May 03, 2022
Kannan Subbiah
FCA | CISA | CGEIT | CCISO | IT Security, Strategy & Governance | Independent Director | Enterprise & Solution Architecture | 3 decades of IT experience and 2 decades of Mutual Funds domain experience.
The software architecture initially puts a foundation for a software project and lets programmers work on the particular project for many years. The entire software system’s lifetime, maintainability, and market success depend on this foundation. Late architectural changes are usually time-consuming and costly for any software development team. In other words, it’s literally impossible to change the foundation once a house is built on top of it. Therefore, we always need to strive to select the optimal architectural pattern with the first implementation attempt. It’s indeed better to spend more time on early architectural decisions rather than spending your time fixing the side-effects of instant non-optimal architectural decisions. First, work on the software system’s core functionality and stabilize — at this stage, architectural changes are not much time-consuming. Next, work on features by using the software core’s functionality. Even though you use a monolithic pattern, you can detach the core logic from features at the source-code level — not from the architectural level.
Now comes security service edge (SSE), which pulls back the security functions in SASE into a unified services offering that includes CASB, zero-trust network architecture (ZTNA) and secure web gateway (SWG). SSE came in the wake of the COVID-19 pandemic, with most employees being sent home to work and putting in motion the ongoing trend toward hybrid work. With many people working from home at least part of the time, the role of branch offices is lessened and the need for security features that follow workers where they are – with work days starting from home and then moving to offices or other locations – is growing. What the role of SSE is in the larger network security space is and what it means for the future of SASE are the subjects of some debate in the industry. However, it puts a spotlight on the ongoing evolution of networking as the definition of work continues to change and the focus of IT shifts from the traditional central data center data and workloads in the cloud and at the edge. Once the pandemic hit, "it was no longer about branch offices," said John Spiegel, director of strategy at Axis Security, which in April launched Atmos, its SSE platform.
To begin, the idea behind the entire zero trust network access starts with the assumption that cybersecurity attacks can be a result of who is internal and who is external to the network. A traditional IT network trusts pretty much everything while a zero trust architecture network literally means “trust no one” including systems, users, software, and machines. Zero trust network access verifies a user’s identity and privileges and forces both users and devices to be continuously monitored and re-verified to maintain access. For example, let’s say that you log in to your bank account via a mobile device or even your laptop computer. Once you check your balance, you open a new tab to continue something else outside of the bank account screen. After a while, that tab will produce a pop-up with a timeout warning asking if you want to continue or log out. If you don’t reply in time, it will automatically log you out of the screen and you will be forced to log back in if you want to access your bank account details again.
领英推荐
Skill development is another function that takes place at the group level. So, in the hybrid era, it’s also important to avoid losing those opportunities. As Degreed’s Chief Learning and Talent Officer Kelly Palmer wrote for the World Economic Forum, it’s helpful to use hybrid employees’ time at the office for “collaborative projects in which their new skills can be put to work,” while “fully remote companies can organize virtual collaborations.” Prioritizing development on both the individual and team levels is also a nonnegotiable because of the challenges presented to organizations by skill gaps. “Half of all employees around the world will need reskilling by 2025—and that number does not include all the people who are currently not in employment,” PwC Global Chairman Robert E. Moritz and World Economic Forum Managing Director Saadia Zahidi wrote in the 2021 report Upskilling for Shared Prosperity.
The European Union took a step forward and a year ago presented a proposal for a pioneering regulation in the world, which divides AI technologies into four categories based on the risk they may pose to citizens. But some experts point out that there are complex applications that, in their current wording, could be left out of regulation. Health, autonomous cars and weapons, among others. The EU debates the last fringes of the regulations on AI, which could be ready in 2023. A regulation that is “unique in the world” due to its characteristics, although it leaves important aspects in the shadows, says Lucía Ortiz de Zárate, Researcher in Ethics and Governance of Artificial Intelligence at the Autonomous University of Madrid. Ortiz de Zárate has submitted, together with the Fundación Alternativas, comments on the Commission’s proposal. ... This researcher misses the fact that there are sensitive sectors that are not included in the most closely watched artificial intelligence classifications, as is the case of health.?
Going paperless and modernizing IT won't drive digital transformation on their own. On the contrary, true digital transformations encompass reevaluating current business processes and re-architecting them from the ground up to effectuate radical change. The key to successful digital transformation is to establish and seamlessly intertwine four core pillars: technology and infrastructure, business processes and models, customer experience and organizational culture. In my experience as an entrepreneur operating a digital transformation agency, high-performing organizations and digital leaders are able to continuously re-evaluate their core, identify weaknesses and opportunities and guide their teams through the ongoing transformation of all four pillars simultaneously to achieve defined goals. Whether it's an implementation of AI-driven analytics or a new customer portal, all components of the four pillars need to be considered and transformed in unison to achieve transformation goals and deliver tangible results. Initiatives that touch only the technology or infrastructure may drive improvement, but they're rarely transformative.