Home Top Ad

Responsive Ads Here

Microsoft completes its EU Data Boundary project EU cloud data will now be stored in the EU Meta previously received a fine from the EU...

Microsoft completes EU cloud sovereignty project, letting Europe-based cloud customers store and process data in the EU


  • Microsoft completes its EU Data Boundary project
  • EU cloud data will now be stored in the EU
  • Meta previously received a fine from the EU for storing data in the US

Microsoft Cloud customers in the EU will now be able to store and process their data within the continent after the company finally completed a major project.

In an announcement, Microsoft said its new EU Data Boundary project will mean customers can now store professional services data from “technical support interactions” for core cloud services within EFTA and the EU.

Previously, Microsoft Cloud customers had their data sent to the US, which raised privacy concerns from the EU.

Greater control

The announcement is the completion of a “massive, multi-year” project, to fulfill Microsoft’s goals of providing a solution which processes and stores customer data.

It will include, "customer data and pseudonymized personal data for Microsoft core cloud services — including Microsoft 365, Dynamics 365, Power Platform, and most Azure services — within the EU and EFTA regions.”

The project initially launched in January 2023, with the first phase focusing on core services. Phase 2 expanded the scope of the EU Data Boundary to include “pseudonymized personal data”, and now in this final phase, Microsoft Cloud sovereignty gives customers more control, transparency, and accountability through European Cloud principles.

Microsoft says it has invested over $20 billion in AI and cloud infrastructure to meet the growing demand and “expand local options”.

EU regulators have previously raised concerns over how Microsoft processes the data of cloud service users, and Microsoft is not the only target. Meta received a giant $1.3 billion fine, and was ordered to stop transferring EU data to the US.

The requirement to stop the storage of personal data of EU individuals would be a “massive undertaking to carry out, financially, technically and logistically," said Nigel Jones, co-founder of the Privacy Compliance Hub, so it’s no surprise this project from Microsoft took over two years to complete.

You might also like



from Latest from TechRadar US in News,opinion https://ift.tt/0WitIp8

0 coment�rios:

OpenAI has launched GPT-4.5, but only for ChatGPT Pro users right now. Plus users get it next week GPT-4.5 is supposedly smarter and mor...

ChatGPT-4.5 is here for Pro users now and Plus users next week, and I can't wait to try it


  • OpenAI has launched GPT-4.5, but only for ChatGPT Pro users right now. Plus users get it next week
  • GPT-4.5 is supposedly smarter and more emotionally intuitive than earlier AI models but lack deep reasoning power
  • OpenAI claims GPT-4.5 will provide better conversations and fewer hallucinations than ever

OpenAI has officially launched GPT-4.5, the most advanced version of its AI models, but it has no deep reasoning ability, because it's designed to be an all-purpose model. The latest model is available on ChatGPT, though for now, you'll need to be a Pro subscriber to access it.

The model is being rolled out as a “research preview,” which means it's imperfect, and OpenAI hopes users will help sort out any bugs or awkwardness. Even so, the company claims early testers report that GPT-4.5 feels more natural, intuitive, and emotionally intelligent. This is a welcome upgrade for those of us who have ever asked ChatGPT for information and felt like the response was just an outdated Wikipedia page.

GPT-4.5 is supposed to be even better at understanding context and recognizing social cues than its predecessors. The overall feeling is supposedly all but indistinguishable from chatting with a real person. It certainly seems to have impressed OpenAI CEO Sam Altman, who called it "the first model that feels like talking to a thoughtful person" in a post on X. Altman added that GPT-4.5 will come to ChatGPT Plus and Team subscribers next week, but you'll need to pay $200 a month to play with it for now.

Fewer hallucinations, more empathy

Notably, GPT-4.5 is not only supposedly smarter and more creative, but it should also produce fewer hallucinations. That last part is particularly important because hallucinations were often a sticking point for tentative ChatGPT users who didn't want to rely on a chatbot that might confidently make things up. Performance-wise, GPT-4.5 is supposed to be a big step up and really good with general knowledge. However, that doesn't mean it can handle coding and problem-solving as well as OpenAI's o1 and o3 models or rival options like DeepSeek’s R1.

Instead, GPT-4.5 specializes in empathy, with a high emotional quotient (EQ). AI still can’t feel things, but GPT-4.5 is supposed to be better at picking up on nuance. If you’re venting about a bad day, it won’t just reply, "I’m sorry you feel that way.” Instead, it’s designed to offer more thoughtful responses. Whether that makes it feel more like a conversation partner or just a particularly well-trained customer service bot remains to be seen. As for how to measure the EQ, OpenAI quite literally depended on "vibes."

"By vibes, really mean the model's EQ, how collaborative it feels and how warm its tone is," OpenAI engineer Rapha Gontijo Lopes explained in a livestream demonstration of GPT-4.5. "We measured this by selecting an opinionated set of prompts and screening our trainers for the ones that most align with our vibes."

If you’re a ChatGPT Pro user, you’ll be among the first to see whether GPT-4.5 truly has the vibes of a human and lives up to the hype. If you're not spending quite that much, you'll get a chance soon enough. Either way, with Amazon announcing a more chatty, AI-powered Alexa+ yesterday, the AI arms race just heated up again, and this time it's looking like the chatbots will be able to mimic how you feel more realistically than ever.

You might also like



from Latest from TechRadar US in News,opinion https://ift.tt/3botlRE

0 coment�rios:

Oscar Wilde once said, "Life imitates art far more than art imitates life." Let’s hope that isn’t true when it comes to the Netfl...

Fact vs. fiction: dissecting the improbability of a Zero-Day doomsday scenario

Oscar Wilde once said, "Life imitates art far more than art imitates life." Let’s hope that isn’t true when it comes to the Netflix series Zero Day, which has just started airing. This political thriller stars Robert De Niro and Angela Bassett, whose characters lead the investigation and response efforts after a devastating cyberattack causes massive casualties, chaos and hardship across the United States.

Hollywood Taps into Our Fears

While audiences often joke that Hollywood keeps recycling the same storylines, writers have no trouble tapping into the public’s deepest fears. Over the past decade, we’ve seen countless films and TV shows explore unsettling topics like pandemics, EMP attacks and the existential threat of AI. As humans, we fear things that we don’t fully understand but that could pose a threat. That is because uncertainty breeds fear.

It’s only natural, then, that cyberattacks have become the latest fodder for gripping on-screen dramas. Even if the average Netflix viewer isn’t familiar with the technical details of how cyberattacks are carried out, they’re acutely aware of their growing frequency and severity. Millions of Americans have had their data exposed in attacks, and while they may not fully understand what ransomware is, they know it isn’t good.

Could Such an Attack Really Happen?

While the critical reception of Zero Day remains to be seen, one thing is certain: viewers will debate the plausibility of the events unfolding on their screens. Could a devastating attack like that actually happen? It’s technically possible, but the risk is similar to the remote chance of a civilization-ending asteroid strike (a scenario that has itself inspired more than one movie).

Why? Well, while it is one thing to bring down the business operations of a single entity such as Colonial Pipeline, MGM Resorts or Halliburton, executing a coordinated attack on an entire nation's critical infrastructure is an entirely different challenge. There are multiple reasons:

1. A broadscale attack would require a vastly more complex and coordinated effort. Critical infrastructure organizations include everything from power plants to transportation networks to healthcare providers, and these sectors employ different security protocols, procedures and technologies. Therefore, it would be very difficult for attackers to develop a one-size-fits-all approach.

2. Unlike a single organization, national infrastructure is managed by a mix of public and private entities, making it harder to exploit a common vulnerability.

3. Many critical infrastructure systems have built-in redundancies and resilience measures to withstand localized failures or attacks, making it more difficult to cause widespread disruption.

Other Deterrents: Time, Scale and Retaliation

Let's consider possible initiators for such an attack. Today, only the largest cybercriminal groups may have the skills and resources for it. However, they are driven by financial gain. They would see no sense in investing their efforts with seemingly no future benefit while having dozens of proven methods to monetize their activities, from business email compromise to ransomware attacks.

Another possible threat actor, hacktivists driven by social or political agendas, may have enough motivation, but they have no resources for a large-scale coordinated effort spanning multiple years. The Netflix screenplay writers will surely come up with an unexpected twist in the plot, but in reality, it could only be a nation-state cyber operation.

Cyberattacking another nation’s civilian infrastructure is an assault on all its citizens. In today's digital world, such a move would be considered an act of war and spur an intense global manhunt for the perpetrators. While some nation-states eagerly perform espionage and reconnaissance campaigns, the stakes would be too high for any of them to risk the wrath of a superpower with a wealth of responses in their arsenal. The potential for escalation to conventional warfare serves as a powerful deterrent against any large-scale cyberattacks.

Reducing Risk Remains Imperative

Even though the odds of a devastating asteroid collision are remote, NASA still actively works to mitigate the risk through planetary defense initiatives. Similarly, even though a cyberattack like the one depicted in Zero Day is unrealistic, it’s essential for critical infrastructure organizations to continue bolstering their defense and response postures.

Fortunately, governments worldwide are not leaving these organizations to fend for themselves when it comes to cybersecurity. National-level critical infrastructure is now under continuous monitoring by government agencies and specialized security organizations to speed threat detection and response. In the U.S., the Cybersecurity and Infrastructure Security Agency (CISA) plays a key role in overseeing cybersecurity efforts and coordinating protections across both public and private sectors, helping to ensure that critical systems are fortified against evolving threats.

In addition, government agencies and critical infrastructure organizations have worked together to establish emergency response teams capable of quickly isolating and neutralizing widespread cyber threats.

The Bottom Line

Hollywood excels at creating TV shows and movies that explore “what if” scenarios, and cybersecurity is a natural topic to inspire writers today. There’s an old adage that “TV holds up a mirror to our society.” In the case of Zero Day, this is only partly true: The show does provide a solid representation of public fear around cyberattacks, but it does not accurately reflect the reality that such a devastating incident is actually highly improbable.

Learn more about cybersecurity with the best online cybersecurity courses.

This article was produced as part of TechRadarPro's Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro



from Latest from TechRadar US in News,opinion https://ift.tt/3FXKuge

0 coment�rios:

Final ZE3000 SV launch today, for $99.99 / £89.99 (about AU$180) New 10mm dynamic drivers with pressure optimization and ANC 7-band EQ,...

One of the most underrated headphones makers just launched new cheap ANC wireless earbuds, and I'm really looking forward to these


  • Final ZE3000 SV launch today, for $99.99 / £89.99 (about AU$180)
  • New 10mm dynamic drivers with pressure optimization and ANC
  • 7-band EQ, gaming mode and multi-point pairing

Underrated audio expert Final Audio has announced a new version of its ZE3000 true wireless earbuds, the Final ZE3000 SV. These aren't just a minor refresh: they've got brand new drivers and active noise cancelling too.

We like Final's headphones a lot, but they're not as well-known as they should be. The Final Audio UX3000 over-ears got the full five stars in our review and so did the affordable wired in-ears, the Final VR500. And we gave the Final ZE8000 MK2 earbuds four and a half stars out of five. So I'm intrigued by these, because they're promising a lot of performance for not very much money.

Final ZE3000 SV ANC earbuds

The new earbuds feature new 10mm drivers, Final's f-Core SV. (Image credit: Final Audio)

Final ZE3000 SV: key features and pricing

There are three key new features in these buds. The first is the new f-Core SV drivers, which are 10mm dynamic drivers – a significant increase from the previous 6mm drivers. Final says that the drivers have been designed to fully utilize the acoustic space inside the earbuds "without the need for equalization."

The second new feature is called the f-LINK Port. It's been carefully created to optimize the pressure inside the earbuds while still retaining waterproofing, and Final promises serious bass as a result.

And thirdly there's Comfort ANC, Final's latest version of active noise cancellation. The promise here is effective ANC without that weird pressure feeling you can sometimes get from ANC buds.

There's also a sub-60ms low latency gaming mode, multi-point connectivity and a seven-band equalizer in the companion app. There's support for LDAC hi-res audio up to 96kHz/24-bit, and battery life is a promised seven hours from the buds and 28 including the charging case. That's with ANC on, so is above average.

The new buds will be available from today, February 27, with a price tag of $99.99 / £89.99 / about AU$180 – we look forward to seeing how they compare to the best budget earbuds soon.

You might also like



from Latest from TechRadar US in News,opinion https://ift.tt/qJRGWv6

0 coment�rios:

Ransomware has been becoming an increasingly common problem in recent years for organizations, regardless of size, sector or location. Inde...

Should ransomware payments be illegal?

Ransomware has been becoming an increasingly common problem in recent years for organizations, regardless of size, sector or location. Indeed, Netwrix’s 2024 Hybrid Security Trends Report revealed that malware attacks like ransomware are one the three most common types of security incidents that organizations experienced in the last year. According to the Information Commissioner’s Office report, in 2023 organizations in Britain reported more data breaches due to ransomware attacks than ever before.

In response to this threat, proposals to make ransomware payments illegal have been gaining traction. For example, earlier this year, Ciaran Martin, ex-CEO of the UK National Cyber Security Centre, called for a ransomware payment ban. The reasoning is that if ransomware payments were illegal, organizations would stop making them, so malicious actors would no longer have an incentive to carry out ransomware attacks.

But is this approach really a viable solution to the scourge of ransomware?

The moral imperative in some ransomware situations

Ransomware is clearly different from cases of physical extortion like kidnapping and hostage situations. But a ransomware attack can still pose a serious danger to human lives. Notably, an attack on critical national infrastructure (CNI), such as hospitals and other healthcare facilities, can put patients’ lives at risk. In June 2024, Synnovis, a blood test provider for major London hospitals, fell victim to a ransomware attack that resulted in cancellation or postponing over 1600 operations and outpatient appointments. In such cases, it’s much harder to say that paying the ransom should be prohibited by law.

Moreover, cybercriminals quickly adapt to changing circumstances. If legal limitations are put into effect, threat actors will likely find ways to overcome them quite swiftly. Ultimately, banning ransom payments could push business leaders into further moral conundrums while under pressure.

The possibility of reduced reporting of ransomware incidents

In July the UK Government announced their intention to introduce mandatory reporting of all ransomware incidents as a part of the Cyber Security and Resilience Bill. Thus, the Government prioritized transparency of the ransomware incidents over an attempt to completely ban them.

Indeed, a well-executed ransomware attack can potentially hinder the victim’s business operations to the point of near bankruptcy. Under the proposed new regulations, decision-makers would be expected to report the incident and not pay the ransom. But would they take that path, given that their livelihood, and the livelihood of many others within the organization, hang in the balance? Or might some organizations choose to pay the ransom without informing government agencies of the attack?

We have to remember that the latter option is a viable choice, and it has ramifications beyond the organization that makes it. Not reporting the incident reduces visibility in cybercriminals' activity, which in turn affects the ability of law enforcement and software vendors to take appropriate steps in response. Without all the information, addressing the challenge of ransomware will become much more difficult.

The banking industry experience — a better way forward?

Various risks are inherent in the nature of the banking industry, and the sector has developed ways to mitigate them. For example, years ago, the main threat was a physical bank robbery, so banks reduced cash handling and installed security cameras, alarm systems and, finally, time-lock safes. Adopting the right security measures is still essential for banks to keep their licenses today.

Following this example, governments could create cybersecurity benchmarks and make risk mitigation strategies the norm for other high-risk industries like energy, manufacturing and healthcare. With standards in place, organizations would have appropriate guidance for establishing an efficient strategy against the threat of ransomware.

Additionally, law enforcement worldwide has a crucial role to play when it comes to collaborating to take down ransomware networks. The recent dismantling of the ransomware gang LockBit performed by the National Crime Agency, FBI, and international partners from nine other countries proves the effectiveness of such collaboration. Government institutions from all over the world released a cybersecurity advisory that summarized LockBit’s tools and tactics. That work resulted in the group's attack assets being seized, which has made it difficult for them to operate.

Looking ahead: how to combat the threat of ransomware

Ransomware continues to cause significant damage to organizations worldwide, and it is natural for governments to consider legislation that could help reduce the threat. However, denying victim companies the option of paying a ransom to restore their data and operations is not a practical solution. Instead, organizations must prioritize improving their cybersecurity measures, while government departments should increase their vigilance, assistance and investigations.

We've listed the best small and medium business (SMB) firewall software.

This article was produced as part of TechRadarPro's Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro



from Latest from TechRadar US in News,opinion https://ift.tt/oZTiSMk

0 coment�rios:

As data privacy laws evolve and the demand for transparency grows, privacy offices are increasingly burdened with the rising cost of proces...

The hidden costs of data subject access requests (DSARs) on privacy

As data privacy laws evolve and the demand for transparency grows, privacy offices are increasingly burdened with the rising cost of processing Data Subject Access Requests (DSARs). In fact, a 2024 survey indicated a staggering 246% increase in DSARs over the past two years. And they’re costing companies big time – to the tune of $1.5k per request. For offices that handle these privacy requests manually, the costs are incremental. What began as a regulatory obligation to grant individuals access to their personal data has ballooned into a costly and resource-draining task for privacy teams.

From labor-intensive manual reviews to the complexity of identifying, retrieving, and securely delivering data, DSARs require significant investments in both technology and personnel. The challenge lies not only in complying with these legal requirements but also in maintaining the balance between operational efficiency and safeguarding the personal data they are entrusted with.

But what actually is a DSAR – and why are they causing such a stir? Let’s dive in.

Why should businesses care about rising DSARs, anyway?

A DSAR is a legal right granted to individuals under data privacy regulations – such as the GDPR in the EU or CCPA in California – that allows them to request access to their personal data held by an organization. Essentially, it’s a way for people to understand what data is being collected about them, how it’s being used, and to ensure their privacy rights are respected.

When someone submits a DSAR, an organization must provide a comprehensive report on all the data they hold on that individual. This could include everything from personal details to browsing history, transaction records, or even interactions with customer service.

For privacy teams (especially those that process these requests manually) DSARs can become a complex and resource-intensive process. The challenge is not just in identifying and retrieving the right data, but also ensuring it’s done securely, within the required timeframes, and in compliance with the law – which becomes more and more challenging as new regulations appear across the globe.

In some jurisdictions like Chile, with few legacy protections, new laws are created to provide for additional individual rights. Meanwhile, the United States continues multiplying the number of data subjects with DSAR rights and adding to the list of available rights. Still other authorities have increased enforcement of existing laws, including on topics related to DSAR handling.

Public awareness is also a driving force behind this trend. With data breaches on the rise (up 78% in 2023 alone) consumers are more informed about the risks their personal data faces. Increasing media attention, stricter breach notification laws, and high-profile enforcement actions are making consumers more cautious and proactive.

Compliance isn’t just ethical, it’s economical

Meeting DSAR requirements can set your business apart by reinforcing your reputation as an ethical, customer-centric organization. Customers are more likely to trust companies that take their privacy seriously. Being proactive in addressing DSARs and offering users easy access to their data builds credibility and strengthens brand loyalty. What’s more, businesses that excel in DSAR compliance not only minimize the risk of fines and legal penalties, but they also foster a culture of transparency that can lead to higher customer satisfaction and retention rates.

To turn DSAR compliance into a strategic advantage, here are three actionable tips businesses can implement to safeguard customer data and stay ahead of the competition:

Adopt Data Minimization and Secure Storage Practices: One of the best ways to reduce the burden of responding to DSARs is to minimize the amount of personal data collected in the first place. By adopting data minimization principles (that is, only collecting the data that’s necessary and for the minimum amount of time) businesses limit the scope of DSARs and reduce the risks associated with data breaches. Additionally, secure storage practices, such as encrypting sensitive data and using access controls, can help prevent unauthorized access while DSARs are being processed.

Create Clear, User-Friendly DSAR Processes: Make it as easy as possible for customers to submit DSARs by offering easy-to-read instructions and multiple channels for requests. Whether it’s through an online portal, customer service team, or dedicated privacy email address, ensuring that the process is simple and transparent encourages individuals to take advantage of their rights. Timely and clear responses, coupled with transparency about how their data is being used, can further cement your organization as a trusted entity in the eyes of your customers.

Implement Automated Data Mapping and Retrieval Systems: Manually processing DSARs can be inefficient, error prone, and difficult to scale. By investing in automated tools that help map out where personal data resides within an organization, businesses can dramatically speed up the process of retrieving that data when a request is made. Not only does this streamline compliance, but it also helps ensure that the data you provide is complete and accurate — critical for building trust.

By embracing DSAR compliance not just as a regulatory requirement but as a business opportunity, companies can position themselves as leaders in privacy and data ethics. Because the reality is: the organizations that are ethical, responsible and accountable for their customers' personal information are the organizations who are likely to differentiate their brand from the competition.

We've compiled a list of the best data loss prevention services.

This article was produced as part of TechRadarPro's Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro



from Latest from TechRadar US in News,opinion https://ift.tt/bgjLaT1

0 coment�rios:

One in four UK businesses lack a documented strategy to address generative AI (GenAI) threats, according to research from Ivanti. Let that ...

The truth about GenAI security: your business can't afford to “wait and see”

One in four UK businesses lack a documented strategy to address generative AI (GenAI) threats, according to research from Ivanti. Let that sink in for a moment. Would we accept the same casual approach to, say, workplace health and safety? Likely not. Yet here we are, watching a technological revolution unfold while many organizations take a dangerously passive stance toward securing it.

The speed of GenAI's evolution has caught many security teams flat-footed. While 47% of security professionals in the UK view GenAI as a net positive for cybersecurity — and they're right to see its potential — this optimism sometimes masks a troubling lack of preparation.

Consider this eyebrow-raising reality check: Nearly half of UK IT and security professionals (49%) believe phishing will become a greater threat due to GenAI. And I’d argue they’re right to be concerned. The problem is that their concern isn’t translating into action. A quarter of organizations haven't documented any strategy to address these risks. We're seeing unprecedented technological advancement coupled with unprecedented organizational inertia. It's not great.

The data silo trap

The challenge goes deeper than just keeping pace with GenAI's evolution. A remarkable 72% of organizations report that their IT and security data are siloed across systems. These fragments of critical security information might as well be locked in separate vaults. And 63% say these silos actively slow their security response times.

Think about that. In an era where AI-powered threats can evolve and spread at machine speed, many security teams are still piecing together threat data from disparate systems like a jigsaw puzzle. That's not just inefficient — it's downright dangerous.

The training paradox

Most security teams recognize that human error is still a prime vulnerability. That's why 57% have turned to anti-phishing training as their first line of defense against sophisticated social-engineering attacks. It's currently the most popular protective measure against AI-driven threats.

I’m the first to assert that anti-phishing training is critical, particularly given how often well-meaning employees unintentionally create pathways for exploitation by falling for increasingly sophisticated phishing schemes.

But strong employee training is far from sufficient. It means using yesterday’s tools to fight today’s threats. Emphasizing best practices to combat AI threats is sort of like using a personal floatation device to keep safe while lounging in shark-infested waters. Should you wear the personal flotation device? Certainly. But it won’t save you from the real threat.

The good news is that cybersecurity professionals are aware of the gaps left by traditional anti-phishing defenses. Only 32% believe this training is "very effective" against AI-powered social engineering attacks. However, and I risk sounding like a broken record here, the concern and awareness aren’t translating into action.

Beyond traditional defenses

As GenAI capabilities expand, they create new attack surfaces faster than traditional security measures can adapt. As I’ve argued, the old playbook of reactive security measures and siloed defenses simply won't cut it anymore. What will cut it? In short, a holistic approach to exposure management that addresses both immediate threats and systemic vulnerabilities.

What does this mean in practice? Security teams need to rethink their approach altogether, and that means addressing key elements such as the following:

Continuous monitoring and assessment

Traditional periodic security assessments can't keep pace with AI-driven threats. Organizations need real-time visibility across their entire attack surface, from traditional assets to new AI tools. This means moving beyond scheduled vulnerability scans to implement continuous monitoring that can detect and respond to threats as they emerge.

Breaking down data silos

Those fragmented security and IT data stores? They're not just an inconvenience—they're a liability. With 63% of organizations reporting slower security responses due to siloed data, the need for unified visibility isn't just a nice-to-have—it's a critical security requirement when facing sophisticated AI-powered threats that can exploit gaps between systems.

Evolving beyond basic training

Remember — security awareness training is important, but it can't be your only defense. We need to augment human awareness with sophisticated detection and response capabilities. Fight fire with fire.

Data-driven security responses

When facing AI-powered threats, gut instinct and experience aren't enough. Security teams need comprehensive data visibility to spot patterns and anomalies that signal emerging threats. This means breaking down those data silos that 72% of organizations currently struggle with and implementing systems that can provide unified threat visibility.

What are you waiting for?

GenAI isn't just another technology trend to monitor — it's actively reshaping the threat landscape. While 47% of security professionals view GenAI positively, this optimism must be matched with concrete action.

Organizations can't afford to take a wait-and-see approach to GenAI security. The technology's rapid evolution, combined with existing challenges like data silos and training limitations, necessitates an intentional, comprehensive, layered and proactive stance.

Those who delay implementing comprehensive security strategies are already falling behind, and since GenAI continues to shapeshift and grow in sophistication by the day, falling even a little bit behind makes it prohibitively difficult to catch up.

The time for documented strategies, unified security visibility and enhanced threat detection isn't coming — it's here. It’s time to stop wondering whether your organization will need to adapt to AI-driven security challenges, and start focusing on how quickly and effectively you can do it.

A final plea: don’t wait until after you face a serious breach. In this case, “wait and see” translates to “wait and pay the price.”

We've compiled a list of the best firewall software.

This article was produced as part of TechRadarPro's Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro



from Latest from TechRadar US in News,opinion https://ift.tt/NoMqz4Z

0 coment�rios:

March 2025 is going to be a big month for Apple TV+ . The increasingly popular streaming platform has had some big wins so far this year, w...

Everything new on Apple TV+ in March 2025: Severance season 2 finale, Dope Thief, The Studio, and more

March 2025 is going to be a big month for Apple TV+. The increasingly popular streaming platform has had some big wins so far this year, with Severance season 2 dominating online TV show-based discussions and new movies like The Gorge earning mostly positive reviews from fans and critics alike. The tech giant, then, will hope the third month of 2025 is as productive for it as the first two were.

It looks like it will be, too. The final three episodes of Severance's sophomore season notwithstanding, there's plenty to look forward to on Apple's streaming service in March, including the debut of some exciting new Apple TV Originals. Here, then, is everything that's coming to one of the best streaming services between March 1 and 31.

March 5

A promo for Prime Target, showing main character Edward reading a book

Prime Target's eighth and final episode is out in early March (Image credit: Apple TV Plus)
  • Berlin ER episode 3
  • Love You to Death episode 6
  • Mythic Quest season 4 episode 7
  • Prime Target episode 8

March 7

Sophie sitting down and looking worried in Surfaces season 2

Surface season 2 continues to pose more questions than it answers (Image credit: Apple TV Plus)
  • Severance season 2 episode 8
  • Surface season 2 episode 3

March 12

Raul and Marta smiling while taking a picture on an iPhone in Love You to Death

Love You to Death's final episode airs in mid-March (Image credit: Apple TV Plus)
  • Berlin ER episode 4
  • Love You to Death episode 7
  • Mythic Quest season 4 episode 8

March 14

Two characters walking down a street in Apple's Dope Thief TV series

Dope Thief's first two episodes will launch on Apple TV Plus in mid-March (Image credit: Apple TV Plus)
  • Dope Thief episodes 1 and 2
  • Severance season 2 episode 9
  • Surface season 2 episode 4

March 19

Two doctors standing in a hospital hallway in Berlin ER

Berlin ER is a German-language medical drama that began airing in February (Image credit: Apple TV Plus)
  • Berlin ER episode 5
  • Mythic Quest season 4 episode 9

March 21

Helly R and Mark S look shocked in Severance season 2

How will Severance season 2 end in late March? (Image credit: Apple TV Plus)
  • Be@rbrick episodes 1 to 13
  • Dope Thief episode 3
  • Severance season 2 episode 10
  • Surface season 2 episode 5

March 26

Four TV executives sitting and standing around a table in Apple TV Plus show The Studio

Seth Rogen's new TV series The Studio arrives before the end of March (Image credit: Apple TV Plus)
  • Berlin ER episode 6
  • Mythic Quest season 4 episode 10
  • Side Quest episodes 1 to 4
  • The Studio episodes 1 and 2

March 28

Gugu Mbatha-Raw standing in a dark corridor in Surface season 2

Surface season 2 passes its midway point in late March (Image credit: Apple TV Plus)
  • Dope Thief episode 4
  • Surface season 2 episode 6

For more Apple TV Plus coverage, read our guides on the best Apple TV Plus shows, best Apple TV Plus movies, Foundation season 3, and Silo season 3.



from Latest from TechRadar US in News,opinion https://ift.tt/qvjctUb

0 coment�rios:

The modern business is an intricate fabric of IT infrastructure , integrating networks and technologies to support its overall mission. A ...

Is your business primed to respond to downtime?

The modern business is an intricate fabric of IT infrastructure, integrating networks and technologies to support its overall mission.

A single point of failure can bring the entire system to a halt, causing significant downtime. During such outages, networks become inaccessible, preventing users from interacting with the organization’s systems. IT teams must then act swiftly to restore functionality, safeguarding against data loss, revenue loss, and damage to the company’s reputation.

On average, nearly $50 million in annual sales is being missed out because of downtime according to research from Splunk. Just by being more consistent and available than the competition, IT teams can create a competitive advantage through superior resilience and efficiency.

So, why are businesses still finding challenges in ensuring business continuity?

An environment of threats

The causes of downtime are complex, as businesses and their environments sometimes evolve in unexpected ways. Premises and digital infrastructure designed for specific outcomes may become outdated due to new technologies or priorities, leading to the creation of inefficiencies and blind spots.

According to a Databarracks survey, nearly a quarter of businesses (24%) suffered downtime as a result of a cyber incident last year, with a key threat being DDoS attacks.

GTT research revealed DDoS attacks are causing huge problems for organizations. In the first half of 2024, there was a 25% increase in multi-vector DDoS attacks recorded, with these threats continuing to escalate through the second half of the year. Addressing both malicious and non-malicious causes of downtime requires comprehensive, flexible strategies – relying on tactical responses to individual issues is no longer sufficient.

The (not-so) secret ingredients to business continuity

The first step in preventing downtime is assessing the network architecture. After all, you can’t defend what you can’t see. Enterprises should evaluate the importance and requirements of both redundant connectivity and high availability network designs as a strategy to mitigate brownouts and blackouts.

Mapping out an entire network, identifying tools and operations which are critical in delivering products or services, and those areas which are at a higher risk of attack or compromise lays the foundation for an effective downtime prevention strategy.

Once the network has been mapped, and core competencies have been recognized, ensuring that redundancy measures are in place allows business decision makers and IT teams sleep easier. Increasing redundancy for both hardware and traffic pathways mean that no single point of failure will completely shut down the organization, and if one area fails, data still has alternate routes to flow through.

Sites cannot be too overprovisioned when it comes to downtime prevention, but budgets typically limit the art of the possible. Look for solutions and partnerships that offer what is needed today but also offer the ability to make soft changes when needs shift. This ability means when there are shocks to the system, IT teams don’t have to rip and replace but can quickly enhance and solve without investing heavily in new in-house solutions.

What should never be missing from this network assessment is the maintenance of a good security posture. As addressed previously, DDoS attacks are only getting more common and are coming from more vectors than ever. DDoS mitigation technologies, such as the use of data scrubbing centers and traffic filtering, ensures any inbound traffic is analyzed and cleansed of any malicious packages before it reaches the users' network.

DDoS prevention strategies should consider the approach organizations take to attack detection. Either taking the responsibility of detection in-house and reacting to incidents after-the-fact or having an always-on proactive DDoS solution. Robust DDoS solutions don’t just mitigate attacks, but do so automatically, ideally in real-time, to prevent any possible downtime and maintain business continuity when targeted.

Leaving it to the experts

Once the network has been assessed, measures implemented, and teams briefed on their priorities – then what? All the ingredients for downtime prevention must come together in the right mix and be focused on the right areas to cater for the business’ specific needs.

The process of establishing these frameworks can be drawn out and arduous, which inevitably takes time away from business growth opportunities like R&D, service improvements or identifying efficiencies. Working with a partner can alleviate this stress and create room for growth in a secure environment.

Network monitoring for cyberattacks is a 24x7x365 task, this always-on state of constant vigilance can be a huge drain for IT security teams. By collaborating with seasoned managed service security providers (MSSPs), organizations can benefit from having "more eyes" monitoring their network architecture and corporate IT. MSSPs are able to instantly monitor and address any issues, freeing up internal IT staff to concentrate on making the best choices possible to maintain business continuity.

Downtime prevention is a competitive advantage

As customer expectations continue to rise and expect faster connectivity, the urgency to ensure business continuity has never been greater. Often the best way to illustrate the importance of downtime strategies is to put it into financial terms, securing leadership commitment by equating it with a loss of future income and brand depletion.

A company's business continuity and disaster recovery strategies will be unique to them, and the decision to concentrate their efforts internally or enlisting the help of partners depends on their size and needs. What matters, though, is that downtime prevention stays a priority. Businesses can reduce downtime and assure continuity by combining novel technologies and frameworks, to react quickly should the worst happen.

We've compiled a list of the best Disaster Recovery services.

This article was produced as part of TechRadarPro's Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro



from Latest from TechRadar US in News,opinion https://ift.tt/sXkP12A

0 coment�rios:

Infostealers are rapidly becoming one of the most dangerous tools in a hacker’s arsenal, particularly in environments where email remains ...

Infostealers on the rise: the latest concern for organizational defenses

Infostealers are rapidly becoming one of the most dangerous tools in a hacker’s arsenal, particularly in environments where email remains a primary communication channel for enterprises. At their core, infostealers are a type of trojan designed by malware authors to harvest sensitive data such as login credentials, financial information, system details, and personally identifiable information.

These malicious files are engineered to extract as much information as possible, operating quickly and stealthily. Once collected, the stolen data is sent to command-and-control servers, where it can be exploited for various malicious purposes.

Infostealers in the wild

Some research suggests infostealers hit up to 10,000 victims per day; however Forcepoint research teams have observed increased activity from various infostealers recently, targeting victims in a number of ways.

The first is VIPKeyLogger, which circulates through phishing campaigns as an attachment that takes the form of an archive or Microsoft Office files. This exfiltrates data using Instant Messaging telegrams services or dynamic DNS services. Opening the attachment leads to a sequence of events that ultimately ends up in a series of data exfiltration such as recording keystrokes, collecting information like clipboard data, screenshots, browser history, and more.

Strela Stealer is also circulated via phishing campaigns containing attachments which further contains obfuscated script, and on execution of script, it performs malicious activity and harvests sensitive information including usernames, passwords, and other email configuration details, sending it over Command & Control servers.

Lastly, Rhadamanthys stealer was circulated in the holiday season and masquerades as travel industry emails with malicious document attachments. Clicking the documents triggers a chain of downloads and obfuscated scripts to steal user credentials and cryptocurrency wallet data. This campaign resembles the earlier Agent Tesla attacks, but uses novel obfuscation techniques.

Needless to say, infostealers are prevalent and appear in a number of different formats, making them harder than ever to defend against, which begs the question – how can you protect against increasingly sophisticated infostealers?

Protection against infostealers

If it wasn’t already clear, the rise of infostealers emphasizes the need for a sophisticated and holistic approach towards defending your organisation. To work most effectively, that approach must combine essential security measures, such as multi-factor authentication, with a proactive mindset. Cybercriminals are continuously evolving their tactics, so organizations must too in order to stay ahead.

Businesses need to make common practice out of minimizing vulnerabilities by encrypting data at rest and in motion to ensure only authorized individuals have access to sensitive data. Data loss prevention (DLP) solutions for email can help enterprises get control over inbound and outbound threats by supporting virus and malware blocking, spam filtering, content filtering and email archiving. And, of course, by regularly updating and hosting security audits, organizations can better understand if their security measures are effective and where they are lacking.

However, arguably one of the most important parts of an organization's defense is its people. Employees must be aware of their role in organizational security. This includes the basics such as maintaining strong passwords and leveraging technologies like MFA, but should also include their ability to be constantly cyberaware. This means organisations have a role to play in ensuring employees know how to identify and act when faced with an attack, otherwise they have the potential to unknowingly bring the whole kingdom down from the inside. Human error can be the weakest link in the security chain, so it is important staff are educated.

Infostealers represent a growing and insidious threat in today’s digital era, preying on unprotected organizations and unknowing individuals. By combining strong technical defenses with a culture of security awareness, businesses can significantly reduce the risk of becoming a victim to these cyberattacks. When all is said and done, proactive prevention and informed employees are the ultimate line of defense.

We've compiled a list of the best business password managers.

This article was produced as part of TechRadarPro's Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro



from Latest from TechRadar US in News,opinion https://ift.tt/fixHpsK

0 coment�rios:

14.5Gbps read speeds make the 4600 a powerful bit of kit The SSD is found lacking compared to other Gen5 options AI performance capabil...

Like the Crucial T705 but more affordable? Micron 4600 PCIe Gen5 SSD comes painfully close to its award-winning sibling


  • 14.5Gbps read speeds make the 4600 a powerful bit of kit
  • The SSD is found lacking compared to other Gen5 options
  • AI performance capabilities make it a potential game changer

Micron’s new Gen5 SSD is a powerful piece of hardware which it says could be a game changer for accessibility.

The Micron 4600 PCIe Gen5 NVMe SSD caters to a range of potential users, from gamers and content creators to enterprises and professionals. Harnessing Micron’s G9 TLC NAND, the 4600 SSD marks the firm’s first Gen5 SSD and doubles the performance of its predecessor.

All told, this equates to sequential read speeds of 14.5 Gbps and write speeds of up to 12Gbps. Its performance on read speed places it high up the list of top-performing SSDs, but compared to the Crucial T705 SSD, it doesn't quite match up on the latter front.

AI performance in mind

The SSD also comes in a range of options, including 512GB, 1TB, 2TB, and 4TB capacities

Micron is keen to highlight the potential AI-applications for the new SSD, particularly in terms of user efficiency.

The company noted a user could load a large language model (LLM) from the SSD to DRAM in less than one second. That’s some serious performance for users working from AI PCs.

Elsewhere on the AI front, the SSD is capable of significantly reducing model loading times - up to 62%, according to Micron - compared to Gen4 SSD predecessors and boasts a 107% improvement in energy efficiency.

"With the 4600 NVMe SSD, users can load large language models in less than one second, enabling PC experiences in data-intensive applications, especially for AI,” said Prasad Alluri, vice president and general manager for Client Storage at Micron.

“As AI inference runs locally on the PC, the transition to Gen5 SSDs addresses the increased need for higher performance and energy efficiency.”

Wide-reaching applications

While Micron touted the SSD’s AI capabilities, the storage device also has applications across a wide range of fields.

Benchmark results compared to the PCIe Gen4 Micron 3500 SSD in media and entertainment applications shows a 61% performance improvement.

Life sciences and product development applications also show a 38% and 45% performance improvement respectively.

Gen5 SSDs are growing in popularity

The launch of the new SSD comes at a time when consumers and enterprises alike are demanding better performance, Micron noted.

The firm also expects Gen5 SSD technology will “grow rapidly in 2025 and 2026”, and its integration with other leading platforms could be a key appeal for users.

The 4600 is compatible with AMD’s Ryzen 9000 Series processors and Intel Core Ultra Desktop and Mobile (Series 2) processors, for example.

"AMD is excited to collaborate on the validation of the Micron 4600 NVMe SSD with our latest Ryzen family of processors," said Joe Macri, senior vice president and chief technology officer of compute and graphics at AMD.

"The Micron 4600 NVMe SSD is anticipated to deliver exceptional performance and a best-in-class user experience for the most demanding professional applications and high-speed gaming."

You might also like



from Latest from TechRadar US in News,opinion https://ift.tt/Ai6RGyK

0 coment�rios:

The Galaxy S25 Edge has appeared in a leaked video Specs were shown off alongside the design The video has since been pulled and is no ...

Leaked hands-on Samsung Galaxy S25 Edge video hints at its design and specs – and then disappears


  • The Galaxy S25 Edge has appeared in a leaked video
  • Specs were shown off alongside the design
  • The video has since been pulled and is no longer available

We've been impressed so far with the Samsung Galaxy S25 series (see our Samsung Galaxy S25 Ultra review, for example), and there's one more S25 phone yet to launch – the Samsung Galaxy S25 Edge, which just got shown off in a new hands-on video leak.

The video has now been pulled, but not before SamMobile, tipster @MaxJmb, and others got a look at it. In terms of the design of the handset, it matches up with the glimpse of the handset we got at the Samsung Unpacked event last month.

Included in the short clip was a shot of an app listing the specifications of the Samsung Galaxy S25 Edge: it looks like we're getting the Qualcomm Snapdragon 8 Elite chipset, 12GB of RAM, 256GB of storage, and a 4,000 mAh battery packed inside.

Three 12MP rear cameras are listed too, but due to a quirk of the diagnostics app being used, this doesn't rule out a 200MP primary camera – which would match the Galaxy S25 Ultra and which has been previously rumored.

Slimming down

Given what we know so far – and considering that earlier rumors called this phone the Samsung Galaxy S25 Slim – it seems clear that the thin form factor of this handset is going to be one of the key selling points.

It certainly looks thin, from the limited views we've had of it so far – but exactly how thin are we talking? A figure of 6.3 mm (without the camera bump) has been mentioned, which compares to 7.2 mm for the standard Galaxy S25 phone.

Of course, shrinking down a handset like this means less room for other components, including camera mechanisms, cooling chambers, and batteries. It'll be interesting to see the trade-offs made with the Galaxy S25 Edge, when it finally goes on sale.

That should be at some point later in the year. In the meantime, it looks as though thinness is becoming a trend: Oppo recently unveiled the world's thinnest foldable, while Apple is rumored to be busy working on the iPhone 17 Air.

You might also like



from Latest from TechRadar US in News,opinion https://ift.tt/zcP7WGD

0 coment�rios:

Nvidia has confirmed that approximately 1 in 200 of its RTX 5090 and RTX 5070 Ti GPUs have an issue with their graphics chips The proble...

Nvidia confirms 'rare issue' with some RTX 5090 and RTX 5070 Ti GPUs – here’s how to check if you’re affected and to get a replacement


  • Nvidia has confirmed that approximately 1 in 200 of its RTX 5090 and RTX 5070 Ti GPUs have an issue with their graphics chips
  • The problem is a loss of ROPs, a key element of the inner workings of the GPU
  • Nvidia says those with an affected graphics card should contact the maker to arrange a replacement

Following reports of some RTX 5090 GPUs failing to perform as well as they should in gaming, Nvidia has confirmed that there is an issue with the chips in the Blackwell flagship, as well as the newly arrived RTX 5070 Ti GPU.

This is a hardware-level problem, meaning it's a fault deep in the chip which can't be fixed, and it's slowing down these graphics cards by an appreciable (albeit variable) amount.

In a statement addressing the matter, Nvidia told The Verge: "We have identified a rare issue affecting less than 0.5% (half a percent) of GeForce RTX 5090 / 5090D and 5070 Ti GPUs which have one fewer ROP than specified.

"The average graphical performance impact is 4%, with no impact on AI and Compute workloads. Affected consumers can contact the board manufacturer for a replacement. The production anomaly has been corrected."

Your first question may well be: what's a ROP, then? ROP stands for Raster Operations Pipeline, and this is hardware that’s a key part of the process of rendering the graphics for your PC games. (It’s a lot more complicated than that, in reality, but that’s all you really need to know).

With fewer of those pipelines available to deal with the relevant graphics processing tasks during gameplay, unsurprisingly, performance is a bit slower.

Also, if you're wondering about the mentioned RTX 5090D, that's the variant of the Blackwell flagship sold in China, which was involved in the initial reports of this issue – notably the RTX 5070 Ti wasn't, though.

This whole episode unfolded yesterday, having first emerged courtesy of TechPowerUp’s review of a Zotac RTX 5090 Solid graphics card (via VideoCardz).

In its review, the tech site found that this third-party model was somehow underperforming versus an Nvidia RTX 5090 Founders Edition (the performance baseline used by TechPowerUp in gauging the relative power of the flagship GPU variants).

Indeed, the Zotac RTX 5090 was around 5% slower than Nvidia’s own model, while running at the same clock speeds, which obviously didn’t make much sense. Not until TechPowerUp investigated and found this wasn’t an issue pertaining to faulty cooling (or other likely-seeming root causes), but in fact that the Zotac GPU was missing ROPs.

The RTX 5090 graphics card was showing 168 ROPs enabled (in the GPU-Z utility) rather than the expected count (and official spec) of 176 ROPs.

All vendors are potentially affected by this gremlin in the works, of course, as this is an issue with the chips produced by Nvidia, and sent to third-party partners to be used in the manufacturing of their graphics cards. That was swiftly shown yesterday as reports started to come in, as folks started checking their boards for this issue.

While in its statement, Nvidia mentions the lack of one ROP, it is referring to one block of them, so as observed, the ROP count is reduced by eight (the number in a block) with graphics cards that have this issue.

An angry PC Gamer sat at their desk looking unhappy

(Image credit: ShutterStock)

How to check if your Blackwell GPU might be affected

To check your RTX 5090 or 5070 Ti, you can fire up a tool that peers deep into the innards of your hardware, monitoring and reporting back on multiple elements of the spec. Obviously what you’re looking for is the ROPs count, and that can be provided by GPU-Z as already mentioned, or an alternative utility like HWiNFO (and probably other software out there, no doubt).

In GPU-Z, you’ll find the ROPs number listed in the Graphics Card tab, on the seventh line down, over on the left-hand side (we’ve got an explainer here, if you want further details on GPU-Z). For the RTX 5090, the number should be 176, whereas 168 is what the impaired flagship models are showing. With the RTX 5070 Ti, the correct spec is 96 ROPs, so in theory, it will be reduced to 88 ROPs (but I haven't seen confirmation of that yet, so perhaps it could have less of an impact).

If you do have an RTX 5090 or 5070 Ti with this problem, how much will it affect you in practical terms? Well, that varies as I already mentioned, although as stated the average impact is a performance loss of something in the order of 5% (or thereabouts – Nvidia is saying 4%).

However, you may not notice any difference at all in some cases, as one game may use the mentioned pipelines (ROPs) more heavily, while another may hardly touch them at all. So some games could be slowed down by more than 5%, and others may have a negligible loss in frame rates (such a low impact you’d never be able to tell).

However, before you go thinking that maybe this isn't such a big deal after all, rest assured, it is. A fault like this should not have cleared quality assurance and made it into production hardware in the first place. And when you recall how much buyers have forked out for the RTX 5090 in particular – the MSRP is a true wallet-worrier, and many folks have overpaid beyond that – well, you can start to see how this is a big letdown.

If you have an RTX 5090 or RTX 5070 Ti, check your graphics card in GPU-Z as outlined above. If your model is showing a loss of ROPs, as advised by Nvidia, contact your board manufacturer and begin the process of having the graphics card replaced.

That could be a troublesome matter, though, for those who may have sold their old GPU when they upgraded (if they need to send the faulty Blackwell graphics card back, before receiving a new one – and are left with a gaming PC without an engine, essentially). The other worry is that it's not like fresh stock is going to be easy to come by, either, right now.

Future GPUs shouldn't suffer from this issue because as Nvidia observes, the 'production anomaly' here has been fixed, as you would hope.

You might also like...



from Latest from TechRadar US in News,opinion https://ift.tt/YuJd0gq

0 coment�rios:

Silo season 3: Key Information - Filming for season 3 begin in October 2024 in Hertfordshire and Enfield in the UK - Ashley Zuckerman a...

Silo season 3: Everything we know so far about the Apple TV Plus show

Silo season 3: Key Information

- Filming for season 3 begin in October 2024 in Hertfordshire and Enfield in the UK

- Ashley Zuckerman and Jessica Henwick have been announced as stars of season 3

- Season 3 will be based on Howey’s second book of the trilogy, Shift, which focuses on events 300 years ago that lead to the creation of the silos

- But unlike the book, season 3 is likely to run two concurrent timelines, so the action still remains on Juliette and the present day silos

- Season 3 could be released mid-2026

- The final season, season 4, is being filmed back-to-back with season 3, so the finale of the entire show will likely be within in the next two to three years

Silo season 3 is bound to be another big hit for dystopian TV viewing. Indeed, as the real world around us grows even more precarious and volatile by the day, there’s apparently nothing that we all seem to like better than to switch on the TV to watch some horrifying dystopian imaginations of how bad it could all really get.

And Silo – adapted from a trilogy of books by author Hugh Howey – is a show that does just that; imagining a world where 10,000 people live underground in silos under an authoritarian regime. Apple TV+ released the first series in May 2023, with Rebecca Ferguson as the the lead, Juliette Nichols, an engineer who starts to believe there’s a conspiracy in their society. A second season swiftly followed in November 2024, and with it wrapping up with an almighty cliffhanger on its finale episode on January 17, 2025, we’re here to tell you exactly what to expect from season three, which, as of October 2024, is already in production.

Here’s the cast who will be appearing in Silo season 3, what the plot might be, when the release date is and what the trailer will look like:

Silo season 3: does it have a release date?

Bernard Holland looking unhappy in Silo season 2

Bernard was not too happy about the cliffhanger at the end of Silo season 2 (Image credit: Apple TV Plus)

With the third season already deep into filming – they kicked off in October 2024 in Hertfordshire and Enfield, UK – the production is planning to film both season three and four back-to-back. After all, showrunner Graham Yost told The Wrap in January, the scripts have already been written a while ago: “All of season 2 was written before we had finished filming season 1. We had finished writing season 3 pretty much before the strike was called, and that’s while we were filming season 2. And we’ve written all of season 4. So, because we have to plan, there’s no hiatus. We’re shutting down for three months of pre-production for season 4, and then we’re going to roll right in.”

So what does that mean for release dates? Well, there was almost exactly 18 months between season 1 and 2, so by that same timeline, we might expect to see season 3 on screens in or around May 2026, but that could change according to how filming and post-production plays out. But let’s assume the first ep will likely air by mid-2026.

Silo season 3: Trailer

It’s a little early to be thinking about trailers for season 3 so far, but as soon as a teaser trailer drops, we’ll update this page.

Silo season 3: has the cast been confirmed?

We can expect to see some familiar faces returning, but some new talent has already been added to the roster. In January 2025, Deadline revealed that Succession’s Ashley Zukerman and Jessica Henwick (who starred in Huntington and The Royal Hotel) had been signed up for the full season, after appearing in the final scene of season 2. “Zukerman will star as Daniel, a young and hungry congressman,” the publication confirmed, adding: “Henwick will star as Helen, a whip-smart reporter.”

Elsewhere, we think this is how the cast might shape up for the rest of Silo s3:

  • Rebecca Ferguson as Juliette, obviously
  • Steve Zahn as Solo/Jimmy
  • Tim Robbins as Bernard Holland
  • Common as Robert Sims
  • Alexandria Riley as Camille Sims
  • Harriet Walter as Martha Walker
  • Claire Perkins as Carla
  • Chinaza Uche as Paul Billings
  • Rick Gomez as Patrick Kennedy
  • Shane McRae as Knox
  • Remmie Miller as Shirley
  • Avi Nash as Lukas Kyle

Juliette Nichols stares at something off camera in a dimly lit area in Silo on Apple TV Plus

There's many more mysteries to unravel about the origin stories of the silos (Image credit: Apple TV Plus)

Silo season 3: what do we know about the plot?

Season two was left on an agonising cliff-hanger, as both Juliette and Bernard were trapped in a fire in an airlock; while Camille Sims was chosen by the algorithm to be the only member of her family to stay in the vault, and be the head of I.T.

And, as mentioned above, we left the dystopian land of the silos at the end of season 2 in a flash-back scene, set in Washington, where a reporter (Helen) asks the congressman (Daniel) about the possibility of the US retaliating against Iran for having detonated a dirty bomb in America.

But that epilogue scene, reveals that the Pez candy dispenser – seen as a sign of resistance, hundreds of years in the future – was once given to Helen by Daniel, and the link between this gift, in this moment in time, and how it relates to the Flamekeepers – and George Wilkins, who comes in to possession of the item – will likely be explored. Is Helen one of the first to head to a silo? Is she the original Flamekeeper?

Yost told Time: “We get into the origin story [of the Pez], but we’re also deep into our silo world. There’ll also be more to learn about the dirty bomb. In Season 3, we’ll find out what happened to Silo 17—the silo Juliette spent the vast majority of this season in – and by the end of Season 3, you’ll know what happened to the people who went outside of 17, and the why and how of all of that. That’s a big thing that will get solved—and how the whole thing began.”

Season three will focus on the second of Howey’s trilogy, Shift, in which the storyline jumps back 300 years to the political events that led to the creation of the silos. However, it’s likely that the series will run two concurrent timelines, so viewers can carry on the present day story with Juliette – and find out if she survives.

For more Apple TV Plus-related coverage, read our guides on Severance season 2, Ted Lasso season 4, and Slow Horses season 5.



from Latest from TechRadar US in News,opinion https://ift.tt/65rmnp2

0 coment�rios:

HaLowLink 1 combines Wi-Fi 4 and Wi-Fi HaLow Speed peaks at 32Mbps over 10 miles on the 8 Mhz band, but 300Mbps is possible on 40 Mhz T...

'Revolutionary' Wi-Fi router which can send data up to 10 miles away goes on sale for less than $100 - just make sure you're happy with the 32Mbps speed


  • HaLowLink 1 combines Wi-Fi 4 and Wi-Fi HaLow
  • Speed peaks at 32Mbps over 10 miles on the 8 Mhz band, but 300Mbps is possible on 40 Mhz
  • Two HaLowLink 1 routers can replace Ethernet cabling

Morse Micro has introduced the MM-HL1-EXT, a Wi-Fi HaLow router with an external antenna designed for long-range, low-power communication.

The MM-HL1-EXT leverages the IEEE 802.11ah Wi-Fi HaLow standard, enabling connections over distances of 10 miles (16km) in rural areas and 3km in urban environments.

Unlike conventional Wi-Fi routers, HaLow operates in the 900MHz band in the US and also supports 2.4GHz Wi-Fi 4 (802.11n). It can function as a standalone access point or as an extender, improving connectivity in difficult-to-reach areas.

A game-changing long-range router

The MM-HL1-EXT is part of the HaLowLink 1 series — optimized for IoT and industrial applications.

It's been certified for use in North America (FCC), Canada (IC), and Australia (RCM) but the company is working to secure certifications for EMEA (868MHz) and Asia.

“The certification of the HaLowLink 1 reinforces the growing importance of reliable, interoperable Wi-Fi HaLow products in the connectivity ecosystem,” said Maureen Gallagher, VP of Marketing at Wi-Fi Alliance.

“With its extended range and low-power capabilities, Wi-Fi HaLow is a powerful solution for IoT applications, and Morse Micro is committed to accelerating adoption by delivering high-quality products through the Wi-Fi CERTIFIED program.”

At the core of the HaLowLink 1 is the MediaTek MT7621A dual-core CPU, paired with 256MB of DRAM and 32MB of NAND flash storage. The radio module features Morse Micro’s MM6108 chipset alongside AzureWave AW-HM593, delivering a transmission power of up to 23 dBm for stable, long-range performance.

For wired connections, the router includes two Gigabit Ethernet ports and supports Ethernet-over-USB for enhanced networking flexibility. A USB-C port provides power and Ethernet data transmission.

It runs on OpenWrt 23.05, an open source, customizable networking platform that supports online firmware updates.

The HaLowLink 1 speed maxes out at 32Mbps when using an 8MHz bandwidth. In contrast, its Wi-Fi 4 capability supports speeds of up to 300Mbps at 40MHz bandwidth.

In harsh industrial settings, two HaLowLink 1 units can be deployed together to replace Ethernet cabling, providing a wireless alternative to outdoor and remote installations.

“With the launch of the world’s first Wi-Fi 4 and Wi-Fi HaLow CERTIFIED gateway, we’re equipping developers with a powerful tool to explore the extended-range, low-power connectivity benefits of Wi-Fi HaLow, paving the way for widespread adoption,” said Michael De Nil, co-founder and CEO of Morse Micro.

The MM-HL1-EXT is now available on Mouser for €97.81 (about $99). At press time, eight units are in stock, with 56 more expected by April 14, 2025. Larger bulk orders have an estimated factory lead time of eight weeks.

Morse Micro has been developing Wi-Fi HaLow tech for nearly a decade, but its breakthroughs only began gaining widespread attention in 2024. Back in February of that year, it demonstrated router hardware that provided 2-mile coverage for months while running on coin batteries.

By September, that range had extended to 10 miles. Most recently, at CES 2025 in January, Morse Micro showcased Wi-Fi routers capable of delivering 250Mbps over a 10-mile radius.

Via EENewsEurope

You may also like



from Latest from TechRadar US in News,opinion https://ift.tt/x0dRH2g

0 coment�rios: