OpenAI has upgraded ChatGPT’s Projects feature, and I find it makes working way more efficient

OpenAI has upgraded ChatGPT’s Projects feature to remember past chats, tone preferences, and files Projects now offers deep research, voice mode, mobile file uploads, and more OpenAI wants Projects to function more like smart workspaces than one-off chats ChatGPT’s Projects feature has been a useful way to organize conversations with the AI chatbot since it…

Read More

Build a conversational data assistant, Part 2 – Embedding generative business intelligence with Amazon Q in QuickSight

In Part 1 of this series, we explored how Amazon’s Worldwide Returns & ReCommerce (WWRR) organization built the Returns & ReCommerce Data Assist (RRDA)—a generative AI solution that transforms natural language questions into validated SQL queries using Amazon Bedrock Agents. Although this capability improves data access for technical users, the WWRR organization’s journey toward truly…

Read More

21st July – Threat Intelligence Report

For the latest discoveries in cyber research for the week of 21st July, please download our Threat Intelligence Bulletin. TOP ATTACKS AND BREACHES Luxury retailer Louis Vuitton has suffered a cyber-attack that resulted in the exfiltration of certain personal data of customers from the UK, South Korea, Turkey, Italy, and Sweden after unauthorized access to…

Read More

Fix WMI Class Corruption | Automated Remediation

When Windows Management Instrumentation (WMI) classes fail, it can disrupt critical security operations by causing vulnerability scans to miss important data and compliance reports to lack accuracy. These issues may lead to gaps in visibility, making it harder for security teams to maintain a comprehensive understanding of their environment. By addressing WMI class failures proactively,…

Read More

Building Resilient Software Supply Chains: Inside the Enhanced Qualys Software Composition Analysis

In today’s software-driven economy, every organization, regardless of industry, is a software company. And increasingly, every software company is an open-source company. With open-source components (OSS) now comprising up to 80% of modern codebase, the software supply chain has emerged as one of the most significant and most vulnerable frontiers in cybersecurity. Unfortunately, adversaries have…

Read More