Category Archives: Contributors

How the Cloud Is Improving DNA Sequencing

How the Cloud Is Improving DNA Sequencing

DNA Sequencing

For many of us, the cloud is part of our daily lives.

We use these virtual storage servers to hold our pictures, our memories and our work documents, just to name a few. Cloud storage is also making its mark in the medical industry, with electronic health records making patient care easier no matter where you’re making your appointments.

This utilization of virtual information storage is also being used to improve the speed and accuracy of DNA sequencing. How can cloud storage change the way we look at DNA?

The Importance of DNA Sequencing

dna sequencingDNA, which stands for deoxyribonucleic acid, is the smallest building block of life. It’s found in almost all living things on the planet. Your DNA, found in every cell in your body, holds the blueprint that governs why you are the way you are.

Do you have red hair, or blue eyes? That’s written into your DNA. Are you tall, short, fat, skinny or athletic? You guessed it — that’s written into your DNA as well. Do you hate cilantro and think it tastes like soap? Believe it or not, that’s something that’s written into your DNA too.

In that DNA blueprint, there are answers to thousands of questions that we’ve been posing for centuries, including things like how long we’ll live, what diseases we may be predisposed to, and many others. That is where DNA sequencing comes in.

To stick with our same metaphor from a moment ago, you wouldn’t be able to read a blueprint without a key to tell you what different symbols mean, right? DNA sequencing provides researchers with the key to our DNA blueprint. By learning the order of the four base amino acids that make up DNA, researchers can determine which combinations of genes produce what result.

Old Tech, New Tech

Until now, DNA sequencing was performed on non-networked computers. While breakthroughs were being made, they were limited by the small subset of information available and the insufficient computer processing speeds. In other words, individual computers used for DNA sequencing are limited by the amount of processing power that they can possess.

Moore’s Law, coined by Gordon Moore — one of the founders of Intel — suggests that computers are limited by the number of transistors that can be placed on a single chip. He stated that this number would likely double every two years, and all current trends show that even with today’s advances, Moore’s Law still holds true.

Advances in DNA sequencing are appearing exponentially, and in many cases are only being limited by the available processing power.

Predictive Analytics

Predictive analytics, or the study of patterns to make predictions, has already made its way into the medical fields. When applied to DNA sequencing, it’s often dubbed Predictive Genomics. Cloud computing is a key component in the success of predictive genomics for a variety of reasons, including:

  • The amount of data — The sheer amount of data in one human being’s genome is almost mind-boggling. Each individual’s genome has up to 25,000 genes. These genes are made up of almost 3 million base pairs. When you break that down into digital data, you’re looking at upwards of 100 gigabytes of data per person.
  • The cost — Right now, having your personal genetic code sequenced costs between $1,500 and $4,000. This also plays a large role in the high cost of testing for specific genetic markers, like the BRCA1 and BRCA2 genes that indicate a higher chance of breast cancer.

The use of cloud computing and predictive genomics can reduce costs, ensure quality and improve accuracy throughout the world of DNA sequencing.

Amazon, our favorite online shopping mall, is doing what they can to help in the world of cloud computing and genomics. Amazon Web Services provides a cloud computing service that a number of companies, including DNAnexus and Helix, are using to improve the speed and accuracy of their genome sequencing.

There’s an App for That

While sending off a saliva-soaked q-tip to have your DNA tested isn’t a new concept, this is the first time it’s heading to both the cloud and the App Store.

A new startup from Silicon Valley named Helix has recently hit the DNA sequencing market with a new twist on the DNA game. Now, not only can you have your DNA tested for all sorts of information, but you can also have your genetic ancestry analyzed by the minds at National Geographic.

As the icing on the cake, all of your information will be stored on the cloud and accessible through Helix’s app.

Cloud computing is becoming an invaluable tool for a variety of different industries, with DNA sequencing as just the latest in a long line of innovations. As this advancement becomes more mainstream, only time will tell what secrets our DNA holds, and what we’ll be able to do with them once we find them.

By Kayla Matthews

Is Machine Learning Making Your Data Scientists Obsolete?

Is Machine Learning Making Your Data Scientists Obsolete?

Machine Learning and Data Scientists

In a recent study, almost all the businesses surveyed stated that big data analytics were fundamental to their business strategies. Although the field of computer and information research scientists is growing faster than any other occupation, the increasing applicability of data science across business sectors is leading to an exponential deficit between supply and demand.

When a 2012 article in the Harvard Business Review, co-written by U.S. chief data scientist DJ Patil, declared the role of data scientist “the sexiest job of the 21st century,” it sparked a frenzy of hiring people with an understanding of data analysis. Even today, enterprises are scrambling to identify and build analytics teams that can not only analyze the data received from a multitude of human and machine sources, but also can put it to work creatively.

One of the key areas of concern has been the ability of machines to gain cognitive power as their intelligence capacities increase. Beyond the ability to leverage data to disrupt multiple white-collar professions, signs that machine learning has matured enough to execute roles traditionally done by data scientists are increasing. After all, advances in deep learning are automating the time-consuming and challenging tasks of feature engineering.

While reflecting on the increasing power of machine learning, one disconcerting question comes to mind: Would advances in machine learning make data scientists obsolete?

The Day the Machines Take Over

machine

Advances in the development of machine learning platforms from leaders like Microsoft, Google, and a range of startups mean that a lot of work done by data scientists would be very amenable to automation — including multiple steps in data cleansing, determination of optimal features, and development of domain-specific variations for predictive models.

With these platforms’ increasing maturity and ability to create market-standard models and data-exchange interfaces, the focus shifts toward tapping machine-learning algorithms with a “black box” approach and away from worrying about the internal complexities.

However, as with any breakthrough technology, we need to recognize that the impact of the technology is limited unless it is well-integrated into the overall business flow. Some of the most successful innovations have been driven not by a single breakthrough technology but by reimagining an end-to-end business process through creative integration of multiple existing components. Uber and Netflix offer prime examples of intelligence gleaned from data being integrated seamlessly into a company’s process flow. Data scientists play a key role in this by leveraging data to orchestrate processes for better customer experience and by optimizing through continuous experimentation.

While organizations across industries increasingly see a more strategic role for data, they often lack clarity around how to make it work. Their tendency to miss the big picture by looking for “easy wins” and working with traditional data sources means that data scientists have an opportunity to help frame problems and to clearly articulate the “realm of the possible.

From Data to Strategy

It is easy to get carried away by the initial hype that machine learning will be a panacea that can solve all the problems and concerns around its impact on the roles of data science practitioners. However, let us recall the AI winters in the mid-’70s, and later in the ’90s, when the journey to the “promised land” did not pan out.

data-cloud

Today, we don’t see the same concerns as in the past — lack of data, data storage costs, limitations of compute power — but we still find true challenges in identifying the right use cases and applying AI in a creative fashion. At the highest of levels, it helps to understand that machine learning capability needs to translate into one of two outcomes:

  • Interaction: Understanding user needs and building better and more seamless engagement
  • Execution: Meeting customer needs in the most optimal manner with ability to self-correct and fine-tune

Stakeholder management becomes extremely important throughout the process. Framing key business problems as amenable to data-led decision-making (in lieu of traditional gut feel) to secure stakeholder buy-in is critical. Consequently, multiple groups need to be involved in identifying the right set of data sources (or best alternatives) while staying conscious of data governance and privacy considerations. Finally, stakeholders need to be fully engaged to ensure that the insights feed into business processes.

Data Scientists Become Core Change Agents

Given the hype surrounding big data analytics, data scientists need to manage responses that fall on opposite ends of the spectrum by tempering extreme optimism and handling skepticism. A combination of the following skills that go beyond platforms and technology are thus needed:

  • Framing solutions to business problems as hypotheses that will require experimentation, incorporating user input as critical feedback
  • Identifying parameters by which outcomes can be judged and being sensitive to the need for learning and iteration
  • Safeguarding against correlations being read as causal factors
  • Ensuring the right framework for data use and governance, given the potential for misuse

This requires pivoting a data scientist’s remit in a company from a pure data-analysis function into a more consultative role, engaging across business functions. Data scientists are not becoming obsolete. They are becoming bigger, more powerful, and more central to organizations, morphing from technician into change agents through the use of data.

By Guha Ramasubramanian

guha-rGuha heads Corporate Business Development at Wipro Technologies and is focused on two strategic themes at the intersection of technology and business: cybersecurity framed from a business risk perspective and how to leverage machine learning for business transformation.

Guha is currently leading the development and deployment of Apollo, an anomaly detection platform that seeks to mitigate risk and improve process velocity through smarter detection.

Zero-Rating and Data Consumption

Zero-Rating and Data Consumption

Zero-Rating

The ordinary mobile user often feels the need to backup their personal files only after they’ve lost it. It’s almost a cliché where a grad student loses their research because a laptop was lost or the father who loses years worth of their kids photos when their phone is stolen.

To combat this, cloud services have tried to become easier to use. Everything from automatic uploads to cross platform access has been implemented.

However, only one addresses the external circumstance that is the data cap: zero-rating.

To be frank, if not for zero-rating, you could argue that not many people would use the cloud as the round-the-clock backup it was intended to be.

So what is Zero-Rating?

Zero-Rating is the practise of mobile carriers allowing users to use a data-consuming service without counting the data used against their cap. Meaning if video streaming app X is zero-rated, I can as much data as I choose through the app and it would not have an impact on my total data cap with the carrier.

cloudtweaks-pokemon-comic

For example, when Pokemon GO first launched in the US, T-Mobile offered customers a limited time offer where data used through the app had no impact on the customer’s data cap.

In short, it’s an incentive tool for mobile carrier that gives customers access to everything from content streaming to gaming on mobile.

But how does zero-rating affect cloud?

It comes back to the issue of round-the-clock protection.

Even with 3.4 billion mobile users across the world, almost 1 in 3 report data loss on mobile. While the circumstances for data loss varies, a big component of why people don’t backup constantly revolves around data caps. Simply put, no one wants to use precious MB to back up personal files because it’s conceivable that they would lose a device (or data in said device) that is with them 24/7.

Yet, mobile users are a walking contradiction when it comes to valuing their data and backing it up. One study found that while 90% of users value the data on their mobile devices. only 10% reported that they backed up their data on a daily basis. Furthermore, 72% of people polled reported that photos and videos were their most important assets on mobile – and every now and then, you hear about these users who lose chunks of precious moments stored on mobile devices.

mobile-cloud

You could argue that the decision to not back up stems more from our own psyche than any technical obstacle. Psychology Today reports that human beings are ill-prepared to deal with risk that do not pose as an immediate consequence.

In some ways, cloud adoption to prevent data loss suffers from the same branch of logic. While it takes a good personal cloud service less than 5 minutes to upload a day’s worth of photos, many of us don’t think to do it because we fail to foresee a mobile disaster. Hence, when disaster strikes, we may end up missing that pivotal group of files and photos that just so happened to remain in the queue to be uploaded.

This is where zero-rating comes into play.

In the aforementioned study, ‘ease of use’ was cited as the highest obstacle to users backing up their data. I would argue that it’s not easy to use an app intended to be automatic when you have to manually find Wi-Fi and enable the app to operate in those locations.

I mean with zero-rating cloud storage resembles car insurance except it has all the perks and nowhere near the price and headaches insurance companies cost.

So does Zero-Rating work?

Given the adoption of zero-rated service across telecoms across the world, my answer would be that zero-rating certainly has an appeal to customer. However, most of the fanfare as it relates to zero-rating revolves around content and OTT messenger services like HBO GO and WhatsApp rather than any cloud services.

From our own internal research, between cloud options that are provided with zero-service and without it, the difference is staggering. Between two mobile service providers in the same market, cloud options with zero-rating enabled have about 10x more growth in users per month than non-zero-rated clouds. A substantial endorsement for zero-rating cloud if it needed any further validation.

With the advent of services from mobile carriers – such as RCS – zero-rating is set to become even more prevalent than it is now. A trend which we have no doubt, would help reduce that total amount of data loss statistically significantly.

By Max Azarov

IoT, Smart Cities and the Future

IoT, Smart Cities and the Future

Smarter IoT

When we use the term smart cities, a series of frames begin to run in front of our very eyes. The reason behind this is pretty simple; over the last few years, the definition of a ‘SMART CITY’ has changed drastically. However, amidst these series of definitions, two things have remained consistent: Information and Communication Technology (ICT) and the Internet itself.

Here in this article, the latter is our primary point of discussion. As a tremendously growing urban population and various organizations have started to switch over to IoT, I presume that here that an important question arises:

What exactly is IoT in the first place?

Evolution-IoT

Internet of Things, popularly known as IoT, is essentially a networked connection between physical objects to create a dynamic, smarter approach to just about everything we do in our daily lives.

Let us take an example: today, we have abundant access to the internet through our smartphones, tablets, PCs, televisions, etc. and are personally connected with each other through prominent social networking sites like Instagram, Twitter, and Facebook.

While IoT is hard at work making our smart cities smarter, we can save a lot of time and effort, in converting an increasing amount of raw data into final useful information.

For some time now , it has been readily apparent that the use of IoT will not only help the private sector, but also the public sector.

In lieu of this paradigm shift, we have a couple of applications we will be rolling out to assist the cities in becoming smarter.

Mobile applications contributing to building IoT-powered smart cities

In this article, it was mentioned earlier that the IoT entails connectivity between anything and everything. There are certain mobile applications that have been introduced with the same ideas in mind, including:

Tado: An application that will help you control your home heating. The application calculates the distance you have to travel and the time you’ll take to reach home. With the collected data, this gadget will adjust your room heating accordingly. You can more accurately understand how this technology works via the following screen-shot.

  • Smart Lighting: This application allows you to control the lighting in your home or office directly through your smartphone. With this, you can have command over everything, starting from the brightness up to the color. Now, let your surroundings match your mood without any special effort on your part.
  • SIM Tools: SIM is basically known as Smart Identity Management Tools. This application will prevent you from carrying keys all the time with you by giving you a smarter lock system. This gadget will allow you to leave all your worries behind linked with theft or losing/misplacing your keys.
  • Bluesmart Suitcases: This piece of tech belongs to the same family as SIM tools, but this time it’s for your suitcase. With this application loaded in your mobile phone, you can lock and unlock your suitcase with the touch of a button.
  • Flower Power H2O: Imagine having a personalized guide to show you how much water your plants need—all at the right time and in a right manner, and automatically tracked and monitored via your smartphone. Sounds exciting, does it not?

These are just a few members of the IoT family. Mobile apps are indeed a better way to make our IoT-powered smart cities smarter. Here are three benefits of such mobile apps:

1- Ease of Use: This undoubtedly stands first in the list, as smartness is all about doing things in a better way with the least amount of time, resources and effort. And as we all know that these three benefits most important requirements to live a truly smart life.

2- Security: Second on our list is the security that these applications provide. You’ll soon have all the commands in your password-protected smartphone that sits right nearby in your pocket. Be it your home, your locker, or your suitcase—each is waiting for a touch on your smartphone.

3- No more Irregularity: With these IoT applications around, you’ll have better, more consistent knowledge about the things which are not only related to your individual needs, but also with everything around you. With most events happening in real-time and in the way they were meant to, you will barely have to lift a finger and to keep track of things. I don’t think anyone could wish for something better—or rather smarter—than a nice dose of peace and relaxation.

So friends, at this point I must sign out; I trust that the information presented here is of immediate value and use. I hope you will have a smarter life in the (near) future.

By Shahid Mansuri

Combining IoT Gizmo Kits With Your 3D Printer

Combining IoT Gizmo Kits With Your 3D Printer

IoT and 3D Printing

The 3D printer in my cubicle keeps printing name tags without my name and only cube number instead—should I be worried about this?

Imagine a future where an “organizational” 3D printer is stationed in every cube. You are working away on a project, when suddenly the printer comes to life. You remotely check it from time to time, just to see what it is printing. As the object begins to take shape, you recognize it to be a nameplate. Eventually, you see your cube number, but a different name has been printed on the nameplate. Am I unemployed? Am I moving to a new cube? These are just a few questions which may come to mind. Something like this situation could very well happen, and maybe sooner than you might think. I have been using 3D printers for more than four years now, and during that time, I have learned several lessons about 3D materials, printing and ultimately how to start getting up to speed on this amazing tech. First off, there are many 3D printers out there in the market right now.

You can purchase printers that sit in your home and print just about anything you can imagine. You can send a picture of yourself off, and get a 3D print of you. Alternatively, there are companies that offer print services where you send them what you want printed and they print it and send it back to you in a matter of days.

Why, then am I talking about this market and technology on a site that focuses primarily on Big data, Cloud and IoT, you may be asking? Well, that is a very interesting question. The first part of that question is simply that 3D printing is a very intriguing market. For small companies which either create or are considering creating new products, a 3D printer can help them move their dream quickly forward. Building architects can easily print out their designs in three dimensions. No more hours of model building; simply create the 3D file and print your building. Making massive changes to your fleet of planes? That’s ok, create the 3D file again and print away.

In the growing world of new and innovative IoT creations and objects, a 3D printer is a great starting point to launch your idea. You can print the object you are considering to help achieve proof of concept. Then, you can iterate the case, the boards and all of the component pieces. You can design precisely how everything fits together. And you can easily figure out how much will actually fit in your creation.

All of this and more helps innovators perform rapid prototyping and save a lot of time and energy in the process. It allows for the real-time changes in your innovation, which in turn helps it move to production faster (in theory, of course). You can also get printable material that conducts electricity; with the use of a 3D printer or pen, you can print in metal or flexible plastic, and with some of the 3D pens, you can even create a Henna-style tattoo on a person (there are pens that print cool – you cannot use a regular 3D pen on a human, for it would not only burn their skin, but isn’t designed to “stick” onto the skin in the first place).

cloudtweaks-comic-data-3d-printing

Now, the question is: Will a 3D printer be the centerpiece of the home of tomorrow? I’ve seen various future living spaces featuring 3D printers, and I am not convinced that in the majority of people will have one of these things in their living rooms. I do think a number of 3D printers will exist, however. For the most part , the price is far too high now for most people to invest and have one in their home. But in the next few years, we could see a drop in prices to help make 3D printers more of a mainstay in homes and small businesses.

Where I see this technology really making a huge impact—beyond increasing the velocity of innovation itself—is in schools and universities. There are IoT toolkits you can buy right now that include the “guts” of IoT connections, like Bluetooth, Raspberry PI, Wi-Fi and even cellular connections to cloud-based controls. Combine these IoT gizmo kits with a 3D printer, and you now have the capacity to create IoT devices that include custom forms.  Imagine a robot that resembles a Labrador Retriever or a tiny lamp that actually lights up on its own. These are just a few examples of creations that even younger students can dream up.

iot-lamp

So, while I believe there probably won’t be a 3D printer in every living room anytime soon, I do think there will be many 3D-printed objects we can use in our everyday lives. If you wander the various internet sites that offer you 3D objects you can print on demand, or the various companies that have created books to create 3D objects with 3D pens, you will find almost anything you could possibly want to print and use. For schools, inventors, building architects and people that simply dream in all three dimensions, the awesome reality of 3D printing is nearly here.

Now, if someone could direct me to the nearest body shop that can 3D print a fender for my newly dented car, I would be thrilled!

By Scott Andersen

The Cloud Isn’t a Security Issue; It’s a Security Opportunity

The Cloud Isn’t a Security Issue; It’s a Security Opportunity

Security Issue

In order to stay ahead in today’s competitive business landscape, companies need to constantly innovate. Development teams must continually release new products, features or services and cloud technology, along with agile development practices, make this perpetual iterating feasible.

Cloud technology has undoubtedly enabled companies to innovate quickly and frequently, however, historically it’s introduced a myriad of security concerns, often causing development, operations and security teams to become overwhelmed and distracted. Today, though, security doesn’t have to hold back high-velocity, cloud-based product development cycles. Companies can achieve complete cloud security and compliance without a security issue impacting delivery speed, as long as they use the right tools and best practices across their organization.

Security Issue

Below are three key tips companies should consider in order to overcome any lingering security concerns and scale quickly and securely in the cloud:

1. Educate your team

For companies moving to a cloud-based infrastructure for the first time, it’s essential to discuss the change and make sure everyone understands how they will be affected before any data is migrated over. A key part of this discussion should be explaining that security is no longer just about perimeter defense and prevention; understanding the behavior of your workloads, users and environment is critical knowledge that needs to be shared. It’s important that everyone on the development, operations and security teams understand what all of their assets are doing and what’s taking place within the cloud workload at all times, as this is the best way to detect real cloud security threats as soon as they take place.

2. Track the ephemeral

Back in the days of ‘racking and stacking,’ it was easy to know what servers you had and where they were. But with cloud-based infrastructures, one of the key value propositions is elasticity: you might spin up an EC2 instance or cluster, for instance, do some data analysis for an hour or two, and then turn it off. There are advantages to such elasticity; however, it’s crucial to also have the ability to go back in time and view activity to ensure compliance and potentially investigate any risks. Additionally, as you’re building up and burning down, you want to know that those transient systems and workloads were compliant with your security posture. All too often companies focus on catching cloud security incidents only when they’re happening. But to remain consistently secure and compliant, security teams need to be able to ‘rewind’ and look at instances that may no longer exist.

3. Embrace software-defined everything

The beauty of the software-defined nature of the cloud is that it can actually make security teams’ jobs easier; they’re able to inject themselves throughout the infrastructure landscape and lifecycle. They no longer need to figure out how to capture information from switches, routers, and other devices at various layers of the network and try to correlate the data, because it’s all tied together. Additionally, integrations with tools like PagerDuty and Slack enable internal dialogues that empower non-security team members to collaborate on detection and response to potential issues. And when it’s time for security teams to intervene and investigate, deep audit trails make it possible to track not just whether a user logged in, but what processes they kicked off (and whether it was really them).

Some companies think cloud technology introduces a new layer of vulnerability, however in reality, it’s just the opposite. The cloud presents companies with an opportunity to evaluate their security requirements and reconsider their strategy and processes. It can enable security teams to focus on more strategic initiatives and also improve collaboration with Operations and Engineering teams. This, in turn, allows development, operations and security teams to spend more time on projects that drive real business value and less time frantically checking for potential security gaps.

Don’t let a past security issue prevent your company from migrating to the cloud and reaping its benefits. Discuss the change in detail and address any concerns with everyone in your organization well in advance. Track historical instances in order to ensure security and compliance, and consider implementing a cloud security solution to help gain deep insight into your environment in real-time, because software-defined everything is only possible with complete visibility (and vice versa).

By Chris Gervais

Why An Inside-Out Approach to Cloud Security Is Your Safest Bet

Why An Inside-Out Approach to Cloud Security Is Your Safest Bet

Cloud Security

In September, McKinsey released what might be looked back upon as a seminal survey. It opened the report with a simple, powerful declaration: “The cloud debate is over.” The data told a story that the pace of IT workloads moving to cloud is now at a “material” level and the impact would ripple across the industry. The survey reaffirmed the view of CIO’s and IT executives that security and compliance continue to be the top concerns of cloud adoption.

Now that the cloud is just accepted as a safe and viable growth path, it’s important that decision makers think about budgeting for cloud security differently. They are no longer buying hardware appliances and enterprise software. They need agile SaaS tools that can can scale and adapt to their cloud-based infrastructures to grow confidently and allow them to move even faster.

The Current State of Cloud Security

The growth of cloud adoption brings with it a serious need for more disciplined security practices. Between the MICROS/Oracle breach, the SWIFT Network attacks and a rash of healthcare industry data breaches, it seems every week there’s another major story about vulnerable data getting into the wrong hands. In today’s cloud-based business landscape, it’s no longer a question of if your organization will be targeted; it’s when.

complience-cloud-risks

While major cybersecurity breaches continue to dominate the news, the reality is only 3% of companies experience catastrophic losses worth more than $1 million. Smaller, internal threats are far more common for most organizations, and they can still cost companies significant capital. In fact, the Ponemon Institute found that insider activity is the most expensive ongoing cybersecurity threat to date, costing companies an average of $144,542 annually.

To combat cybercrime and proactively protect your organization, a more evolved approach to cloud security is necessary. Many organizations implement an outside-in approach, working to protect their infrastructure perimeter and company assets from malicious intruders who may be trying to gain access. However, this approach doesn’t take into account the possibility of internal threats, or hackers who have already gained access. Organizations and cloud security professionals need to focus on thwarting the advanced threats within cloud environments themselves, all while maintaining total compliance, of course.

This inside-out approach to cloud security isn’t always easy, however, and it can be made more difficult by the fact that cloud security professionals capable of handling the cloud’s advanced threats and compliance issues are becoming increasingly rare. Case in point? Cybersecurity Ventures found that the cybersecurity workforce shortage is expected to reach 1.5 million by 2019. This is creating a need for better tools to help operations teams level-up on security, thus improving operational efficiency. The big benefit: empowering those closest to the infrastructure to make the rapid changes necessary to improve security and continuously manage their security state over time.

Inside-Out Cloud Security Monitoring Considerations

Monitoring needs to occur at the workload layer, because here, activity can be monitored across multiple areas deep within the environment to accurately identify and stop inappropriate internal behavior before it causes damage.

security watch

It’s equally important for organizations to consider their Operations team when evaluating cloud security monitoring services or tools. Given the increasing overlap between Operations and security, monitoring tools should be able to integrate security alerts directly into “DevOps” workflows so teams can respond quickly and with context about what occurred. In other words, security information needs to move to where your teams are working every day and you need to choose platforms that can integrate easily and surface alerts and context in situations that matter.

One example of an inside-out approach to cloud security monitoring includes vulnerability management, which is used for scanning three key areas particularly prone to attacks: web applications, operating systems and everyday packages. With access to production, for example, a misguided or malicious employee could easily install an unauthorized package in your base AMI, or worse yet, install a package directly on production environments. With vulnerability management implemented as an inside-out strategy, however, DevOps teams can verify the attack surface of every installed package before it goes live and wreaks havoc.

By continuously monitoring for suspicious or unauthorized behaviors, organizations can identify internal threats before they spiral out of control. Real-time cloud security monitoring can aid organizations in their efforts to combat cybercrime and thankfully, such technology doesn’t require designated, in-house security professionals. However, it’s important to ensure monitoring is conducted from within the cloud workload itself and that it provides immediate and actionable alerts so DevOps teams can rapidly plan and carry out effective remediation. Lastly, to effectively protect your organization’s data, systems, customers and brand reputation, it’s critical to implement monitoring technology that can analyze normal system behavior as well as anomalous trends, so that any new or suspicious activities can be swiftly identified and contained before a breach occurs.

By Chris Gervais

Lessons for Corporate Board Members from the Colin Powell E-mail Hack

Lessons for Corporate Board Members from the Colin Powell E-mail Hack

Corporate Board Member Security

It’s every company’s worst nightmare: waking up to find your confidential company information plastered across The Wall Street Journal. Salesforce was a victim of just that when Colin Powell, a corporate board member, had his emails hacked and posted on DCleaks. One email contained a confidential slide deck detailing acquisition targets being considered by Salesforce. Although this information likely wasn’t what the hackers were looking for when they gained access to Powell’s private emails, Salesforce became the latest victim of this type of cybercrime.

There were 14 potential targets on the list that included Adobe, LinkedIn, Pegasystems, Box and Hubspot. Although several of these companies, such as LinkedIn and NetSuite, were already acquired this year, many others are still available and potentially in play. Powell has accidentally leaked some of Salesforce’s growth and innovation strategy, which Salesforce’s competitors are now privy to. It’s conceivable that a competitor could use the leaked information for their own benefit and swoop in to make a deal.

Many companies have strict internal information-sharing policies, but board members often are not required to follow the same rules, even though they have access to extremely sensitive information such as earnings reports, C-suite level communications and M&A target lists. Using email or consumer-grade file sharing apps to share sensitive corporate files exposes companies to a wide range of risks, and the consequences can be dire. Public embarrassment and damaged reputation aside, board members have been named in shareholder lawsuits as a result of data breaches, and activist investors have successfully removed board members after a breach.

board-business

Board members should be taking proactive steps to better protect their sensitive information and improve online security. However, it is important to remember that the ultimate responsibility for securing the board data lies with the company. The following tips aren’t groundbreaking, but they work, and are too often overlooked and forgotten:

  • Create strong, unique passwords for any site you access. Don’t reuse passwords, especially for important applications like online banking or file storage.
  • Only use file sharing services with two-factor authentication. This means, for example, that, when you log in from a new computer and enter your password, you’ll have to enter a code before you can access the account. This will rule out consumer-grade apps with a potentially lower security threshold than enterprise-level apps.
  • Separate business and personal files. It’s never a good idea to share personal information and business data through the same file sharing service or account. Many employers have rules against storing business information in consumer-grade file sharing tools, which is why they blacklist these types of applications.
  • Monitor your accounts regularly to catch theft or suspicious activity early on and reduce potential damage. In this case, Powell was a victim of a spear-phishing attack, where hackers target individuals with personally relevant information. Always assume you could be at risk.
  • Remember that email has been proven, time and again, unsafe for sharing confidential information. If a document needs to be shared externally, ensure you are using a secure file sharing system, not email, so that if the document falls into the wrong hands nobody else can open the file.
  • Consider applying expiration dates to files to time-bound documents.
  • Be extremely prudent about where you store your data.

Corporate board members ignore cybersecurity best practices at their own peril. This goes double for board members with a high profile like Colin Powell, who can be targeted by ‘hacktivists’ for a variety of reasons unrelated to their board positions. Don’t let you or your company become the next casualty in our cyber-insecure world.

By Daren Glenister

CloudTweaks Comics
Digital Marketing Driven by Cloud, Big Data and IoT

Digital Marketing Driven by Cloud, Big Data and IoT

Digital Marketing Successful digital marketing campaigns are being driven largely by trending technologies, specifically the Internet of Things (IoT), Big Data, and The Cloud. These may be used for a huge number of marketing applications, from optimizing the performance of sports teams to improving science and research, even helping to aid law enforcement. Amazon Web…

Smart Connected Cities Must Learn To Efficiently Collaborate

Smart Connected Cities Must Learn To Efficiently Collaborate

Smart City Collaboration A study from research firm Gartner demonstrates how smart and connected cities require a large number of players to collaborate efficiently, in order to unlock the huge potential associated with cities of the future. The study focused on Europe and showed clearly how a number of Northern European and Scandinavian mid-size cities…

Cloud Computing Price War Rages On

Cloud Computing Price War Rages On

Cloud Computing Price War There’s little question that the business world is a competitive place, but probably no area in business truly defines cutthroat quite like cloud computing. At the moment, we are witnessing a heated price war pitting some of the top cloud providers against each other, all in a big way to attract…

The CloudTweaks Archive - Posted by
5 Considerations You Need To Review Before Investing In Data Analytics

5 Considerations You Need To Review Before Investing In Data Analytics

Review Before Investing In Data Analytics Big data, when handled properly, can lead to big change. Companies in a wide variety of industries are partnering with data analytics companies to increase operational efficiency and make evidence-based business decisions. From Kraft Foods using business intelligence (BI) to cut customer satisfaction analysis time in half, to a…

The Monstrous IoT Connected Cloud Market

The Monstrous IoT Connected Cloud Market

What’s Missing in the IoT? While the Internet of Things has become a popular concept among tech crowds, the consumer IoT remains fragmented. Top companies continue to battle to decide who will be the epicenter of the smart home of the future, creating separate ecosystems (like the iOS and Android smartphone market) in their wake.…

Cloud Infographic – Disaster Recovery

Cloud Infographic – Disaster Recovery

Disaster Recovery Business downtime can be detrimental without a proper disaster recovery plan in place. Only 6% of businesses that experience downtime without a plan will survive long term. Less than half of all businesses that experience a disaster are likely to reopen their doors. There are many causes of data loss and downtime —…

Infographic: IoT Programming Essential Job Skills

Infographic: IoT Programming Essential Job Skills

Learning To Code As many readers may or may not know we cover a fair number of topics surrounding new technologies such as Big data, Cloud computing , IoT and one of the most critical areas at the moment – Information Security. The trends continue to dictate that there is a huge shortage of unfilled…

Four Reasons Why CIOs Must Transform IT Into ITaaS To Survive

Four Reasons Why CIOs Must Transform IT Into ITaaS To Survive

CIOs Must Transform IT The emergence of the Cloud and its three delivery models of Infrastructure as a Service (IaaS), Software as a Service (SaaS) and Platform as a Service (PaaS) has dramatically impacted and forever changed the delivery of IT services. Cloud services have pierced the veil of IT by challenging traditional method’s dominance…

The Industries That The Cloud Will Change The Most

The Industries That The Cloud Will Change The Most

The Industries That The Cloud Will Change The Most Cloud computing is rapidly revolutionizing the way we do business. Instead of being a blurry buzzword, it has become a facet of everyday life. Most people may not quite understand how the cloud works, but electricity is quite difficult to fathom as well. Anyway, regardless of…

How Big Data Is Influencing Web Design

How Big Data Is Influencing Web Design

How Big Data Is Influencing Web Design For all you non-techies… You’re probably wondering what big data is (I know I was….a few years back) so let’s get the definitions out of the way so we’re on the same page, okay? Big data is A LOT of data – really, it is. It is a…

Technology Influencer in Chief: 5 Steps to Success for Today’s CMOs

Technology Influencer in Chief: 5 Steps to Success for Today’s CMOs

Success for Today’s CMOs Being a CMO is an exhilarating experience – it’s a lot like running a triathlon and then following it with a base jump. Not only do you play an active role in building a company and brand, but the decisions you make have direct impact on the company’s business outcomes for…

The Future Of Cloud Storage And Sharing…

The Future Of Cloud Storage And Sharing…

Box.net, Amazon Cloud Drive The online (or cloud) storage business has always been a really interesting industry. When we started Box in 2005, it was a somewhat untouchable category of technology, perceived to be a commodity service with low margins and little consumer willingness to pay. All three of these factors remain today, but with…

5 Things To Consider About Your Next Enterprise Sharing Solution

5 Things To Consider About Your Next Enterprise Sharing Solution

Enterprise File Sharing Solution Businesses have varying file sharing needs. Large, multi-regional businesses need to synchronize folders across a large number of sites, whereas small businesses may only need to support a handful of users in a single site. Construction or advertising firms require sharing and collaboration with very large (several Gigabytes) files. Financial services…

Data Breaches: Incident Response Planning – Part 1

Data Breaches: Incident Response Planning – Part 1

Incident Response Planning – Part 1 The topic of cybersecurity has become part of the boardroom agendas in the last couple of years, and not surprisingly — these days, it’s almost impossible to read news headlines without noticing yet another story about a data breach. As cybersecurity shifts from being a strictly IT issue to…

The Rise Of BI Data And How To Use It Effectively

The Rise Of BI Data And How To Use It Effectively

The Rise of BI Data Every few years, a new concept or technological development is introduced that drastically improves the business world as a whole. In 1983, the first commercially handheld mobile phone debuted and provided workers with an unprecedented amount of availability, leading to more productivity and profits. More recently, the Cloud has taken…

Disaster Recovery – A Thing Of The Past!

Disaster Recovery – A Thing Of The Past!

Disaster Recovery  Ok, ok – I understand most of you are saying disaster recovery (DR) is still a critical aspect of running any type of operations. After all – we need to secure our future operations in case of disaster. Sure – that is still the case but things are changing – fast. There are…

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Cloud Email Migration In today’s litigious society, preserving your company’s data is a must if you (and your legal team) want to avoid hefty fines for data spoliation. But what about when you move to the cloud? Of course, you’ve probably thought of this already. You’ll have a migration strategy in place and you’ll carefully…

Do Not Rely On Passwords To Protect Your Online Information

Do Not Rely On Passwords To Protect Your Online Information

Password Challenges  Simple passwords are no longer safe to use online. John Barco, vice president of Global Product Marketing at ForgeRock, explains why it’s time the industry embraced more advanced identity-centric solutions that improve the customer experience while also providing stronger security. Since the beginning of logins, consumers have used a simple username and password to…