Everything about IT has changed, but our security measures are still built around how we used to design software and systems. Where does security need to catch up with digital transformation - and how?
"With the C-suite laying the gauntlet down for digital transformation in the enterprise - tying swift software delivery and market-adaptable tech services directly into core value propositions - many IT departments are entering an enlightenment period. CIOs, chief digital officers, DevOps visionaries, and plenty of collaborative tech industry luminaries have spurred on drastic changes in the past few years in how software is delivered, how infrastructure is run, and what IT architecture looks like..."
How can we maintain control over digital identity In a world where it is being blurred and abused by fraudsters?
"An insurance company recently reported a successful scam against one of its clients that was a new and improved version of CEO fraud. A British CEO was tricked into transferring $240,000 to a fraudster. The trick used the technique known as a deepfake to make the CEO believe he was dealing with a legitimate person..."
We need technology, but we can't forget the importance of humans working methodically to make it effective
"No matter how much we invest in defense and how many new solutions hit the market every year, we still face an onslaught of highly successful cyberattacks. Hackers are savvy and persistent, and our failure to keep pace is leading to a problem projected to eclipse $3 billion in losses, according to 2018 data..."
Cyberecurity incidents expected to rise by nearly 70% and cost $5 trillion annually by 2024
"These days, the use of artificial intelligence (AI) is becoming increasingly commonplace. Companies and governments use facial recognition technology to verify our identities; virtually every smartphone on the market has mapping and translation apps; and machine learning is an indispensable tool in diverse fields including conservation, healthcare, and agriculture..."
See all Archived IT - Security articles
See all articles from this issue