The lessons SaaS businesses must learn from 2020
 
  Put simply, there are two types of churn for SaaS businesses, and two stages
  when it happens. Voluntary, or “active” churn is when a customer chooses to
  cancel their subscription with a business. Involuntary, or “passive” churn
  comes from subscriptions being cancelled due to accidental reasons, like
  failed payments. Typically, you would expect 20-40% of churn to be
  involuntary, and most of that will be coming from card payment users, where a
  payment fails because customers haven’t been charged successfully. This is
  positive, because it means you can put in place measures for better payment
  acceptance to stop involuntary churn happening. However, because of the Covid
  crisis, and the higher number of companies competing for the same amount of
  customers, it’s likely that the percentage of voluntary churn will be higher
  in 2021, as customers shop around for a better deal. At Paddle, we talk to
  around 200 new software companies a month, as well as our 2,000 existing
  customers when advising them on how to sell into over 200 countries across the
  world. Therefore, we’ve seen first-hand the impact churn reduction strategies
  can have on a software business’s growth.
Mac Attackers Remain Focused Mainly on Adware, Fooling Users
  A recent report by The Citizen Lab at the University of Toronto underscored
  that the commercial sale of zero-click exploits in iMessages, for example,
  continues to allow governments to buy access to target dissidents. Now,
  malware families that have previously only targeted Windows, and sometimes
  Linux, are also being ported to target Macs, says Ian Davis, a senior threat
  researcher at BlackBerry. "Historically MacOS threats mainly centered around
  adware and trojanized downloaders of well-known software," he says. "While
  these less-than-lethal families are still the majority of encountered samples,
  advanced attacks and toolsets are now being developed and deployed along with
  their counterparts for Windows and Linux." Overall, the sophistication of
  MacOS threats is increasing, the two researchers say. Previously encountered
  families on Windows or Linux are also now targeting MacOS systems. In 2020,
  the community saw increased cases of ransomware, botnet campaigns, and
  information-stealing backdoors in MacOS environments. Mac User = The
  Vulnerability While at least a quarter of the threats encountered by Windows
  systems are malware, less than 1% of those encountered by Mac systems are
  considered malware, Malwarebytes stated in its February report. Instead,
  attackers targeting the Mac look to fool the user into taking the necessary
  steps to allow malware to run.
2021 blockchain predictions from Energy Web
 
  Numerous countries—from China and Singapore in Asia to Sweden and France in
  Europe to Saudi Arabia and the United Arab Emirates in the Middle East—are all
  exploring centralized bank digital currency (CBDC) equivalents of their
  respective fiat currencies. Crypto exchanges like Kraken are taking the
  unprecedented step of getting bank licenses. Decentralized exchanges are
  overtaking centralized incumbents (in August, for example, Uniswap surpassed
  Coinbase Pro in trading volume). And in mid-December Bitcoin reached an
  all-time high, for the first time crested US$23,000, mainly driven this time
  by the interest of large enterprises. Meanwhile, the ‘data for free’ model
  that has existed for years is coming to an end, and not just because of
  legislation such as the EU’s GDPR and California’s CCPA. Consumers are
  fighting back against losing control of their own data as tech giants find
  themselves the target of lawsuits. In April, a U.S. federal appeals court
  revived litigation that accused Facebook of violating users’ privacy rights by
  illegally tracking their Internet activity. In September, a coalition of
  Canadian provinces sued Google in a proposed class action lawsuit alleging the
  Internet giant was collecting data without consent. That same month the Irish
  Data Protection Commission issued a preliminary decision to halt Facebook’s
  trans-Atlantic data transfers.
Team-Level Agile Anti-Patterns - Why They Exist and What to Do about Them
  At the team level, lack of adequate training, mentoring and coaching is
  responsible for a good bit of it, but it is hard to divorce the team from the
  organisation. Negative organisational culture will of course affect its teams.
  Agile can be counter intuitive, especially when it contradicts traditional
  business experience, but a good Scrum Master/Coach should not only explain a
  best practice, but should also explain why it’s best practice and should
  explain what bad things happen if the anti-pattern remains unaddressed. Some
  examples in my personal experience: I once worked on a team where a tech lead
  met with the rest of the Development team immediately after Sprint Planning to
  allocate Stories to each member of the team. I initially didn’t know this was
  happening, but my suspicions were soon raised by a couple of
  things: Sprint Backlog items were not being picked up in priority order;
  and The tech lead only worked on the easier items. I asked
  individuals why they were working on lower priority stories when there was a
  higher priority story remaining in the To Do column. That’s when it came out
  in the wash. The tech lead didn’t mean any harm. When I spoke with him, he
  told me that’s what was expected of him by managers in his previous postings.
The Great Data Protection Debate: India’s new Data Protection Bill
 
  The Data Protection Bill suggests that personal data should include data
  “…relating to a natural person who is directly or indirectly identifiable,
  having regard to any characteristic, trait, attribute or any other feature of
  the identity… or any combination of such features, or any combination of such
  features with any other information…” [Section 3(28)]. Verbiage apart, the
  Bill essentially says that any data that identifies you in connection with any
  other information is your personal data. Naturally, this creates a recipe for
  competing claims. What if ‘any other information’ were to include somebody
  else’s personal data? All these complications have led data experts to argue
  that citizens should hold control over their data collectively, rather than
  individually. These ‘data-co-operatives’ would act as trade unions within
  conventional markets. Among others, they may negotiate rates for data, ensure
  quality digital output, invoice organizations that benefit from the output,
  and distribute the profits. Global data trusts may not be far away. In
  January, Microsoft’s CEO, Satya Nadella, at the World Economic Forum called
  for greater respect for “data dignity” - meaning individuals should have
  greater control over their data and a larger share in the value it creates.
The need for zero trust security a certainty for an uncertain 2021
  After a few years of relative predictability, data privacy promises to get
  more “interesting” in 2021. The GDPR and CCPA regulatory regimes each notched
  milestones in 2020. The GDPR (as of this writing) had assessed a record level
  of fines totaling €220 million. California’s CCPA enforcement kicked in on
  July 1st, and voters in that state passed additional privacy restrictions via
  a November ballot initiative (the California Privacy Rights Act or CRPA). The
  CRPA extends and modifies the CCPA, with new mandates taking effect at the end
  of 2022. Here’s where things are going to get interesting. Optimistically,
  effective COVID-19 vaccines will facilitate the ability for in-person work by
  mid-year. But it’s just as likely delays in distribution, reluctance to
  inoculate and lingering stress on the healthcare system will extend
  work-from-home practices for many through 2021. Either way, organizations will
  face obligations and temptations to collect more data on their employees –
  about their immunization status, health situation, work habits, even their
  social interaction patterns – than ever before. Today, most practitioners
  focus on risks from external threat actors. But with a bracing action in
  October, the GDPR authority showed they’re equally concerned with human
  resources data when they slapped clothing retailer H&M with a €35 million
  fine for illegal employee surveillance.
DevSecOps: The good, the bad, and the ugly
  DevSecOps requires patience and tenacity. Any DevSecOps implementation takes a
  minimum of a year—anything less than that is incomplete. It will involve a lot
  of planning and designing before you start setting up the solution. You must
  first identify the gaps in your current process and then determine the tools
  required to support the process you intend to implement. You will need to
  coordinate with a variety of teams to get buy-in and instruct them to
  implement the required changes. None of this happens overnight. Making changes
  to your process affects all people involved in the process and all
  applications following the process. If all your applications are being scanned
  using a common set of libraries, any change in these libraries will impact all
  apps unless you put in specific conditions. Adding a new application to this
  process may take a long time. Onboarding .Net applications usually take a lot
  more time because they must build correctly. Visual Studio tends to hide a lot
  of build errors and provides dependencies at runtime; this is less true for
  MSBuild. In cases when the app team built an application using Visual Studio
  and checks it in, an automated process using the MSBuild command line can
  break due to a variety of reasons.
Reference Architecture For Healthcare – Core Capabilities
 
  Users of the reference architecture are planners, managers, and architects.
  They need to be able to deal with various aspects – the delivery of
  healthcare, use of technology, commercial viability, adherence to quality,
  regulatory compliance. They need to plan, establish, and maintain capabilities
  required in their healthcare organization. For these users, we need to provide
  a formal and versioned specification that outlines the elements of the
  reference architecture, and how these elements relate to each other. In
  addition, this specification needs to provide guidance how to implement and
  use the reference architecture. To make the reference architecture actionable
  asks for a reference implementation, which is a released model of the
  specification. Ideally, the authors of the reference architecture should make
  this reference implementation available for download. Let us assume the
  reference implementation is developed in a specific modeling tool. For users
  of different modeling tools, the reference implementation should also be
  available in a neutral industry-standard exchange format, such as XMI or MOF.
  ... In many countries, healthcare organizations need to establish a Quality
  Management System. They want to use a blueprint to achieve compliance with ISO
  9001 for healthcare.
Trends push IT and OT convergence opportunities and challenges
 
  Historically, IT excluded real-time OT localized data and OT lacked IT data
  aggregation. Edge AI capabilities require both real-time computing and
  aggregation. Organizations have struggled to incorporate IoT and edge data
  into current processes because the data must be actionable in real-time,
  Devine said. Organizations must feed the data from the physical OT system to
  learn from it and make decisions from it. To aggregate data, organizations
  must break down data silos in different systems, such as manufacturing supply
  chains. Approximately 75% of data loses its value in milliseconds and data is
  only valuable to organizations if it is actionable, Devine said. If
  organizations must send data from the edge to the cloud, then real-time
  actions aren't viable. The challenge is getting an aggregate view across data
  silos to take localized action, but when real-time aggregation is achieved,
  organizations can derive more insights and look for new revenue opportunities.
  "IoT is the great provider of data. CEOs and CIOs [must] continually look to
  see how data can fuel digital transformation and drive innovation. IoT data is
  the fuel for analytics, machine learning… but it's also the source for CIOs to
  help fuel new business models [such as] as-a-service [and] work from
  anywhere," Turner said.
Using Microsoft 365 Defender to protect against Solorigate
From the threat analytics report, you can quickly locate devices with alerts
related to the attack. The Devices with alerts chart identifies devices with
malicious components or activities known to be directly related to Solorigate.
Click through to get the list of alerts and investigate. Some Solorigate
activities may not be directly tied to this specific threat but will trigger
alerts due to generally suspicious or malicious behaviors. All alerts in
Microsoft 365 Defender provided by different Microsoft 365 products are
correlated into incidents. Incidents help you see the relationship between
detected activities, better understand the end-to-end picture of the attack, and
investigate, contain, and remediate the threat in a consolidated manner. ... The
threat analytics report also provides advanced hunting queries that can help
analysts locate additional related or similar activities across endpoint,
identity, and cloud. Advanced hunting uses a rich set of data sources, but in
response to Solorigate, Microsoft has enabled streaming of Azure Active
Directory (Azure AD) audit logs into advanced hunting, available for all
customers in public preview. These logs provide traceability for all changes
  done by various features within Azure AD.
Quote for the day:
"As a leader, you set the tone for your entire team. If you have a positive attitude, your team will achieve much more." -- Colin Powell
 
 
No comments:
Post a Comment