Multiple SD-WAN vendors can complicate move to SASE

The walls between networking and security teams must come down to deliver
cloud-based security and network services across today’s sophisticated networks.
“The opportunity to leverage a cloud-based architecture to enforce security
policies to distributed locations and remote workers is the real value of SASE.
It offers management efficiencies, it supports a modern workforce, and it
supports an important integration between the network and security teams,” IDC’S
Butler says. “In today’s world, when you have so many people working from home
and so many distributed applications, a cloud-based security approach is really
appealing.” As the market continues to evolve, vendors are boosting their
capabilities – networking vendors are acquiring or developing security
capabilities to offer SASE, and security providers are augmenting their product
portfolios with advanced networking capabilities to offer SASE. That aligns with
adoption trends; a majority (68%) of 830 respondents to an IDC survey said they
would like to use the same vendor for their SD-WAN and security/SASE
solution.
Decoding AI: Insights and Implications for InfoSec
AI is wonderfully adept at narrow tasks, but it is clueless beyond its
  specific training. It’s like a super-specialist who can thread a needle
  blindfolded but can’t understand why it shouldn’t sew its own fingers
  together. Say we task an AI with making a company network as secure as
  possible. It might suggest shutting down the network, preventing user access
  or even blocking external dataflows because, hey, it’s technically efficient!
  ... AI could reshape the world of cybersecurity in unimaginable ways, making
  our lives easier and more efficient. However, it is essential to bear in mind
  that AI, despite its remarkable abilities, is essentially a tool. It lacks the
  human touch—our capacity for intuition, empathy and understanding that extends
  beyond the data. AI will undoubtedly keep improving, but it is on us to guide
  its evolution in a way that respects our shared humanity and safeguards our
  values. So, the next time you see a headline touting the latest AI
  breakthrough, take a moment to appreciate the amazing technology—but remember
  that it’s not quite as “intelligent” as it might seem.
Sarah Silverman sues OpenAI, Meta over copyright infringement in AI training

The suits, filed last week in federal district court in San Francisco, argued
  that Microsoft-backed OpenAI and Meta didn’t have permission to use copyright
  works by Silverman and two other authors, Christopher Golden and Richard
  Kadrey, when it used them to train ChatGPT and Meta's LLaMA (Large Language
  Model Meta AI). It asks for injunctions against the companies to prevent them
  from continuing similar practices, as well as unspecified monetary damages.
  The heart of the lawsuit, according to the complaint, is OpenAI’s use of a
  data set called BookCorpus, which it said was created in 2015 for the purpose
  of large language model training. Much of BookCorpus, the plaintiffs say, was
  copied from a site called Smashwords, a host for self-published novels, which
  were under copyright. Additionally, the complaint alleges that there is no way
  that the book-based data sets used to train OpenAI came entirely from legal
  sources, as no legal databases offer enough content to account for the size of
  the “Books1” and “Books2” sets.
Law firms under cyberattack
As the UK National Cyber Security Centre (NCSC) noted in a recent report
  focusing on cyber threats to the legal sector, law firms handle sensitive
  client information that cybercriminals may find useful, including exploiting
  opportunities for insider trading, gaining the upper hand in negotiations and
  litigation, or subverting the course of justice. The potential consequences of
  such breaches can be severe, as the disruption of business operations can
  incur substantial costs. Ransomware gangs specifically target law firms to
  extort money in exchange for allowing the restoration of business operations.
  In 2020, the Solicitors Regulation Authority (SRA) published a cybersecurity
  review revealing that 30 out of 40 of the law firms they visited have been
  victims of a cyberattack. In the remaining ten, cybercriminals have directly
  targeted their clients through legal transactions. “While not all incidents
  culminated in a financial loss for clients, 23 of the 30 cases in which firms
  were directly targeted saw a total of more than £4m [$5m+] of client money
  stolen,” the SRA noted.
7 IT consultant tricks CIOs should never fall for

Making a business case - Consultants love this one. It’s where the CIO engages
  them to build the business case for a pet project or priority — not to
  determine whether there’s even a business case to be made. To make one,
  starting with the predetermined answer and working backward from there,
  employing such questionable practices as cherry-picked data, one-sided
  analyses, inappropriate statistical tests, and selective anecdotes to name a
  few, defining and justifying a strategic program whose success depends on …
  surprise! … a major engagement for the consultant’s employer. ... Win,
  then hire - This is less common for delivery teams than the consultants
  whose work resulted in the win that created the need for the delivery team,
  but still … Few consultancies keep a bench of any size. As a result, winning
  an engagement is often far more stressful than losing one, because after
  winning an engagement the consultancy has no more than a month or so to hire
  the staff needed to execute the engagement, familiarize the newly hired staff
  with the methodology and practices the engagement calls for, and build a
  working relationship with their new managers.
Why Qubit Connectivity Matters

Of course, high-connectivity architectures are not without disadvantages. High
  connectivity relies on the ability to shuttle qubits around, and shuttling
  qubits carries several potential issues. Shuttling qubits can be a relatively
  slow process compared to the speed of quantum gate operations. This can
  increase the total computation time and reduce the number of operations that
  can be performed before the qubits lose coherence. The process of moving
  qubits introduces the risk of decoherence, which is the loss of the quantum
  state due to interaction with the environment. Shuttling qubits also adds an
  extra layer of complexity to the design of the computer, and this can be
  challenging to implement, especially in a large-scale system. In summary,
  qubit connectivity plays a vital role in the performance and functionality of
  quantum computers. It impacts the implementation of quantum algorithms, the
  creation of quantum entanglement, error correction, and the overall
  scalability, speed, and efficiency of quantum computing systems. When one
  considers the quantum modality of choice for their application, qubit
  connectivity should be one of the factors taken under consideration.
Analysts: Cybersecurity Funding Set for Rebound

A lot of the optimism has to do with enterprises continuing to invest heavily
  in cybersecurity, despite a slowdown in other expenditures. Market research
  firm IDC expects that organizations will spend some $219 billion this year on
  security products and services — or some 13% more than they did in 2022 — to
  address threats, to support hybrid work environments, and to meet compliance
  requirements. The areas that will receive the most spending are managed
  security services, endpoint security, network security, and identity and
  access management. "While the theme of conservatism and expectations for
  continued headwinds have remained throughout the first half of the year, we do
  expect to see strategic activity slowly begin to rebound in the second half of
  2023 and into 2024," says Eric McAlpine, founder and managing partner of
  analyst firm Momentum Cyber. Financing and M&A activity will both
  eventually pick up as companies that were able to make do financially so far
  begin to feel the need for fresh capital to fuel their business, he says.
Why Enterprises Should Merge Private 5G With Programmable Communications

5G private networks provide an opportunity to integrate the application and
  the network so that the two can inform one another, allowing adjustments to be
  made in real time. Businesses not only have an improved network with a private
  cellular network, but they can also sync their applications with the network’s
  performance, enabling multiple tasks to be completed based on network
  performance at a specific moment. ... A new generation of digital engagement
  providers is looking at how these communication platforms evolve into
  platforms that integrate across a range of business processes. They are not
  only leveraging robust voice, video and messaging solutions but also
  introducing fully programmable computer vision and audio analytics solutions.
  This combination of communications and AI-based media analytics and
  programmability makes this evolved communications platform an ideal and
  unexpected solution to Industry 4.0 business needs. New communication
  platforms are focused less on meeting one business need but rather on the
  integration of communications to evolve and inform applications, making
  adjustments and building cost-effective efficiencies.
5 ways to prepare a new cybersecurity team for a crisis

Not all security incidents cause an enterprise-level crisis, and not all
  crises are cyber-related. Natural disasters, product recalls, accidents, and
  public relations debacles are all examples of non-cyber events that could have
  a significant negative impact on an organization. So, in preparing a new
  cybersecurity team for a crisis, it is important to define and rank--first, by
  severity and then by likelihood--what precisely the business would define as a
  security “crisis,” says John Pescatore director of emerging security trends at
  the SANS Institute. “It is not the case that the top of the list will always
  be something like ransomware,” Pescatore says. Sometimes, a crisis might have
  nothing to do with cybersecurity, he notes. “For example, I remember hearing a
  Boston-area hospital CIO talk about how they were bombarded with attempts to
  get into hospital data after the [Boston Marathon] bombing because press
  reports had noted the bombers went to that hospital.” Once the cybersecurity
  team has an understanding of what would constitute a security crisis for the
  company, create playbooks for the top handful of them.
Writing your company’s own ChatGPT policy

To help employees grasp and embrace key basics quickly, one useful starting
  point can be signposting relevant parts of existing policies they can check
  for best practices. Producing tailored guidance for an internal ChatGPT policy
  is slightly more complex. To develop a truly all-encompassing ChatGPT policy,
  companies will likely need to run extensive cross-business workshops and
  individual surveys which enable them to identify, and discuss, every use case.
  Putting in this groundwork, however, will allow them to build specific
  directions which ultimately ensure better protection, as well as giving
  workers the comprehensive knowledge required to make the most of advanced
  tech. ... Explicitly highlighting threats and setting unambiguous usage
  limitations is also just as critical to leave no room for accidental misuse.
  This is particularly important for businesses where generative AI may be
  deployed to streamline tasks that involve some level of PII, such as drafting
  client contracts, writing emails, or suggesting which code snippets to use in
  programming.
Quote for the day:
"Learning is a lifetime process, but
    there comes a time when we must stop adding and start updating." --
    Robert Brault
 
 
No comments:
Post a Comment