Daily Tech Digest - December 19, 2017

Big changes coming for the application delivery controller market

Big changes ahead for the application delivery controller market
Application delivery controllers (ADCs) have long been a critical piece of infrastructure. They sit between applications and infrastructure and are the only piece of technology that can speak the language of both applications and networks. I have often characterized the ADC as the “Rosetta Stone” of the data center, as it’s the key to being able to translate application speak to the network and vice versa. IT is undergoing a rapid modernization process, and things such as software-defined everything, the cloud, containers and other initiatives are having a profound impact on infrastructure.  To understand how these trends are impacting ADCs, I recently conducted an Application Delivery Controller Survey to get a pulse of IT professionals who work with ADCs. The demographics of the survey were 100 U.S.-based respondents across a variety of industry verticals and company sizes and is an accurate representation of the current opinions of ADCs with respect to IT modernization.



Why incident response is the best cybersecurity ROI

Why incident response is the best cybersecurity ROI
“In the event of a breach, companies that aren’t prepared for an attack and don’t have a well-defined incident response plan and/or budget may end up far outspending those who do,” says Payton. “First, it takes time to assess the issue, plan, find capable people, etc. The more time it takes to respond to an incident, the more room hackers will have to commandeer what they’d like. Second, if companies haven’t clearly defined how they will respond and who will take charge, staff will likely be taken away from their core duties, which in turn costs the company money,” she says. Payton agrees with Microsoft’s assertion that most organizations will suffer a hack. “Candidly, companies can't afford NOT to have an incident response plan in place. The reality we live in is that breaches are more of a 'when' scenario than an 'if,'" she says.


Russia-Based Kaspersky Lab Sues Trump Administration For Banning Its Software

"Kaspersky anti-virus products and solutions provide broad access to files and elevated privileges on the computers on which the software is installed, which can be exploited by malicious cyber actors to compromise those information systems," said the Department of Homeland Security's September statement. "The Department is concerned about the ties between certain Kaspersky officials and Russian intelligence and other government agencies." The DHS's directive gave government agencies 30 days to identify any presence of Kaspersky products, 60 days to develop plans to remove them, and 90 days to execute the plans. President Trump signed the ban into law last week as part of a broad defense policy bill. "There are concerns on record and some that suggest there has been direct collaboration with certain officials from Kaspersky and from the FSB, which is of course the successor to the KGB," Sen. Jean Shaheen, D-N.H., told NPR.


Build Out or Partner in Cybersecurity? The Debate Continues

Partnering
It’s a first pass litmus test that can be used to determine the risks and challenges associated with various business options. MSPs and solution providers should pledge themselves to that process before building out advanced cybersecurity practices. While tech companies can theoretically offer every available tool and provide a comprehensive portfolio of assessments and consulting services, that usually doesn’t make sense. Most channel firms have financial and resource utilization limitations. In other words, they can’t be all things to all people ̶ even in the cybersecurity space. Data and network protection is no longer a matter of installing and updating the right tools. An effective cybersecurity strategy now includes policy and procedure development, comprehensive and periodic network assessments, and advanced testing. Compliance with government regulations and industry standards adds to the complexity, with third-party evaluation requirements and other stipulations.


Next-gen automotive cybersecurity with software-defined perimeter and blockchain


In order to deliver cybersecurity technologies to address these specific questions for connected and autonomous vehicles, a number of factors must be considered, such as scaling globally to a massive number of vehicles, detecting software tampering and malware, support an array of telematics, information and safety applications, enabling precision access control to vehicle software suppliers, and meeting regional safety, privacy and driving regulations.Fortunately, there are two new emerging technologies, software-defined perimeter (SDP) and blockchain, that offer a path forward. SDP enables the provisioning of secure communications between the software process within the vehicle and cloud-hosted applications, while blockchain enables secure messaging. By combining the any-to-any connectivity of the SDP with the scale of the blockchain, an efficient cybersecurity model for connected and autonomous vehicles can be created.


U.S. Accuses North Korea of Mounting WannaCry Cyberattack

The conclusion was not by itself a surprise: The New York Times reported in May that North Korea was the leading suspect in the attack, which encrypted hard drives on hundreds of thousands of computers and demanded the payment of ransom to unlock the data. Later, British officials reported that their forensic evidence and intelligence pointed to Pyongyang, and Mr. Bossert wrote that in recent days, Microsoft and other companies that track major threats have closed pathways that the North’s army of hackers could use for similar breaches. Still, the assertion by the administration, which officials said would be supported at a White House news conference on Tuesday, was notable for three reasons. It came almost three years to the week since President Barack Obama, appearing in the White House press room, accused North Korea’s leadership of mounting a similarly sophisticated cyberattack on Sony Pictures Entertainment.


Disruption as a service: Where the tech industry will pounce in 2018

iot-cloud-to-edge.png
In a plot twist that only a data center hardware vendor could have written, compute, networking and storage gear is going to need more horsepower. Suddenly servers sitting near the edge of Internet of things devices are going to be pretty cool. Why? The cloud is critical to the Internet of things, but it's costly to shuttle data back and forth when analytics is needed on the fly. Dell Technologies, Hewlett-Packard Enterprise and other vendors are aligning to this IoT to the edge theme. ... "Data will be at the core at what we do. Most of the U.S. is in our database," said Hofmann. Indeed, Home Depot is modeling more than 1 trillion data points a week. Some of this data is transactional and a lot of it is tailored to location. As a result, Home Depot can understand communities, neighborhoods and businesses at scale. Home Depot can also see macro themes develop.


Let no endpoint go dark

self-healing endpoint visibility
If your workforce is using desktops, laptops, smartphones and tablets by Dell, Lenovo, HP, Asus, Microsoft, Samsung and dozens of other hardware manufacturers, Persistence is already built in at the factory, waiting to be activated via Absolute’s cloud-based platform. (The company offers Apple add-on support that isn’t embedded at the factory.) After Absolute Persistence is activated, it can’t be deactivated by anyone except the customer. Persistence lives up to its name, checking on endpoint controls and making sure they are present and healthy. If it detects that the control has been removed – whether accidentally or on purpose – it will automatically repair and reinstall it. In fact, there is no way for rogue employees, thieves or other attackers to prevent this “self-healing” process, as it can’t be thwarted by things like a replaced hard drive, flashed firmware, device re-imaging, or a smartphone/tablet clean wipe to factory settings.


Loapi malware capable of destroying Android phones

Loapi malware capable of destroying Android phones
One Loapi module is for spamming advertisements, opening various URLs, including pages in popular social networks such as Facebook or Instagram, as well as for displaying videos ads and banners. ... Another module is focused on manipulating text messages, using SMS messages to communicate with the attackers’ Command and Control (C&C) server. It also deletes text messages from the inbox and sent folder to keep the user in the dark about the information received from the C&C server. Yet another module is related to a web crawler, using hidden JavaScript to subscribe users to various services. If the subscription requires a text message confirmation, Loapi takes care of that, too. The researchers noted, “This module, together with the advertisement module, tried to open about 28,000 unique URLs on one device during our 24-hour experiment.”


Could blockchains rattle ECM?

Blockchains are distributed, crowd-validated ledgers which use internet-connected computers and open source software all over the world to verify transactions. One of their major benefits in financial transactions is their immunity to tampering, thanks to the built-in consensus mechanism. In theory, this could also make blockchain a secure, verifiable and permanent solution for exchanges of any kind – for managing records, for instance. Sweden’s land registry authority is currently exploring blockchains’ potential as a mechanism for recording property deals. In this context, the blockchain would confirm and save each step in the contract process between buyers and sellers, while making each deal’s information transparent to all parties such as banks and local governments. But how far could this go, and what does it mean for ECM as we know it? To assess the potential and any limitations we must consider what sets blockchains’ approach apart.



Quote for the day:


"Keep your fears to yourself, but share your courage with others." -- Robert Louis Stevenson


Daily Tech Digest - December 18, 2017

Best health and fitness gifts of 2017

gadgets primary pcw 2
Chances are your friends and family are going to stuff themselves silly with unfathomable calories between now and 2018. ... Not all of the gear below is geared toward weight loss and exercise, but everything isdesigned for general health and wellness, and I have direct experience with every single product. ... The home system comes with a foam pad that anchors the straps to a door frame, but I bought the optional steel anchor point that bolts into ceiling lumber. It’s an extremely versatile (and challenging) workout tool. So what makes this high-tech? It’s the TRX mobile app, which includes a wide variety of targeted workout routines, complete with video demos that illustrate exactly how to do each exercise. The mobile app can also elegantly balance the audio volume from your phone’s music player with workout instructions from the app. The TRX app hooks into various heart rate monitor too, but Fitbit and Garmin devices aren’t supported.



“Hybrid Cloud Serves As An Ideal Foundation To Build A Digital Enterprise”

Definitely. From cost containment to hybrid strategies, CIOs are getting more creative in taking advantage of the latest offerings and the cloud’s economies of scale. This is being fueled by the need for enterprises to scale their resources to serve their customers better. The adoption of hybrid cloud has multiple benefits and serves as an ideal foundation to build a digital enterprise. It provides interoperability and helps a company’s systems become far more compatible with other systems.  One of the key benefits of a hybrid cloud is provisioning at a lower cost and high speed (as and when required functionality of the public cloud component). A properly configured hybrid cloud solution changes the conversation between IT and the business as it shortens timeframes and expands possibilities. Hybrid cloud helps companies get a combination of the private and the public model and enables them to innovate and iterate faster at a lower cost.


Mastering the three top tenets of digital transformation


Suddenly the definition of Content has been broadened as a “center of everything,” to be identified, accessed, re-purposed and distributed. The practice of managing content will effectively help organizations take operational control of their data and intellectual property in order to deliver a business’s growth potential. Strategy in a digital world needs to be intentional and grounded in good design that strives to adhere to business requirements and provides an organized solution for those it impacts. But what exactly is this transformation, what does it impact upon, and, as importantly, how is it done? The new strategy for success is built around customers, your data and your content. At face value this may sound daunting, but ensuring harmony and an uninterrupted cycle of ongoing transformation is what every business needs to excel in this new age of digital. Success is within reach if your organization can honor and embrace the following tenets


What To Expect in 2018: Our Top Predictions For the New Year

What To Expect in 2018: Our Top Predictions For the New Year
In 2018, expect at least one data analytics vendor to open source its middleware (i.e. services layer) and encourage competitors and others to plug into it. The data analytics middleware will have a robust SQL and programmatic interface (API) that serves as a universal semantic layer for both analytics capabilities on the front-end and data assembly, integration, and preparation functions on the back-end. Customers have long wanted vendor-agnostic middleware for data analytics, and the time is right for one or more courageous vendors to step forward and open up the crown jewels. Data Engineering becomes the new in-demand skill as companies seek top talent to design and build data pipelines and data services. Data engineering will be recognized as a multi-disciplinary skill that spans database architecture, microservices architecture, data modeling, programming, Hadoop technologies, NoSQL databases, and data stream processing.


Finding Growth in the Face of Disruption

Mike Schwartz—a blockchain expert and partner at BCG Digital Ventures—began his talk by asking how many people in the room were from companies that act as intermediaries. He then proceeded to describe how blockchain can “cut out the middleman.” He sketched out ways that blockchain can be leveraged to create industry and sector platforms that offer radical transparency and traceability of, for instance, supply chains and transaction histories. Schwartz also predicted that many of blockchain’s current technical limitations related to speed and cost are on the cusp of resolution—as early as 2018. As a consequence, executives need to carefully assess what blockchain could mean to their businesses and rethink their strategies in that context. Brooks CEO Stephen Schwartz said that a study of who was citing the company’s patents revealed that the company had a key capability for controlling motion in a range of cryogenic application environments and opened management’s eyes to the opportunity in the storage and transfer of biological samples.


What to know before you get started with TensorFlow machine learning

What to know before you get started with TensorFlow machine learning
“Unless you already know about machine learning and how to bring it to production, you probably don’t understand the complexities that you are about to add to your company’s life cycle. On the other hand, if you have done this before, well-done machine learning can definitely be a really surprisingly large differentiator,” Dunning says. Open source projects like TensorFlow can dramatically improve an enterprise’s chances of machine learning success. TensorFlow “has made it possible for people without advanced mathematical training to build complex—and sometimes useful—models.” That’s a big deal, and points to TensorFlow, or other similar projects, as the best on-ramp to machine learning for most organizations. ... A successful dataops team involves complicated lines of communication and a multipronged development process. Couple those complexities with the reality that machine learning systems “can easily have hidden and very subtle dependencies,” and you have a perfect form for things going awry.


Digital trends that will shape 2018

When it comes to consumer VR, the technology remains expensive and gaming dominates the landscape. Consumers today need to buy expensive, dedicated hardware to get a true VR experience. Prices of this equipment are likely to fall in 2018, while smartphone VR headsets will also get cheaper and better. Apps will become more diverse—we’ll see a healthy mix of educational, simulation, virtual tourism and entertainment applications come to market. AR captures the world through a mobile device camera and puts a digital overlay on the video and image the user sees on the display. Applications are numerous—from seeing how furniture you’re browsing on a retailer’s website might look in your lounge to providing labels and information about the parts in your car when you’re trying to find out why it won’t start in the morning.


How The Chief Information Risk Officer Brings A Strategic Opportunity For Business


How the Chief Information Risk Officer brings a strategic opportunity for business


In order to address this constant shift, organizations must realign and reorganize. The focus of the leader has now shifted from protecting data to managing the risks associated with data as well as analyzing and reducing vulnerabilities associated with cyber security risks. With this shift, has emerged a new role: The Chief Information Risk Officer (CIRO). The CIRO role brings a new and strategic opportunity for security leaders. The main job of Chief Information Security Officer (CISO) and chief information officer (CIO) has been to implement security technologies, protect data, and keep assets secure. However, the role of a CIRO goes beyond it. It extends beyond security to managing information risk as well as providing a unified risk perspective to the Board of Directors. It must involve defining a risk appetite and setting up right controls to maintain cyber resilience and manage the threat landscape of the organization.


2017 cognitive technologies survey

cognitive technology survey
With all the talk about cognitive and artificial intelligence (AI) technologies in business circles today, it's natural to wonder whether these capabilities are having any measurable impact. So we asked some of the most aggressive adopters of cognitive technologies how they have fared to date, focusing on 250 "cognitive-aware" leaders within "cognitive-active" companies. Why this group in particular? Not only can early-phase signals from such early adopters provide a view from the front lines of these important developments, but many other executives are simply not yet sufficiently knowledgeable about cognitive technologies. So what did these leaders tell us? When these technologies are effectively integrated into workflows, they can directly influence how organizations accomplish tasks, make decisions, create engaging interactions, and generate stronger business outcomes.


Bitcoin's illiquidity is going to be a huge problem when the bubble bursts

Imagine how bad this is going to get on the day some negative news hits the wires and the really significant holders of bitcoin decide, "I've had enough of this. I've made my money. I am bailing." The majority of bitcoins are held by a tiny percentage of the market. 40% are held by 1,000 people . Those few major holders can crash the market whenever they want.  As anyone who remembers the market crashes of 2000 and 2008 knows, these things happen fast. Billions get wiped off the market in minutes. People who need to cash out now, but who are an hour or so behind the news, can lose their shirts. It is brutal. And blockchain just isn't equipped to deal with it. Part of the increase in transaction time has, no doubt, been caused by the recent arrival of new, less knowledgeable investors who are coming into the market only because they have seen the headlines about the price of bitcoin going up, up, up.



Quote for the day:


"If you care enough for a result, you will most certainly attain it." -- William James


Daily Tech Digest - December 17, 2017

With 2018 upon us, the worlds of both business and personal software are ramping up to make the next few years something of an artificial intelligence arms race. On the consumer side of things, machine learning and AI make our lives easier in small ways. Case in point: many of us now have a smart speaker like an Amazon Echo or Google Home sitting on our countertops. While these kinds of AI applications are helpful and entertaining, their self-learning capabilities are limited, to say the least. In the world of business, there’s more immediate potential for self-learning software. “We are drowning in information,” says Vita Vasylyeva of Artsyl Technologies. “The biggest bottlenecks in any business process involve the handling of documents and manual input of data from those documents. At the heart of those bottlenecks is the transformation of unstructured content into structured data.”


A Review on Business Intelligence and Big Data

Technological advancements of IT have led to storing more data at lower cost and drastically  increased transmitting rates. Parallel computing has increased computing power as well by processing multiple cores simultaneously. It is hard to find any device that doesn’t generate data like sensors, plane engines, online transactions, emails, videos, audios, images, click streams, logs, posts, search queries, health records, social networking interactions, science data, and mobile phones. All of these and their applications have begun to generate huge volume data at high velocity and variety which is impossible to store and process with classical technologies and programming paradigms. This kind of data is called big data. International Data Corporation (IDC) reports that digital universe will continuously expand, be complex and interesting. The volume of data is expected to be 8 ZB by 2020. Data generation speed is also increasing exponentially. 


Deep learning is currently one of the main focuses of machine learning. It has led to many speculative comments about A.I. and its possible impact on the future. Although deep learning garners much attention, people fail to realize that deep learning has inherent restrictions which limit its application and effectiveness in many industries and fields. Deep learning requires human expertise and significant time to design and train. Deep learning algorithms lack interpretability as they are not able to explain their decision-making. In mission critical applications, such as medical diagnosis, airlines, and security, people must feel confident in the reasoning behind the program, and it is difficult to trust systems that does not explain or justify their conclusions. Another limitation is minimal changes can induce big errors. For example, in vision classification, slightly changing an image which was once correctly classified in a way that is imperceptible to the human eye can cause a deep neural network to label the image as something else entirely. 


The day when the computer becomes a data scientist

The data scientist usually starts every project by digging into the data (using charts, scatter plots, histograms and other visual tools), then cleaning it by dropping irrelevant variables (and adding missing data) – AKA preprocessing. The next step is choosing the right classifier / regression method followed by picking the right features in the data in order to get the most accurate prediction. In between, the data scientist tests different combinations of classifiers parameters for obtaining the most optimal and efficient prediction mechanism. All the mentioned steps and methods demand high analytical and comprehension skills from the person who apply them, and right now, it doesn't look like a computer can do all of these steps better than a human being. Nevertheless, the computer plays an important role in many parts of the data scientist's projects. A good example for this - is the Cross Validation in the Model Selection module where an algorithm 'finds' best classifier or the best classifier parameters. 


Why telcos will soon be betting on Artificial Intelligence to build their networks
“As more reliable and affordable bandwidth is enabled, it unleashes a plethora of opportunities that can traverse over telecom networks. So, a convergence at network level becomes possible. This is then value enhanced by adding dynamism and intelligence in to the systems through AI which makes the solution intuitive, proactive as well as reactive to the situations,” said Faisal Kawoosa, Lead Analyst, CyberMedia Research. ... One may not see the telecom the way we look at it presently, meaning a different set of revenue streams as well. “AI is expected to have an impact in a multitude of areas – the most important being traffic classification, anomaly detection and prediction, resource utilization and network optimization, along with network orchestration. Further, it will also assist the mobile devices with virtual assistants and bots,” said Arjun Vishwanathan, Associate Director, Emerging Technologies, IDC


2018: The Year Central Banks Begin Buying Cryptocurrency

In 2018, G7 central banks will witness bitcoin and other cryptocurrencies becoming the biggest international currency by market capitalization. This event, together with the global nature of cryptocurrencies with 24/7 trading access, will make it intuitive to own cryptocurrencies as they become a de-facto investment as part of a central banks investment tranche. Cryptocurrencies will also fulfil a new requirement as digital gold. Furthermore, foreign reserves are used to facilitate international trade. This means holding reserves in a trading partner's currency makes trading simpler. In 2018, cryptocurrencies like bitcoin will be utilized for international trade on a moderate basis because the high returns as an investment will encourage a ‘hold’ strategy for G7 countries. Foreign reserves are also used as monetary policy tool. Central banks may pursue the option to sell and buy foreign exchange currencies to control exchange rates.


Bluetooth 5 – the Biggest Breakthrough in the IoT in 20 Years

bluetooth 5 with IoT
The capabilities of the Bluetooth 5 were nothing short of remarkable. The new devices were twice as fast, had four times the range and over nine times the broadband messaging capacity as their predecessor, the Bluetooth 4. These new devices are leading to new IoT applications that we didn’t envision a year ago. Keyinsight predicted that the new IoT devices would be used in every industry from agriculture to transportation. These predictions will finally come to fruition due to advances in Bluetooth technology. ... When Bluetooth first hit the market, it was one of the first IoT devices available. People could use their Bluetooth to connect to automobile CD players, radios and other devices. It was an unprecedented level of connectivity between previously segregated devices. It was only the first major breakthrough with the IoT, but it wouldn’t be the last. Nearly 20 years later, Bluetooth is still a pioneer in the IoT.


The lesson behind 2017’s biggest enterprise security story


For one, security teams are overwhelmed. The average security team typically examines less than 5 percent of the alerts flowing into them every day (and in many cases, much less than that). Ironically, some attempts to improve this efficacy may backfire. Automation is clearly required to help security teams prioritize their work and defend their environments, but many systems prioritize alerts based on measures of the severity and impact of the threat itself rather than measuring its potential impact within the context of the business. In other words, while a human analyst may understand that a “simple” exploit of an unpatched vulnerability on a server that houses your crown jewels is a higher priority than a sophisticated zero-day attack targeting the machine housing the cafeteria menu, automated tools may mistakenly believe otherwise.


Why do Decision Trees Work?

Decision trees are a type of recursive partitioning algorithm. Decision trees are built up of two types of nodes: decision nodes, and leaves. The decision tree starts with a node called the root. If the root is a leaf then the decision tree is trivial or degenerate and the same classification is made for all data. For decision nodes we examine a single variable and move to another node based on the outcome of a comparison. The recursion is repeated until we reach a leaf node. At a leaf node we return the majority value of training data routed to the leaf node as a classification decision, or return the mean-value of outcomes as a regression estimate. ... For true conditions we move down and left, for falsified conditions we move down and right. The leaves are labeled with the predicted probability of account cancellation. The tree is orderly and all nodes are in estimated probability units because Practical Data Science with R used a technique similar to y-aware scaling


Q&A With Eberhard Wolff On the Book “A Practical Guide to Continuous Delivery”

The obvious and original goal of CD is to improve time to market for new features and thereby to get better business results. But there is more to CD: Constantly testing the software with reproducible results and a high degree of automation improves the quality of the software. Deploying more often and automating deployment decreases the risk of the deployment. This has a positive impact on software development and IT. These benefits might be reason enough to implement CD. How far you can go with CD depends on the buy-in from business as well as software development, operations, and QA. With limited buy-in from business you won’t be able to get better time-to-market. With limited buy-in from Ops you won’t be able to extend the automated pipeline to go directly into production. Still even a limited implementation of CD will be worth it and of course it can always grow. The early adopters were looking for a more agile way to work.



Quote for the day:


“If you’re not a risk taker, you should get the hell out of business.” -- Ray Kroc


Daily Tech Digest - December 16, 2017

Will augmented reality make lying obsolete?

eyedetect
The future of lie detection is A.I. A.I. can take various “signals,” such as eye movements, facial gestures, body movements, voice intonations and others, to estimate the truthfulness of a person’s statements. In fact, lie detection is just one of the many uses for emotion or mood detection generally. When A.I. can tell when a person is happy or sad or mad or stressed, it can generally detect changes during conversation and figure out that some of those changes are caused by lie-induced mental activity or stress. Because lie-detection A.I. is currently being developed by numerous companies, universities and governments, it’s inevitable that the capability will become available broadly and inexpensively to businesses and consumers over the next two years. In fact, lie-detection A.I. is already on the market. ... EyeDetect is already in use for hiring and bank fraud, as well as by police departments as an alternative to the polygraph.


Designing human-shaped artificial intelligence

artificial intelligence
Designing for conversational interfaces involves a whole host of new challenges, including personality design. Artificial intelligence with human-like personality makes for more natural interaction, so the approach to personality design must continually be developed to explore how brands translate into AI personalities. ... In addition to building tools, it is important to supplement this with informed conversations about the needs and opportunities which AI brings to practice. The best products, services, systems and spaces are those that are designed to help real people live easier, smarter, enjoyable and more meaningful lives. It is entirely possible to create a human-shaped world where everything is designed to meet real human needs. Getting there requires all contributing innovators to answer complex problems with simple, focused solutions. When designing human-shaped AI, as with any design process, it is easy to over-complicate.



Making Regulation Machine Readable

fintech
Much progress has been made to automate these processes, but offering international services remains a challenge as each country has its own complex regulatory requirements. To offer scalable solutions across multiple markets, regulatory advice as provided by legal and compliance experts today, must also be digitized. I believe an automated solution, a “digital compliance officer”, is the key to enabling digital services such as Robo Advisors. Therefore, by applying machine-learning techniques, we today cluster regulatory requirements country by country and transform them into digital rule-sets. These rule-sets are always up-to-date and verified, allow for a transparent audit trail on past and current rules, and provide our clients with a sophisticated regulatory risk management framework. To ensure consistency, applications such as eBanking, CRM and Robo Advisors communicate via APIs with our solution.


8 Steps for Building an IT Security Career Path Program

Conduct a Needs Assessment

Before a career path can be chartered for current or prospective employees, you first need to know where you currently stand with your cybersecurity workforce.

'Define the type of work you want done, so you can create a career path and path for learning,' says Andrew Smallwood, cyber human capital specialist with Booz Allen Hamilton.

Jason Hite, founder of Daoine Centric and industry co-chair for the National Initiative on Cybersecurity Education (NICE) and a member of the NICE workforce sub-group, agrees. 

He notes that the ISO/IEC 27001 is one resource organizations can use to develop their security posture. It's an international standard that government agencies and companies use to manage the security of their assets.

Image Source: Shahril KHMD via Shutterstock
Cybersecurity professionals are in steep demand, given the projected shortfall of 1.8 million workers by 2022. ...A majority of companies don't provide such a program for their cybersecurity team, according to IT security career experts. But it's a key tool to keep in-house security talent fulfilled and challenged in their jobs, and to help recruit additional talent. "The number one reason people leave their jobs today is their company doesn't take security seriously. What this means is that they don't have a plan, which includes a career path plan too," says Deidre Diamond, founder and CEO of Cyber Security Networks. Career path programs show existing employees the role they currently hold within the organization and potential positions they may later ascend into through promotions or other moves, depending upon their interests, say cybersecurity career experts. It also gives prospective employees a view of their security career opportunities at an organization.


Putting Industrial Cyber Security at the Top of the CEO Agenda

Study reveals low adoption of cyber security capabilities and technology among industrial companies despite the increasing number of global industrial attacks and changing threat landscape. The study was conducted by LNS Research with strategic decision makers from industrial companies on their approach to the Industrial Internet of Things (IIoT) and use of industrial cyber security technologies and practices. Among the findings were: The study suggests that cyber security must be part of a CEO’s agenda to ensure the fast and effective long-term deployment of strategies and technologies. It also recommends three immediate actions. Honeywell’s industrial cyber security technologies and expertise addresses many of the issues identified in the LNS Research study.


How Taking the Time to Verify Your Network Could Save You Millions


More advanced technologies have given rise to modern artificial intelligence and automation tools. One emerging in the business world is related to network verification. It utilizes a series of statistics and data, performance information and predictive analytics to help business goals match reality, or more specifically to guarantee your network can handle incoming loads. It’s not just about handling a known or predicted performance requirement, however. It’s also about the fluctuation of said patterns. Frequent change happens in the world of technology, your network and the resources it needs to operate. ... Verification is often confused with testing. However, they are not synonymous. When you verify, you follow through a series of checks and balances to ensure things are as they seem and you’re prepared for the future. This is not quite the same as testing, is it? Testing checks the performance and capabilities of a system. You already know the capabilities of your network, you understand what resources it needs, and you know how it’s going to be used.


We need to talk about mathematical backdoors in encryption algorithms


Security researchers regularly set out to find implementation problems in cryptographic algorithms, but not enough effort is going towards the search for mathematical backdoors, two cryptography professors have argued. Governments and intelligence agencies strive to control and bypass or circumvent cryptographic protection of data and communications. Backdooring encryption algorithms is considered as the best way to enforce cryptographic control. In defence of cryptography, researchers have set out to validate technology that underpins the secure exchange of information and e-commerce. Eric Filiol, head of research at ESIEA, the operational cryptology and virology lab, argued that only implementation backdoors (at the protocol/implementation/management level) are generally considered. Not enough effort is being put into looking for mathematical backdoors or by-design backdoors, he maintains.


Denmark considers blockchain a new weapon in the fight for human rights

"The use of blockchain and cryptocurrency is merely some of the technologies which can give us new tools in the development cooperation toolbox," Danish Minister for Development Cooperation Ulla Tørnæs said. "It is clear that if we are to succeed in relation to the sustainable development goals we need digital and technological solutions and some of these we do not know of, but we will help find them." A report published by the ministry, alongside think tank Sustainia and blockchain currency platform Coinify, investigates how blockchain technology might solve problems in providing development aid, noting that by using cryptocurrency, money can be transferred faster and safer, and without a middleman or fees. In addition, contracts and other legal papers can be digitalised to combat corruption and ensure a more effective development aid and better protection of the rights of marginalised groups, the report, Hack the Future of Development Aid, explains.


The AI mindset: designing the workforce of the future

7 artificial intelligence
The AI mindset prioritizes imagination and creativity over tasks and execution. If we are going to reinvent half of the jobs that are out there, what we are looking at in the next decade is a talent revolution. Because AI for business is all about reinforcing decision-making and capabilities, supported by data and models, it is still ultimately about humans at the end of the day– human innovation. Organizing teams around a goal begins by looking at how you hire your individual players. It is much easier to teach skills than to teach a mindset. Nurturing talent to dig deep into our human capabilities to become better facilitators, collaborators, presenters, and persuaders–this is where innovation happens. Those who embody the AI mindset will help accelerate how AI serves businesses.


The next wave? Modular component malware against industrial control safety systems

malware cybersecurity skull crossbone
The modules used with the associated malware are specifically designed to disrupt Triconex safety controllers, which are used widely in critical infrastructure. The malware requires the key switch to be in the “PROGRAM” mode in order to deliver its payload. Among others, the reported malware has the capability to scan and map the industrial control system environment to provide reconnaissance and issue commands directly to Tricon safety controllers. A DHS statement mentioned, “This marks the first report of a safety system breach at an industrial plant by hackers, who have in recent years placed increasing attention on hacking into utilities, factories and other types of critical infrastructure. Such attacks could allow hackers to shut down safety systems in advance of attacking an industrial plant, which could prevent plants from identifying and halting destructive attacks on those facilities.”



Quote for the day:


"A good leader leads the people from above them. A great leader leads the people from within them." -- M.D. Arnold


Daily Tech Digest - December 15, 2017

Digital Disruption: 10 Ways To Survive & Thrive

Digital disruption: 10 ways to survive and thrive
Some CEOs are embarking on vision quests to help navigate digital disruption, which is marked by a shift in profitability from one prevailing business model to another. Puthiyamadam, who leads the PwC's digital services practice and oversees its experience center, recalls one recent conversation with a CEO client who attended a "digital bootcamp" in Europe. The CEO was told he must join Twitter and that his business would be disrupted in two years. Puthiyamadam quickly assured the CEO that the threats weren’t so imminent. Indeed, he regularly cautions clients against acting rashly because the wrong bets, from service ideation to technology choices, can set a business back years. "Don't believe you need to act frantically and in panic mode because your business is going to get completely overwhelmed," Puthiyamadam tells CIO.com.



DevOps in the public sector: Assessing the challenges and the benefits

“The public sector is often saddled with a significant burden of legacy systems which must be maintained and, where possible, modernised,” says Jason Rolles, CEO of software development monitoring software supplier BlueOptima. This means making use of open source development tools, such as Git and Jenkins, but also having the right IT environment to reap the benefits of these DevOps tools. It is inevitable that legacy systems will slow down a DevOps approach which is meant to bring an organisation both flexibility and speed. This shift away from incumbent providers and legacy infrastructure is to do with finance too. But, without the budget needed to move away from legacy technologies, recruiting DevOps personnel gets even harder, and this becomes a vicious cycle that encourages departments to remain the same.


5 tips for better NGINX security that any admin can handle

nginxhero.jpg
NGINX continues to rise in popularity. According to the October, 2017 Netcraft stats, it has nearly caught up with Apache—meaning more and more people are making use of this lightweight, lightning fast web server. That also means more and more NGINX deployments need to be secured. To that end, there are so many possibilities. If you're new to NGINX, you will want to make sure to deploy the server in such a way that your foundation is safe. I will walk through five ways to gain better security over NGINX that won't put your skills or resolve to too much of a test. ... It is possible to limit the rate NGINX will accept incoming requests. For example, say you want to limit the acceptance of incoming requests to the /wp-admin section. To achieve this, we are going to use the limit_req_zone directory and configure a shared memory zone named one and limit it to 30 requests per minute.


Cloud computing: Getting bigger but more complicated too

art-hybrid-cloud-intro-2017.jpg
The location of the company offering a cloud service is something that has come under particular scrutiny recently. For example, the UK government's National Cyber Security Centre (NCSC) warned about the use of some cloud-based antivirus products from Russian companies, but also warned more broadly about the use of cloud services within the government supply chain. "The country of origin matters. It isn't everything, and nor is it a simple matter of flags -- there are Western companies who have non-Western contributors to their supply chain, including from hostile states. But in the national security space there are some obvious risks around foreign ownership," NCSC CEO Ciaran Martin wrote in a letter to civil service chiefs. The NCSC noted that government departments might not even be aware they are using cloud-based services: "It's easy to overlook the nature of these cloud interactions, and the security implications. 


Employers And Employees Need To Step Up On Cybersecurity

Even with the clear need for IT and network security experts, kununu found that job security ranked lowest for employees. Due to management changes or layoffs and the lack of a clear plan in place, internal organization was at an all-time low. This was leading to bad morale and disaffected employees can always be equated with company security vulnerability Within the reviews, employees even shared that their companies were not up to par in terms of the technology and were using antiquated kit, offering hackers a free pass into companies’ most sensitive data. Based in Vienna and leading the European market, kununu launched in the US last year in a joint venture with Monster and has already collected more than half a million reviews on its website. Its reviews are broken down into 18 key dimensions of workplace satisfaction to provide job seekers with workplace insights that matter in order to to make sound work-life decisions


Could blockchains rattle ECM?

Blockchains are distributed, crowd-validated ledgers which use internet-connected computers and open source software all over the world to verify transactions. One of their major benefits in financial transactions is their immunity to tampering, thanks to the built-in consensus mechanism. In theory, this could also make blockchain a secure, verifiable and permanent solution for exchanges of any kind – for managing records, for instance. Sweden’s land registry authority is currently exploring blockchains’ potential as a mechanism for recording property deals. In this context, the blockchain would confirm and save each step in the contract process between buyers and sellers, while making each deal’s information transparent to all parties such as banks and local governments. But how far could this go, and what does it mean for ECM as we know it? To assess the potential and any limitations we must consider what sets blockchains’ approach apart.


Figure 1
Enterprises that wish to deliver disruptive innovation must understand their own strategy and objectives, their current operational environment and challenges, and their external environment. They can begin by identifying opportunity areas and key markets. Once a consensus is reached, they can identify priority market segments. This may lead to redefining market segments and segmentation criteria. At this point, they should analyze the industry structure—segment clients, suppliers, potential new entrants, substitution products—and then identify what makes each player powerful, using strategic tools. For example, “The Five Competitive Forces That Shape Strategy”9 shows that suppliers boasting strong concentration, high switching costs, genuine differentiation, unique intellectual property (IP) and strong value for clients will command higher prices than industry incumbents. 


20 Ways To Rekindle Your Passion For IT

20 ways to rekindle your passion for IT
In March 2017, Zucker left the financial services firm and launched a new career providing training and advisory services in project management, agile development and leadership. "The change has been wonderful," he declares. "I'm working harder than before, but I'm passionate and enthusiastic about what I am doing." Zucker is hardly the only IT leader to watch his early enthusiasm spill into a drain of frustration, boredom and ennui. A 2016 Stress and Pride survey, sponsored by IT talent management and solutions company TEK Systems, found that a sizeable number of senior-level IT professionals are dissatisfied with their jobs. In fact, 24 percent of respondents stated that while they were proud they had chosen IT as a career, they were not proud of their current role, assignments and responsibilities. Worse yet, a discouraging 16 percent agreed that if they had to do it all over again, they wouldn't go into IT.



An Effective Cyber Hygiene Program Can Save A Business


Most small businesses have overarching cybersecurity plans that establish antivirus programs, firewalls, and other defenses to thwart cyberattacks. However, rarely do these plans consider individual behavior, which is why more than half of all cyberattacks aim for American small businesses. In addition to these cybersecurity measures, businesses need to consider cyber hygiene. Cyber hygiene, also called security hygiene, is general behavior that keeps individuals safe from cyberattack. Unlike cybersecurity, which pertains to an organization’s largescale efforts, hygiene consists of an individual’s responsibilities and actions. For example, an IT department might build and monitor firewalls and intrusion detection systems, but if individual employees fail to generate strong passwords, install software updates, or run regular malware scans, then a business remains insecure.


BlueBorne Attack Highlights Flaws in Linux, IoT Security

Researchers at IoT security firm Armis earlier this year discovered Blueborne, a new group of airborne attacks. The vulnerabilities let attackers take full control of any device running Linux, or OS derived from Linux, putting the majority of IoT devices at risk of exposure. The researchers discussed and demonstrated their latest findings at Black Hat Europe 2017, held last week in London. Vulnerabilities in the Bluetooth stack have been overlooked for the past decade, they explained. Bluetooth, often perceived as peripheral, could benefit attackers if they successfully break into a high-privilege device. As the researchers demonstrated, one compromised product can spread its attack over the air to other devices within Bluetooth range. "These attacks don't require any user interaction or any authentication," said Armis head researcher Ben Seri in their presentation.



Quote for the day:


"The most common way people give up their power is by thinking they don't have any." -- Alice Walker