CxO, Security, CxO Security Events, AI, Cloud, Encryption, AWS, Dell (298.2.Monday)
John J. McLaughlin
Editor-In-Chief, Board Member, Professional Services Engineer, Community leader
CxO
Economy uncertainty, new forces in an already tight talent market, and rising technology costs top the list of tough, ongoing issues CIOs must navigate this year.
Three years ago, IT leaders were squarely focused on how to adopt fledgling AI techniques and approaches into their business models in service of digital transformations that included plans for shifting some workloads to the cloud ...?more
The macro issues shaping the threat landscape can help security pros reset their priorities and reformulate strategy.
As remote work grows, many organizations are managing a complex web of in-person, online, and hybrid work scenarios while also juggling cloud migrations to support their diversified workforces. For CISOs, this has created a variety of new challenges ...?more
Inflation, a potential recession, and ongoing security threats are just a few of the challenges IT leaders face in the coming year. Here are five trends to watch
Every year has challenges that impact IT strategy and priorities. Some can be identified and planned for at the start of the year, while others can materialize anytime. As an IT leader, investing in outside-in learning and dialing your active listening skills to identify the signals of the upcoming year's risks and opportunities is essential ...?more
Software dominates the world and remains a big and accessible attack surface.
In 2022, an estimated $6B was invested in Application Security, with that number expected to reach $7.5B in 2023. Within AppSec, software supply chain security entered the spotlight two years ago and represents AppSec's fastest growing attack category with major headlines of breaches and exploits happening on a regular basis...?more
CIOs should prepare for a year of challenges around procuring talent and delivering operational enhancements to the businesses they serve.
In the land of enterprise IT, the major shifts that challenge leaders begin to show up gradually - then all at once.
Analysts and industry watchers typically flag bleeding edge technology services or rising market trends ahead of their full-fledged development, giving technology leaders a chance to prepare for what's coming. Timely adoption of those technologies can be elusive. ...?more
Security
Predictions from technology experts
Cybersecurity is already one of the biggest pain points for businesses. Indeed, cyber-criminal activity often outpaces business security efforts, resulting in a requirement for teams to constantly adapt to an ever-evolving threat landscape.
Now, faced with new macroeconomic issues, such as the continued financial instability, and the ongoing Russia-Ukraine war, the impact on the cyber landscape has been unprecedented....?more
When threats emerge, the Fidelis Cybersecurity Threat Research Team (TRT) is ready. Each month, the monthly Threat Intelligence Summary examines the latest threats and trends so you can stay resilient against cyber adversaries.
The December 2022 Threat Intelligence Summary examined a new vulnerability that targets endpoint security providers (rest assured, we've confirmed that Fidelis Cybersecurity platforms remain secure). We also discuss mitigations for the ongoing LastPass data breach, updated detections for popular penetration testing tools, and metrics and information on the most impactful vulnerabilities and malware strains in the wild today. ...?more
The December 2022 Threat Intelligence Summary examined a new vulnerability that targets endpoint security providers (rest assured, we've confirmed that Fidelis Cybersecurity platforms remain secure). We also discuss mitigations for the ongoing LastPass data breach, updated detections for popular penetration testing tools, and metrics and information on the most impactful vulnerabilities and malware strains in the wild today.
Today, with enterprises functioning in an atmosphere that is more challenging than ever, Intrusion Detection Systems (IDS) play a vital role. As threats become more critical across the board, an Intrusion Detection System can save your busines ...?more
Security information and event management (SIEM) frameworks are essential for enterprises to monitor, manage and mitigate the impact of evolving cyberattacks.
As the number of threats and the financial impact of breaches increase, these frameworks are even more crucial.
Consider ransomware. Since 2020, more than 130 different strains of these encryption and extortion efforts have been identified. According to the US Cybersecurity and Infrastructure Security Agency (CISA), ransomware incidents have been detected across 14 of 16 critical infrastructure sectors, such as Emergency Services, Food and Agriculture, and Energy. Today, ransomware is present in 10% of all breaches. ...?more
While security teams are tasked with securing their business's people, operations and assets, they're often faced with resistance from internal stakeholders when establishing their program budget.
For security leaders to successfully defend their funding, they must effectively communicate what security vulnerabilities are costing the business, know how their program supports each department, and learn how to counter common objections...?more
CxO Security Events
Attackers today are more cunning and sophisticated than ever before. The attacks of yesterday - easy to identify and defend against - are long gone. Today, attackers use a sophisticated combination of methods and techniques to target companies' assets and evade detection while many security teams lean on legacy strategies that fail to keep up.
Hosted by Security Boulevard ...?more
It's time to cut the cord and migrate to a cloud-native firewall. Join Zscaler experts for an engaging session
Hosted by Security Boulevard ...?more
Choosing the right firewall for your needs can be challenging when trying to navigate the sea of firewall data sheets. Discover how to choose the firewall capabilities that are right for your company among the dizzying array of specifications.
Hosted by InformationWeek ...?more
AI
If there's a leading technology of the current era, artificial intelligence (AI) is clearly a top contender. The hype is constant and flows from all quarters.
AI's role in consumer products and enterprises alike is growing, rare for any technology.
AI as a platform spans hardware, software, and on-demand services. All three categories have very different players, although there is some overlap between hardware and software players ...?more
Recent advancements in AI are sending tremors through the tech industry. But as we've learned, this technology is also fairly unreliable-robots can't write compelling articles, and conversational AI just can't stop lying.
Well, evidently, these are the perfect qualities for a lawyer.
领英推荐
DoNotPay, a company that helps people cancel subscriptions and asks for refunds using AI, is building a AI bot that listens to court hearings and feeds answers to defendants through a pair of AirPods. The robot lawyer will debut next month at a hearing for a speeding ticket. (Previously, DoNotPay launched an AI that writes legal contracts and disputes parking tickets.) ...?more
The development of AI technology has sparked intense competition that compels all service providers to adopt innovations to stay ahead of rivals. User safety is the top priority for cybersecurity firms.
User safety is the top priority for cybersecurity firms. Numerous servers host photographs, videos, links, and online pages; therefore, keeping them out of hackers' access is essential. Only cybersecurity experts can prevent our data from being compromised since black hat hackers are capable of breaching cybersecurity for a variety of reasons ...?more
Cloud
Competing narratives converge as companies push modernization while controlling costs.
There are two diverging narratives taking shape in the cloud ecosphere.
An economic downturn, interest rate hikes and high levels of inflation led to market conditions that favor spending cutbacks and workforce reductions...?more
Migration to the cloud provides a unique opportunity for energy savings. We share how to realize these savings for your organization.
Migrating to the cloud has the potential to reduce the energy consumption of your workloads dramatically. In fact, cloud migration can lower energy consumption by 65% and carbon emission by 84%, according to Accenture ...?more
As infrastructure has grown more complex, the need to effectively manage it has grown, too - particularly for applications and APIs.
With many businesses moving application and API infrastructure to the cloud, business environments have grown more complex in recent years. As a result, it has become harder for businesses to manage, operate, maintain, and protect that infrastructure...?more
State of cloud market survey reveals four major trends and key practices to drive more value
While investments in cloud migrations have surged, organizations now must shift their focus to an ongoing journey in order to achieve expected outcomes at higher rates, according to new research from Accenture (NYSE: ACN)....?more
Encryption
Recently patched vulnerabilities in MatrixSSL and wolfSSL, two open-source TLS/SSL implementations / libraries for embedded environments, have emphasized the great potential of using fuzzing to uncover security holes in implementations of cryptographic protocols.
Fuzzing cryptographic libraries to flag security flaws...
'Computer software is becoming more complex. So, it is almost impossible to perform a complete source code review with reasonable coverage. For this reason, modern fuzzing methods are used to discover vulnerabilities,' Deutsche Telekom's security evaluators explained. ...?more
Triple DES no longer provides the encryption strength it once did. Prepare now to transition away from its use to a more security alternative.
Triple Data Encryption Algorithm is used widely across many industries and in many popular network protocols to encrypt data at rest and data in motion. NIST deprecated the algorithm in 2018, however, and Triple DES use will be disallowed after 2023. ...?more
Chinese researchers claim quantum technology is reaching a point where a quantum device will soon be able to crack RSA 2048 public key encryption
Chinese researchers claim quantum technology is reaching a point where a quantum device will soon be able to crack RSA 2048 public key encryption
Given that quantum computers offer the ability to push computational boundaries, such as solving intractable problems such as integer factorisation, which is used for public key encryption, the US government aims to encourage the migration of Federal Government IT systems to quantum-resistant cryptography. ...?more
AWS News
As we kick off 2023, I wanted to take a moment to remind you of some 2023 predictions by AWS leaders for you to help prepare for the new year.
You can also read the nine best things Amazon announced and AWS for Automotive at the Consumer Electronics Show (CES) 2023 in the last week to see the latest offerings from Amazon and AWS that are helping innovate at speed and create new customer experiences at the forefront of technology. ...?more
Dell News
IT organizations are turning to Dell PowerProtect data protection to deliver a secure, frictionless Kubernetes multicloud experience.
Dell Digital, the internal IT organization of Dell Technologies, wanted to create a resilient, high-performance, cost-effective environment that would help Dell developers boost efficiency and productivity. They selected VMware Tanzu Kubernetes and Dell data protection solutions to reimagine how they could meet future needs and spur innovation ...?more
Find how NG Bailey leveraged Dell APEX to update its IT infrastructure with more agility, cost control and simplified IT management.
The pandemic and current market turmoil have shown the future can be highly unpredictable. To succeed, businesses must prioritize agility and flexibility to pivot quickly and adapt to world events, supply chain dynamics and cyclical business demands. Technology, which drives much of business operations today, must pivot in lockstep to support fluctuating business needs. ...?more
Critical cloud development data could be an unintended casualty in the unbridled rush to get new application services to market.
Many can relate to the frustrating experience of losing a set of car keys, a smartphone or a wallet, but imagine what it feels like to lose sight of your data.
In the Dell Technologies 2022 GDPI Snapshot survey, 72% of organizations reported they are unable to locate and protect dynamic and distributed data resulting from DevOps and cloud development processes. ...?more
An overview of the Data Protection Platform within PowerProtect Data Manager.
Dell PowerProtect Data Manager software provides a software-defined data protection solution, built from the ground up for proven and modern workloads.
In a previous blog post, we examined the high-level architecture of the Policy Engine and Catalog Service of the Dell PowerProtect Data Manager protection platform. We will now examine other core services of PowerProtect Data Manager. ...?more