Showing posts with label patching. Show all posts
Showing posts with label patching. Show all posts

Daily Tech Digest - March 25, 2026


Quote for the day:

"A true dreamer is one who knows how to navigate in the dark." -- John Paul Warren


🎧 Listen to this digest on YouTube Music

▶ Play Audio Digest

Duration: 22 mins • Perfect for listening on the go.


What actually changes when reliability becomes a board-level problem

When system reliability transitions from a technical metric to a board-level priority, the focus shifts from engineering jargon like latency to fiduciary responsibility and risk management. This evolution requires leaders to speak the language of revenue, reframing outages not just by their duration but by the millions in annual recurring revenue at risk. The author argues that true reliability is a governance stance where systems are treated as non-negotiable obligations. To manage this, organizations must move beyond technical hardening toward a "Trust Rebuild Journey," treating postmortems as binding customer contracts rather than internal artifacts. Operational changes, such as implementing a "Unified Command" and "game clocks," help reduce decision latency during crises. However, the core of this shift is human-centric; it’s about understanding the real-world impact on users, like small business owners or emergency dispatchers, whose lives depend on these systems. As autonomous AI begins to handle routine remediation, the author warns that human judgment remains vital for solving complex, cascading failures. Ultimately, being a board-level problem means realizing that an SLA is not just a target but a promise to protect the people behind the screen.


Rethinking Learning: Why curiosity, not compliance, is the key to success

In the article "Rethinking Learning," Shaurav Sen argues that traditional corporate training is fundamentally flawed, prioritizing compliance and completion metrics over genuine behavioral change and capability. Sen contends that many organizations fall into a "measurement trap," focusing on dashboard success while failing to improve job performance. To fix this, he proposes a shift from mandatory, "just-in-case" training to an optional, "just-in-time" model that prioritizes learner curiosity over administrative convenience. He introduces the "Spark" framework—Surface, Provoke, Activate, Reveal, and Kick-Start—as a method to create learning experiences that resonate emotionally and stick intellectually. By transforming Learning and Development (L&D) professionals into "curiosity architects," organizations can foster a culture where employees proactively seek growth. This approach involves replacing outdated metrics with "Time to Competency" and "Voluntary Re-Engagement Rates." Ultimately, Sen calls for a radical simplification of learning systems, urging leaders to move away from "learning theatre" and toward high-impact environments fueled by productive discomfort. This transition is essential in an AI-driven world where information is abundant but the spark of human curiosity remains the primary driver of successful employee skilling and organizational success.


When Patching Becomes a Coordination Problem, Not a Technical One

The article argues that patching failures are often rooted in organizational coordination breakdowns rather than technical limitations, especially regarding transitive dependencies. When vulnerabilities emerge in deeply embedded components, the remediation path is rarely linear because upstream fixes are not immediately deployable. Each layer in the dependency chain introduces delays as downstream libraries must integrate, test, and release their own updates. This lag creates a dangerous window for attackers to exploit publicly known vulnerabilities while internal teams struggle to align. CISOs face a persistent tension where security demands rapid action while engineering and operations prioritize system stability and regression testing. To overcome these hurdles, organizations must treat patching as a structured capability rather than a reactive task. Effective strategies include defining ownership for dependency-driven risks, establishing clear escalation paths, and prioritizing internet-facing or critical business systems. By investing in testing pipelines and rehearsed response playbooks, companies can replace improvised decision-making with predictable processes. Ultimately, the goal is to reduce uncertainty and internal friction, ensuring that when the next major vulnerability arrives, the organization is prepared to move with speed and clarity across all cross-functional teams involved in the remediation efforts.


AI and Medical Device Cybersecurity: The Good and Bad

The rapid integration of artificial intelligence into medical device cybersecurity presents a complex landscape of advantages and significant risks. On the positive side, AI-powered tools, such as large language models and autonomous scanners, are revolutionizing vulnerability discovery. These technologies can identify hundreds of true security flaws in hours—a task that previously took weeks—leading to a forty percent increase in known vulnerabilities. However, this surge has created a daunting vulnerability risk mitigation gap. Healthcare organizations and manufacturers struggle to manage the resulting avalanche of data, as current regulations like those from the FDA prohibit using AI for critical decision-making regarding device safety and remediation. Furthermore, the accessibility of these sophisticated tools lowers the barrier for cybercriminals, enabling even low-skilled threat actors to pinpoint exploitable flaws in life-critical equipment like infusion pumps. While the future use of Software Bills of Materials (SBOMs) alongside AI promises improved infrastructure resilience, the immediate reality is a race between rapid discovery and the ability of human-led systems to prioritize and fix flaws effectively. Balancing this technological double-edged sword remains a critical challenge for the medical sector as it navigates the evolving threat landscape of 2026 and beyond.


Autonomous AI adoption is on the rise, but it’s risky

The article "Autonomous AI adoption is on the rise, but it’s risky" highlights the rapid emergence of agentic AI platforms like OpenClaw and Anthropic’s Claude Cowork, which move beyond simple content generation to executing complex, multi-step workflows. While traditionally risk-averse sectors like healthcare and finance are beginning to experiment with these autonomous tools, the transition introduces substantial security and operational challenges. Proponents argue that these agents act as force multipliers, eliminating administrative drudgery and allowing human workers to focus on higher-value strategic tasks. However, the speed of execution can also amplify errors; for instance, a misaligned agent might inadvertently delete a user’s entire inbox or fall victim to sophisticated prompt injection attacks. Experts warn that many organizations currently lack the necessary monitoring systems and documented operational context required to manage these autonomous systems safely. To mitigate these risks, IT leaders are advised to implement robust oversight, ensure data cleanliness, and configure strict application permissions. Ultimately, despite the inherent dangers, the article encourages a balanced approach of cautious experimentation and rigorous control, as autonomous AI is poised to fundamentally reshape the global professional landscape within the next two years.


Your security stack looks fine from the dashboard and that’s the problem

According to Absolute Security’s 2026 Resilience Risk Index, a critical disconnect exists between cybersecurity dashboards and actual endpoint health, with one in five enterprise devices operating in an unprotected state daily. This "control drift" results in the average device spending approximately 76 days per year outside enforceable security states. The report highlights a widening gap in vulnerability management, where out-of-compliance rates climbed to 24%. Furthermore, while 62% of organizations are consolidating vendors to reduce complexity, this strategy creates significant "concentration exposure," where a single platform failure can paralyze an entire fleet. Patching discipline is also faltering; Windows 10 has reached end-of-life, and Windows 11 patch ages are rising across all sectors. Simultaneously, generative AI usage has surged 2.5 times, primarily through browser-based access that bypasses standard IT oversight. This shadow AI adoption, coupled with the shift toward AI-capable hardware, necessitates more robust endpoint stability to support automated workflows. Financially, the stakes are immense, as downtime costs large firms an average of $49 million annually. Ultimately, the report urges CISOs to prioritize resilience and remote recoverability over mere license coverage to mitigate these escalating operational and security risks.


Why AI scaling is so hard -- and what CIOs say works

The article highlights that while enterprises are investing heavily in generative AI, scaling these initiatives remains a significant hurdle due to high costs, poor data quality, and adoption difficulties. Insights from CIOs at First Student, OceanFirst Bank, and Lowell Community Health Center reveal that moving beyond experimental pilots requires a disciplined, value-driven strategy. Successful scaling begins with identifying specific, high-impact use cases that address tangible operational pain points rather than chasing industry hype. These leaders emphasize a "crawl, walk, run" approach, starting with small, contained pilots to validate performance before enterprise-wide rollouts. Crucially, selecting vendors with industry-specific expertise and establishing clear ROI metrics are vital for maintaining momentum. Conversely, the article warns against common pitfalls such as neglecting the end-user experience, ignoring change management, or delaying essential data governance and security frameworks. Without a solid data foundation, even the most advanced AI tools are prone to failure. Ultimately, CIOs must balance technical implementation with human-centric design, ensuring that AI serves as a practical, integrated tool rather than a novelty. By focusing on measurable outcomes and rigorous governance, organizations can bridge the gap between AI potential and actual business value.


Why Application Modernization Fails When Data Is an Afterthought

In "Why Application Modernization Fails When Data Is an Afterthought," Aman Sardana highlights that between 68% and 79% of legacy modernization projects fail because organizations prioritize cloud infrastructure over data strategy. While teams often focus on refactoring code or migrating to new platforms, they frequently ignore the "data gravity" of decades-old schemas and monolithic models. Simply moving applications to the cloud without addressing underlying data constraints merely relocates technical debt rather than retiring it. Sardana argues that modernization is fundamentally a data transformation problem, as legacy data structures built for centralized systems clash with cloud-native requirements like elastic scale and distributed ownership. To succeed, organizations must adopt a "data-first" mindset, implementing domain-aligned data ownership and explicit data contracts. This transition requires breaking down organizational silos where application and data teams operate independently. Ultimately, the article suggests that successful modernization depends on a deep collaboration between the CIO and Chief Data Officer to ensure data is treated as a primary, independent asset. Without this foundation, cloud initiatives become expensive exercises in preserving legacy limitations rather than unlocking true business agility and long-term innovation.


Architecting Portable Systems on Open Standards for Digital Sovereignty

In his article "Architecting Portable Systems on Open Standards for Digital Sovereignty," Jakob Beckmann explores the necessity of maintaining control over critical IT systems by reducing vendor dependency. He argues that while absolute digital sovereignty is an unattainable myth in a globalized economy, organizations must strive for a "Plan B" through architectural discipline and the adoption of open standards. Sovereignty is categorized into four key axes: data, technological, operational, and general governance. The author emphasizes that achieving this does not require building everything in-house or operating private data centers; rather, it involves identifying critical business processes and ensuring they are portable. Beckmann highlights that open standards like TCP/IP, TLS, and PDF serve as foundational pillars for this portability. However, he warns that the process is often more complex than anticipated due to hidden dependencies and the subtle lure of vendor-specific features in popular tools like Kubernetes. Ultimately, the article advocates for a balanced approach where resilient, portable architectures and clear guardrails empower businesses to migrate or adapt when providers change their terms, ensuring long-term operational autonomy and risk mitigation.


Why Most Data Security Strategies Collapse Under Real-World Pressure

Samuel Bocetta’s article explores why data security strategies frequently fail, arguing that most are built for ideal conditions or audit compliance rather than real-world operational pressures. A primary failure point is the disconnect between rigid policies and the critical need for speed; when engineers face urgent deadlines, security often becomes a hurdle that is quietly bypassed with temporary workarounds. Furthermore, organizations often over-rely on technical tools while ignoring human behavior and misaligned incentives. People naturally prioritize delivery and uptime over security controls that cause friction, especially when leadership rewards speed over diligence. Data sprawl—driven by shadow AI and decentralized analytics—also outpaces traditional governance models, creating visibility gaps that attackers exploit. Additionally, many strategies remain static in a dynamic threat landscape, failing to evolve alongside modern attack vectors. Bocetta concludes that building resilient security must shift from a narrow "checkbox" compliance mentality to an integrated, continuously evolving practice. True success requires meticulously aligning security measures with actual business workflows, executive incentives, and the fluid reality of how data is used daily, ensuring that protection is built into the organization's core rather than being treated as a secondary obstacle to progress.

Daily Tech Digest - January 05, 2024

The dark side of AI: Scientists say there’s a 5% chance of AI causing humans to go extinct

Despite concerns about AI behaving in ways misaligned with human values, some argue that current technology cannot cause the catastrophic consequences predicted by skeptics. Nir Eisikovits, a philosophy professor, contends that AI systems cannot make complex decisions and do not have autonomous access to critical infrastructure. While the fear of AI wiping out humanity grabs attention, an editorial in Nature contends that the more immediate societal concerns lie in biased decision-making, job displacement, and the misuse of facial recognition technology by authoritarian regimes. The editorial calls for a focus on actual risks and actions to address them rather than fearmongering narratives. The prospect of AI with human-level intelligence raises the theoretical possibility of AI systems creating other AI, leading to uncontrollable “superintelligence.” Authors Otto Barten and Joep Meindertsma argue that the competitive nature of AI labs incentivizes tech companies to create products rapidly, possibly neglecting ethical considerations and taking risks.


10 Skills Enterprise Architects Need In 2024

While an abundance of legacy technology is a cause for concern, each application needs to be appraised on a case-by-case basis. It's possible that an older application could actually be a better functional fit for your organization. More likely, however, is that removing a legacy application could be more trouble than it's worth. When you have clarity on how each application fits into your IT landscape, it could become apparent that removing an application would cause more problems than it would solve. Just as enterprise architects need to become experts at surgically removing outdated applications, they also need to know when the time is right to remove an application and how to manage legacy technology until that point. That's the true value of enterprise architecture. ... As generative artificial intelligence (AI) and other new technologies continue to take the weight of work out of daily tasks, the value a human can add is more about communication, negotiation, and diplomacy. Getting stakeholders on board with enterprise architecture involves charm and understanding.


The European Data Act: New Rules for a New Age

Being a key element of the EU’s data strategy, the Data Act intends to lead to new, innovative services and more competitive prices for aftermarket services. According to the European Commission, the Data Act will make more data available for reuse, and it is expected to create 270 billion euros of additional gross domestic product by 2028. Complementing the Data Governance Act, which sets out the processes and structures to facilitate data sharing by companies across the EU and between sectors, the Data Act clarifies who can create value from industrial data and under which conditions. The Data Act also aims to put users and providers of data processing services on more equal footing in terms of access to data. ... The Data Act includes specific measures to allow users to gain access to the data their connected products generate (including the relevant metadata necessary to interpret such data) and to share such data with third parties to provide aftermarket or other data-driven innovative services. The Data Act further sets out that such data should be accessible in an easy, secure, comprehensive and structured manner, and it should be free of charge and provided in a commonly used machine-readable format.


Unlocking the Potential of Gen AI in Cyber Risk Management

Security automation powered by AI plays a pivotal role in streamlining various security functions, alleviating the workload for CSOs and CIOs and facilitating regulatory compliance. Security automation significantly simplifies routine security tasks, allowing human resources to pivot toward more intricate risk analysis and strategic decision-making. One of the notable contributions of AI lies in its assistance in meticulous code inspection and vulnerability assessment. For instance, tools such as Amazon Inspector for Lambda code and Amazon Detective provide indispensable support. Amazon Inspector aids in the comprehensive examination of code, identifying potential vulnerabilities or security loopholes within the Lambda functions, which are integral parts of many cloud applications. This early identification ensures preemptive measures are taken to fortify these vulnerabilities before deployment. Additionally, Amazon Detective helps security analysts by correlating and organizing vast amounts of data to identify patterns or anomalies that might signify a security issue. By leveraging machine learning and AI-driven insights, it streamlines the process of identifying and addressing them effectively. 


Honeywell’s Journey to Autonomous Operations

We’ve integrated AI into our technical-support operations, enabling customers to receive answers to their technical questions within minutes or seconds, as opposed to the day or two it previously took. Today, the addition of generative AI has amplified the capabilities of industrial AI, making it even more powerful than ever before. For example, we’re currently looking at millions of instances of alarms being triggered in the plants of our industrial customers -- to evaluate the potential use of such historical datasets to train a robust language model that would assist plant operators in identifying and addressing alarm issues promptly and providing guidance on necessary actions. ... With the convergence of IoT and AI software, the journey to autonomous operations is accelerating rapidly in the industrial world. However, automated decision-making requires both domain knowledge and the technical capabilities to build such a system. In vetting potential partners, look for one with the experience, data, and domain expertise to help you make the transition at scale.


Data and AI Predictions for 2024: Shifting Sands in Enterprise Data and AI Technologies

As organizations continue their shift to cloud-based data and analytics infrastructure, a more prudent fiscal outlook will be the theme for 2024. The cloud migration megatrend will not reverse, but organizations will scrutinize their cloud spend more than ever due to the challenging macroeconomic environment. In the cloud analytics arena, Databricks and Snowflake will continue their dominance with their well-established platforms. In particular, Databricks’ first-mover advantage for facilitating a lakehouse architecture will allow it to capture more market share. This paradigm combines the flexibility of data lakes with the management features of data warehouses, offering the best of both worlds to enterprises. On the other hand, Google BigQuery is expected to retain its stronghold within Google Cloud Platform (GCP) deployments, bolstered by deep integration with other GCP services and a strong existing customer base. However, the economic headwinds will compel enterprises to consider the total cost of ownership more closely. As a result, the traditional data warehouse architecture will see a decline in favor of the more cost-effective lakehouse design pattern. 


“You can’t prevent the unpreventable” - Rubrik CEO

A significant hurdle in the fight against cyber threats as a whole is in legislation and prosecution. The most capable cyber criminal enterprises are often state-sponsored groups harbored within nations that share their sympathies. While it is possible to seize their cyber assets and disrupt their operations, it is near impossible to prosecute a criminal who is working on behalf of a hostile government. Sinha states that not enough is being done at both the business and governmental levels to create frameworks for information sharing. This means that when one business faces a successful attack, it can be studied to understand the methods of intrusion, how the data was encrypted or extracted, and what could have been done at each stage of the attack to minimize the damage. Not only does this allow businesses to improve their data security and recovery strategies, but also provides attack playbooks that can be used to identify the groups responsible and their cyber infrastructure. However, there is an air of hesitation among many businesses as many would prefer to pay a ransom rather than reveal that their organization was successfully breached, which could cause potential reputational and economic losses.


Gen AI: A Shield for Improved Cyber Resilience

Before implementing GenAI as a proper defense tool, teams and leaders need to understand the strengths and weaknesses of GenAI. Proper research and education on this topic will ensure accurate security procedures fortifying the appropriate tool for the corresponding task. An easy way to understand the benefits of a certain AI tool is by surveying its AI model card (sometimes known as a “system card”), which ultimately provides users with knowledge about its benefits and advantages, what it has and has not been tested for, and its flaws and vulnerabilities. Vetting AI models is a vital step, and model provenance should be the first step of any and all defense strategies. Biden’s latest executive order about AI reinforces the importance of vetting AI models, requiring all AI models to be red-teamed to suss out potential weaknesses. Model provenance provides all documented history such as the AI model origin, the architecture and parameters it possesses, dependencies it may bear, the data used to train it, and other corresponding details. 


Apache ERP Zero-Day Underscores Dangers of Incomplete Patches

The incident highlights attackers' strategy of scrutinizing any patches released for high-value vulnerabilities — efforts which often result in finding ways around software fixes, says Douglas McKee, executive director of threat research at SonicWall. "Once someone's done the hard work of saying, 'Oh, a vulnerability exists here,' now a whole bunch of researchers or threat actors can look at that one narrow spot, and you've kind of opened yourself up to a lot more scrutiny," he says. "You've drawn attention to that area of code, and if your patch isn't rock solid or something was missed, it's more likely to be found because you've extra eyes on it." ... The reasons that companies fail to fully patch an issue are numerous, from not understanding the root cause of the problem to dealing with huge backlogs of software vulnerabilities to prioritizing an immediate patch over a comprehensive fix, says Jared Semrau, a senior manager with Google Mandiant's vulnerability and exploitation group. "There is no simple, single answer as to why this happens," he says. 


Unlocking the Secrets of Data Privacy: Navigating the World of Data Anonymization, Part 1

Implementing data anonymization techniques presents many technical challenges that demand meticulous deliberation and expertise. One paramount obstacle lies in the intricacies of determining the optimal level of anonymization. A profound comprehension of the data's structure and the potential for re-identification is imperative when employing techniques such as k-anonymity, l-diversity, or differential privacy. Furthermore, scalability poses another formidable hurdle. With the continuous growth of data volumes, effectively applying anonymization techniques without unduly compromising performance becomes increasingly more work. Numerous difficulties emerge in the execution procedure because of the differing nature of information types, from organized information in databases to unstructured information in reports and pictures. Additionally, the challenge of keeping pace with the ever-evolving data formats and sources necessitates constant updates and adaptations of anonymization strategies.



Quote for the day:

"You may be disappointed if you fail, but you are doomed if you don't try." -- Beverly Sills

Daily Tech Digest - April 12, 2022

What Data Privacy Really Needs Now Is A Digital Transformation

To begin your company's data privacy digital transformation, you should do two main things. First, define your company's privacy requirements. Create a clear list of the current needs you have. Do you need help managing and fulfilling users' privacy requests? Do you need a consent management tool? Do you want to automate your data mapping efforts? Do you need third-party risk assessment? Make sure you clearly define your desired set of requirements based on your user base size, business assets and countries of operation. Depending on where your business and customers reside, you will need to research the requirements for data privacy compliance in each of those countries. ... A digital transformation will help the data privacy field make strides as it progresses. With privacy technology and automation, companies can seamlessly integrate data privacy into their businesses, products and customer experiences. Data ownership marks a new era in the digital world, and to make it possible and successful, we have to welcome this change with smart technologies and an open mind.


Introduction to BigLake tables

BigLake is a unified storage engine that simplifies data access for data warehouses and lakes by providing uniform fine-grained access control across multi-cloud storage and open formats. BigLake extends BigQuery's fine-grained row- and column-level security to tables on data resident object stores such as Amazon S3, Azure Data Lake Storage Gen2, and Google Cloud Storage. BigLake decouples access to the table from the underlying cloud storage data through access delegation. This feature helps you to securely grant row- and column-level access to users and pipelines in your organization without providing them full access to the table. After you create a BigLake table, you can query it like other BigQuery tables. BigQuery enforces row- and column-level access controls, and every user sees only the slice of data that they are authorized to see. Governance policies are enforced on all access to the data through BigQuery APIs. For example, the BigQuery Storage API lets users access authorized data using open source query engines such as Apache Spark ... For data administrators, BigLake lets you abstract access management on data lakes from files to tables, and it helps you manage users' access to data on lakes.


Creating a Security Culture Where People Can Admit Mistakes

The serious lesson from that is to acknowledge but forgive errors. "He's said, many times, that he knew at that moment it was going to be OK," Ellis says. "Creating a safe culture requires a lot of practices, and one of them is closure. Humor is a great way to provide closure because you rarely laugh about something that is still creating tension." There isn't a lot to laugh about in cybersecurity, with security teams fighting off a growing number of cyberattacks and deploying protective measures for a fast-evolving environment. But security shouldn't be about browbeating people into doing the right thing or scaring them with the prospect of punishment. For security to be a team sport, you need to make people want to play. It's vitally important to your business to create a security culture — that is, an atmosphere in which someone who messes up and breaks something feels they can report it without getting blasted for their actions. This idea isn't new, but considering recent analysis about how some companies aren't backing up their source code, sometimes stories need to be repeated.


OpenSSH goes Post-Quantum, switches to qubit-busting crypto by default

The discrepancy in effort between multiplying two known primes together, and splitting that product back into its two factors, is pretty much the computational basis of a lot of modern online security…so if quantum computers ever do become both reliable and powerful enough to work their superpositional algorithmic magic on 3072-digit prime factors, then breaking into messages we currently consider uncrackable in practice may become possible in theory. Even if you’d have to be a nation state to have even the tiniest chance of succeeding, you’d have turned a feat that everyone once considered computationally unfeasible into a task might just be worth having a crack at. This would undermine a lot of existing public-key crypto algorithms to the point that they simply couldn’t be trusted. Even worse, quantum computers that could crack new problems might also be used to have a go at older cryptographic puzzles, so that data we’d banked on keeping encrypted for at least N years because of its high value might suddenly be decryptable in just M years, where M < N, perhaps less by an annoyingly large amount.


7 tips for leading productive remote teams

“Managing productivity is one of the most complex things any one person or organization can aspire to do,” says Dr. Sahar Yousef, a cognitive neuroscientist at University of California—Berkeley. The first step, though, is to define what you mean by productive, she says. “You can’t improve or change something that is not measurable.” And you can’t trust your team if you can’t also verify that they are working productively. If, in the past, you measured how hard people were working by noting who was at their desk or who spoke up in meetings, you’ll have to find a new way. Those things aren’t available anymore and they were never a good measure of productivity anyway. “We measure baselines around productivity, not hours worked,” says Andi Mann, CTO at Qumu. Because tracking how many hours someone worked doesn’t tell you much about productivity, even when you could tell the difference between work and home. “I spent nine hours at work,” says Mann. “Does that mean I accomplished something? Not necessarily. So that’s not the measure I’m looking for. My team are grownups — coders, engineers, smart people. I measure metrics that matter — outputs and accomplishments.”


Expanding Devops With Infrastructure As Code

Given the need to software companies to constantly grow their customer bases, the relative low cost of cash for the past decade and a half, and the ability to cross sell and upsell, it is natural for software conglomerations to form. And so it was only a matter of time before Puppet Software and its peers, Ansible, Chef and SaltStack, were acquired once they built up sufficient momentum to demonstrate their likely longevity across service providers, smaller clouds, and enterprises that do not build their own DevOps software stacks. So Red Hat bought Ansible in October 2015 for around $100 million, and Ansible was absolutely one of the reasons why IBM was compelled to pay $34 billion to acquire Red Hat in October 2018. ... And then VMware paid an undisclosed sum to buy SaltStack in that same month. HashiCorp, which has built a big following with its Terraform and Vagrant configuration management tools, has gone all the way and built a complete DevOpsContainer platform and has also gone public – but HashiCorp is the exception, not the rule, and it will have to keep expanding its platform and adding more tools if it hopes to keep growing its business.


3 Ways Developers Can Boost Cloud Native Security

Developers’ interest in security has been a long time coming. Google search data shows that queries for terms like “what is DevSecOps” and “DevSecOps vs. DevOps” first popped up in 2014 and have been steadily rising since 2017. The cloud, microservices, containerization and APIs are responsible for this burgeoning interest. These innovative technologies aren’t only changing the way applications are built and operated, they’re also changing what’s needed from a security perspective. In a modern environment, developers, engineers and architects need to think about data privacy and security because today’s applications benefit from having security measures baked into discrete components. Before the cloud became as ubiquitous as it is today, traditional cybersecurity relied on a perimeter-based model. Measures like firewalls and browser isolation systems essentially “surrounded” on-premise networks and systems. Applications and data were secure because they were hosted on physically isolated infrastructure. 


Data democratization leaves enterprises at risk

Data democratization strategies ensure that company data is easily accessible by all employees, regardless of their position, without the involvement of the IT department. As valuable company data is placed in the hands of more individuals, cybercriminals can broaden the scope of potential targets to hack. Now an entire organization’s employee population theoretically faces an increased risk of malware penetration, and IT departments have a more difficult time deciphering when an unauthorized user has infiltrated the cloud-based systems where the data lives. Many organizations have implemented traditional detection-based security technology to thwart these threats, yet these solutions are only able to detect threats with known malware signatures. As enterprises work to secure their cloud infrastructures, they need to consider that solutions that focus on detecting threats are unable to protect against sophisticated attacks. As mentioned, proper security is critical for data democratization. Yet, in order for data democratization to work and make an impact, productivity has to be a critical focus.


How CISOs Are Walking the Executive Tightrop

High-performing CISOs are taking strategic business objectives and efforts into account and adapting their security programs to deliver results that multiply business velocity and revenue, instead of hindering the business by basing a security program on threats and vulnerabilities alone. This means CISOs are also having to become more business-savvy, helping promote a security culture through shared values, trust, and accountability, often more through influencing skills than with the security and compliance hammer. “We're seeing the CISO role being elevated out from underneath the CIO's IT umbrella and becoming a direct report to the CEO,” explains John Hellickson, field CISO executive advisor for Coalfire. “This means they are expected to bring a high degree of business acumen in how they represent risk to their business peers and stakeholders.” He said the need for establishing business-aligned cybersecurity programs that go beyond typical control frameworks is now table stakes -- the ability to demonstrate positive business outcomes and ROI of security risk management activities and investments will continue to be expected in the years to come.


Patch Tuesday to End; Microsoft Announces Windows Autopatch

"A security gap forms when quality updates that protect against new threats aren't adopted in a timely fashion. A productivity gap forms when feature updates that enhance users' ability to create and collaborate aren't rolled out. As gaps widen, it can require more effort to catch up," Bela says. In a separately released Windows Autopatch FAQ, Microsoft says the updates will be applied to a small initial set of devices, evaluated and then graduated to increasingly larger sets, with an evaluation period at each progression. "This process is dependent on customer testing and verification of all updates during these rollout stages. The outcome is to assure that registered devices are always up to date and disruption to business operations is minimized, which will free an IT department from that ongoing task," Microsoft says. In addition, Microsoft says that in case of an issue, the Autopatch service can be paused by the customer or the service itself. "When applicable, a rollback will be applied or made available," it says.



Quote for the day:

"The secret of a leader lies in the tests he has faced over the whole course of his life and the habit of action he develops in meeting those tests." -- Gail Sheehy