Daily Tech Digest - January 19, 2024

SolarWinds VP Offers 2024 Predictions on AI

As CIOs are either in the process of implementing AI into observability efforts, or at the very beginning stages, Stewart says data hygiene and management is going to be a key factor. “One of the key components is really understanding where you’re at on that observability journey,” he says. “There are a lot of disparate tools and different observability offerings that may be very segmented … The key is having the full data set across that stack that allows the AI technology to leverage that data, because if the engines don’t have the data across the stack, then there’s going to be parts of the puzzle that are missing, and AI is just not going to be able to accommodate.” ... “IT budgets aren’t getting bigger,” Stewart says. “And in many cases, budgets are shrinking based on concerns with the economy. Folks are looking for ways to save and some of that will certainly come through automation and efficiencies. And some of that will come through tool and vendor consolidation. The ability to leverage various AI technologies is certainly something that people are interested in to realize those efficiencies.”


Beware of hidden cloud fees

Fees can complicate cost management more so when transferring data across different cloud platforms, which is typical for multicloud deployments. Also, various factors such as location, geography, and data type can significantly impact the size of these charges. Egress charges, levied for data transferred out of a cloud service provider’s network, are now a hot button, even though they’ve been a part of cloud bills for years. High egress charges can inflate operational costs and restrict organizations from transitioning between cloud providers or moving their data to more cost-effective alternatives, even back to their enterprise data centers. As one of my clients put it, they feel their data is being held for ransom. ... Of course, many are looking to the cloud providers charging these fees to fix the issues. They may not be legally obligated to remove these fees, but they are listening to cloud users and have taken steps to reduce egress fees. Many enterprises are questioning their need to be in the cloud in the first place and could move to other platforms if costs are too high. Much of the repatriation that’s occurring is purely for cost issues. All things being equal, companies would rather stay in the cloud. If enterprises could get relief from annoying fees, this could keep some companies in place on the public cloud providers.


New study urges industry to address generational division in tech skills

As artificial intelligence becomes increasingly common in industries, experts are urging companies to address the gaps to sustain organisation capability. “Technology is transforming organisations – faster and more diverse than ever. Communication, collaboration, financial savings, productivity and security are underpinning these shifts and forming the catalyst for change,” said Greg Weiss, an HR consultant, onboarding expert, and the founder of Career365. Capterra’s study identified the three primary challenges that hinder the speed of digital transformation. These include the usage gap among employees, limited access to resources or training, and the constant introduction of new tools making it difficult to adapt. The research also revealed that while millennials are naturally inclined to digital tools (87 per cent), baby boomers and Generation Z are equally drawn to new technology (85 per cent). “The appetite is definitely there. It’s a matter of how these employees are facilitated and bridging the digital generation gap is crucial. A cookie-cutter approach to training and support doesn’t work in a divergent workforce – as their alignment differs,” Weiss said.


The Case for (and Against) Monorepos on the Frontend

Monorepos aren’t just for enterprise applications and large companies like Google, Savkin said. As it stands now, though, polyrepos tend to be the most common approach, with each line of business or functionality having its own repo. Take, for example, a bank. Its website or app might have a credit card section and an auto loan section. But what if there needs to be a common message, function or even just a common design change across the divisions? Polyrepo makes that harder, he said. “Now I need to do a coordination thing with team A, team B,” Savkin said. “In a polyrepo case, it can take many months.” In a monorepo, it’s easy to make that one change in as little as a day, he added. It also enables sharing components and libraries across development teams. Monorepos helped Jotfrom, an online forms company based in San Francisco, reduce its technical debt on the frontend, according to frontend architect and engineering director Berkay Aydin. Aydin wrote last week about the company’s move to a monorepo for the frontend. “We don’t have multiple configs or build processes anymore,” Aydin wrote. “Now, we’re sure every application is using the same configurations.”


Enterprises struggle with Agile methodology, reports long-standing survey of practitioners

According to the report, Agile is most successful at small companies. “Those in small companies are more likely than those in medium and large ones to say they are satisfied [with Agile],” the report states, and “74 percent of small companies (versus 62 percent at large companies) said at least 50 percent of their applications were delivered on time and with quality”. A key problem, which will not be a surprise to developers, is that “the business side is very slow to embrace Agile. Almost half of survey takers pointed to a generalized resistance to organizational change or culture class as the reasons why the business side is not embracing Agile, up 7 points from 2022.” ... Scrum is a specific Agile methodology and used by 63 percent of Agile teams, according to the report, which also states that Scrum has been the most popular Agile methodology since 2006 when the survey was first conducted. That said, even Scrum has many variants and the survey states that “the Agile landscape continues to be very fragmented.” 22 percent of survey respondents said that “we don’t follow a mandated framework” and 12 percent that “we created our own enterprise Agile framework.”


The OWASP AI Exchange: an open-source cybersecurity guide to AI components

In the context of AI systems, OWASP’s AI Exchange discusses development-time threats in relation to the development environment used for data and model engineering outside of the regular applications development scope. This includes activities such as collecting, storing, and preparing data and models and protecting against attacks such as data leaks, poisoning and supply chain attacks. Specific controls cited include development data protection and using methods such as encrypting data-at-rest, implementing access control to data, including least privileged access, and implementing operational controls to protect the security and integrity of stored data. Additional controls include development security for the systems involved, including the people, processes, and technologies involved. This includes implementing controls such as personnel security for developers and protecting source code and configurations of development environments, as well as their endpoints through mechanisms such as virus scanning and vulnerability management, as in traditional application security practices. Compromises of development endpoints could lead to impacts to development environments and associated training data.


NIST Offers Guidance on Measuring and Improving Your Company’s Cybersecurity Program

The publication is designed to be used together with any risk management framework, such as NIST’s Cybersecurity Framework or Risk Management Framework. It is intended to help organizations move from general statements about risk level toward a more coherent picture founded on hard data. “Everyone manages risk, but many organizations tend to use qualitative descriptions of their risk level, using ideas like stoplight colors or five-point scales,” said NIST’s Katherine Schroeder, one of the publication’s authors. “Our goal is to help people communicate with data instead of vague concepts.” Achieving this goal, according to the authors, involves moving from qualitative descriptions of risk — perhaps using broad categories such as high, medium or low risk level — to quantitative ones that carry less ambiguity and subjectivity. An example of the latter would be a statement that 98% of authorized system user accounts belong to current employees and 2% belong to former employees. The team developed the new draft guidance partly in response to public requests and feedback from a pre-draft call for comment. 


What is credential stuffing and how can I protect myself? A cybersecurity researcher explains

Credential stuffing is a type of cyber attack where hackers use stolen usernames and passwords to gain unauthorised access to other online accounts. In other words, they steal a set of login details for one site, and try it on another site to see if it works there too. This is possible because many people use the same username and password combination across multiple websites. It is common for people to use the same password for multiple accounts (even though this is very risky). Some even use the same password for all their accounts. This means if one account is compromised, hackers can potentially access many (or all) their other accounts with the same credentials. ... The best way is to never reuse passwords across multiple sites or apps. Always use a unique and strong password for each online account. Choose a password or pass phrase that is at least 12 characters long, is complex, and hard to guess. It should include a mix of uppercase and lowercase letters, numbers, and symbols. Don’t use pet names, birthdays or anything else that can be found on social media. You can use a password manager to generate unique passwords for all your accounts and store them securely. 


54% data fiduciaries lack experience in enforcing data protection laws

The research findings are based on the provisions of India's Digital Personal Data Protection (DPDP) Act that was enacted in August 2023. The rules for the Act are yet to be released for public consultation. The findings are part of the research carried out by the think tank Esya Centre in a report called "An Empirical Evaluation of the Implementation Challenges of the Digital Personal Data Protection Act 2023: Insights and Recommendations for the Way Forward." It has involved insights from 16 industry stakeholders, of which 13 are data fiduciaries and three are experts. "India has come a long way from the early iterations of the Data Protection Bill to the enactment of the Digital Personal Data Protection Act, 2023. The decision to eschew localization requirements and a compliance-heavy framework heralds a commitment to a progressive framework. It is now time to ensure that the prospective rules maintain the forward-thinking approach underpinning the parent Act and preserve a compliance-light data protection regime in the country," said Meghna Bal, Head of Research, Esya Centre.


Navigating The 'Fog Of A Cyberattack': Critical Lessons In Governance From The SEC Cybersecurity Rule

The short breach notification timeline attached to the SEC’s new cybersecurity disclosure rule is loud and clear: C-Suite leaders and boards have important work to do in ensuring their organizations can quickly identify, understand and publicly disclose material cybersecurity events and impacts. In this case, the expression “fog of war” is a useful analogy for understanding a critical complication. The term recognizes that many factors on which action in war is based are “wrapped in a fog of greater or lesser uncertainty.” The fog of a cyber event will similarly make the four-business-day timeline incredibly challenging. ... Instead of making battle plans mid-crisis, prepare now, establishing how incidents are identified, how reports get written and who’s responsible for determining materiality. Create rough boundaries for evaluating materiality (e.g., questions to ask, example incidents) to make decisions as clear as possible. Incomplete information is better than no information. You may not have a complete picture to share publicly, and that’s okay. But when you do your initial disclosure, establish when your next update will be shipped. 



Quote for the day:

“The more you loose yourself in something bigger than yourself, the more energy you will have.” -- Norman Vincent Peale

No comments:

Post a Comment