CxO, Security, ESG, BI, Operations, IoT, Big Data, Cisco, Nutanix, Fortinet (294.3.Wednesday)
John J. McLaughlin
Editor-In-Chief, Board Member, Professional Services Engineer, Community leader
CxO
Security
ESG
BI
Operations
IoT
Big Data
Cisco News
Nutanix News
Fortinet News
CxO
Is your digital transformation initiative lagging? Consider these expert tips to restore momentum
Digital transformations are constant and ongoing - chances are, you're undergoing some phase of one as you read this. Pre-pandemic, many transformations were progressing at a steady, maybe even relaxed, pace. Then COVID put them on the fast track ...?more
Deloitte's Lou DiLorenzo and Steve Gallucci detail why refining a shared vocabulary between the CFO and CIO regarding technology and oversight practices can serve as a fortified lever for growth and promote better digital transformation.
If it wasn't the case before, the last two years have cemented technology as a fundamental growth driver for many organizations. Technology, when used effectively, plays a key role to improve efficiencies and create new capabilities for an organization, not just maintain the status quo ...?more
Chief information officers have dealt with staff burnout issues for years -- but what about their own?
It was the COVID pandemic that forced CIOs to find ways to combat signs of burnout in IT staff, but what about themselves?...?more
The role of the CMO is more invested in technology than ever, and CMOs have no choice but to engage with the CIO and align business and tech objectives. Key to the success between CMO and CIO is how both roles can collaborate around data.
On the surface, there is a perceived tension between CMOs, CIOs, the rest of the executive team, and data. CMOs need to look for ways to leverage customer data to deliver superior and highly tailored experiences to customers. CIOs need to ensure that the business' use of data is compliant, secure, and done according to best practices. They need to assure the board that the risk from data is minimised. ...?more
Security
People have become the primary attack vector for cyber attackers around the world.
As the Verizon Data Breach Investigations Report 2022 indicates, it is humans rather than technology that now represent the greatest risk to organizations. According to the SANS 2022 Security Awareness Report, the top three security risks that security professionals are concerned about are phishing, business email compromise (BEC) and ransomware, all closely related to human behavior. Security awareness programs, and the professionals who manage them, are key to managing human risk. ...?more
The growing number of enterprise software-as-a-service (SaaS) applications has led to more complexity and increased security risks within organizations.
These were among the results of a survey from Axonius, which focused on SaaS usage among enterprises across the United States, the United Kingdom and Europe...?more
Enterprises should separate data security and privacy by taking steps toward creating a comprehensive data protection framework.
Unfortunately, data security and privacy concepts are often confusing and used interchangeably. Inseparable from one another, they have a natural connection. A good understanding of policies and concepts, proper implementation of processes, and intelligent use of technology can go a long way in avoiding data abuse or loss. ...?more
During my 34-year career in federal law enforcement, I repeatedly saw the damage data theft caused to unsuspecting victims.
Whether the result was an elderly retiree losing their life savings, a company losing its intellectual property, or the military losing technology that took years to research and billions of dollars to fund. The outcomes were similar regardless of the victim: an anticipated future outlook suddenly changed, plans immediately obsolete, time and effort spent now benefitting the malicious actor who stole it all. ...?more
ESG
Enterprises use data governance to improve operations, support compliance and create competitive advantage. This cheat sheet outlines what it is and how it works.
The big data boom of today means that the e-commerce industry is dependent, more than ever, on data to develop relationships with customers and improve revenue. However, data needs to be secure, trustworthy, compliant, and fit for use. This is where data governance comes in ...?more
Imagine you and a bunch of your colleagues are attending a networking event. You've been assigned three booths spread out in different locations across the arena.
You and one of your colleagues take booth 1, and your other colleagues split themselves between booths 2 and 3. The event is flooded with professionals from your field, and soon, people start flocking into your booth - Booth 1. They're impressed with your services and say they want to pursue business opportunities with you. As a result, you start taking down the prospect details in the following format. ...?more
ServiceNow has released the latest Now Platform: Now Platform Tokyo. Learn what the platform offers in ESG features now.
ServiceNow is launching the new version of its Now Platform called Now Platform Tokyo. The Now Platform already has a reputation for automating tasks that increase operational efficiencies across industrial backgrounds. With this new release, the company has expanded its focus to employee and customer experience as well as sustainability goals ...?more
BI
These leading predictive analytics platforms deliver powerful tools for processing data that can guide enterprise decision-making.
Understanding complex events in today's business world is critical. The explosion of data analytics-and the desire for insights and knowledge-represents both an opportunity and a challenge ...?more
Operations
There are many data center infrastructure management (DCIM) software solutions on the market that promise to help data center operators manage their assets, but not all of them are created equal.
When choosing a DCIM solution, it's important to consider how well it will fit into your existing infrastructure and whether it will be able to scale as your needs change ...?more
Streamlining help desk processes may seem like the most efficient way to go, but not if you have users with different accessibility needs. Here are tips on creating an inclusive IT help desk.
Your business's IT help desk is the main interface between your IT team and the rest of the organization - and possibly your customers, too. As such, the help desk is a critical focal point for implementing processes that are as accessible and inclusive as possible to all potential users...?more
Learn how implementing DomainKeys Identified Mail helps protect against phishing, spam and email forgery by digitally signing outgoing messages.
Spammers, phishers and all kinds of threat actors like to forge email to seduce users into opening malicious email and letting the barbarians in the gates. Email authentication with the DomainKeys Identified Mail standard can stop -- or at least slow down -- many of these attacks using public key cryptography...?more
Newer OpenSSL vulnerabilities are identified regularly by genuine security researchers or come to light as zero-day vulnerabilities when exploited by threat actors.
While patching the bugs and OpenSSL vulnerabilities are important, organizations cannot wait for and rely just on patches to protect their websites. They need to be proactive in identifying and securing these vulnerabilities before attackers can find and exploit them. Read on to know how....?more
IoT
New data from Omdia shows that IoT deployments are on the rise, with a strong majority of companies already in the process of deploying IoT technology to enhance their operations
A new survey released by UK-based research firm Omdia bears out some of the industry's rosier predictions for IoT uptake among businesses, finding that almost four out of five companies expect to be actively deploying IoT within the next two years...?more
Big Data
MapReduce offers an effective, faster, and cost-effective way of creating applications.
This model utilizes advanced concepts such as parallel processing, data locality, etc., to provide lots of benefits to programmers and organizations.
But there are so many programming models and frameworks in the market available that it becomes difficult to choose...?more
Stefano Maifreni, founder of Eggcelerate, discusses why organisations must focus on data transformation to maximise long-term value
Digital transformation is a key mantra for organisations looking to keep pace with their digital age competitors. Businesses need to find ways to modernise and streamline their operations to stay ahead of the game. To that end, there has been much buzz around digital transformation in recent years. It's one of the most prevalent business trends right now, as more and more companies look to leverage the power of technology to transform their services and processes. ...?more
Discover data intelligence solutions for big data processing and automation. Read more to explore your options.
Data intelligence solutions are becoming increasingly important as businesses strive to make the most of their data. Big data is only getting bigger, and it can be challenging to process and make sense of all that information without the help of specialized software. That's where data intelligence solutions come in ...?more
Big data technology is leading to massive breakthroughs in the Fintech sector.
Big data has led to many important breakthroughs in the Fintech sector. The industry is growing at a remarkable rate due to this new technology ...?more
Cisco News
Simplify your WAN platform to create better experiences today and tomorrow.
Change - a word that has become synonymous with our reality. How we work, live, and connect with one another continues to change at a pace we never thought possible, making it incredibly difficult for IT to keep up. This rapid evolution has created fragmented and increasingly complex IT ecosystems that, in many cases, are not sustainable. ...?more
Whether you're looking for a contractor to improve your home or a school to educate your child, you probably won't make your decision based solely on an organization's website.
Chances are, you'll turn to reviews from others who have used the products or services you're researching. The same is true of technology users, experts, buyers, and providers-many of whom share insights through the TrustRadius community...?more
In the first part of this blog series on Unscrambling Cybersecurity Acronyms, we provided a high-level overview of the different threat detection and response solutions and went over how to find the right solution for your organization.
In this blog, we'll do a deeper dive on two of these solutions - Endpoint Detection and Response (EDR) and Managed Endpoint Detection and Response (MEDR). However, first let's take a look back at the history of endpoint security solutions and understand how we got EDR and MEDR security solutions. ...?more
Nutanix News
New Updates to Elevate Partner Program Better Enable Partner Ecosystem to Capture Market Opportunities, Build Profit Continuums, and Enhance Cloud Differentiation
Nutanix announced the next era of Elevate, a global partner program designed to re-define the partner engagement journey. Nutanix has evolved the Elevate program focus to provide a better experience for the entire partner ecosystem and customers throughout the customer lifecycle, while staying true to the program's unified framework. This includes an expanded benefits package to build a partner profit continuum. ...?more
Fortinet News
In June 2022, Fortinet's FortiGuard Labs discovered and reported four vulnerabilities in dotCMS - an Open Source Hybrid CMS built on Java technology that combines the flexibility of a headless CMS with the efficiency of traditional content authoring.
The vulnerabilities were found in versions 22.05 and below. At the time of the writing of this advisory, discovered issues have been fixed and updates published by the vendor. FortiGuard Labs appreciates the vendor's quick response and timely fixes. ...?more
Cyber adversaries maximize every opportunity they can get. They prey on vulnerabilities, security gaps, but also human nature.
In fact, there is one risk that cannot be 'patched' easily and that is the human factor. It remains a key concern in breaches and cyber attacks. Basic cyber hygiene and the importance of cybersecurity awareness training remain critical to cyber defense especially for fraud based social engineering attacks...?more
Last week the Fortinet community of elite customers, partners, executives, and global industry experts came together for two days of keynotes, panels and roundtable discussions during the Fortinet Championship Security Summit.
This premier event kicked off the 2022 PGA TOUR Fortinet Championship, at the Silverado Resort and Spa in Napa, California. The Security Summit was also complemented with a Technology Vendor Expo ...?more
Things not always being as they seem is a common adage that lends itself well to the cyber world.
Phishing tries explicitly to convince an email recipient that a message is legitimate and trustworthy when it is not. This applies equally to cases where the sender is interested in criminal exploits or nation-state activity ...?more