IT News and Events
Jun 13th, 2022 — Jun 19th, 2022 Generate the Custom HTML Email for this Issue
IT News and Events IT News and Events
Volume 291, Issue 3 << Previous Issue | Next Issue >>
Red Hat News
disable
Deploy Enterprise Applications On Red Hat Enterprise Linux In Microsoft Azure
Red Hat Enterprise Linux (RHEL) provides the stable foundation for advanced workloads both on-premises and in public clouds such as Microsoft Azure
For Azure, Red Hat and Microsoft have been working together to provide the tools needed to deliver workloads faster, with less effort - backed by tightly integrated, enterprise-grade support. Many of today's workloads require some form of enterprise database, and one of the most popular is Microsoft SQL Server.

We've given several presentations covering how using RHEL as the operating system platform for SQL Server helps organizations to reduce costs, avoid reliance on a single vendor, and increase performance. The response from SQL Server DBAs has been impressive with nearly one third of those surveyed by Red Hat and Unisphere Research saying that they were running the database on Linux today, and RHEL being the most popular distribution for deployment.

Red Hat News, June 17th, 2022
(Get More Information . .) open to premium members only

Friday Five - June 17, 2022
The Friday Five is a weekly Red Hat blog post with 5 of the week's top news items and ideas from or about Red Hat and the technology industry. Consider it your weekly digest of things that caught our eye.
  • Software development in 2022: 5 realities CIOs should know
  • Intelligent CIO - Employers centralizes insurance apps on Red Hat OpenShift
  • LISTEN TO THE PODCAST: How Does Data Help Shape Movies?
  • TrustyAI - an open source project looking to solve AI's bias
  • IT Brew - All hands on deck: Gov officials call for cybersecurity help from.everyone

Read on for details

Red Hat News, June 17th, 2022
(Get More Information . .) open to premium members only

Post-Quantum Cryptography, An Introduction
A new type of computer is being developed that can break many of our existing cryptographic algorithms.
As a result, we need to develop new algorithms that are secure against those computers and that will run on our existing computers. This is called "post-quantum cryptography".

What is a quantum computer?

In 1981, Richard Feynman proposed a new way to model quantum interactions in complex systems. There is a problem when modeling these interactions, however, in that we need to represent each linked particle as a set of probabilities. As we add particles, these arrays grow exponentially. For any sufficiently large system, we can no longer handle the storage and time requirements using existing computers.

Red Hat News, June 15th, 2022
(Get More Information . .) open to premium members only

TrustyAI - An Open Source Project Looking To Solve AI's Bias
The next decade will see giant leaps forward in 5G, edge computing, enterprise Linux and plenty of other areas. As organizations look at the opportunities ahead, they must weigh both the opportunities and the risks.
One such exciting area is artificial intelligence (AI). As the tools and methodologies advance, many organizations are looking to use AI to improve business efficiencies, bring innovation to customers faster, gain actionable market insights and more. However, the rush to put AI in place without always knowing what it can be used for, or how to use it, can lead to problems with the systems and the data itself. We have heard many stories of when AI makes the "wrong" decision due to built-in biases, and in some cases, the outcome can be life or death.
Red Hat News, June 13th, 2022
(Get More Information . .) open to premium members only

Using Cloud, Application And Data Services - Plus Other Hosted Tools - In The Red Hat Hybrid Cloud Console
In a recent blog post, we talked about why many people are choosing to use cloud services instead of self-managed infrastructure.
According to a recent report, 68% of organizations are deploying application services in cloud environments.1 Using cloud services, including application and data services, helps teams focus on the work that's most important to them while trusted experts manage the infrastructure. Using Red Hat OpenShift cloud services&#8213;including application and data services like Red Hat OpenShift Streams for Apache Kafka, Red Hat OpenShift API Management and Red Hat OpenShift Data Science&#8213;helps organizations shorten development cycles.
Red Hat News, June 17th, 2022
(Get More Information . .) open to premium members only

IT News - CxO
disable
10 Ways Inflation Will Impact IT
As inflation rises across the globe, CIOs are strategizing ways to navigate rising prices for IT supplies, services, and talent by rethinking IT portfolios, reprioritizing IT spend, and honing business efficiencies.
Mary Pratt writes in CIO, "As CIO of an organization with a global reach, Bob Johnson keeps careful watch on the world's economic situation.

'Whenever there is an ill wind anywhere in the world, it affects us,' says Johnson, CIO of The American University of Paris.

It's not surprising then that he's already feeling the impact of inflation: With costs going up, Johnson says he's concerned his IT budget won't cover all the work it was meant to fund.

Euros just don't go as far as they once did, he says. Neither do dollars..."

CIO, June 6th, 2022
(Get More Information . .) open to premium members only

Top 7 CIO Challenges In 2022 And How To Handle Them
IT leaders this year face hybrid work, inflation and the prospect for sustainability regulations, while they deal with perennial issues such as staff retention and cybersecurity.
"Technology leaders who encountered a tough slog in 2020 and 2021 due to COVID-19 aren't catching much of a break this year," opines John Moore in SearchCIO.

"Indeed, 2022 adds the tests of inflation, the back-to-the-office debate and geopolitical turmoil that exacerbates preexisting supply chain issues. Perennial concerns such as cybersecurity and the IT staffing shortage continue unabated. And the pandemic, now in its third year, complicates matters with regional flareups..."

SearchCIO, June 7th, 2022
(Get More Information . .) open to premium members only

Digital Transformation: 3 Ways It Changes Companies
Companies that embrace a digital transformation mindset focus not on technology, but on how it can improve overall business success. Consider these examples
Anthony Macciola writes in The Enterprisers Project, "I've worked on intelligent automation projects with many organizations worldwide, and there is no doubt: The digital transformation process has a huge impact - not only by bringing about obvious initial change but also by affecting business leaders' outlook for the future.

One common result is they want more, expect more, and invest more. Here's why..."

The Enterprisers Project, June 9th, 2022
(Get More Information . .) open to premium members only

CIO Interview: Lee Cowie, Chief Technology Officer, Merlin Entertainments
The theme park giant faced an enormous challenge during Covid with its venues closed, but digital technology came to the rescue and is now opening up new opportunities
Mark Samuels reports in CIODIVE, "Lee Cowie, chief technology officer (CTO) at Merlin Entertainments, chats about technology leadership responsibilities in front of a giant picture of superhero Iron Man. It's a vivid reminder of the kind of company he works for and a visual clue to his feelings about his role.

'I get a real buzz from working on something that is relatable,' he says. 'That's what gets me out of bed each morning and that's why I took the role. It's like the ultimate job for me. I am a big kid at heart. I just love what we do. No day ever really feels like working for me.'..."

CIODIVE, June 7th, 2022
(Get More Information . .) open to premium members only

2022 CIO Priorities
Most chief information officers (CIOs) are prioritizing hybrid work and cybersecurity in 2022, with digital enablement the top area of focus overall.
CIOs traditionally oversee the IT department within the organization, but as businesses introduce more digital processes, the CIO role may be expanding. In 2022, CIOs have many challenges to face, whether that's the widely reported 'Great Resignation,' the enablement of hybrid work as some regions lift pandemic restrictions or the myriad cybersecurity threats.

Amid the need for multiple areas of focus, what are CIOs prioritizing in 2022? Gartner Peer Insights polls executives in real-time, taking a pulse on trends and sentiment.

CIODIVE, June 6th, 2022
(Get More Information . .) open to premium members only

Digital Transformation: How To Gain Organizational Buy-In
Successful digital transformation requires adoption across your organization. Consider these 'people-focused' strategies to address issues that can slow your progress
"Three-quarters of digital transformation initiatives are stuck in 'pilot purgatory.' Why are so many projects unable to scale their digital systems at an enterprise level?" asks Chelsea Barnes in The Enterprisers Project.

"While technical boxes may be checked, organizational adoption - if and how employees welcome the change - is often ignored. Achieving genuine buy-in from people is a much more complex challenge than installing hardware or software. Go figure..."

The Enterprisers Project, June 6th, 2022
(Get More Information . .) open to premium members only

What IT Leaders Should Do Now To Prepare For Environment, Social, And Ggovernance (ESG) Standards
Whether environment, social, and governance initiatives are written into your IT plan or not, they're going to play a major role. Now is the time to start strategizing.
"Corporate investors are increasingly applying non-financial criteria like environmental, social, and governance to their evaluation of companies," writes Mary E. Shacklett in SearchDisasterRecovery'

"It's not far-fetched to see that these elements will start turning up in future IT audits, either.

Although companies are not required by law to disclose ESG initiatives and results in their financial reports, more companies are disclosing their ESG activities in their annual reports because their investors are asking for it. In part, this new ESG focus has been driven by concerns about climate change, but there is also new-found investor interest in corporate workforce diversity initiatives and in how companies treat their human workforces, their customers, and their customer data..."

SearchDisasterRecovery, June 10th, 2022
(Get More Information . .) open to premium members only

IT Leader's Survival Guide: 11 Ways To Thrive In The Years Ahead
Agility and resiliency have become organizational essentials in rapidly changing and challenging times. Here is how to establish an IT organization built for long-term success.
"Tumultuous times redefine what constitutes success," notes Paul Heltzel in CIO. "The past few years in IT have exemplified this. Digital disruption, global pandemic, geopolitical crises, economic uncertainty - volatility has thrown into question time-honored beliefs about how best to lead IT.

Consider this moment as a call to reflect and reset - a chance to glean from your recent experiences what it will take to lead a successful IT organization over the next decade, one that will see technology increasingly at the center of every business, a vital catalyst for accelerating, and responding to, change..."

CIO, June 8th, 2022
(Get More Information . .) open to premium members only

IT News - Storage
disable
Why Smaller SSDs Are Slower Than Larger SSDs
SSDs with larger capacities reliably post better performance numbers than smaller capacity drives of the same make and model. If you don't know anything about how SSDs work, this seems like a mystery, but the reason behind the slowdown makes perfect sense.
Sydney Butler writes in How-To Geek, "An SSD consists of NAND memory chips arranged in clusters, connected to an SSD controller. The controller is an intelligent device that decides where to physically store data on the SSD.

With more clusters of memory chips, each connected to the controller by a dedicated data bus, the controller can read and write data in parallel. The more clusters you have, the more independent paths there are to move data back and forth..."

How-To Geek, June 9th, 2022
(Get More Information . .) open to premium members only

Enterprise SSD Revenue Grew 14% Q/Q In 1Q22 At $5.6 Billion
Due to pricing rise, increasing demand, and rush order
According to TrendForce, Inc.'s research, North American data centers saw an improvement in components supply after February, driving a recovery in purchase order volume. As server brands returned to normal in-office work following the pandemic, the increase in capital expenditures on related information equipment has also boosted order growth. The addition of Kioxia's raw material contamination incident led to an increase in the pricing of certain rush orders, pushing up overall enterprise SSD revenue in 1Q22 to $5.58 billion, or 14.1% growth Q/Q.
StorageNewsletter.com, June 7th, 2022
(Get More Information . .) open to premium members only

IT News - AI
disable
How To Manage Artificial Intelligence Risk And Security: Focus On Five Priorities
In most organizations, artificial intelligence models are 'black boxes,' where only data scientists understand what exactly AI does. That can create significant risk for organizations.
"Large, sensitive datasets are often used to train AI models, creating privacy and data breach risks," notes Avivah Litan in SiliconANGLE .

"The use of AI increases an organization's threat vectors and broadens its attack surface. AI further creates new opportunities for benign mistakes that adversely affect model and business outcomes.

Risks that are not understood cannot be mitigated. A recent Gartner survey of chief information security officers reveals that most organizations have not considered the new security and business risks posed by AI or the new controls they must institute to mitigate those risks. AI demands new types of risk and security management measures and a framework for mitigation..."

SiliconANGLE , June 8th, 2022
(Get More Information . .) open to premium members only

NVIDIA Aims To Make AI A No-Brainer With New Toolkit
Nvidia believes it has the antidote to the headaches of putting AI to work without the need to hire data scientists.
Agam Shah writes in Enterprise AI, "The TAO starter kit -- which stands for Train, Adapt and Optimize -- speeds up the process of creating AI models for speech and vision recognition.

"You don't really need the AI expertise. You don't even need to know all the different frameworks. And you can leverage ... pre-trained models which are highly accurate and are high performance," said Chintan Shah, product manager at Nvidia, during a press briefing..."

Enterprise AI, June 6th, 2022
(Get More Information . .) open to premium members only

Europe's AI Act Would Regulate Tech Globally
The Artificial Intelligence Act was introduced to the European Union in April 2021, and is rapidly progressing through comment periods and rewrites
Alex Woodie writes in Datanami, "When it goes into effect, which experts say could occur at the beginning of 2023, it will have a broad impact on the use of AI and machine learning for citizens and companies around the world.

The AI law aims to create a common regulatory and legal framework for the use of AI, including how it's developed, what companies can use it for, and the legal consequences of failing to adhere to the requirements. The law will likely require companies to receive approval before adopting AI for some use cases, outlaw certain other AI uses deemed too risky, and create a public list of other high-risk AI uses..."

Datanami, June 8th, 2022
(Get More Information . .) open to premium members only

Artificial Intelligence And Security: What You Should Know
Next-generation AI products learn proactively and identify changes in the networks, users, and databases using "data drift" to adapt to specific threats as they evolve.
In March 2019, Norsk Hydro, a Norwegian renewable energy and aluminum manufacturing company, faced a ransomware attack. Rather than paying the ransom, a cybersecurity team used artificial intelligence to identify the corruption in the computer system and rebuild the operations in an uncorrupted parallel system. LockerGoga ransomware was eventually identified as the culprit, which spread via Windows-based systems.

While Norsk avoided paying the ransom, the attack still forced it to operate without computer systems for an extended period of time (weeks to months), while the security team isolated and scanned thousands of employee accounts for malicious activity.

DARKReading, June 10th, 2022
(Get More Information . .) open to premium members only

Gartner Names Three 2022 Cool Vendors In AI For Computer Vision
Gartner's newest research highlights three 2022 Cool Vendors in AI for Computer Vision that offer innovative alternatives in the marketplace.
Analyst house Gartner, Inc. has released its newest research highlighting four emerging solution providers that data and analytics leaders should consider as compliments to their existing architectures. The 2022 Cool Vendors in Analytics and AI for Computer Vision report features information on startups that offer some disruptive capability or opportunity not common to the marketplace.
Solutions Review, June 9th, 2022
(Get More Information . .) open to premium members only

IT News - CRM
disable
SAP vs. Salesforce: Which Is The Better CRM?
SAP and Salesforce are two of the top customer relationship management (CRM) solutions on the market today.
"Their dynamic platforms provide capabilities and features that enable organizations to gain actionable insights from their data and improve their customer relationship processes," notes Madeline Clarke in CIOinsight.

"But out of these two CRM software systems, which option is right for you? Keep your organization's unique needs in mind as you compare SAP and Salesforce on features, pricing, and use cases..."

CIOinsight, June 11th, 2022
(Get More Information . .) open to premium members only

Netsuite CRM vs HubSpot: CRM Comparison
Customer relationship management (CRM) has been with us for some time. By the early 2000s, Oracle, SAP, and Microsoft were locked in a battle royale for CRM supremacy. But then the cloud happened, and a host of other vendors entered the scene.
Nowadays, there are a great many CRM options available-NetSuite CRM and HubSpot are among the top platforms. They each have their pros and cons. But which is best?

Each vendor offers standard CRM features as well as sales forecasting, analytics, email marketing, reporting, and more. There are definite similarities, but they also cater to separate niches.

To determine which solution is best for you, keep your organization's unique needs in mind as you evaluate each vendor's features, pricing, and ideal users.

CIOinsight, June 7th, 2022
(Get More Information . .) open to premium members only

IT News - ERP
disable
8 Reasons ERP Is Back And On The Rise
The tech world is filled with three-letter acronyms that ebb and flow like tides. The buzz phrase 'enterprise resource planning,' (ERP), first appeared on PowerPoint slides in the 1990s.
Peter Wayner writes in VentureBeat, "It was the latest manifestation at the time of a long drive that began in the 1950s and 60s to use computers to manage corporate resources effectively and profitably.

The acronym seemed to disappear for a few decades after that. Not because the work went away, but just because other topics elbowed ERP out of the limelight. That's changing, though, and today, the letters are starting to appear once again. For instance, Findability, an artificial intelligence (AI) company, announced that they were branding their new product with the name 'ERP-Max' instead of a name that conjures up ideas of machine learning..."

VentureBeat, June 8th, 2022
(Get More Information . .) open to premium members only

IT News - Operations
disable
Making Data Centers Cool Again
As compute power in data centers increases, so too, does cooling requirements. Some of the biggest providers in the world are beginning to look to liquid immersion to keep their systems cool and working.
Anthony Ramirez writes in NETWORKComputinh, "It has been two years since the COVID-19 pandemic catapulted digital transformation to the top of the priority list for virtually every business and individual in the world. And as the world's reliance on next-gen technologies continues to increase, so too will the amount of data created, captured, copied, and consumed increase to meet the demands of today's post-digital society.

At the center of these heightened data demands lies the data center- the central enabler for the digital economy of tomorrow..."

NETWORKComputinh, June 7th, 2022
(Get More Information . .) open to premium members only

How To Modernize IT Operations For A Cloud-Native World
In a cloud-native world, the IT operations strategies that worked when IaaS was at the center of software environments no longer suffice
"Instead," writes Dusty Simoniin jaxenter, "modern businesses need a truly cloud-native approach to IT operations. Here's what that means and how your team can bring its IT operations strategy up to speed with cloud-native computing.

Once upon a time, running workloads on public cloud IaaS services was cutting-edge. So were IT operations teams that understood how to deploy, monitor, and secure the VM-based monoliths that operated in those cloud environments..."

jaxenter, June 9th, 2022
(Get More Information . .) open to premium members only

IT News - Security
disable
6 Top Attributes Employers Want In New CISOs
As the chief information security officer role rises in importance, so do the expectations of hiring organizations. These are the key qualities and skills recruiters are asked to look for.
"Looking for your next position as a CISO, preferably one with more pay, better benefits, and more on-the-job responsibilities/respect?" asks James Careless in CSO Online. "Then you need to know what skills and qualities prospective employers are seeking now from their CISO hires to maximize your chances of getting your dream job. Here are the top six attributes recruiters sayorganizations are looking for in a CISO..."
CSO Online, June 8th, 2022
(Get More Information . .) open to premium members only

Are 14-Character Minimum-Length Passwords Secure Enough?
When it comes to minimum password length, 14-character passwords are generally considered secure, but they may not be enough to keep your enterprise safe.
Sharon Shea and Randall Gamby write in SearchSecurity, "The password has long been the most widely used mechanism for user authentication, but it has also long been the bane of security's existence by causing numerous attacks, hacks and breaches. In fact, the 2019 Verizon Data Breach Investigations Report reported 80% of hacking-related breaches can be linked to stolen and reused credentials..."
SearchSecurity, June 9th, 2022
(Get More Information . .) open to premium members only

How CISA's List Of 'Must-Patch' Vulnerabilities Has Expanded In Both Size, And In Who's Using It
When the Cybersecurity and Infrastructure Security Agency debuted its list of known, exploited vulnerabilities in November, it was nearly 300 flaws long and came attached to an order for federal agencies to fix them quickly.
Tim Starks writes in Cyberscoop, "Now, as of this week, the catalog known as 'KEV' or the 'Must-Patch' list is well on its way to 800 listings, and it's the 'No. 1 topic' that CISA Executive Director for Cybersecurity Eric Goldstein says comes up in his frequent, daily meetings with businesses.

The reason, said Goldstein, is that the private sector has - without any order from his agency - adopted the KEV list as a guide for the vulnerabilities they focus on, rather than relying on the traditional open-source industry standard Common Vulnerability Scoring System for assessing the severity of software weaknesses..."

Cyberscoop, June 9th, 2022
(Get More Information . .) open to premium members only

Defense In Depth - Definition & Relation To Layered Security Approach
As the use of technology increases in every aspect of our daily lives, the rate of cyber attacks also grows exponentially. In today's world, organisations need to be highly equipped in their defences against cyberattacks so that they may better protect their assets, and it is here that the defence in depth approach is adopted.
"What is a defence in depth strategy?" writes Harman Singh in Security Boulevard.

"Defence in depth is an approach in cybersecurity that relies on using a layered and redundant defensive mechanism to protect assets from cyber attacks. This is done so that if an attack occurs and security measures fail, or a vulnerability is exploited, there is a fail-safe or backup protection layer to stop further infiltration.

This model is similar to a medieval castle with solid defences. Just as a castle has strong walls, motes and portcullis to keep out intruders, a cyber security infrastructure should use multiple layers of protection to keep data safe from hackers..."

Security Boulevard, June 6th, 2022
(Get More Information . .) open to premium members only

Less Is More: The Need To Reduce The Cybersecurity Stack
Populated with point solutions that suck up investment and monopolise resources, the industry is fast falling out of love with the burgeoning cyber security stack.
"Verizon's Payment Security Report states that most organisations now have a multivendor environment of between 20 - 70 products for monitoring and detection," writes Andrew Lintell in Enterprise Times.

"Businesses are now actively looking to reduce these numbers.

Many realise that pouring their money into tools rather than solutions still leaves them vulnerable to attack. It's a sentiment echoed in a recent Twitter poll of UK and US security professionals. It found that a third of respondents thought they were 'throwing money at nothing'..."

Enterprise Times, June 7th, 2022
(Get More Information . .) open to premium members only

Communication Is Key To CISO Success
A panel of CISOs at the RSA Conference outlined what a successful first 90-day plan looks like, and it boiled down to effective communication and listening.
Becky Bracken writes in DARKReading, "A trio of high-powered CISOs talked about the first 90 days in their roles, and whether the aim was getting board of directors' buy-in or building rank-and-file credibility, they all said how they communicated was what mattered the most.

The RSAC panel included Allison Miller, Reddit's CISO and VP of Trust; Olivia Rose, Amplitude's CISO and VP of IT; and Caleb Sima, CISO for Robin Hood. Chenxi Wang, founder of the Rain Capital venture capital fund, moderated the discussion..."

DARKReading, June 6th, 2022
(Get More Information . .) open to premium members only

IT News - Database
disable
MongoDB Targets Analytics With V6.0
Some of the most compelling enhancements unveiled at MongoDB World revolve around new analytics capabilities in the upcoming version 6.0 release of the NoSQL database.
Alex Woodie writes in datanami, "MongoDB, of course, was not designed for analytics. As a document store with a JSON-like data structure, the database was intended to make it easy for developers to build Web and mobile apps, which typically fall into the operational and transactional buckets.

But data analytics is increasingly a priority for companies, and so MongoDB is looking to build more analytic capabilities into its database. Delivering some analytics within the database makes sense, as it eliminates the need for companies to ETL the data into a dedicated OLAP environment, which brings latency, complexity, and cost to the equation..."

datanami, June 9th, 2022
(Get More Information . .) open to premium members only

What MongoDB Teaches Us About Database Trends
This week is MongoDB World 2022, and for those of us who were around for MongoDB 2014 (like me), it's fair to say that much has changed over the past eight years for the company and industry.
Matt Asay writes in TechRepublic, "While I'm clearly biased - I worked for MongoDB in 2014, and after a few years with AWS and Adobe, I rejoined in mid-2021 - it's interesting to see how the database market has evolved in less than a decade. But it's perhaps just as interesting to see how some things have stayed the same..."
TechRepublic, June 8th, 2022
(Get More Information . .) open to premium members only

IT News - Cloud
disable
Cloud Adoption: 3 Things To Consider
Organizations hoping to launch or expand cloud adoption initiatives must prepare for several key challenges beyond the core technology, but there are ways to get the job done right.
"For virtually every enterprise today, moving to the cloud is no longer a question of 'if'; instead, the question is, 'which apps and when?' opines Mike Tippets in InformationWeek.

"There is urgency in the answer. In fact, when asked about their deadlines for embracing and adopting cloud technology, many IT practitioners will quip: 'Yesterday!'

However, while most executives understand the benefits of transition to the cloud for scalability, operational efficiencies, security or cost-savings, many still harbor understandable concerns. Business executives face not just the technical challenge of cloud migration, but the added hurdle of reaching consensus amongst enterprise finance and technology leaders -- addressing their concerns and easing resistance to enact mission-critical change..."

InformationWeek, June 6th, 2022
(Get More Information . .) open to premium members only

Don't Let Your Cloud Cybersecurity Choices Leave The Door Open For Hackers
Cloud software and applications allow staff to work from anywhere. But if your cloud security is poor, cyber criminals can also get in.
Danny Palmer writes in ZDNet, "Cloud applications and services provide access to business tools, information and software from anywhere, allowing employees to be productive whether they are working in the office, remotely or a combination of the two. Location doesn't matter; everything they need is just in 'the cloud'.

But it isn't only employees and businesses who have benefited from the use of cloud computing and the shift towards remote working - it's proving useful for cyber criminals and malicious hackers too, giving them a new set of opportunities to steal sensitive data such as credit card information, passwords, secret intellectual property and more from unwary cloud users..."

ZDNet, June 6th, 2022
(Get More Information . .) open to premium members only

Why Cloud Security Matters And Why You Can't Ignore It
Cloud means handing over data and apps, but that doesn't mean giving up responsibility for security.
"As convenient as cloud computing has become," writes Danny Palmer in ZDNet, "it isn't without problems. Poor cybersecurity planning for cloud applications, such as allowing users to rely on simple passwords, failing to use multi-factor authentication or not applying patches and updates, can leave you vulnerable to attacks.

Managing cybersecurity was already a challenge for many organisations and their boardrooms: adding the cloud just widens the potential threat surface and increases the complexity for many..."

ZDNet, June 7th, 2022
(Get More Information . .) open to premium members only

IT News - DR
disable
What Is BCDR? Business Continuity And Disaster Recovery Guide
Business continuity (BC) and disaster recovery (DR) are closely related practices that support an organization's ability to remain operational after an adverse event.
John Moore, J. Bigelow, and Paul Crocetti write in TechTarget, "Resiliency has become the watchword for organizations facing an array of threats, from natural disasters to the latest round of cyber attacks.

In this climate, business continuity and disaster recovery (BCDR) has a higher profile than ever before. Every organization, from small operations to the largest enterprises, is increasingly dependent on digital technologies to generate revenue, provide services and support customers who always expect applications and data to be available..."

TechTarget, June 10th, 2022
(Get More Information . .) open to premium members only

IT News - Careers
disable
9 Essential Soft Skills For IT Leaders
Landing your next role takes more than just experience - skills like empathy and passion matter more than ever these days. Consider this advice for your next interview
Marc Lewis writes in The Enterprisers Project, "I recently presented a candidate for a C-level position at an established tech company. She ticked all the boxes for a chief product officer:

  • Decades of experience in bringing tech solutions to market
  • Experience in leading teams
  • Ability to pivot with market changes

In addition, she understood how to meld technology with market realities to ensure that any products developed would solve critical issues facing current customers and prospects.

Sounds perfect, right?..."

The Enterprisers Project, June 10th, 2022
(Get More Information . .) open to premium members only

Edition #900: The Single Best Interview Question (And Answer)
Ask The Headhunter online began publication a long time ago. The newsletter launched soon after. This Q&A column marks the 900th edition of the newsletter - that's 900 weeks of free advice inspired by the best questions asked by the Ask The Headhunter community.
To mark the occasion, I'm reprinting a column from 2003 about the best interview question ever. It has withstood the test of time, and it could not be more relevant or applicable today. I hope you find it as helpful as many others have.

Question

What is the single best interview question ever - and the best answer?

Nick's Reply

best interview questionThere used to be a book titled something like 2,800 Interview Questions & Answers. Even today, you can find books that will automate your job interviews with canned repartee. These books feature 701 interview questions (and 'best answers), or 201, or 189, 101 - or, How many interview questions you got???

Ask The Headhunter, June 6th, 2022
(Get More Information . .) open to premium members only

IT News - Email
disable
Beginner's Guide To DMARC - Everything You Need To Know
Email is the online equivalent of direct mail, with the same potential to grow your business exponentially.
But email can also be a very risky proposition if you're not taking advantage of the correct email security protocols.

So, in this blog, let's understand the three main areas of email security namely- SPF, DKIM, & DMARC.

What is DMARC?

DMARC is an anti-email phishing technology that helps organizations to safeguard themselves from malicious e-mails. With DMARC, users can set filters where incoming emails can be sent to the spam folder. By doing so, enterprises can restrict 'no-authority' emails that invade their inboxes.

Security Boulevard, June 7th, 2022
(Get More Information . .) open to premium members only

Cracking The Email Security Code: 12 Best Practices For Small And Midsize Businesses
It only takes one successful attack to spell disaster for a company. Learn how to protect your company with this email security best practice guide.
"The number of emails sent each day is expected to top 330 billion this year," writes Candid Wuest in DARKReading.

"Cybercriminals know this, with phishing and other email-targeting tactics the top attack vectors - because they work so well. And as we discussed in the first article of this two-part series, "For MSPs, Next-Gen Email Security Is a Must," advances in automation have made it easy to run these attacks at scale, with no organization too small to target anymore..."

DARKReading, June 8th, 2022
(Get More Information . .) open to premium members only

IT News - Backup
disable
Why Choose NAS Over Cloud Backup ?
Despite the obvious reasons, many users still don't routinely backup their servers or computers, leading potentially devastating data loss events.
No matter what kind of files you are working with, backup is essential. While many prefer the convenience of cloud backup, it may not best suit your needs. After all, there are many benefits of local backup that cloud backup can't afford, which is why the using NAS as a backup solution may be a much better fit for your backup needs.

Cloud Storage vs. Cloud Backup

It is important to distinguish between cloud storage and cloud backup services. While both services store your data online, cloud storage is when you move data on your device into a cloud-connected folder so that it synchronizes with your cloud container, while cloud backup does not require that. Instead, a cloud backup agent application usually directly uploads your data to a cloud repository. This is an important distinction to make.

StorageNewsletter.com, June 10th, 2022
(Get More Information . .) open to premium members only

IT News - Encryption
disable
3 Types Of PKI Certificates And Their Use Cases
Public key infrastructure helps authenticate senders via cryptography and digital certificates. Learn about three types of PKI certificates and their use cases.
"Data can pass through many networks and systems before it reaches its destination," notes Isabella Harford in SearchSecurity. "Securing data and ensuring the authenticity of the sender behind the data are essential. This is where public key infrastructure comes into play.

PKI is a collection of systems and procedures that enables PKI certificates, also known as digital certificates. These certificates are electronic documents, which, via the underlying PKI that binds the public key in a key pair to its entity, verify the authenticity of the entity..."

SearchSecurity, June 10th, 2022
(Get More Information . .) open to premium members only

Sections in this issue:
click to jump to section