Daily Tech Digest - September 10, 2024

Will genAI kill the help desk and other IT jobs?

AI is transforming cybersecurity by automating threat detection, anomaly detection, and incident response. “AI-powered tools can quickly identify unusual behavior, analyze security pattern, scan for vulnerabilities, and even predict cyberattacks, making manual monitoring less necessary,” Foote said. “Security professionals will focus more on developing AI models that can defend against complex threats, especially as cybercriminals begin using AI to attack systems. There will be a demand for experts in AI ethics in cybersecurity, ensuring that AI systems used in security aren’t biased or misused.” IT support and systems administration positions — especially tier-one and tier-two help desk jobs — are expected to be hit particularly hard with job losses. Those jobs entail basic IT problem resolution and service desk delivery, as well as more in-depth technical support, such as software updates, which can be automated through AI today. The help desk jobs that remain would involve more hands-on skills that cannot be resolved by a phone call or electronic message.  ... Data scientists and analysts, on the other hand, will be in greater demand with AI, but their tasks will shift towards more strategic areas like interpreting AI-generated insights, ensuring ethical use of AI


Just-in-Time Access: Key Benefits for Cloud Platforms

Identity and access management (IAM) is a critical component of cloud security, and organizations are finding it challenging to implement it effectively. As businesses increasingly rely on multiple cloud environments, they face the daunting task of managing user identities across all their cloud systems. This requires an IAM solution that can support multiple cloud environments and provide a single source of truth for identity information. One of the most pressing challenges is the management of identities for non-human entities such as applications, services and APIs. IAM solutions must be capable of managing these identities, providing visibility, controlling access and enforcing security policies for non-human entities. ... Just-in-time (JIT) access is a fundamental security practice that addresses many of the challenges associated with traditional access management approaches. It involves granting access privileges to users for limited periods on an as-needed basis. This approach helps minimize the risk of standing privileges, which can be exploited by malicious actors. The concept of JIT access aligns with the principle of least privilege, which is essential for maintaining a robust security posture. 


Maximize Cloud Efficiency: What Is Object Storage?

Although object storage has existed in one form or another for quite some time, its popularity has surged with the growth of cloud computing. Cloud providers have made object storage more accessible and widespread. Cloud storage platforms generally favor object storage because it allows limitless capacity and scalability. Furthermore, object storage usually gets accessed via a RESTful API instead of conventional storage protocols like Server Message Blocks (SMB). This RESTful API access makes object storage easy to integrate with web-based applications. ... Object storage is typically best suited for situations where you need to store large amounts of data, especially when you need to store that data in the cloud. In cloud environments, block storage often stores virtual machines. File storage is commonly employed as a part of a managed solution, replacing legacy file servers. Of course, these are just examples of standard use cases. There are numerous other uses for each type of storage. ... Object storage is well-suited for large datasets, typically offering a significantly lower cost per gigabyte (GB). Having said that, many cloud providers sell various object storage tiers, each with its own price and performance characteristics. 


How human-led threat hunting complements automation in detecting cyber threats

IoBs are patterns that suggest malicious intent, even when traditional IoCs aren’t present. These might include unusual access patterns or subtle deviations from normal procedures that automated systems might miss due to the nature of rule-based detection. Human threat hunters excel at recognizing these anomalies through intuition, experience, and context. The combination of automation and human-led threat hunting ensures that all bases are covered. Automation handles the heavy lifting of data processing and detection of known threats, while human intelligence focuses on the subtle, complex, and context-dependent signals that often precede major security incidents. Together, they create a layered defense strategy that is comprehensive and adaptable. ... Skilled threat hunters are essential to a successful cybersecurity team. Their experience and deep understanding of adversarial tactics help to identify and respond to threats that would otherwise go unnoticed. Their intuition and ability to adapt quickly to new information also make them invaluable, especially when dealing with advanced persistent threats. However, the demand for skilled threat hunters far exceeds the supply. 


A critical juncture for public cloud providers

Enterprises are no longer limited to a single provider and can strategically distribute their operations to optimize costs and performance. This multicloud mastery reduces dependency on any specific vendor and emphasizes cloud providers’ need to offer competitive pricing alongside robust service offerings. There is something very wrong with how cloud providers are addressing their primary market. ... As enterprises explore their options, the appeal of on-premises solutions and smaller cloud providers becomes increasingly apparent. These alternatives, which I’ve been calling microclouds, often present customized services and transparent pricing models that align more closely with economic objectives. Indeed, with the surge of interest in AI, enterprises are turning to these smaller providers for GPUs and storage capabilities tailored to the AI systems they want to develop. They are often much less pricy, and many consider them more accessible than the public cloud behemoths roaming the land these days. Of course, Big Cloud quickly points out that it has thousands of services on its platform and is a one-stop shop for most IT needs, including AI. This is undoubtedly the case, and many entrepreneurs leverage public cloud providers for just those reasons. 


Two Letters, Four Principles: Mercedes Way of Responsible AI

In the past, intelligent systems were repeatedly the target of criticism. Such examples included chatbots using offensive language and discriminating facial recognition algorithms. These cases show that the use of AI requires some clear guidelines. "We adhere to stringent data principles, maintain a clear data vision and have a governance board that integrates our IT, engineering and sustainability efforts," said Renata Jungo Brüngger, member of the board of management for integrity, governance and sustainability at Mercedes-Benz Group, said during the company’s recent India sustainability dialogue 2024. AI is being applied to optimize supply chains, predictive vehicle maintenance and personalize customer interactions. Each of these use cases is developed with a strong focus on ethical considerations, ensuring that AI systems operate within a framework of privacy, fairness and transparency. ... "Data governance is the backbone of our AI strategy," said Umang Dharmik, senior vice president at Mercedes-Benz R&D (India). "There are stringent data governance frameworks to ensure responsible data management throughout its life cycle. This not only ensures compliance with global regulations but also fosters trust with our customers and stakeholders."


The Software Development Trends Challenging Security Teams

With the intense pace of development, chasing down each and every vulnerability becomes unfeasible – it is therefore not surprising to see prioritizing remediation top the list of challenges. Security teams can't afford to spend time, money, and effort fixing something that doesn't actually represent real risk to the organization. What's missing is contextual prioritization of the overall development environment in order to select which vulnerabilities to fix first based on the impact to the business. Security teams should aim to shift the focus to overall product security rather than creating silos for cloud security, application security, and other components of the software supply chain. ... Infrastructure as code use is exploding as developers look for ways to move faster. With IaC, developers can provision their own infrastructure without waiting for IT or operations. However, with increased use comes increased chance of misconfigurations. In fact, 67% of survey respondents noted that they are experiencing an increase in IaC template misconfigurations. These misconfigurations are especially dangerous because one flaw can proliferate easily and widely.


One of the best ways to get value for AI coding tools: generating tests

In our conversations with programmers, a theme that emerged is that many coders see testing as work they HAVE to do, not work they WANT to do. Testing is a best practice that results in a better final outcome, but it isn’t much fun. It’s like taking the time to review your answers after finishing a math test early: crucial for catching mistakes, but not really how you want to spend your free time. For more than a decade, folks have been debating the value of tests on our sites. ... The dislike some developers have for writing tests is a feature, not a bug, for startups working on AI-powered testing tools. CodiumAI is a startup which has made testing the centerpiece of its AI-powered coding tools. “Our vision and our focus is around helping verify code intent,” says Itamar Friedman. He acknowledges that many devs see testing as a chore. “I think many developers do not tend to add tests too much during coding because they hate it, or they actually do it because they think it's important, but they still hate it or find it as a tedious task.” The company offers an IDE extension, Codiumate, that acts as a pair programmer while you work: “We try to automatically raise edge cases or happy paths and challenge you with a failing test and explain why it might actually fail.”


Quantum Safe Encryption is Next Frontier in Protecting Sensitive Data

In the digital world that we live in today, cryptographic encryption and authentication are the de rigour techniques employed to secure data, communications, access to systems as well as digital interactions. Public-key cryptography is a widely prevalent technique used to secure digital infrastructure. Codes and keys used for encryption and authentication in these schemes are specific mathematical problems such as prime factorization that classical computers cannot solve in a reasonable time. ... As standards for the quantum era have been introduced, PQC-based solutions are being introduced in the market. Governments and organizations across the spectrum must move quickly to enhance their cyber resilience to tackle the challenges of the quantum era. The imperative is not only to prepare for an era of readily available powerful quantum computers that could attack incumbent systems but also devise mechanisms to deal with the imminent possibility of decryption of data secured by classical encryption techniques. This could be the existing encrypted data or those that were stolen prior to the availability of quantum-safe encryption standards and hoarded in anticipation of the availability of quantum computer assisted tools to crack them.


Want to get ahead? Four activities that can enable a more proactive security regime

As Goerlich notes, CISOs who want a more proactive program need to be looking into the future. To ensure he has time to do that, Goerlich schedules regular off-site meetings every quarter where he and his team ask what is changing. “This establishes a process and a cadence to get [us] out of the day-to-day activities so we can see the bigger picture,” he explains. “We start fresh and look at what’s coming in the next quarter. We ask what we need to be prepared for. We look back and ask what’s working and what’s not. Then we set goals so we can move forward.” Goerlich says he frequently invites outside security pros, such as vendor executives and other thought leaders, to these meetings to hear their insights into evolving threats as well as emerging security tools and techniques to counteract them. He also sometimes invites his executive colleagues from within his own organization, so that they can share details on their plans and strategies — a move that helps align security with the business needs as the organization moves forward. He has seen this effort pay off. He points to actions resulting from one particular off-site where the team identified challenges around its privilege access management (PAM) process and, more specifically, the number of manual steps it required.



Quote for the day:

"It takes courage and maturity to know the difference between a hoping and a wishing." -- Rashida Jourdain

No comments:

Post a Comment