CxO, Security, Technology, Linux, HR, Email, Developer (291.2.3)

CxO, Security, Technology, Linux, HR, Email, Developer (291.2.3)

Each week, IT News And Events (ITNE) selects articles from mainstream IT publications, press releases and blogs from major IT vendors, and webinar announcements of interest to senior IT professionals, all to be published in the websites and newsletters of “IT News and Events” for our 45,000+ subscribers.

Please share this?LinkedIN newsletter, which now has 5,200+ subscribers, with your IT friends and colleagues.

No alt text provided for this image
Tuesday, June 21st, 2022: 11:00 AM to 4:15 PM Wednesday, June 22nd

CxO

Security

Technology

Linux

HR

Email

Developer

No alt text provided for this image
Tuesday, June 21st, 2022: 1:00 PM to 2:00 PM EDT

CxO

JPMorgan Chase CIO Gill Haus On Grooming Digital Leaders

The banking executive explains how thinking differently about growing talent keeps his organization future-ready.

In his role as CIO for Consumer & Community Banking (CCB) at JPMorgan Chase, Gill Haus oversees an annual technology budget of $4 billion and manages over 12,000 technologists globally. He is also a member of the CCB leadership team and the firm's global technology leadership team (GTL).

Haus demonstrated his passion for technology in prior roles at digital native companies, such as PayPal and AOL, and later at other financial services firms like Capital One. Even with his current leadership responsibilities, he always finds time to keep up with the latest tech and indulge in his favorite hobbies: gaming and DJing.,,?more

CIO Interview: Yiannis Levantis Aims At Total Quality For Unipart IT

Unipart has a heritage in quality manufacturing and services that CIO Yiannis Levantis is building on, in part by harnessing SAP's cloud-based business transformation service Rise

Turning a company's IT function into an exceptional business in its own right must be the dream of many a CIO. Yiannis Levantis, group CIO at UK logistics company Unipart envisions doing precisely that, drawing on his experience of a long career in corporate IT, which includes periods at Unilever and Rolls-Royce.?more

Digital Transformation? How About A Security Transformation

Ensure a strong defense with new technologies, policies, procedures and training to empower a security transformation that enhances digital transformation.

In the rush to keep up with rapid changes and remain competitive-or even relevant-by transforming processes, many organizations might have neglected a key component of digital transformation: creating a strong cybersecurity program that defends them against the latest threats...?more

No alt text provided for this image
Tuesday, June 21st, 2022: 1:00 PM to 2:30 PM EDT

Security

How CISA's List Of 'Must-Patch' Vulnerabilities Has Expanded In Both Size, And In Who's Using It

When the Cybersecurity and Infrastructure Security Agency debuted its list of known, exploited vulnerabilities in November, it was nearly 300 flaws long and came attached to an order for federal agencies to fix them quickly.

Now, as of this week, the catalog known as 'KEV' or the 'Must-Patch' list is well on its way to 800 listings, and it's the 'No. 1 topic' that CISA Executive Director for Cybersecurity Eric Goldstein says comes up in his frequent, daily meetings with businesses... more

How To Solve A CISO's Worst Nightmare

Imagine waking up one morning, checking in and seeing a waterfall of messages from your incident response team, reporting that multiple users can't access their data. You have a meeting in 10 minutes with regulators and a monthly executive leadership meeting at noon. Panic!

Meanwhile, your response team is reporting in with an update, advising that hundreds of employees in the company can't access their data. Then, a ransom demand message from the criminals suddenly appears on multiple end-user computers, threatening to release your files publicly if you don't comply with their demand...?more

Less Is More: The Need To Reduce The Cybersecurity Stack

Populated with point solutions that suck up investment and monopolise resources, the industry is fast falling out of love with the burgeoning cyber security stack.

Verizon's Payment Security Report states that most organisations now have a multivendor environment of between 20 - 70 products for monitoring and detection. Businesses are now actively looking to reduce these numbers...?more

The Costs And Damages Of DNS Attacks

EfficientIP has announced the findings of its eighth annual 2022 Global DNS Threat Report, conducted by IDC, which reveals the damaging impact Domain Name System (DNS) attacks have had on global organizations' operations over the past 12 months.

The report uncovers how despite 73% of organizations knowing that DNS security is critical to their business, cyber criminals are still infiltrating the network and causing significant business disruption, resulting in the shutdown of cloud and on-premise applications and theft of data...more

No alt text provided for this image
Tuesday, June 21st, 2022: 9:00 AM to 5:00 PM

Technology

AMD Unveils Roadmap For Next-Gen Ryzen Chips And Zen 5 Architecture

AMD unveils roadmap for next-gen Ryzen chips and Zen 5 architecture

Computer chipmaker Advanced Micro Devices Inc. used its Financial Analyst Day event today to lay out the roadmap for its next-generation desktop, laptop and mobile silicon.

The roadmap revealed some key details about the upcoming Ryzen 7000 processors, which will be used to power desktops and workstations. Alhough the company didn't provide any hard numbers on performance, it signaled a big improvement nonetheless.?more

Executives Weigh Risks, Benefits Of Emerging Technologies

When it comes to emerging technologies - like the metaverse or NFTs - hype should never overshadow value.

Kimberly-Clark, maker of Huggies, Kleenex and Scott tissues, experimented with bleeding-edge technology to attract consumers and find new ways to connect one-on-one. While AI and ML platforms were part of the answer, metaverse presence and NFTs helped customers engage, said Manoj Kumbhat, chief digital officer and global CIO at Kimberly-Clark.?more

The Increasingly Graphic Nature Of Intel Datacenter Compute

When you get to the place where Intel is at in datacenter compute, you cannot dictate terms to customers. You have to listen very carefully and deliver what customers need or one of myriad different competitors will steal your milk money, eat your lunch, and send you to bed without dinner.

With this in mind, and looking at the past decade and a half of increasing diversification of compute engines at Intel (and in the market at large) and the end of Moore's Law, it is no surprise that Intel bought FPGA maker Altera, bought neural network processor makers Nervana Systems and Habana Labs, and has started up a discrete GPU compute engine business for the second or third time, depending on how you want to count the 'Knights' family of many-cored X86 processors from the middle 2010s that spun out of its canceled 'Larrabee' GPU project, which had a short life between early 2008 and late 2009. (You could think of Larrabee as a 'software-defined' GPU running on X86 cores with 512-bit vector co-processors, with a lot of the GPU functions implemented in software.)?more

No alt text provided for this image
Tuesday, June 21st, 2022: 11:00 AM to 12:45 PM Friday, June 24th

Linux

SUSE Doubles Down On Security In Its Latest Suse Linux Enterprise 15 Release

SUSE Linux Enterprise 15 SP4 arrives with Confidential Computing and SLSA Level 4 Compliant Supply Chain security certification.

Security is a primary consideration of Linux and open-source software today. So when European Linux giant SUSE released the SUSE Linux Enterprise 15 Service Pack 4 (SLE 14 SP4) it came as no surprise that it incorporated top security features.

This included a Supply chain Levels for Software Artifacts (SLSA) Level 4 compliance. SLSA, pronounced "salsa," is an end-to-end framework for ensuring the integrity of software artifacts throughout the software supply chain." Started by Google, SLSA is now a Linux Foundation project.?more

No alt text provided for this image
Tuesday, June 28th, 2022: 1:00 PM to 2:00 PM EDT

HR

How Digital Transformation Is Changing The IT Hiring Game

Today's fast-evolving digital economy calls for scalable solutions to complex business demands. Look for candidates with the skills to execute accordingly

Colleagues and job seekers often ask me, as a CIO, what I'm looking for when it comes to hiring. I tell them, 'I'm looking for ranchers, not pet owners.'.. more

The Right Way To Monitor Your Employee Productivity

Missteps put you at risk of encountering ethical and toxic workplace challenges.While the concept of monitoring employee performance is not new, hybrid work has fostered greater interest in keeping tabs on workplace productivity. However, it poses ethical challenges and, when done incorrectly, creates a toxic work environment.

According to Gartner research, the number of large employers using tools to track their workers has doubled since the beginning of the pandemic to 60%, with this number expected to rise to 70% within the next three years.?more

3 IT Hiring Myths About Generational Differences

The most successful teams include members of different generations. It's time to debunk these myths about workers of various age groups

Generational stereotypes aren't always insulting, but they can be harmful and limit our ability to design and deliver the solutions users want. Many people tend to think of the youngest generation of workers as the most innovative and the oldest as technophobic and resistant to change...?more

No alt text provided for this image
Wednesday, June 22nd, 2022: 1:00 PM to 2:00 PM EDT

Email

Beginner's Guide To Dmarc - Everything You Need To Know

Email is the online equivalent of direct mail, with the same potential to grow your business exponentially.

But email can also be a very risky proposition if you're not taking advantage of the correct email security protocols.

So, in this blog, let's understand the three main areas of email security namely- SPF, DKIM, & DMARC... more

Cracking The Email Security Code: 12 Best Practices For Small And Midsize Businesses

It only takes one successful attack to spell disaster for a company. Learn how to protect your company with this email security best practice guide.

The number of emails sent each day is expected to top 330 billion this year.

Cybercriminals know this, with phishing and other email-targeting tactics the top attack vectors ― because they work so well. And as we discussed in the first article of this two-part series, "For MSPs, Next-Gen Email Security Is a Must," advances in automation have made it easy to run these attacks at scale, with no organization too small to target anymore.?more

No alt text provided for this image
Wednesday, June 22nd, 2022: 1:00 PM to 2:00 PM EDT

Developer

It's Time For CIOs To Start Putting 'Quality Over Quantity' Into Practise In Software Development

Quality assurance (QA) isn't a new phrase for developers

Most know it as a staple part of the software process that is crucial for producing quality code. But throughout the pandemic, with extreme pressure for businesses to transform quickly, it's a discipline at risk of being dismissed by organisations and tech leaders as a last-minute, box ticking exercise - but at what cost? Many have neglected QA in search of that quick app launch or new digital service, leading to an unwanted surprise or customer disappointment when they don't work.?more

11 Cloud Programming Languages Developers Need To Know

How do you choose the cloud programming language that best suits your current and future needs? Explore 11 popular options and their use cases.

Cloud computing programming takes many forms. For back-end developers, it might mean the development of a cloud-native app or the continuous delivery of an interconnected set of microservices. For administrators, it might mean the development of a script that automatically provisions cloud-based resources. For web developers, it might mean the development of an Angular or React app that consumes cloud-hosted resources.?more

Developer Experience Is Security, Our Answer.

Earlier this year, we stumbled upon a short post titled Developer Experience Is Security from industry analyst Rachel Stephens. It revealed itself as an inspiring manifesto for all developers who are now increasingly expected to enhance their security practices throughout the software development lifecycle.

Developers who have barely reaped the fruits of the DevOps cultural change of the past decade and now finding themselves on the cusp of yet another profound transformation.

This time, however, we want things to be different...?more

The 7Rs Of Modernisation - The Key To Bringing Your Apps Up To Date

As digital transformation accelerates, companies of all shapes and sizes are left with little choice than to update their app portfolios for the modern era

And while consumers might notice aesthetic changes like swish new websites or online services, developers know those shifts aren't so pretty behind the scenes. Rather, organisations will be facing complex technical challenges that will need a serious rework of current systems to solve.?more

No alt text provided for this image
Thursday, June 23rd, 2022: 11:00 AM to 5:15 PM EDT

要查看或添加评论,请登录

John J. McLaughlin的更多文章

社区洞察

其他会员也浏览了