Skip to main content
Scarlett vs. OpenAI
To:Brew Readers
IT Brew // Morning Brew // Update
It’s Scarlett. No, wait—is it?
Advertisement Advertisement Advertisement
June 12, 2024 View Online | Sign Up

IT Brew

Splunk

Cheers to Wednesday! Besides vinyl records and flip phones, good cyber hygiene practices are in.

In today’s edition:

Scarlett or bot?

Is that a threat?

Change is coming

—Amanda Florian, Eoin Higgins, Billy Hurley

AI

Scarlett begone, yes?

Scarlett Johansson smiling Patrick Mcmullan/Getty Images

Doubt and division echo throughout Hollywood and Silicon Valley as Scarlett Johansson and OpenAI dispute whether or not OpenAI’s now discontinued Sky voice—which the company launched last September—resembles Johansson’s actual voice.

Rijul Gupta, a synthetic media expert and the CEO of DeepMedia AI—a deepfake detection and AI security company based in San Francisco, California—shared a file exclusively with IT Brew showing no evidence of a voice match between Johansson’s real voice and Sky.

“This evidence suggests that it is very unlikely that OpenAI cloned Scarlett’s voice for use in their Sky voice demo,” he told IT Brew in an email. Deep Media—whose customers include major tech companies and the Department of Defense (DOD)—received a $1.25 million grant from the Air Force Research Laboratory to “integrate its tools” into DOD apps, Tech Brew reported last year.

“It is worth noting that DeepMedia’s Voice Biometric AI algorithms are unique in that they are trained on both real and synthetically generated voice samples, which we believe makes them more robust in use cases involving the comparison between real and GenAI voices such as this,” he wrote.

Read more here.—AF

Do you work in IT or have information about your IT department you want to share? Email [email protected].

   

PRESENTED BY SPLUNK

Accelerate your threat response

Splunk

When it comes to digital attacks, organizations need cat-like reflexes. And the way to get those is—you guessed it—automation.

Automation is the most efficient way to get your SOC up to speed. And Splunk’s no-compromise, data-centric security ops solution offers the kind of automation that security leaders dream of.

The kind of automation that accelerates security investigations and incident response, saves your team time from being buried in endless alerts, and helps you make better use of your resources.

No wonder Splunk customers resolve issues 80%-90% faster and reduce major IT incidents by more than 50%.

Sound like something you want for your org? Go ahead and get started with Splunk.

CYBERSECURITY

Budget hack

Unhappy women cradles head in hands in office Kieferpix/Getty Images

You know the feeling—your IT team is facing a budget crunch and needs to make hard choices on what to prioritize.

That either-or decision-making isn’t confined to the private sector, F5 Chief Product Officer Kara Sprague told IT Brew. Even the federal government needs to rank needs—and near the top is prevention.

“It’s that kind of preventative piece that I think is really important, because otherwise you end up having this mass of installed technology that is out of date, fundamentally insecure, because it’s not being patched on a regular basis,” Sprague said. “There [are] new vulnerabilities being discovered in new and old technology all the time.”

Watch your back. As RSA Security CEO Rohit Ghai told IT Brew in early May, backdoor hacks on third-party vendors are creating vulnerabilities. Attackers are using an organization’s “alarm system” to escape detection, he said.

Read more here.—EH

Do you work in IT or have information about your IT department you want to share? Email [email protected].

   

IT STRATEGY

Ivant to break free

A medieval shield with digital lines going through it with a computer mouse pointing at it close with binary code and a black and green squares behind it on a dark blue background Francis Scialabba

After a rocky start to 2024, the IT and security company Ivanti made its New Year’s resolution in April.

Following a discovery in January of vulnerabilities in Ivanti’s Connect Secure virtual private network (VPN) and Ivanti Policy Secure network access control (NAC) products—weaknesses that ultimately led to CISA emergency directives telling customers to disconnect and patch before returning the devices to service—Jeff Abbott, CEO of Ivanti, wrote an open letter to customers declaring a “new era” emphasizing “secure by design” principles.

The secure by design methodology, in short, puts protection burdens and accountability on the manufacturer instead of the customer.

“We have already begun applying learnings from recent incidents to make immediate improvements to our own engineering and security practices,” Abbott said in the letter.

Abbott spoke with IT Brew about immediate changes—and what they mean for the company’s product developers.

Keep reading here.—BH

Do you work in IT or have information about your IT department you want to share? Email [email protected].

   

TOGETHER WITH VEEAM

Veeam

Back it up. Microsoft 365 has many capabilities…but backing up all your data isn’t one of them. Good thing Veeam can help do it for you. Learn the benefits of cloud-based data protection in Veeam’s new e-book, and get all the deets on its backup service in this report.

PATCH NOTES

Picture of data with "Clean Me" written on it + bottle of cleaner in front of it, Patch Notes Francis Scialabba

Today’s top IT reads.

Stat: 361 million. That’s the number of stolen unique email addresses that cybersecurity researchers discovered were being shared across multiple Telegram channels, where cybercrime runs rampant. (BleepingComputer)

Quote: “There will be a generational gap here, some people will go, what on earth is going on? We are trying to reinvent democracy, it’s serious, it’s not a joke or a PR stunt. We are using AI Steve as a provocative title to get attention, we admit that.”—Steve Endacott, the UK businessman behind AI Steve, the first AI-generated candidate running for Parliament (the Independent)

Read: A Chinese official is warning government officials that storing classified information in the cloud could be risky, noting that cloud data has become “a major focus” for foreign spies. (South China Morning Post)

Speedy wonder: Hit the gas on your SOC with Splunk’s security operations solution. It relieves the burden on security teams by cutting the risk of data breach, IP theft, and fraud by an average of 70%. Learn more.*

*A message from our sponsor.

SHARE THE BREW

Share IT Brew with your coworkers, acquire free Brew swag, and then make new friends as a result of your fresh Brew swag.

We’re saying we’ll give you free stuff and more friends if you share a link. One link.

Your referral count: 2

Click to Share

Or copy & paste your referral link to others:
itbrew.com/r/?kid=9ec4d467

         
ADVERTISE // CAREERS // SHOP // FAQ

Update your email preferences or unsubscribe here.
View our privacy policy here.

Copyright © 2024 Morning Brew. All rights reserved.
22 W 19th St, 4th Floor, New York, NY 10011

Top insights for IT pros

From cybersecurity and big data to cloud computing, IT Brew covers the latest trends shaping business tech in our 4x weekly newsletter, virtual events with industry experts, and digital guides.

By subscribing, you accept our Terms & Privacy Policy.

A mobile phone scrolling a newsletter issue of IT Brew