CxO, Security, CxO Security Events, ESG, ERP, MFA, Wireless, Networks, IoT, Cisco, Dell, IBM, Citrix (296.1.Monday)
John J. McLaughlin
Editor-In-Chief, Board Member, Professional Services Engineer, Community leader
Please share this newsletter with your IT friends and colleagues and encourage them to become subscribers!
The most popular articles posted to this newsletter become the basis of ITNE’s white-label,?enterprise IT newsletter service?which is designed to help Enterprise IT sales reps keep their name and information in front of customers and prospects by providing them with trusted news and insights.
Please contact?[email protected]?for details.
CxO
Security
CxO Security Events
ESG
ERP
MFA
Wireless
Networks
IoT
Cisco News
Dell News
IBM News
Citrix News
CxO
Think you're just responsible for technology? You're wrong. Here's what IT leaders need to accept and act on to help get business-IT alignment right.
When New York-Presbyterian CIO Daniel Barchi arrives at work in the morning, he doesn't sit down at his desk. That's because he doesn't have a desk - or an office - of his own. 'I guide a very, very large team of IT people, but I don't have one office where I go every day,' he says ...?more
When looking at the scale and scope of worldwide cybercrime, password attacks are the most commonly observed type of threat in a given 60-second period.
Cybercrime is big and still growing bigger. It is often difficult to fully grasp the impact online attacks have had over the past decades. We used data from various Microsoft-owned properties and a mix of external sources to illustrate the scale and scope of worldwide cybercrime. Our comprehensive report on malicious activity highlights what is happening around the world within any given 60-second window...?more
With so much unknown about what your developers and systems rely on to be productive - and what those tools and code bases rely on in turn - it's time to get serious about securing your software supply chain.
One reason open source is popular in the enterprise is that it provides well-tested building blocks that can speed up the creation of sophisticated applications and services. But third-party software components and the convenience of packages and containers bring risks along with the benefits because the applications you build are only as secure as those dependencies...?more
CISOs usually report to a high-level executive, but reporting to a top-level business executive like the CEO rather than a technology executive protects the business best.
Who should the chief information security officer report to? It depends. It depends who you ask, and it depends on what the organization as a whole wants to accomplish by having a CISO in the first place. That said, for the majority of organizations, it's critical to have the CISO reporting in to a business executive rather than to a technology executive and with as few levels as possible between the CISO and the CEO. The reason is that security success is lower for organizations where the CISO reports to someone who does not report directly to the CEO. ...?more
Security
A well-defined and robust incident response plan can dramatically minimize the damage to a company when disaster strikes. A practical incident response approach helps distribute and codify the incident response strategy across the organization.
Here are some reasons why having a NIST incident response plan is imperative:
Repeatable process - without a robust incident response plan, employees and teams won't be able to respond recurrently or prioritize their time efficiently...?more
Learn how Forrester's seven pillars of zero trust model can help IT leaders identify, organize and implement the appropriate cybersecurity tools for a zero-trust framework.
The zero-trust framework is gaining traction in the enterprise due to its security benefits. Organizations are increasingly adopting a zero-trust model in their security programs, replacing the traditional perimeter-based security model ...?more
How to solve the software vulnerability problem across the entire software development life cycle (SDLC).
In the opening keynote of the 2022 Black Hat security conference, Chris Krebs, the former Department of Homeland Securities cybersecurity director, stated that security is going to get worse before it gets better. Why? Krebs said that "software remains vulnerable because the benefits of insecure products far outweigh the downsides." ...?more
Shortly after Google Cloud's acquisition of Mandiant was announced, I wrote an in-depth analysis of the strategy and impact to both companies. The analysis was highly speculative because very little information was public at the time.
The deal has closed, and Google is talking now. After a barrage of articles, interviews, and a full-on conference (Google Next) this month, now feels like an opportune time to revisit the topic, tie up any loose ends in my analysis, and highlight any areas that remain undetermined...?more
CxO Security Events
Join Bob Bragdon, SVP/Managing Director Worldwide, CSO and subject-matter experts from our sponsor, Cyren, for a private, hour-long, interactive, virtual roundtable where we'll discuss how adding an additional layer of security can eliminate the time your security teams spend manually hunting and removing email threats.
Cyber resilience allows organizations to maintain operations in the face of constant cyber attacks. Despite massive investments into email perimeter defenses and user education, 75 malicious messages per 100 mailboxes continue to reach employee mailboxes per month...?more
Join us on Thursday, November 10 at 10:00 a.m. PDT/1:00 p.m. EDT as experts break down some common XDR myths and answer questions
There has been tremendous buzz across the cybersecurity community around emerging technology known as extended detection and response (XDR). But many security professionals are unable to agree on a single definition of XDR that's accepted by analysts and vendors purporting to be knowledgeable on the subject...?more
Attacks on software supply chains have greatly accelerated the rate at which organizations are now embracing DevSecOps best practices to secure both legacy monolithic and emerging cloud-native applications. Adopting a DevSecOps approach can help maintain the speed of application development and deployment while ensuring the security and stability of applications.
But the range of technologies and best practices required to achieve and maintain application security vary widely, and each organization may choose a combination of different tools to achieve the same result. Each organization will need to determine for themselves how far they want to shift responsibility for application security left toward application developers.
Hosted by Security Boulevard ...?more
Most security operations centers aren't failing because they don't have enough data - they are failing because they have too much data. In this webinar, experts recommend tools and best practices for correlating information from multiple security systems so that your SOC team is focusing on the most important threats first.
You'll get ideas on how to integrate data from multiple systems so that you can identify sophisticated threats and prioritize your responses based on well-correlated security telemetry.
Hosted by DARKReading ...?more
ESG
As the Internet of Things becomes increasingly instrumental in the workplace, company and consumer data risk grow.
It's no secret that hackers have discovered and implemented complex methods to access crucial data from businesses of all sizes across all industries, including the federal government. The rising threat and vulnerabilities have ultimately prompted state and federal officials to enact cybersecurity regulations to strengthen data protection nationwide...?more
领英推荐
Pressure is mounting for the business sector to address its environmental footprint and become more sustainable. Here's a look the key drivers and how technology can help.
A movement to go green is gaining traction, and business and IT leaders need to make sure they don't miss out...?more
ERP
In today's fast evolving digital world, it is highly imperative to keep up to date with the latest technology and software
India is gradually becoming a hub for new enterprises, there is a rising need for them to function in a manner that would yield the most positive results. Small and emerging businesses need to focus on enhancing their Enterprise Resource Planning (ERP) through the adoption of latest technologies such as AI, ML, chat bots, data analytics, Automation, etc. The article talks about the importance of adopting such technologies and how it can help businesses to enhance their existing systems. Mr. Ali Hyder, Group CEO, Focus Softnet share more insights on the same. ...?more
Many IT decision makers consider evaluating a new enterprise resource planning (ERP) system from as early as every three years to as far out as seven years or longer. This might be an evaluation for an on-premise or cloud-based ERP solution.
Beyond the desire for improved functionality and seamless integrations with new technologies, business and IT leaders often rethink their current solutions with the expectation of finding a provider that offers greater support. Organizations need software experts who are committed partners capable of setting them up for long-term success....?more
An ERP software system is often one of the most significant investments a company will make. This solution is a major financial and practical decision that can impact all parts of your business, like human resources, accounting, manufacturing, marketing and more. Before selecting a new system, buyers should research current solutions and ERP trends coming down the pipeline.
To help our readers out (and sate our curiosity), we spoke with several leaders about the ERP trends we can see in 2023 and beyond. Between a movement to the cloud, the internet of things (IoT), industry-specific ERP solutions and artificial intelligence (AI), the future of ERP looks brighter than ever. ...?more
As part of Solutions Review's Premium Content Series-a collection of contributed columns written by industry experts in maturing software categories-Maziar Adl, the Co-Founder and Chief Technology Officer at Gocious, explains how companies can strengthen their ERP systems from continuity disruptions.
Downturns and disasters are inevitable for any business, even complex business and manufacturing operations using data-driven technology tools to optimize efficiency. But the difference between survival and closure can come from preparedness and planning. When a disruption happens, downtime costs businesses a staggering $163,674 per hour, according to research by Datto and the Aberdeen Group. This estimated cost also varies depending on the business's size and the operations' scale ...?more
MFA
For years, businesses have faced data breaches and account takeover instances. And the majority of them were a result of compromised credentials.
The rising instances of compromised credentials and weak passwords have pushed organizations to incorporate multi-factor authentication (MFA) into their platforms, adding extra security layers...?more
On October 31 2022, CISA announced critical guidance on threats against organizations using certain forms of multi-factor authentication.
The agency urges all organizations to implement phishing-resistant MFA controls ASAP in order to prevent phishing and increasingly automated and sophisticated attacks on authentication processes...?more
Multifactor authentication can be vulnerable to phishing attacks, fake push alerts, communications protocols weaknesses or SIM swap attacks, according to CISA....?more
Wireless
Wi-Fi 6 is here, and devices supporting the new standard are starting to hit store shelves, both off- and online.
While many agencies have already deployed some version multifactor authentication, not all forms provide equally secure security, according to a new fact sheet from the Cybersecurity and Infrastructure Security Agency ...?more
Networks
Voice over Internet Protocol (VoIP) enables us to make phone and video calls over the internet, providing cost-effective and accessible connection capabilities for homes and businesses. If you need a replacement for your landline, these are the best.
Gone are the days of the landline telephone. Now, all we have to do to communicate is send a quick text or join FaceTime. However, while our mobile phones are convenient, some users require more calling features than cellular services can deliver. This includes small businesses and some homeowners...?more
IoT
More than 4 billion malware attempts were recorded globally so far in 2022, while year-to-date ransomware attempts have already exceeded full-year totals from four of the last five years.
These were among the findings of a recent SonicWall threat report that also found ransomware tactics are shifting and diversifying, adding more pressure to already overloaded IT security professionals...?more
In the wake of multi-trillion-dollar projections and hype about billions of connected devices from ten years ago, the internet of things (IoT) has lost much of its excitement. Now, the early applications and underlying technologies associated with the IoT are a part of everyday life.
Operations managers simply expect to monitor and control widely dispersed machines at increasingly affordable costs. Similarly, consumers expect to monitor their homes and belongings remotely via simple to use Apps and home gateways. Within the technology industry, suppliers of IoT solutions and services know that they must tackle issues of scale and reuse to decrease costs further over the long term...?more
IoT is an increasingly common part of critical networks and cyber attackers know it. Here's how to avoid becoming a victim of their tactics.
Connected Internet of Things (IoT) devices such as printers, cameras and routers are leaving networks vulnerable to cyberattacks because they're not being properly secured ...?more
Cisco News
Next step in Cisco partner program evolution to support partner competitiveness and recognize deep expertise; Six new solution specializations focus on the biggest market opportunities for partners, including hybrid cloud, hybrid work, secure access service edge (SASE) and full-stack observability; By tying solution specializations to customer buying criteria, Cisco makes it easier for customers to identify which partners to work with
Cisco today expanded its portfolio of specializations available through the company's world-class partner program. Cisco's partner program continues to evolve to increase partner sales opportunities, add flexibility to partner certification requirements, and emphasize the importance of multi-architectural expertise. The six new specializations are tied to Cisco customer priorities and represent fast-growing market opportunities for Cisco and its partners in areas where Cisco has been investing and innovating...?more
Momentum for the Cisco Security Cloud continues during Partner Summit, with new capabilities across the portfolio demonstrating progress towards the vision; Monthly multi-factor authentications (MFA) swelled 38 percent annually as organizations move to ensure only trusted users and devices gain access to corporate resources.
Cisco announced new capabilities across its security portfolio so teams can be more productive and protected wherever they are working from. Unveiled at Cisco's annual Partner Summit conference, the news demonstrates continued progress towards the strategic vision of the Cisco Security Cloud that will protect the integrity of an organization's entire IT ecosystem. The end-to-end platform will safeguard users, devices and applications across public clouds and private data centers, without public cloud lock-in ...?more
Dell News
AI demands higher processing power and ability to scale compute and storage independently.
AI has become an enabler of significant competitive advantage and a way to disrupt markets. A recent Accenture survey revealed that AI achievers-those companies that advance AI maturity enough to achieve superior growth and business transformation-attribute nearly 30 percent of their total revenue to AI and outperform in areas that include customer experience and sustainability...?more
Multicloud when strategically implemented can help provide flexibility and control to organizations and drive cost efficiencies.
Multicloud has become one of the most convenient and efficient tools for data storage. In the last two years, we have seen how the cloud has facilitated remote access and sharing of information. Today, multicloud has become a default choice for many organizations, with 76 percent of enterprises already adopting it, and 86% expecting to be on by 2023...?more
Next-gen PowerMax is the first mission-critical storage to integrate NVIDIA BlueField DPU (data processing unit) technology.
The latest generation of PowerMax 2500/8500 models are the first mission-critical storage systems to integrate the NVIDIA BlueField DPU (data processing unit) technology into the architecture. This milestone is a testament to the long-standing relationship between Dell Technologies and NVIDIA. Let us explain...?more
IBM News
iBM announces a demonstration project with the U.S. Patent and Trademark Office (USPTO) to test an artificial intelligence (AI) driven intellectual property (IP) analysis tool, the IBM IP Advisor with Watson Demonstration System
Leveraging conversational AI technology with IBM Watson Assistant, and content insight mining and guided navigation solutions with IBM Watson Discovery, the system is designed to help users more efficiently uncover and analyze relevant patent data, allowing more time for strategic, value-added tasks...?more
Solution includes new Analytics Content Hub to bring together business intelligence solutions from multiple vendors
IBM announced new software designed to help enterprises break down data and analytics silos so they can make data-driven decisions quickly and navigate unpredictable disruptions. IBM Business Analytics Enterprise is a suite of business intelligence planning, budgeting, reporting, forecasting, and dashboard capabilities that provides users with a robust view of data sources across their entire business...?more
Citrix News
Sometimes you need a general-purpose policy engine that unifies policy enforcement across the stack.
That policy engine can give you a centralized decision-making entity for systems that involve multiple NetScalers or multiple distributed devices. Open Policy Agent (OPA) enables you to specify policy as code and simple APIs so you can offload policy decision-making from your software. It helps you decouple policy decision-making from policy enforcement and can act as a centralized decision making entity for the system. You can use OPA to enforce policies in microservices, Kubernetes, CI/CD pipelines, API gateways, and more. ...?more
There has been no lack of exciting news coming from the Citrix and Google partnership this year. From introducing two new purpose-built Citrix DaaS editions in the Google Marketplace to rolling out new technical capabilities like Citrix Provisioning Service for Google Cloud and Citrix Image Portability Service, we are continuing to add value for our joint customers.
Recently, we also made a number of announcements at Google Next 2022. We introduced a new Quick Deploy interface to get Citrix DaaS workloads up and running on Google Cloud more quickly than ever. We also started offering Citrix-prepared images to take the guesswork out of building optimized images for your deployments to save time and effort...?more