
"The great thing about security-as-code is that you know the configuration that
you have deployed exactly corresponds to what you had specified and analyzed as
meeting your security requirements," he says. "Many breaches out there are not
necessarily the result of an unknown risk, but are usually the result of some
control that the organization thought they had not being deployed and operating
when they needed it the most." Security-as-code is an extension of the
infrastructure-as-code movement that has come about as software-defined networks
and systems have become more popular. DevOps teams have adopted
infrastructure-as-code as the de facto standard for building and deploying
software, containers, and virtual machines, but now companies are betting that
the shift to cloud-native infrastructure will make security-as-code a key part
of a sustainable approach to security. ... Google is joined by others blazing a
trail into the security-as-code arena. The growing movement to encode security
as a configuration file that can be incrementally improved led security firm
Tenable Network Security to acquire Accurics, a maker of security-as-code
technology.

On the purely defensive side, advanced warning of a forthcoming attack can be
the difference between a successful defensive posture or a damaging and costly
incident. With such intelligence in hand, organizations can craft rules on an
email gateway or firewall to effectively prevent attackers’ phishing email from
reaching employee inboxes or to block the ability of an employee to navigate to
a malicious link. Indeed, one of our attorney colleagues in New York used a
bespoke threat intelligence system that he developed to identify and help to
neutralize the domains that hosted a forthcoming cyberattack on the World Health
Organization at the outset of the Coronavirus crisis in March 2020. That bespoke
intelligence identified a domain and subdomain combination that allowed our
colleague to (i) validate the data and establish that he had indeed identified
an active threat to the WHO and (ii) communicate that data to trusted parties,
including law enforcement, enabling defensive countermeasures to be put in
place. This was a bright line example of how counsel can play a role in the
critical day-to-day functions of security operations.

Property technology, or Proptech, has been disrupting the real estate space,
allowing for the buying, renting and selling of properties online. Like other
industries on this list, Proptech companies have been vital for maintaining
operations during lockdown as company headquarters closed their doors.
Landlords and homeowners can securely list properties on an online market via
a website or app, and in more recent times have been able to upload virtual
viewings. Meanwhile, data analytics and algorithms powered by AI have allowed
users to see what properties would be best for them. Additionally, platforms
such as PlanetRent offer centralised portals for hosting relevant documents
and details in one place. Proptech, and indeed real estate, also encompasses
offices, and demand for companies in this area of the sector have been in high
demand due to the need for organisations to move to smaller spaces, or leave
the office altogether. Here, users can view office listings and make
transactions online.

The latest report observed that just more than a third of knowledge workers
(34%) have reverted to working from the office five days a week, the greatest
share since it began surveying in June 2020, but as this was happening,
employee experience scores were plummeting for knowledge workers asked to
return to the office full-time and for those who do not have the flexibility
to set their own work schedules. This includes 28% worse scores on
work-related stress and anxiety and 17% worse scores on work-life balance
compared with the previous quarter. Moreover, the study warned there were
signs that employers will pay a price for this discontent: workers who say
they are unsatisfied with their current level of flexibility – both in where
and when they work – were now three times as likely to look for a new job in
the coming year. The data showed that non-executives were facing far more
strain during the return-to-office era than leaders in the C-suite, further
widening an existing executive-employee disconnect on key job satisfaction
measures revealed in October 2021.

Since the IoT and smart devices collect heaps of consumer data stored over
the cloud and are managed in real-time, leveraging the traditional security
tools and practices to ensure security doesn’t make any sense. As far as the
automation industry is concerned, providing real-time access to applications
and devices and ensuring robust security without human intervention becomes
an uphill battle. Moreover, cybercriminals are always looking for a loophole
in the networks that provide frequent access to resources, devices, and
applications that they can exploit to sneak into a network. Hence, stringent
security mechanisms become crucial for businesses leveraging IoT to automate
their processes. Here’s where the role of a centralized data infrastructure
seamlessly routes all IoT devices through an API that further offers
insights regarding machine-to-machine access and user access in
real-time. Through zero-trust principles and machine-to-machine access
management, businesses can deliver a seamless, secure, and monitored
experience to their customers without compromising their identities and
personal information.

This is happening because of an overall talent shortage juxtaposed with
talent growth in the on-demand talent pool, coupled with more demand for the
CIO role because of digital transformation. “Companies need more from the
CIO; it’s harder to get this talent, they need to move faster, and there's
fantastic talent that can work remotely,” he explained. Neil Price, head of
practice, CIO and executive technology leadership for Harvey Nash Group,
pointed out the concept of an interim CIO is not new. However, it is
becoming ever more attractive due to the volume of technology transformation
that businesses are looking to execute to keep pace in the post-pandemic
digital environment. “They need accelerated change, and for this, an interim
CIO who comes in with a very specific brief and a clear deadline or end-date
can bring the concentrated focus and impetus needed,” he said. “It’s easier
to deliver change with a fresh set of eyes, and this is something an interim
CIO offers.” He added the concept of an interim CIO can apply equally across
all types of business, and any organization that wants to change at pace can
see the benefits, whether it’s a small or medium-sized business or a large
enterprise.

One of the most critical priorities is identifying high-impact areas with
opportunities to embed AI-based, real-time decisions in business processes.
The ability to process contextual information in real time to make on-the-fly
decisions is a powerful way to differentiate products, services, and
experiences in the crowded marketplace. For example, insurance firms can
automate claims processing for real-time approvals based on pictures and
videos provided by the claimant right from the place and time of the incident.
Lenders can analyze risks in real time based on collateral and background
information to offer on-the-spot loan approvals. Organizations can personalize
and customize products and services across a broad array of use cases through
the judicious injection of AI in their business processes. ... Since AI
engineering differs from “traditional” software engineering, CIOs must
establish a strategy to institutionalize AI and ML methodologies. Many
enterprises have found that the most effective way to do this is to establish
a robust platform supported by a governance model.
Most real-world software platforms will also interact with external APIs
from business partners or third-party providers. A good authorization server
and an understanding of OAuth standards will also improve your capabilities
for this type of “federation.” One interesting use case is shown below,
where a partner user is authorized to sign in to the company’s app. The
partner authorization server could then act as an identity provider to
authenticate the user according to the partner’s security policy and with
familiar credentials. An embedded token from the business partner could then
be used by the company’s APIs to call partner APIs. ... JWT libraries will
allow APIs to use a clock skew when validating access tokens, and it is
possible to configure this slightly higher for downstream APIs. It is not
recommended to rely on expiry times, however, since there can be multiple
reasons for a JWT to fail validation. In some setups, this might be caused
by an infrastructure event such as a load balancing failover. Instead, it is
recommended to implement standard expiry handling. In this case, retrying
from the client is often the most resilient option.

This is critical as serverless Lambda functions are charged based on Memory
limits (which determines the CPU allocation) along with the duration for
which these functions are invoked. Without appropriate resiliency, our
Lambda services could execute for a longer duration than required, our
Lambda could overwhelm the backend services when they are having issues and
not available or being in a degraded state, and client experiences that
invoke our Lambda functions do not get an immediate fallback response. ...
AWS Lambda Serverless capabilities themselves have multiple use cases when
invoked synchronously or asynchronously and hence the context of how they
can be made resilient can differ between the different invocations. The
approaches change based on whether the solution is deployed in a single
region vs. multiple regions. There is also a dependency on where the
provider service is deployed, e.g., on AWS (same or another region) or
outside AWS. We will identify ways to ensure that warm start Lambdas are not
carrying forward issues that happened during cold start initialization. The
overall objective is to reduce Lambda functions' execution time/memory
consumption by optimizing them before deployment.
You can best think of MAUI as a way to unify the various platform-specific
.NET APIs so that C# and XAML code can be written once and run everywhere,
with the option of providing platform-specific code to avoid a lowest
common denominator approach. MAUI sits above both native code and the
common base-class libraries. Your code calls MAUI APIs, which then call
the requisite platform APIs. If you prefer to have native-specific
features, you can call platform APIs directly if they don’t have MAUI
coverage. This approach gives you a base set of common controls, much like
those used by Xamarin Forms, with a layout engine that allows UI code to
scale between different device form factors and screen sizes. It’s
important to be aware of the capabilities of your target devices and, at
the same time, come up with UI designs that can support the shift between
landscape PC and Mac experiences and portrait mobile screens. Much of MAUI
is the familiar XAML design experience, with a page description and
code-behind to manage interactions with the rest of your application, as
well as a canvas for displaying and interacting with custom graphic
elements.
Quote for the day:
"The great leaders are like best
conductors. They reach beyond the notes to reach the magic in the
players." -- Blaine Lee
No comments:
Post a Comment