WhyFrameStudio
An enterprise security strategy should be like a weather report: subject to frequent updates. Allowing a security plan to fall out of sync with current and emerging threats, as well as evolving enterprise technologies and interests, can open the door to financial and reputational catastrophes.
Many elements contribute to a comprehensive security strategy and just as many factors can break or outdate a once-formidable security blueprint. People, process, and technology are the key areas, says Greg Carrico, senior cybersecurity manager at business and technology consulting firm Capgemini North America. Companies that don t maintain a pulse on current events, process automation, review cycles and current technical skillsets may continue to struggle with the protection of their most critical items without even realizing that threat actors have set their proverbial sights on them.
As IT organizations are charged with creating their organizations’ digital futures, the direction at the top is critical. However, the competencies of a successful digital transformation leader can be markedly different than those of the traditional IT boss.
“Traditional IT leadership revolved around meeting delivering systems, connectivity, and updates on time, on budget, and to scope. This may have involved agile practices, but it was clearly around efficiency,” says Iain Fisher, an ISG director within the Northern European digital strategy and solutions practice. “Successful digital transformation seeks to go outside the IT silo and understand what the end customer actually wants, which is then questioned and innovated upon.”
What are Supply Chain Attacks, and How to Guard Against Them The three basic categories of supply chain attacks, why they’re especially devastating, and what can be done to guard against them.
Remediation of the fallout from the massive breach of SolarWinds network management tools – which affected up to 18,000 organizations – could cost companies billions.
In the breach, the attackers were able to compromise the update process of a widely used piece of SolarWinds software. In cybersecurity circles, this is referred to as a supply chain attack – an especially devastating variety of cyber aggression. By compromising just one vendor, attackers may get access to all the vendor’s customers.
Informationweek
Commentary
Four out of five organizations haven t scaled their AI. Here are some ways to change that.
Even as the pandemic tightens technology budgets, there are plenty of companies eager to leverage the highly beneficial capabilities of AI. They hire data scientists, identify use cases, and build proofs of concept. Yet, according to a recent research report from Capgemini, four out of five organizations fail to successfully scale these AI programs from the pilot and initial production stages.
Image: sakkmesterke - stock.adobe.com
When scaled effectively, AI programs can provide payback that is several times greater than the initial investment, all within the first six months. But without scaling their programs, most organizations aren’t reaping the benefits and showing the value of their AI implementations. This lack of value during difficult economic times results in less additional funding to continue to expand the AI program even though the returns could