IT Brief UK - Technology news for CIOs & IT decision-makers

Bots stories - Page 4

Thinkstockphotos 136735104 ofghpej

Malicious 'bad bots' account for more web traffic than ever before

Wed, 28th Mar 2018
#
advanced persistent threat protection
#
cybersecurity
#
healthtech
4% of bad bot traffic is made up of moderate or sophisticated bots, which evade detection by distributing their attacks over multiple IP addresses.
Thinkstockphotos 880930132

From Vietnam without love: Asia Pacific's next cyber attack hub

Wed, 14th Feb 2018
#
crypto
#
blockchain
#
cybersecurity
Vietnam may be called the next Silicon Valley for its technology prowess, but for the first time it is now one of the top five cyber attack sources.
Thinkstockphotos 807095998

Digital shadows looks at fake news, disinformation and how they affect business reputations

Fri, 1st Dec 2017
#
martech
#
software development
#
domain names
Russia is just the tip of the iceberg for this issue with regular misinformation campaigns and attacks observed worldwide.
Screen shot 2017 09 20 at 10

Bot services market worth US$1,783.9m by 2022 – APAC the driver

Wed, 20th Sep 2017
#
uc
#
hyperscale
#
public cloud
​A new research report from MarketsandMarkets has forecast very positive times ahead for the bot services market, with APAC leading the way.
Thinkstockphotos 589098772

Are chatbots just a fad? One app developer shares his thoughts

Mon, 10th Oct 2016
#
uc
#
martech
#
ai
Based on a computer program that mimics conversations with people using artificial intelligence, chatbots can transform the way people interact.
Thinkstockphotos 466105453 hj1kbfo

Progress in the shift to conversational computing

Mon, 8th Aug 2016
#
uc
#
microsoft
#
voip
Microsoft heralds a new era with Skype's latest bots, enhancing conversations with travel and entertainment to simplify life.
Lifting the lid

Lifting the lid on major enterprise security threats

Thu, 4th Jun 2015
#
malware
#
firewalls
#
network security
Today's cybercriminals are sophisticated and ruthless: they prey on the weaknesses in a network, approaching any security layer as an open invitation.