March 14, 2023
Kannan Subbiah
FCA | CISA | CGEIT | CCISO | GRC Consulting | Independent Director | Enterprise & Solution Architecture | Former Sr. VP & CTO of MF Utilities | BU Soft Tech | itTrident
Companies might claim they conduct ethical uses of AI, she says, but more could be done. For example, Rudin says companies tend to claim that putting limits on speech that contributes to human trafficking or vaccine misinformation would also eliminate content that the public would not want removed, such as critiques of hate speech or retellings of someone’s experiences confronting bias and prejudice. “Basically, what the companies are saying is that they can’t create a classifier, like they’re incapable of creating a classifier that will accurately identify misinformation,” she says. “Frankly, I don’t believe that. These companies are good enough at machine learning that they should be able to identify what substance is real and what substance is not. And if they can’t, they should put more resources behind that.” Rudin’s top concerns about AI include circulation of misinformation, ChatGPT putting to work helping terrorist groups using social media to recruit and fundraise, and facial recognition being paired with pervasive surveillance.?
Many organizations are trying to solve the phishing problem solely with technology. These companies are buying all the latest tools to detect suspicious emails and giving employees a way to report then block those suspicious emails, says Eric Liebowitz, chief information security officer, Americas at Thales Group, a Paris-based company that develops devices, equipment, and technology for the aerospace, space, transportation, defense, and security industries.?While doing that is great, in the end the bad actors are always going to be more sophisticated, he says.?“One of the big things that I don't think enough organizations are focusing on is training their employees,” Liebowitz says. “They could have all the greatest tools in place, but if they're not training their employees, that's when the bad thing is going to happen.”?While some organizations have deployed the right tools and have workflows and processes in place to combat phishing campaigns, they haven't adequately and proactively configured those tools, says Justin Haney, executive, North America security lead at Avanade.
The first step towards achieving success is to know what to measure and monitor. Your business technology ecosystem may be comprised of different modular applications with all sorts of possible dependencies. It is important to first lay out the key indicators that must be tracked if engineers are to find remedies when unusual behavior is observed. These indicators are not just internal operational metrics but also customer-facing ones like performance and speed of page loads, erroneous crashes of web interfaces, etc. The key to finding the best remedy for any unexpected defect or bug is to trace the root cause of the problem. This means developers and QA engineers must be able to navigate the exact workflow that resulted in a defective output. For this, traceability is an essential factor in every transactional workflow. It helps DevOps teams understand how data and insights are passed between different systems when a transactional request is processed.?
领英推荐
Innovation has radically altered the retail customer experience, with e-commerce and brick-and-mortar stores redefining the way the world shops. By supporting customers, interactive digital terminals, virtual and augmented reality tools, and robotic sales assistants have increased both business efficiency and customer satisfaction. Furthermore, retailers have implemented IoT technologies to optimize existing processes. Radio-frequency identification (RFID) tracking is utilized to streamline warehouse inventory processes, enabling efficient asset management. Once consumers venture to stores, cameras and sensors are employed for footfall tracking purposes, and Wi-Fi connections can detect repeat customers and target them with digital advertisements beyond their trip to the store. While these modifications have improved the retail experience for customers, they may also have increased network traffic and masked visibility for IT teams, complicating operations and performance management.
Industry analysts estimate that at least 30% of?cloud spend is “wasted” each year — some $17.6 billion. For modern data pipelines in the cloud, the percentage of waste is significantly higher, estimated at closer to 50%. It’s not hard to understand how we got here. Public cloud services like AWS and GCP have made it easy to spin resources up and down at will, as they’re needed. Having unfettered access to a “limitless” pool of computing resources has truly transformed how businesses create new products and services and bring them to market. For modern data teams, this “democratization of IT” facilitated by the public cloud has been a game-changer. For one thing, it’s enabled them to be far more agile as they don’t need to negotiate and justify a business case with the IT department to buy or repurpose a server in the corporate data center. And as an operational expenditure, the pay-by-the-drip model of the cloud makes budget planning seem more flexible. However, the ease with which we can spin up a cloud instance doesn’t come without a few unintentional consequences — forgotten workloads, over-provisioned or underutilized resources — with results including spiraling and unpredictable costs.
According to an (ISC)2 study, women make up roughly a quarter of the overall cybersecurity workforce. We’ve come a long way over the last decade (women made up about 10% of cybersecurity jobs in 2013), but we know the industry needs to work toward even greater diversity. Addressing the gender gap starts with sparking interest at a young age. We can also get creative with our most passionate and loyal current employees and realize not every cybersecurity role is a ‘special snowflake.’ There are many open roles that call for in-depth skills that have been honed and developed over time. What about all the roles that don’t? Here’s the secret: Not everyone who works in cybersecurity needs to be a cybersecurity expert. At least not right away. Cybersecurity expertise can be taught or learned. So, one way to get closer to bridging the talent gap is to reskill talent from other professions.
Realtor Associate @ Next Trend Realty LLC | HAR REALTOR, IRS Tax Preparer
2 年Well Said.