October 14, 2022

October 14, 2022

Which cybersecurity metrics matter most to CISOs today?

Given the rapid increase in malware-free attacks, there’s a tendency on the part of cybersecurity teams to add more metrics. Seeing more reported data as a panacea for rising risks that aren’t immediately understood, cybersecurity teams will turn on as many metrics as possible, looking for clues. Relying on antivirus, SIEM (security information and event management), security ticketing systems, vulnerability scanners, and more, CISOs’ teams generate an overwhelming number of metrics that lack context. CISOs warn that presenting metrics straight from tools without a narrative supporting them is a mistake. C-level executives and the boards they report to are more focused on new insights that are contextually relevant than a series of tactical measures. Every new high-profile intrusion or breach drives up to a dozen or more internal user requests for new metrics. Managing user requests by how much value they provide to contextual intelligence and delivering business value is critical. CISOs tell VentureBeat it’s easy to say no to additional metrics requests when there is no connection to requested metrics that quantify the value cybersecurity delivers.


Making everything connect for smart cities

It’s a vision of how smart cities can be holistically planned by connecting the different city domains and addressing Sustainable Development Goals (SDGs) globally. In this way, mobility, energy, the environment, health, education, security and the economy are not treated separately, but rather as a whole consistent continuity of human-centric services. Smart cities need to be much better at creating an open platform of dialogue that is accessible to all citizens. ... These allow residents to engage with a wide array of data, as well as completing personal tasks like paying bills, finding efficient transportation and assessing energy consumption in the home. Smart cities also need to account for social infrastructure that provides a cultural fabric, making the city attractive to residents and offering a sense of local identity. It is often the social and cultural aspects of a city that citizens find makes it most attractive to live in – aspects such as green open spaces, a wide choice of retail outlets, and bustling nightlife. This is particularly important for cities that are being created ‘from scratch’ (rather than already existing) and need to find effective ways to attract residents.


Dell gets more edge-specific with Project Frontier platform

Dell also said it is expanding its current edge portfolio in the following ways: Edge analytics and operations - Manufacturers can optimize how they deploy edge applications with an Dell Validated Design for Manufacturing Edge, the company said. This now includes new Dell-validated partner applications to support advanced edge use cases, and improve factory processes and efficiencies, while reducing waste and raw materials usage for more sustainable operations. Manufacturers can respond quickly to changes in demand, and enable reconfigurable production lines with Dell's private 5G capability, Dell said. Edge computing and analytics - The PowerEdge XR4000 is the smallest server in the Dell lineup at about the size of a shoebox. The XR4000 is 60% shorter than conventional data center servers, and its multiple mounting options allow it to be installed in a rack, on walls or ceilings, saving valuable floor space. The multi-node, 2U chassis server can survive unpredictable conditions, such as heat waves or falls, the company said.


The White House can build on its AI Bill of Rights blueprint today

Several current uses of AI clearly violate the blueprint and should no longer be used. The president should also stop encouraging agencies to spend American Rescue Plan funds on ShotSpotter and other “gunshot detection” technologies, which change police behavior but have not been shown to decrease gun violence. These tools are in violation of the blueprint’s principles that AI tools must be safe, effective, nondiscriminatory, and transparent. ... On the legislative front, the AI Bill of Rights principles are embodied in both the American Data Privacy Protection Act and the Algorithmic Accountability Act of 2022, both of which the administration could put its support behind. There has been substantial investment in the development and adoption of AI, but nowhere near as much money or energy put toward safeguards or protection. We should not repeat the same self-regulatory mistakes made with social media and online advertising that left us in the privacy crisis we are in today.?


How intelligent automation changes CI/CD

Intelligent automation addresses many of the core requirements for successful software delivery. Basic process automation can increase devops productivity by automating routine manual tasks through code. For example, a developer can run a build in Jenkins that then triggers an automated task that pushes the build to Artifactory and kicks off a delivery pipeline. However, combining automation with AI-powered intelligence can turbocharge processes and improve business outcomes. Intelligent automation can automate routine tasks and then constantly improve automated decision making as the release moves through the delivery lifecycle. Intelligence applied to the release process — when combined with deep tools integrations that provide access not only to events but also to all process data — can automate the detection of software risks and automatically flag release candidates for remediation before they make it to production. In addition to increased devops productivity and faster and more accurate software releases, intelligent automation provides the means to implement centralized, automated control over compliance and security.?


A Big Threat for SMBs: Why Cybersecurity is Everyone’s Responsibility

It impacts everyone across every department and every element of operations. Cybersecurity is a collective responsibility. During this Cybersecurity Awareness Month, let’s debunk the pervasive misconception that cybersecurity is strictly an IT issue. To avoid becoming a statistic, SMBs need to develop a security culture that reinforces the idea that cybersecurity is the responsibility of every team member. From the founder who sets a security-focused tone to the specific teams that implement the policies, to the HR department responsible for onboarding new employees, to the IT team setting system password requirements, and to every employee that can potentially open a phishing email triggering a security incident, it’s a collective effort to stay aware. All individuals need to be trained, vigilant, and engaged. The devil is in the details, as it’s the tools, tasks, and routine activities each team member performs that will protect the company.

Read more here ...

要查看或添加评论,请登录

Kannan Subbiah的更多文章

  • March 19, 2025

    March 19, 2025

    How AI is Becoming More Human-Like With Emotional Intelligence The concept of humanizing AI is designing systems that…

  • March 17, 2025

    March 17, 2025

    Inching towards AGI: How reasoning and deep research are expanding AI from statistical prediction to structured…

  • March 16, 2025

    March 16, 2025

    What Do You Get When You Hire a Ransomware Negotiator? Despite calls from law enforcement agencies and some lawmakers…

  • March 15, 2025

    March 15, 2025

    Guardians of AIoT: Protecting Smart Devices from Data Poisoning Machine learning algorithms rely on datasets to…

    1 条评论
  • March 14, 2025

    March 14, 2025

    The Maturing State of Infrastructure as Code in 2025 The progression from cloud-specific frameworks to declarative…

  • March 13, 2025

    March 13, 2025

    Becoming an AI-First Organization: What CIOs Must Get Right "The three pillars of an AI-first organization are data…

  • March 12, 2025

    March 12, 2025

    Rethinking Firewall and Proxy Management for Enterprise Agility Firewall and proxy management follows a simple rule:…

  • March 11, 2025

    March 11, 2025

    This new AI benchmark measures how much models lie Scheming, deception, and alignment faking, when an AI model…

  • March 10, 2025

    March 10, 2025

    The Reality of Platform Engineering vs. Common Misconceptions In theory, the definition of platform engineering is…

  • March 09, 2025

    March 09, 2025

    Software Development Teams Struggle as Security Debt Reaches Critical Levels Software development teams face mounting…

社区洞察

其他会员也浏览了