Categories
Horizon 2050

Nadia – Chapter II

Follow the story of Nadia, a quantum security expert in 2050 London

Nadia, a story by Miquel Morales.

Jumping in now? Catch up with previous chapters.

Chapter II

“You did great today, Nadia.” Ziza seemed quite enthusiastic. Perhaps too much.

“I guess? I just hope this goes through. Could really use the commission this month,” said Nadia as she entered the elevator. A few weeks ago, she had timed how long it took for the lift to reach the ground floor. Fifty-eight floors in barely thirty seconds. Now that was fast.

In the streets, the morning fog had turned into evening fog. Waves of commuters struggled against the tide to find their way home. Nadia avoided the constant stream of electric scooters and made her way down the street and into the subway station. As always, the train car was packed. Nadia tried to maintain the balance without touching anything or anyone. It was like surfing, but cheaper. As programmed, Ziza went on to cover the news of the day. Apparently two members of the same family won the Mars shuttle lottery. What were the odds?

“Incoming message,” said Ziza halfway through the report. 

“Shoot.”

It was a message from Tom. Short and sweet, as he liked to say – Get some sleep. We start first thing tomorrow.

Nadia was ecstatic. She decided to stop by the bakery right beneath her apartment and get a big box of pastries to bring with her to the office the next day. She fought the urge to grab one of them as during the way up. They were freshly baked, and the warmth of the box felt nice on her cold hands.     

But as she reached the top of the stairs, Nadia saw that the door to her apartment was half open. She rushed down the hall, expecting to find everything upside down like it happened when burglars entered her parents’ house last year. To her surprise, everything was exactly like she had left it that morning. Well, everything but a small envelope that was resting in the middle of the living room floor.

Nadia opened it and found an old thumb drive. She remembered her Computer History teacher telling them about these early 21st-century storage devices. To think that people would carry those around all the time… And only for a few GBs worth of storage.

Intrigued, Nadia closed the apartment’s door and examined the drive. Maurice at the office was good at these things. He had all sorts of gadgets and spare parts, but Nadia couldn’t wait until tomorrow. Should she call the police? Nah. Nothing got stolen, and it was not worth all that time and paperwork. Wait

She took the old laptop that her dad had given her to decorate her new flat. It had belonged to her grandfather, apparently. It took her a while, but she finally managed to detach one of the laptop’s USB ports and connect it to her home computer. She inserted the thumb drive. With a sudden bang, a power surge left the room in the dark. Of course.

“Ziza, status report. What happened?”

“Hello, Nadia.” But to her surprise, it wasn’t Ziza’s voice. It was that of a young woman.

“Who… who are you?”

“You can call me EVE.”


Nadia took a long sip of coffee and let her gaze go from one person to the other around the conference table. A strange bunch. Even in their formal business attires, she could tell how different they were from one another. Two men and two women, their ages ranging from the early thirties to the mid-fifties. She tried to come up with a background story for each one of them as Tom from sales walked them through the proposal. Raindrops kept hitting the glass wall behind them. It was an unusually foggy autumn day. Nadia could barely see the building across the street.

“I keep telling you: there’s something weird about this guy. It’s as if… Hey – Nadia. For real?” Tom’s hand was suddenly going up and down in front of her face.

“Sorry, what?”

Nadia came back to her surroundings and tried to recall anything of her colleague’s speech. Not a chance. She swallowed the rice in her mouth and smiled at Tom. He was sitting on the opposite side of the cafeteria table. His bald head and shaven face contrasted with the overly sized red glasses he was wearing. He had a different colour for every day of the week. Or so Nadia liked to think.    

“Never mind, don’t bother.”

“Look, Tom. I’m sorry. I know I’ve been a bit off these past few days,” said Nadia. The dining hall was rather empty that day. Perhaps one of the office floors was having a birthday celebration or something. Hmmm — pizza.

“Seriously, it was nothing,” said Tom. “But Nadia; I’m a little worried about you. Ever since we signed on RayStar you have been acting all down and so not like you. I thought that this is what you wanted, to work on a big account, you know – have an impact.”

“By quietly shielding a major corporation from dozens of cyberattacks every day? Yeah, right. Big game changer over here. Hey, I’m going to save the world!” Nadia had raised her voice and was now speaking to the whole room, her arms held high above her in a gesture of victory.

A few heads turned, shook in disbelief and then went back to their plates. Tom sighed and got up.

“Play tough if you want. Sarcasm won’t hide whatever is wrong. Especially not from you.” Tom reached for the interior pocket of his bright blue blazer and took out a black plastic card. “There’s this place in Shoreditch. A friend of Hao is throwing a party there tomorrow night. Drop by, would you? You could use a break. Use this to get in.”

Tom left the card on the table and walked off, adjusting his glasses with the index finger. Ugh. That had been hard. She loved Tom. He and his boyfriend were just so nice to her. When was the last time she had seen Hao anyway? Nadia picked up the card and flipped it. There were some words carved into the plastic: The Blue Dragon. 4 Chance St, Shoreditch, London.

“Let me guess; I am not allowed to go,” said Nadia to the silent partner in her ear.

“I did not say that,” responded the female voice. Nadia felt the frustration mounting up and took a long, deep breath.

“So, I can barely talk to anyone, but I’m allowed to go to a party?”

“Even I have feelings, Nadia,” said EVE laughing. “You have been so good these past weeks. Plus, we don’t want them to get suspicious. I sensed distress in your friend’s voice. Well-intended, nosey people can cause a lot of problems.”

“Well, aren’t you nice?” Nadia did nothing to disguise her disdain. She didn’t even know who she was talking to — an AI or a real person. Nadia grabbed her bag and started making her way back to the holovisor room.

“Oh, and Nadia. Don’t say anything you might regret at the party. We wouldn’t want your sister to get hurt, would we?”

A chill went down Nadia’s spine as she rested her chin on the biometric scan that guarded the RayStar project holovisors. The doors opened with a soft beep. Nadia walked in.

To be continued…

Read the next chapter: Nadia – Chapter III

Join our talent community - Mindquest

Need tips on how to find a job in IT? Check out our IT job hunting guide.

Categories
Horizon 2050

Nadia – Chapter I

Follow the story of Nadia, a quantum security expert in 2050 London

Nadia, a story by Miquel Morales.

Discover our last story: Edna’s Garden

London — October 23rd, 2050.

Nadia’s eyes were red after hours with the holovisor on. The newer models came with ocular moisturizing tech, but not all companies were eager to take on the extra cost just for the visual well-being of their employees. At least not yet. Her friend Sudi had one of those fancy rigs at the office. Apparently, you didn’t even need to use your hands to manipulate data sets and subroutines. A simple mental order would get the job done. Nadia thought for a second of how lazy humans had become. It was hard to imagine how, just thirty years ago, people like her had to rely on mechanical input devices and raw code to do their jobs.    

A pulsating glow on the bottom right corner of her field of vision brought her back from the history tour. The alert was accompanied by a low-pitched beeping sound. She veered right with a gesture of the hand and pulled the message window closer to her.

“Unusual log entry detected,” said the virtual operator in a quirky and piercing male voice.

Nadia had recently configured her AI to sound like Saneer Ziza, her and her sister’s favourite comedy actor. She had to give it to her sister — for the first time in years, she had come up with a pretty thoughtful birthday gift. Perhaps age was starting to weigh on her and she was finally letting some barriers down. In any case, Nadia had been enjoying the company of Ziza’s humour while scouting the network for potential breaches. It made everything sound quite funny, actually. Even that alert.  

“Give me a full report,” requested Nadia. Like anyone who deserved to call themselves a data integrity expert, she knew better than to ignore odd entries in the system’s registry of activity. It was one of the thousands of parameters she had trained Ziza to monitor.

“Sorry, Nadia. The event log no longer shows any abnormalities.”

Weird. “What do you mean by ‘no longer’? ” she asked, bothered.

“I have reviewed the records 43,901 times, and there doesn’t seem to be anything out of the ordinary here.”

“Why would you alert me of an unusual entry, then?

“Sorry, Nadia. I cannot answer that question without an irregularity to make reference to.”

“But you just said ‘no longer’, which means you have memory of the irregularity being there in the first place.”

“I was merely referencing my previous statement.”

Nadia sighed and rolled her eyes — not a great idea, dry as they were. These annoying bugs had become more common since the last system update. She couldn’t wait for the next patch.

“Flag this over to maintenance, would you?”

She took the headset off and threw herself on the sofa. The four walls of her studio felt somewhat oppressing after the vastness of the digital world. Stretching arms and legs, she told Ziza to put on some music and got herself lost in thought. Tomorrow was an office day. Plus, she had that new business meeting first thing in the morning. It would be a big deal if they signed this client. Sunset filtered through the blinds, projecting red and orange stripes on the opposing wall.


Nadia took a long sip of coffee and let her gaze go from one person to the other around the conference table. A strange bunch. Even in their formal business attires, she could tell how different they were from one another. Two men and two women, their ages ranging from the early thirties to the mid-fifties. She tried to come up with a background story for each one of them as Tom from sales walked them through the proposal. Raindrops kept hitting the glass wall behind them. It was an unusually foggy autumn day. Nadia could barely see the building across the street.

“And that, ladies and gentlemen, is how we’ll solve your problem. That’s if you decide to move forward with the plan, of course,” said Tom with a polite smile that Nadia knew too well. “Quantum cryptography has come a long way, and we’ve been there since the beginning. Others will promise they can do it too, but our unique encryption system is the only way to fully guarantee that your customer’s data stays secure throughout all transactions.”

RayStar was one of those brand names all professionals know. They were in — well — everything. Financial services, insurance, enterprise software. Anything your average business would need. But recently they had started focusing on the consumer market, using their machine learning expertise and their access to most of the world’s data to develop a new kind of personal AI assistant: Duplo.

The premise was pretty straightforward. Who better to help you manage your everyday tasks than an exact copy of yourself? Somehow, RayStar had managed to aggregate all your data and create an AI that thought and acted just like you do. Of course, your Duplo wasn’t perfect. But it was way more effective than any other AI assistant out there. Media hype was strong.

With the product’s official release scheduled for next month, RayStar was looking to find a security partner that could ensure the protection of user data. AI chips had improved a lot in terms of security, and most AIs were able to run locally on the user’s device or network. But Duplo was simply too complex. A central quantum computer was required to process all the assistant’s responses, and that was a major liability considering how sensitive personal data was. The chances for someone to intercept the information along the way were simply too high. That’s where Nadia’s firm came in.

“Forgive me, but I fail to understand how this, hmm, binding is the only way to protect the data 100%,” said one of the RayStar executives. Clearly more of a businessman than a technical type.

“Ray Goldstein, VP of Compliance,” whispered Ziza’s voice through the earpiece Nadia had on. The exec was talking about the process by which Nadia’s company would ensure the encryption keys remained confidential. RayStar’s CIO, a middle-aged woman with piercing eyes, looked at her colleague with impatience, probably hoping to wrap that up quickly so that she could move onto the next endless meeting of the day. Tom was looking at Nadia, silently begging her to step in.

“It’s entanglement, actually, sir,” said Nadia. “Although binding works as a concept as well,” she added with a smile. “In very basic terms, we encrypt the data by generating two identical sets of random numbers — or ‘keys’ — that we then send to your central system. Your supercomputer can only read and process the data by first using that key to decrypt it, so that…”

“See. That’s exactly what I am saying,” said the VP. “We are trying to prevent someone from accessing the data during transactions by sending a key, the password. But what’s to prevent them from intercepting that key as well?” Nadia could now clearly hear the CIO’s fingers tapping nervously on the table.

“That’s precisely why our real-time entanglement system is the only way the secure your transactions, Mr Goldstein,” explained Nadia. “It all comes down to quantum theory. Sub-atomic particles. Quantum mechanics tells us that, when we generate a password, the value of that password will be altered once we look at it. Meanwhile, the property of entanglement dictates that two entangled keys will be tied across time and space, so that whatever happens to one affects the other.”

“I see,” said the VP, clearly not seeing it at all.

“Think of it as a pair of twins, if you will,” said Nadia. “It is said that twins can feel it whenever something happens to their other half, even if they are thousands of miles apart. Well, here this is actually true. If someone was eavesdropping and intercepted one of the keys, we would be able to detect it. Something would feel off.”

“Oh, I see. Interesting. I actually have a twin, you know?”

To be continued…

Read the next chapter: Nadia – Chapter II

Join our talent community - Mindquest

Need tips on how to find a job in IT? Check out our IT job hunting guide.

Categories
DSI challenges IT Decision-makers

Finding security experts in the COVID-19 crisis: a major challenge for IT departments

How to find the good security experts? About a third of the world’s population is estimated to be currently under confinement to stop the spread of the novel coronavirus. As a result, businesses across the globe are resorting to remote work to continue operations in those areas where that is possible. This is adding unprecedented amounts of stress to already understaffed IT departments. 

CIOs and other IT leaders find themselves racing against the clock to adapt the whole company’s infrastructure to a work-from-home scenario while tackling their biggest concern: cybersecurity. And for good reason – threats are increasing exponentially. 

But assembling the right security experts & security team is proving even more difficult than it usually is already. 

Security threats give no quarter  

Hackers are certainly not going to close shop because of a tiny microorganism. If anything, they are using it to their benefit. For instance; phishing emails; were already the most common form of attack experienced by organisations. But the past days have seen a great surge in attacks trying to lure employees into clicking on an email sent by “their boss” or containing virus-related information.  

Among the most reprehensible of attacks are those being experienced by health and medical institutions. Not even the World Health Organisation was spared, targeted earlier last month by a false-domain attack aimed at stealing passwords from agency staffers. The situation is so dire that a group of 400 security experts from international giants like Microsoft and Amazon has volunteered to fight hacking tied to the coronavirus.  

Yet that is not the main issue. The pressure being put on enterprise networks is quickly revealing system vulnerabilities. And especially for those companies least used to distributed work and that rely too much on local networks. In short, the soaring numbers of employees working from home are finally making most decision-makers aware of what IT leaders have been warning us for a while. The business world’s generalised lack of a comprehensive security policy and employee awareness training.    

Although effective measures like VPNs have gained adoption in recent years, problems generated by shadow IT and BYOD remain largely unresolved. Many staffers will be accessing company resources through their personal devices and networks in the coming weeks. Multiplying exponentially the potential points of entry for attackers.  

Experts are becoming even harder to find 

In turn, this increase in cyberthreats is exacerbating the skill and personnel shortages the security sector was already experiencing. According to a recent study by ISC, the global security industry lacks more than 4 million security professionals. The world’s security workforce would need to grow 145% yearly just to meet the demand for skilled talent.  

The shortage of skills impacts some of the most critical roles within IT security. Such as those related to identifying threats or patching and updating vulnerable systems. However, the deficit is more acute in areas tied to rapidly emerging or evolving technologies. For instance, and in this WFH crisis more than ever, security in multi-cloud environments is key. Unfortunately, few organisations have dedicated cloud security experts or proper encryption protocols for their data in the cloud.   

Not surprisingly, the cost of security expertise has also become a problem as the lack of skilled talent drives wages up. And so the vicious circle goes.   

Hire or outsource? 

With everyone battling over the same security experts. Defining a solid talent strategy and identifying the right partners can make the difference; between a multi-million breach and your department’s success.  

Regarding your talent strategy, you first need to decide whether you want to expand your team or rely on the temporary help of consultants. If you had been planning on bringing more people on board for some time, this might be the perfect time to create new permanent positions or fill vacant ones.  

On the other hand, calling on a freelancer will most likely allow you to speed up the selection process and provide a quicker response to the crisis. Working with an independent contractor can also help you secure exactly the skills you need at a more competitive cost. As the freelance talent market tends to be more agile and flexible. 

No matter which option you are leaning towards, don’t hesitate to seek the guidance and help of talent experts. Time is of the essence in the cybersecurity wars. Partnering up with the right IT staffing specialists will not only allow you to access the best talent; it will help you secure it before another company closes the deal.  

Need Extra IT Support? Avoid Mistakes When Hiring Tech Freelancers


Join our community and find your next job or expert in IT


Categories
Press review Tech Magazine

Weekly News Digest #8

You heard it right, Timmy. No more “abc123.”

Scary news this week – and not only regarding COVID-19.

On Wednesday, the National Cyber Security Centre (NCSC) — the UK’s cyber-defence organ – warned the public about the ease with which baby monitors and other smart devices can be (and have been) hacked. 

The usual culprit? Weak default passwords.

In one of the creepiest reported episodes, the attacker spoke to a young girl in Tennessee pretending to be ‘Father Christmas.’

Terrifying. And a good reminder for security experts to take the dangers of human oversight seriously, both at home and at work. 

Meanwhile, tech conferences all over the world are being cancelled or going virtual over global infection fears. Oh, dear. This is shaping up to be another one of those coronavirus specials… 

Facebook’s F8, Microsoft’s MVP Global Summit and Google I/O are among the affected events. 

The latter two companies also announced that they’ll be making their professional conferencing tools available for free as a growing number of firms are encouraging their employees to work remotely.

You know what they say — If life gives you lemons, start promoting your products.

Still haven’t had enough coronavirus? Check out this story on how AI and robotics are helping fight the virus. 

Faith in humanity (and robots) restored ?

And, speaking of robots… 

Researchers at Google have created a robot that taught itself how to walk using reinforcement-learning algorithms.

It took the robot just a few hours to do what we humans need an average of a year to learn. A promising milestone for artificial intelligence. 

So cute. 

Categories
Cybersecurity Tech Magazine

What to expect from cybersecurity in 2020

One thing’s clear about what will happen with online threats in 2020: cybersecurity is not getting any easier. The good news is that it’s the early months of the year and all predictions are in, so there’s still some time to get ready. What to expect from cybersecurity in 2020?

And so, we went on a quest through the vastness of cyberspace in search of the best and finest predictions out there. Then we added our own expertise to the mix. The result is a shortlist of considerations we suggest you keep in mind when designing or implementing your cybersecurity strategy for the year ahead.

On history and its annoying tendency to repeat itself

Remember WannaCry? The National Health Service surely does after almost £100m in losses and the cancellation of 19.000 appointments. But the NHS was not alone. Around 230,000 computers in over 150 countries were infected in a matter of hours, leading to an estimated $4 billion in total losses. The culprit? An NSA-devised exploit of Windows’ EternalBlue vulnerability, for which Microsoft released a patch shortly after the liability was made public.

The problem with software updates, however, is that not everybody installs them. Furthermore, some users cannot even install the patch since they’re running older software versions that are no longer offered support — Rings a bell?

Microsoft’s Windows 7 service cut is bound to follow the same path. Sure — the company is extending its support to businesses until 2023, so those running business-critical applications that only work on the old OS should be fine. But, that’s only if they are willing and able to pay. Add those who can’t to the forgetful types who won’t be upgrading out of plain carelessness, and you have 2017 all over again.

Be ready for the very real possibility of a massive attack that infects unpatched users and spreads laterally from one organization to another, from one country to the next. It only takes one sloppy third party for disaster to unfold.    

Dark clouds on the horizon

As everyone and their mother moves their infrastructure and business-critical workloads to the cloud, the potential for a massive data breach affecting all the nodes in the network is skyrocketing.

Perhaps the strike comes from a company or cloud provider that didn’t carry out due diligence and didn’t effectively protect their data during transmission, storage or processing. Or, maybe, as Kaspersky Lab suggests, attackers will leverage the cloud themselves to increase the frequency of their attacks until one breaks through.

What is obvious at this point, is that you should tread very carefully when navigating the multi-cloud ecosystem. Make sure all the involved stakeholders understand the extent of your cloud ramifications. Hire a robust security team. Partner with the right providers.   

Cybersecurity in 2020: The advent of 5G

The more connections in a network, the greater the benefit for those who manage to break into it.  As Forescout points out, enterprise 5G adoption is expected to reach critical mass in 2020. The sheer number of connected devices and the amounts of data they hold should be attractive enough for attackers to try to exploit the vulnerabilities of cellular networks.

If you’re betting big on IoT and 5G, make sure your team is prepared for, or at least aware of, these vulnerabilities and is monitoring for potential attacks. The industry as a whole will need to reevaluate 5G security post-deployment, but, in the meantime, response time is key.

Oh, my — AI

Here’s some good and bad news.

The good news first: AI and Machine Learning will be instrumental in helping cybersecurity experts detect attacks and protect data and infrastructure. The benefits are more than evident. Security tools and protocols that can learn and have increased autonomy are great allies for defending your virtual castle. According to Capgemini, 63% of organizations will have AI-based solutions in place by the end of 2020. Most of these applications will have a security focus.  

The bad news? Hackers can do that too. Expect AI-powered hackbots coming to your neighbourhood very soon. Certainly, an eerie thought to entertain.  

Corrupting the root

In the art of sabotage, simplicity is key. Why bother trying to compromise the finished product when you can alter one of its key components right at the factory line? As Enterprise SpA CTO Pierluigi Paganini notes, supply chain attacks are only going to increase with time. Although they still pose a relatively low threat, it can’t hurt to be a bit more cautious with the vetting of third-party suppliers.

Cybersecurity in 2020: Final reflections on the fallibility of the human mind

We often focus solely on the might of technology, its great potential for good and evil. The truth is that people have been duping each other since ancient times. As many of the biggest cyberattacks of the past years remind us, it is usually a human error that starts it all.

An employee that inadvertently exposes vital information. Someone clicking on a link that their boss allegedly sent them. An infected thumb drive. A computer that wasn’t updated.

The human element is a decisive factor in the world of cybersecurity. Organisations need to implement better security training for their employees, as well as improved data hygiene and BYOD policies.

The scary part, however, is that, no matter how many precautions you take, someone can still be tricked – or paid — into letting in the attackers. Kasperky alerts of these perils. As the costs of breaking into a network raise due to improved security, hackers are going to increasingly target employees ­— whether it is through phishing attacks and very convincing deepfake calls, or by paying them money or extorting them.      

Read our article: How the Covid-19 Pandemic is Accelerating the hybridisation of Careers in Tech & IT

Categories
Press review Tech Magazine

Weekly News Digest #2

A week in retrospect…

Recently got a dog although you “don’t really have the time” for it?

Do not fret, irresponsible dog owners — AI’s got your back.

Now you can leave your pet unattended for hours, possibly days, and not have to deal with the slightest remorse. Go enjoy that weekend at a ski resort without leaving your apartment keys with a friend. When you return home, this AI-powered dog trainer will have your pet obedient and ready for a flawless Instagram photo session.

I guess the important question here is whose orders your pet will obeyGood news, Skynet — Now you have dogs on your side.

On a more serious note…

This week, the Swiss town of Davos hosted the annual World Economic Forum. This year’s edition put, again, much of its focus on technology.

As the meeting marked its 50th anniversary, the organisers wanted to reflect on how much technology has changed everything in the past half century. Experts at the Forum’s Centre for the Fourth Industrial Revolution called for careful and ethical use of emerging technologies, while outlining 9 reasons to be optimistic about tech in 2020.

Taking advantage of the media spotlight ahead of the event, Microsoft made a pledge to remove all of the carbon it has emitted since the company was founded in 1975. All that by 2050. That goes way beyond Amazon’s pledge to be carbon neutral by 2040.

Ha! Take that, Jeff. The cloud wars keep raging — Ironically, this time the battle is over actual (CO2) clouds.

Meanwhile, in another part of Europe…

The EU is considering a 5-year ban on the use of facial recognition technology in public spaces, citing concerns over data privacy and the potential nefarious uses of a technology that’s not yet fully understood. Caution is good. At least as long as it is to allow for enough time for companies and governments to establish regulations and protocols that protect us citizens.

Google and Microsoft are already wrangling over the proposed ban. Microsoft, which happens to sell this technology to governments and state agencies, is, not surprisingly, against the ban. On the other side of the ring, Google is advocating for the ban, in a clear effort to get on the good side of the EU after growing signs of the Union’s mistrust of the Internet giant.

Taking a more subtle approach to AI, Apple has paid $200 million for the AI start-up Xnor.ai, a company specialising in on-device AI. The acquisition reinforces Apple’s strategy to build an AI that operates within the device, rather than in the cloud, to achieve greater levels of privacy and security.

All in all, this has been the week of AI. Even Davos jumped on the AI bandwagon by making available an AI toolkit for corporate boards.

Oh, and 

Remember last week’s service cut for Windows 7 and its potential security ramifications? Well, not even a week later, Microsoft is announcing a patch for an Internet Explorer security bug that is already being targeted by attackers.

The problem? You guessed it. MS doesn’t offer support for Windows 7 anymore, so the old OS won’t get the patch. Oopsie!

And so it begins….