R&D is, as an essential process to bring innovation into your company. Artificial Intelligence (AI) is notoriously hard to pin down, spawning as many doomsayers as rosy-eyed tech utopians. With biased datasets and skewed algorithms already compromising the objectivity and precision of many AI systems, recent legislative hearings on the use of Facebook and Twitter by Russian hackers to influence the US 2016 presidential elections only compounded the noise and apprehension about artificial intelligence and automated systems.
Today, businesses are forced to realign the concepts of work. As the world returns to its work routine, some businesses are re-opening offices for a limited number of employees; some are allowing employees to work remotely beyond the pandemic, while others have indefinitely extended remote working options.
The threat landscape is evolving every day and threat actors are finding newer ways to disrupt businesses. Therefore, all businesses, irrespective of their preparedness now need to be future-ready. More importantly, they should realize that the role of security operations is changing.
Recently, the former Chairman of Telecom Regulatory Authority of India (Trai) RS Sharma said a body that looks at issues both digital and non-digital could prevent decision overlaps. Further, the former director general of Unique Identification Authority of India (UIDAI) spoke about how the use-cases of Aadhaar have only scratched the surface and there was scope for its expansion both in the government and private sector.
He further said, what has happened is that convergence has taken place and one device can offer multiple services, and you can’t really differentiate between digital and non-digital - broadcasting, telecommunications, everything is merging. So now, we need to look at this thing more holistically than we were earlier. Hence there is a need of digital sovereignty.
Many have expressed about Sharma’s point out a negative viewpoint on the digital and non-digital , but I would say, he is absolutely correct. The reason of his statement is very clear, which complements to the headline of this article. One may argue, on AI is for further enhancement and understanding users behaviour, but to do this the company has to break its privacy rule. We have witnessed that there is a strong fight among Google and Yahoo, on whose AI/coding is strong. There are thousands of enterprises are into the business of AI, and they market further for deeper penetration to fuel the growth in the ML and AI-driven revolution.
An expert says, nothing in Social media and web is secure including Facebook, Twitter, Linkedin, Instagram, WhasApp and even SMS. There are several tools are readily available to breach the information at the field, Bigdata and darknet level also. The need of the hour is what to post or keep in digital and what not to post, for this every one including individual, enterprises has to understand. Else one does not know what will be the consequences.
We have already seen, Artificial Intelligence, Machine Learning and Software are eating the world. To win with a data-driven strategy - CIOs must clearly define their data strategy to take advantage of the massive profusion of data and use these new technologies to harness and exploit it for competitive advantage. At the same time - financial and information governance are foundational - and getting them right is key to operating a sustainable and profitable data platform.
It is absolutely true that, ML and AI are required technologies today for generating the next set of competitive advantages - predicting the future, gaining deep insights from unstructured data and creating data-driven products. This has created a significant opportunity for security response teams to integrate with the business. Security has moved from being just a technical problem to one that critically affects operations.
Businesses are also battling new security challenges as threat actors are using Covid-19 as a new attack angle. They should consider the following so they can maintain constant vigilance and organisational agility. They should put in place a mobile threat management system to detect and analyse mobile malware on compromised devices, automate remediation through a near real-time compliance engine.
Improved digital trust – Strong authentication processes are essential to ensure the right users get access to accurate data for the right reason. Businesses should implement multi-factor authentication wherever possible as it adds an extra security check points.
To summarize, for businesses, to stay resilient and agile in any situation the key will be to consider the best ways to secure a mixed workforce getting access to critical data anytime, anywhere in a secure manner. They must define, what to share through the digital medium and what not and what to post in the social and what not and most importantly, Whom to accept the friend and whom not, else one will land-up in a big problem, which is not recoverable.
See What’s Next in Tech With the Fast Forward Newsletter
Tweets From @varindiamag
Nothing to see here - yet
When they Tweet, their Tweets will show up here.