Security-as-Code Gains More Support, but Still Nascent
"The great thing about security-as-code is that you know the configuration that
you have deployed exactly corresponds to what you had specified and analyzed as
meeting your security requirements," he says. "Many breaches out there are not
necessarily the result of an unknown risk, but are usually the result of some
control that the organization thought they had not being deployed and operating
when they needed it the most." Security-as-code is an extension of the
infrastructure-as-code movement that has come about as software-defined networks
and systems have become more popular. DevOps teams have adopted
infrastructure-as-code as the de facto standard for building and deploying
software, containers, and virtual machines, but now companies are betting that
the shift to cloud-native infrastructure will make security-as-code a key part
of a sustainable approach to security. ... Google is joined by others blazing a
trail into the security-as-code arena. The growing movement to encode security
as a configuration file that can be incrementally improved led security firm
Tenable Network Security to acquire Accurics, a maker of security-as-code
technology.The evolving role of the lawyer in cybersecurity
Disruptive Innovation: The emerging sectors applying digital technologies
Property technology, or Proptech, has been disrupting the real estate space,
allowing for the buying, renting and selling of properties online. Like other
industries on this list, Proptech companies have been vital for maintaining
operations during lockdown as company headquarters closed their doors.
Landlords and homeowners can securely list properties on an online market via
a website or app, and in more recent times have been able to upload virtual
viewings. Meanwhile, data analytics and algorithms powered by AI have allowed
users to see what properties would be best for them. Additionally, platforms
such as PlanetRent offer centralised portals for hosting relevant documents
and details in one place. Proptech, and indeed real estate, also encompasses
offices, and demand for companies in this area of the sector have been in high
demand due to the need for organisations to move to smaller spaces, or leave
the office altogether. Here, users can view office listings and make
transactions online.Flexible return-to-office policies are hammering employee experiences
The latest report observed that just more than a third of knowledge workers
(34%) have reverted to working from the office five days a week, the greatest
share since it began surveying in June 2020, but as this was happening,
employee experience scores were plummeting for knowledge workers asked to
return to the office full-time and for those who do not have the flexibility
to set their own work schedules. This includes 28% worse scores on
work-related stress and anxiety and 17% worse scores on work-life balance
compared with the previous quarter. Moreover, the study warned there were
signs that employers will pay a price for this discontent: workers who say
they are unsatisfied with their current level of flexibility – both in where
and when they work – were now three times as likely to look for a new job in
the coming year. The data showed that non-executives were facing far more
strain during the return-to-office era than leaders in the C-suite, further
widening an existing executive-employee disconnect on key job satisfaction
measures revealed in October 2021.
IoT Is a Breakthrough for Automation Systems, But What About Security?
Since the IoT and smart devices collect heaps of consumer data stored over
the cloud and are managed in real-time, leveraging the traditional security
tools and practices to ensure security doesn’t make any sense. As far as the
automation industry is concerned, providing real-time access to applications
and devices and ensuring robust security without human intervention becomes
an uphill battle. Moreover, cybercriminals are always looking for a loophole
in the networks that provide frequent access to resources, devices, and
applications that they can exploit to sneak into a network. Hence, stringent
security mechanisms become crucial for businesses leveraging IoT to automate
their processes. Here’s where the role of a centralized data infrastructure
seamlessly routes all IoT devices through an API that further offers
insights regarding machine-to-machine access and user access in
real-time. Through zero-trust principles and machine-to-machine access
management, businesses can deliver a seamless, secure, and monitored
experience to their customers without compromising their identities and
personal information.
Interim CIOs Favored as Organizations Seek Digitalization Push
This is happening because of an overall talent shortage juxtaposed with
talent growth in the on-demand talent pool, coupled with more demand for the
CIO role because of digital transformation. “Companies need more from the
CIO; it’s harder to get this talent, they need to move faster, and there's
fantastic talent that can work remotely,” he explained. Neil Price, head of
practice, CIO and executive technology leadership for Harvey Nash Group,
pointed out the concept of an interim CIO is not new. However, it is
becoming ever more attractive due to the volume of technology transformation
that businesses are looking to execute to keep pace in the post-pandemic
digital environment. “They need accelerated change, and for this, an interim
CIO who comes in with a very specific brief and a clear deadline or end-date
can bring the concentrated focus and impetus needed,” he said. “It’s easier
to deliver change with a fresh set of eyes, and this is something an interim
CIO offers.” He added the concept of an interim CIO can apply equally across
all types of business, and any organization that wants to change at pace can
see the benefits, whether it’s a small or medium-sized business or a large
enterprise.
Artificial Intelligence (AI) strategy: 4 priorities for CIOs
One of the most critical priorities is identifying high-impact areas with
opportunities to embed AI-based, real-time decisions in business processes.
The ability to process contextual information in real time to make on-the-fly
decisions is a powerful way to differentiate products, services, and
experiences in the crowded marketplace. For example, insurance firms can
automate claims processing for real-time approvals based on pictures and
videos provided by the claimant right from the place and time of the incident.
Lenders can analyze risks in real time based on collateral and background
information to offer on-the-spot loan approvals. Organizations can personalize
and customize products and services across a broad array of use cases through
the judicious injection of AI in their business processes. ... Since AI
engineering differs from “traditional” software engineering, CIOs must
establish a strategy to institutionalize AI and ML methodologies. Many
enterprises have found that the most effective way to do this is to establish
a robust platform supported by a governance model.Securely Scaling the Myriad APIs in Real-World Backend Platforms
Most real-world software platforms will also interact with external APIs from business partners or third-party providers. A good authorization server and an understanding of OAuth standards will also improve your capabilities for this type of “federation.” One interesting use case is shown below, where a partner user is authorized to sign in to the company’s app. The partner authorization server could then act as an identity provider to authenticate the user according to the partner’s security policy and with familiar credentials. An embedded token from the business partner could then be used by the company’s APIs to call partner APIs. ... JWT libraries will allow APIs to use a clock skew when validating access tokens, and it is possible to configure this slightly higher for downstream APIs. It is not recommended to rely on expiry times, however, since there can be multiple reasons for a JWT to fail validation. In some setups, this might be caused by an infrastructure event such as a load balancing failover. Instead, it is recommended to implement standard expiry handling. In this case, retrying from the client is often the most resilient option.AWS Serverless Lambda Resiliency: Part 1
This is critical as serverless Lambda functions are charged based on Memory
limits (which determines the CPU allocation) along with the duration for
which these functions are invoked. Without appropriate resiliency, our
Lambda services could execute for a longer duration than required, our
Lambda could overwhelm the backend services when they are having issues and
not available or being in a degraded state, and client experiences that
invoke our Lambda functions do not get an immediate fallback response. ...
AWS Lambda Serverless capabilities themselves have multiple use cases when
invoked synchronously or asynchronously and hence the context of how they
can be made resilient can differ between the different invocations. The
approaches change based on whether the solution is deployed in a single
region vs. multiple regions. There is also a dependency on where the
provider service is deployed, e.g., on AWS (same or another region) or
outside AWS. We will identify ways to ensure that warm start Lambdas are not
carrying forward issues that happened during cold start initialization. The
overall objective is to reduce Lambda functions' execution time/memory
consumption by optimizing them before deployment.
Cross-platform UIs ‘go live’ with .NET MAUI
You can best think of MAUI as a way to unify the various platform-specific .NET APIs so that C# and XAML code can be written once and run everywhere, with the option of providing platform-specific code to avoid a lowest common denominator approach. MAUI sits above both native code and the common base-class libraries. Your code calls MAUI APIs, which then call the requisite platform APIs. If you prefer to have native-specific features, you can call platform APIs directly if they don’t have MAUI coverage. This approach gives you a base set of common controls, much like those used by Xamarin Forms, with a layout engine that allows UI code to scale between different device form factors and screen sizes. It’s important to be aware of the capabilities of your target devices and, at the same time, come up with UI designs that can support the shift between landscape PC and Mac experiences and portrait mobile screens. Much of MAUI is the familiar XAML design experience, with a page description and code-behind to manage interactions with the rest of your application, as well as a canvas for displaying and interacting with custom graphic elements.Quote for the day:
"The great leaders are like best conductors. They reach beyond the notes to reach the magic in the players." -- Blaine Lee
No comments:
Post a Comment