Daily Tech Digest - December 27, 2024

Software-Defined Vehicles: Onward and Upward

"SDV is about building efficient methodologies to develop, test and deploy software in a scalable way," he said. AWS, through initiatives such as The Connected Vehicle Systems Alliance and standardized protocols such as Vehicle Signal Specification, is helping OEMs standardize vehicle communication. This approach reduces the complexity of vehicle software and enables faster development cycles. BMW's virtualized infotainment system, built using AWS cloud services, is a use case of how standardization and cloud technology enable more efficient development. ... Gen AI, according to Marzani, is the next and most fascinating frontier for automotive innovation. AWS has already begun integrating AI into vehicle design and user experiences. It is helping OEMs develop in-car assistants that can provide real-time, context-aware information, such as interpreting warning signals or offering maintenance advice. But Marzani cautioned against deploying such systems without rigorous testing. "If an assistant misinterprets a warning and gives incorrect advice, the consequences could be severe. That's why we test these models in virtualized environments before deploying them in real-world scenarios." 


The End of Dashboard Frustration: AI Powers New Era of Analytics

Enterprises can tackle the workflow friction challenge by embedding analytics directly into users' existing applications. Most applications these days are delivered on a SaaS basis, which means a web browser is the primary interface for employees' daily workflow. With the assistance of a browser plug-in, keywords can be highlighted to show critical information about any business entity, from customer profiles to product details, making data instantly accessible within the user's natural workflow. There's no need to open another application and lose time on task switching — the data is automatically presented within the natural course of an employee's operations. To address varying levels of data expertise, enterprises can take a hybrid approach that combines the natural language capabilities of large language models (LLMs) with the precision of traditional BI tools. In this way, an AI-powered BI assistant can translate natural language queries into precise data analytics operations. Employees will no longer need to know how to form specific, technical queries to get the data they need. Instead, they can simply ask a bot using ordinary text, just as if they were interacting with a human being. 


The Intersection of AI and OSINT: Advanced Threats On The Horizon

Scammers and cybercriminals constantly monitor public information to collect insight on people, businesses and systems. They research social media profiles, public records, company websites, press releases, etc., to identify vulnerabilities and potential targets. What might seem like harmless information such as a job change, a location-tagged photograph, stories in media, online interests and affiliations can be pieced together to build a comprehensive profile of a target, enabling threat actors to launch targeted social engineering attacks. And it’s not just social media that threat actors are tracking and monitoring. They are known to research things like leaked credentials, IP addresses, bitcoin wallet addresses, exploitable assets such as open ports, vulnerabilities in websites, internet-exposed devices such as Internet of Things (IoT), servers and more. A range of OSINT tools are easily available to discover information about a company’s employees, assets and other confidential information. While OSINT offers significant benefits to cybercriminals, there is also a real challenge of collecting and analyzing publicly available data. Sometimes information is easy to find, sometimes extensive exercise is needed to uncover loopholes and buried information.


The Expanding Dark Web Toolkit Using AI to Fuel Modern Phishing Attacks

Phishing is no longer limited to simple social engineering approaches; it has grown into a complex, multi-layered attack vector that employs dark web tools, AI, and undetectable malware. The availability of phishing kits and advanced cyber tools are making it easier than ever for novices to develop their malicious capabilities. Stopping these attacks can be tricky, given how convincing the websites and emails can appear to users. However, organizations and individuals must be vigilant in their efforts and continue to use regular security awareness training to educate users, employees, partners, and clients on the evolving dangers. All users should be reminded to never give out sensitive credentials to emails and never respond to unfamiliar links, phone calls, or messages received. Using a zero-trust architecture for continuous verification is essential while also maintaining vigilance when visiting websites or social media apps. Additionally, modern threat detection tools employing AI and advanced machine learning can help to understand incoming threats and immediately flag them ahead of user involvement. The use of MFA and biometric verification has a critical role to play, as do regular software updates and immediate patching of servers or loopholes/vulnerabilities. 


Infrastructure as Code in 2024: Why It’s Still So Terrible

The problem, Siva wrote, is”when a developer decides to replace a manually managed storage bucket with a third-party service alternative, the corresponding IaC scripts must also be manually updated, which becomes cumbersome and error-prone as projects scale. The desync that occurs between the application and its runtime can lead to serious security implications, where resources are granted far more permissions than they require or are left rogue and forgotten.” He added, “Infrastructure from Code automates the bits that were previously manual in nature. Whenever an application changes, IfC can help provision resources and configurations that accurately reflect its runtime requirements, eliminating much of the manual work typically involved.” ... The open source work around OpenTofu may point the way forward out of this mess. Or at least that is the view of industry observer Kelsey Hightower, who likened the open sourcing of Terraform to the opening of technologies that made the Internet possible, making OpenTofu to be the "HTTP of the cloud," wrote Ohad Maislish, CEO and co-founder of env0. "For Terraform technology to achieve universal HTTP-like adoption, it had to outgrow its commercial origins," Maislish wrote. "In other words: Before it could belong to everyone, it needed to be owned by no one."


CISA mandates secure cloud baselines for US agencies

The directive prescribes actionable measures such as the adoption of secure baselines, automated compliance tooling, and integration with security monitoring systems. These steps are in line with modern security models aimed at strengthening the security of the new attack surface presented by SaaS applications. Cory Michal highlighted both the practicality and challenges of the directive: "The requirements are reasonable, as the directive focuses on practical, actionable measures like adopting secure baselines, automated compliance tooling, and integration with security monitoring systems. These are foundational steps that align with modern SaaS and cloud security models following the Identify, Protect, Detect and Respond methodology, allowing organizations to embrace and secure this new attack surface." However, Michal also pointed out significant hurdles, including deadlines, funding, and skillset shortages, that agencies may face in complying with the directive. Many agencies may lack the skilled personnel and financial resources necessary to implement and manage these security measures. "Deadlines, lack of funding and lack of adequate skillsets will be the main challenges in meeting these requirements.


Data protection challenges abound as volumes surge and threats evolve

Data security experts say CISOs can cope with these changes by understanding the nature of the shifting landscape, implementing foundational risk management strategies, and reaching for new tools that better protect data and quickly identify when adverse data events are underway. Although the advent of artificial intelligence increases data protection challenges, experts say AI can also help fill in some of the cracks in existing data protection programs. ... Experts say that what most CISOs should consider in running their data protection platforms is a wide range of complex security strategies that involve identifying and classifying information based on its sensitivity, establishing access controls and encryption mechanisms, implementing proper authentication and authorization processes, adopting secure storage and transmission methods and continuously monitoring and detecting potential security incidents. ... However, before considering these highly involved efforts, CISOs must first identify where data exists within their organizations, which is no easy feat. “Discover all your data or discover the data in the important locations,” Benjamin says. “You’ll never be able to discover everything but discover the data in the important locations, whether in your office, in G Suite, in your cloud, in your HR systems, and so on. Discover the important data.”


How to Create an Enterprise-Wide Cybersecurity Culture

Cybersecurity culture planning requires a cross-organizational effort. While the CISO or CSO typically leads, the tone must be set from the top with active board involvement, Sullivan says. "The C-suite should integrate cybersecurity into business strategy, and key stakeholders from IT, legal, HR, finance, and operations must collaborate to address an ever-evolving threat landscape." She adds that engaging employees at all levels through continuous education will ensure that cybersecurity becomes everyone's responsibility. ... A big mistake many organizations make is treating cybersecurity as a separate initiative that's disconnected from the organization’s core mission, Sullivan says. "Cybersecurity should be recognized as a critical business imperative that requires board and C-suite-level attention and strategic oversight." Creating a healthy network security culture is an ongoing process that involves continuous learning, adaptation, and collaboration among teams, Tadmor says. This requires more thought than just setting policies -- it's also about integrating security practices into daily routines and workflows. "Regular training, open communication, and real-time monitoring are essential components to keep the culture alive and responsive to emerging network threats," he says.


What is serverless? Serverless computing explained

Serverless computing is an execution model for the cloud in which a cloud provider dynamically allocates only the compute resources and storage needed to execute a particular piece of code. Naturally, there are still servers involved, but the provider manages the provisioning and maintenance. ... Developers can focus on the business goals of the code they write, rather than on infrastructure questions. This simplifies and speeds up the development process and improves developer productivity. Organizations only pay for the compute resources they use in a very granular fashion, rather than buying physical hardware or renting cloud instances that mostly sit idle. That latter point is of particular benefit to event-driven applications that are idle much of the time but under certain conditions must handle many event requests at once. ... Serverless functions also must be tailored to the specific platform they run on. This can result in vendor lock-in and less flexibility. Although there are open source options available, the serverless market is dominated by the big three commercial cloud providers. Development teams often end up using tooling from their serverless vendor, which makes it hard to switch. 


How In-Person Banking Can Survive the Digital Age

Today’s consumer quite rightly expects banks to not merely support environmental and sustainable causes but to actively be using those principles within their work. Pioneers like The Co-operative Bank in the UK have been asking us to help them in this area for more than two decades, and the approach is spreading worldwide: We recently helped Saudi National Bank adopt best sustainability practice. There is much more that banks can do to integrate their digital and physical experiences in branch in the way that retailers and casual dining spaces are now doing. Indeed, banks could look more closely to hospitality for inspiration in many areas. ... There’s a slightly ironic conundrum that banks and credit unions would do well to consider: Banks don’t want branches, but they need them; customers don’t need branches, but they want them. Unlocking the potential and value here is about maintaining physical points of presence but re-inventing their role. They need to become venues not for ‘lower order’ basic transactional activities, as dominated their activity in the past; but for ‘higher order’ financial life support for communities and individuals. It’s the latter that explains why customers want branches even when there’s no apparent functional need.



Quote for the day:

"The only way to discover the limits of the possible is to go beyond them into the impossible." -- Arthur C. Clarke

No comments:

Post a Comment