Book review: Demystifying IT

This written by Ladi Adefala. I first met Ladi at a security conference where he was a speaker, and liked him immediately, not just because he played some Madonna before he took the stage. Ladi’s professional background includes stints at Accenture, Red Hat Consulting, AT&T, World Wide Technology and Fortinet. He now has his own consultancy where he specializes in cybersecurity and executive leadership services, helping organizations, CEOs and board directors with their IT and security strategy. I thought given his background he would be a great reviewer for this new book. Take it away Ladi.

If you are a small business and you are struggling to be effective in using digital technology, then you should read a new book, Demystifying IT, by Bhopi Dhall and Saurajit Kanungo. The two are experienced IT managers who will help you resolve some of your issues and help leverage your IT to produce greater business benefits.

Many of these struggles aren’t new problems, especially for this market. IT is often seen as a cost center and not to drive bigger profits. The authors demonstrate this mindset is a leadership failure, something that I have experienced first-hand when consulting with many of my small business clients. These failures take one of two potential paths:

  1. Lack of any eureka moments: Leaders that haven’t yet had an insightful encounter about IT’s strategic value tend to remain stuck with the IT-as-overhead mindset. True insight changes an organization’s core belief and pushes everyone into some unified action, working towards a common goal.
  2. Fears brought on by past failures: The second reason is the long shadow cast by past failures with IT projects. Leaders avoid engaging in major IT projects that would drive measurable business impact simply because they’ve had a previous bad experience. Just because our last ERP system implementation failed or was painful doesn’t mean we shouldn’t upgrade our ERP system or change it.

I once tried to get one client to implement using electronic funds transfers rather than mailing printed checks, something that would have saved them $200,000 annually. Two years later, the CEO had his eureka moment.

I have also worked with organizations who have kept their core IT application system for twenty years without a major upgrade, partly because of some ancient, failed implementation experience. Here’s the surprising part for me, they didn’t know it had been that long since an upgrade until they overcame this failure moment and made the move to a modern cloud-based system.

The most effective IT strategies is to appeal to both the head and the heart. This book provides numerous examples and stories of how organizations have leveraged IT in practical and meaningful ways. The trick is to align their leadership teams to both the business and IT functions and for everyone to work together. And for the CEO to be fully behind this as well, something that the McKinsey co-authors of CEO Excellence focused on in their book. A CEO’s mindset has to reflect this commitment for IT to succeed in driving a business’ success.

If CEOs and board directors of organizations have a desire to increase their effectiveness and business performance in the digital economy, I would encourage you to invest some time in reading this book. By doing so, you’d have sown a seed that’ll yield a significant harvest now and in the future.

Red Cross blog: Helping veteran Burl Brooks

Burl Brooks walked into the Southern Missouri American Red Cross chapter in Springfield, Mo. Looking for a better winter coat and left with a new bicycle. Well, almost. While it wasn’t an immediate transaction, Brooks took advantage of a unique program that the chapter administers with its partnership with the United Way of the Ozarks through its Veterans Fund. I interviewed him for the chapter’s blog here.

 

 

 

SiliconANGLE: It won’t be long before we are all chatbot prompt engineers

Back in January, Andrej Karpathy, who now works for OpenAI LP and used to be the director of artificial intelligence for Tesla Inc., tweeted: “The hottest new programming language is English.” Karpathy was only semiserious, yet he has identified a new career path: AI chatbot prompt engineer. It could catch on.

The term describes the people who create and refine the text prompts that users type into the chatbot query windows — hence the use of English, or any other standard human language. These types of engineers don’t need to learn any code, but they do need to learn how the AI chatbots work, what they’re good at doing and what they’re not good at doing.

I interviewed several experts about whether the discipline will become its own career path in my post for SiliconANGLE here.

SiliconANGLE: ChatGPT detectors still have trouble separating human and AI-generated texts

The growth of ChatGPT and other chatbots over the past year has also stimulated the growth of software that can be used to detect whether a text is most likely to originate from these automated tools. That market continues to evolve, but lately there is some mixed news that not all detector programs are accurate, and at least one has actually been discontinued.

I examine two different academic reviews of several of these detector tools, and how they have failed under varying circumstances, for my post for SiliconANGLE here.

SiliconANGLE: That Chinese attack on Microsoft’s Azure cloud? It’s worse than it first looked

The revelations last week that Chinese hackers had breached a number of U.S. government email accounts indicate the problem is a lot worse than was initially thought, according to new research today by Wiz Inc. Indeed, this hack could turn out to be as damaging and as far-reaching as the SolarWinds supply chain compromises of last year.

In my post for SiliconANGLE, I summarize what Wiz learned about the attack, what you have to do to scan and fix any potential problems, and why people who choose “login with Microsoft” are playing with fire.

SiliconANGLE: The state of collaboration: It’s the people, not the tech, who make it all work

Business collaboration is finally fulfilling its promise — but less because of new technology than people finding better ways to use it.

The technology has gotten a boost, thanks to post-COVID distributed work teams that have embraced video conferencing and instant messaging. But figuring out the collaboration workflows isn’t just choosing between Microsoft Teams and Zoom. but becoming more adept about when and how to work with others. In other words, having the right people with the right mindsets and operating under the right corporate culture are more important than having the right technical infrastructure.

My take on the evolution of collaboration tools for SiliconANGLE can be found here.

Next week, tune in for this webinar that I am doing for Vonage that will cover this ground in more detail.

SiliconANGLE: Attackers target the Domain Name System, the internet’s phone book. Here’s how to fight back

The foundational Domain Name System, essentially the phone book for the internet, used to be something nobody using the net much noticed, but lately it has become more of a target, and the cost of attacks against it are huge and growing.

Recent events have once again brought issues involving the DNS, as it’s called for short, to the forefront.

One reason has to do with the expansion of the internet. There are more targets, more bandwidth and more automated tools to launch attacks, making it easier for the bad guys to cast a wider net with more destructive power.

I explore the role of DNS, the collection of various attacks, and the role this protocol plays in my latest story for SiliconANGLE here.

 

SiliconANGLE: Understanding these nine ransomware stages can help harden cyber defenses

Ransomware payouts are on track to make 2023 another banner year for criminals, netting more than $440 million since January, according to a recent analysis by Chainalysis. But there are ways for organizations to blunt the impact. Ransomware continues to be a growth business opportunity for criminals, whether or not victims pay up, because stolen data carries a certain value on the dark web, the shady corner of the internet reachable with special software.

For my latest post for SiliconANGLE, I put together a nine-stage model for how ransomware operates, to bring some clarity and be useful in figuring out how to detect an attack before it develops into a full-on multidimensional threat.

SiliconANGLE: Managing supercloud authentication remains tricky – with no easy solution in sight

Authenticating people and apps in the cloud stretch SSO tools to the breaking point, not helped by sloppy access controls, continuous auth and rising MFA bypass hacks — read my analysis for SiliconANGLE here. The issues stemming from poorly provisioned containers, inconsistent access rights and over-privileged users will remain for the near future — all the more so as clouds become more pervasive and more complex.