Join Lee Klarich, Chief Product Officer of Palo Alto Networks, as he explores the dramatic rise of AI in cybersecurity. Learn about the tactics used by attackers, the AI-driven defenses developed to counter these threats, and how AI can be harnessed responsibly while maintaining robust security….
Ahead Of Dragon Age: The Veilguard, The Entire Series Is On Sale For $10
Dragon Age: The Veilguard is shaping up to be one of our most anticipated RPGs of 2024 – find out why in Game Informer’s Dragon Age: The Veilguard cover story – and if you’re also excited about the game, you might be wondering if you should dig into the series’ past. If you’re thinking about a first-time playthrough of Dragon Age: Origins, Dragon Age II, and Dragon Age: Inquisition, or your twelfth playthrough, Steam has you covered because you can purchase all three games for less than $10 right now.
Steam launched a Dragon Age franchise sale yesterday, with a 90% discount on all three games in the series. Here’s the prices for each and the order to play them in if you want to start at the beginning:
- Dragon Age: Origins – Ultimate Edition (which includes the Awakening expansion): $2.99
- Dragon Age II: Ultimate Edition: $2.99
- Dragon Age Inquisition: $3.99
![Ahead Of Dragon Age: The Veilguard, The Entire Series Is On Sale For $10 Ahead Of Dragon Age: The Veilguard, The Entire Series Is On Sale For $10](https://www.gameinformer.com/sites/default/files/styles/body_default/public/2024/06/21/cd523064/dragon_age_sale.jpg)
Ahead of Veilguard, which launches on PlayStation 5, Xbox Series X/S, and PC sometime this fall, we highly recommend playing Inquisition as it ties directly into the new game. However, there will likely be appearances, cameos, and story ties from Origins and its sequel, too, so if you want to know everything you need to before jumping into Veilguard, this sale might be the way to go.
For more about Veilguard, be sure to head to Game Informer’s coverage hub, which features exclusive interviews, features, and more about the game. Here’s some of what you can read about right now:
You can also click the banner below to be taken right to Game Informer’s Veilguard hub, which is a great link to bookmark to ensure you don’t miss any of our upcoming features about the game.
Which of the Dragon Age games have you played? Let us know in the comments below!
Broadcom’s AI surge challenges Nvidia’s dominance
Riding the AI wave, semiconductor giant Broadcom has joined the stampede of companies chasing Nvidia for a piece of the lucrative AI chip market. The computing and software conglomerate is up more than 66% in the past year, as it makes power moves to establish itself…
Minecraft Is Finally Getting A Native PS5 Version
![Minecraft Is Finally Getting A Native PS5 Version Minecraft Is Finally Getting A Native PS5 Version](https://www.gameinformer.com/sites/default/files/styles/thumbnail/public/2024/01/03/2a7c4371/minecraft_key_art.jpg)
Developer Mojang has revealed that a native version of Minecraft is finally coming to PlayStation 5. It’s currently in a testing phase, but if you own the PlayStation 4 version of the game for your PS5, you can take part in the preview right now.
Though Minecraft has been playable on PS5 for years, it’s always been the PS4 version; this native version, however, is a new build of Minecraft made specifically for PS5, which means it will theoretically perform better on the console.
[embedded content]
“Currently, however, the only way to play Minecraft on a PlayStation 5 is by purchasing the PlayStation 4 version of the game,” the announcement reads. “By developing a native version of Minecraft for PS5, we’ll be able to make the game run more effectively on the PS5’s hardware.”
Though Mojang hasn’t revealed how long the Minecraft PS5 version preview will last, all are welcome to take part in it, so long as they own the PS4 version of the game. To access it, go to “Settings” on your PS4 version of Minecraft while playing on a PS5 and select “Preview.” This preview includes the new Tricky Trials update, so you can venture into the trial chambers, meet a breeze, craft a mace, and more.
Mojang asks that players who encounter bugs during this preview report it to the developer, and more generally, provide any feedback they might have.
For more about the game, read Game Informer’s Minecraft review, and then check out this story about how actor Jack Black has all but confirmed he’s playing Steve in the upcoming live-action Minecraft movie. After that, read about Netflix’s animated Minecraft series.
Are you excited about a native Minecraft version for PS5? Let us know in the comments below!
xAI secures Dell and Super Micro support for supercomputer project
Elon Musk’s startup, xAI, has just announced that it will rely on Dell and Super Micro for server racks to support its gigantic supercomputer project. Musk announced this collaboration on his social media platform, X, marking a key development in xAI’s goal to assemble what he…
Anthropic’s Claude 3.5 Sonnet beats GPT-4o in most benchmarks
Anthropic has launched Claude 3.5 Sonnet, its mid-tier model that outperforms competitors and even surpasses Anthropic’s current top-tier Claude 3 Opus in various evaluations. Claude 3.5 Sonnet is now accessible for free on Claude.ai and the Claude iOS app, with higher rate limits for Claude Pro…
CISO security & business continuity insights: lessons from an undersea cable blackout – CyberTalk
![CISO security & business continuity insights: lessons from an undersea cable blackout – CyberTalk CISO security & business continuity insights: lessons from an undersea cable blackout – CyberTalk](https://www.cybertalk.org/wp-content/uploads/2024/06/Haddioui-cover-1021x638-1.jpg)
Issam El Haddioui: Head of Security Engineering, EMEA – Africa | Security Evangelist with the Office of the CTO. Issam El Haddioui has held multiple technical leadership and management roles with major cyber security vendors in different countries. He has 20+ years’ experience in worldwide consulting, designing, and implementing security architectures across verticals. He holds two master’s degrees and various technical certifications.
In this dynamic and insightful interview, Check Point expert Issam El Haddioui highlights how an undersea cable disruption impacted multi-national, regional and local businesses across Africa. He then describes how to prepare for internet blackouts and brownouts within your organization, walking through best practices and forms of resilient cyber security architecture.
1. Would you like to provide an overview of the subsea cable issue that recently affected West and Central Africa?
Internet access and connectivity for a large portion of our continent, more than a dozen of countries, was impacted earlier this year due to submarine undersea cables being damaged. Businesses in Ghana, Ivory Coast, Nigeria, Uganda and more were forced to rely on phone conversations to exchange data in a timely manner. Others in East Africa had to use satellite network connections to continue operating.
2. Why is the issue significant? Who was affected and to what extent?
With almost 90% of Africa’s internet traffic relying on undersea cables, all aspects of the continent’s digital economy were subject to disruption; from quality of service to having no-connectivity at all. Stock exchanges, banks, e-commerce and logistics platforms were out of order for a significant part of the day, impacting revenue and business continuity. It caused delays to critical services for the continent and its citizens.
3. When interruptions – like what happened with the undersea cables – occur, what are the risks or vulnerabilities that businesses face?
In these circumstances, businesses are facing not only lower productivity, which impacts their competitiveness, but also security related risks, such as lack of visibility over their presence and global assets, and lack of visibility into non-local cloud platforms. They also lack real-time prevention in case of any local threats or insider actor.
4. For businesses based in West or Central Africa or with offices in the region, given the sub-sea cable cut, what kinds of general business resilience measures would you recommend?
In addition to the redundancy and resilience mechanisms applied by operators responsible for the cables, business can also opt for, when possible, a redundant/backup network connectivity via satellite communication. Also, we recommend having a local copy of critical data either on premises or leveraging the development of local and sovereign cloud providers. Sometimes, undersea cable disruption can also lead to a cyber attack due tapping or eavesdropping by threat actors who are meddling with the cable. Hence, encryption is also a highly recommended when trying to exchange data.
5. How can a SASE architecture help enterprises maintain secure and reliable connectivity to business critical applications and data?
SASE architecture that’s supported by a highly resilient meshed backbone can help maintain secure and reliable local communications for remote workers in countries using local PoP during any disruption; providing access to business data and applications.
6. What kinds of visibility and control does SASE offer and how is that beneficial?
With SASE architecture, business will have control over any connection to their data or applications, regardless of where it originates from. It allows them to check the security posture of the device where the user is initiating the connection, authentication and access control policy. It also gives them the ability to use the best route with low latency for critical traffic. It provides a full, central, in real-time and granular view of the security status of the environment; an important visibility mechanism enabling security analysts to prevent any potential threats or malicious activity.
7. How can SASE’s cloud-delivery model and optimization capabilities help reduce the impact of internet brownouts or blackouts?
SASE cloud-delivery with local PoP will help maintain local connectivity and access to data and applications during a period of internet blackout. In fact, SASE providers, such as Check Point, will have a local replica on all its PoP globally, with the same security policy. These local PoPs or some local providers have built resilience into their infrastructure that SASE can benefit from, such as dual connectivity via satellite or radio-based communication.
8. What related advice do you have for corporate leaders?
Digital transformation and the new hybrid mode of working have given businesses and governments a myriad of benefits and opportunities. These include reducing their real estate costs by enabling the remote workforce, rapid go-to-market with online and e-commerce platforms, accelerating the launch of citizen programs…etc.
This new reality cannot be supported by traditional connectivity and security architectures, but requires new agile, scalable, and holistic ways to deal with an extended attack surface and heterogenous mode of connection. SASE is one direction to help address some of these new challenges, offering secure and controlled access to data and applications from anywhere to anywhere, cloud-delivered and as-a-service.
9. At this point, the cables have been restored. Do you expect to see another incident like this within the next 12-18 months?
Even with all the resilience mechanisms that the cables operators are implementing, we are never totally immune from such incidents for various reasons. Incidents like what we saw in Africa this year are not very frequent, but according to the Center for Strategic and International Studies (CSIS), undersea cable disruptions occur at a rate of 200 incidents per year due to different accidental damages.
10. Is there anything else that you would like to share?
It is very important, during periods of internet blackout or disruption, not lose sight of insider threats, such as internal employees or third-parties, and potential local intrusion that can cost your business millions due to a data leak, reputational damage or legal liabilities. Hence, a unified and integrated security platform with visibility into the internal and external attack surface is key to your security monitoring in real-time.
For more insights from Issam El Haddioui, please see CyberTalk.org’s past interview. Lastly, to receive cyber security thought leadership articles, groundbreaking research and emerging threat analyses each week, subscribe to the CyberTalk.org newsletter.
The Friday Roundup – Faceless Videos and Forced Perspective
How to Make “Faceless” YouTube Videos Some people find it very easy to appear on-screen in their own videos whilst for others this is definitely an acquired skill! Then you have people like me that not only have a face for radio but also a deep…
Bridging the AI Trust Gap
AI adoption is reaching a critical inflection point. Businesses are enthusiastically embracing AI, driven by its promise to achieve order-of-magnitude improvements in operational efficiencies. A recent Slack Survey found that AI adoption continues to accelerate, with use of AI in workplaces experiencing a recent 24% increase…
Carl Rost, Principal Consultant at Patsnap – Interview Series
Carl Rost is the mind behind the AI-powered patent search tools at Patsnap. Patsnap stands at the forefront of innovation intelligence, harnessing the power of AI and machine learning to sift through billions of datasets, enabling innovators to make crucial connections. Their cutting-edge LLM technology, tailored…