Daily Tech Digest - December 16, 2023

AI: A Catalyst for Gender Equality in the Workplace

The Equality and Human Rights Commission reports that 77% of mothers have encountered negative or possibly discriminatory experiences during pregnancy, maternity leave, or upon returning to work. The joy of impending motherhood is often tainted by biases, as expecting mothers face subtle exclusions from projects or career advancements. Maternity leave, intended as a sacred period for bonding, becomes tinged with anxiety as women grapple with the fear of being sidelined professionally and the pressure to resume duties prematurely. Returning to the workplace brings feelings of inadequacy and frustration, met with insufficient support for balancing work and family responsibilities. These experiences, rife with frustration and disappointment, mark a daunting struggle for women seeking to re-establish themselves professionally post-maternity leave. However, despite these challenges, women actively choose to re-enter the workforce, embarking on the second phase of their careers post-sabbatical. Addressing these issues requires normative frameworks that ethically tackle the consequences of AI usage.


How to Identify and Address the Challenges of Excessive Business Growth

In other words, when processes start breaking down, and you find yourself constantly in reactive, catch-up mode, it's a sign you need more capacity. The tipping point will vary for each company, but if productivity and quality take a nosedive, growth has become excessive for your present resources. Other red flags include: Customer complaints spike; Employees seem stressed, burned out; You're always scrambling to meet deadlines; Infrastructure creaks under the weight - think cyberattacks, IT failures, supply chain issues; No time for strategy, only tackling emergencies; Costs rising faster than revenue; Profitability declines. Essentially, if growth starts hurting rather than helping, it's time for a change. ... Trying to manage a 100-person company like a 10-person startup will lead to chaos. But running a 10-person shop like a rigid 100-person bureaucracy will cause frustration. Align your leadership style, organizational structure, systems, and talent to your current size and growth needs.


AI Pushes Universities to Modernize IT Infrastructure

The convenience and accessibility of those technologies have created new demands for higher-quality and customizable learning experiences in higher education. According to data from McKinsey, 60% of students report that classroom learning technologies such as generative AI, machine learning and supercomputing have improved their learning and grades since COVID-19 began. In addition to using AI in classrooms, institutions can implement AI solutions in their IT decision-making to create a reliable, secure data infrastructure. As AI becomes more mainstream in higher education operations, universities can better understand, invest and apply AI-specific solutions to their IT needs. While investing in AI and the technology to support it, universities can improve operations, offering faster innovation and better student, faculty and researcher experiences. ... With demand for advanced technological offerings at universities becoming commonplace, IT teams face new challenges under small bud/gets. Many require modern IT infrastructure to support increasingly large datasets required for groundbreaking insights from research teams.


Future-proofing the digital rupee

Several factors contributed to the inception of India's CBDC. The global competition for CBDC development, coupled with the enthusiasm among nations to embrace digital solutions, played a pivotal role. The introduction of India's CBDC, the digital rupee, might have been influenced, at least partially, by the rising prevalence of cryptocurrencies, especially stablecoins. The Deputy Governor of the Reserve Bank of India (RBI) emphasised the need for caution in permitting such instruments. While stablecoins offer certain advantages, their applicability is confined to a limited number of developed countries. The success of UPI in India has raised questions about the necessity of deploying CBDCs in the country, perhaps making it look like an inconspicuous addition to an already largely developed payments landscape. The RBI Deputy Governor cited the ascent of cryptocurrencies and concerns about policy sovereignty as one of the reasons for considering CBDCs, along with improving digital transactions. However, India presents a unique case with the well-established UPI system already in place.


How to lock down backup infrastructure

The first thing to do is to protect the privileged accounts in your backup system. First, separate these accounts from any centralized login system you use, such as Active Directory, because these systems are sometimes compromised. Create as much of a firewall between that production system and the backup system as possible. And, of course, use a safe password, and do not use any passwords for these accounts that are used anywhere else. (Personally I would use a password manager to support having a different password everywhere.) Finally, make sure that any such logins are protected by multi-factor authentication, and use the best option available. Avoid the use of email or SMS-based MFA, as it is easily foiled by an experienced hacker. Try to use an OTP-based system of some kind, such as Google Authenticator, Symantec VIP, or Yubikey. Also investigate if your backup system has enhanced authentication for dangerous actions, such as deletion of backups before their scheduled expiration, or restoration of any data to anywhere other than where it was originally created. The first is used to easy delete backups from your backup system, without setting off any alarms, and the second is used to exfiltrate data by restoring it to a system the hacker controls.


Fortifying cyber defenses: A proactive approach to ransomware resilience

Instead of investing time in formulating non-binding pledges rather than working on actionable solutions, the US Government should adopt a more proactive stance by directly procuring advanced cybersecurity tools. These tools, which have been developed to keep data safe and stop ransomware attacks, exist and are continually evolving. By spearheading the implementation, through investment and education, the government can set a powerful example for the private sector to follow, thereby reinforcing the nation’s cyber infrastructure. The effectiveness of such tools is not hypothetical: they have been tested and proven in various cybersecurity battlegrounds. They range from advanced threat detection systems that use artificial intelligence to identify potential threats before they strike, to automated response solutions that can protect data on infected systems and networks, preventing the lateral spread of ransomware. Investing in these tools would not only enhance the government’s defensive capabilities but would also stimulate the cybersecurity industry, encouraging innovation and development of even more effective defenses.


Cloud squatting: How attackers can use deleted cloud assets against you

The risk from cloud squatting issues can even be inherited from third-party software components. In June, researchers from Checkmarx warned that attackers are scanning npm packages for references to S3 buckets. If they find a bucket that no longer exists, they register it. In many cases the developers of those packages chose to use an S3 bucket to store pre-compiled binary files that are downloaded and executed during the package’s installation. So, if attackers re-register the abandoned buckets, they can perform remote code execution on the systems of the users trusting the affected npm package because they can host their own malicious binaries. ... The attack surface is very large, but organizations need to start somewhere and the sooner the better. The IP reuse and DNS scenario seems to be the most widespread and can be mitigated in several ways: by using reserved IP addresses from a cloud provider which means they won’t be released back into the shared pool until the organization explicitly releases them, by transferring their own IP addresses to the cloud, by using private (internal) IP addresses between services when users don’t need to directly access those servers, or by using IPv6 addresses if offered by the cloud provider because their number is so large that they’re unlikely to ever be reused.


Data Leaders Say ‘AI Paralysis’ Stifling Adoption: Study

While AI is not new in the data industry, the public’s fascination with generative AI has fueled a veritable gold rush for industries to adopt the emerging technologies for a competitive advantage. But the lack of safety guidelines and organizational framework and training may be suffocating AI adoption efforts, according to the report. ... “What happened is everybody got ahold of the GenAI hammer, and now everything looks like a nail,” she says, adding that CIOs and CDOs must do their best to articulate the technical needs to non-technical members of the C-suite. “I do think there’s a disconnect between the CIO and CDO and the chief executive. We should not, in the data and technology space, expect people to understand the layer of complexity that we have to deal with. What we should be doing is taking that complexity and creating a story and a narrative, so it makes sense to the other people in our organization and businesses we work with.” The report also showed that data governance has stalled just as AI is being adopted across industries.


Artificial Intelligence Governance & Alignment with Enterprise Governance

The Objectives of the AI Governance are: Ensure enterprise is adopted pre-trained foundation models and complied; Guide the decision-making process to maintain AI Solution coherence; Maintain the relevancy of the enterprise to meet changing requirements ... The AI Governance Framework helps Enterprise to Manage, Govern, Monitor, and Adopt AI activities, practices, and systems across enterprise. AI Governance Framework defines a set of metrics that can be used to measure the success of the framework implementation. ... Establish an executive team for identifying and overseeing the AI initiatives across the enterprise. Define a clear vision and strategy for AI implementation aligned with the enterprise goals and business functions. Develop practical communications to, and appropriate access for employees. Setup AI Governance across enterprise. Define roles and responsibilities of individuals involved in AI development, deployment and monitoring. Foster the collaboration between AI experts, domain experts and business stakeholders. Establish a centralized, cross-functional team to review and update AI governance practices as technology, regulations, and enterprise needs.


Role of digital in risk management and compliances

Embracing risks is crucial for survival, as risks are inherent in every aspect of business, whether financial or non-financial. As Mark Zuckerberg says, “The only strategy that is guaranteed to fail is not taking risks.” However, this leads to a fundamental question: should businesses pursue risks solely in pursuit of higher returns? Going beyond the pursuit of returns alone, businesses in today’s context should focus on Return of capital and not just Return on capital. Business is about taking calculated risks and managing risks to achieve business goals. Risk exposures must be strategically crafted, with a comprehensive risk management framework in place. We piloted technology-enabled compliance way back in 2015, starting with an India-centric compliance tool that has now been implemented across the global organisation. The tool aids informed decision-making and swift response to emerging risks. The digital solution facilitates seamless communication and collaboration between dispersed teams, ensuring a coordinated approach to risk management. 



Quote for the day:

"Your job gives you authority. Your behavior gives you respect." -- Irwin Federman

No comments:

Post a Comment