Category Archives: Blog

This category is for all pages linked to our blog

Humanity is Not Replaceable by Artificial Intelligence, but Might Improve It

This morning I was attempting to commute to work on the broken-down public metro with hundreds of other people, but I found a silver lining in the situation and used the train’s Wi-Fi to get some work done. Unfortunately, I couldn’t find several documents that I needed for a project and lost valuable hours of productivity.

However, solutions to both of the major issues that affected my morning’s efficiency can be found in artificial intelligence (AI).

Earlier this month, Elon Musk, CEO of Tesla, warned attendees at the National Governors Association that AI could be the end of humanity and result in an existential crisis for humans.

“AI is a fundamental existential risk for human civilization, and I don’t think people fully appreciate that,” Musk said.

I find it disheartening that a man known for his innovation would have such a cynical view on this technology. I disagree with the premise painted by  that AI and humans are somehow meant to be pitted against each other.

Simply put, AI cannot exist, function or evolve without humans. Humans can, however, exist, function and evolve without AI. The great thing is, that with artificial intelligence, we can do those three things better.

The definition of artificial intelligence, according to Britannica, is “The theory and development of computer systems able to perform tasks that normally require human intelligence, such as visual perception, speech recognition, decision-making, and translation between languages.”

Consider my situation this morning. FogHorn Systems has a platform that can track, assess and send data from Industrial Internet of Things environments in real-time using AI, which can ultimately help industries, like the metro, detect issues in the system before they happen and let employees know so that they can isolate and solve the problem  before a breakdown occurs. This can keep schedules intact, productivity uninterrupted and customers happy.

Meanwhile, M-Files Corporation focuses on intelligent information management of enterprise data and documents. Their platform utilizes AI to help find important business documents instantly based upon the document’s metadata — topic, relevant teams, type of document, location, etc. This saves employees from wasting valuable working hours searching for documents and information, giving them more time to innovate and produce high-quality work.

AI has the potential to aid humans in eliminating extra steps, addressing speed bumps, and coping with the tedious work that keeps them from living and working their most productive lives. With AI helping us to address avoidable setbacks, humans are free to stay focused and remain creative in their lines of work and their daily lives. The hope is that AI provides faster and more efficient solutions, which in turn allows humans to have more time to do things that keep them in touch with their humanity — spending time with friends and family, pursuing activities that focus on their passions, and maybe even pursuing further education.

AI can’t take anything from us unless we let it, but we can be sure to utilize its enormous potential to give us incredible advancements that lead to personal and professional growth.

By Whitney Urmann

Enjoy your read? Check out our other content here.

Security Never Sleeps- SEC Security, CCleaner Security

SEC admits data breach, suggests illicit trading was key

“Regulator database opened”

The SEC has admitted to being hacked in 2016, with illegal trading potentially at the root of the breach. On Wednesday, SEC Chairman Jay Clayton said one of the financial regulator’s databases, containing corporate announcements, was compromised and may have been used to gain an advantage in stock trading.

CCleaner Hack Carried Out In Order to Target Big Tech Companies

“Group believed to operate out of China”

The CCleaner hack that took place over the summer and came to light this week might have been carried out by an infamous cyber-espionage group, believed to be operating out of China, and which targeted a list of who’s who of western tech companies. Thin lines connect evidence collected from the CCleaner incident to the activity of a cyber-espionage group that goes primarily by the name of Axiom, but is also referenced as APT17, DeputyDog, Tailgater Team, Hidden Lynx, Voho, Group 72, or AuroraPanda.

Attackers Take Over WordPress, Joomla, JBoss Servers to Mine Monero

“Frequency of attacks up about 6 times”

Attacks aimed at delivering cryptocurrency mining tools on enterprise networks have gone up significantly, according to telemetry data collected by IBM’s X-Force team between January and August 2017. A recent report by fellow cyber-security firm Kaspersky found that cryptocurrency mining malware also infected over 1.65 million machines running Kaspersky solutions in the first eight months of the year.

Equifax Sent Breach Victims to Fake Website

“Failure after failure”

Equifax has made another blunder following the massive data breach suffered by the company – it advised some customers on Twitter to access a fake support website set up by a security researcher. Equifax staff advised breach victims on Twitter at least 8 times to access securityequifax2017.com instead of equifaxsecurity2017.com, the website created by the credit reporting agency following the hacker attack that affected as many as 143 million consumers in the U.S., 400,000 in the U.K. and 100,000 in Canada.

Enjoy your read? Check out our other content here.

10Fold Media SharkTank 2017 – Mastering the Art of Your Business Pitch

Formulating a flawless media pitch is especially critical to differentiate in today’s over-statured deep tech market.  Companies understand that learning how to attract and garner attention from the business and broadcast media is foundational to attracting venture capitalist attention.  However, the gap between pitching your company (as you see the industry) and crafting a pitch that will garner attention is large.  Many executives get their shot at pitching The Wall Street Journal, only to come up empty handed – with no article.  What’s worse, most have no idea why they didn’t get the story.

10Fold holds a night of opportunity to remedy just these kinds of challenges each year.  In fact on Thursday, October 12, 2017 10Fold will host our Seventh Annual Media SharkTank and Charitable Event – with proceeds supporting the local charity, San Francisco Baykeeper.  The event is designed to help companies learn what the top tier business press really want from a pitch and what makes a good story. With Media SharkTank, 10Fold has created an environment where the media can provide feedback to entrepreneurs about their pitch – helping them to portray their vision in a short, succinct manner to those who matter most. The event is chalked-full of the who’s who in broadcast and business media. From San Francisco Correspondent of the Financial Times Hannah Kuchler, to technology journalist and editor at Fast Company Sean Captain, alongside several other expert panelists.

Each year executives come away with a refined 3-minute pitch, stronger media networks and the satisfied feeling of supporting a worthy charity. Last year alone SharkTank raised $15,000 for San Francisco Baykeepers!  Media enjoy the event because they get the opportunity to hear new stories that they don’t often have the time to listen to.  Most of the “sharks” have supported the event for four or more years.

So, as Woody Allen says, “Seventy percent of success in life is showing up.” Come master the art of your business pitch, receive constructive feedback in a private environment, and strengthen your story with the best of the best. We’ll see you at this year’s SharkTank! You can find the registration form here.

By Lauren Lloyd

Enjoy your read? Check out our other content here.

Security Never Sleeps- FedEx, Iranian Hackers

Cyber attack, hurricane weigh on FedEx quarterly profit

“Concerning trends of large scale attacks on business”

Package delivery company FedEx Corp (FDX.N) said on Tuesday a June cyber attack on its Dutch unit slashed $300 million from its quarterly profit, and the company lowered its full-year earnings forecast. The company said the cyber attack slashed 79 cents per share from its profit – nearly 40 times the 2 cents per share caused by deadly Hurricane Harvey, which brought catastrophic flooding to southeastern Texas.

Personal details of up to 30,000 teachers at risk following cyberattack

“Union website breached”

Up to 30,000 teachers have been warned that their personal data may have been compromised after their organizations website was hacked in recent days. The Irish National Teachers’ Organisation has notified the teachers and retired staff who have completed courses on its learning website to warn that its security systems were breached.

1.9 Billion Data Records Exposed in First Half of 2017

“Data breaches are becoming far too common”

On average 122 records are exposed in breaches around the globe every second, a new report shows. And that’s doesn’t even include the new Equifax breach data. More than 10 million data records are pilfered or lost every day around the world, a rate of more than 7,000 per minute: and that’s only the numbers from breaches that go public.

NEW GROUP OF IRANIAN HACKERS LINKED TO DESTRUCTIVE MALWARE

“Continued state-sponsored hacking”

For more than five years, Iran has maintained a reputation as one of the most aggressive nations in the global arena of state-sponsored hacking, stealing data from corporate and government networks around the world, bombarding US banks with cyberattacks, and most brazen of all, unleashing multiple waves of computer-crippling malware that hit tens of thousands of PCs across the Middle East. But amidst that noisy mayhem, one Iranian group has managed to quietly penetrate a broad series of targets around the world, until now evading the public eye.

Enjoy your read? Check out our other content here.

Big Data Horizons- AI, IoT Saves Lives

The Amazing Ways Coca Cola Uses AI And Big Data To Drive Success

“One of the first firms outside of IT to speak about Big Data and AI applications”

Coca-Cola has been a big player in the big-data space in recent years, and have shown many times their practical use of big data as a form to improve products. In 2012  chief big data officer, Esat Sezer, said “Social media, mobile applications, cloud computing and e-commerce are combining to give companies like Coca-Cola an unprecedented toolset to change the way they approach IT. Behind all this, big data gives you the intelligence to cap it all off.”

More recently, Greg Chambers, global director of digital innovation, has said “AI is the foundation for everything we do. We create intelligent experiences. AI is the kernel that powers that experience.”

More and more companies every day are adopting data analytics technologies and applying them to their marketing to optimize their products and create new ones, much like the case of Coca-Cola.

Disaster Response In The 21st Century: Big Data And IoT Save Lives

“Technology improves authorities ability to predict, prevent disasters”

Leveraging Big Data to predict, prepare, and prevent

Even before Harvey made landfall, organizations such as NASA, NOAA, and municipalities were using sensor data, surveillance and satellite imagery to predict not just where the storm was likely to impact, but also coordinate with first responders and law enforcement. This allowed them to identify staging locations, evacuation routes, likely flooding areas, etc., and to be prepared for the worst. Data collected from sensors and meters located throughout the region were mined and machine learning algorithms applied, in order to predict patterns and outcomes.

For example, clustering algorithms helped to determine the probability of where flooding would occur, and allowed agencies to devise a set of recommendations for evacuation routes, resource staging, and the identification of locations for shelters along these routes. The more data collected from past incidents, the more insight these agencies are forecast future behavior, using operations such as regression algorithms. This gives officials more detailed insight into potential problems before they happen, so they can allocate resources in a timely, data-driven manner. There is no doubt data mining played a critical role in the effectiveness of first responders which, in turn, led to a reduction in the loss of lives.

IoT sensors provide a huge potential platform for those that want to collect data. IoT is a fast growing market and with the right technology applied, it could provide extremely significant use cases. Not only is the data collected from these sensors helping preparations for hurricane Harvey as explained in this article, but they also have the ability to help with the aftermath. Smart IoT sensors applied across cities on their networks can alert them when certain areas are dealing with black-outs. During natural disasters like this one, some utility providers may be able to address affected areas with greater speed since they’ll be automatically notified on the statuses of effected areas.

Apple’s FaceID: Get ready for ‘big data’ to get even bigger

“Big Data cemented as trending up”

It’s not just Apple utilizing the benefits of biometric and behavioral authentication. Organizations are realizing the treasure trove of contextual insights and valuable information about customers that are available through sensor-based, ground-breaking technology.

Organizations use big data analytics to monitor the behavior of a consumer, or potential consumer. Insurance agencies can benefit from such data to assess everything from driving behavior or home settings to reduce in-home risks, to health risks based on daily habits and routines to detect anomalies. Healthcare organizations can perform remote monitoring, while the automotive industry can profile drivers via connected cars and autonomous vehicles. Even apps like Maps, Camera, Weather and Uber use location services to cater to users based on their location. Big data is getting bigger, but that’s not necessarily a bad thing.

Transparency will be key going forward. As people often don’t fully read through privacy statements because of their length and complexity, government mandates, such as the EU’s pending General Data Protection Regulation are beginning to require organizations to present privacy statements in a “clear, transparent, intelligible and easily accessible form — using clear and plain language.”

In this article, Dutt speaks on how organizations can gain valuable insights from Apple’s new FaceID sensor. He touches on one of the most talked about issues engulfing the world of big data today, privacy. Dutt explains that if Apple does intend to collect data using the facial recognition software, they should be as transparent as possible, using easy to understand clear language to avoid any issues regarding data protections. Although the data collected from this could bring incredible insights, it would be safe for Apple to proceed with the caution and transparency.

Enjoy your read? Check out our other content here.

Summer’s not quite over in ATX!

While Labor Day marks the end to the heat and sunshine filled days of summer, no one has told Texas. Officially summer may be over, but Austin is still hot and the activities have far from slowed down. As PR pros we thought we’d switch from our usual focus on high tech business-to-business public relations and give Austin and 10Fold’s ATX office a boost.  We combed through upcoming events across the city and pulled together some of the “can’t miss” activities for this fall – just in case you feel like donning your cowboy boots and dropping by.

The University of Texas Longhorn Football

For as long as football has been popular, Texas has set the gold, rather burnt orange, standard for quality and experience. And it’s no wonder with a stadium that holds 100,119. After all everything is bigger in Texas. At the games, you’ll not only be surrounded by a hundred thousand strong of the Texas faithful, you’ll also be swallowed by an atmosphere that is electric and memorable. There’s no other experience quite like it. Apart from football, 10Fold is talking to a lot of intern candidates from UT-Austin for a coveted space in our downtown office.

ACL Festival

ACL Festival is one of a kind. Taking place in the heart of Austin at Zilker Park, this six-day festival never disappoints. This year features headliners Jay-Z, Red Hot Chili Pepper and The Killers, not to mention The XX, Foster the People, Chance the Rapper, Tove Lo, Gorillaz and The Head and The Heart. But don’t worry the headliners are hardly the only reason to attend the festival. All the food on the grounds is from local Austin staples like Torchy’s Tacos, Good Pop, Southside Flying Pizza, Salt Lick BBQ and Lonesome Dove, which happens to be down the street from our office. Definitely wear comfortable shoes, cool clothes and drink lots of water as the festival has a history of landing on hot weekends.

Formula One

And for the motor heads, Formula One hits the Circuit of the Americas (COTA) track again this fall. COTA was the first purpose-built F1 track in the U.S. and plays host to a number of races and concerts throughout the year. Qualifying races on Friday and Saturday lead to the final race on Sunday. Racing not your cup of tea? Justin Timberlake and Stevie Wonder headline post-race concerts on Saturday and Sunday with over 30 additional artists performing throughout the weekend.

This is just the tip of the iceberg of all the activities happening in Austin this fall, not to mention the SDxE Conference and DeveloperWeek. If you’re planning on making a trip to Austin this fall, be sure to check all the activities on Do512 or Austin360 and drop by and say “Howdy!” to our Texas team.

Enjoy your read? Check out our other content here.

Security Never Sleeps- Equifax Breach, DU Data Siphon

Equifax Discloses Earlier Cybersecurity Incident, But No Details

“March breach is still shaded with uncertainty”

Equifax Inc. hired cybersecurity experts to deal with an incident on its corporate networks in March, two months before the massive hack began that it has said led to the potential compromise of personal data belonging to 143 million U.S. consumers.

Infrared signals in surveillance cameras let malware jump network air gaps

“Many networks disconnected as precaution”

Researchers have been successful in creating malware that can jump airgaps by using the infrared capabilities of an infected network’s surveillance cameras to transmit data to and from attackers. The malware prototype could be a crucial ingredient for attacks that target some of the world’s most sensitive networks that were previously thought to be safe. Militaries, energy producers, and other critical infrastructure providers frequently disconnect such networks from the Internet as a precaution.

Chinese Mobile Antivirus App Caught Siphoning User Data

“Secret data theft”

Google has removed, and then reinstated, one of the most popular mobile antivirus apps on the Play Store. The move was taken after security firm Check Point discovered that DU Antivirus Security, created by the DU Group, was secretly collecting device data from users’ smartphones. Over 10 million downloads occurred without proper security precautions.

Enterprise IT security planning: Five ways to build a better strategy

“Helpful tips for a competent defense”

Those buzzwords recommended for building a successful digital business, such as flexibility, agility and openness, don’t always fit nicely with more sober requirements like the needs of a corporate security policy. So, how can IT leaders create an approach to information security that is fit for the modern business? ZDNet speaks to five experts about the key issues CIOs face.

  1. Make cybersecurity your number one priority
  2. Understand the importance of making a commitment
  3. Embed a culture of risk management across the business
  4. Apply measures that are fit for the open world
  5. Create a long-term strategy for system integrity

Enjoy your read? Check out our other content here.

Security Never Sleeps- Avast and CCleaner, Apple Face ID

Avast reckons CCleaner malware infected 2.27M users

“Popular PC optimization software infected”

Users of a free software tool designed to optimize system performance on Windows PCs and Android mobile devices got a nasty shock this morning when Piriform, the company which makes the CCleaner tool, revealed in a blog post that certain versions of the software had been compromised by hackers — and that malicious, data-harvesting software had piggybacked on its installer program.

LiteBit Bitcoin Exchange Hacked Twice in Two Months

“Fuels concerns over security of trading platforms”

LiteBit.eu, a multi-currency exchange based in the Netherlands, has suffered yet another data breach, two months in a row. According to emails sent to affected customers after each event, no Bitcoin or altcoin funds were stolen in any of these two incidents but the possibility remains a primary issue for those holding the currencies.

Apple’s Face ID isn’t flawless — technology can and will be hacked, cybersecurity expert says

“No facial recognition systems truly safe”

Facial recognition technology, such as in Apple’s new high-end iPhone X, is more secure than other authentication systems but it isn’t perfect, a cybersecurity expert warned on Friday. “None of these systems are flawless. And you’ll see it with Apple. They can be defeated. Somebody will do that,” said Tom Grissen, CEO of biometrics firm Daon, whose clients include USAA and MasterCard.

Malware blamed for city’s data breach

“Oceanside payment system affected”

A malicious form of computer code known as “malware” has been blamed for the security breach that shut down Oceanside’s online payment system in August, city officials said this week. The cyber attack targeted names, billing addresses and credit card information, and other sensitive information of the 40,000 customers who use the online system to pay their various utility bills such as  water, sewer and trash bills, city officials said.

Enjoy your read? Check out our other content here.

Security Never Sleeps- BitGlass Talks Infosec, Equifax Failure

OurMine hacks video hosting service Vevo; leaks 3.12TB data online

“White hat hacking group strikes again”

The self proclaimed White Hat Hacking group OurMine is back in the news and this time it has targeted Vevo and released nearly 3.12TB of its internal data online. According to analysis, some of the documents released online are of sensitive nature.

Rich Campagna, CEO of 10Fold client Bitglass has commented on situations likes this before, saying that: “Acquiring credentials to access sensitive data is increasingly easy and incredibly lucrative for today’s hackers. The ease with which credentials can be compromised starts with risky behavior among users. Many end-users, for example, have a habit of recycling passwords across corporate and personal accounts, including personal social media, banking, and corporate email. This practice poses a risk to all data accessible to that user.”

EQUIFAX OFFICIALLY HAS NO EXCUSE

“Over a week of failures has taken its toll”

Incompetence, failures, and general shady behavior in responding to its massive data breach from Equifax has confirmed that attackers entered its system in mid-May through a web-application vulnerability that had a patch available in March. In other words, the credit-reporting giant had more than two months to take precautions that would have defended the personal data of 143 million people from being exposed. It didn’t.

Northern Exposure: Data on 600K Alaskan Voters is Leaked

“Personal details leaked”

Researchers at Kromtech Security Center have discovered the personal details of over half a million US voters exposed to the public internet, once again thanks to a misconfigured database. It was a CouchDB database of 593,328 Alaskan voter records including names, addresses, dates of birth, voting preferences, household income and much more. The data in question is part of Voterbase; a larger trove of info on 191 million voters and 58m unregistered US voters managed by a TargetSmart.

Enjoy your read? Check out our other content here.

Security Never Sleeps- Equifax Hack, Google Play Malware

Equifax Confirms Hackers Used Apache Struts Vulnerability to Breach Its Servers

“More details on the major hack”

In an update posted to its security breach website, Equifax announced that hackers used an Apache Struts security bug to breach its servers and later steal data on over 143 million customers, from both the US and the UK. At the time it was discovered, in March 2017, the Apache Struts CVE-2017-5638 vulnerability was a zero-day — a term used to describe security bugs exploited by attackers but which vendors are not aware of or have a patch released. Equifax did not reveal the exact date when the security breach occurred, but only when it became aware of it — July 29, 2017. It is unclear if Equifax was breached before the Struts zero-day became public, or months after Apache made a patch available.

Attackers Can Bypass SKEL Protection in macOS High Sierra

“Malicious kernel extensions allow security evasion”

A new security feature added in macOS High Sierra (10.13) named “Secure Kernel Extension Loading” can be bypassed to allow the loading of malicious kernel extensions. Just like Linux and Windows, macOS allows applications to load third-party kernel extensions whenever they need to perform actions that require access to lower levels of the operating system.

Backdoored Plugin Impacts 200,000 WordPress Sites

“Malware updated in plugin”

Wordfence reports that around 200,000 WordPress websites were impacted after a plugin they were using was updated to include malicious code. Dubbed Display Widgets, the plugin was sold by its original author to a third-party developer on May 19, 2017, for $15,000. Roughly one month after that, the plugin was updated by its new owner and started displaying malicious behavior.

Google Is Fighting One Of The Biggest Ever Android Malware Outbreaks — Up To 21 Million Victims

“More malware!”

Surprising almost no one, another batch of Android malware has found its way onto Google Play. Researchers from Check Point have claimed to have found the second-biggest outbreak to ever hit Google’s platform, with as many as 21.1 million infections from one malware family.

Enjoy your read? Check out our other content here.