Showing posts with label SSE. Show all posts
Showing posts with label SSE. Show all posts

Daily Tech Digest - September 18, 2023

The ‘Great Retraining’: IT upskills for the future

As the technology ecosystem expands, Servier Pharmaceuticals’ Yunger believes cultivating hard-to-find skill sets from within is instrumental to future-proofing the IT organization. The company, a Google Cloud Platform shop, came face-to-face with that reality when it became difficult to find specialists, shifting its emphasis to growing its own talent. Yunger takes a talent lifecycle management approach that considers the firm’s three- to five-year strategy, aligns it to the requisite IT skills, and then matches the plan to individualized development and training programs. “We provide our vision of the future to our existing team and give them an opportunity to self-select into those paths to meet our future needs,” he explains. “The better our long-term vision, the more time we have to give our team the chance to learn and grow.” The University of California, Riverside, which is undertaking a similar practice to nurture IT talent from within, makes a concerted effort to start any large-scale reskilling initiative with those most willing to embrace change. 


The double-edged sword of AI in financial regulatory compliance

As fraudsters obtain more personal data and create more believable fake IDs, the accuracy of AI models improves, leading to more successful scams. The ease of creating believable identities enables fraudsters to scale identity-related scams with high success rates. Another key area where generative AI models can be employed by criminals is during various stages of the money laundering process, making detection and prevention more challenging. For instance, fake companies can be created to facilitate fund blending, while AI can simplify the generation of fake invoices and transaction records, making them more convincing. Furthermore, by bypassing KYC/CDD checks, it’s possible to create offshore accounts that hide the beneficial owners behind money laundering schemes. Generating false financial statements becomes effortless and AI can identify loopholes in legislation to facilitate cross-jurisdictional money movements.


Growing With AI Not Against It: How To Stay One Step Ahead

The key to effectively integrating AI into your business lies in proactive engagement. Rather than being passive recipients of technological changes, businesses should take an active role in understanding AI's potential applications. Reflecting on prominent companies such as Kodak and Nokia, which once dominated their respective industries, but ultimately faltered due to their reluctance to adopt technological advancements, underscores the importance of embracing AI as a transformative force. Consider Netflix's evolution from mailing in DVDs to streaming and their use of AI algorithms to recommend personalized content to users. ... In the face of advancing AI technology, the role of leaders is not merely to keep up but to set the pace. By actively engaging with AI, embracing it as a partner, learning from mistakes, and strategically adapting our approach, we position ourselves to harness its potential to foster innovation and enable us to navigate the future with confidence.


Metaverse and Telemedicine: Creating a Seamless Virtual Healthcare Experience

Firstly, the convergence of new core technologies like blockchain, digital twins, convergence, and virtual hospitals into the Metaverse will empower clinicians to offer more integrated treatment packages and programs. Secondly, using AR and VR technologies will enhance patient experiences and outcomes. Another benefit of the Metaverse for telemedicine is that it will facilitate collaboration among healthcare professionals. The ability to share information between healthcare professionals immediately will enable quicker pinpointing of the causes of illnesses. Moreover, the Metaverse will offer new opportunities to students and trainees to examine the human body in a safe, virtual reality educational environment. Surgeons are already using VR, AR, and AI technology to perform minimally-invasive surgeries, and the Metaverse opens up new frontiers in this area. Surgeons will be able to get a complete 360-degree view of a patient’s body, allowing them to better perform complex procedures using these immersive technologies.


Adaptive Security: A Dynamic Defense for a Digital World

Adaptive security systems employ continuous monitoring to gain real-time insights into an organization's network, applications, and endpoints. This continuous data collection allows for the rapid detection of abnormal behavior and potential threats. ... Understanding the context of an activity is crucial in adaptive security. Systems analyze not only the behavior of individual elements but also the relationships between them. This context-awareness helps in distinguishing between normal and malicious activities, reducing false positives. ... Adaptive security leverages machine learning and artificial intelligence (AI) algorithms to process vast amounts of data and identify patterns indicative of threats. These algorithms can adapt and evolve their detection capabilities based on new information and emerging attack vectors. ... Automation is a core element of adaptive security. When a potential threat is detected, adaptive security systems can automatically respond by isolating affected systems, blocking suspicious traffic, or alerting security teams for further investigation. 


The Power Duo: How Platforms and Governance Can Shape Generative AI

As you catalog the tools in your organization, consider where most of your development takes place. Is it happening solely in notebooks requiring code knowledge? Are you versioning your work through a tool like Github, which is often confusing to a non-coding audience? How is documentation handled and maintained over time? Oftentimes, business stakeholders and consumers of the model are locked out of the development process because there is a lack of technical understanding and documentation. When work happens in a silo, hand-offs between teams can be inefficient and result in knowledge loss or even operational roadblocks. This leads to results that are not trusted, oreven worse, adoption of the outputs. Many organizations wait too long before leveraging business experts during the preparation and build stages of the AI lifecycle. ...  This might be because only some of the glued together infrastructure is understood by the business unit, the hand off between teams is clunky and poorly documented, or the steps aren’t clearly laid out in an understandable manner.


How India is driving tech developments at G20

While there were no major technology-related announcements, a lot of indirect spillovers can be found in discussions on artificial intelligence (AI) and crypto regulations, taking a human-centric approach to technology, digitisation of trade documents and tech-enabled development of agriculture and education. As a run-up, there were recommendations and policy actions for the business sector, including the Startup20 initiative to support startup companies and the focus on digital public infrastructure (DPI). The summit had also cast the spotlight on climate change commitments, clean energy, and sustainability development goals. Pradeep Gupta, founder of think tank Security and Policy Initiatives, noted that the emphasis on climate change initiatives at G20 would require IT to play a role in areas like equipment, data management and analytics. “Carbon credits cannot function without good AI and data technology in place,” he said. “DPI will also be a big lever for the industry.” V K Sridhar ... agreed that IT will be instrumental in driving all the climate change agreements that emerged at this G20 – both from a technology and administrative point of view. 


Executive Q&A: Developing Data-Focused Professionals

Many universities have been caught unprepared for the exploding demands in AI skills. Most educational programs are traditional (four years) and do not necessarily give students the specialized in-time skills they need for these jobs. Deloitte had an interesting article about “AI whisperers” as the job of the future, referring to enterprises’ need for employees who deeply understand machine learning algorithms, data structures, and programming languages. Such jobs are already being advertised. An institute of higher education needs to be agile enough to create concentrations and certificates that quickly provide students and existing employees with just-in-time skills. ... There is inertia, and you can argue it is by design: universities are most comfortable with a traditional four-year education. They know how to do that, and education boards that approve these programs are also comfortable with that format. However, a four-year education does not speak to all students or speak to their needs and where they are in life.


How to Become a Database Administrator

Capacity planning is a core responsibility of database administrators. Capacity planning is about estimating what resources will be needed – and available – in the future. These resources include computer hardware, software, storage, and connection infrastructure. Fortunately, planning for infrastructure-as-a-service (IaaS) is quite similar to planning for on-premise. The basic difference in planning is the additional flexibility offered by the cloud. This flexibility allows DBAs to plan for the business’s immediate needs instead of planning for needs three to four years in advance. DBAs can also make use of the cloud’s ability to quickly scale up or down to meet the client’s demands. ... The DBA must be consciously aware of the business’s changing demands and the tools offered in the various clouds. Organizing the business in preparation for surge events – such as Black Friday or the start of school in September – and using the on-demand scalability available in cloud platforms is a primary responsibility of the modern DBA. Anticipating and responding to cyclical demands or major events makes the organization much more efficient.


SSE vs SASE: What You Need to Know

The Security Service Edge (SSE) framework was also coined by Gartner, but several years later in 2021. The SSE framework retains most of the core elements of SASE. The key difference is that SSE is designed for IT environments where SD-WAN is not required. SSE fits well for networks that do not have multiple paths to reach destinations without a need for application-based routing decisions. SSE is responsible for secure web, cloud services, and application access. Some of the top business case scenarios in which SSE works best is VPN replacement for remote employees. ... Typically, those considering SSE want a purely cloud-based security platform that provides a range of security functions at the edge of the network. As with SASE, leading networking and security vendors also have SSE options. However, the cloud-native nature of SSE means it is often marketed as a single platform that can be easily deployed, managed, and scaled. For this reason, SSE will likely gain traction at organizations looking to simplify and scale security for remote workers and transition to cloud-native environments.



Quote for the day:

"Everything you want is on the other side of fear." -- Jack Canfield

Daily Tech Digest - July 13, 2023

Industry groups call for changes to EU Cyber Resiliency Act

The first recommendation made by the collective is that the proposed scope of the CRA should be made narrower and clearer. "Any reference to 'remote data processing solutions' should be excluded from the scope of the CRA to ensure legal clarity, and to avoid overlaps with existing legislation and unnecessary burden," they wrote. Software as a service, platform as a service, or infrastructure as a service should not be considered within the scope of the CRA, and this clarification should be reflected in the core legal text to provide greater legal certainty and to facilitate implementation across the EU, the recommendation read. ... The second recommendation calls for a more proportionate approach to determining a product's risk-level, along with greater certainty for manufacturers to ascertain if a product is deemed a critical one. "A transparent and inclusive review process involving economic operators should be set up to determine whether a product is critical," the groups wrote. This would avoid wrongfully designating too many products as "critical," making them more expensive...


AI’s Impact on Security, Risk and Governance in a Hybrid Cloud World

To build an AI-driven compliance, security and governance solution, you must first be able to scale and learn from large data sets. To learn from the data, you must build training models for the data to be processed effectively by the AI component. These training models require the ability to analyze and operate at scale and support different training models for different use cases. Since we need to analyze and operate at scale continuously, we have moved from the underlying tech of machine learning (ML) to deep learning (DL) based on neural net technology. With this technology, we can detect, analyze and prioritize the findings. The second part of this is auto-remediation; this enables us to understand where the problem is developing and what actions, if taken, would create the biggest impact. This prioritization technique driven by AI and our proprietary technology working together creates a scenario of a self-healing environment. In this environment, a problem is addressed before it becomes a serious issue. 


9 tips for recruiting high-end IT talent

“Create a brand and reputation to attract this kind of talent to the work you do and your company’s culture,” says Drees. “That could be LinkedIn content or articles you post on your company site.” It could be stories in the news about your company or what personnel and clients say about the company in social media. ... “Give people the ability to grow, mature, and evolve,” says Majeed, whose leadership team has spent a great deal of time, thought, and money on this idea, focusing on creating a culture that nurtures and incubates talent, going so far as to build customized learning programs that encourage people to learn new technical skills and to grow their career. “We also give people so much flexibility to do what they want to do,” he says. This might sound like a distraction from work — time consuming, perhaps, or expensive. But it’s effective, he says. “It makes people more productive — they are working with passion and purpose.” ... “Leverage the engineers on your team, who are excited about the challenges they’re solving,” says Drees.


Combatting data governance risks of public generative AI tools

Integration enables users to obtain answers or sentences derived from enterprise data relevant to their queries. While publicly available generative AI tools permit natural language querying, world wide web data is not always applicable to the use case. Knowledge management solutions connect data from various data sources and business applications to consolidate the data into a central knowledge base. When it comes to querying about a customer or details of a business document, this is the only way to retrieve answers based on specific company entities. Additionally, delta crawling (i.e., crawling for new data only) certifies that the model’s data is always up to date, so users aren’t receiving old and obsolete information. ... ChatGPT and other publicly available models, like Google Bard, do not cite where their outputs came from. So, how do you know if the content came from a reliable source versus an opinionated blog or insignificant public forum? Adding the source allows users to open the corresponding document or file and view all the details to confirm accuracy and gain further insight into their query.


Civil society groups call on EU to put human rights at centre of AI Act

The groups are therefore calling on the EU institutions to draw clear limits on the use of AI by national security, law enforcement and migration authorities, particularly when it comes to “harmful and discriminatory” surveillance practices. They say these limits must include a full ban on real-time and retrospective "remote biometric identification" technologies in publicly accessible spaces, by all actors and without exception; a prohibition on all forms of predictive policing; a removal of all loopholes and exemptions for law enforcement and migration control; and a full ban on emotion recognition systems. They added the EU should also reject the Council’s attempt to include a blanket exemption for systems developed or deployed for national security purposes; and prohibit the use of AI in migration contexts to make individualised risk assessments, or to otherwise “interdict, curtail and prevent” migration. The groups are also calling for the EU to properly empower members of the public to understand and challenge the use of AI systems


The Challenges and Rewards of Zero Trust Privacy

A primary challenge that occurs with the implementation of zero trust privacy is the lack of a compliance footprint. A compliance footprint is a list of all the laws, regulations and standards the organization must adhere to. Often, companies do not have a team or individual responsible to monitor changes in the compliance landscape. Failure to do this impacts privacy compliance and the ability to implement zero trust privacy. Organizations cannot guarantee that the system architecture restricts the flow of data beyond that which is legal because they do not know their obligations. We see this today with the increase in privacy fines that have been issued for inappropriate collection and transmission of personal data. Another challenge is that organizations often start with identity and access management. When users’ access and authorization permissions are enabled for an unknown set of data elements, organizations cannot guarantee compliance with least privilege requirements.


Microsoft jumps into competitive security service edge (SSE) arena

Analysts say Microsoft, while a late to the market, will be a welcome player in the SSE arena given its large customer base. “Cisco, Palo Alto Networks, Symantec, and Zscaler have a multi-year start over Microsoft. Gaining momentum in a crowded market will take work,” wrote Dell ‘Oro Group research director, Mauricio Sanchez in a blog about the SSE announcement. “Everyone knows who Microsoft is and generally enjoys substantial goodwill among its customer base. A large salesforce and partner ecosystem will open many doors,” Sanchez stated. “Large enterprises that are strong Microsoft shops and take advantage of Microsoft’s Enterprise Licensing Agreement benefits could lead to significant uptake of Microsoft SSE solution.” Also, no other SSE vendor has the same identity vendor chops that Microsoft brings. SSE is identity-heavy, which Microsoft can exploit by owning the identity use cases end-to-end, Sanchez stated. Microsoft Windows and Office 365 clients can preview the SSE software, and it will be generally available for other operating systems later this year.


The obsession advantage in transformation

During tough times, it’s easy to look at customers as a means to an end—a way to drive revenue and help your bottom line. But that’s a terrible approach; your customer also is going through the same difficult times, and this is your chance to support them. Obsess about their pain points and learn how you can be there for them. Work from my PwC colleagues has shown that when companies wire a deep understanding of customers into their business models, operations, and decision-making, they not only increase value for customers, but gain insights that help to further differentiate the business. ... The most transformation-ready leaders look to other innovative approaches to gain new perspectives. Whether this is through conversations with executives in different industries, speaking with sports coaches or sociologists, reading and researching relevant case studies, or speaking one-to- one with more junior employees at your own company, gaining a new perspective can often lead to powerful inspiration. Don’t wait for these views to come to you, either. 


Building a Data Driven Organization

"The key lies in democratizing data assets and their utilization by providing user-friendly tools, offering literacy courses, and promoting approaches that enable employees across the organization to generate insights," he says. He adds it is not enough for top management to merely include data-driven initiatives in their business strategy -- they must visibly and consistently support the cultural transformation. "This involves actively measuring progress, recognizing early adopters as champions, and rewarding them accordingly," he says. "Holding leaders accountable for driving cultural change in their respective areas is essential." ... The data governance element is also critical, which means establishing goals, measurements, and continuous improvement practices to maximize the value derived from data and ensure user satisfaction. "Set clear objectives for data utilization, monitoring performance against these goals, and consistently refining processes to optimize data-driven practices," he says. By implementing these practices, organizations can foster a data-driven culture where employees are equipped with the necessary tools, skills, and mindset to leverage data effectively in their decision-making processes.


Leap to leader: Make yourself heard

It’s not just a matter of going into a meeting and asking for a raise or promotion. Instead, imagine how an agent or headhunter would represent you. How would they make the case for you getting the job or the raise you deserve? And remember, it’s not just your boss you have to convince; your goal is to give them specifics so that they can go make a case for you to their boss and to HR. Ground the conversation in facts. What have you accomplished? How has your work helped drive the business? Can you point to concrete ways in which you’ve added value? ... There’s a mental loop people can get caught in that might keep them from pushing for more money, whether negotiating for a raise or for a pay package that comes with the new job. “I don’t want to rock the boat,” they say to themselves. “I want to make sure things start on a positive note. I’m grateful for the opportunity.” As a result, they settle too quickly. But for more senior roles, the person on the other side of the table is expecting you to push, and they’ve probably built in some negotiating room for when you do start pushing.



Quote for the day:

"It is not fair to ask of others what you are not willing to do yourself." -- Eleanor Roosevelt