Artwork

Big Pond Podcasts and MSP Radio에서 제공하는 콘텐츠입니다. 에피소드, 그래픽, 팟캐스트 설명을 포함한 모든 팟캐스트 콘텐츠는 Big Pond Podcasts and MSP Radio 또는 해당 팟캐스트 플랫폼 파트너가 직접 업로드하고 제공합니다. 누군가가 귀하의 허락 없이 귀하의 저작물을 사용하고 있다고 생각되는 경우 여기에 설명된 절차를 따르실 수 있습니다 https://ko.player.fm/legal.
Player FM -팟 캐스트 앱
Player FM 앱으로 오프라인으로 전환하세요!

CMMC Audits Expose Export Violations; Congress Tests AI; Cybersecurity Faces New AI Threats

12:01
 
공유
 

Manage episode 508304953 series 2555839
Big Pond Podcasts and MSP Radio에서 제공하는 콘텐츠입니다. 에피소드, 그래픽, 팟캐스트 설명을 포함한 모든 팟캐스트 콘텐츠는 Big Pond Podcasts and MSP Radio 또는 해당 팟캐스트 플랫폼 파트너가 직접 업로드하고 제공합니다. 누군가가 귀하의 허락 없이 귀하의 저작물을 사용하고 있다고 생각되는 경우 여기에 설명된 절차를 따르실 수 있습니다 https://ko.player.fm/legal.

The Defense Department's Cybersecurity Maturity Model Certification (CMMC) effort has uncovered that many contractors are unaware of export control violations, which could lead to significant legal and financial penalties. As the certification becomes mandatory, early assessments indicate common violations of the International Traffic in Arms Regulation and Export Administration Regulations. Contractors are urged to map controlled, unclassified information and review data controls to identify and mitigate these violations before audits occur. This highlights the critical need to integrate export compliance with cybersecurity measures.

Meanwhile, Congress is experimenting with Microsoft's AI chatbot, CoPilot, as part of an initiative to incorporate artificial intelligence into legislative operations. This move has sparked concerns among critics regarding the potential risks of misinformation and privacy hazards associated with using experimental technology in governance. Additionally, Congress faces challenges in renewing a vital cyber threat information sharing program, which is set to expire soon, raising alarms about the implications for national cybersecurity efforts.

On the cybersecurity front, artificial intelligence is increasingly being exploited by criminal hackers, leading to a new era of sophisticated attacks. Generative AI technologies are being used to craft convincing phishing scams and manipulate everyday tools to execute attacks without triggering security alerts. Recent incidents have demonstrated the effectiveness of these tactics, emphasizing the need for heightened vigilance and advanced security measures to protect against evolving threats.

In the realm of technology, companies like Notion, Google, and Zoom are embedding powerful AI features into their platforms, fundamentally changing how users interact with these tools. Notion's new AI agent can autonomously perform tasks, while Google has integrated its Gemini AI into Chrome for enhanced usability and security. Zoom is set to introduce photorealistic AI avatars for meetings, showcasing the rapid adoption of AI in everyday applications. As these tools become the new baseline, IT service providers must adapt by focusing on governance, compliance, and security to ensure that their clients can safely navigate this evolving landscape.

Four things to know today

00:00 Compliance Blind Spots, Political Delays, and AI Experiments Show Why IT Providers Must Be the Steady Hand

05:02 Generative AI Fuels Phishing and Supply Chain Attacks While SonicWall and WatchGuard Struggle With Flaws

09:08 Notion, Google, and Zoom Push AI Deeper Into Everyday Tools

12:43 Ingram Micro Credits Xvantage for Ransomware Recovery, but MSPs Should Focus on Client Continuity

This is the Business of Tech.

Supported by: scalepad

Webinar: https://bit.ly/msprmail

💼 All Our Sponsors

Support the vendors who support the show:

👉 https://businessof.tech/sponsors/

🚀 Join Business of Tech Plus

Get exclusive access to investigative reports, vendor analysis, leadership briefings, and more.

👉 https://businessof.tech/plus

🎧 Subscribe to the Business of Tech

Want the show on your favorite podcast app or prefer the written versions of each story?

📲 https://www.businessof.tech/subscribe

📰 Story Links & Sources

Looking for the links from today’s stories?

Every episode script — with full source links — is posted at:

🌐 https://www.businessof.tech

🎙 Want to Be a Guest?

Pitch your story or appear on Business of Tech: Daily 10-Minute IT Services Insights:

💬 https://www.podmatch.com/hostdetailpreview/businessoftech

🔗 Follow Business of Tech

LinkedIn: https://www.linkedin.com/company/28908079

YouTube: https://youtube.com/mspradio

Bluesky: https://bsky.app/profile/businessof.tech

Instagram: https://www.instagram.com/mspradio

TikTok: https://www.tiktok.com/@businessoftech

Facebook: https://www.facebook.com/mspradionews

Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

  continue reading

1784 에피소드

Artwork
icon공유
 
Manage episode 508304953 series 2555839
Big Pond Podcasts and MSP Radio에서 제공하는 콘텐츠입니다. 에피소드, 그래픽, 팟캐스트 설명을 포함한 모든 팟캐스트 콘텐츠는 Big Pond Podcasts and MSP Radio 또는 해당 팟캐스트 플랫폼 파트너가 직접 업로드하고 제공합니다. 누군가가 귀하의 허락 없이 귀하의 저작물을 사용하고 있다고 생각되는 경우 여기에 설명된 절차를 따르실 수 있습니다 https://ko.player.fm/legal.

The Defense Department's Cybersecurity Maturity Model Certification (CMMC) effort has uncovered that many contractors are unaware of export control violations, which could lead to significant legal and financial penalties. As the certification becomes mandatory, early assessments indicate common violations of the International Traffic in Arms Regulation and Export Administration Regulations. Contractors are urged to map controlled, unclassified information and review data controls to identify and mitigate these violations before audits occur. This highlights the critical need to integrate export compliance with cybersecurity measures.

Meanwhile, Congress is experimenting with Microsoft's AI chatbot, CoPilot, as part of an initiative to incorporate artificial intelligence into legislative operations. This move has sparked concerns among critics regarding the potential risks of misinformation and privacy hazards associated with using experimental technology in governance. Additionally, Congress faces challenges in renewing a vital cyber threat information sharing program, which is set to expire soon, raising alarms about the implications for national cybersecurity efforts.

On the cybersecurity front, artificial intelligence is increasingly being exploited by criminal hackers, leading to a new era of sophisticated attacks. Generative AI technologies are being used to craft convincing phishing scams and manipulate everyday tools to execute attacks without triggering security alerts. Recent incidents have demonstrated the effectiveness of these tactics, emphasizing the need for heightened vigilance and advanced security measures to protect against evolving threats.

In the realm of technology, companies like Notion, Google, and Zoom are embedding powerful AI features into their platforms, fundamentally changing how users interact with these tools. Notion's new AI agent can autonomously perform tasks, while Google has integrated its Gemini AI into Chrome for enhanced usability and security. Zoom is set to introduce photorealistic AI avatars for meetings, showcasing the rapid adoption of AI in everyday applications. As these tools become the new baseline, IT service providers must adapt by focusing on governance, compliance, and security to ensure that their clients can safely navigate this evolving landscape.

Four things to know today

00:00 Compliance Blind Spots, Political Delays, and AI Experiments Show Why IT Providers Must Be the Steady Hand

05:02 Generative AI Fuels Phishing and Supply Chain Attacks While SonicWall and WatchGuard Struggle With Flaws

09:08 Notion, Google, and Zoom Push AI Deeper Into Everyday Tools

12:43 Ingram Micro Credits Xvantage for Ransomware Recovery, but MSPs Should Focus on Client Continuity

This is the Business of Tech.

Supported by: scalepad

Webinar: https://bit.ly/msprmail

💼 All Our Sponsors

Support the vendors who support the show:

👉 https://businessof.tech/sponsors/

🚀 Join Business of Tech Plus

Get exclusive access to investigative reports, vendor analysis, leadership briefings, and more.

👉 https://businessof.tech/plus

🎧 Subscribe to the Business of Tech

Want the show on your favorite podcast app or prefer the written versions of each story?

📲 https://www.businessof.tech/subscribe

📰 Story Links & Sources

Looking for the links from today’s stories?

Every episode script — with full source links — is posted at:

🌐 https://www.businessof.tech

🎙 Want to Be a Guest?

Pitch your story or appear on Business of Tech: Daily 10-Minute IT Services Insights:

💬 https://www.podmatch.com/hostdetailpreview/businessoftech

🔗 Follow Business of Tech

LinkedIn: https://www.linkedin.com/company/28908079

YouTube: https://youtube.com/mspradio

Bluesky: https://bsky.app/profile/businessof.tech

Instagram: https://www.instagram.com/mspradio

TikTok: https://www.tiktok.com/@businessoftech

Facebook: https://www.facebook.com/mspradionews

Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

  continue reading

1784 에피소드

모든 에피소드

×
 
Loading …

플레이어 FM에 오신것을 환영합니다!

플레이어 FM은 웹에서 고품질 팟캐스트를 검색하여 지금 바로 즐길 수 있도록 합니다. 최고의 팟캐스트 앱이며 Android, iPhone 및 웹에서도 작동합니다. 장치 간 구독 동기화를 위해 가입하세요.

 

빠른 참조 가이드

탐색하는 동안 이 프로그램을 들어보세요.
재생