Daily Tech Digest - August 12, 2021

Three key areas to consider when settling technical debt

Software is an iterative product, and much of it has been developed over decades, by teams of workers with significant experience and institutional knowledge. These teams are also responsible for maintaining and managing older technologies and platforms. But as business priorities change over time, systems built on older code can be neglected. Software development teams’ attention turns elsewhere, either by choice or force – which can create disenfranchisement among staff if not managed correctly. When access to and knowledge of older code resides only among a few people, we see potential insider threat risk of particular concern if software is being used to run critical IT infrastructure. To that end, IT leaders must factor in succession planning into any strategic discussions they’re having. All workers eventually leave or retire, and if knowledge isn’t shared, you risk older systems becoming impossible to manage by newer employees. The importance of getting the basics right, such as applying updates and patches or managing configurations, never goes away, even for older systems.


Consistency, Coupling, and Complexity at the Edge

The key to understanding whether you should base your API design principles on REST or GQL is to grasp a concept in computer science known as Separation of Concerns (SoC). Well-designed yet non-trivial software is composed of many layers where each layer is segmented into many modules. If the SoC for each layer and module is clearly articulated and rigorously followed, then the software will be easier to comprehend and less complex. Why is that? If you know where to look for the implementation of any particular feature, then you will understand how to navigate the codebase (most likely spread across multiple repositories) quickly and efficiently. Just as REST and GQL queries provide consistency in API design, a clear SoC means that you have a consistent approach to where the implementation for each feature belongs. Developers are less likely to introduce new bugs in software that they understand well. It is up to the software architect to set the standard for a consistent SoC. Here is a common catalog of the various layers and what should go in each layer.


Certified ethical hacker: CEH certification cost, training, and value

While in the very early days of computing hacker was a value-neutral term for a curious and exploratory computer user, today most people use the word to describe bad guys who try to break into systems where they don't belong for fun or (usually) profit. An ethical hacker is someone who uses those hacking skills—the ability to find bugs in code or weaknesses in cyber defenses—for good, rather than for evil, tipping the potential victims off and using the insights gained to implement improved security measures. In some ways, the term "ethical hacker" arises from a milieu where many "black hat" bad guy hackers do in fact switch sides and become good guys and defenders rather than attackers. But it's also just a sexy term for a discipline that goes by other, more boring names like "penetration testing" or "offensive security research." You might also hear the term "red team" used—in large-scale penetration testing exercises, the red team plays the role of the attackers, while the blue team makes up the defenders. Still, whatever you call it, it's a job that's in demand: more and more companies are recognizing the business case for having in-house hackers probing their defenses for weakness, or using bug bounties to encourage freelance ethical hackers to find problems they may have missed.


5 steps for modernizing enterprise networks

Historically, network and security technologies were deployed independently with the latter typically being an overlay to the network. This was never ideal but worked well enough to stop the majority of breaches. Network engineers would design the network, and security professionals would deploy security tools at each point of ingress. One of the challenges today is that there are hundreds if not thousands of points of entry ranging from SaaS applications to VPN tunnels to guest access on Wi-Fi networks. Even if a business had infinite dollars, it would be impossible to deploy all the necessary security tools to defend each point. Another point of complexity is that the number of security tools continues to grow. In the past, firewalls and IDS/IPS systems were sufficient to protect an enterprise. Modern security includes those but also zero trust network access (ZTNA), secure web gateways (SWG), cloud access security brokers (CASB), endpoint and network detection-and-response, and other tools. One growing way to secure an enterprise is by embedding security into the network as a cloud service.


Next generation physicians reflect on overcoming barriers to digital transformation

Healthcare information systems struggle to replicate the achievements of sectors like banking and retail not only because of the increased regulatory scrutiny, but also because incentives are more complicated. "It’s not an 'I’m trying to sell you something, you’re trying to buy something' one-to-one relationship where you’re free to choose," said Dr. Stephanie Lahr, CIO and CMIO at Monument Health (formerly Regional Health). "We have payers in the middle of that construct, and that totally changes the dynamic of how those patients can come together and makes it difficult for us to look at airlines and banking and things like that [for examples]," said Lahr. "There’s a middle person with their own agenda and goals. … That’s one of the things that makes this difficult, because it’s not a free market." "The answer to every question is always time, money and motivation," said Dr. Yaa Kumah-Crystal, assistant professor of biomedical informatics and pediatric endocrinology at Vanderbilt University Medical Center. 


Digital transformation metrics: 8 counterintuitive lessons learned

Cybersecurity has long been considered by many executives to be a cost to be managed or even a drag on overall performance. Today, however, “the realization that cybersecurity has to be part of every discussion is more pervasive now than ever,” says Bentham. “Regulations, now employed in many countries, are driving the accountability to companies, making them liable for damages to citizens, customers and the like.” Thus, technology leaders must incorporate cybersecurity investments into their digital plans and ROI calculations. “The digital transformation strategist forges an early partnership with the cybersecurity organization and integrates them at all levels of the business and technology,” Bentham explains. “This integration allows the cyber professionals, who write or interpret cyber policies, to do so through a business lens.” As more organizations evolve to a cloud-first model, their security metrics may need to evolve as well. “Because the cloud is more dynamic, new metrics like mean time to adapt (MTTA) or mean time to secure (MTTS) will apply,” says Vishal Jain


Demystifying four aspects of launching an online business

Although social networks are a good tool to create valuable content, generate interaction with your customers, create a community around your brand and even expand your reach, it is essential that you have a website, integrated with your social networks, on the that you can have total control of the messages and images of your business and your products or services. On your own website, you can personalize the customer experience with the colors and design of your brand, make photo or video galleries, as well as create a personalized email that matches your company name, create marketing campaigns by email and even spice up your own online store. With the right service provider as a partner, you can link your website and online store with your social networks and even design the images and update the products that you show in them, directly from your website. Having your own website and online store to sell your products and services can help increase your customers' trust in your brand and make them commit to your business.


TestNG vs. JUnit Testing Framework: Which One Is Better?

JUnit was introduced in 1997 as an open-source Java-based framework for unit testing. It is a part of XUnit, which is a representation of the family of unit testing frameworks. It allows developers to write and run repeatable tests. It is used extensively along with Selenium for writing web automation tests. Its latest programmer-friendly version is JUnit 5, which creates a robust base for developer-based testing on the Java Virtual Machine. TestNG is also a Java-based unit testing framework developed in 2007 on the same lines of JUnit but with new and improved functionalities. These new functionalities include flexible test configuration, support for parameters, data-driven testing, annotations, various integrations, and many more. TestNG performs unit, end-to-end, and integration testing. TestNG generates reports that help developers understand the passed, failed, and skipped status of all the test cases. With the help of TestNG in Selenium, you can run failed tests separately using a testng-failed.xml file to run only failed test cases.


Five steps to strengthen your security posture

DevSecOps is a modern approach to software development which makes security an integral part of the software lifecycle right from the outset. Security teams are integrated into the development and operations teams, meaning that app security is not just an afterthought, but a fundamental part of the architecture. Here you will also empower the security teams to introduce new security capabilities that can enhance user experience. In the traditional approach, IT teams operate within silos that don’t necessarily communicate effectively with each other during a threat. Bottlenecks can occur as the buck is passed from security to development and back again, which has a detrimental effect on the ability to respond to threats in a timely fashion. When everyone’s on the same team, and security is built into the core of an app, your organisation can take a much more agile approach, and be better prepared for potential security breaches. To take full advantage of DevSecOps, your systems should make use of full-stack observability, the ability to monitor the entire IT stack from customer-facing applications down to core network and infrastructure.


Elevating cyber resilience and tackling government information security challenges

We can divide the challenge to two parts. The first challenge is developing a solution that will provide actional insights or an automated operation to reduce the “alert fatigue syndrome” which affects most of today’s security operations centers (SOCs). The second challenge is to recruit, train and maintain cyber professionals, and for that we need to develop and utilize advanced methodologies and technologies. When discussing national level cyber security operations center, we need to remember that national grade challenges require national grade solutions. These solutions have to incorporate several elements: state of the art technology; effective, field proven methodology; constant innovation, since the cyber domain is constantly evolving; collaboration (and I already elaborated about the Israeli Cyber Companies Consortium) and finally capacity buildup, addressing the human factor – training, certification and awareness. 



Quote for the day:

"It is time for a new generation of leadership to cope with new problems and new opportunities for there is a new world to be won." -- John E Kennedy

Daily Tech Digest - August 11, 2021

Solving 3 Pervasive Enterprise Continuous Testing Challenges

A primary goal of continuous testing is to determine if a release candidate is ready for production. As described above, you absolutely need to ensure that the changes in each release don’t break existing functionality. But you also need to test the new functionality to ensure that it works and meets expectations. Making the ultimate go/no-go release decision can be a bit of a guessing game when different teams are responsible for different components and layers of the application: the browser interface, the mobile experience, the various packaged apps at work behind the scenes (SAP, Salesforce, ServiceNow), and all the microservices, APIs and integration platforms that are probably gluing it all together. They’re likely developing new functionality at different cadences and testing their parts in different ways, using different testing practices and different tools. But the user doesn’t make those distinctions. They expect it all to just work, flawlessly. Moët Hennessy-Louis Vuitton (LVMH), the parent company behind luxury brands such as Christian Dior, TAG Heuer and Dom Perignon, recently decided to streamline its testing process to support ambitious plans for e-commerce growth.


Mind Over Matter: Revamping Security Awareness With Psychology

It's clear that traditional approaches to cybersecurity training have failed. From mistakenly disclosing account information to falling for phishing attacks, time and time again, an organization's sensitive data often leaks through legitimate channels with a worker's unknowing help — demonstrating that cybersecurity is increasingly a behavioral challenge. Instead of clinging onto measures that have repeatedly proven to be ineffective at safeguarding organizations, security leaders must redesign cybersecurity awareness with the human mind at the forefront. For that, we must turn to basic principles of psychology so we can better understand human behavior — and how we can positively influence it. While it's nearly impossible to unlearn these biases, we can improve our employees' understanding of cognitive biases to make it easier to identify and mitigate the impact of psychologically powered cyberattacks — and ultimately facilitate changes in individual cybersecurity behavior. 


Chaos Malware Walks Line Between Ransomware and Wiper

Chaos became more ransomware-ish with version 3.0, when it added encryption to the mix. This sample had the ability to encrypt files under 1 MB using AES/RSA encryption, and featured a decryptor-builder, according to the researcher. Then, in early August, the fourth iteration of Chaos appeared on the forum, with an expansion of the AES/RSA encryption feature. Now, files up to 2MB in size can be encrypted. And, operators can append encrypted files with their own proprietary extensions, like other ransomwares, according to the analysis. It also offers the ability to change the desktop wallpaper of their victims. Ransomware has been on the rise so far in 2021, with global attack volume increasing by 151 percent for the first six months of the year as compared with the year-ago half, according to a recent report. Meanwhile, the FBI has warned that there are now 100 different strains circulating around the world. The most-deployed ransomware in the wild is Ryuk, the report found, which could account for why the Chaos authors attempted to ride its coattails.


Cybersecurity is hands-on learning, but everyone must be on the same page

Most times, we see that cybersecurity “budget” is spread throughout so many other budgets throughout a company or organization. It isn’t owned within a cybersecurity group. This leads to separate strategies, goals, and implementations of cybersecurity thus really wasting that budget entirely. The larger problem of having no cybersecurity budget because “we’ve never had an incident” or “we aren’t a big enough target” is one that many will regret when it is too late. Everything and I mean everything is largely reliant on the internet these days. I challenge companies to start thinking about their most valuable assets, those assets that if they were to disappear or be messed up they would likely have no company. I can guarantee that most of those assets sit on a computer system somewhere. May that be a water system, the grid, a chemical formula, a shopping system, cloud infrastructure, data feeds, medical records, personal records, etc. Look at the cybersecurity budget as one would for regular home maintenance. 


Agile or Waterfall, which method should project developers adopt?

The IT and software industry was amongst the firsts to adopt this approach as often the end objectives (what their customer wants) keep changing and the flexibility afforded by the agile methodology is welcomed. With the successes achieved in various projects, eulogies have been overflowing for the agile method. With almost every industry evolving fast, gross uncertainties, and if the product under development is late to the market, the calls to adopt agile grow. It is impossible, on any given day, to not come across some article that attempts to show how agile can be adopted in yet another industry. The traditional approach adopted by most industries has been the waterfall method where the objective of the project is known in advance and the project progresses through identified stage gates. ... There is a plethora of reasons: new products, new processes, change in businesses, and so on. The decision on whether to proceed with a waterfall or agile method is more seen in product development projects where a company plans to enter a market with a product but may need to change track midway if market needs and expectations change.


Improving Testability: Removing Anti-patterns through Joint Conversations

There are many code patterns and anti-patterns that we know are good (and bad) for developers. Usually we look at them in terms of maintainability. But they have an impact on testability as well. Let’s start with an easy one. Let’s say we have a service that’s calling a database. Now, if the database properties are hard-wired into the code, every developer will tell you that’s a bad thing, because you can’t replace the database with an equivalent. In a testing scenario we might want to call a mock or local database, and hard coding a connection will impact our ability to either run the code completely, or call another one. In what we call pluggable architecture it’s easy to do this, but the code needs to be written like that in the first place. That’s a win for both testers and developers. In fact, many clean code practices and patterns improve both code maintainability and testability. Now let’s take a look at another aspect of pluggability. Our service now calls three other services and two databases. But we’re not interested in checking the whole integration.


OpenAI can translate English into code with its new machine learning software Codex

Of course, while Codex sounds extremely exciting, it’s difficult to judge the full scope of its capabilities before real programmers have got to grips with it. I’m no coder myself, but I did see Codex in action and have a few thoughts on the software. OpenAI’s Brockman and Codex lead Wojciech Zaremba demonstrated the program to me online, using Codex to first create a simple website and then a rudimentary game. In the game demo, Brockman found a silhouette of a person on Google Images then told Codex to “add this image of a person from the page” before pasting in the URL. The silhouette appeared on-screen and Brockman then modified its size (“make the person a bit bigger”) before making it controllable (“now make it controllable with the left and right arrow keys”). It all worked very smoothly. The figure started shuffling around the screen, but we soon ran into a problem: it kept disappearing off-screen. To stop this, Brockman gave the computer an additional instruction: “Constantly check if the person is off the page and put it back on the page if so.” This stopped it from moving out of sight, but I was curious how precise these instructions need to be.


Is Automation an Existential Threat to Developers?

“Initially, AI will augment developers, but eventually, it will replace some of them. ML/DL/AI can automate repetitive tasks, catch and correct errors, and vastly reduce the time needed to create a viable project,” says Rob Enderle, principal analyst at technology research firm Enderle Group. “These changes will significantly increase productivity, reducing much of the need for developers on a given project.” Meanwhile, automating tasks has been becoming easier to do than it once was. While automation scripting isn't a lost art, there are more tools available now that don't require it. In the case of software testing, there's even a name for it: “codeless test automation.” ... So, AI isn't an existential threat to developers, at least yet. Bear in mind that today's AI capabilities will not be the same as tomorrow's AI capabilities. The line in the sand between what developers do and what AI does will evolve over time. “DevOps skill requirements are so high that I don't see anything people are worried about. DevOps automation is the best example of that human plus machine augmentation,” says Rajendra Prasad


Six steps to stop manufacturers becoming the next ransomware headline

Many IoT components in use today do not have security resilience built into them, leaving even well-configured environments vulnerable and in need of additional protections. Cyber criminals have recognised both this weakness, and the lucrative opportunity presented by targeting manufacturers. In particular, the industry is highly vulnerable to disruptive attacks such as ransomware. An infection can quickly lead to an entire operation grinding to a halt as systems become inaccessible or are shut down in a bid to halt the spread. Criminals know that every minute of shutdown is painfully expensive for their victims, and manufacturers will be sorely tempted to pay the ransom. Such attacks have serious knock-on effects as entire supply chains are disrupted by resulting shortages. In May, a ransomware attack on US meatpacking company JBS shutdown all of its plants, cutting off the source of almost a quarter of the country’s beef. In another recent case, Palfinger, an Australian company specialising in hydraulic systems and loaders, was hit by a major ransomware attack that took down its IT systems across the world.


Stateful Workloads on Kubernetes with Container Attached Storage

Before the advent of Container Attached Storage, developers working with Kubernetes had to get creative with workarounds in order to handle stateful applications, according to Evans. “Developers have needed to rely on scripts and other home-developed automation that can be used to track the location of data,” Evans told The New Stack. “These solutions aren’t scalable and [are] subject to errors — and ultimately, data loss. Some CAS-type functionality can be achieved using external storage arrays, but the biggest difficulty is mapping the application to the external storage. “The only other alternative is to lock an application to a node, which defeats the purpose of scale-out resiliency.” When building at scale, these workarounds can significantly hinder developer velocity. To meet the needs of developers working with Kubernetes at scale, the CAS field has grown to include tools from PortWorx, Rancher, Robin, Rook, StorageOS and MayaData. OpenEBS, an open source CAS tool introduced by MayaData, has been a Cloud Native Computing Foundation (CNCF) sandbox project for two years.



Quote for the day:

"Little value comes out of the belief that people will respond progressively better by treating them progressively worse." -- Eric Harvey

Daily Tech Digest - August 10, 2021

Sky Computing, the Next Era After Cloud Computing

With multicloud being a priority for sky computing, a key challenge will be the buy-in of today’s market-leading cloud platforms — AWS, Microsoft and Google in particular. I asked Stoica which of the main platforms does he think will make the first move towards sky computing, and what would be their motivation? “Based on economics theory, presumably clouds that are second or third [in the market] — like Google — will be most likely to do it, because this is one way for them to get more market share. If they provide a faster or cheaper infrastructure, the sky would make it easier for them to get more workload from other clouds.” However, he also noted that application developers don’t necessarily need the permission of the big cloud platforms to attain “sky computing” functionality. “You can do it today. I can have an application — like say a machine learning pipeline — and do some data processing, some training, and some serving to serve the models. I can do the training on Google and the serving on Amazon.”


It's a Bird, It's a Plane, It's Blockchain

Amazon isn't the only major vendor to offer BaaS (Blockchain As A Service). For example, IBM leverages the TradeLens ecosystem to advance global trade with blockchain, preventing counterfeiting of pharmaceuticals and encouraging responsible sourcing of minerals. “TradeLens has already processed 42 million container shipments, nearly 2.2 billion events, and some 20 million documents,” said IBM in a statement. “In total, five of the top six global shipping carriers are now integrated onto the platform contributing to the digitization of documentation and automated workflows.” “Oracle is the enterprise blockchain dark horse,” wrote Alan Pelz-Sharpe of U.S.-based research firm Deep Analysis in a research note. “Its stealthy but deeply funded and well-sourced entry into the market follows Oracle’s well-established pattern: the firm has a history of first dismissing new technologies, only to work quietly and then launch into the new market with full force. That being said, with Oracle’s deep roots in the supply chain, financial services, and government sectors, blockchain always made more sense for it to embrace than for some of its competitors.”


The Next Evolution in Blockchain: Decentralized Identity

The first type of digital identifier in blockchain, the primitive one, is the one used for cryptocurrencies, which has a pair of asymmetric encryption keys, identifying the holder of the funds to dispose of those holdings, with the public key visible to all, and the private key, reserved for its holder. Coin transactions on some blockchains are traceable, i.e. the funds can be traced in the ledger register. For other networks, however, it is impossible, or at least difficult, to follow the sequence of the funds traded. These blockchains are referred to as privacy blockchains. Unlike Monero and Zcash, the most well-known privacy currencies that opted for the absence of traceability, Cardano maintains transparency and traceability over block records, as do many others, such as Bitcoin. Applications exist to prevent traceability on traceable blockchains. First proposed in 2013 by Greg Maxwell, CoinJoin is a method that combines multiple single-input single-output transactions into a single multiple-input multiple-output transaction. 


What are low-code databases?

It’s difficult to draw the line between a low-code database and any generic application. Many apps are just thin front ends wrapped around a database, so users may be storing their information in traditional databases without even realizing it. A layer of automation eases the flow, at least for common applications. Some open source toolkits are designed to make this simple. Drupal and Joomla, for instance, are content management systems designed to create databases filled with pages and articles. Drupal’s Webform module adds the ability to create elaborate surveys so users can input their own data. Other content management systems like WordPress can do much of the same thing, but they’re often more focused on building out blogs and other text documents. The major cloud services are adding tools and offering multiple ways to create an app that stores data in the cloud’s data services. Google’s AppSheet offers a quick way to thread together an app that is tightly integrated with the office products in G Suite. It is one replacement for App Maker, an earlier effort that recently shut down.


At Black Hat, mobile and open source emerge as key cybersecurity dangers

By its very nature, the open-source model is not set up for generating fully secure code. When you have millions of contributors from around the world, a freely usable resource of important software tools, and an ever-changing roster of maintainers, security can easily fall through the cracks. The problem is that threat actors know this as well and they are cashing in. The Equifax breach of 2017, which exposed the personal information of 147 million people, was attributed to an exploit of a vulnerability of an unpatched open-source version of Apache Struts. The threat landscape involves tools used by developers and where they store them. It was reported in December that two malicious software packages were published to NPM, a code repository used by JavaScript developers to share code blocks. In addition, an analysis by GitGuardian found 2 million “secret” passwords and identifying credentials stored in public Git repositories over 2020 alone. “Things are not getting better and on top of this, applications are growing in complexity,” said Jennifer Fernick


Security matters when the network is the internet

The move to the cloud has undermined the traditional model of the “nailed-up” private network. These days most organizations live in a hybrid cloud world where many key workloads sit in the public domain. As remote working becomes the norm, applications, people, and devices will continue to communicate externally, and the logic of channeling all that traffic through the corporate datacenter just for security enforcement alone becomes questionable. So, companies need to view security as an all-encompassing architecture and look to maintain consistent policies and protections for all users regardless of where they are working from. Remote working is a model that organizations were slowly moving towards for decades. Sure, the pandemic increased the speed and scope of its implementation dramatically, but it didn’t change the overall direction of travel. It has always been the case that who you are is more important than where you are, so access policies always should have been more about identity than location. 


Why Is Federated Learning Getting So Popular

Federated learning provides a decentralised computation strategy to train a neural model. Modern day mobile devices churn out swathes of personal data, which can be used for training. Instead of uploading data to servers for centralised training, phones process their local data and share model updates with the server. Weights from a large population of mobiles are aggregated by the server and combined to create an improved global model. The distributed approach has been shown to work with unbalanced datasets and data that are not independent or identically distributed across clients. On-device machine learning comes with a privacy challenge. Data recorded by cameras and microphones can put individuals at great risk in the event of a hack. For example, apps might expose a search mechanism for information retrieval or in-app navigation. Federated averaging was implemented by researchers from University of Kyoto in practical mobile edge computing (MEC) frameworks by using an operator of MEC frameworks to manage the resources of heterogeneous clients. 


Android Malware ‘FlyTrap’ Hijacks Facebook Accounts

The threat actors use a variety of come-ons: Free Netflix coupon codes, Google AdWords coupon codes, and voting for the best football/soccer team or player. They’re not only enticing; they’re slick, too, with high-quality graphics – all the better to hide what they’re doing behind the scenes. “Just like any user manipulation, the high-quality graphics and official-looking login screens are common tactics to have users take action that could reveal sensitive information,” zLabs researchers explained. “In this case, while the user is logging into their official account, the FlyTrap Trojan is hijacking the session information for malicious intent.” The bad apps purport to offer Netflix and Google AdWords coupon codes, or to let users vote for their favorite teams and players at UEFA EURO 2020: The quadrennial European soccer championship that wrapped up on July 11 (delayed a year by COVID-19). But first, before the malware apps dish out the promised goodies, targeted users are told to log in with their Facebook accounts to cast their vote or collect the coupon code or credits.


To create AGI, we need a new theory of intelligence

“Brains are always housed in bodies, in exchange for which they help nurture and protect the body in numerous ways,” he writes. Bodies provide brains with several advantages, including situatedness, sense of self, agency, free will, and more advanced concepts such as theory of mind and model-free learning. “A human AGI without a body is bound to be, for all practical purposes, a disembodied ‘zombie’ of sorts, lacking genuine understanding of the world including its human inhabitants, their motivations, habits, customs, behavior, etc. the agent would need to fake all these,” Raghavachary writes. Accordingly, an embodied AGI system would need a body that matches its brain, and both need to be designed for the specific kind of environment it will be working in. “We, made of matter and structures, directly interact with structures, whose phenomena we ‘experience.’ Experience cannot be digitally computed — it needs to be actively acquired via a body,” Raghavachary said. “To me, there is simply no substitute for direct experience.”


IT leadership: How to find more ways to pay it forward

Today, as Zoom meetings and video calls continue to be the primary form of communication, it’s critical to hone those active listening skills. For instance, you might think it’s fine to grab a drink while someone is speaking – but in those few moments that you’re distracted, you’re not actually hearing what’s being said, nor what’s left unsaid. Face-to-face conversations force you to dial in your attention, but it’s easy to lose that focus when meetings are virtual. When I meet with someone virtually, I minimize distractions by first resolving to be present in every conversation. With the amount of digital distraction we have in today’s world, we need to commit to focusing on ourselves and those we are meeting with. I stay in the moment by setting my phone aside, turning off notifications, and closing other windows and programs on my machines. While there are certainly some challenges to coaching others virtually, there are advantages as well. Some introverts, I’ve found, tend to feel more comfortable expressing their opinions during video calls because they’re not physically surrounded by others, and this puts them more at ease.



Quote for the day:

"The signs of outstanding leadership are found among the followers." -- Max DePree

Daily Tech Digest - August 09, 2021

Digital transformation depends on diversity

Diversity of skills, perspectives, experiences and geographies has played a key role in our digital transformation. At Levi Strauss & Co., our growing strategy and AI team doesn’t include solely data and machine learning scientists and engineers. We recently tapped employees from across the organization around the world and deliberately set out to train people with no previous experience in coding or statistics. We took people in retail operations, distribution centers and warehouses, and design and planning and put them through our first-ever machine learning bootcamp, building on their expert retail skills and supercharging them with coding and statistics. We did not limit the required backgrounds; we simply looked for people who were curious problem solvers, analytical by nature and persistent to look for various ways of approaching business issues. The combination of existing expert retail skills and added machine learning knowledge meant employees who graduated from the program now have meaningful new perspectives on top of their business value. 


The hottest hyper-automation trends disrupting business today

The global pandemic has highlighted a need for more flexible customer service, using digital channels, as well as the possibility of organisations delivering service without being tied down to a particular location. Both factors have driven increased adoption of hyper-automation, and have led to more differentiation in customer service joining the biggest trends in the space. According to Luis Huerta, vice-president and intelligent automation practice head, Europe at Firstsource, “as fixed-schedule, routine, processes and tasks are automated in the back-office, the need for staff to be tied to a specific location diminishes. Furthermore, with hyper-automation, the role of human colleagues switches from hands-on task execution to managing and monitoring bots, and dealing with complex business exceptions.  ... As end customers are increasingly able to leverage automated channels to solve their needs, the pressure on support staff reduces and we give front-line colleagues an ability to focus on complex enquiries where a human touch is critical.


How Drife and blockchain are disrupting the ride-sharing industry

Blockchain technology offers a way to make life and work easier, regardless of the industry or class, and the ride-sharing industry is one a lot of disruptors and companies in the blockchain space are looking to become major players in. There have been a lot of bold claims about giving drivers and users more freedom through the use of decentralized technology such as that of the blockchain. One of the companies that made this claim is Drife. Drife is a decentralized ride-sharing and peer-to-peer ride-sharing platform that was started with the intent of empowering the drivers and riders within its ecosystem. The app is built on the Aeternity blockchain and its business model is built on taking zero commission from its drivers. Drife will instead charge drivers an annual fee on its platform to access the app. “We believe when there’s a driver who spends 14 to 16 hours behind the wheel, he deserves to take back all the income to his home,” said Sheikh. ... While Uber, Lyft and others were formed with good intentions, they have become centralized, continuously paying their drivers less and charging their riders more.


AI Wrote Better Phishing Emails Than Humans in a Recent Test

Researchers have long debated whether it would be worth the effort for scammers to train machine learning algorithms that could then generate compelling phishing messages. Mass phishing messages are simple and formulaic, after all, and are already highly effective. Highly targeted and tailored “spearphishing” messages are more labor intensive to compose, though. That's where NLP may come in surprisingly handy. At the Black Hat and Defcon security conferences in Las Vegas this week, a team from Singapore's Government Technology Agency presented a recent experiment in which they sent targeted phishing emails they crafted themselves and others generated by an AI-as-a-service platform to 200 of their colleagues. Both messages contained links that were not actually malicious but simply reported back clickthrough rates to the researchers. They were surprised to find that more people clicked the links in the AI-generated messages than the human-written ones—by a significant margin. “Researchers have pointed out that AI requires some level of expertise. It takes millions of dollars to train a really good model,” says Eugene Lim 


Data warehousing has problems. A data mesh could be the solution

Simply stated, a data mesh invests ownership of data in the people who create it. They’re responsible for ensuring quality and relevance and for exposing data to others in the organization who might want to use it. A consistent and organization-wide set of definitions and governance standards ensures consistency, and an overarching metadata layer lets others find what they need. “Data mesh is the concept of data-aligned data products,” Dehghani said in a video introduction. “Find the analytical data each part of the organization can share.” Dehghani lists eight attributes of a data mesh. Elements must be discoverable, understandable, addressable, secure, interoperable, trustworthy and natively accessible and they must have value on their own. The concept of decentralized data management is nothing new. Distributed databases rode the coattails of the client/server craze in the 1990s. Part of the appeal of the Hadoop software library of a decade ago was that processing was distributed to where data lived. 


Why AI isn't the only answer to cybersecurity [Q&A]

The battle between an attacker and the defenders is exactly the reason where the human factor comes into play and AI helps those defenders to focus and make decisions that optimize their time and skills. What we're seeing today is basic technology that’s designed for very specific attacks. It's only in 0.1 percent of attacks that very sophisticated technology is being used. There are millions of attacks every day, so you'll see advanced techniques; whereas, nine million other attacks are happening that are just super rudimentary, garden variety ransomware attacks and viruses. The latter are the mass of the attacks, and they're also the mass of the damage. If you're a nuclear reactor, then somebody's going to do massive harm, but if you're an average SMB, then you're a lot more susceptible to those garden variety attacks that we call drive-bys. Those machines aren't cutting edge and those attacks aren’t either. They're just the common things that have been learned over the past few years. However, with the forefront of attacks and premium ATPs, it'll be a battle of wits between the advanced technology versus their technology. 


When Will Quantum Computing Finally Become Real?

It's important to remember that quantum computers aren't just faster computers, but harbingers of an entirely new type of computation. “If realized in the best possible way imaginable, they would fundamentally change the world as we know it,” says Tom Halverson, a staff quantum scientist on the quantum computing team at management and information technology consulting firm Booz Allen Hamilton. “Because of this, many powerful forces are positioning themselves to be ‘the first,’” he states. “When the quantum computing revolution happens, it will happen quickly.” Quantum computing is already real, but it's simply not yet practical, observes Mario Milicevic, an IEEE member and a staff communication systems engineer at MaxLinear, a broadband communications semiconductor products firm. He notes that IT leaders will need to understand whether a quantum computer is the appropriate tool for the type of problem their organization is trying to solve. “For the majority of problems, classical computers will actually outperform quantum computers and do so at a much lower cost,” Milicevic states.


New connections between quantum computing and machine learning in computational chemistry

A quantum computer, integrated with our new neural-network estimator, combines the advantages of the two approaches. A quantum computer, integrated with our new neural-network estimator, combines the advantages of the two approaches. While a quantum circuit of choice is being executed, we exploit the power of quantum computers to interfere states over an exponentially-growing Hilbert space. After the quantum interference process has worked its course, we obtain a finite collection of measurements. Then a classical tool—the neural network—can use this limited amount of data to still efficiently represent partial information of a quantum state, such as its simulated energy. This handing of data from a quantum processor to a classical network leaves us with the big question: How good are neural networks at capturing the quantum correlations of a finite measurement dataset, generated sampling molecular wave functions? To answer this question, we had to think about how neural network could emulate fermionic matter. Neural networks had been used so far for the simulation of spin lattice and continuous-space problems.


The obstacles VR will overcome to go mainstream for business users

The truth is that VR is not far off becoming an essential tool for helping businesses to become smarter and more efficient in the way they train staff. For example, vocational training provider Mimbus uses VR training for a range of skills including carpentry, construction, decorating, electrical engineering, and food processing. Working with HP VR hardware, the immersive nature of VR removes the pressures of getting things wrong in real life and increases confidence when it comes to performing skills on the job. This solution can help businesses significantly cut training costs. VR can also help businesses to communicate with clients and design new products and services. In fact, in a sales and marketing capacity, studies have shown that customers have a 25% higher level of focus when in a virtual space, showing that VR is a great way to capture customers’ attention. Alongside biosensors and AI, VR could be used in the future to test how drivers feel about a new car interior before it has been built, or improve the outcome of virtual meetings and collaboration by capturing the nonverbal cues of participants. 


Disentangling AI, Machine Learning, and Deep Learning

Expert systems were proving to be brittle and costly, setting the stage for disappointment, but at the same time learning-based AI was rising to prominence, and many researchers began to flock to this area. Their focus on machine learning included neural networks, as well as a wide variety of other algorithms and models like support vector machines, clustering algorithms, and regression models. The turning over of the 1980s into the 1990s is regarded by some as the second AI winter, and indeed hundreds of AI companies and divisions shut down during this time. Many of these companies were engaged in building what was at the time high-performance computing (HPC), and their closing down was indicative of the important role Moore’s law would play in AI progress. Deep Blue, the chess champion system developed by IBM in the later 1990s, wasn’t powered by a better expert system, but rather a compute-enabled alpha-beta search. Why pay a premium for a specialized Lisp machine when you can get the same performance from a consumer desktop?



Quote for the day:

"Leaders must be good listeners. It_s rule number one, and it_s the most powerful thing they can do to build trusted relationships." -- Lee Ellis

Daily Tech Digest - August 08, 2021

The Role of Artificial Consciousness in AI Systems

What this means is that AI programs having common sense may not be enough to deal with un-encountered situations because it’s difficult to know the limits of common sense knowledge. It may be that artificial consciousness is the only way to ascribe meaning to the machine. Of course, artificial consciousness will be different to the human variant. Philosophers like Descartes, Daniel Dennett, and the physicist Roger Penrose and many others have given different theories of consciousness about how the brain produces thinking from neural activity. Neuroscience tools like fMRI scanners might lead to a better understanding of how this happens and enable a move to the next level of humanizing AI. But that would involve confronting what the Australian philosopher, David Chalmers, calls the hard problem of consciousness – how can subjectivity emerge from matter? Put another way, how can subjective experiences emerge from neuron activity in the brain? Furthermore, our understanding of human consciousness can only be understood through our own inner experience – the first-person perspective. 


Creating a Quality Strategy

Some teams might prefer to do ad-hoc exploratory testing with minimal documentation. Other teams might have elaborate test case management systems that document all the tests for the product. And there are many other options in between. Whatever you choose should be right for your team and right for your product. ... On some teams, the developers write the unit tests, and the testers write the API and UI tests. On other teams, the developers write the unit and API tests, and the testers create the UI tests. Even better is to have both the developers and the testers share the responsibility for creating and maintaining the API and UI tests. In this way, the developers can contribute their code management expertise, while the testers contribute their expertise in knowing what should be tested. ... Some larger companies may have dedicated security and performance engineers who take care of this testing. Small startups might have only one development team that needs to be in charge of everything.


It's time to improve Linux's security

Believe it or not, many vendors, especially in the Internet of Things (IoT), choose not to fix anything. Sure, they could do it. Several years ago, Linus Torvalds, Linux's creator, pointed out that "in theory, open-source [IoT devices] can be patched. In practice, vendors get in the way." Cook remarked, with malware here, botnets there, and state attackers everywhere, vendors certainly should protect their devices, but, all too often, they don't. "Unfortunately, this is the very common stance of vendors who see their devices as just a physical product instead of a hybrid product/service that must be regularly updated." Linux distributors, however, aren't as neglectful. They tend to "'cherry-pick only the 'important' fixes. But what constitutes 'important' or even relevant? Just determining whether to implement a fix takes developer time." It hasn't helped any that Linus Torvalds has sometimes made light of security issues. For example, in 2017, Torvalds dismissed some security developers' [as] "f-cking morons." He didn't mean to put all security developers in the same basket, but his colorful language set the tone for too many Linux developers.


Creating a Secure REST API in Node.js

As an open-source, Node.js is sponsored by Joyent, a cloud computing and Node.js best development provider. The firm financed several other technologies, like the Ruby on Rails framework, and implemented hosting duties to Twitter and LinkedIn. LinkedIn also became one of the first companies to use Node.js to create a new project for its mobile application backend. The technology was next selected by many technology administrators, like Uber, eBay, and Netflix. Though, it wasn’t until later that wide appropriation of server-side JavaScript with Node.js server began. The investment in this technology crested in 2017, and it is still trending on the top. Node.js IDEs, the most popular code editor, has assistance and plugins for JavaScript and Node.js, so it simply means how you customize IDE according to the coding requirements. But, many Node.js developers praise specific tools from VS Code, Brackets, and WebStorm. Exercising middleware over simple Node.js best development is a general method that makes developers’ lives more comfortable. 


In a world first, South Africa grants patent to an artificial intelligence system

At first glance, a recently granted South African patent relating to a “food container based on fractal geometry” seems fairly mundane. The innovation in question involves interlocking food containers that are easy for robots to grasp and stack. On closer inspection, the patent is anything but mundane. That’s because the inventor is not a human being – it is an artificial intelligence (AI) system called DABUS. ... The granting of the DABUS patent in South Africa has received widespread backlash from intellectual property experts. The critics argued that it was the incorrect decision in law, as AI lacks the necessary legal standing to qualify as an inventor. Many have argued that the grant was simply an oversight on the part of the commission, which has been known in the past to be less than reliable. Many also saw this as an indictment of South Africa’s patent procedures, which currently only consist of a formal examination step. This requires a check box sort of evaluation: ensuring that all the relevant forms have been submitted and are duly completed.


Ford's new BlueCruise hands-off driving feature is a solid first effort

It keeps the vehicle in the center of the lane, but with a little too much urgency. It's not a safety issue, but to a driver unfamiliar with what's going on, the steering movements are a little too frequent and a little too jerky. I can tell that the computer is working really hard to keep the car centered at all times — I compared it a 16-year old driver who was still learning the ropes and wasn't quite confident in their abilities, making frequent, jerky input adjustments as they drive along rather than smoother, more practiced inputs that an experienced driver would make. It isn't necessary to always be centered exactly in the lane, after all — an experienced driver knows that drifting a few inches to the left or right is normal. I said to the Ford engineers that most people probably wouldn't notice the tiny steering inputs, but they might lose confidence in the system because of it, even if they couldn't quite put their finger on why. Future releases will improve on it, I'm sure. BlueCruise also isn't (yet) aware of anything going on to the side or behind the vehicle.


Critical Cobalt Strike bug leaves botnet servers vulnerable to takedown

Cobalt Strike is a legitimate security tool used by penetration testers to emulate malicious activity in a network. Over the past few years, malicious hackers—working on behalf of a nation-state or in search of profit—have increasingly embraced the software. For both defender and attacker, Cobalt Strike provides a soup-to-nuts collection of software packages that allow infected computers and attacker servers to interact in highly customizable ways. The main components of the security tool are the Cobalt Strike client—also known as a Beacon—and the Cobalt Strike team server, which sends commands to infected computers and receives the data they exfiltrate. An attacker starts by spinning up a machine running Team Server that has been configured to use specific “malleability” customizations, such as how often the client is to report to the server or specific data to periodically send. Then the attacker installs the client on a targeted machine after exploiting a vulnerability, tricking the user or gaining access by other means.


Test Debt Fundamentals: What, Why & Warning Signs

Test Debt is hard to measure factually, but we can rely on our human capacity to detect, feel and react to warning signs. For test automation, we can sense organizational behaviors and specific test automation attributes. Let’s get back to the Why of our automated tests. One objective of our test automation effort is to accelerate the delivery of software changes with confidence. The test automation value disappears when the team starts to bypass the test automation campaign, search for alternative routes, ask for exceptions. Various reasons are possible as a long execution time, instability, lack of understanding, or other maintainability criteria. The execution time is directly tied to essential indicators of software delivery: lead-time for changes, cycle-time, and MTTA. These metrics are all part of the Accelerate report, correlating the organization’s performance with these measures. We need to constraint our test execution time to limit its impact on these acceleration metrics. For test automation, it means less but more valuable tests executed faster. 


Systems of systems: The next big step for edge AI

SoS will allow autonomous or semi-autonomous systems to control and respond to data flows. In the defense sector, for example, it will connect the data dots gathered from weather analysis, radars, and video surveillance to provide either the quickest path for a missile, or the best way to intercept it. Separately, a train technology provider that delivers transportation as a service need to unify the subsystems in a train and in a train station, expediting failure flagging and repairs to reduce costly service delays. In each case, a system of systems will inform or replace human decision-making, leading to faster, smarter, and more precise insights. ... It’s no stretch to say that edge AI-powered systems of systems will change society as we know it. Like bees working together to build and maintain a hive, algorithms in a SoS will form a swarm. Cars that can communicate with each other will be collectively smarter and safer than any individual car. Inside one vehicle, a SoS will coordinate navigation and telematics while independently gathering live weather and traffic data from roads.


Mainframes: The Missing Link To AI (Artificial Intelligence)?

The power of AI for mainframes does not have to be about creating projects. For example, there are emerging AIOps tools that help automate the systems. Some of the benefits include improved performance and availability, increased support speed for application releases and the DevOps process, and the proactive identification of issues. Such benefits can be essential since it is increasingly more difficult to attract qualified IT professionals. According to a recent survey from Forrester and BMC, about 81% of the respondents indicated that they rely partially on manual processes when dealing with slowdowns and 75% said they use manual labor for diagnosing multisystem incidents. In other words, there is much room for improvement—and AI can be a major driver for this. “Mainframe decision makers are becoming more aware than ever that the traditional way of handling mainframe operations will soon fall by the wayside,” said John McKenny, who is the Senior Vice President and General Manager of Intelligent Z Optimization and Transformation at BMC. 



Quote for the day:

"Ninety percent of leadership is the ability to communicate something people want." -- Dianne Feinstein

Daily Tech Digest - August 07, 2021

Facilitation Skills Just Might Be The Best Kept Leadership Secret

Not surprisingly, the International Association of Facilitators (IAF) insists that facilitative leadership is a particularly successful leadership approach. Host of IAF's Facilitation Impact Awards, Jeffer London explains that facilitative leaders use an inclusive style to tap individual potential. “They co-create and collaborate in order to get things done,” explains London. “The projects of facilitative leaders are done in an iterative manner that allows all individuals to contribute, evaluate and improve aspects of shared initiatives.” Furthermore, IAF insists that today’s workplace complexity requires leaders to lean into a more facilitative style. “In a world that can be seen as increasingly fragmented and chaotic, leaders who can build participation, alignment and meaning are finding more success,” insists Vinay Kumar, Chair of the International Association of Facilitators (IAF). “Leaders who understand how to invite people into a participatory environment, and use the group energy to innovate fit well into today's context. With the world calling for more inclusion and equity, tomorrow's leaders need to be facilitators.”


SEC charges crypto exchange execs for the first time over unregistered token sales

The SEC’s Friday order found that two executives from the Blockchain Credit Partners company used the Ethereum blockchain to sell cryptocurrencies to investors while misleading them about the company’s profitability. Specifically, investors purchased cryptocurrencies using digital assets like ether. The company then promised to pay investors over 6 percent in interest and that the funds would go toward physical investments like car loans to create additional income. The SEC determined that these “real-world” investments wouldn’t generate the income advertised. “Full and honest disclosure remains the cornerstone of our securities laws – no matter what technologies are used to offer and sell those securities,” Gurbir S. Grewal, SEC Enforcement Division director, said in a statement Friday. “This allows investors to make informed decisions and prevents issuers from misleading the public about business operations.” Friday’s charges against the company come as the federal government is preparing to issue new regulations for the decentralized finance and cryptocurrency markets.


Developers, DevOps, and cybersecurity: The top tech talent employers are looking for now

The report reads: "At the skills level, summary analysis across all job postings for all tech job roles suggests employers tend to seek well-rounded candidates. This also reflects the ever-expanding nature of innovation, whereby new platforms, new coding languages, new hardware and devices, new data streams and new combinations of technology building blocks (think IoT) are a de facto part of the job for any technology professional." This also explains why cybersecurity is often not specifically listed in skills reports, despite the fact employers increasingly expect baseline IT security knowledge from workers. Take the UK, for example: according to the 2021 City and Guilds Skills Index published in June, jobs postings for "cybersecurity technician" in the country increased by a massive 19,222% between April 2020 and April 2021, whereas roles for "cybersecurity engineer" grew by 292%. This compares to 312% growth in ads for "full-stack developer" during the same period, and a 184% increase in job postings for "Azure architect".


Is Trust or Innovation More Important for a Brand in 2021?

So, how do we avoid slip ups as we move into this more active period of positioning ourselves in this new normal? Problems happen when a brand positions (and therefore sells) itself as innovative or as socially conscious and doesn’t deliver. Consistency is what’s important in branding, and if you’re already innovative (this applies to most tech companies, hence those glass-half-full tech execs), stick with it. Just show your customers they can trust you to remain true to your brand values. A great way to make sure you are staying true to your brand is to come up with a list of brand values, plus a value proposition. This, combined with a description of who your target customer is, will keep you on the straight and narrow no matter what happens. A value proposition is just a couple of sentences about what your company offers, and why and how it’s uniquely qualified to offer that. You should be able to whip one up easily enough. In coming up with your values, value proposition and your target customer description, you should be able to work out where your brand should be positioned. 


The Future of Blockchain Will Be Interoperability

The biggest challenge for interoperability between blockchains is the programming language. The transaction schema as well as the consensus models differ for interconnection, and in some, a lot. The use of open protocols is presented as a possible solution to blockchain interoperability problems, as it allows universal interaction. ... The first breakthrough in this area, for Cardano, is with the Nervos blockchain, which is an open source, permissionless, PoW consensus protocol focused on creating a public, universal, interoperable network. IOHK (the developer of Cardano) and Nervos are working to build an interoperability bridge between the two networks, which will allow users to transact cross-asset transactions. But Cardano is also innovating interoperability from the programming language with IELE. In 2018 IOHK made agreements with Runtime Verification (the developer company), for its upgrade, as it actually started as a design language, and is working to reach steady state, as with KEVM. Since late 2020, Cardano developers have had a bridge to the Solidity/Ethereum community through the K Ethereum Virtual Machine (KEVM).


Spotlight on CockroachDB

CockroachDB is implemented as a distributed key-value store over a monolithic sorted map, to make it easy for large tables and indexes to function. While CockroachDB is a distributed SQL database, developers treat it as a relational database because it uses the same SQL syntax. But on an architecture level, CockroachDB’s architecture is different from a relational database architecture. In CockroachDB, every table is ordered lexicographically by key. So, when we store the data on the database, we are leveraging the key value store. Since CockroachDB has a distributed architecture, we just need to spin a node up of cockroach Database, point it at a cluster, and the database participates in that cluster. CockroachDB then coordinates with the nodes to gain consensus for all queries and transactions. When we spin up a node and point at the cluster, data is balanced out based on what you optimally want to do with that data.


How To Enhance IoT Security: Learning The Right Approach To A Connected Future

A risk-based approach is a mindset that allows you to improve the certainty of achieving outcomes by employing strategies or methods that consider threats and opportunities. This approach can be applied during operations while designing the process or product or at product improvement stages. Also, a Risk-based approach allows you to capture opportunities, prevent losses and improves entire operations throughout the organization. Therefore, it would be nothing wrong to say that considering a risk-based approach should be made a core element of quality management systems, performance excellence processes, including ISO 9001:2015. The approach could help you understand the risk matrix of your devices so that you can apply appropriate security controls in an IoT system. Updating firmware and software is an essential process if you plan to improve IoT security, as software updates offer plenty of benefits. For example, these might help in repairing security loopholes that might occur due to computer bugs.


Facebook Introduces New Platform For Building Robots

Droidlet lets researchers use different computer vision or NLP algorithms with their robots. In addition, they can use Droidlet to accomplish complex tasks in both real world or within a simulated environment like Minecraft or Habitat. Droidlet is capable of building embodied agents that can recognise, react, and navigate their surroundings. It simplifies the integration of various cutting-edge machine learning algorithms in these systems, allowing users to prototype new ideas faster than ever before. According to the research paper, “Droidlet: modular, heterogenous, multi-modal agents”, The objective of the platform is to build intelligent agents that can learn continuously from their encounters with the real world. The researchers hope that the platform for Droidlets may help to further their understanding of various areas of research including self-supervised learning, multi-modal learning, interactive learning, human-robot interaction, and lifelong learning.


Blockchain And IOT: The Next Frontier Of Device Connectivity

There are a few very promising angles that deserve significant exploration. The one that I’m most excited about is fusing blockchain and IoT. There are only two major players in this space at the moment: IOTA and IoTeX. An IoTeX blockchain-powered camera recently won the Consumer Electronics Show award for privacy and security. This is a significant step for smart devices and blockchain connectivity, and the highly competitive price point proves scalability and widespread adoption is no longer a problem that blockchains faced before. Even this camera, which represents a real step forward for both blockchain and smart devices, is only just scratching the surface. There are currently 770 million surveillance cameras in the world. As important as they are to many people, surveillance cameras aren’t the most abundant devices in our world. There are more than 5 billion cell phones, 1.4 billion refrigerators and nearly 2 billion televisions in circulation. The 40 billion device mark suddenly seems fairly doable.


What is cyber risk quantification, and why is it important?

Most will have some idea of what cyber risk quantification entails, but it's always good to be on the same page. Mark Tattersall, vice president of product management at LogicGate, in his blog The Business Case for Risk Quantification, does an excellent job of defining cyber risk quantification. To begin, he looks at project prioritization. "For many years projects have been prioritized based on qualitative assessments of likelihood and numerically weighted scales, whereas risk quantification supports more rigorous decision-making by quantifying the potential financial loss to your business due to a risk scenario," wrote Tattersall. "Risk quantification is a tactical tool used to help understand and evaluate key risk scenarios in order to make more informed decisions and determine the financial impact on your organization." Put simply, the idea behind quantification is to prioritize risks according to their potential for financial loss, thus allowing responsible people in a company to create budgets based on mitigation strategies that afford the best protection and return on investment.



Quote for the day:

"The task of the leader is to get his people from where they are to where they have not been." - Henry A. Kissinger