“AI and machine learning tools can absolutely help people do their jobs more effectively now more than ever,” said Lonas. “Security professionals are always in short supply, and now possibly unavailable or distracted with other pressing concerns. Businesses are facing unprecedented demands on their networks and people, so any automation is welcome and beneficial.” In machine learning, a subset of AI, algorithms self-learn and improve their findings and results without being explicitly programmed to do so. This means a business deploying AI/ML is improving its threat-fighting capabilities without allocating additional resources to the task– something that should excite cash-strapped businesses navigating tough economic realities. Our AI/ML report backs up Lonas’s assertion that these technologies make a welcome addition to most business security stacks. In fact, 94 percent of respondents in our survey reported believing that AI/ML tools make them feel more comfortable in their role. “People who use good AI/ML tools should feel more comfortable in their role and job,” he asserts. “Automation takes care of the easy problems, giving them time to think strategically and look out for problems that only humans can solve.
Since Power BI Report Server launched in June 2017, it’s been adopted by thousands of customers in a variety of industries, giving them a way to use and share Power BI reports on-premises. As the BI industry has evolved over the last three years, we continue to see more and more customers choosing to make the switch to the cloud. The availability of paginated reports in the Power BI service enables organizations to centralize and manage their BI workloads in one single global location – Power BI. This is why we’ve always positioned Power BI Report Server as an on-premises solution for reporting today, with the flexibility to move to the cloud tomorrow. As more customers than ever take that next step in their cloud journey, we’re taking steps to help these customers make the transition successfully. We’ve recently updated our licensing terms to allow SQL Server Enterprise customers with software assurance to deploy Power BI Report Server on Azure VM’s for production use by leveraging their Azure Hybrid Benefit. For many customers, moving their internal servers to Infrastructure as a Service (IaaS) offerings in the cloud represent the first step in their digital transformation.
Many organizations weren’t expecting the transition to remote work and have found themselves needing to improvise. As a result, numerous employees are working from home on devices that had never left the corporate environment before this time—even laptops that were always stored in the office when they weren’t in use. Others are being challenged to adapt their personal devices for professional purposes for which they were never configured or intended. For security teams seeking visibility into cloud applications across employee-owned devices (BYOD), a full Cloud Access Security Broker (CASB) solution is needed. This allows for real-time auditing and control of your cloud app usage on both managed and unmanaged devices. A CASB solution will also enable you to monitor for and restrict usage of non-corporate instances of cloud applications, as well as to apply individual security policies on a per-device basis. Just like water flows downhill, employees tend to gravitate toward technologies that allow them to work in the most frictionless ways. If there’s widespread interest in using a particular tool, it may make the most sense to sanction—and then monitor—its usage.
The sheer variety of data types used in the attack, along with signs of significant coordination, suggests a knowledgeable attacker, he says. "What was really different is that the absolute kitchen sink was thrown in for this attack," Barranco says. More than nine different types of traffic were used in the attack - far more than the two or three types used in a typical attack - and the traffic surge lasted about an hour. Most attacks are measured in minutes, so this was notable. "It's has been a long time that we've seen the duration that long and an attack of that size." A typical year of denial-of-service attacks includes a massive number of smaller attacks targeting gaming sites, often to give one player an edge over the competition, and a few massive bandwidth attacks. Over the past 24 months, the median denial-of-service attack has peaked at less than 250,000 packets-per-second, according to Akamai's State of the Internet (SOTI) report. Very few attacks have surged far beyond that average. Security firm Imperva recorded a 500 million packet-per-second attack in early 2019, for example. The attack weathered by Akamai and its customer came close to that packet rate, but surpassed the bandwith of that previous attack because the average packet seen by Akamai consisted of more data.
As a leader, your new — and perhaps only — mission is to change your company with the times. It’s clear that businesses that are essential to people’s lives will recover faster, and those that are perceived as extraneous will have a short runway to adapt to the new normal. But this is a moment for leaders of all businesses to grapple with what is essential about their own operations, processes, and products or services. Everything you do now will be scrutinized: Is it essential or not? Companies holding out for a post–COVID-19 bounce back to things as they were will be sorely disappointed. Instead, consider this just the beginning of shifting behavior from consumers. That reality calls for a new kind of thinking and action from companies: Double down on digital transformation, know what to hold, manage in shorter increments, and plan for operational resilience. The time to stop dabbling in digital transformation was pre–COVID-19. The difficulties of ramping up online stores and systems for suddenly remote employees — including implementing virtual digital tools for collaboration and product management in scattered living rooms and on dining tables — are evident.
A federal judge has sentenced an Iranian-born, U.S. naturalized citizen to five years in prison for one in a series of distributed denial-of-service attacks over the course of at least five years, according to the Department of Justice. Andrew Rakhshan, 40, formerly known as Kamyar Jahanrakhshan, pleaded guilty to one count of conspiracy to commit computer fraud in February. In addition to the jail sentence, he was fined $520,000. Starting in 2015, Rakhshan conducted a series of DDoS attacks against websites that had posted legal information about his prior conviction for fraud in Canada, according to the Justice Department. One of the sites that Rakhshan targeted with a DDoS attack, called Leagle.com, is based in Canada but it's servers are housed in Texas. Rahshan's guilty plea in February was in connection with the attack on this website, prosecutors say. Rakhshan was originally arrested near Seattle in July 2017, and the case was transferred the U.S. Attorney's Office for the Northern District of Texas. Since his arrest, Rakhshan has remained in federal custody, according to the Justice Department.
Equally, some new opportunities might emerge to enable a smoother transition for workers. Robotics company Universal Robots, for example, is already deploying "cobots" (or collaborative robots) to businesses, which are designed to simplify the use of automation for human employees. The company has developed online courses, which it claims enable workers with no engineering background to program a "cobot" in only 87 minutes. The method, according to Universal Robots, reverses the idea that automation is taking jobs away from humans, and instead gives tools to employees to better control their day-to-day activities. Lund, for her part, is confident that the workforce will easily acquire the new skills that it will need – in part, because it already has. "Work skills have been evolving over the past years for many professions," she says. "With the advent of digital technologies, this has accelerated." "In Europe, subway train drivers have switched to becoming route optimizers, as trains have become automated," she continued. To succeed alongside robots in new types of work, employees will need skills that they don't currently have. The concept of "lifelong learning" will gather pace, therefore, as workers acquire new knowledge throughout their careers.
The platform debuted alongside Cisco's "2020 CISO Benchmark Report," which found many security leaders struggle with alert fatigue and other challenges when managing a multivendor environment. Eighty-six percent use up to 20 vendors. Of those who report alert fatigue, 93% receive at least 5,000 alerts per day and 17% report 100,000 or more alerts. Businesses with more vendors report longer downtime, higher costs, and more breached records after a cyberattack. It's not only security leaders who are feeling the effects. Cisco's recently released "CIO Perspectives 2020" study found security and complexity are the top two challenges CIOs face. More than two-thirds surveyed feel they are being stretched too thin, Cisco researchers found. "The challenge in the security industry is [that] we're not necessarily always helping," says Bret Hartman, CTO of Cisco's Security Business Group. Vendors are always creating new tools to buy and assemble, he adds, complicating the jobs of people who manage and protect them all. SecureX, which will be included in all Cisco Security products on June 30, is meant to simplify IT management and reduce the complexity that CIOs and CISOs often struggle to handle.
Under these new circumstances, CIOs must be working to deliver value to customers as fast as possible, both internally and externally. Platform companies are always reviewing customer utilization of their products and enhancing the experience, adding enhancements by chipping away at a backlog of features. In this day and age, CIOs must be adopting that same mindset for their customers. We must be reviewing and utilizing data to determine how we can drive more change that leads to better outcomes for our customers faster. .... The rules around work are being rewritten. As CIOs, we have the opportunity to encourage behavior change that will ultimately help our teams stay engaged. It can be as small as loosening up your own wardrobe choices to signify to your teams that getting work done is more important than donning a collared shirt, or as big as encouraging your teams to end work early on a Friday to enjoy some recharge time. As different parts of the country and world re-open, remember that it doesn’t necessarily mean your colleagues are sending their children back to school or summer camp.
The microkernel architecture pattern is a natural pattern for implementing product-based applications. And a product-based application is one that is packaged and made available for download in versions as a typical third-party product. However, many companies also develop and release their internal business applications like software products, complete with versions, release notes, and pluggable features. The microkernel architecture pattern allows you to add additional application features as plug-ins to the core application, providing extensibility as well as feature separation and isolation. The microkernel architecture pattern consists of two types of architecture components: a core system and plug-in modules. Application logic is divided between independent plug-in modules and the basic core system, providing extensibility, flexibility, and isolation of application features and custom processing logic. And the core system of the microkernel architecture pattern traditionally contains only the minimal functionality required to make the system operational.
Quote for the day: