Proactive Defense: Threat Hunting & Deception
James Motherway
James Motherway, a senior threat hunt analyst, offers practical insights on proactive defense with threat hunting and deception. He believes that, as cyberattacks become bolder and more widespread, reactive security is not enough. Even worse, many organizations suffer from detection blind spots or collect lots of data that does not help. Motherway believes security teams have no choice but to invest in proactive capabilities to protect their operations.
Proactive Defense: Threat Hunting & Deception
James Motherway
James Motherway, a senior threat hunt analyst, offers practical insights on proactive defense with threat hunting and deception. He believes that, as cyberattacks become bolder and more widespread, reactive security is not enough. Even worse, many organizations suffer from detection blind spots or collect lots of data that does not help. Motherway believes security teams have no choice but to invest in proactive capabilities to protect their operations.
Effective Cybersecurity Starts with Strengthening the Corporate Boardroom
Bob Zukis, Noah Barsky
The authors describe how systemic risk should be factored in as a board priority and how to enhance preparedness. They argue that in terms of bolstering cybersecurity, the corporate boardroom is “too frequently a nonexistent or underperforming control point for many organizations.” Zukis and Barsky go on to discuss the vulnerability of today’s highly connected and complex systems to systemic risks that can cause damage to the entire system. Finally, their article illustrates how boardroom mechanisms for governing digital and cyber risk can benefit enterprises.
Effective Cybersecurity Starts with Strengthening the Corporate Boardroom
Bob Zukis, Noah Barsky
The authors describe how systemic risk should be factored in as a board priority and how to enhance preparedness. They argue that in terms of bolstering cybersecurity, the corporate boardroom is “too frequently a nonexistent or underperforming control point for many organizations.” Zukis and Barsky go on to discuss the vulnerability of today’s highly connected and complex systems to systemic risks that can cause damage to the entire system. Finally, their article illustrates how boardroom mechanisms for governing digital and cyber risk can benefit enterprises.
Cyberattacks: Strategies That Matter — Opening Statement
Anjali Kaushik
In this issue of CBTJ, we address the question, “Why are cyberattacks on the rise, and what strategies/practices can organizations adopt to address and minimize the chance of these attacks?” Our five articles were carefully selected to highlight the strategies that enterprises can follow to enhance their security posture.
Cyberattacks: Strategies That Matter — Opening Statement
Anjali Kaushik
In this issue of CBTJ, we address the question, “Why are cyberattacks on the rise, and what strategies/practices can organizations adopt to address and minimize the chance of these attacks?” Our five articles were carefully selected to highlight the strategies that enterprises can follow to enhance their security posture.
Flexibility Can Help Tech Close the DEI Gap
Benjamin Duke
A societal attitude that home and childcare duties should be carried out by women is widespread in many countries. During the COVID-19 global pandemic, more women than men lost their jobs or felt they had to stop work. But the IT sector initiated, and needs to continue with, COVID-19-induced societal transformation toward remote work.
What Does “DEI” Really Mean?
Samin Saadat
The term “DEI” (diversity, equity, inclusion) is currently trending across the business world but is frequently and increasingly misused. In this Advisor, we break down each concept into simple language that can help your company "walk the talk" when it comes to organizational transformation.
Cybersecurity Vulnerability Management for Medical Devices
Hans Martin von Stockhausen, Frances Paulisch
Cybersecurity vulnerability management for medical devices is an area of concern for both medical device manufacturers and healthcare delivery organizations. The issues related to updates, configuration, and patch management are extremely challenging in the medical domain, especially with ransomware attacks designed to exploit well-known technologies used in medical devices. The article describes a centralized service and continuous patch delivery that can be adopted as an industry practice for medical device manufacturers, and is an important read for all cybersecurity and healthcare professionals.
Cybersecurity Vulnerability Management for Medical Devices
Hans Martin von Stockhausen, Frances Paulisch
Cybersecurity vulnerability management for medical devices is an area of concern for both medical device manufacturers and healthcare delivery organizations. The issues related to updates, configuration, and patch management are extremely challenging in the medical domain, especially with ransomware attacks designed to exploit well-known technologies used in medical devices. The article describes a centralized service and continuous patch delivery that can be adopted as an industry practice for medical device manufacturers, and is an important read for all cybersecurity and healthcare professionals.
Advancing DEI with Evolving Attitudes and Inclusive Language
Benjamin Duke
DEI problems are created by offensive and archaic attitudes that persist in the workplace. As explored in this Advisor, organizations can advance DEI by removing their institutional structural barriers and by using inclusive language to help create an equitable workplace.
Aligning Decentralized and Hybrid R&D Activity: A CTO's Challenge
Ben Thuriaux, Enguerran Ripert, Nicholas Johnson
Increasingly, organizations are adopting a decentralized approach to R&D, carrying out a significant amount of activity within the business units. This Advisor explores the challenge of gaining R&D insight, from project management systems that don't fit the bill, to the need for better system configuration.
When Good Data Goes Bad, Part VI
Barry Devlin
Good data is honestly and ethically sourced, fully contextualized, reliable, resilient, widely available, and well-understood. How can this be achieved? Contemplating these characteristics, we are led directly to principles and programs for data/information governance, ethics, and the organizational structures needed to support and drive their success. This Advisor explores the path forward to good data.
Do NFTs Democratize Art? Or Are They Just a New Money Maker?
Nilesh Khandelwal, Conner Feldman
Although most individuals associate non-fungible tokens (NFTs) as a form of “digital art,” as we explore in this Executive Update, they more broadly open up models for anything to become tokenized.
IPA in the Enterprise, Part XII: Remaining Key Industries
Curt Hall
In this final installment of our series on intelligent process automation (IPA) in the enterprise, we cover the remaining key industries where surveyed organizations see IPA having its greatest impact.
Technology Push Is Winning the Adoption Race
Steve Andriole
How are today's organizations adopting and deploying emerging technologies? Research suggests that companies have abandoned their obsession with “requirements” and — however quietly — appear to instead endorse a “technology-first/requirements-second” approach to technology adoption.
Diverse Values and Perspectives Lead to Quality Team Work
Robert Ogilvie, Jeffrey McNally
As work and teams strive to be more agile, team diversity boosts resilience by allowing the team to adapt to new missions and changing situations more easily.
The Root Cause of Ineffective Software Design
William Ulrich
Organizations can utilize business architecture to inform and shape software designs to achieve more stable, maintainable, and scalable software systems. This Advisor examines the root cause of ineffective software design, specifically, the lack of consistency and clarity of the business perspectives being used as input to software design efforts.
Cultivating Resilience, the Perils of Convenient Hiring in Innovation Teams, more!
Cutter Consortium
This edition of The Cutter Edge explores why and how to make employee resilience a priority, the "four horsemen" of not-so-strategic HR, and more!
Alleviating Algorithmic Bias in AI-Powered HR & Workforce Management Systems
Curt Hall
Neural networks and other ML model development typically use large amounts of data for training and testing purposes. Because much of this data is historical, there is the risk that the AI models could learn existing prejudices pertaining to gender, race, age, sexual orientation, and other biases. This Advisor explores how the Data & Trust Alliance consortium created an initiative to help end-user organizations evaluate vendors offering AI-based solutions according to their ability to detect, mitigate, and monitor algorithmic bias over the lifecycle of their products.
Alleviating Algorithmic Bias in AI-Powered HR & Workforce Management Systems
Curt Hall
Neural networks and other ML model development typically use large amounts of data for training and testing purposes. Because much of this data is historical, there is the risk that the AI models could learn existing prejudices pertaining to gender, race, age, sexual orientation, and other biases. This Advisor explores how the Data & Trust Alliance consortium created an initiative to help end-user organizations evaluate vendors offering AI-based solutions according to their ability to detect, mitigate, and monitor algorithmic bias over the lifecycle of their products.
IPA in the Enterprise, Part XI: 5 More Key Industries
Curt Hall
In Part XI of this Executive Update series on intelligent process automation (IPA) in the enterprise, we cover another five key industries in which organizations see IPA having its greatest impact.
How to Define, Assess and Plan Successful Technology Projects
Sridhar Deenadayalan
Project success is evaluated by the degree to which an end goal is achieved. Having a vivid understanding of the result, its impact, and the potential impediments to success can help improve a project. This Advisor explores the three beginning stages of a technology project and their keys to success: define, assess, and plan. Each stage has its own characteristics that need examination.
Transform Project Thinking with a Logistical Mindset
Robert Charette
Learn how a logistical mindset transforms project thinking from focusing on avoiding failure to concentrating on achieving success.
How Business Architecture Can Help Define Data Architecture
William Ulrich
In this webinar on demand, William Ulrich shows you how you can define and validate your organization’s data architecture to inform data transformation requirements, and provide a foundation for IT investments.