Strategic advice to leverage new technologies

Technology is at the heart of nearly every enterprise, enabling new business models and strategies, and serving as the catalyst to industry convergence. Leveraging the right technology can improve business outcomes, providing intelligence and insights that help you make more informed and accurate decisions. From finding patterns in data through data science, to curating relevant insights with data analytics, to the predictive abilities and innumerable applications of AI, to solving challenging business problems with ML, NLP, and knowledge graphs, technology has brought decision-making to a more intelligent level. Keep pace with the technology trends, opportunities, applications, and real-world use cases that will move your organization closer to its transformation and business goals.

Subscribe to the Technology Advisor

Recently Published

Drones will have a future positive impact on advanced air mobility, particularly in the area of package delivery. As we explore in this Advisor, drones can be used in this manner to enable sustain­ability while at the same time leaving a relatively small footprint.
Of all the IT projects underway during the past 15 years, only a small proportion can be classified as “bleeding edge.” The vast majority have been mod­ernizations of existing operational IT systems using proven computing technologies. Thus, it is hard to understand why the level of IT failure has remained relatively constant. This Advisor examines the factors underlying these failures.
Yassine Maleh argues that, during the pandemic, companies made hasty infrastructure changes and deviated from their security policies and controls. As businesses recover, he recommends a review of risk management processes in light of pandemic-related changes. He shares practices designed to ensure infrastructure security and resilience and suggests five ways to incorporate risk management into cybersecurity initiatives.
In addition to zero trust and privacy by design, the authors discuss strategies for reducing human-related risk when enterprises are no longer confined to physical spaces. They also call into question some cybersecurity myths that can lead to poor decisions and business practices. The authors argue that while cyber threats are continuously changing and emerging and should remain an area of focus, the ever-expanding attack surface is also a challenge. Another concern to consider is improving security skills, so the authors suggest a decision framework that includes vulnerabilities around social and human elements in addition to physical and information systems.
While the pandemic and enhanced digitalization have introduced more types of cyber threats, the authors assert that most recent high-profile attacks are not very sophisticated. Rather, they happen when basic cybersecurity practices are ignored or overlooked. It is likely that organizations are overestimating certain types of cyber risk, leading to overspending to secure gaps. There is also a danger that overly restrictive practices will reduce employee productivity and stifle innovation. Therefore, a realistic risk assessment after implementation of basic security practices and commensurate controls is important.
This first article of the issue is from a team of cybersecurity researchers from a leading engineering institute in India. They explain how the ubiquitous problem of password authentication can be resolved using Fast Identity Online Alliance’s (FIDO) mechanism.
This inaugural issue of Amplify was carefully organized to encourage dialogue on cyber-resilience strategies and countermeasures. This discussion is extremely relevant, since there is more disruption than ever before, and the truth is that no device is secure! A solid understanding of both risk and resilience is a critical element in every organization’s cybersecurity plan.
CISOs, CIOs, and other technology leaders are well-served with a strong digital- and cyber-savvy corporate board, as are shareholders and other corporate stake­holders. In a world increasingly dependent on complex digital systems for growth and resiliency, ensuring the boardroom is a critical digital and cyber-control point is a necessary and overdue step.