Back to Basics: Defending Against Cyberattacks

Michael Papadopoulos, Richard Phillips, David Woodlock, Foivos Christoulakis
While the pandemic and enhanced digitalization have introduced more types of cyber threats, the authors assert that most recent high-profile attacks are not very sophisticated. Rather, they happen when basic cybersecurity practices are ignored or overlooked. It is likely that organizations are overestimating certain types of cyber risk, leading to overspending to secure gaps. There is also a danger that overly restrictive practices will reduce employee productivity and stifle innovation. Therefore, a realistic risk assessment after implementation of basic security practices and commensurate controls is important.

Passwordless Authentication & FIDO: The Future of Security?

Sibi Chakkaravarthy Sethuraman, Aswani Kumar Cherukuri, Nandeesh Kumar Kumaravelu, Aditya Mitra
This first article of the issue is from a team of cybersecurity researchers from a leading engineering institute in India. They explain how the ubiquitous problem of password authentication can be resolved using Fast Identity Online Alliance’s (FIDO) mechanism.

Cyber Resilience & Countermeasures — Opening Statement

Anjali Kaushik
This inaugural issue of Amplify was carefully organized to encourage dialogue on cyber-resilience strategies and countermeasures. This discussion is extremely relevant, since there is more disruption than ever before, and the truth is that no device is secure! A solid understanding of both risk and resilience is a critical element in every organization’s cybersecurity plan.

Tech Leaders Benefit from a Cyber-Savvy Boardroom

Bob Zukis, Noah Barsky
CISOs, CIOs, and other technology leaders are well-served with a strong digital- and cyber-savvy corporate board, as are shareholders and other corporate stake­holders. In a world increasingly dependent on complex digital systems for growth and resiliency, ensuring the boardroom is a critical digital and cyber-control point is a necessary and overdue step.

Tech Leaders Benefit from a Cyber-Savvy Boardroom

Bob Zukis, Noah Barsky
CISOs, CIOs, and other technology leaders are well-served with a strong digital- and cyber-savvy corporate board, as are shareholders and other corporate stake­holders. In a world increasingly dependent on complex digital systems for growth and resiliency, ensuring the boardroom is a critical digital and cyber-control point is a necessary and overdue step.

Digital Twins for Sustainability: Current Status & Applications

Curt Hall
Digital twins provide an advanced form of simulation and modeling for building virtual digital versions of real-world entities and processes. How are organizations using digital twins to implement sustainability projects? This Advisor considers the use of digital twins in sustainability scenarios — including some real-world applications involving smart cities, smart buildings, and clean energy production.

The Role of Business Architecture in Software Design

William Ulrich
In this on-demand webinar with Cutter Fellow William Ulrich, you'll discover why holistic, formally defined, and highly rationalized business abstractions are vital to the success of software design and related IT deliverables.

Quantum Computing Will Drive Parallel Innovation

Joseph Byrum
This Advisor explores how the power behind quantum computing can enable today’s most difficult algorithms to be solved in a matter of seconds, enabling real-time processing, analysis, and modeling of data unthinkable with current methods. Parallel processing will accelerate the effectiveness of teams using data analytics to boost efficiency.

Leading Successful Tech Projects Requires Courage

Ralph Menzano
Why do technology projects succeed? The most vital ingredient is organizational and personal courage.

Leading Successful Tech Projects Requires Courage

Ralph Menzano
Why do technology projects succeed? The most vital ingredient is organizational and personal courage.

Green, Secure IoT for Enhanced Sustainability Strategies

San Murugesan

The Internet of Things (IoT) is being used — and can be used — in key business and industry sectors, buildings, and households to improve energy and operational efficiency, thereby minimiz­ing environmental impact. In this Advisor, we take an inward-looking approach to examine how we can reduce IoT’s own environmental impact and explore its cybersecurity risks. We also discuss how we can leverage and benefit from IoT’s full climate-action potential and help create a sustainable environment.


Practical Use Cases of IoT Solutions in Healthcare

Ulrica Sehlstedt, Rebecka Axelsson Wadman, Sean McDevitt, Agron Lasku
Today’s Internet of Things (IoT) solutions have tremendous potential to enhance healthcare operations and generate overall improvements to care outcomes, cost, and efficiency. New IoT solutions for healthcare are smarter and, more importantly, tailored to the needs and requirements of healthcare organizations. In this Advisor, we explore two practical use cases of IoT solutions in healthcare.

Balancing Growth & Sustainability: Technology-Led Business Model Transformations

Pradipta Chakraborty
Companies can’t choose between growth and sustainability — they must have both. This Executive Update explores this issue and proposes ways to identify the right technology portfolio to support new business models that lead to growth while ensuring sustainability goals.

Promoting Gender Equality at the Leadership Level

Keren Joseph Browning
The increases of women in senior or executive roles over the past two decades have been less than inspiring. It would seem, therefore, that although leadership literature has played a significant role in raising the profile of women in management, much needs to happen in actual board rooms and manage­ment suites in order to advance the careers of women in leadership positions.

Cyber AI: Leveraging the AI-Cybersecurity Nexus for Heightened Protection

San Murugesan
San Murugesan looks at how artificial intelligence (AI) strategies can enhance information systems security. He calls this “cyber AI” and discusses how activities such as monitoring, threat hunting, and incident response can benefit from AI/machine learning solutions. The article covers the use of AI in behavioral analytics, threat intelligence, ransomware attack detection, smart identity governance, online fraud detection, deepfakes, and risk assessment. Finally, the author points out the potential for malicious use of AI in the increasing occurrence of cyber threats. His thoughtful piece provides a deep exploration of the nexus between AI and cybersecurity from an expert viewpoint.

Intensifying Attacks Demand New Strategies

Abhijit Dasgupta
Abhijit Dasgupta, an accom­plished security risk leader with extensive experience in building and leading security risk and digital governance practices globally, comments on the changing threat landscape and highlights the enhanced risk from both new remote work practices across businesses as a result of COVID as well as from cryptocurrencies. He suggests strategies such as zero trust, perimeter-less, and multi-cloud.

Intensifying Attacks Demand New Strategies

Abhijit Dasgupta
Abhijit Dasgupta, an accom­plished security risk leader with extensive experience in building and leading security risk and digital governance practices globally, comments on the changing threat landscape and highlights the enhanced risk from both new remote work practices across businesses as a result of COVID as well as from cryptocurrencies. He suggests strategies such as zero trust, perimeter-less, and multi-cloud.

Proactive Defense: Threat Hunting & Deception

James Motherway
James Motherway, a senior threat hunt analyst, offers practical insights on proactive defense with threat hunting and deception. He believes that, as cyberattacks become bolder and more widespread, reactive security is not enough. Even worse, many organizations suffer from detection blind spots or collect lots of data that does not help. Motherway believes security teams have no choice but to invest in proactive capabilities to protect their operations.

Proactive Defense: Threat Hunting & Deception

James Motherway
James Motherway, a senior threat hunt analyst, offers practical insights on proactive defense with threat hunting and deception. He believes that, as cyberattacks become bolder and more widespread, reactive security is not enough. Even worse, many organizations suffer from detection blind spots or collect lots of data that does not help. Motherway believes security teams have no choice but to invest in proactive capabilities to protect their operations.

Effective Cybersecurity Starts with Strengthening the Corporate Boardroom

Bob Zukis, Noah Barsky
The authors describe how systemic risk should be factored in as a board priority and how to enhance preparedness. They argue that in terms of bolstering cybersecurity, the corporate boardroom is “too frequently a non­existent or under­performing control point for many organizations.” Zukis and Barsky go on to discuss the vulnerability of today’s highly connected and complex systems to systemic risks that can cause damage to the entire system. Finally, their article illustrates how boardroom mechanisms for governing digital and cyber risk can benefit enterprises.

Effective Cybersecurity Starts with Strengthening the Corporate Boardroom

Bob Zukis, Noah Barsky
The authors describe how systemic risk should be factored in as a board priority and how to enhance preparedness. They argue that in terms of bolstering cybersecurity, the corporate boardroom is “too frequently a non­existent or under­performing control point for many organizations.” Zukis and Barsky go on to discuss the vulnerability of today’s highly connected and complex systems to systemic risks that can cause damage to the entire system. Finally, their article illustrates how boardroom mechanisms for governing digital and cyber risk can benefit enterprises.

Cyberattacks: Strategies That Matter — Opening Statement

Anjali Kaushik
In this issue of CBTJ, we address the question, “Why are cyberattacks on the rise, and what strategies/practices can organizations adopt to address and minimize the chance of these attacks?” Our five articles were carefully selected to highlight the strategies that enterprises can follow to enhance their security posture.

Cyberattacks: Strategies That Matter — Opening Statement

Anjali Kaushik
In this issue of CBTJ, we address the question, “Why are cyberattacks on the rise, and what strategies/practices can organizations adopt to address and minimize the chance of these attacks?” Our five articles were carefully selected to highlight the strategies that enterprises can follow to enhance their security posture.

Flexibility Can Help Tech Close the DEI Gap

Benjamin Duke

societal attitude that home and childcare duties should be carried out by women is widespread in many countries. During the COVID-19 global pandemic, more women than men lost their jobs or felt they had to stop work. But the IT sector initiated, and needs to continue with, COVID-19-induced societal transformation toward remote work.


What Does “DEI” Really Mean?

Samin Saadat
The term “DEI” (diversity, equity, inclusion) is currently trending across the business world but is frequently and increasingly misused. In this Advisor, we break down each concept into simple language that can help your company "walk the talk" when it comes to organizational transformation.