4 Ways AI Should Be Playing a Role in Your DX Strategy
Tech Has Advanced Rapidly—And Cybersecurity Needs To Catch Up
Microsoft Office Users Warned on New Malware-Protection Bypass
“The malware arrives through a phishing email containing a Microsoft Word
document as an attachment. When the document is opened and macros are enabled,
the Word document, in turn, downloads and opens another password-protected
Microsoft Excel document,” researchers wrote. Next, VBA-based instruction
embedded in the Word document reads a specially crafted Excel spreadsheet cell
to create a macro. That macro populates an additional cell in the same XLS
document with an additional VBA macro, which disables Office defenses. “Once the
macros are written and ready, the Word document sets the policy in the registry
to ‘Disable Excel Macro Warning,’ and invokes the malicious macro function from
the Excel file. The Excel file now downloads the Zloader payload. The Zloader
payload is then executed using rundll32.exe,” researchers said. Because
Microsoft Office automatically disables macros, the attackers attempt to trick
recipients of the email to enable them with a message appearing inside the Word
document. “This document created in previous version of Microsoft Office Word.
To view or edit this document, please click ‘Enable editing’ button on the top
bar, and then click ‘Enable content’,” the message reads.How cybersecurity is getting AI wrong
Unknown unknowns are so prevalent in cyberspace that many service providers
preach to their customers to build their security strategy on the assumption
that they’ve already been breached. The challenge for AI models emanates from
the fact that these unknown unknowns, or blind spots, are seamlessly
incorporated into the models’ training datasets and therefore attain a stamp of
approval and might not raise any alarms from AI-based security controls. For
example, some security vendors combine a slate of user attributes to create a
personalized baseline of a user’s behavior and determine the expected
permissible deviations from this baseline. The premise is that these vendors can
identify an existing norm that should serve as reference point for their
security models. However, this assumption might not hold water. For example, an
undiscovered malware may already reside in the customer’s system, existing
security controls may suffer from coverage gaps, or unsuspecting users may
already be suffering from an ongoing account takeover. Errors: It would not be
brazen to assume that even staple security-related training datasets are
probably laced with inaccuracies and misrepresentations. What are the most common cybersecurity challenges SMEs face today?
The ENISA report provides advice for SMEs to successfully cope with
cybersecurity challenges, particularly those resulting from the COVID-19
pandemic. With the current crisis, traditional businesses had to resort to
technologies such as QR codes or contactless payments they had never used
before. Although SMEs have turned to such new technologies to maintain their
business, they often failed to increase their security in relation to these new
systems. Research and real-life experience show that well prepared organizations
deal with cyber incidents in a much more efficient way than those failing to
plan or lacking the capabilities they need to address cyber threats correctly.
Juhan Lepassaar, EU Agency for Cybersecurity Executive Director said: “SMEs
cybersecurity and support is at the forefront of the EU’s cybersecurity strategy
for the digital decade and the Agency is fully dedicated to support the SME
community in improving their resilience to successfully transform digitally.” In
addition to the report, ENISA also publishes the Cybersecurity Guide for SMEs:
“12 steps to securing your business”. Your dev team lead is not controlling enough
When I first got promoted to team lead I was highly controlling. I literally did most of my team's work for them. I worked seventeen hours a day six days a week to ensure every single task was completed to my exact specification. The people that worked for me were unhappy (some actively disliked me personally) but we got results that the CEO cared about so it went unnoticed. And I was good at managing up, so I actually got promoted for this behavior! I was in my early twenties and motivated by the wrong things (power, money, and, of course, control). I look back on the period with embarrassment and I've actually apologized to many of the people who worked for me back then. ... when I realized micro-management was wrong, I naturally swung the pendulum in the exact opposite direction. I told myself I was hiring smart people and I should leave them alone. I'm good at hiring so it kind of worked. But, again, the people who worked for me suffered -- this time in a way that they noticed much less. Good people actually want feedback! It's not good for their work to go unchallenged because then it's harder to improve.Cyber security too often takes back seat in C-Suite
The Rise of the ML Engineer
Just fifty years ago, machine learning was a new idea. Today it’s an integral
part of society, helping people do everything from driving cars and finding
jobs to getting loans and receiving novel medical treatments. When we think
about what the next 50 years of ML will look like, it’s impossible to predict.
New, unforeseen advancements in everything from chips and infrastructure to
data sources and model observability have the power to change the trajectory
of the industry almost overnight. That said, we know that the long run is just
a collection of short runs, and in the current run, there is an emerging set
of tools and capabilities that are becoming standards for nearly every ML
initiative. We have written about the 3 most important ML tools: a feature
Store, a model store, and an evaluation store. Click here for a deeper
dive. Beyond the tools that power ML initiatives, the roles that shape
data teams are also rapidly evolving. As we outline in our ML ecosystem
whitepaper, the machine learning workflow can be broken into three stages —
data preparation, model building, and production and at every step of the
process, the skills and requirements are different:Cloud computing's destiny: operating as a single global computer, enabled by serverless
For all the progress of what's happening on cloud, we have to "get to the
point where we get the cloud to work as if it was a single infinitely powerful
computer," says Nagpurkar. Right now, there are too many obstacles in the way,
she adds. "Think about the simplicity of just working on your laptop. You have
a common operating system tools you you're familiar with. And, most
importantly, you're spending most of your time working on code. Developing on
the cloud is far from that. You have to understand the nuances of all the
cloud providers -- there's AWS, Azure, GCP, IBM, and private clouds. You have
to provision cloud resources that might take a while to get online. And you
have to worry about things like security, compliance, resiliency, scalability,
and cost efficiency. It's just a lot of complexity." Proprietary software
stacks from different vendors "not only add to all this complexity but they
stifle innovation," she says. "Key software abstractions start with the
operating system. Linux as the operating system for the data center era
unleashed this proliferation of software, including virtualization
technologies like containers. That ushered in the cloud era."
'Barely able to keep up': America's cyberwarriors are spread thin by attacks
Cybersecurity professionals can barely keep up despite significant industry
growth in recent years — and plenty more money is pouring in. That money is
chasing a limited talent pool, with almost a half-million cybersecurity jobs
unfilled, according to CyberSeek, a project that tracks the industry and is
sponsored by the federal National Institute of Standards and Technology. The
government is also on a massive hiring spree, with the Department of Homeland
Security racing to fill more than 2,000 cybersecurity jobs. Secretary
Alejandro Mayorkas called it a victory last week that it had recently
onboarded almost 300 new employees and offered jobs to 500 more. It’s a
problem that some in the cybersecurity industry are hoping to address even in
the years to come. The National Cryptologic Foundation, a nonprofit affiliate
for the National Security Agency, offers free educational materials to middle
schools. The Center for Infrastructure Assurance and Security at the
University of Texas at San Antonio has produced free cybersecurity educational
games for students in an effort to inspire young people to consider careers in
the industry.Quote for the day:
"The great leaders have always stage-managed their effects." -- Charles de Gaulle
No comments:
Post a Comment