Daily Tech Digest - December 29, 2020

The lessons SaaS businesses must learn from 2020

Put simply, there are two types of churn for SaaS businesses, and two stages when it happens. Voluntary, or “active” churn is when a customer chooses to cancel their subscription with a business. Involuntary, or “passive” churn comes from subscriptions being cancelled due to accidental reasons, like failed payments. Typically, you would expect 20-40% of churn to be involuntary, and most of that will be coming from card payment users, where a payment fails because customers haven’t been charged successfully. This is positive, because it means you can put in place measures for better payment acceptance to stop involuntary churn happening. However, because of the Covid crisis, and the higher number of companies competing for the same amount of customers, it’s likely that the percentage of voluntary churn will be higher in 2021, as customers shop around for a better deal. At Paddle, we talk to around 200 new software companies a month, as well as our 2,000 existing customers when advising them on how to sell into over 200 countries across the world. Therefore, we’ve seen first-hand the impact churn reduction strategies can have on a software business’s growth.


Mac Attackers Remain Focused Mainly on Adware, Fooling Users

A recent report by The Citizen Lab at the University of Toronto underscored that the commercial sale of zero-click exploits in iMessages, for example, continues to allow governments to buy access to target dissidents. Now, malware families that have previously only targeted Windows, and sometimes Linux, are also being ported to target Macs, says Ian Davis, a senior threat researcher at BlackBerry. "Historically MacOS threats mainly centered around adware and trojanized downloaders of well-known software," he says. "While these less-than-lethal families are still the majority of encountered samples, advanced attacks and toolsets are now being developed and deployed along with their counterparts for Windows and Linux." Overall, the sophistication of MacOS threats is increasing, the two researchers say. Previously encountered families on Windows or Linux are also now targeting MacOS systems. In 2020, the community saw increased cases of ransomware, botnet campaigns, and information-stealing backdoors in MacOS environments. Mac User = The Vulnerability While at least a quarter of the threats encountered by Windows systems are malware, less than 1% of those encountered by Mac systems are considered malware, Malwarebytes stated in its February report. Instead, attackers targeting the Mac look to fool the user into taking the necessary steps to allow malware to run.


2021 blockchain predictions from Energy Web

Numerous countries—from China and Singapore in Asia to Sweden and France in Europe to Saudi Arabia and the United Arab Emirates in the Middle East—are all exploring centralized bank digital currency (CBDC) equivalents of their respective fiat currencies. Crypto exchanges like Kraken are taking the unprecedented step of getting bank licenses. Decentralized exchanges are overtaking centralized incumbents (in August, for example, Uniswap surpassed Coinbase Pro in trading volume). And in mid-December Bitcoin reached an all-time high, for the first time crested US$23,000, mainly driven this time by the interest of large enterprises. Meanwhile, the ‘data for free’ model that has existed for years is coming to an end, and not just because of legislation such as the EU’s GDPR and California’s CCPA. Consumers are fighting back against losing control of their own data as tech giants find themselves the target of lawsuits. In April, a U.S. federal appeals court revived litigation that accused Facebook of violating users’ privacy rights by illegally tracking their Internet activity. In September, a coalition of Canadian provinces sued Google in a proposed class action lawsuit alleging the Internet giant was collecting data without consent. That same month the Irish Data Protection Commission issued a preliminary decision to halt Facebook’s trans-Atlantic data transfers.


Team-Level Agile Anti-Patterns - Why They Exist and What to Do about Them

At the team level, lack of adequate training, mentoring and coaching is responsible for a good bit of it, but it is hard to divorce the team from the organisation. Negative organisational culture will of course affect its teams. Agile can be counter intuitive, especially when it contradicts traditional business experience, but a good Scrum Master/Coach should not only explain a best practice, but should also explain why it’s best practice and should explain what bad things happen if the anti-pattern remains unaddressed. Some examples in my personal experience: I once worked on a team where a tech lead met with the rest of the Development team immediately after Sprint Planning to allocate Stories to each member of the team. I initially didn’t know this was happening, but my suspicions were soon raised by a couple of things: Sprint Backlog items were not being picked up in priority order; and The tech lead only worked on the easier items. I asked individuals why they were working on lower priority stories when there was a higher priority story remaining in the To Do column. That’s when it came out in the wash. The tech lead didn’t mean any harm. When I spoke with him, he told me that’s what was expected of him by managers in his previous postings.


The Great Data Protection Debate: India’s new Data Protection Bill

The Data Protection Bill suggests that personal data should include data “…relating to a natural person who is directly or indirectly identifiable, having regard to any characteristic, trait, attribute or any other feature of the identity… or any combination of such features, or any combination of such features with any other information…” [Section 3(28)]. Verbiage apart, the Bill essentially says that any data that identifies you in connection with any other information is your personal data. Naturally, this creates a recipe for competing claims. What if ‘any other information’ were to include somebody else’s personal data? All these complications have led data experts to argue that citizens should hold control over their data collectively, rather than individually. These ‘data-co-operatives’ would act as trade unions within conventional markets. Among others, they may negotiate rates for data, ensure quality digital output, invoice organizations that benefit from the output, and distribute the profits. Global data trusts may not be far away. In January, Microsoft’s CEO, Satya Nadella, at the World Economic Forum called for greater respect for “data dignity” - meaning individuals should have greater control over their data and a larger share in the value it creates.


The need for zero trust security a certainty for an uncertain 2021

After a few years of relative predictability, data privacy promises to get more “interesting” in 2021. The GDPR and CCPA regulatory regimes each notched milestones in 2020. The GDPR (as of this writing) had assessed a record level of fines totaling €220 million. California’s CCPA enforcement kicked in on July 1st, and voters in that state passed additional privacy restrictions via a November ballot initiative (the California Privacy Rights Act or CRPA). The CRPA extends and modifies the CCPA, with new mandates taking effect at the end of 2022. Here’s where things are going to get interesting. Optimistically, effective COVID-19 vaccines will facilitate the ability for in-person work by mid-year. But it’s just as likely delays in distribution, reluctance to inoculate and lingering stress on the healthcare system will extend work-from-home practices for many through 2021. Either way, organizations will face obligations and temptations to collect more data on their employees – about their immunization status, health situation, work habits, even their social interaction patterns – than ever before. Today, most practitioners focus on risks from external threat actors. But with a bracing action in October, the GDPR authority showed they’re equally concerned with human resources data when they slapped clothing retailer H&M with a €35 million fine for illegal employee surveillance.


DevSecOps: The good, the bad, and the ugly

DevSecOps requires patience and tenacity. Any DevSecOps implementation takes a minimum of a year—anything less than that is incomplete. It will involve a lot of planning and designing before you start setting up the solution. You must first identify the gaps in your current process and then determine the tools required to support the process you intend to implement. You will need to coordinate with a variety of teams to get buy-in and instruct them to implement the required changes. None of this happens overnight. Making changes to your process affects all people involved in the process and all applications following the process. If all your applications are being scanned using a common set of libraries, any change in these libraries will impact all apps unless you put in specific conditions. Adding a new application to this process may take a long time. Onboarding .Net applications usually take a lot more time because they must build correctly. Visual Studio tends to hide a lot of build errors and provides dependencies at runtime; this is less true for MSBuild. In cases when the app team built an application using Visual Studio and checks it in, an automated process using the MSBuild command line can break due to a variety of reasons.


Reference Architecture For Healthcare  – Core Capabilities 

Users of the reference architecture are planners, managers, and architects. They need to be able to deal with various aspects – the delivery of healthcare, use of technology, commercial viability, adherence to quality, regulatory compliance. They need to plan, establish, and maintain capabilities required in their healthcare organization. For these users, we need to provide a formal and versioned specification that outlines the elements of the reference architecture, and how these elements relate to each other. In addition, this specification needs to provide guidance how to implement and use the reference architecture. To make the reference architecture actionable asks for a reference implementation, which is a released model of the specification. Ideally, the authors of the reference architecture should make this reference implementation available for download. Let us assume the reference implementation is developed in a specific modeling tool. For users of different modeling tools, the reference implementation should also be available in a neutral industry-standard exchange format, such as XMI or MOF. ... In many countries, healthcare organizations need to establish a Quality Management System. They want to use a blueprint to achieve compliance with ISO 9001 for healthcare.


Trends push IT and OT convergence opportunities and challenges

Historically, IT excluded real-time OT localized data and OT lacked IT data aggregation. Edge AI capabilities require both real-time computing and aggregation. Organizations have struggled to incorporate IoT and edge data into current processes because the data must be actionable in real-time, Devine said. Organizations must feed the data from the physical OT system to learn from it and make decisions from it. To aggregate data, organizations must break down data silos in different systems, such as manufacturing supply chains. Approximately 75% of data loses its value in milliseconds and data is only valuable to organizations if it is actionable, Devine said. If organizations must send data from the edge to the cloud, then real-time actions aren't viable. The challenge is getting an aggregate view across data silos to take localized action, but when real-time aggregation is achieved, organizations can derive more insights and look for new revenue opportunities. "IoT is the great provider of data. CEOs and CIOs [must] continually look to see how data can fuel digital transformation and drive innovation. IoT data is the fuel for analytics, machine learning… but it's also the source for CIOs to help fuel new business models [such as] as-a-service [and] work from anywhere," Turner said.


Using Microsoft 365 Defender to protect against Solorigate

From the threat analytics report, you can quickly locate devices with alerts related to the attack. The Devices with alerts chart identifies devices with malicious components or activities known to be directly related to Solorigate. Click through to get the list of alerts and investigate. Some Solorigate activities may not be directly tied to this specific threat but will trigger alerts due to generally suspicious or malicious behaviors. All alerts in Microsoft 365 Defender provided by different Microsoft 365 products are correlated into incidents. Incidents help you see the relationship between detected activities, better understand the end-to-end picture of the attack, and investigate, contain, and remediate the threat in a consolidated manner. ... The threat analytics report also provides advanced hunting queries that can help analysts locate additional related or similar activities across endpoint, identity, and cloud. Advanced hunting uses a rich set of data sources, but in response to Solorigate, Microsoft has enabled streaming of Azure Active Directory (Azure AD) audit logs into advanced hunting, available for all customers in public preview. These logs provide traceability for all changes done by various features within Azure AD.



Quote for the day:

"As a leader, you set the tone for your entire team. If you have a positive attitude, your team will achieve much more." -- Colin Powell

No comments:

Post a Comment