Daily Tech Digest - March 24, 2025


Quote for the day:

"To be an enduring, great company, you have to build a mechanism for preventing or solving problems that will long outlast any one individual leader" -- Howard Schultz



Identity Authentication: How Blockchain Puts Users In Control

One key benefit of blockchain is that it's decentralized. Instead of a single database that records user information -- one ripe for data breaches -- blockchain uses something called decentralized identifiers (DIDs). DIDs are cryptographic key pairs that allow users to have more control over their online identities. They are becoming more popular, with Forbes claiming they're the future of online identity. To explain what DIDs are, let's start by explaining what they are not. Today, most people interact online via a centralized identifier, such as an email address, username or password. This allows the database to store your digital information on that platform. But single databases are more vulnerable to data breaches and users have no control over their data. When we use centralized platforms, we really hand over all our trust to whatever platform we use. DIDs provide a new way to access information while allowing users to maintain ownership. ... That said, identity authentication and blockchain technology don't have to be complex topics. They can be easy to use but require intuitive platforms and simple user experiences. The EU's digital policies offer a strong foundation for integrating blockchain. If blockchain becomes part of the initial rulemaking, it could fuel more widespread adoption. There's a long way to go before people feel confident understanding concepts like DIDs. 


Cloud providers aren’t delivering on security promises

With 44% of businesses already spending between £101,000 and £250,000 on cloud migrations in the past 12 months there is a clear need for organizations to ensure they are working with trusted partners who can meet this security need. Otherwise, companies will run the risk of having to spend more to not only move to new suppliers but also respond to the cost of a data breach. The cost and resources needed for organizations to boost their own security skills and technology is often too prohibitive. ... However, despite the clear advantages to security and job stability, only 22% of CISOs use a channel partner in their cloud migration process. This is leaving many exposed to unnecessary risk from attacks or job loss. “It is clear that many organizations are struggling when it comes to securing cloud environments. A combination of underdelivering cloud providers and a lack of in-house skills is resulting in a dangerous situation which can leave valuable company data exposed to risk. Simply adding more technology will not solve this problem,” said Clare Loveridge, VP and GM EMEA at Arctic Wolf. “Securing the cloud is a shared responsibility between the cloud provider and the organization. While cloud providers offer good security tools it is important that you have a team of security experts to help you run the operation. 


CISOs are taking on ever more responsibilities and functional roles – has it gone too far?

“The CISO role has expanded significantly over the years as companies realize that information security has a unique picture of what is going on across the organization,” says Doug Kersten, CISO of software company Appfire. “Traditionally, CISOs have focused on fundamental security controls and threat mitigation,” he adds. “However, today they are increasingly expected to play a central role in maintaining business resilience and compliance. Many CISOs are now responsible for risk management, business continuity, and disaster recovery as well as overseeing regulatory compliance across various jurisdictions.” ... “We’re seeing a convergence of roles under head of security because of the background and problem-solving skills of these people. They have become problem-solver in chief,” says Steve Martano, IANS Research faculty and executive cyber recruiter at Artico Search. That, though, comes with challenges. “CISOs are already experiencing high levels of stress, with recent data highlighting that nearly one in four CISOs are considering leaving the profession due to stress,” Kersten says. “Many CISOs only stay in the role for two to three years. With this, the expectations placed on CISOs are undeniably growing, and organizations risk overburdening them without sufficient resources and support. ..."


Fixing the Fixing Process: Why Automation is Key to Cybersecurity Resilience

Cybersecurity environments have seen nonstop evolution, driven by increasingly sophisticated attack techniques, the expansion of complex cloud-native architecture, and the rise of AI-powered threats that outpace traditional defense strategies. At the same time, development timelines have accelerated, pushing security teams to keep pace without becoming a bottleneck. ... It’s a daunting and intimidating task that requires sufficient time and attention. Moreover, adopting automation means ensuring that security and development teams trust the outputs. Many organizations struggle with this transition because automation tools, if not properly configured, can generate inaccuracies or miss critical context. Security teams fear losing control over decision-making, while developers worry about receiving even more noise if automation isn’t fine-tuned. ... Attackers are already leveraging AI to exploit vulnerabilities rapidly, while security teams often rely on static and manual processes that have no chance of keeping up. AI-enabled EAPs help teams proactively identify and mitigate vulnerabilities before adversaries can exploit them. By automating exposure assessments, organizations can shrink the reconnaissance window available to attackers, limiting their ability to target common vulnerabilities and exposures (CVEs), security misconfigurations, software flaws, and other weaknesses. 


Can we make AI less power-hungry? These researchers are working on it.

Two key drivers of that efficiency were the increasing adoption of GPU-based computing and improvements in the energy efficiency of those GPUs. “That was really core to why Nvidia was born. We paired CPUs with accelerators to drive the efficiency onward,” said Dion Harris, head of Data Center Product Marketing at Nvidia. In the 2010–2020 period, Nvidia data center chips became roughly 15 times more efficient, which was enough to keep data center power consumption steady. ... The increasing power consumption has pushed the computer science community to think about how to keep memory and computing requirements down without sacrificing performance too much. “One way to go about it is reducing the amount of computation,” said Jae-Won Chung, a researcher at the University of Michigan and a member of the ML Energy Initiative. One of the first things researchers tried was a technique called pruning, which aimed to reduce the number of parameters. Yann LeCun, now the chief AI scientist at Meta, proposed this approach back in 1989, terming it (somewhat menacingly) “the optimal brain damage.” You take a trained model and remove some of its parameters, usually targeting the ones with a value of zero, which add nothing to the overall performance. 


Five Years of Cloud Innovation: 2020 to 2025

The FinOps organization and the implementation of FinOps standards across cloud providers has been the most impactful development over the last five years, states Allen Brokken, head of customer engineering at Google, in an online interview. This has fundamentally transformed how organizations understand the business value of their cloud deployments, he states. "Standardization has enabled better comparisons between cloud providers and created a common language for technical teams, business unit owners, and CFOs to discuss cloud operations." ... The public cloud has democratized access to technology and increased accessibility for organizations across industries that have faced intense volatility and change in the past five years, Adams observes via email. "This innovation has facilitated a new level of co-innovation and enabled new business models that allow companies to realize future opportunities with ease." Public cloud platforms offer adopters immense benefits, Adams says. "With the public cloud, businesses can scale IT infrastructure on-demand without significant upfront investment." This flexibility comes with a reduced total cost of ownership, since public cloud solutions often lead to lower costs for hardware, software and maintenance. 


Cloud, colocation or on-premise? Consider all options

Following the rush to the cloud, the cost implications should have prompted some companies to move back to on-premise, but it hasn’t, according to Lamb. “I thought it might happen with AI, because potentially the core per hour rate for AI is going to be far higher, but it hasn’t.” Lamb’s advice for CIOs is to be wary of being tied into particular providers or AI models, noting that Microsoft is creating models and not charging for them, knowing that companies will still be paying for the compute to use them. Lamb also says that, whether we’re talking on-premise, colocation or cloud, the potential for retrofitting existing capacity is limited, at least when it comes to capacity aimed at AI. After all, those GPUs often require liquid cooling to the chip. This changes the infrastructure equation, says Lamb, increasing the footprint for cooling infrastructure in comparison to compute. Quite apart from the real estate impact, this isn’t something most enterprises will want to tackle. Also, cooling and power will only become more complicated. Andrew Bradner, Schnieder Electric’s general manager for cooling, is confident that many sectors will continue to operate on-premise datacentre capacity – life sciences, fintech and financial, for example. 


How GenAI is Changing Work by Supporting, Not Replacing People

A common misconception is that AI adoption leads to workforce reduction. While automation has historically replaced repetitive, manual labor, the rise of GenAI is fundamentally different. Unlike traditional automation, which replaces human effort, GenAI amplifies human potential by reducing workload friction. The same science study reinforces this point: AI doesn’t just increase speed; it also improves work quality. Employees using AI-powered tools experienced a 40% reduction in task completion time and an 18% improvement in output quality, demonstrating that AI is an efficiency enabler rather than a job replacer. Consider the historical trend: The Industrial Revolution automated factory work but also created entirely new job categories and industries. Similarly, the digital revolution reduced the need for clerical roles yet generated millions of jobs in software development, cybersecurity, and IT infrastructure. ... Biases in machine learning models are still an issue since AI based on data from the past will perpetuate prevailing biases, and thus human monitoring is critical. GenAI can also generate misleading or inaccurate results, further highlighting the need for oversight. AI can generate reports, but it cannot negotiate deals, understand organizational culture, or make leadership decisions. 


Frankenstein Fraud: How to Protect Yourself Against Synthetic Identity Fraud

Synthetic identity fraud is an exercise in patience, at least on the criminal's part, especially if they're using the Social Security number of a child. The identity is constructed by using a real Social Security number in combination with an unassociated name, address, date of birth, phone number or other piece of identifying information to create a new "whole" identity. Criminals can purchase SSNs on the dark web, steal them from data breaches or con them from people through things like phishing attacks and other scams. Synthetic identity theft flourishes because of a simple flaw in the US financial and credit system. When the criminal uses the synthetic identity to apply to borrow from a lender, it's typically denied credit because there's no record of that identity in their system. The thieves are expecting this since children and teens may have no credit or a thin history, and elderly individuals may have poor credit scores. Once an identity applies for an account and is presented to a credit bureau, it's shared with other credit bureaus. That act is enough to allow credit bureaus to recognize the synthetic identity as a real person, even if there's little activity or evidence to support that it's a real person. Once the identity is established, the fraudsters can start borrowing credit from lenders.


Will AI erode IT talent pipelines?

“The pervasive belief that gen AI is an automation technology, that gen AI increases productivity by automation, is a huge fallacy,” says Suda, though he admits it will eliminate the need for certain skills — including IT skills. “Losing skills is fine,” he says, adding that machines have been eliminating the need for certain skills for centuries. “What gen AI is helping us do is learn new skills and learn new things, and that does create an impact on the workforce. “What it is eroding is the opportunity for junior IT staff to have the same experiences that junior staff have today or yesterday,” he says. “Therefore, there’s an erosion of yesterday’s talent pipeline. Yesterday’s talent pipeline is changing, and the steps to get through it are changing from what we have today to what we need [in the future].” Steven Kirz, senior partner for operations excellence at consulting firm West Monroe, shares similar insights. Like Suda, Kirz says AI doesn’t “universally make everybody more productive. It’s unequal across roles and activities.” Kirz also says both research and anecdotal evidence show that AI is replacing lower-level, mundane, and repetitive tasks. In IT, that tends to be reporting, clerical, data entry, and administrative activities. “And routine roles being replaced [by technology] doesn’t feel new to me,” he adds.


No comments:

Post a Comment