Two-Factor Authentication by 2023

Two-Factor Authentication by 2023


To improve software security, organizations must force two-factor authentication sooner than later, as a single password may be the only thing protecting your data.

GitHub took a step toward improving software security, announcing that contributors to all code repositories must use two-factor authentication (2FA) by the end of 2023. Employing 2FA increases account security, but developers, software vendors, and customers should consider what they can do now to strengthen their software, both for their own benefit and that of the rest of the software ecosystem. To start, you don’t have to wait to adopt some form of 2FA, which typically uses a combination of a password with a security token or biometric feature like a fingerprint or face scan. 2FA isn’t perfect, but it is harder to compromise than a single password and it has proven effective at reducing credential compromises and other attacks.

Effective steps organizations can focus on include:

Software composition analysis.

SCA is an automated process of evaluating the security, license compliance and code quality of open-source software. With the increased use of cloud-native applications and DevOps/DevSecOps practices, trying to track open-source code manually is no longer practical. SCA’s automated analysis is quickly becoming essential.

Software Bill of Materials (SBOM).

SBOM is a machine-readable inventory of software components and dependencies, including information about those components and their hierarchical relationships. An SBOM can reduce risk, along with providing other benefits such as reducing costs and compliance risks.

SBOMs can also help in avoiding potentially harmful practices, such as auto-merging code from open-source repositories, and they allow you to be as discerning as possible when going between versions in open-source repos.

Passwordless Technology.

Apple, Google and Microsoft announced plans to build support for passwordless authentication across all of the platforms they control. It might be hard to imagine a world without passwords, but it already exists on billions of devices that users unlock with fingerprint or face verification, or the use of a device PIN, all of which are simpler and more secure than passwords or technologies such as one-time passcodes sent via SMS. Passwordless authentication can include physical security keys, specialized apps, emailed magic links and biometrics.

You might not think that passwords are your problem, but passwords are your problem; especially when a single password is the only thing standing between an attacker and your data. Encouraging 2FA for GitHub contributors undoubtedly is a positive step but forcing it should happen sooner rather than later.


You can read more about Two-Factor Authentication here.

Teknita has the expert resources to support all your technology initiatives.
We are always happy to hear from you.

Click here to connect with our experts!

Is Hyperautomation a Realistic Goal for 2022

Is Hyperautomation a Realistic Goal for 2022


Hyperautomation is basically an extension of digital transformation (DX) with an increased focus on AI, machine learning, and fully automated processes. Hyperautomation create a framework where business functions can operate 24/7, but it also further reduces human intervention, which can translate into significant cost savings. For many organizations, the thought of using advanced technologies to automate processes is obviously attractive. However, the path to achieve this goal is rife with potential pitfalls.

A proper approach to hyperautomation is to construct a robust plan both at a macro and micro level. While the end goal of hyperautomation is to automate all business processes across the board using data-driven decision-makingthrough the use of AI, actual implementations should be conducted on a case-by-case basis – only when processes have successfully been implemented and allow for proper levels of scalability and flexibility.

Business leaders and architects must first conduct a high-level map of how their organization is expected to operate both now and into the future. This is required so that the necessary levels of elasticity can be built into hyperautomated processes. For those who expect to pivot their business significantly in the next few years, for example, they will want to be very cautious as to not lock automated systems or processes into today’s business process flows.

The risks of jumping into hyperautomation projects without properly vetting macro- and micro-level business opportunities is significant. If existing manual processes are not flexible or efficient, simply automating them using AI/machine learning can at best devalue any benefits that hyperautomation can deliver. In a worst-case scenario, it can hinder a business’s ability to grow or shift to more profitable business ventures.

Also understand that hyperautomation is a fully data-driven approach. Thus, the business must be prepared to collect, curate, and analyze very large and complex data sets. Skills must be required either in-house or externally – often requiring both.

Despite the potential, hyperautomation is probably not a realistic goal for most. While DX has come a long way, there are businesses still struggling to perfect the process of moving manual processes into a new digital world. While some have certainly been successful, they remain the minority. That said, IT leaders should not wait to start down the path of planning for hyperautomation. The process of building a macro- and micro-level road map can start today regardless of where they stand from a DX perspective. Then once DX has successfully been accomplished, the path toward hyperautomation becomes far less risky.


You can read more about Hyperautomation here.

Teknita has the expert resources to support all your technology initiatives.
We are always happy to hear from you.

Click here to connect with our experts!

Predictive Network Technology

Predictive Network Technology


Predictive network technology can spot and troubleshoot potential problems before they occur. It is anything but a trick. Using artificial intelligence (AI) and machine language (ML) mathematical models and algorithms, predictive network technology alerts an organization to network issues as early as possible and offers problem-solving solutions.

Titus M – a senior analyst, explains that the technology enables networks to learn from past instances using massive amounts of data through predictive analytics. It collects network telemetry data, recognizes trends, and forecasts network difficulties that might negatively impact user experience and offers potential solutions to the issue.

Predictive network technology can also suggest network remediation solutions for automatic or manual implementation, depending on the use case, at the discretion of the IT networking or operation team, and helps network operations transition from a reactive to a proactive model when it comes to addressing potential issues.

A good way to get started with predictive network technology is to select a solid use case–a pain point or other critical business need–and then run a trial to see how things work out. 
The key thing to remember about predictive network technology is that it doesn’t eliminate the need for human monitoring and oversight. It needs constant monitoring and tuning in order to stay at peak efficiency.


You can read more about Predictive Network Technology here.

Teknita has the expert resources to support all your technology initiatives.
We are always happy to hear from you.

Click here to connect with our experts!

All-New Box Consulting Portfolio

All-New Box Consulting Portfolio


All-new Box Consulting portfolio just launched, completely redesigned to empower any organization, no matter where they are in their digital journey, to achieve their Content Cloud goals. This exciting announcement also includes two brand-new services programs focused on both Box success and business transformation. Box Consulting has collaborated with thousands of organizations to deliver over ten thousand successful content management projects, helping organizations succeed with the Content Cloud.

Box is ready to help with:

  • Adapt to hybrid work by deploying tools and automating processes to help teams work together seamlessly, no matter where they are, backed by the security of the Content Cloud
  • Reduce tech sprawl by consolidating applications and file servers into a single content platform — then integrating into, or building, the other tools your users need
  • Create a people-first work environment by designing your tools and workflows around your users — and working with them to create change

With the all-new Box Consulting portfolio, organizations can leverage a proven approach to solve common challenges with Standardized Consulting Services, or design a project that meets their own unique needs through the Customized Consulting Services program. No matter what the best next step is, Box Consulting can help — whether simple or complex, large or small, common or unique.

As a part of this new portfolio, Box is also unveiling two new Standardized Consulting Services programs that organizations can take advantage of today.

1. Transform Services program.

This strategic consulting program is focused on driving business transformation on the most critical challenges organizations today are facing. By partnering with Box’s most seasoned experts, organizations will create their own comprehensive content management roadmap. Plus, these offerings include flexible project hours, meaning that once the roadmap is defined, organizations can begin tackling projects immediately with the experts from Box Consulting.


2. Content Cloud professional services program.

This program empowers any organization to accelerate their time to value with the Box platform. Designed with a focus on both effective implementation and user adoption, this services program consists of two categories to help customers reach and exceed their Content Cloud goals. Enable Services help organizations become content experts themselves through hands-on training and guidance from cloud experts. Deploy Services help organizations go quickly from idea to ROI through managed deployment services for any Box product or feature.

With Enable and Deploy Services, it’s easy to automate signature processes through Box Sign, establish content lifecycles with Box Governance, build something unique with Box Platform, check-in on the health of your Box deployment, execute end user training initiatives, or make progress on any other Content Cloud initiative.


You can read more about Box Consulting Portfolio here.

Teknita has the expert resources to support all your technology initiatives.
We are always happy to hear from you.

Click here to connect with our experts!

3 Multicloud Tips for Cloud Architects

3 Multicloud Tips for Cloud Architects


Have an open mind about all potential solutions. 

Never push back on a solution before you understand the problem. Multicloud is a solution pattern. If you announce that multicloud is a bad solution, that statement comes off as a bit disingenuous if you don’t understand the specific problem you need to solve.

Like all other IT architectures, multicloud is not the answer to all problems. However, it is a clear fit for some. It’s important to keep an open mind; otherwise, you’ll just provide opinions, not solutions. If you don’t consider all the possibilities, you’ll likely end up with an underoptimized architecture that becomes a value drain for the business for years to come.

Implement federated security architectures and evaluate other cross-cloud solutions. 

For most architects, it’s simple to figure out a single cloud deployment’s security: Pick the security layers that the primary cloud provider recommends. This usually includes identity management, directories, encryption, even industry-specific security support, such as for healthcare or finance. These solutions work—for the most part—they are well supported, and although they are sometimes not as cost-efficient as I would like, they do hold their own.

Multicloud is a different story. If you use the same single-cloud security approach to multicloud, the number of moving parts will quickly create too much complexity and this becomes a security issue unto itself.

A better method is to use cross-cloud security services. They provide the same security service layers, implemented using whatever native security services are needed for each specific cloud provider. This gives you a single stack of technology that has a single approach and interface for security operations (secops), including the ability to launch a unified defense in case of attacks.

Understand and deal with cloud finops. 

A cloud finops solution for multicloud is critical to success if you have more than one or two clouds to track, each with different terms, pricing, and service-level agreements to manage. Even if you get cloud cost tracking down pat, finops also includes cloud spending observability and, most important, cloud spending optimization. This means you can identify ways the multicloud solution could support all applications and data storage systems more cost-effectively. Simple examples would be to use reserved instances to drive discounts for purchasing capacity before it’s needed or to proactively remove instances that are no longer needed, etc.


You can read more about Multicloud Tips here.

Teknita has the expert resources to support all your technology initiatives.
We are always happy to hear from you.

Click here to connect with our experts!