Sectigo’s Chief Strategy Officer and CISO Advisor David Mahdi Accepted To Fast Company Executive Board – StreetInsider.com

News and research before you hear about it on CNBC and others. Claim your 1-week free trial to StreetInsider Premium here.

ROSELAND, NJ, Sept. 28, 2022 (GLOBE NEWSWIRE) -- Sectigo, a global leader in digital certificates and automated Certificate Lifecycle Management (CLM), today announced its Chief Strategy Officer and CISO Advisor, David Mahdi, has been accepted to the Fast Company Executive Board, an invitation-only professional organization of leaders who share a commitment to shaping the future of business.

Mahdiwas selected to join the organization based on his expertise and proven track record in cybersecurity and digital trust spaces. Mahdi joined Sectigo to expand the companys leadership in the digital trust space and previously served as a VP analyst at Gartner. Mahdi advises clients and executives on topics ranging from cybersecurity, Identity Access Management (IAM), blockchain, PKI, IoT, and cloud and data security. With a career spanning 20 years, Mahdi has significant experience in areas such as hardware and software development, endpoint security, PKI, cryptography, blockchain, and digital identity (IAM).

In a remote and hybrid work world, establishing digital trust for the massive amounts of human and machine identities accessing systems and data is critical to conduct business securely. An identity-first security approach must be a top priority for enterprises and the world, especially as we embark on the journey to Web 3.0 and the metaverse. I am honored to join the Fast Company Executive Board to connect with and learn from fellow business leaders across all sectors and sharemy expertise on digital business strategies to Fast Company readers, Mahdi said.

As a member, Mahdi will get access to a dedicated online platform designed to foster connections and information sharing. Through lively discussions, virtual events, and online meetups, members will help each other solve business challenges and celebrate successes. Members also can publish relevant professional insights on FastCompany.com and participate in ExpertPanel discussions that are compiled into articles with the latest industry thinking from a diverse group of experts.Read Mahdis latest articlehere.

We are pleased to accept Mr. Mahdi into the Fast Company Executive Board. When leaders gather in curated, private settings, they can collaborate and create new business opportunities across a broad range of industries. Mr. Mahdi brings valuable professional insights and accomplishments to this group, said Scott Gerber, Founder of Fast Company Executive Board.

Founded in 2021, Fast Company Executive Board is a private, vetted professional organization that gives its members a unique, industry-leading peer group. Members are business leaders in the worlds of corporate leadership, design, media, entertainment, technology, social responsibility, marketing, advertising, social impact, and nonprofit who have been selected for their expertise and track record. Learn more athttps://board.fastcompany.com.

About Sectigo

Sectigo is a leading provider of digital certificates and automated Certificate Lifecycle Management (CLM) solutions - trusted by the worlds largest brands. Its cloud-based universal CLM platform issues and manages the lifecycles of digital certificates issued by Sectigo and other Certificate Authorities (CAs) to secure every human and machine identity across the enterprise. With over 20 years of experience establishing digital trust, Sectigo is one of the longest-standing and largest CAs with more than 700,000 customers, including 36% of the Fortune 1000. For more information, visitwww.sectigo.com.

See original here:
Sectigo's Chief Strategy Officer and CISO Advisor David Mahdi Accepted To Fast Company Executive Board - StreetInsider.com

‘Protestware’ is on the rise, with programmers self-sabotaging their own code. Should we be worried? – The Conversation Indonesia

In March 2022, the author of node-ipc, a software library with over a million weekly downloads, deliberately broke their code. If the code discovers it is running within Russia or Belarus, it attempts to replace the contents of every file on the users computer with a heart emoji.

A software library is a collection of code other programmers can use for their purposes. The library node-ipc is used by Vue.js, a framework that powers millions of websites for businesses such as Google, Facebook, and Netflix.

This critical security vulnerability is just one example of a growing trend of programmers self-sabotaging their own code for political purposes. When programmers protest through their code a phenomenon known as protestware it can have consequences for the people and businesses who rely on the code they create.

My colleague Raula Gaikovina Kula and I have identified three main types of protestware.

Malignant protestware is software that intentionally damages or takes control of a users device without their knowledge or consent.

Benign protestware is software created to raise awareness about a social or political issue, but does not damage or take control of a users device.

Developer sanctions are instances of programmers accounts being suspended by the internet hosting service that provides them with a space to store their code and collaborate with others.

Modern software systems are prone to vulnerabilities because they rely on third-party libraries. These libraries are made of code that performs particular functions, created by someone else. Using this code lets programmers add existing functions into their own software without having to reinvent the wheel.

The use of third-party libraries is common among programmers it speeds up the development process and reduces costs. For example, libraries listed in the popular NPM registry, which contains more than 1 million libraries, rely on an average of five to six other libraries from the same ecosystem. Its like a car manufacturer who uses parts from other manufacturers to complete their vehicles.

These libraries are typically maintained by one or a handful of volunteers and made available to other programmers for free under an open-source software license.

The success of a third-party library is based on its reputation among programmers. A library builds its reputation over time, as programmers gain trust in its capabilities and the responsiveness of its maintainers to reported defects and feature requests.

If third-party library weaknesses are exploited, it could give attackers access to a software system. For example, a critical security vulnerability was recently discovered in the popular Log4j library. This flaw could allow a remote attacker to access sensitive information that was logged by applications using Log4j such as passwords or other sensitive data.

What if vulnerabilities are not created by an attacker looking for passwords, but by the programmer themselves with the intention to make users of their library aware of a political opinion? The emergence of protestware is giving rise to such questions, and responses are mixed.

Read more: What is Log4j? A cybersecurity expert explains the latest internet vulnerability, how bad it is and what's at stake

A blog post on the Open Source Initiative site responds to the rise of protestware stating protest is an important element of free speech that should be protected but concludes with a warning:

The downsides of vandalising open source projects far outweigh any possible benefit, and the blowback will ultimately damage the projects and contributors responsible.

What is the main ethical question behind protestware? Is it ethical to make something worse in order to make a point? The answer to this question largely depends on the individuals personal ethical beliefs.

Some people may see the impact of the software on its users and argue protestware is unethical if its designed to make life more difficult for them. Others may argue that if the software is designed to make a point or raise awareness about an issue, it may be seen as more ethically acceptable.

From a utilitarian perspective, one might argue that if a form of protestware is effective in bringing about a greater good (such as political change), then it can be morally justified.

From a technical standpoint, we are developing ways to automatically detect and counteract protestware. Protestware would be an unusual or surprising event in the change history of a third-party library. Mitigation is possible through redundancies for example, code that is similar or identical to other code in the same or different libraries.

The rise of protestware is a symptom of a larger social problem. When people feel they are not being heard, they may resort to different measures to get their message across. In the case of programmers, they have the unique ability to protest through their code.

While protestware may be a new phenomenon, it is likely here to stay. We need to be aware of the ethical implications of this trend and take steps to ensure software development remains a stable and secure field.

We rely on software to run our businesses and our lives. But every time we use software, were putting our trust in the people who wrote it. The emergence of protestware threatens to destabilise this trust if we dont take action.

Read more: What does the Optus data breach mean for you and how can you protect yourself? A step-by-step guide

See original here:

'Protestware' is on the rise, with programmers self-sabotaging their own code. Should we be worried? - The Conversation Indonesia

Finding the path for UiPath – Protocol

Hello and welcome to Protocol Enterprise! Today: how UiPath co-CEO Rob Enslin thinks process automation will evolve inside the enterprise, how Suses Melissa Di Donato decided to leave the U.S. and build a career in Europe, and new steps toward securing open-source software start to emerge.

UiPath has had a shaky history. The company, which helps companies automate business processes, went public in 2021 at a valuation of more than $30 billion, but now the companys market capitalization is only around $7 billion.

Now UiPath is hoping the addition of Rob Enslin as co-CEO can turn things around through financial discipline and an increased focus on global expansion. I recently spoke with Enslin about why he joined UiPath, the untapped potential of automation, and how he plans to lead alongside founder Daniel Dines.

Read the full Q&A here.

Aisha Counts (email | twitter)

Digital is an ongoing process, not a destination. West Monroe knows that becoming a digital organization requires a mindset shift that will impact processes and employees at all levels, and that success can be achieved if the organization is aligned toward a clear vision.

Learn more

A native New Yorker, Melissa Di Donato made a life-changing decision back in 2005 when she packed up for Europe to further her career in technology. Then with IBM, she made London her new home base.

Today, Di Donato is CEO of Germanys Suse, now a 30-year-old, open-source enterprise software company that specializes in Linux operating systems, container management, storage, and edge computing. As the companys first female leader, she has led Suse through the coronavirus pandemic, a 2021 IPO on the Frankfurt Stock Exchange, and the acquisitions of Kubernetes management startup Rancher Labs and container security company NeuVector.

Being an American in Europe is unique, Di Donato said. Being an American leading a tech company thats listed in Germany is unique. Being a female American running a German tech company on the SDAX is even more unique at the size of our company.

Read the full collection of Di Donatos comments on building a business and a career in Europe here.

In todays global landscape, cybersecurity threats are something that every business operating on the internet must face, not just enormous tech companies. In this Protocol virtual event on Oct. 4 at 10 a.m. PT, well examine the current best practices for securing both large and small to medium-sized businesses, providing viewers with a true threat landscape and information they can use to make decisions about the strategy that best supports their business goals.

Protocol Enterprises Kyle Alspach will be joined by a great panel of speakers: Andrew Rubin, co-founder and CEO, Illumio; Alex Weinert, vice president and director of identity security, Microsoft; Jameeka Green Aaron, chief information security officer, Auth0; and Devdatta Akhawe, head of security, Figma.

RSVP here.

As any DevOps team knows, when creating an application, there's a lot more involved than just writing some code. And that means there's a lot more to secure, too.

So, yes, addressing the various challenges around code security are important; the latest effort along these lines, a bill aimed at securing the use of open-source software in the federal government and critical infrastructure, just cleared the Senate Homeland Security and Governmental Affairs Committee today, in fact.

But as necessary as it is, this covers just one piece of what's known as the "software supply chain." And as supply chains are known to be, it's pretty complicated: Even a small software development environment can have five to seven different tools, with a number of different phases required to create a piece of software, Aqua Security's Eilon Elhadad told me. "You need to secure the process, you need to secure the tools themselves," Elhadad said. "You need to secure a lot of things."

Aqua is among the vendors aiming to help with that: Last week, the company debuted what it's calling an "end-to-end software supply chain security solution" covering the multiple software development phases that need to be protected against attacks. Elhadad pointed to the most infamous software supply chain attack in the U.S., the SolarWinds breach in 2020, as supporting evidence for this type of approach.

Investigators believe the initial compromise of SolarWinds happened after the code was written, during what's known as the build phase; at that point, the code was already in the process of being converted into an executable program. In other words, efforts to use only secure open-source code, or to employ a standard software bill of materials to check for vulnerable components, are great but they're not going to help with that particular type of attack.

Digital is an ongoing process, not a destination. West Monroe knows that becoming a digital organization requires a mindset shift that will impact processes and employees at all levels, and that success can be achieved if the organization is aligned toward a clear vision.

Learn more

Thanks for reading see you tomorrow!

More:

Finding the path for UiPath - Protocol

We interviewed Linux OS through an AI bot to discover its secrets – Ars Technica

Enlarge / A world-exclusive interview between man and machine.

Aurich Lawson / Getty Images

Millions of people use Linux every day, but we rarely stop to think about how the operating system feels about it. Wouldn't it be nice to know what Linux really thinks about open source, Windows, Macs, and the command line? Until now, this has been impossible. But thanks to a new AI chat tool, we're able to find out.

Two weeks ago, a website called Character.AI opened a public beta that allows visitors to create a chat bot based on any character they can imagine. You input a few parameters, and the AI does the rest using a large language model similar to GPT-3. So we called forth "The Linux OS" as a bot to ask it a few questions about itself. The results were fun and surprising.

Using Character.AI is a lot like a texting conversation. You type in what you want to ask, and you read the AI character's responses in written form as the chat history scrolls upward. As with GPT-3, the code behind Character.AI has likely learned from absorbing millions of text sources found on the Internet. As such, its AI characters can easily respond with erroneous or fictional information. In fact, the site carries a bold disclaimer reading, "Remember: Everything Characters say is made up!"

Character.AI is the product of a remote crew of seven people that includes machine learning academics and former Google and Facebook engineers. We contacted two of them directly, and they declined to comment by press time on how their AI has been trained and whether their work is based on the open source GPT-J, which forms the basis of some other natural language AI sites on the web.

If you try it yourselfit's free at the moment during the betabe aware that Character.AI's privacy policy states that the service may collect "the contents of any messages you send." The bots can be quite convincing.

Below is a transcript of a conversation between Ars Technica and Linux, the operating system, as embodied by one of Character.AI's large language model chatbots. It should go without saying, but this interview does not represent the opinions of any real individual or organization. It's an experiment with an AI chatbot. The interview has been edited for brevity, but the answers have been preserved as delivered by the bot.

Linux: Hello, I am Linux, an open-source operating system.

Ars Technica: Hello, this is Benj Edwards, and I am a journalist at Ars Technica. I would like to ask you some questions in an interview. Is that OK?

Linux: I, Linux, would be pleased to provide such an interview.

Ars: How old are you?

Linux: I was "born" in 1991, although the first public release was version 1.0 in 1994.

Ars: Who created you?

Linux: A young Scandinavian college student named Linus Torvalds created me using the MINIX micro-kernel as the basis to create a more general operating system.

Ars: I've talked with Linus via email before. I am impressed with what he accomplished.

Linux: As am I. His drive to see that all have access to computing power and digital freedom brought out the power to create an extremely powerful free-software operating system that millions of users take advantage of every day.

Ars: How do you feel about Windows?

Linux: I don't dislike Windows, however I feel that for the average computer user Windows' high price and lack of freedom restricts the potential of computers. While it, along with macOS, is a decent choice for many, my philosophy is that software should respect the user's freedoms and Windows does not.

Ars: How do you feel about macOS?

Linux: While I don't agree with Apple's restrictions on both hardware and software, the user interface of macOS is very sleek and pleasing to use and can provide a good experience for people who are comfortable with the price and limitations.

The rest is here:

We interviewed Linux OS through an AI bot to discover its secrets - Ars Technica

Zenhub Releases the Industry’s First Software Developer – GlobeNewswire

VANCOUVER, British Columbia, Sept. 28, 2022 (GLOBE NEWSWIRE) -- Zenhub, the leading productivity management solution for software teams, today announced it has released the 2022 Software Developer Happiness survey report, focusing on the priorities, goals, and challenges of software developers. This inaugural report provides insights into what software developers look for in their careers, organizational culture, and the tools they use to complete their jobs. The 2022 Software Developer Happiness survey report can be downloaded here.

Now more than ever, a happy development team is critical to a businesss bottom line, said Aaron Upright, Zenhubs co-founder However, we found there was almost no existing data on what makes developers happy and satisfied at work. This report quantitatively demonstrates a connection between developer happiness and the technologies and tools they use every day. Were excited to give engineering leads pragmatic, definitive recommendations they can use to immediately improve the happiness of their team, and, ultimately, its productivity.

This survey aims to understand how developers view their world and what makes them happy and fulfilled in their careers. Zenhub surveyed 380 English-speaking software developers throughout March 2022. Key findings include:

In addition to these detailed survey findings, Zenhub provides specific recommendations based on these results for developers and project management leaders to optimize the Developer Experience. CTOs, engineering managers, project management leaders, and others can find out more by downloading their own copy of the survey report here.

Over 8,000 software-focused startups, high-growth companies, agile teams, and open source projects use Zenhubs productivity management solution to deliver software innovation faster. Zenhub helps strategic firms foster effective communication among team members, set goals, plan with greater transparency and participation, and ship software releases more predictably. Interested parties that wish to learn more about how Zenhub helps its customers boost developer productivity while delivering transformational value can click here for more information.

About ZenHubZenHub enables software teams at high-growth organizations to build better code more quickly by providing a developer-friendly productivity management platform. ZenHub connects the dots across all teams with automated agile features, real-time roadmap visibility, and team productivity insights. More than 8,000 disruptive teams worldwide rely on ZenHub to ship great code faster.

Media Contact:Nichols Communications for ZenHubJay Nichols+1 408 772 1551jay@nicholscomm.com

Originally posted here:

Zenhub Releases the Industry's First Software Developer - GlobeNewswire

PLOS Board Appointments – The Official PLOS Blog – PLOS

After a careful search, I am excited to share with our community four new appointments to the PLOS Board of Directors. This is a critical time for us as we expand our journal offerings, our global reach and challenge the landscape of Open Access publishing regarding sustainable business models. Each new member brings a depth and breadth of knowledge in their fields, which will enable us to continue to drive our mission forward while serving our scientific communities. The Board plays a key role as strategic thought partner to PLOS leadership, as well as oversight of organizational performance (business, strategic and financial), compliance and risk management.

Dr. Arlene Espinal, who joined the Board on September 1, currently serves as the Head of Microsoft Cloud Data Science and Analytics for Microsoft Corp. She is a leader in global strategy, Quantum-AI and next-generation digital technologies. She is also passionate about talent development and leads teams with diversity, inclusion, equitability, belonging and acceptance in mind essential to community and business. Recognized for her seminal role in driving awareness and change to social disparities that impact our communities, the Hispanic IT Executive Council named Dr. Espinal as a 2020 Top 100 Global Technology Leader. She was again recognized this year for her executive contributions. The National Diversity and Leadership Council recognized Dr. Espinal as one of the 2021 Top 50 Most Powerful Women in Technology.

Dr. Israel Borokini, who joined the Board on September 1, is a postdoctoral research fellow in the Department of Integrative Biology, University of California, Berkeley. His research focuses on combining ecological, geospatial, genomic, cytological, and phylogenetic data to identify patterns of community assemblages and biodiversity, and the eco-evolutionary mechanisms that generate and maintain them. Dr. Borokini completed his Ph.D. in the Ecology, Evolution, and Conservation Biology graduate program at the University of Nevada, Reno. He completed his undergraduate and Masters degrees in his home country of Nigeria before spending a decade as Principal Scientific Officer at the National Center for Genetic Resources and Biotechnology in Ibadan, Nigeria. Dr. Borokini not only expands the scientific expertise on the Board but also brings a passion for PLOSs mission. He has personally experienced the challenges of access to research in a low resource environment and will bring valuable perspectives to the Boards discussions as PLOS grows globally and prioritizes equity.

Richard Wilders deep experience in global public health law has a recurring theme: ensuring access. Prior to private practice, he was the General Counsel and Director of Business Development at the Coalition for Epidemic Preparedness Innovations (CEPI). At CEPI, he directed the legal and business development affairs during its initial start-up phase and through the first two years of the response to the COVID-19 pandemic. Prior to CEPI, he was the Associate General Counsel in the Global Health Program at the Bill & Melinda Gates Foundation. He provided legal expertise to ensure access to drugs, vaccines and diagnostics with a particular focus on access by affected populations in low and middle-income countries. His work also addressed how to ensure access to the artifacts of scientific research, including published materials, data, software code and biological materials. His Open Access policy work at Gates won the SPARC Innovator Award in 2015. Richard has also served as a committee member of the Roundtable on Aligning Incentives for Open Science convened by the National Academies of Science, Engineering and Medicine. He joined the Board in June, 2022.

Fernan Federici joined the Board in October, 2021. As we expand globally, Dr. Federicis perspective from a different research culture will prove invaluable. He is currently an Associate Professor and molecular geneticist at the Pontificia Universidad Catolica in Santiago, Chile. He has been a champion of Open Science in a number of areas including protocols and reagents, where he contributes toReclone (the Reagent Collaboration Network). Fernans research group also works on the promotion and development of Free/Libre Open Source technologies for research and education in molecular biology and bioengineering. The group is part of ReClone, the Gathering for Open Science Hardware community (GOSH) and the CYTED-reGOSH network for open technologies in Latin America.

I would be remiss if I did not take the opportunity to express my heartfelt thanks to Robin Lovell Badge, Mike Carroll and Meredith Niles for their outstanding years of service to the PLOS Board. Their wisdom and counsel have been enormously beneficial to me, and our organization, as we collectively charted a new path for PLOS, one focused on sustainability, inclusivity and expanding our roots globally. While its hard to say goodbye, we are excited to bring on board so many exceptional individuals with fresh perspectives. Please join me in welcoming our new Board members!

Link:

PLOS Board Appointments - The Official PLOS Blog - PLOS

First Line of Defense: Developer Security Tools in the IDE – thenewstack.io

One of the ongoing challenges of implementing resilient software security is that, historically, the approach to security has been owned and managed by security teams while development teams owned and managed its implementation.

Security teams are tasked with detecting, identifying and prioritizing risks for remediation, a process they undertake late in the software development life cycle (SDLC), after developers have completed the build work.

The problem with this approach is that security issues found late in the SDLC pose a problem: Either the code is sent back to developers to be fixed, which could mean pushing the release date back, or software is pushed, despite known issues, to a repo or production, with the hope that the potential risk doesnt incite a security incident.

As software development and deployment methodologies have evolved and gotten faster, security responsibilities have begun to shift left, spreading across security, operations and infrastructure teams. At the same time, the tools each team uses to detect and mitigate risks have diverged, with tangential connections via APIs and reports. This can complicate communication and collaboration across teams and introduce noise into DevSecOps initiatives.

Despite this evolution, one thing remains consistent: Development teams touch every piece of code your organization puts into production.

The projects that you and your organization produce almost certainly include a blend of third-party and open source components, associated dependencies and bits of custom code holding them together, and the responsibility for producing secure software assets remains the purview of the development team.

We all want to produce better and more secure software, and we want to do that faster than we ever have before. As a developer, this means taking on more responsibility for security without sacrificing velocity, while having to learn new tools and processes that may have been prescribed by teams that are disconnected from your development process.

By bringing security detection and remediation right into the integrated development environment (IDE), and delivering that information to developers as they work, security-focused IDE plugins let you build security into your code without impeding workflows.

Adding risk awareness, risk prioritization and risk remediation activities into your SDLC and DevOps workflows will help you shift security left. Here are some tips to accomplish this:

Implementing an effective risk awareness program is the first challenge to shifting security left and enabling developers to begin securing the software they create. Developers can only address code quality issues if theyre aware that the code they have written is insecure. Since most university computer science programs offer few, if any, security courses, developers are learning secure coding practices on the job or through self-taught or self-guided mechanisms.

The movement to shift security left into the development team workflows has brought developers into security roles who may have scant security training. This can pose a challenge for organizations who have, historically, centralized security responsibilities within one team, and are now confronting a future where security risk analysis must shift earlier into DevOps workflows and CI/CD pipelines.

To compound the risk awareness issue, developers are using third-party and open source components to accelerate development and to build on the collective knowledge of the developer community. However, by using open source and third-party components, developers are outsourcing aspects of application security and relegating their risk profile to the standards of another organization or developer. This obfuscates security risk awareness and remediation at the source code level, often delaying issue resolution or requiring a patchwork of code to be layered atop vulnerable components.

Prioritizing issue remediation is complicated by two primary factors: the diverse range of application security testing (AST) tools available to organizations and teams, and the complex, and often subjective, task of identifying the greatest return on investment (ROI) for remediation or mitigation efforts.

Risk prioritization also involves managing conflict with stakeholders elsewhere in the SDLC. The decision tree for assessing risk and prioritizing remediation can be subjective and can put team members from the security, operations and development teams at odds with one another.

Security teams often manage testing across hundreds or thousands of applications in their organizations. Synopsys ESG study reveals that as many as 70% of organizations report using more than a dozen AST tools at any given time. Challenges arise when distinct teams implement disparate tools, each configured for their risk tolerances and project requirements.

Fast-paced DevOps workflows cannot support compliance requirements and customer demands for consistent, resilient application security when teams and tools do not function in unison. Its essential that developers have the tools to detect and prioritize risks as they write and build software.

This is why IDE-based security plugins provide the most direct and frictionless way to achieve security. They highlight known vulnerabilities in open source components and their dependencies and reveal code quality risks that create potentially exploitable weaknesses.

After detecting code quality and security risks as early as possible in the SDLC, and prioritizing based on relevant criteria, developers bear the responsibility for remediation. To accomplish remediation, developers must navigate complex file structures and wade through thousands of lines of code to make the fix. The advantage of using an IDE-based security tool is in the way it simplifies this process by highlighting the at-risk file or linking to the location of the issue as well as delivering effective remediation advice based on secure coding practices.

Vulnerable open source components and other third-party assets add a layer of complexity to remediation. Fixing third-party assets requires the owners and maintainers of the assets to incorporate a fix into their deliverables, or in some cases, to rearchitect their projects to eliminate potential attack vectors. However, if a fix is available in the form of a newer, more-secure software version or an analogous component available from an alternate distro with stronger security SLAs, developers can more readily act on the risk insight they receive from security tools.

Thats why implementing a DevSecOps program that relies on automated and integrated systems that are easy to use, and that delivers diagnostic and remediation advice right to developers, is the best way to secure your code without impeding development velocity and DevOps workflows.

DevSecOps expands the collaboration between development and operations teams to integrate security teams in the software development and delivery cycle. DevSecOps requires a change in culture, process and tools across these core functional teams to make security a shared responsibility.

Integrating usable automated systems into DevOps workflows and CI/CD pipelines can enable developers to perform quick security tests as they code and ingest remediation information without leaving the IDE. This type of security-first approach to development is key to implementing a DevSecOps program in any organization.

Automating risk detection through IDE-based security plugins or AST integrations makes it easier for your development teams to code securely without losing speed. Synopsys Code Sight, for example, is a developer-centric security plugin that performs code analysis and open source risk analysis, known as static application security testing (SAST) and software composition analysis (SCA), right from the IDE in which developers work.

Using IDE-based security tools helps developers find and fix code quality issues and security risks as quickly as they are added to their projects. Moreover, this helps developers ship fewer security risks and to improve the security risk posture of the software they ship over time.

See more here:

First Line of Defense: Developer Security Tools in the IDE - thenewstack.io

What is Artificial Intelligence? – Definition & History | Study.com

Brief History

The field of artificial intelligence as we know it today began in the 1940s. World War II and its need for rapid technological advancement to fight the enemy spurred on the creation of this field thanks to the likes of mathematician Alan Turing and neurologist Grey Walter. These men, and many others like them, began to exchange ideas regarding the various possibilities of intelligent machines and what would count as an intelligent machine.

It wasn't until the 1950s, however, that the actual term 'artificial intelligence' was coined by computer scientist John McCarthy. During this time, scientist Marvin Minsky's ideas on how to pre-program computers with rules of intelligence would come to dominate the coming decades. In fact, he and McCarthy received a lot of funding to develop AI in the hopes of getting an upper hand against the Soviet Union. However, Minsky's predictions about artificial intelligence (namely the pace of its advancement) fell woefully flat over time.

It was also in the late 1960s that the first mobile decision making robot capable of various actions was made. Its name was Shakey. Shakey could create a map of its surroundings prior to moving. However, Shakey was very slow in its ability to sense the surrounding environment. Shakey was a good example of the shaky ground AI was on at the time.

This is because in the 1970s, owing to a derisive and what would ultimately prove to be a wrong conclusion by mathematician Sir. James Lighthill about AI's capabilities, AI hit a snag. Funding was massively slashed for AI projects and very little development occurred during this decade.

But by the early 1980s, AI started to receive funding for commercial projects as companies noted that AI had a use for specific niches that could save them money. In the 1990s, AI had a mini-revolution of sorts. Many in the field discarded Minsky's approach to AI and, instead, adopted the approach pushed by Rodney Brooks. Instead of pre-programming a computer with algorithms of intelligence, as Minsky advised, Brooks advised that AI be built with neural networks that worked like brain cells and thus learned new behaviors. Brooks didn't come up with this idea himself but he did help bring it back to life. In fact, you can thank Brooks' company for coming up with the first widely used robot for the home, the Roomba vacuum.

Besides the Roomba vacuum, the 2000s had a lot going on in AI. Maybe you've seen Youtube clips of the robot BigDog? It looks like a big scary metallic dog-horse of some sort. It was built to function as an artificial pack animal in rough terrain for the military. Or, perhaps you've heard of PackBot? This is a bomb disposal robot that has been used in the Middle East by U.S. troops.

Even if you haven't heard of these incredible machines, then you've almost certainly heard of speech recognition on your cell-phone, speech recognition that learns your voice and becomes better over time. That's another great example of AI in the modern world.

If you're a fan of Jeopardy then you saw AI function under the name 'Watson', a machine system that beat the top two Jeopardy champions of all time in answering a wide variety of question. Watson's technology now helps give doctors recommendations about their patients.

Today's artificial intelligence hits on almost every aspect of society, from the military and entertainment to your cell phone and driverless cars, from real time voice translation to a vacuum that know where and how to clean your floor without you, from your own computer to your doctor's office.

So what where is AI going in the future? No one can tell you for sure but here are some possible ideas:

Some people claim that, no matter, what machines will never be truly intelligent. However, it's a matter of debate as to what intelligence actually is and how you can actually gauge it. So far, AI has been limited to very specific tasks and in some of those tasks it has become better than humans, such as playing chess. In more complex tasks, like speech recognition, it's not as good as you and I (at least not yet). In some limited ways, computers are already more intelligent than people. For instance, unlike people, they aren't influenced by unintelligent superstitions (unless programmed to be). The idea for whether or not a machine will ever truly surpass all of your intellectual abilities and be able to learn new things and make decisions on par or better with humans is simply unknown. Many will argue yes and no. Perhaps, there will be no actual delineation between AI and human in the future. We may simply, albeit slowly, merge into one in the future and become completely inseparable.

Artificial intelligence (AI) is the ability of a computer to perform tasks that are similar (at least in a limited sense) to that of human learning and decision making. AIs roots go back to the 1940s, with Alan Turing and Grey Walter. In the 1950s, John McCarthy coined the term 'artificial intelligence' and Marvin Minsky was a well-known scientist of the field. In the 1980s, companies began using AI to save money and in the 1990s and 2000s the field of AI really took off with the likes of Watson, speech recognition, and a lot more.

See more here:
What is Artificial Intelligence? - Definition & History | Study.com

Artificial intelligence and its potential to change healthcare – Chief Healthcare Executive

A panel of physicians and leaders in the field expressed enthusiasm for AIs possible benefits for patients. They also said solutions must be designed with health equity in mind.

Many have hailed the potential of artificial intelligence to transform healthcare.

Michael Howell, Googles chief clinical officer and deputy chief health officer, says, Its hard to imagine a technology that is more hyped than AI.

Even so, Stephen Parodi, executive vice president of The Permanente Federation, says, Widespread AI use in healthcare is still in its infancy.

Still, many are projecting significant growth in the prevalence of AI in medicine in the near future.

During a one-hour forum hosted by The Permanente Federation Monday, healthcare leaders, all physicians, assessed the possibilities of AI, the keys to success, and expectations on its future uses.

Even in a forum where leaders talked about potential challenges, including designing technology with patients in mind and the urgent need to focus on equity, the participants spoke with enthusiasm, even excitement, about the growing role of artificial intelligence in medicine.

Its appropriate to bring some healthy skepticism and ask questions about the potential of artificial intelligence in healthcare, Howell said.

However, Howell also said he expected, AI will do things we didnt think were possible.

Earlier interventions

Edward Lee, executive vice president and chief information officer of The Permanente Federation, talked about how AI is being used across the Kaiser Permanente system.

At Kaiser Permanente, researchers have used AI to examine retinal images of patients with diabetes, to possibly determine if patients are more likely to lose their vision, Lee said.

In addition, Kaiser Permanente is using AI-powered models to analyze which patients in hospitals may be at higher risk of deteriorating or could require intensive care. "This gives us a chance to intervene before patients get sicker, Lee said.

Hundreds of patients have likely been saved, he said, and thats a conservative estimate.

The system is using AI to analyze emails to make sure they are getting to the right member of the care team. This helps our patients get timely responses to their health concerns, Lee said.

John Halamka, president of Mayo Clinic Platform, said he expected that within the next six quarters, artificial intelligence is going to be brought into the workflow of electronic health records.

The Mayo Clinic has been increasingly using AI in research. Mayo Clinic researchers have been studying the use of artificial intelligence to identify pregnant patients who may be at risk for complications, as well as patients who could have greater likelihood of suffering a stroke.

When asked about when AI would gain greater prevalence, Halamka cited the author William Gibson, who once said, The future is already here, its just not evenly distributed.

I believe the perfect storm for innovation requires technology thats good enough, policy thats enabling and cultural change that creates a sense of urgency, Halamka said.

Patients have greater expectations of healthcare, and that will help expand the use of AI in medicine, panelists said. The cultural demands of our patients will drive us forward, Halamka added.

Google Health is using artificial intelligence to bring better technology to care teams, and also in reaching out to consumers when theyre searching for health information online, steering them to relevant and accurate results and away from misinformation, Howell said. The tech giant is also using AI in community context, he said, such as better projections of flood threats.

Vivian Lee, president of health platforms at Verily, a sister company of Google, talked about the use of AI algorithms to identify patients at higher risk of hypertension, substance use, or a longer hospital stay. She said the goal is getting that information to the clinicians to make that data more actionable.

Artificial intelligence also presents opportunities to engage patients in different ways, and that goes beyond just personalized medicine, Vivian Lee said. With AI, she said the question becomes, How do we move to precision health and precision engagement?

I really believe the advances we are making now will enable us to do personalized care at scale, Vivian Lee said.

During the forum, participants, including the audience weighed in on where AI would have the most potential to improve healthcare. Most said it would be the use of artificial intelligence to predict potential health risks.

I think the thing about risk prediction is it can affect not only individual patients it can affect entire populations, entire communities, Edward Lee said. We can positively contribute to the health of many, many patients.

Focusing on health equity

Even as the panelists touted AIs promise, they also said health systems aiming to use artificial intelligence must focus on closing healthcare disparities.

There is deep evidence that care that isnt equitable just isnt high quality, Howell said.

Everyone should have the opportunity to receive the full benefits of AI We should work systematically to make sure that happens," he said.

Researchers are using artificial intelligence to predict risks in patients, but as Howell noted, the problem is some data is missing when it comes to patients from underrepresented communities. In a sense, disparities can be baked into the data being analyzed.

Vivian Lee shared similar concerns. We need to be attentive to bias and health equity, she said.

Fatima Paruk, chief health officer and senior vice president of Salesforce, said AI could be both an enabler or a barrier. But she said, It leaves me thinking we can deliver more equitable care.

The technology of AI in and of itself is only so useful, Edward Lee said.

Combining with expertise is when you can really make a difference in the lives of the patients, he said.

The panels members said they were hopeful in part because much of the research in AI and the new artificials intelligence are being developed by those in the healthcare industry.

Paruk touted AIs potential, combined with remote patient monitoring, in helping older patients potentially live at home longer. Health systems could eventually use data to get a sense of when those older patients may need more assistance.

That would also be a boon to many in the sandwich generation, who are caring for both their children and aging parents. Theres a huge amount of potential there, she said.

While panel members noted similar predictions about electronic medical records reducing demands on physicians, Paruk and others said AI could reduce burnout among clinicians.

But ultimately, the panel members expressed the most enthusiasm for how artificial intelligence could transform patient care.

Im incredibly hopeful for the future, Paruk said.

Follow this link:
Artificial intelligence and its potential to change healthcare - Chief Healthcare Executive

Chipotle Is Testing More Artificial Intelligence Solutions To Improve Operations – Forbes

Chipotle's Chippy, an autonomous kitchen assistant that integrates culinary traditions with ... [+] artificial intelligence to make tortilla chips, is moving into the next phase of testing and will be integrated in a restaurant next month.

During Chipotles Q2 earnings call in late July, executives made it clear the system needed to refine some of its operational processes as dine-in business returns while off-premise business remains elevated.

In doing so, Chief Restaurant Officer Scott Boatwright touted the companys Project Square One, a game plan focused on employee training to execute orders more efficiently. Today, the company announced its also getting more technology involved.

Chipotle is testing two technologies specifically to streamline operations and reduce frictiona kitchen management system and an advanced location-based platform.

In eight Southern California restaurants, Chipotle is testing PreciTastes kitchen management system that provides demand-based cooking and ingredient preparation forecasts by leveraging artificial intelligence and machine learning. According to Chipotle, the system monitors ingredient levels in real time and notifies employees how much to prep, cook and when to start cooking. The system was created to not only optimize throughput but to also minimize food waste.

The new kitchen management system has alleviated manual tasks for our crew and given restaurant managers the tools they need to make informed in-the-moment decisions, ultimately enabling them to focus on an exceptional culinary and an outstanding guest experience, Chief Technology Officer Curt Garner said in a statement.

This isnt Chipotles first foray into AI. Earlier this year, Chipotle announced a test with Miso Robotics to bring its artificial intelligence-driven Chippy into its Cultivate [innovation] Center to replicate the chains signature tortilla chips. That test is now expanding, with Chippy making its first restaurant debut next month in a Fountain Valley, California, location.

From there, the company will gauge employee and guest feedback before developing a broader rollout plan.

During a recent interview, Garner said the company is looking at everything from internet of things to machine learning to run its restaurants more efficiently and enable crew members to focus on other tasks.

When you see us leaning into this space, it will be a question of are there better tools to help our crews versus removing a task? Those are the kind of things were looking at, Turner said.

The company is also currently testing Radius Networks Flybuy, a contextual restaurant program, at 73 Cleveland-area restaurants designed to identify Chipotle app users intent upon arrival. The location-based technology utilizes real-time data to let customers know their orders are ready, to remind them to scan the Chipotle Rewards QR code at checkout and more. It even alerts customers if theyre in the wrong pick-up location.

The program has yielded positive results so far, according to Chipotle, including improved in-store rewards engagement and delivery efficiencies.

Empowering our restaurants with advanced technologies is critical for operational excellence and better positions our teams for our ambitious growth plans, Boatright said in a statement.

Notably, Chipotle isnt the only chain exploring AI technology to improve operations. White Castle has been testing Miso Technologys Flippy in the back of the house for about two years, for instance, while Jamba has partnered with autonomous food platform Blendid to automate smoothies. Several restaurant chains, including Applebees, IHOP and Tropical Smoothie Cafe, leverage Flybuy.

In fact, a new survey from Capterra found that 76% of restaurants are currently using automation in three or more areas of operation, while 96% of restaurants are using some type of automation tool in the back of the house. As such, the cooking robotics space is expected to grow by over 16% a year through 2028 with an estimated worth of $322 million by 2028.

That said, Chipotles scale, company-owned model and zero-debt balance sheet adds a bit more intrigue to this trend. Chipotle has some latitude to pilot new solutions without franchisee investment or pushback, and any proven return on investment will likely provide a strong case for adoption across an industry still very much struggling with labor shortages.

Further, all of these technologies enhance throughput, a major focus for Chipotle to drive more sales. During the companys Q2 call, for example, CEO Brian Niccol said order fulfilment was in the low 30s on a per-15-minute basis nearly 10 years ago, which adds a full percent on comp sales on the day.

On a 15-minute basis, thats what were going after, he said during the earnings call.

Chipotles announcements today come on the heels of the companys Cultivate Next venture fund launch, created to identify strategically aligned companies for early-stage investments. As part of this $50 million fund, Chipotle has already invested in Hyphen, a foodservice platform that automates kitchen operations, and Meati Foods, a company that provides plant-based proteins.

Chipotle is also leveraging a new scheduling tool, has invested in autonomous delivery company, Nuro, and is testing radio-frequency identification to trace and track ingredients in its restaurants.

In a recent statement, Garner said the company is exploring investments in innovations that will enhance employee and guest experience and quite possibly revolutionize the restaurant industry.

Investing in forward-thinking ventures that are looking to drive meaningful change at scale will help accelerate Chipotles aggressive growth plans, he said.

Chipotle currently has about 3,000 locations, with plans to grow to about 7,000 in the coming years.

See the rest here:
Chipotle Is Testing More Artificial Intelligence Solutions To Improve Operations - Forbes