March 10, 2021
Kannan Subbiah
FCA | CISA | CGEIT | CCISO | GRC Consulting | Independent Director | Enterprise & Solution Architecture | BU Soft Tech | itTrident | Former Sr. VP & CTO of MF Utilities
7 challenges women face in getting ahead in IT
It’s a razor thin line that’s nearly impossible to walk. Not being assertive won’t get you promoted. Being assertive makes you unlikeable. Either one makes promotion difficult. Not being liked holds women back, according to Lean In, an organization dedicated to overcoming these obstacles, because women who aren’t liked are seen as less competent. ... “My advice to women is to make sure you speak up,” says Easwar. “Don’t let your ability to express your opinions be impacted by prejudice. You have to break that mold because not speaking up can be more detrimental and can be a disservice to other women trying to follow a similar growth path.” Women can’t change this without help, though, and altering the way your company manages meetings can go a long way to preventing this. “We switch who runs meetings every week,” says Breanne Acio, co-founder and CEO of Sēkr, a female-run tech startup. ... Women are often left out of group events or conspicuously ignored because they are not a member of the “in group,” which, in IT, is often white men. Whether this is conscious or unconscious, it is a bias that makes it difficult to get promoted.
How to mitigate security risks as cloud services adoption spikes
As organizations continue to move to the cloud, it’s vital to build a trusted foundation for computing. Security is only as strong as the layer below it, which is why it’s important to have trusted security technologies rooted in hardware for cloud. For example, technologies such as disk and network traffic encryption protect data in storage and during transmission, but data can be vulnerable to interception and tampering while in use in memory. “Confidential computing” is a rapidly emerging usage category that protects cloud data while it’s in use in a Trusted Execution Environment (TEE). TEEs enable application isolation in private memory regions called enclaves to protect code and data while in use on a CPU. For instance, healthcare organizations can securely protect data with TEEs — including electronic health records — and create trusted computing environments that preserve patient privacy across the cloud. Full memory encryption is another technology used to protect hardware platforms (in the cloud) to ensure that memory accessed in CPUs is encrypted, including customer credentials, encryption keys, and other IP or personal information on the external memory bus.
What is the future of the Proptech space?
With Proptech companies needing to increasingly digitise their operations to meet evolving customer demands, they will also need to continue paying attention to regulations, which may be equally liable to change. Roger Tyrzyk, director of global gaming and sales for UK/I at IDnow, believes that such rules would need to be reconsidered for true innovation to occur, and that this could be increasingly prioritised by regulators in the future. “Consumers have changed; they expect processes to be much quicker, more efficient and certainly not an inconvenience,” said Tyrzyk. “In response, the property sector – both conveyancing and rental markets – must adapt and the only way to do this is to leverage the innovative technologies that already exist. “However, to empower sectoral change, property regulators and the Government must revisit the archaic laws that currently exist in the UK and align them with the 21st Century. For example, under current laws, every letter a solicitor sends out must be wax sealed. To deliver a truly digitised process and harness the power of Proptech, this must be addressed and overhauled.
How to protect backups from ransomware
If your backup system is writing backups to disk, do your best to make sure they are not accessible via a standard file-system directory. For example, the worst possible place to put your backup data is E:\backups. Ransomware products specifically target directories with names like that and will encrypt your backups. This means that you need to figure out a way to store those backups on disk in such a way that the operating system doesn’t see those backups as files. For example, one of the most common backup configurations is a backup server writing its backup data to a target deduplication array that is mounted to the backup server via server message block (SMB) or network file system (NFS). If a ransomware product infects that server, it will be able to encrypt those backups on that target deduplication system because those backups are accessible via a directory. You need to investigate ways to allow your backup product to write to your target deduplication array without using SMB or NFS. All popular backup products have such options.
How the UK Has Set its Sights on Becoming a Fintech Haven in the Wake of Brexit
With global competition for fintech talent within the sector, cities like London face fresh competition from European destinations like Berlin, Barcelona and Amsterdam - which are becoming increasingly popular for fintech professionals with the right to work across the EU. This exodus is exactly what the UK is looking to prevent, and the danger posed by the situation has been underlined by Ricky Knox, CEO at fintech bank, Tandem, who said: “Tech visas are a great thing and essential if we are going to keep a competitive tech and fintech sector,” he added. “Over half of our coders are from outside the UK and some have already left due to Brexit.” Another aspect of the review has called on the UK to revise its approach to the regulation of crypto-assets as a means of welcoming more fintech businesses in the future. Recent restrictive measures by UK regulators involve bans on the sale of crypto derivatives and an anti-money laundering register that have created a somewhat hostile environment for blockchain or decentralised finance fintech businesses to set up camp in London.
The world's most powerful supercomputer is now up and running"
The ultra-high-performance computer Fugaku is about to go into full-scale operation," said RIST president Yasuhide Tajima. "I look forward to seeing this most powerful 'external brain' ever developed by humanity helping to expand our knowledge, enabling us to gain deeper insights into the foundation of matter in both time and space, giving us better structural and functional analysis of life, society, and industry, enabling more accurate predictions; and even designing the unknown future of humanity." Fugaku is designed to carry out high-resolution, long-duration, and large-scale simulations, and boasts up to 100 times the application performance of its predecessor, the K supercomputer, which was decommissioned in 2019. This unprecedented compute power has earned the device the top spot for two consecutive terms in the Top500 list, which classifies the 500 most powerful computer systems around the world. At 442 petaflops, Fugaku stands a long way ahead of competitors, with three times more capability than the number two system on the list, IBM's Summit, which has a performance of 148.8 petaflops.
Read more here ...