A CISO's Guide to Avoiding Jail After a Breach
The key to avoiding trouble as a security leader, Nall says, is awareness of
three things: how government investigations work, how the government interacts
with companies during the process, and the incentives companies have to resolve
their cases in one way or another. When push comes to shove, for example,
companies will be pressured to name and shame individuals. In his proceedings,
Sullivan's legal team painted a picture of a company (Uber) trying to rebrand
itself, and holding him up as a lamb to the slaughter. "It's very
unfortunate because the consequences are faced by one individual, or a few
individuals, although the ability to make sure that [an incident] doesn't happen
is a community-based effort within organizations," says ArmorCode's Karthik
Swarnam, formerly chief information security officer (CISO) of Kroger, DIRECTV,
and TransUnion. To avoid being singled out (and because it's good security
practice), CISOs should focus on building clear and robust lines of
communication that bring other board members into the cybersecurity
decision-making process.
How Pearson’s CIO manages technical debt
Keen to address this, Wells and the Pearson technology working group, which
includes tech leadership from across the brand’s different organizations, came
up with 12 key attributes, including security and maintainability, to rate their
technology assets in a consistent way. These tech debt audits provided a clearer
picture of where their biggest risks were, which, in turn, allowed them to
prioritize what needs to be addressed first. “We developed an algorithm to
measure our different applications based on these 12 categories so we can
eliminate technical debt via a more strategic and standardized approach,” she
says, noting that the goal was to do away with any guesswork and make decisions
based on opportunities and potential revenue risks. ... As part of the process,
she and her team needed to get the various leaders from across the business on
board by making sure they understood that technical debt isn’t just a technology
problem. “We really had to communicate that this is a priority, but we couldn’t
do so by only talking to them about technology,” she says.
Strategic alignment in the age of AI: The 7 foundations of competitive success
The strategy must align with the capabilities of the organization and the
competitive reality of the environment. Such an alignment has never been
more important, as artificial intelligence (AI) and other changes disrupt
industries and sectors. Before rushing to adopt the latest AI tool, whether
it is deep learning or large language models, organizations must assess
whether the new tech is strategically aligned. ... Aligning people with the
desired strategic position and vision for the organization is critical. In
high-performing organizations, employees and members understand their
strategic mission and vision and are dedicated to achieving it. They become
acolytes of their leaders and passionate advocates for their organizations.
They see how their role contributes to the strategy of the organization and
execute with a sense of purpose and teamwork. How many of your employees can
articulate how your AI efforts advance your strategy? ... In truth,
strategic alignment may be rare. If you are fortunate, you can recall a
situation where alignment occurred, allowing you and your organization to
achieve incredible heights.
The AI Revolution Will Not Be Monopolized
Open source in AI and machine learning is not just about software, it's
about the synergy of code and data. The growing ecosystem of open-source
models encompasses everything from code to data and weights, making powerful
tools widely accessible. ... The term "large language models" (LLMs) is
often used broadly and imprecisely, muddying discussions about their
capabilities and applications. The distinction between encoder models and
large generative models is therefore very important. Encoder models involve
task-specific networks that predict structured data, while large generative
models rely on prompts to produce free-form text, necessitating additional
logic to extract actionable insights. ... Companies like OpenAI might
dominate the market for user-facing products but not necessarily the AI and
software components behind them. While user data is advantageous for
improving human-facing products, it is less critical for enhancing the
foundational machine-facing tasks. Gaining general knowledge doesn't require
specific data, which is at the core of the innovation behind large
generative models.
CISA Warns Chemical Facilities of Data Theft After Hacker Breached CSAT Security Tool via Ivanti
CISA says that all information in the CSAT tool was encrypted using AES 256
algorithm, and the keys were also inaccessible “from the type of access the
threat actor had to the system.” The agency also found “no evidence of
credentials being stolen.” However, impacted organizations should assume
data theft “out of abundance of caution” and assume that “that this
information could have been inappropriately accessed,” the agency said. The
agency also stated that even without data theft, the intrusion “met the
threshold of a major incident under the Federal Information Security
Modernization Act (FISMA),” given the number of individuals and chemical
facilities impacted. Subsequently, CISA directed impacted chemical
facilities to maintain cyber and physical security measures to prevent
potential attacks as a result of the cyber incident. Similarly, CISA
encourages individuals who had CSAT accounts to reset their passwords for
all online accounts that share the same password to prevent future password
spraying attacks.
Autonomous Vehicles Can Make All Cars More Efficient
To illustrate how the technology works, the team installed a traffic signal
along the demonstration pathway. Gankov says an actual traffic-light timer
from a traffic-signal cabinet was connected to a TV screen, providing a
visual for attendees. A dedicated short range communications (DRSC) radio
was also attached, broadcasting the signal’s phase and timing information to
the vehicle. This setup enabled the vehicle to anticipate the traffic
light’s actions far more accurately than a human driver could. ... These
autonomous driving strategies can lead to significant energy savings,
benefiting not just the autonomous vehicles themselves, but also the entire
traffic ecosystem. “In a regular traffic situation, autonomous vehicles
operating in ecomode influence the driving behavior of all the cars behind
them,” says Gankov. “The result is that even vehicles with Level 0 autonomy
use fuel more sparingly.” ... Employing techniques like efficient highway
merging were key strategies in their approach to making the most of each
tank of fuel or battery charge.
SyncBack is the best free backup software on Windows and everyone should use it
On top of changing the type of sync or backup you want to perform, SyncBack
also has a ton of configuration options for almost everything about how it
works. By default, each profile you create is a manual backup, so whenever
you want to backup your files, you just run the profile. Even then, if you
want to run it on demand, you can create a hotkey to quickly run a specific
profile and run it at any time. But if you're a "set it and forget it" type
of person, then you can also automate the backups. SyncBack uses the Task
Scheduler in Windows to allow you to create a scheduled backup with whatever
frequency you prefer. ... Since each profile is only meant to sync one
folder, if you want to sync files in completely different locations, you'll
need separate profiles, but you can create group profiles so that all the
profiles within are run at the same time, rather than sequentially. You can
also enable things like compression for files copied, decrypt files when
they're copied, change whether you want files to be copied when syncing two
folders or if the mismatched file should be deleted, and even enable a
rudimentary form of ransomware detection.
From Scalability to Speed: Generative AI has Put Testing on Steroids
In the past, testing quality has been a big concern, necessitating early
integration of QA into the development life cycle. Now, with GenAI, the
focus has advanced beyond simply assurance to actively engineering quality.
The key distinction lies in the approach — classic AI involves human
intervention and manual processes, while GenAI automates and innovates
testing methodologies. Consider dealing with requirement quality early in
the software development life cycle. Using classic AI, a business analyst
might define requirements to cover various interpretations, which may lead
to certain ambiguity and potential failures. ... using GenAI is not about
replacing the human workforce, but enhancing our capabilities. The shortage
of senior automation testers results in a loss in business revenue. However,
with GenAI, junior engineers can now harness the power of gen AI-enabled
automation, performing tasks with the built-in knowledge of a seasoned
architect. Gen AI’s prowess is not arbitrary; it has learned from
billions of data points. By combining traditional knowledge with AI
capabilities, new solutions bring scalability and speed to testing.
How organisations can thrive with resilience and empathy
While many organisations embrace the value of empathy, they often fall short
in delivering it with genuine sincerity. Superficial expressions of empathy
without meaningful actions, including consistent recognition, lead to
employee dissatisfaction and high turnover rates. However, demonstrating
sincere empathy and providing meaningful recognition can be challenging.
Leaders sometimes face criticism for being "too considerate," particularly
when their decisions appear to benefit employees during setbacks
disproportionately. This dynamic can result in empathy fatigue, where the
constant demand for empathetic responses and recognition strains HR
professionals and leaders. ... Change can only occur when an organisation
adopts the principles of nimble resilience and empathy, using them to shape
policies, programs, and workplace culture. This approach encourages
employees to build relationships, find new solutions, work collaboratively
across disciplines, and embrace a forward-thinking perspective. As a result,
trust in leaders and team members increases, along with connections to the
organisation and its purpose.
Mind the Gap: The Product in Data Product Is Reliability
The data product concept has been fleshed out in recent years with
definitions, reference architectures, and platforms. They consist of …
actually, let’s not worry about what data products consist of. At least, not
right now. That’s not the important part. Instead, let’s start where we
should always start: the consumer. ... Your assurance that its contents are
always correct is the most significant distinguishing characteristic of a
data product. You provide the ongoing validation, certification, and
research so that your users don’t have to. You ensure that the data product
is kept current with new arriving data. You continuously monitor its data
quality. In addition to content, you must also be concerned with semantics.
Changes in the business as implemented in the source systems and propagated
through the data may necessitate changes to the data product. ... Technology
can facilitate, but technology alone is not remotely sufficient. I’ve seen
the data product label slapped on data marts, summary tables, and even raw
data with none of the curation or monitoring.
Quote for the day:
"The only limit to our realization
of tomorrow will be our doubts of today." --
Frank D Roosevelt
No comments:
Post a Comment