Sat.Jun 01, 2024 - Fri.Jun 07, 2024

article thumbnail

Unauthorized AI is eating your company data, thanks to your employees

CIO

Legal documents, HR data, source code, and other sensitive corporate information is being fed into unlicensed, publicly available AIs at a swift rate, leaving IT leaders with a mounting shadow AI mess.

Data 357
article thumbnail

Decision-Making and Deep Tech with Laura Thomas: Insights from a Former CIA Officer

Ooda Loop

In this episode of OODAcast, Bob Gourley interviews Laura Thomas, a deep tech consultant and former CIA officer. Laura discusses her journey from a small town in North Carolina to a career in the CIA, where she served as a case officer. She emphasizes the importance of critical thinking and decision-making under uncertainty, and how these skills have translated to her work in deep tech.

128
128
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

These Services Shall Not Pass: Abusing Service Tags to Bypass Azure Firewall Rules (Customer Action Required)

Tenable

Azure customers whose firewall rules rely on Azure Service Tags, pay attention: You could be at risk due to a vulnerability detected by Tenable Research. Here’s what you need to know to determine if you’re affected, and if so, what you should do right away to protect your Azure environment from attackers. Tenable Research has discovered a vulnerability in Azure that allows an attacker to bypass firewall rules based on Azure Service Tags by forging requests from trusted services.

Firewall 142
article thumbnail

Testing server calls in generated HTML

Martin Fowler

Matteo Vaccari completes his article on testing template-generated HTML, by looking at how to use TDD with pages that make calls to the server.

Testing 196
article thumbnail

10 Rules for Managing Apache Cassandra

It’s no surprise that Apache Cassandra has emerged as a popular choice for organizations of all sizes seeking a powerful solution to manage their data at a scale—but with great power comes great responsibility. Due to the inherent complexity of distributed databases, this white paper will uncover the 10 rules you’ll want to know when managing Apache Cassandra.

article thumbnail

Onboarding New Employees in a Hybrid Workplace

Harvard Business Review

As you’re navigating hybrid work, it’s a good moment to assess how your onboarding processes enable or empower your new hires to thrive. Researchers at Microsoft have conducted and identified studies that suggest that onboarding to a new role, team, or company is a key moment for building connections with the new manager and team and doing so a few days in person provides unique benefits.

Study 117

More Trending

article thumbnail

Commercial Leadership in the C-Suite: N2Growth’s Expertise

N2Growth Blog

The C-Suite Executives Role in Business Strategy The C-Suite executive team comprises the Chief Executive Officer (CEO), Chief Financial Officer (CFO), Chief Operating Officer (COO), and other high-ranking ‘chief’ executives. This top-level team holds significant decision-making power and deeply influences the company’s trajectory by formulating, implementing, and overseeing long-term strategy to establish sustainable growth for the organization.

article thumbnail

GitHub – On-Prem Server Connectivity Using Self-Hosted Runners

Perficient

Various deployment methods, including cloud-based (e.g., CloudHub) and on-premises, are available to meet diverse infrastructure needs. GitHub, among other tools, supports versioning and code backup, while CI/CD practices automate integration and deployment processes, enhancing code quality and speeding up software delivery. GitHub Actions, an automation platform by GitHub, streamlines building, testing, and deploying software workflows directly from repositories.

Windows 105
article thumbnail

Why Is Kubernetes Debugging So Problematic?

Dzone - DevOps

Debugging application issues in a Kubernetes cluster can often feel like navigating a labyrinth. Containers are ephemeral by design and intended to be immutable once deployed. This presents a unique challenge when something goes wrong and we need to dig into the issue. Before diving into the debugging tools and techniques, it's essential to grasp the core problem: why modifying container instances directly is a bad idea.

Video 96
article thumbnail

Complaints in EU challenge Meta’s plans to utilize personal data for AI

CIO

Meta is facing renewed scrutiny over privacy concerns as the privacy advocacy group NOYB has lodged complaints in 11 countries against the company’s plans to use personal data for training its AI models. NOYB has called on national regulators to take immediate action against Meta in 10 European Union member states and in Norway, arguing that changes to the company’s privacy policy due to enter effect on June 26 would permit the use of extensive personal data, including posts, private images, and

article thumbnail

Generative AI Deep Dive: Advancing from Proof of Concept to Production

Speaker: Maher Hanafi, VP of Engineering at Betterworks & Tony Karrer, CTO at Aggregage

Executive leaders and board members are pushing their teams to adopt Generative AI to gain a competitive edge, save money, and otherwise take advantage of the promise of this new era of artificial intelligence. There's no question that it is challenging to figure out where to focus and how to advance when it’s a new field that is evolving everyday. 💡 This new webinar featuring Maher Hanafi, VP of Engineering at Betterworks, will explore a practical framework to transform Generative AI pr

article thumbnail

How AI Can Make Make Us Better Leaders

Harvard Business Review

Humans are good at inventing tools, but not as good at adapting to the change these tools can cause. While there has been much focus on the technical impacts and potential dark side of AI, the authors’ research has shown that AI can enhance and empower leadership, actually helping make leaders more human. To do this, we need to invest just as much in the development of our human potential as we do in harnessing the power of AI.

article thumbnail

Cybersecurity Snapshot: NIST Program Assesses How AI Systems Will Behave in the Real World, While FBI Has Troves of Decryption Keys for LockBit Victims

Tenable

Check out the new ARIA program from NIST, designed to evaluate if an AI system will be safe and fair once it’s launched. Plus, the FBI offers to help LockBit victims with thousands of decryption keys. In addition, Deloitte finds that boosting cybersecurity is key for generative AI deployment success. And why identity security is getting harder. And much more!

article thumbnail

Creating a Learning Organization: Fostering Continuous Improvement and Innovation

N2Growth Blog

Building a Culture of Continuous Improvement Organizations are increasingly recognizing the importance of evolving into learning organizations to remain competitive and adapt to continuous market changes. A learning organization fosters ongoing learning, innovation, and improvement among its members. Continual improvement is essential for staying competitive.

article thumbnail

Getting infrastructure right for generative AI

CIO

Facts, it has been said, are stubborn things. For generative AI, a stubborn fact is that it consumes very large quantities of compute cycles, data storage, network bandwidth, electrical power, and air conditioning. As CIOs respond to corporate mandates to “just do something” with genAI, many are launching cloud-based or on-premises initiatives. But while the payback promised by many genAI projects is nebulous, the costs of the infrastructure to run them is finite, and too often, unacceptably hi

article thumbnail

Embedding BI: Architectural Considerations and Technical Requirements

While data platforms, artificial intelligence (AI), machine learning (ML), and programming platforms have evolved to leverage big data and streaming data, the front-end user experience has not kept up. Holding onto old BI technology while everything else moves forward is holding back organizations. Traditional Business Intelligence (BI) aren’t built for modern data platforms and don’t work on modern architectures.

article thumbnail

5 Signs Your One-on-Ones Aren’t Working

Harvard Business Review

Despite all that one-on-one meetings can offer, they can be challenging to navigate, whether you’re new to management or have spent several years in a leadership role. Here some signs that your one-on-ones have gone stale, are unproductive, or are falling short of their potential: you don’t want to go to the meeting, you always go over time, you can’t fill the time, you leave every meeting feeling deflated, or you and your direct report are both on second screens.

Meeting 127
article thumbnail

CVE-2024-4577: Proof of Concept Available for PHP-CGI Argument Injection Vulnerability

Tenable

Researchers disclose a critical severity vulnerability affecting PHP installations and provide proof-of-concept exploit code, which could lead to remote code execution. Background On June 6, maintainers of PHP released updates to address a critical vulnerability affecting installations where PHP is used in CGI mode. As part of a coordinated release, researchers at DEVCORE published a blog post with their analysis of the vulnerability and its impact.

PHP 116
article thumbnail

The Next Wave of Digital Transformation: What Leaders Need to Know

N2Growth Blog

The Current Digital Landscape Today’s digital landscape is constantly changing, revolutionizing how businesses and industries operate. Extensive networks, data streams, and state-of-the-art digital technologies are increasingly becoming the foundation of modern operational strategies. The rapid development and widespread adoption of new technologies present both opportunities and challenges for leaders to manage.

article thumbnail

Responsible AI Institute offers new AI policy template

CIO

The Responsible AI Institute has launched an AI policy template designed to help enterprises develop their own company-wide responsible AI policies. Some enterprises struggle with executing a critical step in their AI journeys: developing and establishing AI guardrails and ethical policies within their organization, according to the Texas-based non-profit, whose members include Amazon Web Services, Boston Consulting Group, ATB Financial, and Shell.

Policies 313
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

GenAI Is Leveling the Playing Field for Smaller Businesses

Harvard Business Review

Typically, small to medium enterprises (SMEs) don’t have the resources to hunker down at an annual strategy retreat or to stop everything they’re doing to respond to unexpected emergencies or events that threaten the bottom line. This puts them at a disadvantage compared to their larger competitors. This article shows how AI is proving to be a transformative force for small and medium enterprises.

Strategy 123
article thumbnail

A Pacific Island With Ties to Taiwan Was Hacked. Was It Political? 

Ooda Loop

The U.S. recently finalized plans to give Palau, a group of about 350 small islands in the Pacific Ocean, hundreds of millions of dollars in aid over two decades. Immediately afterwards, the island nation was hit by a cyberattack where over 20,000 documents were stolen from the government.

article thumbnail

Databricks Follows Cloudera by Adopting Iceberg, While Snowflake Mulls Open Source Approach

Cloudera

A constant flow of breaking news from the data lakehouse space is making notable tech headlines this week. On Tuesday, Databricks announced that it will acquire Tabular, a data management company founded by the creators of Apache Iceberg, Ryan Blue, Daniel Weeks, and Jason Reidfor. The deal was for an unconfirmed sum, but some reports suggest that amount to be between $1B and $2B (and allegedly outbidding Snowflake).

article thumbnail

AES enlists AI to boost its sustainable energy business

CIO

American utility and power company AES launched a renewable energy program in mid-2022 that is not only reducing its carbon footprint but adding wealth to its coffer. To achieve that, the Arlington, Va.-based company, which claims to be the top-ranked supplier of renewable energy sales to corporations, turned to machine learning to help forecast renewable asset output, while establishing an automation framework for streamlining the company’s operations in servicing the renewable energy market.

Energy 307
article thumbnail

10 Rules for Managing Apache Kafka

Without proper guidance, it’s easy to miss out on Kafka’s full capabilities. While not the easiest technology to optimize, Kafka rewards those willing to explore its depths. Under the hood, it is an elegant system for stream processing, event sourcing, and data integration. Download this white paper to learn the 10 critical rules that will help you optimize your Kafka system and unlock its full potential.

article thumbnail

How to Work for an Overly Critical Boss

Harvard Business Review

Your boss points out what’s going wrong more often than what’s going right. They nitpick your work, highlighting every possibility for improvement. Meetings sometimes feel like inquisitions. While a generally difficult boss might be challenging due to their mood swings, lack of clarity, or unpredictability, a highly critical boss consistently focuses on “the gap,” not the gain.

How To 122
article thumbnail

GenAI Marks a Shift to Intelligent Experience Orchestration

IDC

GenAI is revolutionizing enterprises with hyper-personalization, like predicting grocery orders and offering tailored promos, enhancing customer experiences and value.

article thumbnail

Beyond Compliance: How the SEC’s Materiality Rules Should Transform Cybersecurity Oversight

Ooda Loop

Assessing materiality of a breach sounds easy. But in reality it will require many corporations to re-think the governance processes they have in place. This post provides insights which can help accelerate improvement of the quality and compliance of materiality decisions. It is based on decades of work in cybersecurity governance and a deep understanding of the new SEC regulations.

article thumbnail

Strategic planning: How CIOs can build the best possible future

CIO

Organizations erroneously believe that 100% of the value of strategic planning for the future lies in determining “what comes next” or putting a stake in the ground regarding “where we want to be.” Most of the real value associated with strategic planning for the future emerges from a nondelusional articulation of the current situation. Just like with Uber or Google Maps, if you want to get where you are going, you have to be very specific about where you are starting from.

article thumbnail

Streamlining Database Compliance with CI/CD Integration

IT leaders know the importance of compliance at every level, but the database often gets left behind as other environments are automated for robust protection. This whitepaper emphasizes the importance of robust, auditable, and secure database change management practices for safeguarding organizational compliance. Learn how automating database compliance: Mitigates risk Protects against security vulnerabilities Helps avoid regulatory penalties Aligns database workflows with app lifecycle Turns d

article thumbnail

The Importance of Setting Boundaries with Your Mentor

Harvard Business Review

In a mentorship, having clear boundaries — along with responses to share when those limits are transgressed — is important for safeguarding your mental health, your privacy, and your productivity. To establish them, have a conversation with your mentor, preferably at the start of the relationship. You can start by flipping the script and asking your mentor about their boundaries first: “Since this is all new, though, I wanted to ask: What boundaries do you want to have around our mentoring relat

115
115
article thumbnail

Unlocking Growth: N2Growth’s Chief Culture Officer Search Excellence

N2Growth Blog

The Role of a Chief Culture Officer Unlike typical executive roles, the Chief Culture Officer holds a special position in cultivating and overseeing the internal corporate culture. The primary responsibility of the CCO is to guarantee that the company’s values, behaviors, and strategic vision are manifested in all operations while ensuring that the organizational culture is in line with its strategic objectives.

Culture 94
article thumbnail

RIP CentOS. Hello AlmaLinux Rocky Linux, CentOS Stream or RHEL

DevOps.com

CentOS 7's official end of life is June 30th. What should a DevOps team do? We help you consider your choices.

Linux 135