Finding the path for UiPath – Protocol

Hello and welcome to Protocol Enterprise! Today: how UiPath co-CEO Rob Enslin thinks process automation will evolve inside the enterprise, how Suses Melissa Di Donato decided to leave the U.S. and build a career in Europe, and new steps toward securing open-source software start to emerge.

UiPath has had a shaky history. The company, which helps companies automate business processes, went public in 2021 at a valuation of more than $30 billion, but now the companys market capitalization is only around $7 billion.

Now UiPath is hoping the addition of Rob Enslin as co-CEO can turn things around through financial discipline and an increased focus on global expansion. I recently spoke with Enslin about why he joined UiPath, the untapped potential of automation, and how he plans to lead alongside founder Daniel Dines.

Read the full Q&A here.

Aisha Counts (email | twitter)

Digital is an ongoing process, not a destination. West Monroe knows that becoming a digital organization requires a mindset shift that will impact processes and employees at all levels, and that success can be achieved if the organization is aligned toward a clear vision.

Learn more

A native New Yorker, Melissa Di Donato made a life-changing decision back in 2005 when she packed up for Europe to further her career in technology. Then with IBM, she made London her new home base.

Today, Di Donato is CEO of Germanys Suse, now a 30-year-old, open-source enterprise software company that specializes in Linux operating systems, container management, storage, and edge computing. As the companys first female leader, she has led Suse through the coronavirus pandemic, a 2021 IPO on the Frankfurt Stock Exchange, and the acquisitions of Kubernetes management startup Rancher Labs and container security company NeuVector.

Being an American in Europe is unique, Di Donato said. Being an American leading a tech company thats listed in Germany is unique. Being a female American running a German tech company on the SDAX is even more unique at the size of our company.

Read the full collection of Di Donatos comments on building a business and a career in Europe here.

In todays global landscape, cybersecurity threats are something that every business operating on the internet must face, not just enormous tech companies. In this Protocol virtual event on Oct. 4 at 10 a.m. PT, well examine the current best practices for securing both large and small to medium-sized businesses, providing viewers with a true threat landscape and information they can use to make decisions about the strategy that best supports their business goals.

Protocol Enterprises Kyle Alspach will be joined by a great panel of speakers: Andrew Rubin, co-founder and CEO, Illumio; Alex Weinert, vice president and director of identity security, Microsoft; Jameeka Green Aaron, chief information security officer, Auth0; and Devdatta Akhawe, head of security, Figma.

RSVP here.

As any DevOps team knows, when creating an application, there's a lot more involved than just writing some code. And that means there's a lot more to secure, too.

So, yes, addressing the various challenges around code security are important; the latest effort along these lines, a bill aimed at securing the use of open-source software in the federal government and critical infrastructure, just cleared the Senate Homeland Security and Governmental Affairs Committee today, in fact.

But as necessary as it is, this covers just one piece of what's known as the "software supply chain." And as supply chains are known to be, it's pretty complicated: Even a small software development environment can have five to seven different tools, with a number of different phases required to create a piece of software, Aqua Security's Eilon Elhadad told me. "You need to secure the process, you need to secure the tools themselves," Elhadad said. "You need to secure a lot of things."

Aqua is among the vendors aiming to help with that: Last week, the company debuted what it's calling an "end-to-end software supply chain security solution" covering the multiple software development phases that need to be protected against attacks. Elhadad pointed to the most infamous software supply chain attack in the U.S., the SolarWinds breach in 2020, as supporting evidence for this type of approach.

Investigators believe the initial compromise of SolarWinds happened after the code was written, during what's known as the build phase; at that point, the code was already in the process of being converted into an executable program. In other words, efforts to use only secure open-source code, or to employ a standard software bill of materials to check for vulnerable components, are great but they're not going to help with that particular type of attack.

Digital is an ongoing process, not a destination. West Monroe knows that becoming a digital organization requires a mindset shift that will impact processes and employees at all levels, and that success can be achieved if the organization is aligned toward a clear vision.

Learn more

Thanks for reading see you tomorrow!

More:

Finding the path for UiPath - Protocol

Related Posts
This entry was posted in $1$s. Bookmark the permalink.