IT News and Events
Sep 27th, 2021 — Oct 3rd, 2021 Generate the Custom HTML Email for this Issue
IT News and Events IT News and Events
Volume 282, Issue 5 << Previous Issue | Next Issue >>
Red Hat News
disable
Redefining The Possibilities Of IT Automation Across Your Ecosystem With Red Hat Partners
As the modern IT environment continues to evolve, it continues to grow in complexity.
"An organization's technology stack may not look the same as it did five years ago, let alone five months ago. In addition, organizations are expected to scale faster than ever to meet customer demands in a digital world. Red Hat Ansible Automation Platform is our key for the enterprise to demystify complex systems and innovate at pace with the industry by breaking down bottlenecks caused by repetitive, manual processes. With the introduction of Ansible Automation Platform 2 announced today, IT teams can now take advantage of self-contained automation capabilities to make it even easier to address automation at scale across a range of environments and systems..."
Red Hat News, September 29th, 2021
(Get More Information . .) open to premium members only

Friday Five - October 1, 2021
The Friday Five is a weekly Red Had blog post with 5 of the week's top news items and ideas from or about Red Hat and the technology industry. Consider it your weekly digest of things that caught our eye.
  • Red Hat Ansible Automation Platform 2 Drives Cloud-Native Automation and Helps Developers Become Automators
  • From the Datacenter to the Edge: The Open Hybrid Cloud Vision for Red Hat Ansible Automation Platform 2
  • Ansible Automation around the World
  • Extending Automation across the Organization: How We Can Create a New Culture of Automation from Legacy IT Siloes
  • TechRepublic - 10 Ways to Avoid Work-From-Home Burnout

Read on for details

Red Hat News, October 1st, 2021
(Get More Information . .) open to premium members only

Advance Your Red Hat OpenShift Skills To Run Kubernetes At Enterprise Scale
As organizations expand their footprint within cloud-native architectures, Red Hat OpenShift and Red Hat products that extend its functionality become key to scaling infrastructure to manage more workloads and applications
"Red Hat now offers an extensive portfolio of training and certifications to teach the skills required for these advanced Red Hat OpenShift capabilities.

We have recently launched advanced training courses to help teams and individuals looking to increase self-sufficiency in Red Hat OpenShift administration. And we have even more that are currently in development. We'll provide some course highlights in this post..."

Red Hat News, September 30th, 2021
(Get More Information . .) open to premium members only

Runtime Analysis In The Red Hat Devsecops Framework
September is "runtime analysis" month in Red Hat's monthly Security series!
"Since March 2021, the Red Hat Security Ecosystem team has published monthly articles and videos on DevOps Security topics to help you learn how Red Hat can help you master the practice called DevSecOps.

By explaining how to assemble Red Hat products and introducing our security ecosystem partners, we aim to aid in your journey to deploying a comprehensive DevSecOps solution..."

Red Hat News, September 30th, 2021
(Get More Information . .) open to premium members only

Extending Automation Across The Organization: How We Can Create A New Culture Of Automation From Legacy It Siloes
Automation is about empowering people to do more, to focus on bigger picture problems and to use tools to perform the rote tasks that do not require or benefit from manual intervention.
"When IT automation was first introduced, it began as a task-driven, domain specific initiative; script-based tools were a reaction to address the pain points of a single job function. This original wave of automation was about enabling an individual to do more, faster, generally taking place in small pockets and usually orthogonal to other similar efforts taking place elsewhere in the same organization..."
Red Hat News, September 29th, 2021
(Get More Information . .) open to premium members only

Ansible Automation Around The World
In the last year, organizations across the globe have operated under dynamically changing business requirements.
"451 Research, part of S&P Global Market Intelligence, noted that respondents in its recent Voice of the Enterprise: DevOps, Organizational Dynamics survey indicated "flexibility to quickly respond to changes" (52%) as the top DevOps benefit. While only 36% of respondents described the level of IT automation in their organization as "mostly or all automated processes," respondents expect it to grow to 47% in 12 months..."
Red Hat News, September 29th, 2021
(Get More Information . .) open to premium members only

From The Datacenter To The Edge: The Open Hybrid Cloud Vision For Red Hat Ansible Automation Platform 2
At AnsibleFest 2021, we introduced a re-architected Red Hat Ansible Automation Platform to meet the changing needs of the open hybrid cloud, so teams can create, test and deploy automation with greater speed and scalability in cloud-native and containerized environments.
What many customers will notice is that the feature terminology looks unfamiliar; this was done to reflect the cloud-native foundation of Ansible Automation Platform 2. The naming changes include:

  • Ansible Engine is now automation execution environments

  • Ansible Tower is now automation controller

  • Automation Analytics components are now within Red Hat Insights

Ansible Automation Platform 2 is built to deliver a more consistent, connected experience, and the feature naming should mirror this. There are several new components that shift where the automation takes place; when the pieces of the platform change, it's a sensible time to re-evaluate everything else. We focused on renaming the existing parts to better match the new style and update the descriptions to more adequately equate what they actually do for customers.

Red Hat News, September 29th, 2021
(Get More Information . .) open to premium members only

IBM News
disable
Ten Leaders Named to Kyndryl Board of Directors
Kyndryl, the new, independent public company that will be created following the separation of IBM's (NYSE: IBM) Managed Infrastructure Services business, announced the company's first Board of Directors and the selection of Martin Schroeter as Kyndryl board chairman.
'I'm excited to lead Kyndryl as it prepares to change the technology services industry,' said Mr. Schroeter, who was named as Kyndryl's chief executive officer in January. 'Our first board brings great leadership skills, an international perspective and extensive transformation experience, and they will be a great asset to our leaders and our customers as we begin our journey as an independent company.'

Mr. Schroeter was IBM's senior vice president of global markets before leaving IBM in June of 2020 and before that he served as the chief financial officer from 2014 to 2017.

IBM News, September 28th, 2021
(Get More Information . .) open to premium members only

Egypt's Ministry of Supply and Internal Trade Automates Wheat Silos Processes in Collaboration with IBM and ACME SAICO
Project aims to create a robust system powered by IBM AI-powered automation software in a hybrid cloud environment for efficient management of the country's wheat supply
IBM (NYSE: IBM), in collaboration with business partner ACME SAICO, today announced the automation of 22 wheat silos across Egypt by the end of this year using IBM AI-powered automation software. This supports the Ministry of Supply and Internal Trade's plans to digitize the wheat supply chain and implement governance systems on the country's strategic stock.

The Ministry of Supply and Internal Trade is a key ministry focused on achieving food security for Egypt. In line with the national plan for digital transformation, the Ministry of Supply and Internal Trade represented by the Egyptian Holding Company for Silos and Storage (EHCSS) selected IBM and ACME SAICO to create a platform powered by IBM's AI-powered automation software in a hybrid cloud environment. Using IBM Cloud Pak for Business Automation and IBM Cloud Pak for Integration, the new solution will allow full automation and governance of all the steps of shipping, transport, storage, and supply of the wheat silos.

IBM News, September 27th, 2021
(Get More Information . .) open to premium members only

Democratize the Power of Computing: IBM Symphony Is Now Available on IBM Cloud
High Performance Computing on the Cloud.
We live in a highly competitive and dynamic world where the time to bring products to market can be a core differentiator. Enterprises need to build, test, tweak and retest models for their products depending on the business they are in, whether these are related to infusing artificial intelligence (AI) in their business models, designing a new car and understanding the impact of airflow or performing counterparty credit risk modeling. These models need enormous computing power to produce timely and accurate results.

In the past, large corporations and governments with the financial muscle to use supercomputers could tap into the massive computing power for solving problems around meteorology, life sciences, financial services and fluid dynamics.

IBM News, September 30th, 2021
(Get More Information . .) open to premium members only

What Are IBM Cloud Paks?
Learn how to accelerate innovation with IBM Cloud Paks - pre-integrated, pre-certified, AI-powered hybrid cloud software.
It's been more than a decade since commercial cloud first transformed business, but even now, only about 20% of workloads have moved to the cloud. Why? Factors such as data residency, skills gaps, integration issues, legacy application environments not supported in the cloud and vendor lock-in may be preventing most teams from fully modernizing their IT operations.

Business leaders have the difficult task of accelerating innovation, speeding time to market and meeting evolving customer expectations without sacrificing security, compliance or the value of existing investments. Organizations must move past the basic cloud model and open the next chapter of cloud transformation, cloud application and cloud management innovation to help successfully balance these needs.

IBM News, October 1st, 2021
(Get More Information . .) open to premium members only

IT News - CxO
disable
CIO vs. CTO: Chief Collaborators In Tech
The line between CIO and CTO roles is increasingly blurring. Here's how to these roles traditional differentiate, how they are converging, and how they can work together to create business value.
Bob Violino writes in CIO, "Most roles and responsibilities in the C-suite are fairly distinct and well defined: CFOs are responsible for all financial operations; COOs oversee daily operations; and CEOs manage the entire enterprise, for example.

With CIOs and CTOs, however, roles and responsibilities can sometimes get blurred. The fact that technology and how organizations use it changes so rapidly doesn't help matters. Nevertheless, many enterprises have both a CIO and a CTO, and it's important that the two work in harmony in order to maximize the benefits of technology..."

CIO, September 21st, 2021
(Get More Information . .) open to premium members only

Many Organizations Still Don't Quite Understand The Role Of The CDO
The Chief Data Officer position is often surrounded by confusion and uncertainty
"The position of Chief Data Officer (CDO) is surrounded by a measure of confusion and uncertainty," opines Sead in ITProPortal, "which means many firms struggle to find and retain the right candidates and CDOs go without the necessary support.

This is according to a new report, published by the analytics database firm Exasol, which claims that half of CDOs believe the value of their role isn't fully recognized in the business world. Furthermore, 46 percent said most businesses have skewed expectations of the CDO..."

ITProPortal, September 23rd, 2021
(Get More Information . .) open to premium members only

Digital Transformation Fuels CIO And CTO Role Convergence
CIO and CTO roles have shifted and converged as a result of this increased focus on digital transformation and the pandemic
"Most roles and responsibilities in the C-suite are fairly distinct and well defined. For example, CFOs are responsible for all financial operations; COOs oversee daily operations; and CEOs manage the entire business, and so on. With CIOs and CTOs however, roles and responsibilities can sometimes get blurred. In fact, with more digitalization the roles of these technology executives have often become so intertwined that some companies are seeing a need to consolidate the executive positions..." - CXOtoday.com
CXOtoday.com, September 22nd, 2021
(Get More Information . .) open to premium members only

What's Your Digital Dilemma?
There are many ways to describe the need for IT organizations to do things better
Derek Britton writes in Network Computing, "There are multiple opportunities to get it wrong. Certainly, compromising today in the name of tomorrow is what many IT leaders now call the digital dilemma. Derek Britton of Micro Focus offers the vendor perspective.

Those in IT leadership, and the organizations they represent, face many, sometimes competing challenges. That's nothing new..."

Network Computing, September 20th, 2021
(Get More Information . .) open to premium members only

Where Shadow IT Meets Enterprise Risk, Technology Leaders Have A Role
As team members outside the technology org adopt cloud solutions on their own, they can learn a thing or two from their IT colleagues, writes CIO advisor Joe Topinka.
"For years, CIOs have resisted, pushed back, and have been frustrated by business units' propensity to identify and procure business solutions without involving IT," writes Joe Topinka in Heller Search Solutions. "This is commonly known as 'shadow IT'.

"Historically, shadow IT has pitted IT organizations and business units against one another. But times are changing thanks to the soaring volume of robust cloud solutions in the market, and the arrival of digital natives in the workforce. I advise CIOs to resist the temptation to fight this inevitability and, instead, to embrace it. The truth is that software and service providers are making it easier for digital natives to tap solution capabilities on their own, without IT's direct involvement..."

Heller Search Solutions, September 22nd, 2021
(Get More Information . .) open to premium members only

The New Math Of Cybersecurity Value
An increasing number of CISOs are devising a new set of metrics to show how they're impacting risk at their organizations.
"Jenai Marinkovic doesn't put much stock into figures that show how many attacks she and her security team have stopped," notes Mary K. Pratt in CSO Online.

"Those numbers, she says, really don't provide any insights.

'Saying we blocked a million doesn't tell us anything. It doesn't communicate enough to other executives,' says Marinkovic, who provides virtual CISO services through Tiro Security and serves on the Emerging Trends Working Group with the IT governance association ISACA..."

CSO Online, September 21st, 2021
(Get More Information . .) open to premium members only

Chip Shortage: Should You Buy Tech Now Or Wait Out The Silicon Storm?
We spoke with tech pros to understand which products consumers should buy now, purchases to put on hold and when supplies could normalize, but don't expect a turnaround anytime soon
R. Dallon Adams writes in TechRepublic, "The coronavirus pandemic has sent shockwaves through supply chains leaving shortages, product delays and empty store shelves in its wake. The widespread runs on semiconductors have been acutely felt as these chips are critical to far more than computers in the digital age; logjamming production of everything from laptops to gaming consoles and automobiles. But, within this overall shortage, could there be an economic opportunity for consumers willing to wait a bit to purchase specific products down the road?..."
TechRepublic, September 21st, 2021
(Get More Information . .) open to premium members only

IT News - Storage
disable
14 Things You Need To Know About Data Storage Management
When it comes to storing data, there is no 'one-size-fits-all' solution, so before you decide where or how to store your data, first understand the amount and type you have and why you need to store it.
"So how do you formulate a sound data-storage management strategy?" asks Jennifer Lonoff SchiffBy in Networkworld.

"IDG asked dozens of storage and data management experts, which resulted in these top 14 suggestions regarding what steps you need to take to choose the right data storage solution(s) for your organization-and how you can better ensure your data is properly protected and retrievable..."

Networkworld, September 22nd, 2021
(Get More Information . .) open to premium members only

7 NAS Encryption Best Practices To Protect Data
Data storage security is as important now as it's ever been. Encryption is one way to make NAS devices more secure against such threats as ransomware.
"Encryption is one of the most effective tools to protect data on network-attached storage," opines Robert Sheldon in SearchStorage. "Even if cybercriminals gain access to the drives or intercept communications to or from them, encryption makes the data unreadable to anyone who does not have the cryptographic key.

Use NAS encryption to prevent unauthorized individuals from gaining access to confidential data at rest or in motion. The data might include credit card numbers, intellectual property, medical records, personally identifiable information (PII) or other types of confidential data. Also, use encryption to comply with regulations such as GDPR or HIPAA..."

SearchStorage, September 21st, 2021
(Get More Information . .) open to premium members only

6 Best Free NAS Software For 2021 (Open Source Choices)
Network Attached Storage or NAS devices can be used to overcome space and storage issues and provides a centralized place for your data.
"Here users can access as well as share their data 24/7 through the network," offers Shahee in Securedyou.

"Many companies in the market offer software plus hardware boxes which are out-of-box solutions, like Synology and Qnap are two different veteran vendors. We are sharing the 6 of the best NAS software 2021 that can be used with any operating system and are 100% free..."

Securedyou, September 20th, 2021
(Get More Information . .) open to premium members only

What The Heck Is Storage Modernization?
We often hear the word 'modernization' thrown around these days.
"The push is to get the end user to refresh their infrastructure, and the storage infrastructure market is rife with modernization word. Is your storage ripe for 'modernization'?

To modernize, it has to be relative to legacy storage hardware, and the operating environment that came with it. But if the so-called 'legacy' still does the job, should you modernize? ..." - Storage Gaga

Storage Gaga, September 20th, 2021
(Get More Information . .) open to premium members only

Seagate's Gen-2 HAMR blow
Seagate has a second-generation 30TB HAMR disk drive in development, and sees Gen-1 HAMR as having limited appeal.
Chris Mellor writes in Blocks & Files, "Heat-Assisted Magnetic Recording (HAMR) is Seagate's chosen technology to increase disk drive areal density beyond the limits of current perpendicular magnetic recording (PMR) technology, and uses laser-produced local bit area heating to make a hardened magnetic material accept a write signal and then hold it in a stable fashion. Seagate is shipping a Gen-1 20TB HAMR drive in a limited way..."
Blocks & Files, September 21st, 2021
(Get More Information . .) open to premium members only

What To Know For Your Virtualized Storage Selection Process
Not all storage virtualization is created equal. Get familiar with the types, methods and implementation considerations before you buy hardware or software for your organization.
"To choose the right storage virtualization tool, be sure to look at both file- or block-based virtualized storage, storage virtualization methods and the main business and technology considerations during the evaluation process," suggests Jessica Lulka in SearchServerVirtualization.

"Data storage requires a lot of optimization and configuration knowledge. There's always more data, and infrastructure gets more complex as data intake increases. Luckily, storage virtualization can help maximize how much data you store and extend storage hardware lifecycles..."

SearchServerVirtualization, September 21st, 2021
(Get More Information . .) open to premium members only

IT News - AI
disable
Artificial Intelligence (AI) At The Edge: 3 Key Facts
As Artificial Intelligence becomes increasingly ubiquitous, it's developing a special relationship with edge computing. Consider these important factors as you develop your AI strategy
Brian McCarson writes in The Enterprisers Project , "Artificial Intelligence (AI) is moving from the realm of science fiction to widespread enterprise scalability. Even ten years ago, AI workloads were almost exclusively utilized by a small number of very profitable companies that had the resources to experiment and hire an extensive team of data scientists. Today, AI is used in a number of everyday tools, from language recognition to health care prediction and nearly every industry in between.

AI is also now deployed at the edge, not just inside massive data processing facilities. That trend will continue in the coming years. Here are three things that executives in any field should know to capitalize on the change..."

The Enterprisers Project , September 21st, 2021
(Get More Information . .) open to premium members only

5 Ways That AI Is Shaping Analytics In 2021
It's no shock to anyone who works with analytics and data that AI is changing everything.
Dina Ely writes in Business 2 Community, "From automating some of the data analysis processes of the past to new promising ventures with Big Data and machine learning, major things are coming to this element of business.

When it comes to AI shaping analytics, here are five things to watch for in 2021.

AI Transforms What We Do With Data

AI allows businesses and individuals to take part in data analysis in a brand new way. One of the top trends in AI for 2021 is that more people than ever are going to start looking into what role artificial intelligence might play in their professional lives..."

Business 2 Community, September 21st, 2021
(Get More Information . .) open to premium members only

Machine Learning At The Edge: A Hardware And Software Ecosystem
Being able to deploy machine learning applications at the edge bears the promise of unlocking a multi-billion dollar market
George Anadiotis writes in ZDNet, "For that to happen, hardware and software must work in tandem. Arm's partner ecosystem exemplifies this, with hardware and software vendors like Alif and Neuton working together...

Edge computing is booming. The idea of taking compute out of the data center, and bringing it as close as possible to where data is generated, is seeing lots of traction. Estimates for edge computing growth are in the 40% CAGR, $50 billion area.

Whether it's stand-alone IoT sensors, devices of all kinds, drones, or autonomous vehicles, there's one thing in common. Increasingly, data generated at the edge are used to feed applications powered by machine learning models..."

ZDNet, September 21st, 2021
(Get More Information . .) open to premium members only

5 Ways AI Can Be A Game-Changer For Banks
Banks that take steps to adopt an enterprise-wide AI strategy will get a lead way, gaining an edge over their competitors
"With many organizations embracing cloud and related technologies to digitally transform, Artificial intelligence (AI) has gained traction across all industries," notes Puneet Gupta in CXOtoday.com.

"The Banking Financial Services and Insurance (BFSI) is no exception. Even though AI adoption is at a nascent stage in banking and financial services, there are use cases to show that its potential to positively impact the industry is tremendous..."

CXOtoday.com, September 20th, 2021
(Get More Information . .) open to premium members only

IT News - Technology
disable
Watch: Russian Researchers Can Control Drone Swarms Like Jedi
A team of AI researchers in Russia have managed to come up with one of the coolest gesture-control systems for drones that we've seen yet. What's even more impressive is that it works with multiple machines simultaneously.
Tristan Greene writes in The Next Web, "Controlling swarms of drones in real-time is the dream. And, when you pre-program them with advanced software and run them in unobstructed areas it's pretty easy to accomplish.

But if you want to, say, control a swarm of drones inside an office building, in real time, things get a bit trickier.

Enter the Skolkovo Institute of Science and Technology's AI team:..."

The Next Web, September 23rd, 2021
(Get More Information . .) open to premium members only

IT News - CRM
disable
7 Ways A CRM Can Help Reduce Costs For Your Business
Are you still printing documents and piling them up in a file folder, or sending an email with the attached copy of what's been written on paper?
"Why not move to a CRM software?" asks Matthew Popham in Business 2 Community. "Using a CRM can help move into a digital workstyle! A recent study shows that 58% of offices across Europe store some kind of record-keeping material on-site rather than using a digital system; 2% have no structured way whatsoever to store customer communications.

Why not move to a CRM software? Using a CRM can help move into a digital workstyle! A recent study shows that 58% of offices across Europe store some kind of record-keeping material on-site rather than using a digital system; 2% have no structured way whatsoever to store customer communications..."

Business 2 Community, September 23rd, 2021
(Get More Information . .) open to premium members only

IT News - HR
disable
How To Cultivate IT Talent Remotely
Identifying and growing IT talent in remote and hybrid workplaces is a big change for IT leaders, who must rely more on metrics, emotional intelligence, and new remote skills to elevate the best from their teams
"The pandemic proved that working remote works," writes Christina Wood in CIO. "People were productive - often more productive than they were in the office - and want to keep doing it. But if you were the kind of manager who led by owning a room and promoted people because you could see they were charismatic, dedicated, or natural leaders - qualities you watched them use - you might be feeling lost right now when it comes to knowing whom on your team you should tag for promotion..."
CIO, September 22nd, 2021
(Get More Information . .) open to premium members only

IT News - Operations
disable
Driving Up Data Center Efficiency Through Constant Innovation
Increased data volumes are driving the construction of data center campuses and hyperscale data centers for providing large-scale as well as high-quality services
Sohini Bagchi writes in CXOtoday.com, "With the growing reliance on digital connectivity on account of COVID-19 and work-from-home phenomenon, the data center industry is expected to grow exponentially to reach 1,007 MW by 2023 from its existing capacity of 447 MW, according to a JLL report. The demand is likely to ramp up due to the imminent rollout of 5G, IoT-linked devices, data localization and use of AI/ML and cloud technologies. In such a scenario, enterprises are expected to play a key role in driving up data center efficiency by cultivating continuous innovation and best practices..."
CXOtoday.com, September 20th, 2021
(Get More Information . .) open to premium members only

IT News - Security
disable
Commenting On The SANS Threat Intelligence Summit 2021 Presentations - An Analysis And Practical Recommendations
I recently came across to the entire portfolio of SANS Threat Intelligence Summit presentations which are currently online at YouTube and I've decided to take the time and effort to go through them and offer practical and relevant threat intelligence and OSINT advice and recommendations which I hope will come handy to the presenters including anyone currently working in the field or interested in making an impact as a threat
Dancho Danchev writes in Security Boulevard, "Sample presentations from the Summit include:

Analyzing Chinese Information Operations with Threat Intelligence - this is a pretty informative presentation that offers practical and relevant Information Operations advice including a pretty decent case study on the topic of a high-profile information leak campaign based in China..."

Security Boulevard, September 20th, 2021
(Get More Information . .) open to premium members only

Data Security Trends 2021
There is no escaping data security. With so many tasks and transactions now being done virtually, every consumer is faced with an unending stream of requests for logins, passwords, two-factor authentication codes, captchas, and more
Drew Robb writes in Datamation, "On the enterprise side, users have to negotiate through a labyrinth of security layers and access controls to get to the data they need or to share it with others to perform their duties. In other words, data security is very much in your face 24/7..."
Datamation, September 20th, 2021
(Get More Information . .) open to premium members only

Millions Of Malicious Emails Are Still Slipping Past Security Filters
Criminals hunt for tired and distracted employees
Sead writes in Techradar.pro, "Despite many companies investing heavily in getting defenses set up, millions of malicious email messages made their way to the end-user, placing many of them at risk of data breaches, fraud and ransomware.

This is according to a new report from Tessian, which analyzed millions of emails passing through its email security tool between July 2020 and July 2021, finding that two million malicious messages bypassed 'traditional email defenses', such as secure email gateways..."

Techradar.pro, September 21st, 2021
(Get More Information . .) open to premium members only

The 2021 OWASP Top Ten Emphasizes Security Control Areas Over Individual Vulnerabilities For Improved Risk Management
The primary goal of the OWASP Top Ten has always been to drive awareness of the biggest application security risks out there, and thereby establish a 'floor' or minimum standard for application security efforts at an organization.
"The newly released 2021 OWASP Top Ten has done a fantastic job of communicating the breadth and depth of the problems we face today," reports David Lindner in Secuity Boulevard.

"It is based on thousands of hours of hard work by the OWASP Top Ten leadership and others-including an analysis of telemetry data that is unprecedented in size and scope and one of the biggest industry surveys on the topic ever conducted..."

Secuity Boulevard, September 23rd, 2021
(Get More Information . .) open to premium members only

Busting The Myths Surrounding Password-Based Security
People have been relying on password-based security for millennia
"The Roman military reportedly used what they called 'watchwords' to identify soldiers on patrol," recalls Enzoic in Secuity Boulevard.

"Exclusive groups and guilds used secret passwords to prove membership. The phrase 'open sesame' protected hidden treasure in the story of Ali Baba and the Forty Thieves. In more recent times, the world's first computer passwords were installed in MIT's Compatible Time-Sharing System to distinguish between users of their colossal, shared computing system in the mid-1960s. Passwords are a simple and easy way to recognize and affirm the appropriate participant of a system. But what happens when modern-day cybercriminals get involved?..."

Secuity Boulevard, September 23rd, 2021
(Get More Information . .) open to premium members only

Identity Management Beyond The Acronyms: Which Is Best For You?
With so many devices and users accessing networks, applications and data, identity access management (IAM) has become a cornerstone of cybersecurity best practices
Jennifer Gregory writes in SecurityIntelligence, "The short explanation is that you must make sure everyone (and everything) is who they claim they are. You also need to make sure they are allowed to have the access they're requesting.

Multiple options for identity access management exist today. You might encounter privileged access management (PAM), identity-as-a-service (IDaaS) or cloud permissions management (CPM). So, choosing an identity management approach can be confusing. Which acronym is right for you?..."

SecurityIntelligence, September 21st, 2021
(Get More Information . .) open to premium members only

Top 10 Ways To Prevent Cyber Attacks
Cyber attacks are growing in frequency and complexity, due to factors like a higher number of expert malicious actors, more distributed workforces and technologies to protect, and an increase in devices and users that can unknowingly act as attack gateways.
"Although there's no way to guarantee that an organization will stay safe from a cyber attack," notes Shelby Hiter in Datamation, "several physical and technical safeguards can be established to better protect network data.

Read on to learn about how your team can stay up-to-date with the latest tools and knowledge to arm themselves against the next major cybersecurity threat..."

Datamation, September 21st, 2021
(Get More Information . .) open to premium members only

IT News - Cloud
disable
What Is Hybrid Cloud Storage?
A hybrid cloud storage solution can provide extra data security
Paul Maplesden writes in ITProPortal, "Hybrid cloud storage is a way of storing business data using both your local servers and cloud-based storage. It lets you combine your on-premises information with data you've uploaded to a public or private cloud, and gives you greater flexibility for your data retention and management needs.

We'll cover what hybrid cloud storage is, how it works, and the best cloud storage options for businesses..."

ITProPortal, September 23rd, 2021
(Get More Information . .) open to premium members only

Misconfigurations Are The Biggest Threat To Cloud Security, Period
There is no doubt that cloud adoption is accelerating at an exponential rate. Whether it's for business collaboration or to store critical data assets, organizations are increasingly relying on the cloud - in fact, recent reports have found that 62% of organizations utilize at least two cloud platforms.
"As a result of this acceleration, we have also seen a multitude of data breaches occurring due to misconfigurations in the cloud, which occur because of improper settings being used when architecting and deploying services within the cloud platform. This leads to an expanded attack surface for cybercriminals to access any data stored within the cloud environment and increases the risk of a cyber attack.

In fact, a survey conducted by Fugue also found that 73% of the organizations reported having 10+ incidents per day due to misconfigurations, 36% reported having 100+ incidents per day, and 10% suffered from 500+ incidents per day..."

Cyber Defense Magazne, September 21st, 2021
(Get More Information . .) open to premium members only

IT News - IoT
disable
Predictions For The Future Of IoT Sensor Technology
This article will explore predictions for the future of Internet of Things (IoT) sensor technology, as provided by IoT experts
"IoT has been evolving rapidly over the years," writes Aaron Hurst in InformationAge, "as more and more sectors find innovation gaps that can be plugged by the technology, and it's showing no signs of slowing down. From here, it's been estimated that the IoT sensor market will reach a value totalling $34.4 billion by 2024. Additionally, sensors have been getting smaller and more portable, allowing for more detailed datasets to be used.

With this in mind, this article will explore what the future of IoT sensor technology could have in store for organisations, according to experts in the space..."

InformationAge, September 21st, 2021
(Get More Information . .) open to premium members only

IT News - Compliance
disable
10 Data Compliance Best Practices To Establish Today
Poor data security compliance policies can make it easier for ransomware attackers to succeed in their efforts to lock up your data
Andy Stone writes in Business 2 Community, "As Sophos recently reported, some attackers are shifting to extortion-style attacks. Instead of simply encrypting files, they threaten to publish data unless a ransom is paid, thereby putting the victimized organization in a position where it will get slammed with regulatory fines-not to mention damage to its brand.

For this and many other reasons, compliance and information security are closely intertwined, placing even more importance on data privacy compliance as a core pillar of every security strategy..."

Business 2 Community, September 21st, 2021
(Get More Information . .) open to premium members only

IT News - Big Data
disable
Best Data Warehouse Tools & Solutions 2021
The concept of a data warehouse originated a couple decades back as an answer to the sprawl of storage arrays and NAS boxes. Organizations needed a way to corral their data in one centralized location.
"These days, data warehouses can exist on premises, heavily virtualized, in the cloud, or in some kind of hybrid arrangement," notes Drew Robb in ServerWatch,

"However it is done, a data warehouse is essentially a store of a large amount of data that has been gathered from a great many sources. In other words, it is a data management system that helps in the areas of storage centralization, business intelligence (BI), and analytics..."

ServerWatch, September 23rd, 2021
(Get More Information . .) open to premium members only

Sections in this issue:
click to jump to section