If you play fantasy football, you are no stranger to data-driven decision-making. Every week during football season, an estimated 60 million Americans pore over player statistics, point projections and trade proposals, looking for those elusive insights to guide their roster decisions and lead them to victory. But numbers only tell half the story. For the […]
Author Archives: Lucian Systems
The rise of online commerce over the last two decades has completely transformed the retail and consumer goods industries—and with smartphone adoption accelerating globally, the share of shopping done via the internet will only continue to expand. But this growth in digital sales can come with a hefty price tag for retailers and consumer goods […]
Insider security threats refer to cybersecurity threats that originate from within an organization. These threats can come from employees, contractors, or any other insiders who have access to sensitive information. Concerns surrounding insider threats include data leaks, data theft, and intentional sabotage of systems or data, which can lead to financial loss, reputation damage, and […]
Last week I attended the AWS Summit Johannesburg. This was the first summit to be hosted in my own country and my own city since 2019 so it was very special to have the opportunity to attend. It was great to get to meet with so many of our customers and hear how they are […]
The recent rise of generative artificial intelligence (AI) including large language models (LLMs) has inspired organizations in every industry to consider how AI can drive innovation. Leaders are increasingly recognizing the power of AI as well as its potential limitations and risks. It’s critical that leaders think carefully about how AI is created and applied and […]
As the pace and volume of digital business continue to increase, organizations are facing mounting pressure to accelerate the speed at which they do business. The ability to quickly respond to shifting customer and market dynamics has become key for contending with today’s growing digital economy. In a survey run by IDC, a leading provider […]
Regular cleanup is part of all account administration and security best practices, not just for cloud environments. In our blog post on identifying inactive identities, we looked at the APIs offered by IBM Cloud Identity and Access Management (IAM) and how to utilize them to obtain details on IAM identities and API keys. Some readers […]
Modern application environments need real-time automated observability to have visibility and insights into what is going on. Because of the highly dynamic nature of microservices and the numerous interdependencies among application components, having an automated approach to observability is essential. That’s why traditional solutions like New Relic struggle to keep up with monitoring in cloud-native […]
This April, we announced Amazon Bedrock as part of a set of new tools for building with generative AI on AWS. Amazon Bedrock is a fully managed service that offers a choice of high-performing foundation models (FMs) from leading AI companies, including AI21 Labs, Anthropic, Cohere, Stability AI, and Amazon, along with a broad set […]
Threat hunting is a proactive cybersecurity process where specialists, known as threat hunters, search through networks and datasets to identify threats that existing automated security solutions may have missed. It’s about thinking like the attacker, anticipating their moves and countering them before they can cause harm. Threat hunting is an essential tool in our cybersecurity […]