Daily Tech Digest - June 11, 2017

What it takes to build artificial intelligence skills

AI skills -- again, which blend expertise n programming, data, and business development -- may continue to be in short supply, .... AI is "not something a solitary genius cooks up in a garage," they state. "People who create this type of technology must be able to build teams, work in teams, and integrate solutions created by other teams." This requires a change in the way programming is taught, they add. "We're too often teaching programming as if it were still the 90s, when the details of coding (think Visual Basic) were considered the heart of computer science. If you can slog through programming language details, you might learn something, but it's still a slog -- and it shouldn't be. Coding is a creative activity, so developing a programming course that is fun and exciting is eminently doable."


What exactly is a Cloud Architect and how do you become one?

If you are thinking of becoming a Cloud Architect you will have hopefully already had a strong background in a similar technical area. The following list, will hopefully give you some indication of whether you can begin to contemplate heading down the path of becoming a Cloud Architect. If you feel comfortable with most of the following concepts or at least some of them then you are probably on the right track, otherwise , maybe some initial study or work in these areas would be a better strategy before you tackle the Cloud Architect Role. ... The possibilities are endless and with the Cloud Market expected to grow exponentially over the next few years we think that becoming a Certified Cloud Architect is definitely a step in the right direction as both a career choice and as a chance to get on board any future new and exciting technologies that are bound to emerge in the Cloud arena.


The Transformation Of Insurance

The front office is being revolutionised with apps and portals that allow brokers and agents easier information access and the ability to customise their offerings. Artificial Intelligence based chat-bots are helping customers not just buy better, but also stay connected through the insurance life-cycle to better manage their policies, and file and track claims.  Mobile apps are helping enhance customer engagement and providing specific insights to create real stickiness. ... The back office is seeing a significant technology enabled leap too. Automated claims processing - leveraging Machine Learning and increasingly complex rules engines - is becoming more and more the standard. Intelligent Automation is not just reducing costs and streamlining operations, it is increasingly being linked to front-end customer facing portals and apps to leapfrog service experience.


Unstructured data: turning data into actionable intelligence

This information enters your organization. But it doesn’t enter your organization via the helpdesk or contact center. The customer’s request gets looked at follows the traditional path of approval. It does take some time and the customer gets a bit impatient. Who does he call? Not Ghostbusters. And not the people who deal with the loan request. No, he calls the contact center. Or he sends a mail, maybe to say he sent you a mail with an attachment, for instance a copy of his application form. This is just one possible scenario but it shows the challenges. If your contact center has no insight in the processes which are happening in the back end, in this case, the status of the approval, he/she can’t help immediately. And if you have no unified approach with a capability to capture the important data hidden in the unstructured forms of communication (emails, Twitter messages) he/she is blocked as well. The result: a very frustrated customer.


Infrastructure Software Vulnerabilities Raise Concern Among Cybersecurity Experts

Most of the world's high-profile cybersecurity incidents involve theft of consumers' personal information from retailers, insurers and other businesses or so-called "ransomware" like the "WannaCry" attack that compromised more than 200,000 computers in 150 nations last month, Leyman said. But many cyberattack victims are reluctant to contact the FBI due to fears of bad publicity damaging the reputation of a business or government agency if reports of the attack become public, but the FBI is barred to publicly disclosing the victim or details of the attack, he said. "Our goal is the identify and prosecute the bad guy. We need to find out who did what to whom. The biggest issue in getting victims to report incidents is fear of public disclosure. We aren't allowed to do that. We can't identify and prosecute the perpetrator unless we know about the incident," Leyman said.


The benefits of microservices for mobile, and how Node.js can help

Novak explained that certain development frameworks may be particularly helpful in allowing teams to bring legacy services over to microservices. Node.js has proven to be a particularly helpful framework for making this switch and creating connections with back-end infrastructure, he said. "In our experience, Node.js is going to be a good platform for them to convert those services over to microservices," Novak said. ... In addition to Node.js, Novak said plenty of other frameworks software development kits are available to help facilitate microservices development, such as Ionic, Angular JS, Bootstrap and Backbone.js. However, he warned that, while these frameworks and tools will certainly help organizations, there is no "magic bullet" when it comes to bringing legacy investments up to speed with a microservices architecture.


Docker Aims to Improve Linux Kernel Security With LinuxKit

"Security is critically important for Docker, and LinuxKit represents an opportunity for us to help move security forward," Nathan McCauley, director of security at Docker Inc., told eWEEK. Within the LinuxKit effort there are a series of incubated projects that are focused on improving the security of Linux, according to McCauley. Docker and the LinuxKit project are also focused on making sure that all the Linux kernel security work moves upstream into the mainline Linux kernel, he added. "We recognize that there are a ton of people in the Linux community working on security improvements, and we want LinuxKit to be a place where they can foster and grow their efforts," McCauley said. ... The market for container security technology is a growing one, with multiple vendors including Twistlock, Anchore, Aqua Security, NeuVector, Aporeto, Tenable and Capsule8, among others, building products.


Data Structures Are Antithetical to Functional Programming

Functional programmers are incredibly lazy. More precisely, we defer commitment as late as possible. In extreme examples like Haskell, we defer the computation of every part of every expression until the last possible moment. Even in less extreme cases, however, we push effects (such as input/output) to the edges of our program. With Monad Transformers Library (MTL) or FTL, we defer committing to specific effect types until our application’s main function. ... Ultimately, I’d argue that today’s programming languages are unnaturally obsessed with data. They are wedded to the idea of rigid layouts of bits in memory — for understandably pragmatic or historic reasons. Yet, the functions we develop in our code don’t usually require bits. Instead, they require capabilities. Some to construct, some to deconstruct.


How to stop spear-phishing cold

To be effective, a spear-phish must be well crafted, have an artist’s touch for similitude, and likely camouflage. Spear-phishing emails are getting more sophisticated all the time. One that Inky would have prevented, had it been deployed, was the DocuSign vector attack. DocuSign—which, among other services, vouches for electronic signatures—sends email notifications to parties to a contract, letting them know what steps they need to take next (e.g., review and sign). In this case, a hacker set up a domain that looked like DocuSign but was actually sent from a “typo domain”—docusgn.com (missing the “i”). Previously, the hacker had penetrated servers at DocuSign itself to obtain names and email addresses of actual DocuSign users, who then made perfect targets for a DocuSign spoofing attack.


The Internet Of Things Is Becoming More Difficult To Escape

"People's businesses, homes, cars and even their clothing will be monitoring their every move, and potentially even their thoughts," she says. "Connected cities will track where and when people walk, initially to light their way, but eventually to monitor what they do and say. The walls of businesses will have tiny sensors embedded in them, initially to monitor for toxins and earthquakes, and eventually to monitor for intruders and company secrets being shared. People currently strap monitors on their bodies to tell them how many steps they take. Eventually, all fluids in and out of bodies will be monitored and recorded. Opting out will be out of the ordinary and hugely inconvenient, just as not carrying a mobile device and not using a fast pass on the highway are today."



Quote for the day:


"If you need ownership and responsibility from core workers, patriarchy can't get you there." -- Peter Block


Daily Tech Digest - June 10, 2017

How serverless changes application development

When viewed through the prism of the Rogers Innovation Adoption Curve, serverless is still a young market, most likely at the beginning of its early adopter phase. But it has some big players behind it (that a traditional IT decision maker wouldn’t get fired for betting on), a healthy number of open source alternatives, and the beginnings of a market for startups providing complimentary tooling. One intriguing aspect of serverless is its potential to turn the notion of vendor lock-in on its head. Suppose you really like Amazon Polly for voice-to-text but you prefer IBM Watson for text sentiment analysis. Your front-end application could record spoken words, send the recording to a Polly function on AWS, and send the resulting text to Watson. So instead of being locked into a single vendor or ecosystem, you can embrace finding exactly the right tool for the specific job. 


HR 2.0: how technology is transforming HR

We are social beings and our workplaces are small societies, so it’s no surprise that social media and technology is having an influence on the corporate environment. The growth of social media shows the appeal of human connections, but that need was hardwired into humans long before Facebook. From swapping stories around the campfire 10,000 years ago to sharing pictures on Instagram, our biological need to bond and share may change expression, but it remains vital to who we are. Businesses are subsequently increasingly using habits of instant messaging, cloud-based document sharing and quick feedback to meet these growing expectations. Until the advent of timelines on social media, social sharing was an ephemeral phenomenon. Now, people expect to relive social sharing over time by looking back at a record of messages, pictures, and videos they’ve shared.


One Day, a Machine Will Smell Whether You’re Sick

“We send all the signals to a computer, and it will translate the odor into a signature that connects it to the disease we exposed to it,” Mr. Haick said. With artificial intelligence, he said, the machine becomes better at diagnosing with each exposure. Rather than detecting specific molecules that suggest disease, however, Mr. Haick’s machine sniffs out the overall chemical stew that makes up an odor. It’s analogous to smelling an orange: Your brain doesn’t distinguish among the chemicals that make up that odor. Instead, you smell the totality, and your brain recognizes all of it as an orange. Mr. Haick and his colleagues published a paper in ACS Nano last December showing that his artificially intelligent nanoarray could distinguish among 17 different diseases with up to 86 percent accuracy.


IoT skills set to rise in importance

“IoT training is about coding plus communication. On its own, coding will allow an engineer to give a device some functionality and behave in a certain way. But the IoT is based on the idea that the ‘things’ are able to effectively communicate with one another and exchange data. To make an IoT specialist, they would need to be educated about wireless communications technologies and networking as well as coding,” he says. “ABI Research predicts that 48bn devices will be connected to the internet by 2021, 30% of which will be Bluetooth devices, so knowledge of this most pervasive of low power wireless communications technologies is key In addition, for some people currently working in IT, it means more education is needed about embedded software engineering, as they may find themselves working with smaller, more constrained devices than they ever have before.”


The dangers of hacking back

Attribution is not only a technical problem, but a geopolitical one too, which could be extremely asymmetric in favor of the attackers. ... Moreover, cyber attacks are just one form of digital response that these groups could use in response to a hack back. As we saw last year, cyber attacks can be very successful when part of a larger information campaign that includes disinformation, automated social bots, as well as data theft, dump, and manipulation. When a company hacks back, even if they’ve accurately attributed the source of the attack, they risk triggering retaliation not just from cyber warriors but also trolls, which can inflict widescale brand, reputational, financial, and even physical damage. And that doesn’t even touch upon potential responses outside of the cyber domain, such as targeted economic punishment or escalation of interstate tensions.


PayPal CEO offers sobering view of cybersecurity threats

“History is not on our side,” he added. “because of what’s happening in technology, 40 percent of businesses will go out of business within the next five years.” That’s particularly sobering for credit unions, where the number of institutions nationally has shrunk by 32 percent in the last decade (and shrunk by 35 percent in Michigan during that period), according to statistics offered by Michigan CU League CEO Dave Adams. In order to survive, said Schulman, institutions – particularly financial institutions – must be willing to change their business models and adapt to how consumers do business. “There is going to be more change in financial services in the next five to seven years than occurred in the last 30 or 50 years,” he predicted, noting that basic financial transactions can be done via mobile device for as much as 80 percent cheaper than using existing branch infrastructure.


Executive interview: Brian Kelly, chief security officer, Rackspace

During an attack, he says, there is often an “A team” and “B team” of hackers. “The B team do the reconnaissance. They are noisy and sloppy. They are trying to map the network. Then there is a pause and, within an hour, the A team come in to arm-wrestle with you.” Some organisations tempt hackers in with a honeypot, to catch them trying to break into a network. For Kelly, a reasonable strategy to thwart at attack is to tie up the B team, possibly leaving a few “cookies” for them to steal, and lead them to a place on the corporate network where their activities can easily be monitored and the security team can learn about the attack vectors being tried. But fighting a determined A team hacker is tough and the IT security tools that the security teams rely on will start to fail, warns Kelly. “How adaptive are the tools, given that the attack can change within eight, 10, 12 or 15 minutes?” he says.


How to Apply Machine Learning to Event Processing

On top of stream processing or complex-event processing in general, you often need a human to make the final decision. Think about predictive maintenance where replacing a part might costs thousands of dollars. However, the analytic model of the data scientist just offers you a specific probability if the machine will break. A human can take a deeper look in both, live and historical data, to decide if a part will be replaced or not. A live visualization pushes events in real time to a user interface (e.g. desktop, web browser or mobile device). The operations team can live-monitor systems and see exceptions or errors when or even before they occur (using the analytic models). Thus, they can do proactive actions – e.g. stop a machine or send a mechanic.


How artificial intelligence will transform financial services

With payment fully digitalized, financial services institutions have integrated into the cashless ecosystem, supporting consumers that pay with their digital wallets, smartphones or digital currencies for everyday transactions. In the age of hyper-connectedness, payment transactions are now fully transparent, empowering customers with friction-free payments and checkout procedures. Having embraced digital payment channels, customers view payment processes as a background activity seamlessly done via mobile devices agnostic to technology platforms whether it’s contactless NFC (Apple Pay), wearables, Smart TV or distributed blockchain ledgers. Having built payment platforms that are interoperable, cost efficient, and secure, financial institutions are now razor focused on competing for a seamless customer experience and racing towards greater financial inclusion to attract the larger un-banked and uninsured market share.


CFO or CEO: To whom should IT report?

CIOs must justify IT investments with tangible productivity gains that may not always be substantiated by pure financial means, according to Vinit Kholi of Sibcy Cline Realtors. He points to cloud services and Microsoft Office 365 as examples.  “Companies have to clearly define their need and then follow up to ensure tools that impact the whole organization are implemented in a way that adds value for the users. Budgetary discussions become incidental if the business case is strongly presented,” Kholi said. Companies that opt to only replace technology when it breaks will go the way of Kodak, Blockbuster and Radio Shack. Today’s midmarket IT leaders’ primary functions include protecting company data and empowering employees with technology to get their jobs done.



Quote for the day:


"If you don_t find a leader, perhaps it is because you were meant to lead." -- Glenn Beck


Daily Tech Digest - June 09, 2017

Be wary of vendors touting superior data science

Intelligence is overhyped, potentially because of its sundry definitions across both the public and private sector. "At the end of the day, it's about intelligence. What data science is about is being able to leverage the huge amount of information we have, and to analyze it, enrich it, and make it actionable in a proactive instead of a reactive way," Peloquin said. ... In order to make informed decisions, CSOs should ask vendors questions like, Do you have a Phd data scientist on staff? Who leads your team? Where are they from? What is their background and experience? "They [CSOs] need to be smart enough to ask the vendor to ensure that their products are not just marketing speak. If they [the vendor] based all of their capabilities on the output of automated tools rather than experts in the field that can do targeted attacks, then I would argue that their solution is not as mature as they are claiming it to be," Peloquin said.


How Disruptive Innovation Can Finally Revolutionize Healthcare

While these high-level measurements are important for tracking performance, they distract from the understanding of the true causal mechanism of how industries become more affordable and accessible. Nearly a decade ago, The Innovator’s Prescription showed how disruption could transform healthcare. Yet unlike other industries, healthcare has been largely immune to the forces of disruptive innovation. Whereas new technologies, new competitors, and new business models have made products and services much more affordable and accessible in fields ranging from media, telecom, finance, and retail, the U.S. healthcare sector keeps getting costlier, and is now by far the world’s most expensive system per capita, about 2X higher than the U.K., Canada, and Australia, with chronic conditions such as diabetes and heart disease now accounting for more than 75% of total spending.


Security Implications of Permission Models in Smart-Home Application Frameworks

A software app or physical device is collectively referred to as an app in AllJoyn terminology. An app can expose interfaces that have members. For example, a lock can provide the control interface with the members lock and unlock. Apps can consume interfaces from other apps. For example, an auto-lock app will consume the door lock's control interface. AllJoyn standardizes some interface definitions for a select set of devices, such as lights and HVAC. Apps are security principals and are associated with an identity certificate signed by a certificate authority that all apps must trust. The AllJoyn security manager is a component that speaks the AllJoyn protocol and issues identity certificates to apps. An administrative user, such as a home or building owner, operates the security manager component.


Given the Inevitably of IoT Security Breaches, Are We Getting Ahead of Ourselves?

The threats extend all the way up to representative democratic systems of government, prospects that haven’t gone unnoticed by leading figures in commerce, industry and government. “My guess is we are reaching the high-water mark of computerization and connectivity and in a few years we are going to be deciding what to connect and what to disconnect and become more realistic about what can work,” the Pew researchers quote a speech given by Bruce Schneier at the Organization for Economic Cooperation and Development (OECD) in Cancun, Mexico in June 2016. “We are creating a society by which a totalitarian government can control everything. Right now it’s more power to the powerful. And we are living in a computerized world where attacks are easier to create than defenses against them,” Schneier was quoted.


Calm before the storm? Ransomware, botnet attacks predicted to surge

“After the initial shock of ransomware’s rapid growth and the popularity of its usage, threat actors have begun to settle in for the long-term deployment of this category of destructive malware tools,” the report authors wrote. “All indications point to a new wave of innovation in the distribution and tactics used for ransomware attacks in the future.” For Kurt Hagerman, CISO of security firm Armor, it’s clear “the healthcare industry is pretty behind the curve from a security standpoint.” Hagerman used the banking sector as an example of an industry that saw its weaknesses and moved toward security standards, enforcement and education. The impact over time has been less fraud. While the risk can never be eliminated, the total number of records stolen is going down.


Blockchain integration turns ERP into a collaboration platform

"It's a very hot topic right now," said Zulfikar Ramzan, CTO of RSA Security, a subsidiary of the Dell EMC Infrastructure Solutions Group. "We are definitely getting a lot of inbound inquiries around blockchain and its implication within enterprise environments. I think it's driven largely by the fact that when there's a new technology out there, to some degree people want to be buzzword compliant with the latest and greatest." Ramzan said his customers are asking about blockchain for audit logging and or verifiable logs, which is viewed as a reliable way of tracking what happened in an organization to satisfy regulatory auditors. Other RSA customers are interested in it for user authentication to ensure users are accessing the correct digital records at the right time.


Getting threat intelligence right

While threat intelligence feeds provide valuable information to help identify incidents quickly across an enterprise, they are generally based on known, observed information. Much of today’s threat intelligence is supplied as IOCs – essentially fingerprints of known attacks or attackers, says Kane Lightowler, managing director of Carbon Black in Asia Pacific and Japan. “IOCs may provide great value against previously observed attacks, but offer limited insights on new attacks and attack methodologies.” Sparkes agrees, noting that intelligence feeds require a “patient zero” – the first organisation or person to see the attack and record the IOCs before others can benefit from it. Lightowler says patterns of attack are more effective against both known and unknown threats because they focus on the actual behaviour and techniques of the attacker, rather than fingerprints.


Big data and relinquishing your right to privacy

At the heart of the privacy debate are the “unspoken” rules about what companies can do with our data. Even when we know that our activity and information and even our voices are being recorded and stored, what obligation does a company have to tell us every single example of how it can be used? As consumers, we might not mind if our listening preferences are used to advertise related goods or services, but do we have to agree to every possible use of information—both positive and negative—as an unavoidable part of data gathering? The bigger concern is why any company would think it’s OK to not inform its customers of the rights they’re signing away. After all, checking the box that you’ve read the full agreement has been called “the biggest lie on the internet.” It’s alarming to think that we have already adopted a cultural mindset that privacy is just something we sacrifice to make sure we have a ride to the airport, or to turn our lights on when we’re late getting home.


How to avoid a disastrous recovery

The ultimate goal of DR planning is to move “cold” data, complete copies of the data center frozen at a point in time, to the most cost effective location possible that provides for meaningful SLA recovery if/when necessary. These copies are then constantly updated to ensure any subsequent changes to the production environment are replicated to the DR environment. Before moving forward with DR planning, organizations must look at industry-specific regulations such as HIPAA or the Sarbanes-Oxley Act to determine the right hosting infrastructure for their data. For example, strict data sovereignty and security requirements prevent organizations from saving personal data to the cloud if that data leaves the country of residence at any time. After evaluating these requirements, it may be that the CIO will see that hybrid cloud makes the greatest financial and risk permissive option for that organization.


3 Keys To Keep Your Data Lake From Becoming A Data Swamp

Perez says one of the biggest mistakes organizations make is collecting too much data, simply because they can. Consider your smartphone. If you own one, chances are you've got hundreds or more pictures stored on it. "You end up with a billion pictures on your phone, and yet 99 percent of them are probably garbage that you would get rid of in a heartbeat," he says. "It's gotten so easy to take pictures with your phone, it's essentially free. And you probably think, 'One day I'll go and clean it up,' but of course no one ever does. You're collecting an enormous amount of information, but you have no way to work your way through it to use it effectively." When you inevitably want to show someone a particular photograph, finding it can require scrolling through an enormous volume of junk.



Quote for the day:


"Great things are done when men and mountains meet." -- William Blake


Daily Tech Digest - June 08, 2017

Did someone cancel the fintech revolution?

The Accenture report says that these promises have yet to come to pass; old fashioned banks are still standing, and perhaps standing still, while startups have yet to gain real traction in customer acquisition and seen their VC investment decline by more than a third in the last year.  Nevertheless, Accenture suggests that the revolution is more likely to be stalled than dead. The firm argues that the UK can establish itself as a leading exporter of fintech R&D, helping individual firms monetise their expertise and 'UK plc' build the county's digital reputation. To do this, the report argues that government and regulators must compete with rivals such as Singapore to attract investment and talent. This is particularly important at the moment because of Brexit, which may result in limiting of free movement and see banks shift operations overseas.


Is a chief AI officer needed to drive an artificial intelligence strategy?

This role provides strategic, and in many cases tactical, guidance and support for exploring and transforming the business using realistic AI approaches. This role would also serve as the pragmatic evangelist for the process, people and tools that can help achieve real business results with AI or human intelligence augmentation. It is important for this role to guide the appropriate and reasonable expectations of AI and to push for the proper applications so the business value is demonstrated. The ability to simplify complex topics and to influence others is also essential to the role since there can be a confusing array of approaches, vendor products and internal tensions around strategic directions. This role needs to provide a clear, actionable path forward for the chosen artificial intelligence strategy that allows flexibility but focuses on realistic delivery along the way.


Which Machine Learning Algorithm Should I Use?

The machine learning algorithm cheat sheet helps you to choose from a variety of machine learning algorithms to find the appropriate algorithm for your specific problems. This article walks you through the process of how to use the sheet. Since the cheat sheet is designed for beginner data scientists and analysts, we will make some simplified assumptions when talking about the algorithms. The algorithms recommended here result from compiled feedback and tips from several data scientists and machine learning experts and developers. There are several issues on which we have not reached an agreement and for these issues we try to highlight the commonality and reconcile the difference. Additional algorithms will be added in later as our library grows to encompass a more complete set of available methods.


jhsdb: A New Tool for JDK 9

The jhsdb tool is described on its Oracle JDK 9 Documentation Early Access page, "You use the jhsdb tool to attach to a Java process or to launch a postmortem debugger to analyze the content of a core-dump from a crashed Java Virtual Machine (JVM)." The tool comes with several "modes" and several of these modes correspond in name and function with individual command-line tools available in previous JDK distributions. The jhsdb tool not only provides a single tool that encompasses functionality of multiple other tools, but it also provides a single, consistent approach to applying these different functions. For example, the jhsdb command-line syntax for getting help for each of the "modes" is identical. The jhsdb tool can be attached and applied to a running JVM via its process identifier (PID) similar to how several other tools (including jcmd) work.


10 critical skills that every DevOps engineer needs for success

People skills are key, but tend to be underappreciated, said Alan Zucker, founding principal of Project Management Essentials. As software engineers, DevOps professionals tend to look to tools rather than people and processes. "Great DevOps engineers start by understanding the people, the culture, and how the organization runs," Zucker said. "They then build a strategy that focuses on simplifying the overall operating environment to achieve the goal of continuous delivery." For a DevOps team to be successful, it needs to include individuals who possess strong communication skills, said Alex Robbio, president and cofounder of Belatrix Software. "Similar to Agile development teams, soft skills are incredibly important—not just for the individual engineer, but also in making the organizational cultural shift to implementing and then standardizing DevOps," Robbio said.


We need to talk about how artificial intelligence can manipulate humans

Unfortunately, the commercial forces driving technology development are not always benevolent. The giant companies at the forefront of AI—across social media, search, and e-commerce—drive the value of their shares by increasing traffic, consumption, and addiction to their technology. They do not have bad intentions, but the nature of capital markets may push us toward AI hell-bent on influencing our behavior toward these goals. If you can get a user to think, “I want pizza delivered,” rather than asking the AI to buy vegetables to cook a cheaper, healthier meal, you will win. If you can get users addicted to spending 30 hours a week with a “perfect” AI companion that doesn’t resist abuse, rather than a real, complicated human, you will win.


The Behavioral Economics of Why Executives Underinvest in Cybersecurity

In the case of cybersecurity, some decision makers use the wrong mental models to help them determine how much investment is necessary and where to invest. For example, they may think about cyber defense as a fortification process — if you build strong firewalls, with well-manned turrets, you’ll be able to see the attacker from a mile away. Or they may assume that complying with a security framework like NIST or FISMA is sufficient security —just check all the boxes and you can keep pesky attackers at bay. They may also fail to consider the counterfactual thinking — We didn’t have a breach this year, so we don’t need to ramp up investment — when in reality they probably either got lucky this year or are unaware that a bad actor is lurking in their system, waiting to strike. The problem with these mental models is that they treat cybersecurity as a finite problem that can be solved, rather than as the ongoing process that it is.


Public-private partnership critical to thwarting cyber threats

It’s a serious problem for healthcare organizations, which have a responsibility to secure their systems, medical devices and patient data from these kinds of cyber attacks with razor-thin operating margins, and, as a result, “cannot afford to retain in-house information security personnel, or designate an information technology staff member with cybersecurity as a collateral duty,” according to the task force. Meadows acknowledges that security is a “harder sell” for C-level healthcare executives “because it’s really an insurance policy and there’s no perceived ROI to having good security posture and hygiene,” particularly in smaller organizations facing resource constraints. However, organizations making the decision to “prioritize cybersecurity within the healthcare industry requires culture shifts and increased communication to and from leadership, as well as changes in the way providers perform their duties in the clinical environment,”


Did Bitcoin Enable an Explosion in Ransomware Attacks?

Now with Bitcoin, money can be collected automatically and without being tied to a bank account. While you can look at the Bitcoin blockchain and see where money goes, it becomes difficult to track it once it is passed through multiple wallets. Many use Bitcoin mixing services that split up Bitcoin and mix it with other money to confuse the tracking process. If you pass it through multiple Bitcoin wallets and mix it in with other Bitcoin, it becomes very difficult to trace.  Bitcoin also makes it easier and faster for criminals to gain access to the money they steal. In the past, they might have to wait for it to transfer between bank accounts or to be physically transferred in cash. Now, they can move it around to multiple Bitcoin wallets quickly and start using it with a new email address. This allows the money to be spent before it can even be located.


Don’t like Mondays? Neither do attackers

Monday may be our least favorite day of the week, but Thursday is when security professionals should watch out for cybercriminals, researchers say. Timing is everything. Attackers pay as close attention to when they send out their booby-trapped emails as they do in crafting how these emails look. Malicious email attachment message volumes spike more than 38 percent on Thursdays over the average weekday volume, Proofpoint said in its Human Factor Report, which analyzed malicious email traffic in 2016. Wednesdays were the second highest days for malicious emails, followed by Mondays, Tuesdays and Fridays. Weekends tend to be low-volume days for email-borne threats, but that doesn’t mean there aren’t any. “Attackers do their best to make sure messages reach users when they are most likely to click: at the start of the business day in time for them to see and click on malicious messages during working hours,” Proofpoint researchers wrote in the report.


Threat Intelligence: A New Frontier in Cybersecurity

The art of bringing a high-value threat intelligence capability to market consists of the application of data science and human intervention to the raw threat feeds. It is this filtering and curation which enables the vast amount of threat data to be ignored or else responded to very quickly. It is then the same filtering and curation function that allows for the most suspicious data to be extracted from the main body of the threat data. The SecOps team's resources can then be concentrated on applying greater forensic effort around that data subset in an effort to understand the modus operandi of the most threatening adversaries -- and stay ahead of them. This is a primary area where threat intelligence providers differentiate themselves. Machine-learning algorithms leveraging standard and advanced statistical models -- and customized to cybersecurity goals -- have to be used to automatically process the many billions of security events that threat intelligence providers see.



Quote for the day:


"Failing organizations are usually over-managed and under-led." -- Warren G. Bennis


Daily Tech Digest - June 07, 2017

Kanban: Real Scaled Agility For Your Enterprise

Generally speaking, the aim of Agile scaling methods is to apply larger Agile wrappers around clusters of Agile teams in order to re-establish some kind of hierarchical structure needed to manage the interdependencies described above. Whether its a Release Train or a Nexus, or whatever else, the idea is that there is an “Agile Team of Teams” managing the interdependencies of multiple, smaller teams. As long as the total number of people doesn’t grow beyond the Dunbar number (~150), the Dunbar-sized group is dedicated and cross-functional, there is a team managing the interdependencies within the Dunbar, there are no dependencies outside of the Dunbar and there is some cadence (1-3 months) of integrated delivery—it’s still “Agile”. All of this scaling out as far as a Dunbar (and only that far) allows the enterprise to still “be Agile”—Scaled Agile.


IoT security regulation coming, warns Bruce Schneier

The real problem, however, said Schneier is that nothing incents a government to do something “stupid” like fear, which is why the information security industry has to get involved. “The choice is not between regulation and no regulation. The choice is between smart regulation and stupid regulation, and if we don’t want regulation to be imposed on us from the outside with little thought and little time, we need to start thinking about this and getting ahead of this because it is coming,” he said. “It will take just one disaster before your government, my government or both will do something, and they will do the thing they can grab the quickest, so we have to ensure that it is something that is also smart.” In the past, Schneier said security has largely been left up to the market, which although “not great” has worked “mostly OK” but these imperfect solutions have been OK because the effects of failure have been fairly limited.


3 steps to better IT career management

Historically, career advice began by counseling wannabe world-beaters that vertical market choice mattered greatly. Baby boomers need only recall Benjamin Braddock’s graduation party, where a friend of the family urged upon him this unsolicited career advice: “One word … plastics.” (Non-boomers may need to be told that we’re talking about Mike Nichols’ 1967 movie, The Graduate.) Plastics may not be the vertical of promise it once was, but there are still advantages in choosing a strong vertical market. The global economy, forecast to grow in the aggregate 3.5%, (World Economic Outlook) does not grow evenly. Some regions and some industries will grow faster than others. Situating oneself in a high-growth vertical market does not guarantee career success but increases the probability of positive opportunities.


7 Ways AI Will Revolutionize Business Travel

Once you pass through airport security, “you’re back on track timewise and decide to get a coffee and something to read,” Thompson continues. “While approaching the book store, you’re notified of special promotions based on your reading history. Then, at checkout you receive a coupon for gardening and classic car magazines, based on a recommendation system that knows these are your hobbies. “Now you’re starting to wonder why your co-worker hasn’t arrived at the gate. She receives a warning that she was in the wrong terminal and gets instructions on the quickest route to the correct gate. Location services have long been used to route planes. Now, they can also be leveraged to better move passengers along and help assure that flights are on time.”


Compliance Risks And The Fast-Growing Company

By implementing continuous accounting, which embeds the period-end tasks within accountants’ day-to-day activities, companies can mitigate their accounting and control risks. Costs are lower, since there is less need to employ additional accountants or other temporary help at closing time, while automated tools free up the accountants to provide value-added insights and services. That’s great news for fast-growing companies confronting the hodgepodge of accounting regulations and reporting standards worldwide. Rather than be the naysayer when operations come calling for capital to grow the business, the CFO is a strategic partner in the market expansion. With visibility into the flow of capital, the CFO can confidently say, “Yes, you can” do this or that as the engine of growth accelerates.


Not investing in cybersecurity has 'inverse ROI'

Clearly, there's an argument about the inverse ROI of not doing cybersecurity. It became very, very clear [that] the attack and the attack patterns were at older machines and institutions that had not patched something that was available for several months. So you can review your entire cybersecurity policy, and it may go to that level. But really this was about keeping your software licensed and current and patching things. For companies that do it right, they didn't have disruption; they didn't have to consider paying a ransom. For companies that don't do it right, they just learn what it costs to not do it right. The real lesson to be learned is that there is very much the potential for the big one. And the question is, how do organizations prepare and understand that with regard to ROI, and then how do we deal with it as a society?


Cybersecurity labor crunch to hit 3.5 million unfilled jobs by 2021

The National Association of Software and Services Companies (NASSCOM) recently estimated that India alone will need 1 million cybersecurity professionals by 2020 to meet the demands of its rapidly growing economy. Demand for security professionals in India will increase in all sectors due to the unprecedented rise in the number of cyber attacks, according to NASSCOM. Despite having the largest information technology talent pool in the world, India is highly unlikely to produce an adequate number of professionals to close the cybersecurity skills gap. "Every IT position is also a cybersecurity position now" according to the Cybersecurity Jobs Report, 2017. "Every IT worker, every technology worker, needs to be involved with protecting and defending apps, data, devices, infrastructure, and people."


Tracking Hacking: The World’s Biggest Data Breaches

Each bubble represents the number of records lost in any given breach, with the most sensitive data clustered toward the right side. Before 2009, the majority of data breaches were the fault of human errors like misplaced hard drives and stolen laptops, or the efforts of “inside men” looking to make a profit by selling data to the highest bidder. Since then, the volume of malicious hacking has exploded relative to other forms of data loss. Increasingly sophisticated hacking has altered the scale of data loss by orders of magnitude. For example, an “inside job” breach at data broker Court Ventures was once one of the world’s largest single losses of records at 200 million. However, it was eclipsed in size shortly thereafter by malicious hacks at Yahoo in 2013 and 2014 that compromised over 1.5 billion records, and now larger hacks are increasingly becoming the norm.


Key Abstractions for IoT-Oriented Software Engineering

Despite the considerable research on the Internet of Things (IoT), the technologies to make the IoT a systematic reality are far from being assessed. Early research focused mostly on communication and interoperability1. More recently, researchers have tried to facilitate the integration of resources and services toward provisioning software-defined distributed services. This is the case, for example, for the Web of Things (WoT) vision2, which aims to employ standard Web technologies to help develop coordinated IoT services. The WoT-possibly integrated with concepts from agent-based computing3,4-will likely represent a keystone technology in the IoT's future. Along such lines, several approaches (for example, in terms of supporting middleware5,6 and programming7) exist to aid IoT system and application development.


Machine learning systems are a 'land rush' of opportunity for CIOs

"There are so many opportunities that people haven't cashed in on yet," Brynjolfsson said. "And the bottleneck now is actually identifying the problems and opportunities that these technologies can be applied to most effectively." Experimentation -- such as Google turning a gaming algorithm loose on its data center to reduce power consumption -- is key. "The main error that a lot of companies are going to make is to extrapolate from the past and keep doing what they were doing with a little bit better accuracy or a little bit better precision," McAfee said. ... One thing is certain, the authors added: Machines aren't good at everything. Tasks that require creative thinking, interpersonal connections, large-scale problem solving or complex planning are still better performed by humans -- at least for now.



Quote for the day:


"When you find your path, you must not be afraid. You need to have sufficient courage to make mistakes." -- Paulo Coelho


Daily Tech Digest - June 06, 2017

Vulnerabilities Could Unlock Brand-New Subarus

There's irony in Guzman's latest findings. Last year, he had a 2016 Subaru. It lacked the telematics unit, but Subaru had a mobile app that owners could use to track vehicle maintenance. It also used a token that didn't expire, which Guzman says he reported and Subaru fixed. But the same vulnerability appeared again this year. Subaru "must have re-merged the code and reintroduced the vulnerabilities," he says. So how would an attack work? There are preconditions: An attacker would have to know, for example, that the victim has a 2017 Subaru - or later - with Starlink installed. The key to Guzman's attack is capturing the token that gets generated, and there are a variety of ways to do this. One way is by exploiting a cross-site scripting - aka XSS - vulnerability that Guzman also found.


Reverse Mentoring A Unique Approach To Rejuvenating Your IT Culture

CIOs are searching for employees skilled in the latest mobile, cloud, social and analytics tools, who can build, ship and maintain software using agile and devops methodologies. But such skillsets are in short supply at traditional enterprises whose IT workforces are long in legacy systems and short on digital capabilities. Enter digitally-savvy millennials as mentors. This younger generation, now entering the workforce, is a great resource for educating more tenured staff members on the use of new technologies, Gartner analysts Lily Mok and Diane Berry wrote in a research note earlier this year. “In return, younger staff can gain from senior staff knowledge and capabilities, such as business acumen, proper business protocol and more mature decision-making skills that come with time and experience,” the analysts wrote.


Artificial Intelligence Is About Machine Reasoning

With machine learning you will never be able to adapt to change, which is what every company is looking for. Because change equals innovation! Thus, we consider machine learning as a mathematic optimization technique, which is fully optional. Talking about a decision-making process, everything works correctly without machine learning. Thus, the machine will find a solution on its own. Machine learning can be used to make the way to the solution shorter or more efficient by applying or selecting better knowledge. That's what machine learning is used for. In our case, machine learning classifies the atomic knowledge pieces in the situation of a certain problem and prioritizes and chooses the better suited pieces to provide the best solution. Thus, machine learning helps to select the best knowledge to a specific state of a problem.


IBM Research creates a groundbreaking 5-nanometer chip

It’s a remarkable technical achievement, though a commercial version of the chip may not be possible for a while. Still, it should enable chips with 30 billion transistors, the on-off switches of electronic devices, on a fingernail-sized chip. Researchers say this kind of achievement should enable the $330 billion chip industry to stay on the path of Moore’s Law, or the prediction made in 1965 by Intel chairman emeritus Gordon Moore that the number of transistors on a chip would double every couple of years. IBM is presenting details of its research on its “silicon nanosheet transistors” at the 2017 Symposia on VLSI Technology and Circuits conference in Kyoto, Japan. The development comes less than two years after IBM researchers made a 7-nanometer test node chip with 20 billion transistors.


Healthcare CIO advocates a faster move to the cloud

CIOs have a somewhat adversarial relationship with vendors even though we need them. A lot of CIOs lose sight of that and develop a real animosity toward vendors, which I get because we're bombarded by hundreds of vendors by email and phone calls. But it simplifies the CIO's job to have a small set of partners to manage rather than a wide variety of vendors. A partnership with a select few helps you drive your organization forward, because they become thought leaders, people you can turn to whenever you have big projects. Some CIOs ask: 'How do you know you're getting the best price?' You can test it as you go along and keep the vendors from getting too comfortable with their position. But most vendors understand the importance of the partnership. And with my partners, I can call the CEO and get some action. That's comforting to know.


Lack of Experience May Plague IoT Security Startups

“What’s going on right now is enterprises are extending the existing security infrastructure or security components they have already invested in to address early IoT issues,” said IDC analyst Robert Westervelt who co-authored a new forecast that said the worldwide market for IoT security product will grow from $11.2 billion in 2017 to $21.2 billion by 2021. “Some of the issues, depending on the industry and use case, are surely embedded system security. And so that’s why we think those two segments — device and sensor, and network and edge — are going to have the most growth over the next five years.” IoT security risks vary by industry. Healthcare organizations, for example, are using IoT patient monitoring tools that rely on sensors, which collect patient health data, and then transfer this data to the cloud so a physician can analyze it.


The 7 hottest jobs in IT

“With the intense focus on predictive analytics, deep learning, machine learning, and artificial intelligence, these positions should remain relevant for years to come,” says Flavio Villanustre, vice president of infrastructure and security for LexisNexis Risk Solutions. ... “To the best of our knowledge, it’s not clear how we can build machine learning models where only limited amount of data is available,” says Mehdi Samadi, CTO of Solvvy. “This is currently limiting the types of intelligent applications that we expect to see in the near future. The solution to this problem is either to find approaches that help us to generate data, or building more robust machine learning models which can learn from limited data. Transfer learning algorithms, learning from the data available in other domains in order to perform well in a new domain,” is a promising area for engineers, says Samadi.


Jindal Power And Steel Is Becoming Steel Smart With IoT

What Jindal Steel and Power has done at its Angul plant is enable an Industrial Internet of Things (IIoT) setup by creating a network of machines, advanced analytics, supply chain and people. The World Economic Forum, in its 2015 report, called IIoT— the latest wave of technological change that will bring unprecedented opportunities, along with new risks, to business and society.  “The IoT framework helps the steel plant work smart,” says Anand. The framework helps the plant workers at the Jindal Steel and Power Plant in Angul to monitor the health and status of the machines. It also provides the interoperability of mobile devices with control systems to ease real time remote management. “The IoT allows the real time process monitoring and control on local network and creates an interface to the mobile devices and analytics layer,” says Anand.


It's About Time: Where Attackers Have the Upper Hand

Researchers found a broad range of incident response time among businesses. In half of the successful data breaches, it took five to six weeks or less for defenders to detect malicious activity. In the other half, detection took as long as four years. "Half of [breaches] are dealt with in the first 38 days, which is actually pretty good," says Barbara Kay, senior director of product and solutions marketing at McAfee. "It could be better, but it's not too bad." However, she continues, the four-year window in this data indicates there's a lot of activity in infrastructure that goes undetected for a long time. This is a sign of threat actors hidden deep within the business, which will take "deep hunting" to root out. The longest timeframe will typically be with the most sophisticated type of attacker, Kay adds. Someone who is deep within the network for a long time either wants something or has a vendetta against the company.


How Computer Security Pros Hack The Hackers

The secret to hacking is there is no secret. Hacking is like any other trade, like a plumber or electrician, once you learn a few tools and techniques, the rest is just practice and perseverance. Most hackers find missing software patches, misconfigurations, vulnerabilities, or social engineer the victim. If it works once, it works a thousand times. It’s so easy and works so regularly that most professional penetration testers quit after a few years because they no longer find it challenging. In my 30 years of professional penetration testing, I’ve hacked into every single company I’ve been hired to legally break into in three hours or less. That includes every bank, government agency, hospital and type of business. I barely got out of high school, and I flunked out of an easy college with a 0.62 grade average. Let’s just say I’m no Rhodes scholar.



Quote for the day:


"Never make someone a priority when all you are to them is an option." -- Maya Angelou


Daily Tech Digest - June 05, 2017

Artificial intelligence will outperform humans in all tasks in just 45 years

A recent report suggests that those who are paid less than $20 an hour will be unemployed and see their jobs filled by robots over the next few years. But for workers who earn more than $20 an hour there is only a 31 percent chance and those paid double have just a 4 percent risk. To reach these numbers the CEA's 2016 economic report referred to a 2013 study about the 'automation of jobs performed by Oxford researchers that assigned a risk of automation to 702 different occupations'. Those jobs were then matched to a wage that determines the worker's risk of having their jobs taken over by a robot. 'The median probability of automation was then calculated for three ranges of hourly wage: less than 20 dollars; 20 to 40 dollars; and more than 40 dollars,' reads the report. The risk of having your job taken over by a robot, Council of Economic Advisers Chairman Jason Furman told reporters that it 'varies enormously based on what your salary is.'


Deep Learning 101: Demystifying Tensors

Tensorflow and systems like it are all about taking programs that describe a machine learning architecture (such as a deep neural network) and adjusting the parameters of that architecture to minimize some sort of error value. They do this by not only creating a data structure representing our program, but they also produce a data structure that represents the gradient of the error value with respect to all of the parameters of our model. Having such a gradient function makes the optimization go much more easily. But here is the kicker. You can write programs using TensorFlow or Caffe or any of the other systems that work basically the same way. But the programs that you write don’t have to optimize machine learning functions. You can write programs that optimize all kinds of programs if the ones you write use the tensor notation provided by the package that you have chosen.


Get ready for the ‘first robotic empathy crisis

Perhaps the most important thing humans can do to keep AI in check, according to Brin, is to apply accountability measures and regulation. “The only way that you have been able to make it so that our previous AIs — corporations, governments, and such — don’t become cheaters the way the kings and lords and priests were in the past is by breaking up power and setting it against each other in regulated competition, and that is the method by which we have division of powers, that’s the way we have healthy markets,” Brin said. Regulated competition and accountability have been vital to the protection and advancement of what Brin called the “five great arenas” over powerful interests: democracy, science, sports, law and courts, and markets. Beyond his work as a consultant to federal agencies and his writing, Brin is a Scholar-in-Residence at the Arthur C. Clarke Center for Imagination at the University of California, San Diego (UCSD).


Serverless computing takes another step forward

Like most other serverless environments Functions uses webhooks as triggers. You're able to define the type of webhook used, and Functions' code editor will help you extract payloads that can then be delivered to the Twilio APIs. It's a relatively simple environment at present, offering node.js functionality for your code. That makes sense, as node.js works best when treated as a switch in a message-driven environment. Messages for Functions come in on webhooks and once processed, the output is delivered through Twilio's messaging APIs. Malatack sees the serverless model as a style of programming, where you need to think as little as possible about anything other than your code. "It's a progression for developers as things are abstracted. That's important as abstractions are better, they make it easier to focus on the outcome." It should result in developers getting more leverage, as there's no need to think about complex issues like scaling.


Five Ways To Cultivate a Data-driven Culture for Your Business

In today’s dynamic marketplace, the ability for businesses to use data to identify challenges, spot opportunities, and adapt to change with agility is critical to its survival and long-term success. Therefore, it has become an absolute necessity for businesses to establish an objective, data-driven culture that empowers employees with the capabilities and skills they need to analyse data and use the insights extracted from it to facilitate a faster, more accurate decision-making process. Contrary to what many people think, cultivating a data-driven culture is not just a one-time transformation. Instead, it’s more like a journey that requires efforts from employees and direction from both managers and executives. In this article, I am sharing five different ways businesses can accelerate their transformation into a data-driven enterprise.


How to find the real value in operational big data

You must first understand how to conceptually rationalize all your sites. What is the strategic importance of all the sites in your business operations, and how will you measure performance in aggregate? How do business operations contribute to the overall health of the company, and how will you communicate that through key performance indicators? This exercise should result in a scorecard that aligns with your technical efforts. Metadata analysis is your next step. The strategic team and the technical team must work together to map data from the scorecard all the way down to the sites. Generalization, filtration, and transformation are three key activities this team must perform. Generalization involves mapping up similar data points in to one common concept; filtration is the purposeful exclusion and inclusion of data; and transformation is the rule set that moves included data to common concepts.


The digital revolution: The future is … disruptive banking

A full-serviced digital bank is now a more attractive option, especially because by definition these types of banks are more flexible and instantly responsive, focused on removing the bottlenecks in the existing experience, delivering increased convenience and a more humanised experience with the customer’s interest at its core. These start-up digital banks are likely to not only add competition into the marketplace but to disrupt the entire sector, forcing change with their greater focus on customer experience and satisfaction. Digital banks are more agile than established institutions and create a better user experience and more value for the customer. This value is not fiscal, but delivered through a more personalised experience for each customer.


Is technology destroying the quality of human interaction?

Looking at the world around us today, many things which were not here 10 years ago are fully ingrained in our daily lives. A day without Google, FaceTime or WhatsApp would be quite an experience for me. I use WhatsApp to stay in touch with my family and thanks to FaceTime my kids can see their dad every day even if I am on the other side of the planet. Although I have never met any of the makers of the software, I trust these brands because their products work seamlessly. So instead of trusting the people behind the brand, I have built trust in the brand because their product continuously satisfies my expectations. Obviously, banking is richer than a simple messaging service. Our spectrum ranges from a basic transaction to a complex corporate financing deal. The latter cannot be acknowledged by just ‘two blue ticks’ as is the case for a WhatsApp message.


Continuous Delivery with Kubernetes the Hard Way

Why is continuous delivery so important? Deploying releases to an application continuously eliminates a “release day” mindset. The theory here is that the more frequently releases are done, the less risky releases are. Developers can also make changes to the application (whether implementing new code or rolling back to an older version) as code is ready. This means that the business can make changes more quickly, and therefore be more competitive. Since microservices use APIs to speak to one another, a certain level of backwards compatibility needs to be guaranteed between releases to avoid having to synchronize releases between teams. According to Conway’s law, software takes on the structure of the organization it belongs to. Thus, microservices and containers are just as much about organizational changes as they are about technological changes.


Benchmarks Don't Have to Die

Benchmarks are not just useful for improvements. They can be used as the basis for regression testing, ensuring that performance stays consistent as code is changed. Given that performance isn’t a binary state like broken/working, it’s not always obvious when a regression has occurred. Methodically tracking performance regressions is extremely important for mature projects. Perhaps most important of all, publishing a well-crafted benchmark can codify an entire community’s understanding of interesting workloads and user behaviour. Since the best optimisations figure out the common case and tune for that, benchmarks can guide all developers (especially new ones) towards improving the code that matters most. However, as the Google Chromium team pointed out, there are several drawbacks to benchmarks.




Quote for the day:


"What I've really learned over time is that optimism is a very, very important part of leadership." -- Bob Iger


Daily Tech Digest - June 01, 2017

What is Digital Transformation?

To make this Digital Transformation definition clear and actionable, we also need to define “digital capabilities,” which we’ll define as: Digital capabilities are: electronic, scientific, data-driven, quantified, instrumented, measured, mathematic, calculated and/or automated. While it’s very useful to have a definition, how about we highlight the value of digital transformation by illustrating the difference between a traditional organization and one that has been digitally transformed? So let’s consider a hypothetical case study comparing two companies in the Grocery industry – a traditional Grocer and a “Digitally Transformed” Grocer – to see what the differences might look like.


What Went Wrong In British Airways Data Center in May 2017?

Combining all the different sources shown later in this post, a fairly accurate reconstruction of what went wrong can be provided. The issue BA suffered is very similar to the total failure Delta Airlines experienced in August 2016.  ... Most likely BA is using Rotary diesel UPS systems (aka Dynamic UPS) . Contrary to static UPS which uses batteries, a dynamic UPS uses kinetic to store energy. This is guessing but Dutch Hitec (Former Holec) could be the supplier. In normal operation, power is feed thorugh the green line. For maintenance and redundancy, the auto by-pass can be used. This black circuit feeds IT equipment directly from utility power. What likely happened is a failure in a component of the green line. The flywheel can typically supply only 8 to 10 seconds of backup. It is unknown if the UPS had batteries for temporary power.


Taming the Open Source Beast With an Effective Application Security Testing Program

Forrester specifically recommended the following: “Insert a software composition analysis (SCA) tool as early in the SDLC as possible and continue to scan applications, including older applications with inconsistent or long release cycles, to ferret out newly discovered vulnerabilities.” The best way to do this is to integrate open source discovery directly into the application security testing that you are already doing — making it an essential part of your DevOps strategy. IBM has made this process easy and transparent. With introduction of IBM Application Security Open Source Analyzer, part of IBM Application Security on Cloud, identifying open source components occurs automatically during static application security testing (SAST). These components are matched against a list of known vulnerabilities and results are returned.


SMB Security: Don’t Leave the Smaller Companies Behind

Most organizations prioritize risk, identify gaps, and then proceed to identify the people, process, and technology required to mitigate that risk and fill those gaps. This approach is most certainly a sound and methodical one, but it is one that demands a large amount of resources. For a security organization with 50, 100, or 200 staff members and an annual budget in the 10s of millions of dollars, this approach to risk mitigation is an obvious choice. But what are smaller organizations to do? For example, consider the typical mid-market organization. Their security team might consist of one, two, or perhaps five staff members. Their security budget may be a few million dollars, depending on their size, industry sector, and geographical location. Unfortunately, these organizations often find themselves left behind by the security community and without access to trusted circles that could help them make progress.


Securing Your Enterprise’s Expansion into the Cloud

In addition to scalability and segmentation, your underlying security infrastructure should offer automatic awareness of dynamic changes in the cloud environment to provide seamless protection. It’s not enough to detect bad traffic or block malware using discrete security devices. Security should be integrated into security information and event management (SIEM) and other analytics in private and public clouds, providing the ability to orchestrate changes to security policy/posture automatically in response to incidents and events. Individual elements need to work together as an integrated security system with true visibility and control. With these very complex, diverse environments, it becomes increasingly difficult for a human to make decisions intelligently, taking all the variables into consideration, and quickly enough to keep up with threats. Automating security is the goal.


‘Lone Wolf’ Criminal Hacker Gets Doxed Thanks To Series Of Dumb Mistakes

There's probably a lot of hackers just like him out there, but Symantec decided to expose him because it was a strange case. Igor is good enough to use custom-made malware, but also careless enough to make almost no effort to protect his real identity, DiMaggio argued. To hide his tracks in his more recent attacks, Igor has used covert channels such as randomly generated domains to communicate with his malware. But in 2013, when he uploaded an early version of the same malware to Virus Total, an online repository where anyone can upload files to check whether they are detected by antivirus companies, he used a regular domain, according to Symantec. That was one of his key mistakes. The other one was that throughout his years-long hacking career, Igor has used his real name—or at least a consistent persona or alias—to register domains


IBM’s Watson is really good at creating cancer treatment plans

Watson for Oncology is a cognitive computing system trained by physicians at Memorial Sloan Kettering. It's able to take a patient's medical records, extract pertinent information about their health, and come up with a personalized treatment plan. Watson can also suggest which treatments should not be pursued and provides relevant studies to back up its proposals. All in all, it's meant to help clinicians navigate each patient's case with the help of the latest available research. Watson's healthcare successes aren't new, but these additional findings make it that much more useful for doctors. Further, while Watson is already being used all around the world, it's adding nine new hospitals to its client list, including medical groups in Australia, Mexico, Brazil and throughout southeast Asia. However, financial and functional issues have postponed a planned launch at the University of Texas' MD Anderson Cancer Center.


A New Internal Threat to Your Environment? ‘Checkbox Security’

A checkbox security approach breaks down in this scenario – there are simply too many variables outside the scope of compliance-focused toolsets to ensure the security of your environment. A checkbox security approach that relies on your compliance policies is, simply put, vulnerable. Being compliant does not mean your environment is secure; and conversely, just because your environment is secure does not mean it’s compliant. Governance automation can go a long way in satisfying compliance requirements while also enforcing security policies to protect against internal and external threats. In a virtual or cloud-based (public, private or hybrid) environment with constantly shifting and distributed resources and possibly shared services, automated governance tooling is indispensable for implementing a comprehensive risk strategy at scale, no matter the size of your organization.


CIOs Key To Bridging The IT/OT Devide

"The intersection of IT and OT changes the relative importance of IT management disciplines for the IT organizations concerned. CIOs and other IT leaders need to evaluate and realign their roles and relationships to maximize the value of converging IT and OT," Gartner's Kristian Streenstrup, research vice president and Gartner fellow, said at the time. "CIOs have a great opportunity to lead their enterprises in exploiting information flows from digital technologies. By playing this role, they can better enable decisions that optimize business processes and performance." That still holds true six years later, Jouret believes, though the struggle to realize that opportunity remains.  Jouret’s perspective is unique. He spent the early part of his career as Cisco's IT director for Europe, Middle East and Africa (EMEA), with a turn as CTO of Emerging Technologies at Cisco and CTO for Nokia before landing his current role as CDO at ABB Group about nine months ago.


Cyber security employee shortage barrier to effective threat detection

“Tools and training cannot be a one-time investment, and conversely, require constant attention to keep cybersecurity threat detection tools up to date, patched, and working in an integrated fashion—on top of constantly retooling and training to keep pace with the increasing frequency, sophistication, and diversity of global threats. Your security operations strategy must be underpinned by teams that are equipped with the latest tools, threat intelligence, security content, training, time, and budget to stay ahead of new security threats.” he added. A security operations centre (SOC) consists of a highly skilled team, that continuously monitors and improves an organisation’s security posture whilst preventing, detecting, analysing and responding to cyber security incidents. 81% of respondents agree that the most valuable SOC capabilities are rapid identification and remediation of attacks, while 74% feel that 24×7 threat intelligence monitoring and analysis was an extremely important capability.



Quote for the day:


"Leaders must always question the status quo, be aware of the ever-changing environment and be willing to act decisively." -- Mike Finley