- Like
- Digg
- Del
- Tumblr
- VKontakte
- Buffer
- Love This
- Odnoklassniki
- Meneame
- Blogger
- Amazon
- Yahoo Mail
- Gmail
- AOL
- Newsvine
- HackerNews
- Evernote
- MySpace
- Mail.ru
- Viadeo
- Line
- Comments
- Yummly
- SMS
- Viber
- Telegram
- Subscribe
- Skype
- Facebook Messenger
- Kakao
- LiveJournal
- Yammer
- Edgar
- Fintel
- Mix
- Instapaper
- Copy Link
Given
technological advancements and the rapid proliferation of Internet of Things
(IoT), our world is increasingly interconnected. Governments and businesses
across the globe also seek to leverage technology to improve their products and
services to citizens and customers. While digital technologies present new
opportunities and transform the way we live and work, the digital disruption
also brings out new challenges, particularly in cybersecurity.
Recently,
OpenGov had the privilege to speak to Mr Stephan Neumeier, Managing Director
of Kaspersky Lab Asia Pacific, on the fast-changing cybersecurity
landscape in the Asia Pacific region and how organisations can better prepare
themselves to deal with cybersecurity threats.
When asked
to comment on how the cybersecurity landscape has evolved and some of the
emerging trends, Mr Neumeier shared some of his observations that 2017 has seen
“the most intensive of cybersecurity incidents”.
“Unfortunately,
most of what our researchers at Kaspersky Lab has projected to happen were
brought to fruition — espionage has gone mobile, APTs attacked enterprise
networks, financial attacks continued, a new wave of ransomware attacks came
about, critical ICS processes were disrupted, poorly secured IoT devices were
targeted, and even information warfare figured last year,” he said.
This year,
he saw a continuation of these attacks and much more as the themes and trends
build on each other, year after year, expanding further the threat landscape
where individuals, businesses and governments are relentlessly pursued and attacked.
Cybersecurity
challenges in Asia Pacific
As
different markets may face different challenges, depending on the region’s
capabilities to tackle and mitigate cybersecurity threats. OpenGov asked Mr
Neumeier his views on whether the Asia Pacific region face similar or unique
challenges compare to the rest of the world.
According
to him, the Asia Pacific market is very different and unique from other regions
globally, especially from a cultural perspective.
“It is a
very young region with a very significant number of millennials growing up. Not
to mention that it consists of the two most populated countries in the world,
China and India. As internet is becoming a major part of our lives, these young
generations require access to fast internet. To cater to these need, massive
investments are being made by respective countries in the APAC to
infrastructure to improve internet speed, making sure that their country are
not left behind and to keep up with the growth of the technology space,” he
said.
“With
that, in the last few years, infrastructures within the APAC countries are
beginning to have almost similar qualities as countries in Europe such as
Switzerland and Germany. However, from a cybersecurity perspective, the
awareness and understanding are not in the same level as those in these matured
countries and this is a huge challenge for the APAC region. This is why, in
this market, we should focus more in education and awareness of cybersecurity.”
On the
level of cybersecurity awareness in the region, Mr Neumeier pointed out that
although the region has a large number of active users of the Internet, there
still appears to be a low awareness of cybersecurity among Internet users in
this region.
Unfortunately,
this low level of cybersecurity awareness combined with high Internet usage
means that the Internet users in the region have been the prime targets of
cyber threat attacks such as when the Naikon APT targeted top-level government
agencies and civil military organisations or when the Wannacry and Petya
ransomware outbreak began or when the Mirai malware unleashed DDoS attacks.
“Additionally,
bring your own device (BYOD) is the big trend affecting how businesses operate
online, with 72% of companies expecting to use the concept extensively in the
near future, according to a survey by B2B International on behalf of Kaspersky
Lab. It’s inevitable that in any company, small or large, many employees will
use personal devices to connect to the corporate network and access
confidential data. That’s why companies need to implement policies that
safeguard both corporate and personal mobile devices,” he said.
“As a
society, we need to find ways to raise awareness of the risks associated with
online activity and develop effective methods to minimize these risks. There’s
technology at the core of any solution to tackle cybersecurity. But it is most
important to incorporate the human dimension of security, so we can effectively
mitigate the risk,” he added.
“All it
takes is a single person to bring it all down”
On the
biggest cybersecurity threats organisations face today, Mr Neumeier highlighted
the human factor in IT security, naming it “most common security
vulnerability”.
He cited
a recent global study conducted by Kaspersky Lab on cybersecurity
awareness involving about 5,000 businesses, which showed that organisations are
at a very real threat from within. According to this study, careless or
uninformed employees account for about 52% as the top cause of data leakage in
organisations worldwide.
“Taking a
closer look at this study, it reveals that despite the rapid proliferation of
destructive and more complex malware or Trojans, organisations should be more
concerned about their most important asset – their people,” he said.
“You can
have the best technical means and the most thought-out security policy but it
is never enough to protect your organisation from cyberthreats. All it takes is
a single person to bring it all down,” he added.
However,
he also pointed out that in most case, it is unintentional because that one
employee is unaware of threats and doesn’t have the basic cybersecurity
knowledge. According to the cited study, an approximate 65% of
organisations now already invest in employee cybersecurity training to close
this loophole.
Data
breaches affect both large and small organisations, with average losses from
data breaches currently passing the $1 million mark, a significant jump over
the past two years.
“For
enterprises, the average cost of one incident from March 2017 to February 2018
has reached $1.23 million, which is 24% higher from 2016-2017. For the SMBs,
it’s an average of $120,000 per cyber incident, which only costs $32,000 more
than a year ago,” he shared.
Mr
Neumeier iterated that whether it is a massive cybersecurity incident or
small-scale one, about 80% of them point to having been caused by human error.
“More than
ever, cybersecurity awareness and education are now critical requirements for
organisations of any size that is faced with the prospect of falling prey to
cybercriminals. At this point, there is a definitive need for organisations
regardless of size for solutions that provide centralized security management
of networks combined with training that zeroes in on the ‘how’ part of the
equation.”
Importance
of an effective cybersecurity strategy
Organisations
need to develop an effective and all-round cybersecurity strategy to protect
its assets and interests. Mr Neumeier recommended a cyclical approach of
continuous monitoring and analytics in building an effective cybersecurity
strategy.
“Twenty
years in the industry has taught us that what makes the most sense for
enterprise IT infrastructure to have true cybersecurity is to put in place a
cyclical adaptive security framework. This would have to be a flexible,
proactive multi-layered protection infrastructure which dynamically adapts and
responds to the ever-changing threat landscape,” he said.
According
to him, Kaspersky Lab’s security architecture is based on a cycle of
activities, comprised of four key segments namely Prevent, Detect, Respond, and
Predict.
He
continued to explain, “At the core of Kaspersky Lab’s True Cybersecurity
is HuMachine Intelligence, a seamless fusion of Big Data-based Threat
Intelligence, Machine Learning and Human Expertise. We have designed it so
because we believe we’re in a never-ending arms race — IT threats are dramatically
evolving day in and day out and here we are totally focused on following the
trail of hackers and further refining our solutions so we stay ahead of them.
It’s a continuous process.”
Key
components of cybersecurity resilience
On how
threat intelligence and endpoint detection can protect organisations and boost
organisations’ ability to respond to threats, Mr Neumeier stated that targeted
attacks have become one of the fastest growing threats in 2017.
“It used
to be that organisations employ endpoint protection platforms (EPP) to control
known threats such as traditional malware or unknown viruses which might use a
new form of malware directed at endpoints. However, cybercrime techniques have
significantly evolved such that attack processes have become aggressive and
expansive in recent years,” said Mr Neumeier.
It is
alarming that the specifics of the targeted attacks that cybercriminals use,
and the technological limitations of traditional endpoint protection products
mean that a conventional cybersecurity approach is no longer sufficient.
The cost
of incidents associated with simple threats is negligible at US$10,000 compared
with an advanced persistent threat (APT) attack which would set an organisation
for about US$926,000.
“To
withstand targeted attacks and APT-level threats on endpoints, organisations
need to consider EPP with endpoint detection and response (EDR)
functionalities,” the expert said.
“EDR is a
cybersecurity technology that addresses the need for real-time monitoring, focusing
heavily on security analytics and incident response on corporate endpoints. It
delivers true end-to-end visibility into the activity of every endpoint in the
corporate infrastructure, managed from a single console, together with valuable
security intelligence for use by an IT security expert in further investigation
and response,” he explained.
According
to Mr Neumeier, an organisation needs an EDR if it is looking at a proactive
detection of new or unknown threats, previously unidentified infections
penetrating it directly through endpoints and servers. This is achieved by
analysing events in the grey zone, home of those objects or processes included
in neither the “trusted” nor the “definitely malicious” zone.
Depending
on each organisation’s maturity and experience in the field of security, and
the availability of necessary resources, some businesses will find it most
effective to use their own expertise for endpoint security but will take
advantage of outsourced resources for more complex aspects.
Meanwhile,
they can build up in-house expertise with skills training, through access to a
threat intelligence portal and APT intelligence reporting, and using threat
data feeds. Or — particularly attractive for overwhelmed or understaffed
security departments — they can adopt third-party professional services from
the outset.
Kaspersky
Lab’s approach to endpoint protection includes the following components:
Kaspersky Endpoint Security, Kaspersky Endpoint Detection and Response, and
Kaspersky Cybersecurity Services.
For
organisations unable, for reasons of regulatory compliance, to release or
transfer any corporate data outside their environment, or that require complete
infrastructure isolation, Kaspersky Private Security Network provides most of
the benefits of global cloud-based threat intelligence as provided by Kaspersky
Security Network (KSN,) without any data ever leaving the controlled perimeter.
To
counteract advanced threats and targeted attacks, businesses need automated
tools and services designed to complement each other and help security teams
prevent most attacks, detect unique new threats rapidly, handle live attacks,
respond to attacks in a timely manner, and predict future threats.
On
prevention as a key line of defence, Mr Neumeier gave the following suggestions
on measured that organisations can take to prevent cybersecurity incidents:
“We cannot
emphasise it enough – that preventing cybersecurity incidents from happening or
damaging our organisation’s finances or reputation, starts with raising
awareness and education.”
In this,
he urged organisations to strengthen the weakest links, toughen the target
systems and assets, and improve the effectiveness of current solutions to keep
up with the modern threats.
At the
same time, Mr Neumeier emphasised the importance for organisations to be well
equipped with threat intelligence.
“This is
moving from a reactive security model to a proactive security model based on
risk management, continuous monitoring, more informed incident response and
threat hunting capabilities,” he said.
“As we say
at Kaspersky Lab, prediction is doing more to guard against future
threats. Having access to cybersecurity experts that will keep organisations
updated on the constantly-changing global threat landscape and will help them
test their systems and existing defenses is a vital element to help them adapt
and keep pace with emerging security challenges”.
Tips on how
to keep up with the fast-changing cybersecurity landscape
As we face
increasing cybersecurity challenges, what can organisations and individuals do
to protect themselves?
For
organisations, Mr Neumeier spoke on the importance of having cybersecurity trainings
and adopting a cyclical approach to cybersecurity strategy.
“Based on
how we conduct our cybersecurity trainings, here are two quick tips: One, avoid
abstract information and focus on certain practical skills. Second, instruct
different groups of employees differently,” he shared.
“Educating
the staff on the motivations of security policies, the importance of working
safely and how to contribute to the security of their organisations can help
mitigate the risk of security incidents and safeguard what is truly important –
their data.”
He also
underscored the importance of having a new mindset in the face of new threats.
Here are some of the best practices he shared on how individuals can to be
risk-ready in the world of advanced attacks and epidemic outbreaks:
1. Remember the weakest link. Be aware and
knowledgeable about cybersecurity.
2. Invest in technology. Shift your focus towards a
proactive protection approach that goes beyond prevention; should be
adaptive, advanced, predictive and involve human expertise
3. Back up
4. Encrypt
5. Secure your network with a strong password.
“There
exists today a great deal of highly-motivated cybercriminals who will try to
find all points of vulnerability in an Internet user or within an organisation
just to get what they want. Most of the time, the road to remediation and
recovery is complicated and expensive, whether the victim is an individual or
an institution,” he concluded.
- Like
- Digg
- Del
- Tumblr
- VKontakte
- Buffer
- Love This
- Odnoklassniki
- Meneame
- Blogger
- Amazon
- Yahoo Mail
- Gmail
- AOL
- Newsvine
- HackerNews
- Evernote
- MySpace
- Mail.ru
- Viadeo
- Line
- Comments
- Yummly
- SMS
- Viber
- Telegram
- Subscribe
- Skype
- Facebook Messenger
- Kakao
- LiveJournal
- Yammer
- Edgar
- Fintel
- Mix
- Instapaper
- Copy Link
The International Telecommunication Union (ITU), in collaboration with the Food and Agriculture Organisation (FAO) of the United Nations, recently organised a Workshop on “Cultivating Tomorrow: Advancing Digital Agriculture through IoT and AI.”
Held at the Telecommunication Engineering Centre (TEC) of the Department of Telecommunications (DoT) and the Indian Council of Agricultural Research (ICAR), Department of Agricultural Research and Education (DARE), Ministry of Agriculture and Farmers’ Welfare, Government of India, this event aimed to explore the transformative potential of emerging technologies in agriculture.
Participation was open to ITU Member States, Sector Members, Associates, ITU Academia, and individuals from countries that are members of the ITU, as well as members of international, regional, and national organisations in hybrid mode. The event drew around 200 delegates, including international participants, who shared their experiences in the emerging field of Agriculture 4.0.
In light of the challenges posed by a growing world population and climate change to traditional farming practices, the workshop underscored the importance of leveraging technology for sustainable food production. It delved into the application of the Internet of Things (IoT), Artificial Intelligence/Machine Learning (AI/ML), Unmanned Aerial Vehicles (UAVs), and other cutting-edge technologies across the agricultural value chain, from production to consumption, including post-harvest management and marketing.
The discussions focused on how these technologies can empower farmers with real-time data, predictive analytics, and actionable insights to optimise their operations and enhance productivity.
A highlight of the workshop was the release of the Technical Report on “Revolutionising Agriculture: The Digital Transformation of Farming.” This report serves as a valuable resource for stakeholders in the agricultural sector, providing guidance on harnessing the power of technology to drive sustainability, efficiency, and resilience in food production. Overall, the event emphasised the critical role of digital innovations in shaping the future of agriculture and fostering global food security.
The Ministry of Agriculture & Farmers Welfare in India is pioneering the integration of cutting-edge AI technologies to enhance farmers’ productivity and well-being. Championing the India Digital Ecosystem Architecture (InDEA) 2.0’s network approach, the Ministry has achieved significant milestones.
According to Union Minister of Agriculture and Farmers’ Welfare, Shri Arjun Munda, in a written reply in Rajya Sabha, the Ministry of Agriculture and Farmers Welfare in India has leveraged AI to tackle various challenges in the agricultural sector, aiming to support farmers.
Key initiatives include the implementation of ‘Kisan e-Mitra,’ an AI-powered chatbot designed to assist farmers with inquiries regarding the PM Kisan Samman Nidhi scheme, which supports multiple languages and is expanding to cover other government programmes.
The National Pest Surveillance System employs AI and Machine Learning to detect crop issues caused by climate change, enabling timely interventions for healthier crops. Furthermore, AI-based analytics are utilised for crop health assessment using field photographs, along with crop health monitoring through the integration of Satellite, weather, and soil moisture datasets for rice and wheat crops.
A tripartite Memorandum of Understanding was signed, paving the way for collaborative efforts between the National Farmers’ Welfare Programme Implementation Society, IndiaAI, and a foundation to establish India as a global leader in AI-driven digital agriculture transformation. This partnership signifies a crucial step forward in leveraging AI to revolutionise digital agriculture, ensuring a prosperous and food-secure future for India.
Following the workshop, the 9th meeting of the ITU/FAO Focus Group on “Artificial Intelligence (AI) and Internet of Things (IoT) for Digital Agriculture” (FG-AI4A) will take place on March 19, 2024, at the same venue.
The Focus Group on Artificial Intelligence and the Internet of Things for Digital Agriculture (FG-AI4A) has extensively explored the potential of emerging technologies such as AI and IoT. These technologies offer promising avenues for data management, model enhancement, and effective communication, thereby optimising agricultural production processes.
- Like
- Digg
- Del
- Tumblr
- VKontakte
- Buffer
- Love This
- Odnoklassniki
- Meneame
- Blogger
- Amazon
- Yahoo Mail
- Gmail
- AOL
- Newsvine
- HackerNews
- Evernote
- MySpace
- Mail.ru
- Viadeo
- Line
- Comments
- Yummly
- SMS
- Viber
- Telegram
- Subscribe
- Skype
- Facebook Messenger
- Kakao
- LiveJournal
- Yammer
- Edgar
- Fintel
- Mix
- Instapaper
- Copy Link
Artificial Intelligence (AI) has permeated all aspects of human life, including its crucial role in defence and security, which has become a focal point, particularly in the Asia-Pacific region. The integration of AI in defence has sparked extensive debates on its implications for national security, military strategies, and ethical considerations, indicating the depth of its impact and the need for careful evaluation.
One of the primary concerns revolves around how AI could revolutionise military, security, and defence operations. This revolution introduces concepts like autonomous weapons systems, unmanned vehicles, and cyber warfare capabilities, marking a significant shift in how AI is adopted in these fields.
Moreover, there is a growing interest in understanding how AI will shape defence strategies and operations by 2035, potentially altering the balance of power in the region and leading to new alliances and strategic rivalries.
While AI advancements promise strategic advantages, they also raise ethical dilemmas, especially regarding the use of AI in making life-or-death decisions, highlighting the need for robust ethical frameworks and guidelines. The evolving nature of AI and its rapid advancements necessitate continuous monitoring and evaluation to ensure its responsible and ethical use in defence and security contexts.
Anto Satriyo Nugroho, former Head of the Research Centre for Artificial Intelligence and Cyber Security (PRKAKS) at the Indonesian Agency for Research and Innovation (BRIN), emphasised the pivotal role of various AI technologies in advancing research in defence and security. He highlighted technologies like Computer Vision, Machine Learning (ML), Cyber Security, Natural Language Processing (NLP), and others, underlining their importance in enhancing defence and security systems’ capabilities.
Further, Achmad Farid Wadjdi, an Associate Expert Engineer at PRKAKS-BRIN, discussed the importance of understanding the concept of national defence, particularly in the context of the Internet of Battlefield Things (IoT) and its applications in modern combat operations and smart warfare. He emphasised the need to ensure security in military operations when deploying IoT technologies, indicating the complexity and critical nature of AI integration in defence systems.
Conversely, Eddy Maruli Tua Sianturi explained the conceptualisation of measuring the State Defence Index (IBN) to understand better citizens’ sense of pride, patriotism, nationalism, and willingness to defend the country. The IBN measurement provides a nuanced approach to grasping current socio-political dynamics. Still, it also requires addressing challenges such as data bias, privacy concerns, and security issues, highlighting the multidimensional nature of AI’s impact on defence and security.
PRKAKS-BRIN Associate Engineer Jemie Muliadi introduced the Intelligent Control System method for law enforcement and state sovereignty applications in a related context. This method effectively manages complex systems that are challenging to simplify, those with cross-coupling that are difficult to separate, and systems with significant parameter changes over time. Jemie emphasised that this method ensures precise control in fast-moving and uncertain situations, particularly in law enforcement and state sovereignty contexts, showcasing the versatility and potential of AI in enhancing national defence and security operations.
Integrating AI in defence and security represents a significant advancement with far-reaching implications. While AI offers numerous benefits in enhancing defence capabilities, it also poses ethical, legal, and security challenges that must be addressed through collaborative efforts between governments, researchers, and industry stakeholders.
By fostering responsible AI development and deployment practices, the Asia-Pacific region can harness AI’s transformative power while ensuring its citizens’ safety, security, and well-being. This approach involves developing robust AI governance frameworks, ensuring transparency and accountability in AI systems, and promoting international cooperation to address common AI-related challenges.
“In advancing the defence and security with AI, Indonesia’s security will benefit from the strategic integration of AI technologies. These advancements can enhance Indonesia’s military capabilities, improve situational awareness, and strengthen its ability to respond to security threats effectively,” Jemie concluded.
- Like
- Digg
- Del
- Tumblr
- VKontakte
- Buffer
- Love This
- Odnoklassniki
- Meneame
- Blogger
- Amazon
- Yahoo Mail
- Gmail
- AOL
- Newsvine
- HackerNews
- Evernote
- MySpace
- Mail.ru
- Viadeo
- Line
- Comments
- Yummly
- SMS
- Viber
- Telegram
- Subscribe
- Skype
- Facebook Messenger
- Kakao
- LiveJournal
- Yammer
- Edgar
- Fintel
- Mix
- Instapaper
- Copy Link
The National Security Agency (NSA) and the Cybersecurity and Infrastructure Security Agency (CISA) have teamed up to release a comprehensive guide aimed at bolstering cloud security measures for organisations. Titled “Top Ten Cloud Security Mitigation Strategies,” this initiative aims to equip cloud customers with essential practices to enhance the security of their data as they migrate to cloud environments.
In an era where digital transformation is accelerating, the migration of data and operations to cloud platforms has become commonplace. However, this transition brings with it a myriad of security concerns, as evidenced by the increasing frequency of cyberattacks targeting cloud infrastructure. Recognising the critical need to address these challenges, the NSA and CISA have collaborated to compile a set of ten cybersecurity information sheets (CSIs), each focusing on a different aspect of cloud security.
One of the primary themes emphasised in the report is the importance of upholding the cloud-shared responsibility model. This model delineates the responsibilities between cloud service providers and their customers regarding security measures. By understanding and adhering to this model, organisations can ensure that they are taking appropriate steps to safeguard their data within the cloud environment.
Another key area highlighted in the report is the implementation of secure identity and access management practices. Proper management of user identities and access controls is essential for preventing unauthorised access to sensitive data stored in the cloud. Through robust authentication mechanisms and access policies, organisations can fortify their defences against potential security breaches.
In addition, the report emphasises the critical importance of implementing secure key management practices, robust encryption mechanisms, and effective network segmentation strategies within cloud environments. These measures play a pivotal role in protecting data both when it is stored and when it is being transferred, thereby reducing the likelihood of data breaches and unauthorised interception.
Furthermore, the report highlights the significance of securing data throughout its entire lifecycle in the cloud. This includes implementing stringent security measures for data storage, processing, transmission, and disposal. By doing so, organisations can effectively protect their data against a wide range of evolving threats.
Another critical aspect covered in the report is the defence of continuous integration/continuous delivery (CI/CD) environments. As organisations increasingly adopt DevOps practices and automate their software development processes, securing CI/CD pipelines becomes paramount to prevent the introduction of vulnerabilities and malicious code into production environments.
Moreover, the report emphasises the enforcement of secure automated deployment practices through infrastructure as code (IaC). By treating infrastructure as code and automating deployment processes, organisations can ensure consistency, repeatability, and security in their cloud environments.
The complexities introduced by hybrid cloud and multi-cloud environments are also addressed in the report. As organisations adopt hybrid and multi-cloud strategies to meet their diverse needs, they must navigate the unique security challenges posed by these environments effectively.
Additionally, the report highlights the risks associated with managed service providers (MSPs) in cloud environments. While MSPs offer valuable services and expertise, organisations must be vigilant in vetting and managing their relationships with MSPs to mitigate potential security risks.
The report stresses the importance of managing cloud logs for effective threat hunting. By aggregating and analysing logs generated by cloud services, organisations can proactively identify and respond to security incidents before they escalate.
The “Top Ten Cloud Security Mitigation Strategies” initiative by the NSA and CISA provides invaluable guidance to organisations seeking to enhance the security of their data in cloud environments. The NSA and CISA envision these strategies as foundational advice that every cloud customer should follow to mitigate the risks associated with cloud services. By implementing these strategies effectively, organisations anywhere can mitigate risks and bolster their defences against cyber threats in an increasingly digital landscape nowadays.
- Like
- Digg
- Del
- Tumblr
- VKontakte
- Buffer
- Love This
- Odnoklassniki
- Meneame
- Blogger
- Amazon
- Yahoo Mail
- Gmail
- AOL
- Newsvine
- HackerNews
- Evernote
- MySpace
- Mail.ru
- Viadeo
- Line
- Comments
- Yummly
- SMS
- Viber
- Telegram
- Subscribe
- Skype
- Facebook Messenger
- Kakao
- LiveJournal
- Yammer
- Edgar
- Fintel
- Mix
- Instapaper
- Copy Link
Dr Sylwia Kolenderska, a Senior Research Investigator in Physics at the University of Canterbury, spearheads a pioneering project to transform the ophthalmology landscape. Her innovative work harnesses the power of artificial intelligence (AI) to revolutionise the accessibility and affordability of optical coherence tomography (OCT), a pivotal imaging technique in assessing eye health. This endeavour holds immense promise for advancing ophthalmic care and underscores AI’s profound impact in pushing the boundaries of medical innovation.
OCT is often described as a light-based counterpart to ultrasound imaging and generates three-dimensional internal images of the eyes. These images are invaluable for ophthalmologists in diagnosing and monitoring various eye conditions. However, the high cost of traditional OCT equipment has limited its accessibility, particularly for researchers and clinicians in resource-constrained environments.
Dr Kolenderska’s research addresses this issue by leveraging AI to improve the data processing capabilities of OCT machines. She identified a key bottleneck in current expensive machines: the time-consuming process of calculating high-resolution images from raw signals. She aims to enhance the image quality of cheaper, lower-resolution OCT machines to match or surpass that of expensive models by developing a neural network algorithm akin to a sophisticated software update.
“The potential impact of this technology is enormous,” said Dr Kolenderska. “Not only will it make high-quality OCT imaging more affordable and accessible, but it could also lead to significant improvements in early detection and treatment of eye conditions.”
The application of AI in OCT data processing offers several advantages. AI algorithms identify complex patterns in data, enabling them to produce sharper and more detailed images than traditional algorithms. Dr Kolenderska estimates that the images generated by AI-enhanced OCT machines could be up to six times better than current images.
Moreover, the scalability of AI technology opens up possibilities for future hardware integration. Dr Kolenderska envisions a future where AI modules could be seamlessly attached to existing OCT machines, much like a USB stick, further democratising access to high-quality imaging capabilities.
In Asia Pacific, eye healthcare technology is making significant strides globally. According to a report by OpenGov Asia, in 2022, the Hong Kong Applied Science and Technology Research Institute (ASTRI) announced a partnership with the Centre for Eye and Vision Research (CEVR) to develop at least two projects aimed at treating patients of different ages suffering from lazy eye and other eye conditions. CEVR, established under the Innovation and Technology Commission’s platform for research and innovation, InnoHK, is at the forefront of innovative research in eye health care.
Amblyopia, a common visual impairment that reduces vision and 3D perception, requires retraining the brain to use information from both eyes. This is particularly challenging in adults due to reduced neuroplasticity and the brain’s full maturation with age.
In 2023, Hong Kong continued its innovative efforts in eye health care. A partnership between CEVR and DEFTA Partners was announced to advance technology transfer and commercialise eye and vision health research. Celebrated at The Hong Kong Polytechnic University (PolyU), this partnership will leverage DEFTA’s business network and CEVR’s research achievements to translate research outcomes into globally impactful products. The collaboration is expected to drive innovation in the eye and vision health field, addressing critical issues in the industry.
Dr Sylwia Kolenderska’s work in eye health care represents a significant advancement in the intersection of AI and medical imaging.
In the future, Dr Sylwia Kolenderska’s work is poised to have an even greater impact on the field of ophthalmology in New Zealand and beyond. As AI continues to evolve in this rapid technology landscape, its integration with medical imaging technologies like OCT holds immense promise for improving diagnostic accuracy, treatment efficacy, and patient outcomes.
- Like
- Digg
- Del
- Tumblr
- VKontakte
- Buffer
- Love This
- Odnoklassniki
- Meneame
- Blogger
- Amazon
- Yahoo Mail
- Gmail
- AOL
- Newsvine
- HackerNews
- Evernote
- MySpace
- Mail.ru
- Viadeo
- Line
- Comments
- Yummly
- SMS
- Viber
- Telegram
- Subscribe
- Skype
- Facebook Messenger
- Kakao
- LiveJournal
- Yammer
- Edgar
- Fintel
- Mix
- Instapaper
- Copy Link
Institut Teknologi Sepuluh Nopember (ITS) successfully conducted a trial application of the first-generation prototype of the ITS Al-Air Battery on a motorbike at the ITS Research Centre Building. This achievement, supported by Pertamina and the ITS Kedaireka Matching Fund, marks a pivotal step towards accelerating the use of Battery-Based Electric Vehicles (KLBB) in Indonesia.
Prof Dr Ir Heru Setyawan MEng, the head of the research team, described the metal-air battery in his research as a metal fuel engine that utilises aluminium.
This technology promises to expedite Indonesia’s energy and technological independence. One of the key advantages of these metal-air batteries is their ability to prevent dendrites or lithium metal crystallisation, a common issue in batteries that can lead to critical problems. The collaboration between Prof Heru and undergraduate (S1), master (S2), and doctoral (S3) students from the ITS Chemical Engineering Department underscores the interdisciplinary nature of this research effort.
The research team’s innovative approach involved the electrodeposition of a Zn and Mn metal alloy to address dendrite formation. The specially designed air battery features a slim and three-dimensional surface, enabling the uniform extraction of aluminium ions and resulting in a longer battery life, lasting up to 140 hours. Additionally, the battery is environmentally friendly, using an aqueous electrolyte with the addition of Sodium Chloride (NaCl) salt, a common household item that poses no harm to humans. Furthermore, concerns such as leakage and thermal runaway are mitigated, making the battery a safe and sustainable choice.
Despite the substantial electrical current requirements for motorbikes, Indonesia’s abundant aluminium resources have motivated the ITS research team to adopt this battery for KLBB. Moreover, aluminium batteries are more cost-effective than lithium-ion batteries, making them a viable option for widespread adoption.
The development of the ITS Al-Air Battery has been ongoing since 2013. However, the battery still requires further development to become a viable option for KLBB. Currently, the battery is primary, meaning it can only be disposed of after use. Plans include developing a secondary battery, making it rechargeable, and reducing its size for easier integration into vehicles.
Bambang Pramujati, ST MScEng PhD, ITS Vice Rector IV for Research, Innovation, Cooperation, and Alumni, expressed his appreciation for the support from Pertamina and Kedaireka, highlighting the importance of industry collaboration in advancing KLBB development. He emphasised the potential of the ITS Al-Air Battery to contribute to Indonesia’s energy independence and expressed hope for further advancements in this field.
In conclusion, the ITS Al-Air Battery represents a significant leap forward in battery technology, with the potential to revolutionise the use of Battery-Based Electric Vehicles in Indonesia. With ongoing research and industry collaboration, ITS aims to further refine this technology, paving the way for a more sustainable and energy-independent future.
This innovative breakthrough in battery technology underscores the importance of research and development in advancing Indonesia’s digital economy. As the country strives to achieve energy independence and reduce its reliance on fossil fuels, initiatives like the ITS Al-Air Battery play a crucial role in driving technological innovation and sustainable development.
The successful trial of the ITS Al-Air Battery on a motorcycle demonstrates the feasibility and potential of this technology for powering electric vehicles. The ability to prevent dendrite formation and ensure a longer battery life addresses key challenges in battery technology, making it a promising solution for Indonesia’s transportation sector.
Furthermore, the environmentally friendly nature of the battery, using an aqueous electrolyte and common household salt, highlights its potential for widespread adoption without posing harm to humans or the environment. This aspect aligns with global efforts to transition towards cleaner and more sustainable energy sources.
The collaboration between Prof Heru and students from the ITS Chemical Engineering Department also highlights the importance of interdisciplinary research in tackling complex challenges. By combining expertise from various fields, the research team was able to develop a novel solution that could have far-reaching impacts on Indonesia’s energy landscape.
Looking ahead, the development of a secondary battery that is rechargeable and smaller in size will further enhance the usability and practicality of the ITS Al-Air Battery for electric vehicles. This, coupled with the ongoing support from industry partners like Pertamina and Kedaireka, bodes well for the future commercialisation and implementation of this technology.
In conclusion, the trial application of the ITS Al-Air Battery represents a significant milestone in Indonesia’s quest for energy independence and technological advancement. With continued research and collaboration, innovations like this battery have the potential to reshape the country’s energy landscape and contribute to a more sustainable future.
- Like
- Digg
- Del
- Tumblr
- VKontakte
- Buffer
- Love This
- Odnoklassniki
- Meneame
- Blogger
- Amazon
- Yahoo Mail
- Gmail
- AOL
- Newsvine
- HackerNews
- Evernote
- MySpace
- Mail.ru
- Viadeo
- Line
- Comments
- Yummly
- SMS
- Viber
- Telegram
- Subscribe
- Skype
- Facebook Messenger
- Kakao
- LiveJournal
- Yammer
- Edgar
- Fintel
- Mix
- Instapaper
- Copy Link
Indonesia’s digital economy is on a path of acceleration, with projections indicating a substantial economic contribution of up to US$366 billion by 2030. This growth is intricately intertwined with the widespread adoption and effective utilisation of artificial intelligence (AI) technology across various industries. However, this rapid expansion also underscores the urgent need for more robust regulatory frameworks governing AI’s ethical and responsible use to mitigate potential societal harm.
This imperative was underscored in a Public Discussion titled “The Need to Develop Regulations for Artificial Intelligence Governance. The Faculty of Philosophy UGM organised them in collaboration with the Ministry of Communication and Information Technology (Kominfo) and the policy research and advocacy.
Key speakers such as Deputy Minister of Communication and Information Technology Nezar Patria, Dean of the Faculty of Philosophy UGM, Dr Siti Murtiningsih, Director of Government Relations Microsoft Indonesia and Brunei Darussalam Ajar Edi, Executive Director of the Policy Research and Advocacy, Wahyudi Djafar, and Head of the Artificial Intelligence Master’s Programme at the Faculty of Mathematics and Natural Sciences UGM, Afiahayati, PhD offered insights.
Deputy Minister, Nezar Patria, highlighted that the current contribution of the digital economy to the GDP still needs to be 10%. He emphasised the significant influence of AI technology adoption on the growth of the digital economy.
Consequently, Kominfo issued guidelines in December 2023 for the ethical use of AI, targeting AI developers and industrial sectors. Given AI’s impacts on society, economy, and culture, these guidelines aim to address ethical considerations.
The Ministry of Communication and Information Technology has advocated for using cutting-edge technology to enhance Indonesia’s global competitiveness. Nezar stressed the importance of aligning AI policies with international trends to ensure Indonesia’s optimal position in AI development and utilisation. This focus will directly impact the growth of domestic sectors.
Nezar acknowledged that the current AI guidelines lack legal enforceability as they need to be integrated into legislation. However, the government is actively monitoring AI’s growth in Indonesian industries. Nezar explained that they are moving towards soft regulation by observing the industry’s growth, aiming to maximise benefits while mitigating risks.
Some potential risks associated with AI use, as highlighted by Nezar, include the significant likelihood of AI misuse leading to social discrimination and the emergence of disinformation products that could disrupt social harmony.
In addition to providing ethical guidelines for AI usage in industries, Kominfo is also actively fostering digital talent development to support the digital economy’s growth over the next five to six years. “We require 9 million digital talents,” Nezar emphasised.
Dr Siti Murtiningsih emphasised that in an era of rapidly advancing information and communication technology, the emergence of AI poses ethical challenges. Consequently, AI’s development must align with moral and ethical values in society without compromising humanitarian principles.
She stressed the need for more robust legal frameworks to address societal and industrial interests related to AI usage. “We need to formulate laws that uphold the ethical principles of AI from a multidisciplinary perspective,” she asserted.
Ajar Edi noted that there are many misconceptions about AI in society. However, for executives and staff in companies, AI is primarily used to support tasks and work, enhancing efficiency and effectiveness. “Although there is potential for bias, human decision-makers are still the most appropriate to ensure sound decision-making,” he concluded.
Indonesia’s digital economy holds immense promise for growth, contingent on responsible AI governance and digital talent development. Establishing clear ethical guidelines and legal frameworks for AI usage will be pivotal in maximising its benefits while mitigating potential risks. Successfully regulated AI usage will result in organised outputs, ensuring the necessary values, ethics, and controls are observed for national interests.
- Like
- Digg
- Del
- Tumblr
- VKontakte
- Buffer
- Love This
- Odnoklassniki
- Meneame
- Blogger
- Amazon
- Yahoo Mail
- Gmail
- AOL
- Newsvine
- HackerNews
- Evernote
- MySpace
- Mail.ru
- Viadeo
- Line
- Comments
- Yummly
- SMS
- Viber
- Telegram
- Subscribe
- Skype
- Facebook Messenger
- Kakao
- LiveJournal
- Yammer
- Edgar
- Fintel
- Mix
- Instapaper
- Copy Link
In the era of digital transformation, the hybrid cloud has become a crucial driver for organisations striving to navigate and thrive in a rapidly evolving environment. The adoption of advanced technologies such as big data analytics, machine learning, and artificial intelligence empowers businesses to leverage innovation and enhance their decision-making processes. This paradigm shift underscores the importance of hybrid cloud in enabling organisations to adapt to change, drive growth, and remain competitive in today’s dynamic business landscape.
Executives surveyed by HPE support the idea that a hybrid cloud strategy represents the optimal blend of technologies for achieving their company’s goals. According to their findings, 91% of organisations are currently implementing this operational model to some extent. Among these organisations, 33% utilise a combination of private and public clouds, while 31% leverage a mix of private and public clouds along with on-premises infrastructure.
Global enterprise leaders emphasise that a hybrid cloud approach offers unparalleled flexibility and control, allowing organisations to tailor their operations to suit their specific needs. This approach also facilitates seamless integration, enabling businesses to develop digital products and services with agility and efficiently move data across different environments. These capabilities are instrumental in driving business growth, creating new revenue streams, and facilitating the integration of acquired companies by transitioning their existing legacy on-premises systems into existing cloud components.
Similarly, Singaporean enterprises and organisations have demonstrated a solid commitment to technological advancement by widely adopting cloud strategies. Recognising the importance of flexibility and scalability in today’s digital era, they have embraced hybrid cloud solutions to seamlessly integrate on-premises infrastructure with public and private cloud services, enabling them to optimise their operations.
The strategic objectives driving Singapore’s embrace of hybrid cloud, including enhancing operational efficiency, facilitating digital transformation, and capitalising on emerging opportunities, highlight the importance of a well-defined plan for successful implementation. Without this strategic approach, organisations may find themselves with a fragmented and inefficient hybrid data and cloud environment, failing to realise the full benefits of hybrid cloud adoption.
To avoid this scenario, organisations must adopt a more strategic approach to hybrid cloud and simplify data management. This involves shifting from a hybrid cloud implementation by accident to one by design, thereby enhancing their cloud operating model and maximising the benefits of hybrid cloud adoption.
Furthermore, security remains a paramount concern in hybrid cloud environments. Organisations and enterprises must assess their risk tolerance, as opting for an exclusive private cloud might seem like the safest choice. However, despite the common belief that private clouds offer the highest level of security, the advantages of a hybrid cloud far outweigh this assumption. It is crucial to understand that the hybrid model is not inherently insecure simply because private clouds are often perceived as more secure.
Hybrid cloud affords organisations the flexibility to implement security measures across various layers, including legacy systems, on-premise private clouds, and cloud-based data. This approach enables organisations to implement stricter security measures, outsource to specialised providers, establish secure connections through tunnels, and reduce the time spent on monitoring security subsystems and compliance risks.
Virtual Private Networks (VPNs) can mitigate data compromise risks when transmitting data between legacy systems, on-premises infrastructure, and the cloud. Additionally, a hybrid cloud setup introduces redundancy, enabling organisations to implement backup plans and minimise downtime. Overall, the hybrid cloud model helps reduce risk and allows organisations to concentrate on their core business activities.
The OpenGov Breakfast Insight on 8 March 2024 at Equarius Hotel Singapore has delved into the critical role of hybrid cloud in modern business operations, highlighting its ability to provide flexibility, scalability, and enhanced security. With a focus on practical insights and real-world examples, the event provided delegates with valuable information on how to implement and manage hybrid cloud solutions effectively.
Opening Remarks
According to Mohit Sagar, the CEO and Editor-in-Chief at OpenGov Asia, businesses increasingly turn to hybrid cloud solutions for operational optimisation and competitiveness in the digital age. This architecture combines on-premises infrastructure with public and private cloud services, offering flexibility and scalability and allowing strategic workload, application, and data transfers across environments for enhanced performance and cost-effectiveness.
“Singapore has made significant strides in digital transformation by integrating on-premises infrastructure with public and private cloud services,” Mohit acknowledges. “This strategic approach offers unparalleled flexibility, scalability, and innovation, positioning Singapore at the forefront of technological advancement.”
Adopting a hybrid cloud is both a technical change and a strategic imperative for sustainable growth in the digital era, as exemplified by Singapore’s significant strides in digital transformation.
Businesses in Singapore maximise performance, manage workloads effectively, and balance security and compliance complexities with a hybrid cloud strategy. The hybrid model enables organisations to balance security, compliance, and innovation, supporting confident digital transformation.
“In Singapore, 67% of IT teams used a combination of private and public clouds, multiple public clouds, or on-premises and hosted data centres,” Mohit reveals. “Even with data management and complexity difficulties, more than two-thirds of Singaporean firms utilise a combination of private and public cloud and on-premises and hosted data centres.”
Elaborating on the advantages of a hybrid cloud, highlighting its ability to leverage the strengths of both on-premises and cloud systems, Mohit notes that global enterprise leaders believe that a hybrid cloud gives you the flexibility to operate and better control that suits the organisation better operate and better control that suits the organisation best.
The hybrid cloud allows seamless integration for developing digital products and services with agility, enabling data movement across various environments to foster business growth and generate new revenue streams. This is particularly relevant in scenarios where a company is acquired and it is necessary to migrate its legacy on-premises systems to one of the established cloud components.
Hybrid cloud adoption is seen as a tactical advantage, offering a comprehensive solution that combines flexibility, speed, and cost efficiency for organisations undergoing digital transformation. However, despite these benefits, organisations must also address several challenges.
A major challenge is the complexity of operating a hybrid environment that mixes on-premises infrastructure with public and private cloud services. Integration and interoperability challenges may arise, requiring careful design and implementation.
Another significant concern is the issue of security, which requires strong measures to balance accessibility and data protection. Organisations must establish comprehensive security plans to safeguard data, applications, and communication channels.
Additionally, managing the specialised skills, tools, and complexities of data transport and storage in a hybrid environment may increase costs.
Successfully addressing these challenges is crucial for organisations to realise the full benefits of hybrid cloud adoption.
Nevertheless, Mohit recognises that the hybrid cloud is a transformative force, far more than just a technological tool. It is a catalyst for change, a compass directing enterprises through new landscapes.
“With this in mind let’s create new paths together,” Mohit exhorts the delegates, “Empowered by the revolutionary potential of hybrid cloud solutions, we have the opportunity to shape a future characterised by boundless creativity and possibilities.”
Technology Insight
Dilipkumar B. Khandelwal, Chief Technology Officer for SG/SEA at Hewlett Packard Enterprise, provided insights into the advantages and obstacles associated with hybrid cloud utilisation. He also offered his viewpoint on cloud adoption strategies, effective implementation of hybrid approaches, and methods for tackling governance issues.
Dilipkumar recognises the critical importance of a hybrid cloud in modern business operations. This approach combines the best of both worlds, allowing organisations to leverage the scalability and flexibility of cloud services while maintaining control over sensitive data and applications. By embracing a hybrid cloud, businesses can adapt quickly to changing market conditions, innovate with agility, and drive growth in a rapidly evolving digital landscape.
With a hybrid cloud, businesses can run sensitive workloads in their private cloud and transfer data between suitable public cloud data centres, adapting to regulatory changes and evolving requirements.
Business continuity, crucial for regulatory compliance, is improved with hybrid cloud support for application, data, and disaster recovery tasks, protecting against system failures, security issues, and physical disasters.
For example, a company could duplicate critical workload data from a local application to a public cloud, ensuring availability or recovery in case of data loss. In a more complex scenario, a business might scale or migrate a busy application from its private cloud to the public cloud to manage increased user traffic, preventing performance issues and improving user experience.
Enterprise applications and data resources inherently carry security, performance, and reliability risks. Hybrid clouds provide companies with the flexibility and control to strategically position applications and data according to changing business and technological needs.
Building on this idea, with a hybrid cloud, enterprises can choose the location of applications and data and determine the most effective way to allocate resources and services to achieve optimal outcomes for the business and its application users.
Dilipkumar acknowledged that deploying hybrid clouds can be challenging due to configuration and security complexities. IT staff must manage authentication and security measures for private and public cloud workloads and data, ensuring consistency and complementarity across both realms.
“It is crucial to ensure that security settings are consistent and complementary across both realms, as any change in one cloud may need to be reflected in the other,” Dilipkumar cautions.
In tackling these obstacles, Dilipkumar says that HPE provides unmatched simplicity in deploying hybrid cloud solutions. Referred to as a unified edge-to-cloud platform, HPE offers a streamlined and accessible method for building and overseeing hybrid cloud ecosystems.
It integrates critical features such as flexibility, scalability, security, visibility, and ease of management, allowing organisations to deploy traditional or cloud-native workloads across their entire IT ecosystem.
“In the dynamic digital landscape, the hybrid cloud is pivotal for businesses, offering agility and control,” concludes Dilipkumar. “By simplifying the adoption and management of hybrid cloud strategies, HPE empowers companies to leverage the latest technologies effectively and stay ahead. We support a hybrid-centric strategy.”
In Conversation With
A hybrid cloud is a sophisticated cloud computing system that integrates public and private cloud services to manage a wide range of applications effectively. This environment provides organisations with the flexibility to place their most sensitive workloads in an on-premise cloud (private cloud) while leveraging third-party cloud providers for less critical resources, thus allowing them to harness the advantages of both approaches.
For enterprises seeking greater control and security over their data while also requiring a cost-effective way to scale operations to meet fluctuating demands and support long-term growth, a hybrid cloud emerges as the optimal choice.
Sander Veraar, Vice President of Strategic Services at StarHub, underscored the critical role of cost management in companies contemplating cloud migration. While choosing a private cloud involves substantial fixed costs for owning and managing internal data centres, public cloud services offer a more adaptable cost structure with operational and variable expenses.
“A hybrid cloud environment offers companies the flexibility to store their sensitive business-critical data on their on-site servers while utilising the public cloud for less critical data and applications,” explained Sander.
This setup allows businesses to optimise their infrastructure costs by scaling resources according to demand. During periods of increased demand, companies can avoid significant capital expenditures by paying for the resources they actually use. Conversely, when demand decreases, costs are reduced accordingly.
Sander believes that organisations gain significant resource advantages with a hybrid cloud compared to traditional physical data centres. The hybrid cloud’s ability to efficiently allocate, deploy, and scale resources enables companies to respond to spikes in demand quickly. When demand exceeds the local data centre’s capacity, a company must have the capability to scale up immediately to meet the increase, a capability that a hybrid cloud environment provides effectively.
Sander points out that a swift response not only prevents missing potential customers but also protects the organisation’s brand reputation. A hybrid cloud setup allows companies to scale up applications to the public cloud to meet demand, ensuring extra capacity and scalability.
Organisations can proactively manage evolving security challenges in a hybrid cloud environment by tackling the following critical issues and adopting recommended strategies:
- Visibility Challenges: The integration of public and private clouds can introduce complexity and elevate security risks.
- Insecure Data Transmission: Data transfer between public and private clouds poses security risks, such as eavesdropping or cyberattacks. Robust encryption, including hardware security modules and cryptographic tools, is crucial to secure data in transit.
- Compliance Challenges: Hybrid cloud complexity can challenge compliance efforts. To maintain compliance, prioritise it from the start, conduct continuous security assessments, and follow data security guidelines. Encryption and adherence to standards can also help.
- Supply Chain Vulnerabilities: Small vendors in the supply chain pose major security risks. Attackers may exploit these vulnerabilities to access larger targets. To mitigate this, use strong encryption and strict access control to secure data transfers and reduce hybrid cloud breach risks.
By effectively addressing these challenges and implementing best practices such as robust encryption, continuous security risk assessment, and stringent compliance adherence, organisations can enhance their security posture in a hybrid cloud environment and proactively mitigate emerging security concerns.
Dilipkumar B. Khandelwal, who serves as a Chief Technology Officer SG/SEA, Hewlett Packard Enterprise, explained that Hybrid cloud solutions combine on-premises and public cloud environments, enabling seamless collaboration and data integration across diverse sources. They enhance intelligence through:
Data Warehouse Integration: Combining data from AWS Redshift, Google BigQuery, and Azure Blob Storage into a centralised data warehouse for quicker insights and decision-making.
IoT Connectivity: Connecting IoT devices to a centralised data repository for improved operational efficiency and insights for predictive maintenance.
Machine Learning Model Training: Increasing accuracy and relevance by feeding machine learning models with real-time data from various sources.
Security Analytics: Strengthening security monitoring and incident detection by collecting and analysing log files and event data from multiple sources.
Customer Experience Enrichment: Improving personalisation and satisfaction by creating a comprehensive customer profile from various touchpoints.
These examples showcase how hybrid cloud solutions streamline data integration, leading to actionable insights, increased efficiency, and enhanced intelligence. They promote collaboration and innovation by connecting data sources and breaking down organisational silos.
In managing threat detection and continuous monitoring in a hybrid cloud environment, various strategies are used to mitigate security risks and promptly identify potential breaches. These include:
- Real-Time Threat Detection: Using advanced cloud security monitoring solutions to continuously scan logs and events across the hybrid environment for anomalous activities in near-real-time.
- Multi-Layer Security Approach: Implementing a combination of native cloud monitoring tools, third-party solutions, and best practices to ensure comprehensive coverage of the hybrid cloud infrastructure.
- Cloud Security Information and Event Management (SIEM): Employing an SIEM tool to collect and analyse log data from both physical and virtual servers, aiding in the identification of suspicious behaviour and reducing false positives.
Additionally, employing machine learning algorithms and AI-powered threat detection engines can significantly enhance the identification of sophisticated threats. Collaborating with other organisations and security communities to share threat intelligence can improve defence mechanisms and reduce blind spots.
Applying a zero-trust model, where no entity is implicitly trusted, can help limit the impact of compromised credentials and reduce the likelihood of successful attacks.
“These approaches, coupled with staying abreast of the latest developments in cloud security, enable organisations to defend against the unique challenges of hybrid cloud architectures proactively,” Dilipkumar says.
Closing Remarks
Dilipkumar expressed gratitude to the attendees of the OpenGov Breakfast Insight, acknowledging their dedication to sharing knowledge and fostering professional connections in the digital era.
He views these gatherings not simply as conversations, but as opportunities to exchange valuable experiences and insights essential for navigating the complexities of today’s digital landscape. Dilipkumar is optimistic that these interactions will enable participants to leverage their newfound knowledge in their respective workplaces, promoting innovation and facilitating growth.
Dilipkumar reiterated the benefits of hybrid cloud solutions, which blend public and private cloud services to enhance operational efficiency and flexibility while safeguarding sensitive data. He highlighted their importance in digital transformations to maintain competitiveness and resilience in evolving business environments.
In such circumstances, it becomes evident that businesses can generate significant value for themselves and society at large by embracing technology wisely. He emphasised the necessity of continuous learning and adapting to technological advancements, acknowledging the dynamic nature of the technology sector and the ongoing need for education and evolution.
Furthermore, Dilipkumar encouraged continued collaboration and knowledge sharing among participants to foster a robust business ecosystem. He is convinced that success in the digital era hinges on collective efforts and the sharing of insights and best practices. By working together, businesses can create an innovative and sustainable environment that benefits all stakeholders.
Dilipkumar expressed optimism about the delegates’ potential to drive technological innovation and address challenges in the digital era. He urged them to maintain their commitment to advancing technology and assisting companies and customers in navigating the evolving digital landscape.
“Given your experience and dedication, I am confident that you will continue to play a pivotal role in shaping the technology industry and fostering business sustainability,” Dilipkumar concluded.