathway, stand three long, elegant buildings with large cantilevered roofs supported by hefty beams resting on distinctive double columns. The tall glass walls that enclose the interiors are set back, creating a visual flow between interior and exterior spaces. While the beams evoke timber construction, they – like the columns – are made of the same pigmented concrete used for the promenade paving. Despite their refined composition, these structures have remained largely unused since their completion over a year ago, neither serving their intended function as restaurants nor hosting alternative uses. Even the beautifully designed park sees only limited public engagement. The ambitious goal of SEDATU with the PMU projects to ‘counteract violence and strengthen the social fabric’ appears, for now, to have fallen short in this area. According to national statistics, Villahermosa ranks first in perceived insecurity among Mexican cities. This sense of insecurity is tangible on the promenade by the city centre, where buildings that look abandoned contribute to an atmosphere of neglect. The situation is markedly different on the opposite riverbank, in the Gaviotas neighbourhood. Construction of the 3.5km promenade on this side began in 2021 with three open pavilions housing several small kiosks, which quickly evolved into popular taco stands. The Plaza Solidaridad, revitalised by the architectural trio, draws people from the surrounding vibrant neighbourhood. Further south, the final section that was built is a large sports area and children’s playground, which were embraced by the local community even before their official inauguration in February 2024. Especially after sunset, when the air cools, the well‑lit Gaviotas riverfront comes to life. During daylight hours, however, air‑conditioned shopping centres remain the preferred gathering places for the residents of Villahermosa. Rocha describes the city’s new promenade as a ‘jazz composition’, a striking metaphor that speaks of rhythmic complexity and the freedom to improvise. With just a few designed elements and carefully selected colours, the architects have harmoniously layered the river’s urban spaces. The project is earning international recognition but, in Mexico, it faced sharp criticism and was overshadowed by accusations of nepotism. Castro is a friend of AMLO’s son, and the fact that the intervention took place in the home state of the then‑president, coupled with its substantial budget by local standards, drew considerable attention. According to residents, this undermined public acceptance. When asked about the negative press, Rocha speaks of the need to develop a ‘crisis muscle’; he says architects working on public projects in Mexico must ‘let go of perfectionism’ as much lies beyond their control.  During AMLO’s six‑year term, which ended in 2024, SEDATU implemented 1,300 PMU projects in 193 highly marginalised municipalities across the country. While many of these interventions undoubtedly improved people’s quality of life, the Villahermosa riverside project also reveals architecture’s limitations, exposing some of the programme’s weaknesses: architectural interventions often act as sticking plasters on an extensively damaged urban fabric. They are handed over from a national ministry with comprehensive expertise and funding to local governments lacking the means to sustain them. Although SEDATU conducted participatory consultations during the project’s implementation, this engagement was absent once the project was completed. Public acceptance and appropriation can take time; what this project does is send an invitation out. 2025-06-05 Reuben J Brown Share AR June 2025RoadsBuy Now #after #flood #malecón #villahermosa #mexico
    WWW.ARCHITECTURAL-REVIEW.COM
    After the flood: Malecón de Villahermosa in Villahermosa, Mexico, by Taller Mauricio Rocha, TaAU and Alejandro Castro
    With reclaimed land previously allocated to cars, the Grijalva River boardwalk offers generous public spaces and reconnects the Mexican city of Villahermosa to its river In Villahermosa, nature reigns supreme. Surrounded by rivers, lagoons, wild vegetation and the scorching heat of a humid tropical climate, the city’s identity is shaped by intense and unpredictable natural forces. The capital of the Mexican state of Tabasco was founded in 1564 on the banks of the Grijalva River, a vital trade route that has significantly shaped the city’s development. For locals, the river has long been both blessing and threat; major floods have been recorded since the 17th century. A devastating flood in 2007 submerged what officials estimated to be 80 per cent of the city, damaging or destroying more than 120,000 homes. In the aftermath of the inundation, high concrete retaining walls were built along both banks of the Grijalva River to prevent further flooding. While this was an understandable measure at first glance, it consequently caused residents to lose both their visual and physical connection with the river. As a result, people moved, particularly from the western bank where the historical centre is located, to new areas further away from the Grijalva River. The riverfront was left to deteriorate into a troubled zone. On the eastern bank, the neighbourhood of Gaviotas was already considered unsafe before the flood, yet it maintained more of its residential character. In 2022, 15 years after the dramatic flood, then‑president Andrés Manuel López Obrador, more commonly known as AMLO, announced the construction of a new 6km‑long riverfront promenade in Villahermosa, the capital of his home state. The idea was to enable the population to once again take pride in and live with their river, looking to Paris and Rome as examples. The monumental task, with its large urban scale and the population’s psychological trauma, was entrusted to the Ministry of Agricultural, Territorial and Urban Development (SEDATU) as part of their Programa de Mejoramiento Urbano (Urban Improvement Programme, or PMU). This programme aimed to use architecture as an ‘instrument of social transformation’. High expectations were placed on these projects; architects were asked to create ‘places of national pride’ while improving everyday living conditions. The architectural trio of Alejandro Castro Jiménez Labora, Mauricio Rocha Iturbide, and Óscar Rodríguez Castañeda, along with their teams, were commissioned to design a linear park along both banks of the Grijalva. Each architect contributed their strength: Castro brought his expertise in poetic urban furniture; Rocha his sensitive and atmospheric architectural approach; and Rodríguez his thoughtful urban and traffic planning skills. The SEDATU team provided technical and participatory expertise, enabling contextual sensitivity by sharing essential information about the site’s topography, soil conditions and water flows. From the city’s existing observatory, the Torre del Caballero landmark, visitors enjoy an excellent view over the redesigned riverbanks. The historical centre and the Gaviotas neighbourhood now form a single ensemble, while the intervention carefully responds to the different conditions found along the length of the river. The project’s main objective is to reclaim some of the land previously allocated to cars and create a promenade for pedestrians and slower vehicles, punctuated with public spaces and facilities. On both sides of the river, cars are now limited to just one or two grey asphalt lanes. Running alongside are generous cycle paths and pedestrian walkways made of earth‑coloured concrete. Speed bumps in the same material and colour connect the pavements on either side of the road while helping to limit traffic speed to 30km/h, further enhancing pedestrian safety. Several design elements are found along almost the entire promenade. A ribbon of light‑grey benches delineates the edge of the elevated riverfront; stone walls, steps and ramps are used to negotiate the slight changes in level; planters and lush vegetation soften the transition to the walkways, creating a welcome buffer from street traffic. The most visually striking components are the tall, red‑pigmented concrete light poles on the elevated path, adorned with elegant L‑shaped steel light fixtures, which establish a strong and cohesive visual rhythm. Only upon closer inspection you notice the 2007 retaining walls peeking through the dense tropical vegetation. Removing these unattractive concrete barriers was never an option; they stand as a symbol of successful flood protection for the local population. The architectural team ingeniously built the elevated promenade atop the existing wall – an effective concealment from the street side while simultaneously inviting residents to reconnect with the Grijalva.  At the foot of the observatory, directly below the retaining wall, the earth‑toned concrete platforms of the Carlos A Madrazo Becerra Park stretch towards the river. Visitors can access the park via a ramp from the promenade on the western bank or by ferry from the opposite side. In the park, concrete furnishings invite visitors to linger among tropical vegetation set against tall natural stone walls. Importantly, it is a space that is durable and requires minimal maintenance – a survival formula for public parks in the Mexican context. Small traces on the concrete benches reveal that the park weathered its baptism of fire last year: the design accommodates the river’s natural dynamics, adapting to fluctuating water levels without compromising public safety. Beyond providing much‑needed shade, the extensive planting of native, low‑maintenance plants on both riverbanks has improved soil stability. Above the park, on a broad extension of the elevated pathway, stand three long, elegant buildings with large cantilevered roofs supported by hefty beams resting on distinctive double columns. The tall glass walls that enclose the interiors are set back, creating a visual flow between interior and exterior spaces. While the beams evoke timber construction, they – like the columns – are made of the same pigmented concrete used for the promenade paving. Despite their refined composition, these structures have remained largely unused since their completion over a year ago, neither serving their intended function as restaurants nor hosting alternative uses. Even the beautifully designed park sees only limited public engagement. The ambitious goal of SEDATU with the PMU projects to ‘counteract violence and strengthen the social fabric’ appears, for now, to have fallen short in this area. According to national statistics, Villahermosa ranks first in perceived insecurity among Mexican cities. This sense of insecurity is tangible on the promenade by the city centre, where buildings that look abandoned contribute to an atmosphere of neglect. The situation is markedly different on the opposite riverbank, in the Gaviotas neighbourhood. Construction of the 3.5km promenade on this side began in 2021 with three open pavilions housing several small kiosks, which quickly evolved into popular taco stands. The Plaza Solidaridad, revitalised by the architectural trio, draws people from the surrounding vibrant neighbourhood. Further south, the final section that was built is a large sports area and children’s playground, which were embraced by the local community even before their official inauguration in February 2024. Especially after sunset, when the air cools, the well‑lit Gaviotas riverfront comes to life. During daylight hours, however, air‑conditioned shopping centres remain the preferred gathering places for the residents of Villahermosa. Rocha describes the city’s new promenade as a ‘jazz composition’, a striking metaphor that speaks of rhythmic complexity and the freedom to improvise. With just a few designed elements and carefully selected colours, the architects have harmoniously layered the river’s urban spaces. The project is earning international recognition but, in Mexico, it faced sharp criticism and was overshadowed by accusations of nepotism. Castro is a friend of AMLO’s son, and the fact that the intervention took place in the home state of the then‑president, coupled with its substantial budget by local standards, drew considerable attention. According to residents, this undermined public acceptance. When asked about the negative press, Rocha speaks of the need to develop a ‘crisis muscle’; he says architects working on public projects in Mexico must ‘let go of perfectionism’ as much lies beyond their control.  During AMLO’s six‑year term, which ended in 2024, SEDATU implemented 1,300 PMU projects in 193 highly marginalised municipalities across the country. While many of these interventions undoubtedly improved people’s quality of life, the Villahermosa riverside project also reveals architecture’s limitations, exposing some of the programme’s weaknesses: architectural interventions often act as sticking plasters on an extensively damaged urban fabric. They are handed over from a national ministry with comprehensive expertise and funding to local governments lacking the means to sustain them. Although SEDATU conducted participatory consultations during the project’s implementation, this engagement was absent once the project was completed. Public acceptance and appropriation can take time; what this project does is send an invitation out. 2025-06-05 Reuben J Brown Share AR June 2025RoadsBuy Now
    Like
    Love
    Wow
    Sad
    Angry
    285
    0 Comentários 0 Compartilhamentos
  • Popular Chrome Extensions Leak API Keys, User Data via HTTP and Hard-Coded Credentials

    Cybersecurity researchers have flagged several popular Google Chrome extensions that have been found to transmit data in HTTP and hard-code secrets in their code, exposing users to privacy and security risks.
    "Several widely used extensionsunintentionally transmit sensitive data over simple HTTP," Yuanjing Guo, a security researcher in the Symantec's Security Technology and Response team, said. "By doing so, they expose browsing domains, machine IDs, operating system details, usage analytics, and even uninstall information, in plaintext."
    The fact that the network traffic is unencrypted also means that they are susceptible to adversary-in-the-middleattacks, allowing malicious actors on the same network such as a public Wi-Fi to intercept and, even worse, modify this data, which could lead to far more serious consequences.

    The list of identified extensions are below -

    SEMRush Rankand PI Rank, which call the URL "rank.trelliancom" over plain HTTP
    Browsec VPN, which uses HTTP to call an uninstall URL at "browsec-uninstall.s3-website.eu-central-1.amazonawscom" when a user attempts to uninstall the extension
    MSN New Taband MSN Homepage, Bing Search & News, which transmit a unique machine identifier and other details over HTTP to "g.ceipmsncom"
    DualSafe Password Manager & Digital Vault, which constructs an HTTP-based URL request to "stats.itopupdatecom" along with information about the extension version, user's browser language, and usage "type"

    "Although credentials or passwords do not appear to be leaked, the fact that a password manager uses unencrypted requests for telemetry erodes trust in its overall security posture," Guo said.
    Symantec said it also identified another set of extensions with API keys, secrets, and tokens directly embedded in the JavaScript code, which an attacker could weaponize to craft malicious requests and carry out various malicious actions -

    Online Security & Privacy extension, AVG Online Security, Speed Dial- New Tab Page, 3D, Sync, and SellerSprite - Amazon Research Tool, which expose a hard-coded Google Analytics 4API secret that an attacker could use to bombard the GA4 endpoint and corrupt metrics
    Equatio – Math Made Digital, which embeds a Microsoft Azure API key used for speech recognition that an attacker could use to inflate the developer's costs or exhaust their usage limits
    Awesome Screen Recorder & Screenshotand Scrolling Screenshot Tool & Screen Capture, which expose the developer's Amazon Web Servicesaccess key used to upload screenshots to the developer's S3 bucket
    Microsoft Editor – Spelling & Grammar Checker, which exposes a telemetry key named "StatsApiKey" to log user data for analytics
    Antidote Connector, which incorporates a third-party library called InboxSDK that contains hard-coded credentials, including API keys.
    Watch2Gether, which exposes a Tenor GIF search API key
    Trust Wallet, which exposes an API key associated with the Ramp Network, a Web3 platform that offers wallet developers a way to let users buy or sell crypto directly from the app
    TravelArrow – Your Virtual Travel Agent, which exposes a geolocation API key when making queries to "ip-apicom"

    Attackers who end up finding these keys could weaponize them to drive up API costs, host illegal content, send spoofed telemetry data, and mimic cryptocurrency transaction orders, some of which could see the developer's ban getting banned.
    Adding to the concern, Antidote Connector is just one of over 90 extensions that use InboxSDK, meaning the other extensions are susceptible to the same problem. The names of the other extensions were not disclosed by Symantec.

    "From GA4 analytics secrets to Azure speech keys, and from AWS S3 credentials to Google-specific tokens, each of these snippets demonstrates how a few lines of code can jeopardize an entire service," Guo said. "The solution: never store sensitive credentials on the client side."
    Developers are recommended to switch to HTTPS whenever they send or receive data, store credentials securely in a backend server using a credentials management service, and regularly rotate secrets to further minimize risk.
    The findings show how even popular extensions with hundreds of thousands of installations can suffer from trivial misconfigurations and security blunders like hard-coded credentials, leaving users' data at risk.
    "Users of these extensions should consider removing them until the developers address the insecurecalls," the company said. "The risk is not just theoretical; unencrypted traffic is simple to capture, and the data can be used for profiling, phishing, or other targeted attacks."
    "The overarching lesson is that a large install base or a well-known brand does not necessarily ensure best practices around encryption. Extensions should be scrutinized for the protocols they use and the data they share, to ensure users' information remains truly safe."

    Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.
    #popular #chrome #extensions #leak #api
    Popular Chrome Extensions Leak API Keys, User Data via HTTP and Hard-Coded Credentials
    Cybersecurity researchers have flagged several popular Google Chrome extensions that have been found to transmit data in HTTP and hard-code secrets in their code, exposing users to privacy and security risks. "Several widely used extensionsunintentionally transmit sensitive data over simple HTTP," Yuanjing Guo, a security researcher in the Symantec's Security Technology and Response team, said. "By doing so, they expose browsing domains, machine IDs, operating system details, usage analytics, and even uninstall information, in plaintext." The fact that the network traffic is unencrypted also means that they are susceptible to adversary-in-the-middleattacks, allowing malicious actors on the same network such as a public Wi-Fi to intercept and, even worse, modify this data, which could lead to far more serious consequences. The list of identified extensions are below - SEMRush Rankand PI Rank, which call the URL "rank.trelliancom" over plain HTTP Browsec VPN, which uses HTTP to call an uninstall URL at "browsec-uninstall.s3-website.eu-central-1.amazonawscom" when a user attempts to uninstall the extension MSN New Taband MSN Homepage, Bing Search & News, which transmit a unique machine identifier and other details over HTTP to "g.ceipmsncom" DualSafe Password Manager & Digital Vault, which constructs an HTTP-based URL request to "stats.itopupdatecom" along with information about the extension version, user's browser language, and usage "type" "Although credentials or passwords do not appear to be leaked, the fact that a password manager uses unencrypted requests for telemetry erodes trust in its overall security posture," Guo said. Symantec said it also identified another set of extensions with API keys, secrets, and tokens directly embedded in the JavaScript code, which an attacker could weaponize to craft malicious requests and carry out various malicious actions - Online Security & Privacy extension, AVG Online Security, Speed Dial- New Tab Page, 3D, Sync, and SellerSprite - Amazon Research Tool, which expose a hard-coded Google Analytics 4API secret that an attacker could use to bombard the GA4 endpoint and corrupt metrics Equatio – Math Made Digital, which embeds a Microsoft Azure API key used for speech recognition that an attacker could use to inflate the developer's costs or exhaust their usage limits Awesome Screen Recorder & Screenshotand Scrolling Screenshot Tool & Screen Capture, which expose the developer's Amazon Web Servicesaccess key used to upload screenshots to the developer's S3 bucket Microsoft Editor – Spelling & Grammar Checker, which exposes a telemetry key named "StatsApiKey" to log user data for analytics Antidote Connector, which incorporates a third-party library called InboxSDK that contains hard-coded credentials, including API keys. Watch2Gether, which exposes a Tenor GIF search API key Trust Wallet, which exposes an API key associated with the Ramp Network, a Web3 platform that offers wallet developers a way to let users buy or sell crypto directly from the app TravelArrow – Your Virtual Travel Agent, which exposes a geolocation API key when making queries to "ip-apicom" Attackers who end up finding these keys could weaponize them to drive up API costs, host illegal content, send spoofed telemetry data, and mimic cryptocurrency transaction orders, some of which could see the developer's ban getting banned. Adding to the concern, Antidote Connector is just one of over 90 extensions that use InboxSDK, meaning the other extensions are susceptible to the same problem. The names of the other extensions were not disclosed by Symantec. "From GA4 analytics secrets to Azure speech keys, and from AWS S3 credentials to Google-specific tokens, each of these snippets demonstrates how a few lines of code can jeopardize an entire service," Guo said. "The solution: never store sensitive credentials on the client side." Developers are recommended to switch to HTTPS whenever they send or receive data, store credentials securely in a backend server using a credentials management service, and regularly rotate secrets to further minimize risk. The findings show how even popular extensions with hundreds of thousands of installations can suffer from trivial misconfigurations and security blunders like hard-coded credentials, leaving users' data at risk. "Users of these extensions should consider removing them until the developers address the insecurecalls," the company said. "The risk is not just theoretical; unencrypted traffic is simple to capture, and the data can be used for profiling, phishing, or other targeted attacks." "The overarching lesson is that a large install base or a well-known brand does not necessarily ensure best practices around encryption. Extensions should be scrutinized for the protocols they use and the data they share, to ensure users' information remains truly safe." Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post. #popular #chrome #extensions #leak #api
    THEHACKERNEWS.COM
    Popular Chrome Extensions Leak API Keys, User Data via HTTP and Hard-Coded Credentials
    Cybersecurity researchers have flagged several popular Google Chrome extensions that have been found to transmit data in HTTP and hard-code secrets in their code, exposing users to privacy and security risks. "Several widely used extensions [...] unintentionally transmit sensitive data over simple HTTP," Yuanjing Guo, a security researcher in the Symantec's Security Technology and Response team, said. "By doing so, they expose browsing domains, machine IDs, operating system details, usage analytics, and even uninstall information, in plaintext." The fact that the network traffic is unencrypted also means that they are susceptible to adversary-in-the-middle (AitM) attacks, allowing malicious actors on the same network such as a public Wi-Fi to intercept and, even worse, modify this data, which could lead to far more serious consequences. The list of identified extensions are below - SEMRush Rank (extension ID: idbhoeaiokcojcgappfigpifhpkjgmab) and PI Rank (ID: ccgdboldgdlngcgfdolahmiilojmfndl), which call the URL "rank.trellian[.]com" over plain HTTP Browsec VPN (ID: omghfjlpggmjjaagoclmmobgdodcjboh), which uses HTTP to call an uninstall URL at "browsec-uninstall.s3-website.eu-central-1.amazonaws[.]com" when a user attempts to uninstall the extension MSN New Tab (ID: lklfbkdigihjaaeamncibechhgalldgl) and MSN Homepage, Bing Search & News (ID: midiombanaceofjhodpdibeppmnamfcj), which transmit a unique machine identifier and other details over HTTP to "g.ceipmsn[.]com" DualSafe Password Manager & Digital Vault (ID: lgbjhdkjmpgjgcbcdlhkokkckpjmedgc), which constructs an HTTP-based URL request to "stats.itopupdate[.]com" along with information about the extension version, user's browser language, and usage "type" "Although credentials or passwords do not appear to be leaked, the fact that a password manager uses unencrypted requests for telemetry erodes trust in its overall security posture," Guo said. Symantec said it also identified another set of extensions with API keys, secrets, and tokens directly embedded in the JavaScript code, which an attacker could weaponize to craft malicious requests and carry out various malicious actions - Online Security & Privacy extension (ID: gomekmidlodglbbmalcneegieacbdmki), AVG Online Security (ID: nbmoafcmbajniiapeidgficgifbfmjfo), Speed Dial [FVD] - New Tab Page, 3D, Sync (ID: llaficoajjainaijghjlofdfmbjpebpa), and SellerSprite - Amazon Research Tool (ID: lnbmbgocenenhhhdojdielgnmeflbnfb), which expose a hard-coded Google Analytics 4 (GA4) API secret that an attacker could use to bombard the GA4 endpoint and corrupt metrics Equatio – Math Made Digital (ID: hjngolefdpdnooamgdldlkjgmdcmcjnc), which embeds a Microsoft Azure API key used for speech recognition that an attacker could use to inflate the developer's costs or exhaust their usage limits Awesome Screen Recorder & Screenshot (ID: nlipoenfbbikpbjkfpfillcgkoblgpmj) and Scrolling Screenshot Tool & Screen Capture (ID: mfpiaehgjbbfednooihadalhehabhcjo), which expose the developer's Amazon Web Services (AWS) access key used to upload screenshots to the developer's S3 bucket Microsoft Editor – Spelling & Grammar Checker (ID: gpaiobkfhnonedkhhfjpmhdalgeoebfa), which exposes a telemetry key named "StatsApiKey" to log user data for analytics Antidote Connector (ID: lmbopdiikkamfphhgcckcjhojnokgfeo), which incorporates a third-party library called InboxSDK that contains hard-coded credentials, including API keys. Watch2Gether (ID: cimpffimgeipdhnhjohpbehjkcdpjolg), which exposes a Tenor GIF search API key Trust Wallet (ID: egjidjbpglichdcondbcbdnbeeppgdph), which exposes an API key associated with the Ramp Network, a Web3 platform that offers wallet developers a way to let users buy or sell crypto directly from the app TravelArrow – Your Virtual Travel Agent (ID: coplmfnphahpcknbchcehdikbdieognn), which exposes a geolocation API key when making queries to "ip-api[.]com" Attackers who end up finding these keys could weaponize them to drive up API costs, host illegal content, send spoofed telemetry data, and mimic cryptocurrency transaction orders, some of which could see the developer's ban getting banned. Adding to the concern, Antidote Connector is just one of over 90 extensions that use InboxSDK, meaning the other extensions are susceptible to the same problem. The names of the other extensions were not disclosed by Symantec. "From GA4 analytics secrets to Azure speech keys, and from AWS S3 credentials to Google-specific tokens, each of these snippets demonstrates how a few lines of code can jeopardize an entire service," Guo said. "The solution: never store sensitive credentials on the client side." Developers are recommended to switch to HTTPS whenever they send or receive data, store credentials securely in a backend server using a credentials management service, and regularly rotate secrets to further minimize risk. The findings show how even popular extensions with hundreds of thousands of installations can suffer from trivial misconfigurations and security blunders like hard-coded credentials, leaving users' data at risk. "Users of these extensions should consider removing them until the developers address the insecure [HTTP] calls," the company said. "The risk is not just theoretical; unencrypted traffic is simple to capture, and the data can be used for profiling, phishing, or other targeted attacks." "The overarching lesson is that a large install base or a well-known brand does not necessarily ensure best practices around encryption. Extensions should be scrutinized for the protocols they use and the data they share, to ensure users' information remains truly safe." Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.
    Like
    Love
    Wow
    Sad
    Angry
    334
    0 Comentários 0 Compartilhamentos
  • Crafting Atmospheric Images with Fog and Mist

    Fog and mist offer photographers an exceptional opportunity to create deeply atmospheric, moody, and mysterious imagery. By embracing these unique weather conditions, you can transform ordinary scenes into captivating visual stories filled with depth, emotion, and intrigue. Here’s how to effectively harness fog and mist to elevate your photography.

    Understanding the Appeal of Fog and Mist
    Fog and mist naturally diffuse light, softening contrasts and textures within a scene. This soft diffusion creates a dreamlike ambiance and adds emotional depth to photographs, often evoking feelings of tranquility, solitude, or mystery. By obscuring and revealing elements selectively, fog and mist invite viewers to engage deeply with the visual narrative, filling in unseen details with imagination.
    Ideal Conditions and Timing
    The most atmospheric fog and mist usually occur during early mornings or evenings, especially near bodies of water or in valleys and lowlands. Paying close attention to weather forecasts can help you predict ideal conditions. Early preparation and scouting locations ahead of time ensure you’re ready when the perfect atmospheric conditions arise.

    Composition Techniques for Foggy Scenes
    Creating impactful foggy compositions involves thoughtful techniques:

    Layers and Depth: Use the fog’s varying densities to emphasize depth. Layering foreground, midground, and background elements adds visual complexity and interest.
    Silhouettes and Shapes: Fog reduces detail, emphasizing strong shapes and silhouettes. Compose your images around distinctive shapes, trees, or structures to anchor your photograph.
    Simplify the Frame: Minimalism is especially effective in foggy conditions. Embrace simplicity by isolating single elements or subjects against misty backdrops for dramatic effect.

    Lighting and Exposure Considerations
    Fog significantly impacts exposure and lighting conditions:

    Soft Light: The diffused, gentle lighting conditions in fog and mist reduce harsh shadows, creating flattering, ethereal images.
    Exposure Compensation: Fog often tricks camera meters into underexposing scenes. Consider slightly increasing your exposure compensation to accurately capture the brightness and subtle details of foggy conditions.

    Creative Opportunities with Fog and Mist
    Fog and mist open diverse creative possibilities:

    Black-and-White Photography: Foggy conditions lend themselves exceptionally well to monochrome photography, highlighting contrasts, textures, and shapes dramatically.
    Color Tones and Mood: Color images in foggy conditions can carry gentle pastel tones or cool hues, enhancing the atmospheric and emotional impact of your imagery.

    Enhancing Foggy Images Through Post-Processing
    Post-processing can refine foggy scenes:

    Contrast and Clarity Adjustments: Fine-tune contrast and clarity subtly to maintain the softness and mood without losing important detail.
    Selective Sharpening: Apply selective sharpening to key elements or subjects, ensuring they stand out within the foggy environment without diminishing the atmospheric quality.

    Fog and mist provide photographers with unique conditions to craft images rich in mood, narrative, and visual intrigue. By thoughtfully considering composition, timing, lighting, and post-processing, you can harness the power of fog and mist to produce atmospheric photography that deeply resonates with viewers. Embrace these ethereal elements, and transform everyday scenes into extraordinary visual stories.
    Extended reading: Alpine views: 12 breathtaking mountainscapes to celebrate the chilly season
    The post Crafting Atmospheric Images with Fog and Mist appeared first on 500px.
    #crafting #atmospheric #images #with #fog
    Crafting Atmospheric Images with Fog and Mist
    Fog and mist offer photographers an exceptional opportunity to create deeply atmospheric, moody, and mysterious imagery. By embracing these unique weather conditions, you can transform ordinary scenes into captivating visual stories filled with depth, emotion, and intrigue. Here’s how to effectively harness fog and mist to elevate your photography. Understanding the Appeal of Fog and Mist Fog and mist naturally diffuse light, softening contrasts and textures within a scene. This soft diffusion creates a dreamlike ambiance and adds emotional depth to photographs, often evoking feelings of tranquility, solitude, or mystery. By obscuring and revealing elements selectively, fog and mist invite viewers to engage deeply with the visual narrative, filling in unseen details with imagination. Ideal Conditions and Timing The most atmospheric fog and mist usually occur during early mornings or evenings, especially near bodies of water or in valleys and lowlands. Paying close attention to weather forecasts can help you predict ideal conditions. Early preparation and scouting locations ahead of time ensure you’re ready when the perfect atmospheric conditions arise. Composition Techniques for Foggy Scenes Creating impactful foggy compositions involves thoughtful techniques: Layers and Depth: Use the fog’s varying densities to emphasize depth. Layering foreground, midground, and background elements adds visual complexity and interest. Silhouettes and Shapes: Fog reduces detail, emphasizing strong shapes and silhouettes. Compose your images around distinctive shapes, trees, or structures to anchor your photograph. Simplify the Frame: Minimalism is especially effective in foggy conditions. Embrace simplicity by isolating single elements or subjects against misty backdrops for dramatic effect. Lighting and Exposure Considerations Fog significantly impacts exposure and lighting conditions: Soft Light: The diffused, gentle lighting conditions in fog and mist reduce harsh shadows, creating flattering, ethereal images. Exposure Compensation: Fog often tricks camera meters into underexposing scenes. Consider slightly increasing your exposure compensation to accurately capture the brightness and subtle details of foggy conditions. Creative Opportunities with Fog and Mist Fog and mist open diverse creative possibilities: Black-and-White Photography: Foggy conditions lend themselves exceptionally well to monochrome photography, highlighting contrasts, textures, and shapes dramatically. Color Tones and Mood: Color images in foggy conditions can carry gentle pastel tones or cool hues, enhancing the atmospheric and emotional impact of your imagery. Enhancing Foggy Images Through Post-Processing Post-processing can refine foggy scenes: Contrast and Clarity Adjustments: Fine-tune contrast and clarity subtly to maintain the softness and mood without losing important detail. Selective Sharpening: Apply selective sharpening to key elements or subjects, ensuring they stand out within the foggy environment without diminishing the atmospheric quality. Fog and mist provide photographers with unique conditions to craft images rich in mood, narrative, and visual intrigue. By thoughtfully considering composition, timing, lighting, and post-processing, you can harness the power of fog and mist to produce atmospheric photography that deeply resonates with viewers. Embrace these ethereal elements, and transform everyday scenes into extraordinary visual stories. Extended reading: Alpine views: 12 breathtaking mountainscapes to celebrate the chilly season The post Crafting Atmospheric Images with Fog and Mist appeared first on 500px. #crafting #atmospheric #images #with #fog
    ISO.500PX.COM
    Crafting Atmospheric Images with Fog and Mist
    Fog and mist offer photographers an exceptional opportunity to create deeply atmospheric, moody, and mysterious imagery. By embracing these unique weather conditions, you can transform ordinary scenes into captivating visual stories filled with depth, emotion, and intrigue. Here’s how to effectively harness fog and mist to elevate your photography. Understanding the Appeal of Fog and Mist Fog and mist naturally diffuse light, softening contrasts and textures within a scene. This soft diffusion creates a dreamlike ambiance and adds emotional depth to photographs, often evoking feelings of tranquility, solitude, or mystery. By obscuring and revealing elements selectively, fog and mist invite viewers to engage deeply with the visual narrative, filling in unseen details with imagination. Ideal Conditions and Timing The most atmospheric fog and mist usually occur during early mornings or evenings, especially near bodies of water or in valleys and lowlands. Paying close attention to weather forecasts can help you predict ideal conditions. Early preparation and scouting locations ahead of time ensure you’re ready when the perfect atmospheric conditions arise. Composition Techniques for Foggy Scenes Creating impactful foggy compositions involves thoughtful techniques: Layers and Depth: Use the fog’s varying densities to emphasize depth. Layering foreground, midground, and background elements adds visual complexity and interest. Silhouettes and Shapes: Fog reduces detail, emphasizing strong shapes and silhouettes. Compose your images around distinctive shapes, trees, or structures to anchor your photograph. Simplify the Frame: Minimalism is especially effective in foggy conditions. Embrace simplicity by isolating single elements or subjects against misty backdrops for dramatic effect. Lighting and Exposure Considerations Fog significantly impacts exposure and lighting conditions: Soft Light: The diffused, gentle lighting conditions in fog and mist reduce harsh shadows, creating flattering, ethereal images. Exposure Compensation: Fog often tricks camera meters into underexposing scenes. Consider slightly increasing your exposure compensation to accurately capture the brightness and subtle details of foggy conditions. Creative Opportunities with Fog and Mist Fog and mist open diverse creative possibilities: Black-and-White Photography: Foggy conditions lend themselves exceptionally well to monochrome photography, highlighting contrasts, textures, and shapes dramatically. Color Tones and Mood: Color images in foggy conditions can carry gentle pastel tones or cool hues, enhancing the atmospheric and emotional impact of your imagery. Enhancing Foggy Images Through Post-Processing Post-processing can refine foggy scenes: Contrast and Clarity Adjustments: Fine-tune contrast and clarity subtly to maintain the softness and mood without losing important detail. Selective Sharpening: Apply selective sharpening to key elements or subjects, ensuring they stand out within the foggy environment without diminishing the atmospheric quality. Fog and mist provide photographers with unique conditions to craft images rich in mood, narrative, and visual intrigue. By thoughtfully considering composition, timing, lighting, and post-processing, you can harness the power of fog and mist to produce atmospheric photography that deeply resonates with viewers. Embrace these ethereal elements, and transform everyday scenes into extraordinary visual stories. Extended reading: Alpine views: 12 breathtaking mountainscapes to celebrate the chilly season The post Crafting Atmospheric Images with Fog and Mist appeared first on 500px.
    Like
    Love
    Wow
    Sad
    Angry
    273
    0 Comentários 0 Compartilhamentos
  • Can AI Mistakes Lead to Real Legal Exposure?

    Posted on : June 5, 2025

    By

    Tech World Times

    AI 

    Rate this post

    Artificial intelligence tools now touch nearly every corner of modern business, from customer service and marketing to supply chain management and HR. These powerful technologies promise speed, accuracy, and insight, but their missteps can cause more than temporary inconvenience. A single AI-driven error can result in regulatory investigations, civil lawsuits, or public scandals that threaten the foundation of a business. Understanding how legal exposure arises from AI mistakes—and how a skilled attorney protects your interests—is no longer an option, but a requirement for any forward-thinking business owner.
    What Types of AI Errors Create Legal Liability?
    AI does not think or reason like a human; it follows code and statistical patterns, sometimes with unintended results. These missteps can create a trail of legal liability for any business owner. For example, an online retailer’s AI recommends discriminatory pricing, sparking allegations of unfair trade practices. An HR department automates hiring decisions with AI, only to face lawsuits for violating anti-discrimination laws. Even an AI-driven chatbot, when programmed without proper safeguards, can inadvertently give health advice or misrepresent product claims—exposing the company to regulatory penalties. Cases like these are regularly reported in Legal news as businesses discover the high cost of digital shortcuts.
    When Is a Business Owner Liable for AI Mistakes?
    Liability rarely rests with the software developer or the tool itself. Courts and regulators expect the business to monitor, supervise, and, when needed, override AI decisions. Suppose a financial advisor uses AI to recommend investments, but the algorithm suggests securities that violate state regulations. Even if the AI was “just following instructions,” the advisor remains responsible for client losses. Similarly, a marketing team cannot escape liability if their AI generates misleading advertising. The bottom line: outsourcing work to AI does not outsource legal responsibility.
    How Do AI Errors Harm Your Reputation and Operations?
    AI mistakes can leave lasting marks on a business’s reputation, finances, and operations. A logistics firm’s route-optimization tool creates data leaks that breach customer privacy and trigger costly notifications. An online business suffers public backlash after an AI-powered customer service tool sends offensive responses to clients. Such incidents erode public trust, drive customers to competitors, and divert resources into damage control rather than growth. Worse, compliance failures can result in penalties or shutdown orders, putting the entire enterprise at risk.
    What Steps Reduce Legal Risk From AI Deployments?
    Careful planning and continuous oversight keep AI tools working for your business—not against it. Compliance is not a “set it and forget it” matter. Proactive risk management transforms artificial intelligence from a liability into a valuable asset.
    Routine audits, staff training, and transparent policies form the backbone of safe, effective AI use in any organization.
    You should review these AI risk mitigation strategies below.

    Implement Manual Review of Sensitive Outputs: Require human approval for high-risk tasks, such as legal filings, financial transactions, or customer communications. A payroll company’s manual audits prevented the accidental overpayment of employees by catching AI-generated errors before disbursement.
    Update AI Systems for Regulatory Changes: Stay ahead of new laws and standards by regularly reviewing AI algorithms and outputs. An insurance brokerage avoided regulatory fines by updating their risk assessment models as privacy laws evolved.
    Document Every Incident and Remediation Step: Keep records of AI errors, investigations, and corrections. A healthcare provider’s transparency during a patient data mix-up helped avoid litigation and regulatory penalties.
    Limit AI Access to Personal and Sensitive Data: Restrict the scope and permissions of AI tools to reduce the chance of data misuse. A SaaS provider used data minimization techniques, lowering the risk of exposure in case of a system breach.
    Consult With Attorneys for Custom Policies and Protocols: Collaborate with experienced Attorneys to design, review, and update AI compliance frameworks.

    How Do Attorneys Shield Your Business From AI Legal Risks?
    Attorneys provide a critical safety net as AI integrates deeper into business operations. They draft tailored contracts, establish protocols for monitoring and escalation, and assess risks unique to your industry. In the event of an AI-driven incident, legal counsel investigates the facts, manages communication with regulators, and builds a robust defense. By providing training, ongoing guidance, and crisis management support, attorneys ensure that innovation doesn’t lead to exposure—or disaster. With the right legal partner, businesses can harness AI’s power while staying firmly on the right side of the law.
    Tech World TimesTech World Times, a global collective focusing on the latest tech news and trends in blockchain, Fintech, Development & Testing, AI and Startups. If you are looking for the guest post then contact at techworldtimes@gmail.com
    #can #mistakes #lead #real #legal
    Can AI Mistakes Lead to Real Legal Exposure?
    Posted on : June 5, 2025 By Tech World Times AI  Rate this post Artificial intelligence tools now touch nearly every corner of modern business, from customer service and marketing to supply chain management and HR. These powerful technologies promise speed, accuracy, and insight, but their missteps can cause more than temporary inconvenience. A single AI-driven error can result in regulatory investigations, civil lawsuits, or public scandals that threaten the foundation of a business. Understanding how legal exposure arises from AI mistakes—and how a skilled attorney protects your interests—is no longer an option, but a requirement for any forward-thinking business owner. What Types of AI Errors Create Legal Liability? AI does not think or reason like a human; it follows code and statistical patterns, sometimes with unintended results. These missteps can create a trail of legal liability for any business owner. For example, an online retailer’s AI recommends discriminatory pricing, sparking allegations of unfair trade practices. An HR department automates hiring decisions with AI, only to face lawsuits for violating anti-discrimination laws. Even an AI-driven chatbot, when programmed without proper safeguards, can inadvertently give health advice or misrepresent product claims—exposing the company to regulatory penalties. Cases like these are regularly reported in Legal news as businesses discover the high cost of digital shortcuts. When Is a Business Owner Liable for AI Mistakes? Liability rarely rests with the software developer or the tool itself. Courts and regulators expect the business to monitor, supervise, and, when needed, override AI decisions. Suppose a financial advisor uses AI to recommend investments, but the algorithm suggests securities that violate state regulations. Even if the AI was “just following instructions,” the advisor remains responsible for client losses. Similarly, a marketing team cannot escape liability if their AI generates misleading advertising. The bottom line: outsourcing work to AI does not outsource legal responsibility. How Do AI Errors Harm Your Reputation and Operations? AI mistakes can leave lasting marks on a business’s reputation, finances, and operations. A logistics firm’s route-optimization tool creates data leaks that breach customer privacy and trigger costly notifications. An online business suffers public backlash after an AI-powered customer service tool sends offensive responses to clients. Such incidents erode public trust, drive customers to competitors, and divert resources into damage control rather than growth. Worse, compliance failures can result in penalties or shutdown orders, putting the entire enterprise at risk. What Steps Reduce Legal Risk From AI Deployments? Careful planning and continuous oversight keep AI tools working for your business—not against it. Compliance is not a “set it and forget it” matter. Proactive risk management transforms artificial intelligence from a liability into a valuable asset. Routine audits, staff training, and transparent policies form the backbone of safe, effective AI use in any organization. You should review these AI risk mitigation strategies below. Implement Manual Review of Sensitive Outputs: Require human approval for high-risk tasks, such as legal filings, financial transactions, or customer communications. A payroll company’s manual audits prevented the accidental overpayment of employees by catching AI-generated errors before disbursement. Update AI Systems for Regulatory Changes: Stay ahead of new laws and standards by regularly reviewing AI algorithms and outputs. An insurance brokerage avoided regulatory fines by updating their risk assessment models as privacy laws evolved. Document Every Incident and Remediation Step: Keep records of AI errors, investigations, and corrections. A healthcare provider’s transparency during a patient data mix-up helped avoid litigation and regulatory penalties. Limit AI Access to Personal and Sensitive Data: Restrict the scope and permissions of AI tools to reduce the chance of data misuse. A SaaS provider used data minimization techniques, lowering the risk of exposure in case of a system breach. Consult With Attorneys for Custom Policies and Protocols: Collaborate with experienced Attorneys to design, review, and update AI compliance frameworks. How Do Attorneys Shield Your Business From AI Legal Risks? Attorneys provide a critical safety net as AI integrates deeper into business operations. They draft tailored contracts, establish protocols for monitoring and escalation, and assess risks unique to your industry. In the event of an AI-driven incident, legal counsel investigates the facts, manages communication with regulators, and builds a robust defense. By providing training, ongoing guidance, and crisis management support, attorneys ensure that innovation doesn’t lead to exposure—or disaster. With the right legal partner, businesses can harness AI’s power while staying firmly on the right side of the law. Tech World TimesTech World Times, a global collective focusing on the latest tech news and trends in blockchain, Fintech, Development & Testing, AI and Startups. If you are looking for the guest post then contact at techworldtimes@gmail.com #can #mistakes #lead #real #legal
    TECHWORLDTIMES.COM
    Can AI Mistakes Lead to Real Legal Exposure?
    Posted on : June 5, 2025 By Tech World Times AI  Rate this post Artificial intelligence tools now touch nearly every corner of modern business, from customer service and marketing to supply chain management and HR. These powerful technologies promise speed, accuracy, and insight, but their missteps can cause more than temporary inconvenience. A single AI-driven error can result in regulatory investigations, civil lawsuits, or public scandals that threaten the foundation of a business. Understanding how legal exposure arises from AI mistakes—and how a skilled attorney protects your interests—is no longer an option, but a requirement for any forward-thinking business owner. What Types of AI Errors Create Legal Liability? AI does not think or reason like a human; it follows code and statistical patterns, sometimes with unintended results. These missteps can create a trail of legal liability for any business owner. For example, an online retailer’s AI recommends discriminatory pricing, sparking allegations of unfair trade practices. An HR department automates hiring decisions with AI, only to face lawsuits for violating anti-discrimination laws. Even an AI-driven chatbot, when programmed without proper safeguards, can inadvertently give health advice or misrepresent product claims—exposing the company to regulatory penalties. Cases like these are regularly reported in Legal news as businesses discover the high cost of digital shortcuts. When Is a Business Owner Liable for AI Mistakes? Liability rarely rests with the software developer or the tool itself. Courts and regulators expect the business to monitor, supervise, and, when needed, override AI decisions. Suppose a financial advisor uses AI to recommend investments, but the algorithm suggests securities that violate state regulations. Even if the AI was “just following instructions,” the advisor remains responsible for client losses. Similarly, a marketing team cannot escape liability if their AI generates misleading advertising. The bottom line: outsourcing work to AI does not outsource legal responsibility. How Do AI Errors Harm Your Reputation and Operations? AI mistakes can leave lasting marks on a business’s reputation, finances, and operations. A logistics firm’s route-optimization tool creates data leaks that breach customer privacy and trigger costly notifications. An online business suffers public backlash after an AI-powered customer service tool sends offensive responses to clients. Such incidents erode public trust, drive customers to competitors, and divert resources into damage control rather than growth. Worse, compliance failures can result in penalties or shutdown orders, putting the entire enterprise at risk. What Steps Reduce Legal Risk From AI Deployments? Careful planning and continuous oversight keep AI tools working for your business—not against it. Compliance is not a “set it and forget it” matter. Proactive risk management transforms artificial intelligence from a liability into a valuable asset. Routine audits, staff training, and transparent policies form the backbone of safe, effective AI use in any organization. You should review these AI risk mitigation strategies below. Implement Manual Review of Sensitive Outputs: Require human approval for high-risk tasks, such as legal filings, financial transactions, or customer communications. A payroll company’s manual audits prevented the accidental overpayment of employees by catching AI-generated errors before disbursement. Update AI Systems for Regulatory Changes: Stay ahead of new laws and standards by regularly reviewing AI algorithms and outputs. An insurance brokerage avoided regulatory fines by updating their risk assessment models as privacy laws evolved. Document Every Incident and Remediation Step: Keep records of AI errors, investigations, and corrections. A healthcare provider’s transparency during a patient data mix-up helped avoid litigation and regulatory penalties. Limit AI Access to Personal and Sensitive Data: Restrict the scope and permissions of AI tools to reduce the chance of data misuse. A SaaS provider used data minimization techniques, lowering the risk of exposure in case of a system breach. Consult With Attorneys for Custom Policies and Protocols: Collaborate with experienced Attorneys to design, review, and update AI compliance frameworks. How Do Attorneys Shield Your Business From AI Legal Risks? Attorneys provide a critical safety net as AI integrates deeper into business operations. They draft tailored contracts, establish protocols for monitoring and escalation, and assess risks unique to your industry. In the event of an AI-driven incident, legal counsel investigates the facts, manages communication with regulators, and builds a robust defense. By providing training, ongoing guidance, and crisis management support, attorneys ensure that innovation doesn’t lead to exposure—or disaster. With the right legal partner, businesses can harness AI’s power while staying firmly on the right side of the law. Tech World TimesTech World Times (TWT), a global collective focusing on the latest tech news and trends in blockchain, Fintech, Development & Testing, AI and Startups. If you are looking for the guest post then contact at techworldtimes@gmail.com
    Like
    Love
    Wow
    Sad
    Angry
    272
    0 Comentários 0 Compartilhamentos