News

Lumo Is Proton's Privacy-First Alternative to ChatGPT and Other AI Chatbots - Wednesday, July 23, 2025 - 06:00
The company behind Proton VPN, Proton Mail and Proton Pass, has released an open-source AI chatbot that it says isn't trained on user data.
This Unsung Supernatural TV Show Has Everything a Horror Fan Could Want - Wednesday, July 23, 2025 - 06:00
Commentary: This series walked so The Boys could fly.
How to Watch England vs. India From Anywhere for Free: Livestream 4th Test Cricket - Wednesday, July 23, 2025 - 06:01
The hosts look to wrap up a series win at Old Trafford Cricket Ground.
Don’t Buy Internet Before Checking the Cost Per Mbps. Here’s How - Wednesday, July 23, 2025 - 07:00
You can save money and stick to a plan with plenty of speed with this trick.
This Compact Gaming Keyboard Gets a Lot Right, but a Few Things Wrong Too - Wednesday, July 23, 2025 - 07:00
Even though it has some compromises, I still love the Cherry XTRFY K5V2 keyboard.
This E-Sports-Inspired Gaming Mouse Left Me Wanting More - Wednesday, July 23, 2025 - 07:01
For a gaming mouse, the Cherry M64 is underwhelming.
Secure your supply chain with these 3 strategic steps - Wednesday, July 23, 2025 - 04:38

Third-party attacks are one of the most prominent trends within the threat landscape, showing no signs of slowing down, as demonstrated by recent high-profile cyber incidents in the retail sector.

Third-party attacks are very attractive to cybercriminals: threat actors drastically increase their chances of success and return on investment by exploiting their victims’ supplier networks or open-source technology that numerous organizations rely on.

A supply chain attack is one attack with multiple victims, with exponentially growing costs for the those within the supply chain as well as significant financial, operational and reputational risk for their customers.

In a nutshell, in the era of digitization, IT automation and outsourcing, third-party risk is impossible to eliminate.

Global, multi-tiered and more complex supply chains

With supply chains becoming global, multi-tiered and more complex than they have ever been, third-party risks are increasingly hard to understand.

Supply chain attacks can be extremely sophisticated, hard to detect and hard to prevent. Sometimes the most innocuous utilities can be used to initiate a wide-scale attack. Vulnerable software components that modern IT infrastructures run on are difficult to identify and secure.

So, what can organizations do to improve their defenses against third-party risk? We have outlined three areas organizations can take to build meaningful resilience against third-party cyber risk:

1. Identify and mitigate potential vulnerabilities across the supply chain

Understanding third-party risk is a significant step towards its reduction. This involves several practical steps, such as:

i) Define responsibility for supply chain cyber risk management ownership. This role often falls between two stools - the internal security teams who will focus primarily on protecting the customer, while the compliance and third-party risk management programs who own responsibility for third party risk and conduct, but don’t feel confident addressing cyber risks given their technical bias.

ii) Identify, inventory and categorize third parties, to determine the most critical supplier relationships. From a cyber security perspective, it is important to identify suppliers who have access to your data, access into your environment, those who manage components of your IT management, those who provide critical software, and – last but not least – those suppliers who have an operational impact on your business.

This is a challenging task, especially for large organizations with complex supply chains, and often requires security teams to work together with procurement, finance and other business teams to identify the entire universe of supplier relationships, then filter out those out of scope from a cyber security perspective.

Assess risk exposure by understanding the security controls suppliers deploy within their estate or the security practices they follow during the software development process, and highlight potential gaps. It is important to follow this up with agreement on the remediation actions acceptable to both sides, and to work towards their satisfactory closure. The reality is that suppliers are not always able to implement the security controls their clients require.

Sometimes this leads to client organizations implementing additional resilience measures in-house instead – often dependent on the strength of the relationship and the nature of the security gaps.

Move away from point-in-time assessments to continuous monitoring, utilizing automation and open-source intelligence to enrich the control assessment process. In practice, this may involve identifying suppliers’ attack surfaces and vulnerable externally-facing assets, monitoring for changes of ownership, identifying indicators of data leaks and incidents affecting critical third parties, and monitoring for new subcontractor relationships.

2. Prepare for supply chain compromise scenarios

Regrettably, even mature organizations with developed third-party risk management programs get compromised.

Supply chain attacks have led to some of the most striking headlines about cyber hacks in recent years and are increasingly becoming the method of choice for criminals who want to hit as many victims as possible, as well as for sophisticated actors who want to remain undetected while they access sensitive data.

Preparedness and resilience are quickly becoming essential tools in the kit bag of organizations relying on critical third parties.

In practice, the measures that organizations can introduce to prepare for third-party compromise include:

i) Including suppliers in your business continuity plans. For important business processes that rely on critical suppliers or third-party technology, understand the business impact, data recovery time and point objectives, workarounds, and recovery options available to continue operating during a disruption.

ii) Exercising cyber-attack scenarios with critical third parties in order to develop muscle memory and effective ways of working during a cyber attack that may affect both the third party and the client. Ensure both sides have access to the right points of contact – and their deputies – to report an incident and work together on recovery in a high-pressure situation.

iii) Introducing redundancies across the supply chain to eliminate single points of failure. This is a difficult task, especially in relation to legacy suppliers providing unique services or products. However, understanding your options and available substitutes will reduce dependency on suppliers and provide access to workarounds during disruptive events such as a supply chain compromise.

3. Secure your own estate (monitor third-party access, contractual obligations)

Protecting your own estate is as important as reducing exposure to third-party risk. Strengthening your internal defenses to mitigate damage if a third party is compromised involves a number of important good practice measures, including but not limited to:

i) Enhanced security monitoring of third-party user activity on your network,

ii) Regular review of access permissions granted to third-party users across your network, including timely termination of leavers,

iii) Continuous identification and monitoring of your own external attack surface, including new internet-facing assets and vulnerable remote access methods,

iv) Employee security training and social engineering awareness, including implementation of additional security verification procedures to prevent impersonation of employees and third parties.

Security vetting of third-party users with access to your environment or data

As third-party threats evolve and become more prominent, organizations must have a clear view of who they’re connected to and the risks those connections pose. An end-to-end approach to cyber due diligence, encompassing assessment, monitoring, and response capabilities to threats across their supply chains before damage is done.

Third-party risk will remain a challenge for many organizations for years to come, especially as more threat actor groups begin to explore supply chain compromise as an attractive tactic, offering high rewards with relatively low resistance.

Regulators across all sectors are beginning to pay greater attention to supply chain security. Frameworks such as DORA, NIS2 and the Cyber Resilience Act reflect the growing concerns that supply chain security must be a key component of digital strategy. Those who lead on this issue will be best placed to navigate supply chain compromise.

We list the best identity management software.

This article was produced as part of TechRadarPro's Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro

Supercharge your phone with the ultimate wireless power-up - Wednesday, July 23, 2025 - 04:46

What's better than wireless charging? Even faster wireless charging. The latest Qi2.2 wireless charging standard makes wireless power much faster, much smarter and even more useful – and while several brands have recently obtained Qi2.2 certification, Baseus is the first to publicly release visuals and detailed specifications of three certified devices. So while others make promises, Baseus is already making Qi2.2 products.

That means Baseus customers will be among the very first people to get a massive wireless power-up.

The AM52 is a super-slim power bank with speedy 25W wireless charging (Image credit: Baseus)Why Qi2.2 is brilliant news for you

Qi2.2 is the very latest version of the world's favourite wireless charging standard. Qi charging is supported by all the big names in smartphones and accessories, delivering convenient and safe wireless charging for all kinds of devices. And the latest version is the best yet. Qi2.2 is much faster, even more efficient and even safer.

There are three key parts to Qi2.2: supercharged wireless power, smarter heat control and magnetic precision. The first means that instead of maxing out at 15W of power like existing wireless chargers do, Qi2.2 can push the limit to 25W. That means much faster charging and less time waiting: Qi2.2 can charge your phone up to 67% faster than Qi2.0.

Wireless charging generates heat, and Qi2.2 keeps that down with next-generation thermal regulation, stricter surface temperature limits and improved coils. And the new Magnetic Power Profile (MPP) built into the standard ensures more precise alignment with your phone, reducing energy waste and improving charging efficiency by 15% whether you're charging in the car, at home or on the go.

The powerful PicoGo AM61 comes with its own USB-C cable so you can charge wired and wirelessly at the same time. (Image credit: Baseus)Qi2.2 is made for everything everywhere

Qi2.2 is made to work across all kinds of devices from the iPhone 12 and endless Androids to future models that haven't even been made yet. And while it's focused on the future it's also fully backwards compatible: your Baseus Qi2.2 power bank or charger will happily power up a device made for older Qi standards, and Qi phone cases can add wireless charging capability to older phones that weren't built with wireless charging inside.

Baseus is the industry leader in Qi2.2 charging, and it's just launched three new products that take full advantage of Qi2.2's extra power and improved efficiency: two powerful PicoGo magnetic power banks for any device and a really useful foldable 3-in-1 PicoGo charger for your phone, earbuds and smartwatch.

The two magnetic power banks are the PicoGo AM61 Magnetic Power Bank and the PicoGo AM52 Ultra-Slim Magnetic Power Bank. Both versions deliver a massive 10,000mAh of power, both have a 45W USB-C charging port so you can charge two things at once, and both can charge your device wirelessly at up to 25W via the new Qi2.2 standard without any danger of overheating.

The AM52's ultra-slim design features a graphene and aluminium shell for heat dissipation and smart temperature control that protects all of your devices while charging, and the slightly larger AM61includes a built-in USB-C cable for extra convenience.

If you're looking for a super-speedy compact charger, you'll love the PicoGo AF21 foldable 3-in-1 wireless charger. It delivers the same super-fast 25W wireless charging as its siblings, and with a total 35W of power across its three modules it can wirelessly power up not just your phone but your earbuds and smartwatch too.

That makes it an ideal bedside charger as well as a great travel charger: it’s extremely small at just 75.5 x 80 x 38.11am and it’s highly adjustable for optimal viewing and charging. You can rotate the watch panel 180º, adjust the phone panel through 115 degrees and adjust the base bracket too.

The PicoGo AF21 foldable 3-in-1 wireless charger is super-portable and extremely adjustable. (Image credit: Baseus)Ride the next wireless wave with Baseus' brilliant power-ups

Baseus is setting the standard for Qi2.2 wireless charging, and whether you grab the powerful dual-charging PicoGo AM61, the super-slim PicoGo AM52 or the multi-talented PicoGo AF21 charger you're getting the latest, greatest and fastest charging for your phone. With Qi2.2 Baseus isn't just riding the next wireless wave. It's shaping it.

The Baseus PicoGo AM61 Magnetic Power Bank, PicoGo AM52 Magnetic Power Bank and PicoGo AF21 3-in-1 Foldable 3-in-1 Wireless Charger will all be available this August, and you'll be able to order them directly from Baseus’s website and from major retailers such as Amazon.

Microsoft seemingly confirms Chinese hackers behind SharePoint server attacks - Wednesday, July 23, 2025 - 05:25
  • Microsoft names three Chinese hacking groups it claims were abusing recently discovered flaws in SharePoint
  • Hackers were apparently able to access sensitive data
  • The company is confident the attacks will keep coming until the systems are patched

At least three major Chinese hacking groups were abusing recently discovered vulnerabilities to target businesses using Microsoft SharePoint, the company has said.

Microsoft recently released an urgent patch to fix two zero-day vulnerabilities affecting on-premises SharePoint servers, tracked as CVE-2025-49704 (a remote code execution bug), and CVE-2025-49706 (a spoofing vulnerability), which were being abused in the wild.

Now, Microsoft is saying that the groups targeting the flaws are Chinese state-sponsored groups - namely Linen Typhoon, Violet Typhoon, and Storm-2603.

Get Keeper's Personal Password Manager plan for just $1.67/month

Keeper is a password manager with top-notch security. It's fast, full-featured, and offers a robust web interface. The Personal Plan gets you unlimited password storage across all your devices, auto-login & autofill to save time, secure password sharing with trusted contacts, biometric login & 2FA for added security.View Deal

Two typhoons and a storm

The first two are part of the larger “typhoon” operation, counting at least half a dozen organizations, including Brass Typhoon, Salt Typhoon, Volt Typhoon, and Silk Typhoon.

In the last couple of years, these groups were attributed with breaches into critical infrastructure organizations, government, defense, and military firms, telecom operators, and similar businesses, across the western world and NATO members.

Some researchers are saying that these groups were tasked with persisting in the target networks, in case the standoff between the US and China over Taiwan escalates into actual war. That way, they would be able to disrupt or destroy critical infrastructure, eavesdrop on important conversations, and thus gain the upper hand in the conflict.

At least seven major telecommunications operators in the United States have recently confirmed discovering Typhoon operatives on their networks and removing them from the virtual premises.

"Investigations into other actors also using these exploits are still ongoing," Microsoft said in a blog post, stressing that the attackers will definitely continue targeting unpatched systems.

SharePoint Server Subscription Edition, SharePoint Server 2019, and SharePoint Server 2016 were said to be affected. SharePoint Online (Microsoft 365) was secure.

Microsoft recommends customers to use supported versions of on-premises SharePoint servers with the latest security updates immediately, and says users should ensure their antivirus and endpoint protection tools are up to date.

You might also like
The Google Pixel 10 Pro series has been pictured in four shades – some of which we like far more than others - Wednesday, July 23, 2025 - 05:32
  • Leaked renders have shown the Pixel 10 Pro and Pixel 10 Pro XL in four shades
  • These include Obsidian, Porcelain, Moonstone, and Jade
  • Two of these are far more interesting than the other two

It’s looking likely that you’ll be able to buy the Google Pixel 10 Pro and the Pixel 10 Pro XL in a choice of Obsidian (black), Porcelain (white), Moonstone (slate blue-gray), and Jade (a soft pistachio green with gold accents), as not only have some of these Pixel 10 colors been mentioned before, but now all four have been shown off in leaked renders.

Android Headlines has shared what it claims are official renders of the Pixel 10 Pro and the Pixel 10 Pro XL in these four shades, and while we’d take this leak with a pinch of salt, these certainly look to be high-quality images, so they may well be official.

If these renders are accurate, then the Pro models will be available in two fairly plain, ordinary shades, in the case of Obsidian and Porcelain, since they’re basically just black and white. But the other two options are a bit more interesting.

Image 1 of 2

Leaked renders of the Pixel 10 Pro in four colors (Image credit: Android Headlines)Image 2 of 2

Leaked renders of the Pixel 10 Pro XL in four colors (Image credit: Android Headlines)A bit more color

There’s Moonstone, which we’ve actually seen the Pixel 10 Pro in already via an official teaser. This is rather understated, but the hint of blue in it makes this more interesting than a pure gray option.

The highlight, though, is arguably Jade – it’s a soft, delicate shade that still somewhat fits with the rest of the color options, but is a bit brighter and more unusual. Really, we’d like to see more of this sort of thing, rather than top-end phones defaulting to plain shades, but at least there’s one option here for those who want a splash of color.

We’ll find out how accurate this color leak is soon, as Google is set to unveil the Pixel 10 series on August 20. We’re expecting to see the Pixel 10 itself along with the Pixel 10 Pro, the Pixel 10 Pro XL, and the Pixel 10 Pro Fold, so there should be a lot to look forward to.

You might also like
Windows 11 migration is still causing lots of headaches for some firms - Wednesday, July 23, 2025 - 05:38
  • Running an old OS like Windows 10 could soon pose cybersecurity issues
  • Upgrading could reveal software compatibility issues, report notes
  • The clock is now ticking to avoid a rushed Windows 11 migration

New research has uncovered some of the finer details around why many businesses are still being cautious with their approach to Windows 11 migration, with security threats and financial impacts proving to be major hurdles.

The report from Panasonic found nearly two-thirds (62%) of devices need replacing or upgrading for Windows 11 compatibility, highlighting the scale of the problem – a figure that rises to 76% among larger organizations with 5,000+ employees.

However, despite migration-related concerns, the study claims many organizations still recognize the benefits of upgrading from Windows 10 and older operating systems.

Businesses still have some concerns about upgrading Windows

Panasonic found 94% fear increased ransomware and malware risks if they don't upgrade, with 93% also concerned about data breaches. But two in three noted overall higher costs associated with migrating to Windows 11, with 55% stating that it could add to cybersecurity expenses.

Nearly half also noted software compatibility issues (47%) and productivity loss during downtime (45%), and for many (25%), hardware upgrades come with software upgrades, compounding the financial impact of OS upgrades.

However, with Microsoft estimating that ESU could cost around £320,000 over three years for 1,000 devices, the need to upgrade is clear.

Around a third each acknowledge that upgrading will give them better performance and processing power (36%), a more future proof ecosystem (36%) and access to AI features like Microsoft Copilot (34%).

Panasonic TOUGHBOOK Europe Head of Go-to-Market Chris Turner commented: "The window is closing for organisations to make a well-planned, measured and cost-effective transition to Windows 11 and start unlocking its benefits."

"Organisations that are still to undertake Windows 11 migration need support to ensure their deployment is not rushed and risky," Turner added.

You might also like
PayPal's new cross-border payments platform looks to make sending money easier for 2 billion users - Wednesday, July 23, 2025 - 06:02
  • PayPal World will enable users to pay using their domestic wallets
  • PayPal/Venmo, NPCI, Tenpin and Mercado Pago join forces
  • The system works with open source APIs, so should be easily expandable

PayPal has launched a new platform in the hope of simplifying cross-border commerce by connecting major digital wallets and payment system to facilitate multi-currency transactions.

With PayPal World, users will be able to pay internationally using their domestic wallets and payment methods.

With over two billion users targeted globally, the new platform is expected to land in Fall 2025, but only select countries will be able to benefit from easier cross-border payments at launch.

PayPal World

From launch, PayPal World will work with Mercado Pago (Mexico), NPCI International Payments (India), PayPal (US), Tenpin Global (China) and Venmo (US).

"For much of the world’s population, international shopping and money transfers are not just difficult, at times they are impossible," the company noted in a press release.

The platform uses open source APIs to make it easy for more wallets to get onboard and boost interoperability in the future, but PayPal didn't mention any companies that could be joining its World platform beyond the initial launch partners.

"The challenge of moving money across borders is incredibly complex, and yet this platform will make it so simple for nearly two billion consumers and businesses," PayPal CEO Alex Chriss noted.

PayPal gave some examples of how global customers could use its new platform, including international visitors in China being able to scan their PayPal app with a merchant that accepts Weixin Pay, and UPI users in India being able to pay with their local wallet on an American ecommerce site.

NPCI International Payments CEO Ritesh Shukla welcomed the new platform, adding that it "aligns with [NPCI's] vision to make cross-border payments more seamless, secure, and inclusive."

"In addition to payments, Tenpay Global will deepen its collaboration with PayPal World in remittances," Tenpin Global CEO Wenhui Yang added.

You might also like
I am an AI expert and here's what businesses should know about using popular AI chatbots for writing content - Wednesday, July 23, 2025 - 06:08

The AI hype felt relentless in 2023/24. While the initial frenzy has subsided somewhat, executives and professionals now grapple with the reality of deploying Artificial Intelligence (AI), specifically Generative AI (GenAI), within their organization.

LLMs (Large Language Models), the technology behind popular GenAI chatbots, are powerful, but there remains a significant disconnect between the perception of what they can do and their practical application for business writing.

Easy to use interfaces like ChatGPT make GenAI seem like it "can literally do anything".

This is a dangerous misconception. While incredibly useful for certain tasks, GenAI chatbots can be totally useless, and even harmful when not used appropriately.

Fundamental differences

The fundamental difference lies in how GenAI works compared to traditional software.

1. Traditional software is deterministic

It follows fixed logic and algorithms, producing the exact same, 100% accurate, and therefore repeatable result every time you give it the same input. Think of hitting CTRL+F in Word – you get a precise, repeatable count of a term.

2. Generative AI is non-deterministic

LLMs predict the next word based on probabilities from their training data. This means asking the same question twice will often give you different answers. They are designed to be variable.

Critical characteristics to understand

This core difference results in two critical characteristics businesses must understand:

1. Hallucinations: GenAI can confidently generate incorrect information or make things up. This isn't a bug; it's how the technology works. It's guessing based on patterns, not verifying facts. Copilot, for example, can wildly miscalculate readability scores or miss most instances of a search term.

2. Lack of Repeatability: You simply cannot guarantee the same output from the same prompt.

Here is the absolute critical takeaway: if your writing or document review task requires 100% accuracy or 100% repeatability, you must use deterministic software, not GenAI. Using GenAI for tasks demanding precision is a classic case of wielding a "GenAI hammer" and seeing every problem as a nail.

Flaws and errors in practise

Consider the disastrous consequences. I’ve used MS Copilot to search for every instance of "cybersecurity" in a contract for compliance purposes, only for the GenAI tool to miss 23 out of 27 occurrences. Trying to "shred" a document line-by-line into an Excel matrix for compliance, a task requiring perfect repeatability, is another inappropriate use case where GenAI will fail.

For businesses, especially in regulated sectors, using GenAI for tasks where factual accuracy is paramount is dangerous. Users may trust outputs due to brand credibility, not realizing the risks of inaccuracy.

Real-world failures like Air Canada's chatbot providing false information resulting in a lawsuit underscore the significant brand and trust damage inaccurate GenAI can cause.

So, where IS GenAI useful for business writing?

GenAI thrives for tasks where variability, creativity, or a "good enough" answer is acceptable or desired.

Appropriate use cases include:

  • First Draft Creation: Generating initial versions of documents like management plans, executive summaries, or proposal sections based on context. This can save significant time.
  • Creative Assistance: Rewriting content in a different tone or style.
  • Summarization: Condensing lengthy documents.
  • Simplification/Rephrasing: Making complex text more accessible or refining paragraphs.
  • Research & Analysis: Using public data for competitive analysis or sales research where perfect accuracy on every detail isn't required for generating insights. Using NLP (another type of AI) for thematic analysis across communications to check message consistency.

Beyond simple chatbots, the real value often lies in specialized applications. These layer GenAI into workflows for specific jobs, intelligently combining GenAI for creative/drafting tasks with deterministic software for accuracy-critical functions like readability scoring or compliance checks.

They understand the "job to be done" and apply the right technology. NotebookLM, which generates audio summaries of documents, is a great example of a focused application.

Garbage In, Garbage Out: The Unsexy Truth of Knowledge Management

Generative AI, even when combined with techniques like Retrieval Augmented Generation (RAG) to access proprietary data, is not a magic wand that can overcome poor data quality. The old adage "garbage in, garbage out" is more relevant than ever. If your internal knowledge bases are a mess of outdated content, multiple revisions, and poorly tagged documents, the AI's output will reflect that chaos.

As the Harvard Business Review noted, "Companies need to address data integration and mastering before attempting to access data with generative AI". Good data hygiene – clear folder structures, naming conventions, and processes for maintaining content – is crucial but is fundamentally a human behavior problem, not just a tech one. Investing in proper knowledge management now will pay dividends when you roll out any GenAI solution.

Data Security: The Enterprise Achilles' Heel

Many popular AI chatbots rely on public cloud-based LLMs. For businesses, especially those in regulated industries like defense, finance, and healthcare, feeding proprietary or sensitive or PII (Personally Identifiable Information) data into these public models poses a significant security risk. CISOs (Chief Information Security Officers) are rightly wary, often blocking interactions with such models entirely.

The safer path for enterprises involves hosting LLMs in a private cloud or on-premise, fully locked down behind the firewall. The rise of powerful open-source models like Llama 4 or Mistral Nemo which can be deployed securely in-house, is a welcome trend. This shift is so significant that a Barclays CIO survey last year indicated 83% plan to repatriate some workloads from the public cloud, largely driven by AI considerations.

The Real Driver: People and Process

Most AI projects fail not due to the technology, but because of people, process, security, and data issues. Lack of buy-in, poor strategy, inadequate data, and insufficient change management and user education are common pitfalls.

Deploying AI chatbots without teaching users about:

  • Hallucinations
  • The need to verify outputs
  • Effective prompting
  • Crucially, what tasks not to use GenAI for

...will lead to frustration and project failure.

Start with the business problem you need to solve, then map the appropriate technology to that job. Don't just chase the "shiny new tech". Define your goals, measure success (both quantitative and qualitative), and involve end-users early.

When evaluating vendors, look beyond captivating demos. Ask pointed questions about accuracy, repeatability, data handling, security posture, and their understanding of your specific use cases and industry needs. Always try before you buy and vet vendors carefully. Be wary of vendors who overpromise or claim GenAI can do everything.

In summary, popular AI chatbots offer exciting capabilities, but they are not magic. They are powerful tools with significant limitations. Successful businesses will adopt a pragmatic, thoughtful approach: understanding GenAI's non-deterministic nature, applying it strategically to appropriate tasks (like creative drafting), leveraging hybrid applications, investing in data quality and security, and crucially, focusing on the people and processes required for effective adoption and change management.

This is the path to truly unlocking AI's value.

I tried 70+ best AI tools.

This article was produced as part of TechRadarPro's Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro

This Free Heat Warning System Could Help You Prepare for Dangerous Summer Conditions - Wednesday, July 23, 2025 - 07:18
The risks of heat are only growing thanks to lasting heat waves, extreme nighttime temperatures and unusual humidity, like the current "corn sweat" in the Midwest.
Xfinity vs. Spectrum: Which Is the Better Cable Internet Provider? - Wednesday, July 23, 2025 - 08:00
These two cable giants are available to over 100 million Americans, but which offers better internet service?
53 of the Best TV Shows on Netflix That Will Keep You Entertained - Wednesday, July 23, 2025 - 08:00
Yes, you should absolutely binge them.
AppleCare One Will Protect Multiple Devices in One Plan, Just in Time for an iPhone 17 - Wednesday, July 23, 2025 - 08:00
The revamp of AppleCare will also cover older devices that are in good condition, but it may include higher prices for single-device coverage.
How to Get Starlink’s $349 Satellite Dish for Free - Wednesday, July 23, 2025 - 08:52
SpaceX is currently offering its Standard Kit free to customers in 26 states.
A Murderer Is Among Us in Square Enix's Killer Inn - Wednesday, July 23, 2025 - 09:00
In a Killer Inn hands-on preview, I lied, cheated and fought my way through the new murder mystery game.
Nintendo's Mario Party Upgrades for Switch 2 Feel Like Unnecessary Gimmicks - Wednesday, July 23, 2025 - 09:01
The new camera and mouse modes don't bring anything essential to the party.

Pages