March 28, 2023

March 28, 2023

Predictive network technology promises to find and fix problems faster.

The emerging field of neuromorphic computing, based on a chip architecture that's engineered to mimic human brain structure, promises to provide highly effective ML on edge devices. "Predictive network technology is so powerful because of its ability to intake signals and make accurate predictions about equipment failures to optimize maintenance," says Gil Dror, CTO at monitoring technology provider SmartSense. He says that neuromorphic computing will become even more powerful when it moves from predictive to prescriptive analytics, which recommends what should be done to ensure future outcomes. Neuromorphic computing's chip architecture is geared toward making intelligent decisions on edge devices themselves, Dror says. "The combination of these two technologies will make the field of predictive network technology much more powerful," he says. Organizations including IBM, Intel, and Qualcomm are developing neuromorphic computing technologies.?


What Wasm Needs to Reach the Edge

As of today, WASM is very much present in the browser. It is also rapidly being used for backend server applications. And yet, much work needs to be done as far as getting to the stage where applications can reach the edge. The developer probably does not care that much — they just want their applications to run well and security wherever they are accessed, without wondering so much about why edge is not ready yet but when it will be. Indeed, the developer might want to design one app deployed through a WebAssembly module that will be distributed across a wide variety of edge devices. Unlike years past when designing an application for a particular device could require a significant amount of time to reinvent the wheel for each device type, one of the beautiful things about WASM — once standardization is in place — is for the developer to create a voice-transcription application that can run not only on a smartphone or PC but in a minuscule edge device that can be hidden in a secret agent’s clothing during a mission.?


5 hard questions every IT leader must answer

Most of the voluminous academic literature on leadership focuses on the traits/idiosyncrasies of the individual leader and not on their relationships with key associates. As an IT leader, do you have a track record of helping or hindering colleagues in fulfilling their career objectives? Vince Kellen, a digital force of nature and CIO at University of California San Diego, borrows insights from NHL scouts. He is looking for IT “skaters” who, when they step onto the ice, make the other four teammates better hockey players. How leaders view themselves and others and how they are viewed by others is a critical causal driver of leadership success or failure. Tony Blair was able to reverse a multi-decade decline in Labour Party electoral success when he realized, “People judge us on their instincts about what they believe our instincts to be. And that man polishing his car was clear: His instincts were to get on in life, and he thought our instincts were to stop him.”?


KPIs for a Chief Information Security Officer (CISO)

Many might think the finances of a company would be the sole responsibility of the chief financial officer and their team. However, the CISO is also responsible for returns on any investments in information security. This is a crucial benchmark for a CISO. They’re responsible for the organization gaining value from new security technology investments and security policies while keeping costs down. They must also maintain a productive department — which in financial terms means valuable — and a training program worth investing in (CISO-Portal, 2021). While CISOs are responsible for security, they also must consider the financial impact on the business if a cyberattack occurs. An estimated recovery budget should be put in place to prepare for the potential financial impact of the attack. The actual cost should be equal to or less than the budgeted total and include direct costs, indirect costs, and possible fines (Castellan). One key metric CISOs can use to gauge security team effectiveness is IT security staff job satisfaction.


Microsoft Security Copilot harnesses AI to give superpowers to cybersecurity fighters

With Microsoft Security Copilot, defenders can respond to incidents within minutes, get critical step-by-step guidance through natural language-based investigations, catch what would otherwise go undetected, and get summaries of any process or event. Security professionals will be able to utilize the prompt bar to ask for summaries on vulnerabilities, incidents in the enterprise, and even more information on specific links and files. Using generative AI and both internal and external organizational information, Copilot generates a response with reference to sources. Like most AI models, it won't always perform perfectly and it can make mistakes. However, Security Copilot works in a closed-loop learning system that includes a built-in tool for users to directly provide feedback. And while at launch it will incorporate Microsoft's security products, the company claims that over time it will "expand to a growing ecosystem of third-party products" as well.?


Plugging the cybersecurity skills gap to retain security professionals

Worryingly (but entirely unsurprisingly), any organisation facing a cyber skill gap is much more susceptible to breaches. Indeed, industry body ISACA found that 69% of those organisations that have suffered a cyber-attack in the past year were somewhat or significantly understaffed. What truly compounds these concerns, however, is the potential impact that breaches can have. According to IBM’s Cost of a Data Breach Report 2022, the average total cost of a data breach is now $4.35 million. This combination of statistics is undoubtedly anxiety-inducing. However, attacks aren’t a lost cause or an inevitability which simply can’t be prevented. ... It should be noted that, at least in most cases, organisations are not doing this to eliminate the need for cybersecurity workers altogether. Artificial intelligence is nowhere near the level of sophistication required to achieve this in a security context. And really, it’s unlikely that human input won’t ever be required, at least in some capacity.

Read more here ...
CHESTER SWANSON SR.

Realtor Associate @ Next Trend Realty LLC | HAR REALTOR, IRS Tax Preparer

1 年

Thanks for sharing.

要查看或添加评论,请登录

Kannan Subbiah的更多文章

  • March 15, 2025

    March 15, 2025

    Guardians of AIoT: Protecting Smart Devices from Data Poisoning Machine learning algorithms rely on datasets to…

    1 条评论
  • March 14, 2025

    March 14, 2025

    The Maturing State of Infrastructure as Code in 2025 The progression from cloud-specific frameworks to declarative…

  • March 13, 2025

    March 13, 2025

    Becoming an AI-First Organization: What CIOs Must Get Right "The three pillars of an AI-first organization are data…

  • March 12, 2025

    March 12, 2025

    Rethinking Firewall and Proxy Management for Enterprise Agility Firewall and proxy management follows a simple rule:…

  • March 11, 2025

    March 11, 2025

    This new AI benchmark measures how much models lie Scheming, deception, and alignment faking, when an AI model…

  • March 10, 2025

    March 10, 2025

    The Reality of Platform Engineering vs. Common Misconceptions In theory, the definition of platform engineering is…

  • March 09, 2025

    March 09, 2025

    Software Development Teams Struggle as Security Debt Reaches Critical Levels Software development teams face mounting…

  • March 08, 2025

    March 08, 2025

    Synthetic identity blends real and fake data to enable fraud, demanding new protections Manufactured synthetic…

  • March 07, 2025

    March 07, 2025

    Operational excellence with AI: How companies are boosting success with process intelligence everyone can access The…

  • March 06, 2025

    March 06, 2025

    RIP (finally) to the blockchain hype Fowler is not alone in his skepticism about blockchain. It hasn’t yet delivered…

社区洞察

其他会员也浏览了