CxO, Security, Technology, Linux, HR, Email, Developer (291.2.3)
John J. McLaughlin
Editor-In-Chief, Board Member, Professional Services Engineer, Community leader
Each week, IT News And Events (ITNE) selects articles from mainstream IT publications, press releases and blogs from major IT vendors, and webinar announcements of interest to senior IT professionals, all to be published in the websites and newsletters of “IT News and Events” for our 45,000+ subscribers.
Please share this?LinkedIN newsletter, which now has 5,200+ subscribers, with your IT friends and colleagues.
Tuesday, June 21st, 2022: 1:00 PM to 2:00 PM EDT
The banking executive explains how thinking differently about growing talent keeps his organization future-ready.
In his role as CIO for Consumer & Community Banking (CCB) at JPMorgan Chase, Gill Haus oversees an annual technology budget of $4 billion and manages over 12,000 technologists globally. He is also a member of the CCB leadership team and the firm's global technology leadership team (GTL).
Haus demonstrated his passion for technology in prior roles at digital native companies, such as PayPal and AOL, and later at other financial services firms like Capital One. Even with his current leadership responsibilities, he always finds time to keep up with the latest tech and indulge in his favorite hobbies: gaming and DJing.,,?more
Unipart has a heritage in quality manufacturing and services that CIO Yiannis Levantis is building on, in part by harnessing SAP's cloud-based business transformation service Rise
Turning a company's IT function into an exceptional business in its own right must be the dream of many a CIO. Yiannis Levantis, group CIO at UK logistics company Unipart envisions doing precisely that, drawing on his experience of a long career in corporate IT, which includes periods at Unilever and Rolls-Royce.?more
Ensure a strong defense with new technologies, policies, procedures and training to empower a security transformation that enhances digital transformation.
In the rush to keep up with rapid changes and remain competitive-or even relevant-by transforming processes, many organizations might have neglected a key component of digital transformation: creating a strong cybersecurity program that defends them against the latest threats...?more
When the Cybersecurity and Infrastructure Security Agency debuted its list of known, exploited vulnerabilities in November, it was nearly 300 flaws long and came attached to an order for federal agencies to fix them quickly.
Now, as of this week, the catalog known as 'KEV' or the 'Must-Patch' list is well on its way to 800 listings, and it's the 'No. 1 topic' that CISA Executive Director for Cybersecurity Eric Goldstein says comes up in his frequent, daily meetings with businesses... more
Imagine waking up one morning, checking in and seeing a waterfall of messages from your incident response team, reporting that multiple users can't access their data. You have a meeting in 10 minutes with regulators and a monthly executive leadership meeting at noon. Panic!
Meanwhile, your response team is reporting in with an update, advising that hundreds of employees in the company can't access their data. Then, a ransom demand message from the criminals suddenly appears on multiple end-user computers, threatening to release your files publicly if you don't comply with their demand...?more
Populated with point solutions that suck up investment and monopolise resources, the industry is fast falling out of love with the burgeoning cyber security stack.
Verizon's Payment Security Report states that most organisations now have a multivendor environment of between 20 - 70 products for monitoring and detection. Businesses are now actively looking to reduce these numbers...?more
EfficientIP has announced the findings of its eighth annual 2022 Global DNS Threat Report, conducted by IDC, which reveals the damaging impact Domain Name System (DNS) attacks have had on global organizations' operations over the past 12 months.
The report uncovers how despite 73% of organizations knowing that DNS security is critical to their business, cyber criminals are still infiltrating the network and causing significant business disruption, resulting in the shutdown of cloud and on-premise applications and theft of data...more
AMD unveils roadmap for next-gen Ryzen chips and Zen 5 architecture
Computer chipmaker Advanced Micro Devices Inc. used its Financial Analyst Day event today to lay out the roadmap for its next-generation desktop, laptop and mobile silicon.
The roadmap revealed some key details about the upcoming Ryzen 7000 processors, which will be used to power desktops and workstations. Alhough the company didn't provide any hard numbers on performance, it signaled a big improvement nonetheless.?more
领英推荐
When it comes to emerging technologies - like the metaverse or NFTs - hype should never overshadow value.
Kimberly-Clark, maker of Huggies, Kleenex and Scott tissues, experimented with bleeding-edge technology to attract consumers and find new ways to connect one-on-one. While AI and ML platforms were part of the answer, metaverse presence and NFTs helped customers engage, said Manoj Kumbhat, chief digital officer and global CIO at Kimberly-Clark.?more
When you get to the place where Intel is at in datacenter compute, you cannot dictate terms to customers. You have to listen very carefully and deliver what customers need or one of myriad different competitors will steal your milk money, eat your lunch, and send you to bed without dinner.
With this in mind, and looking at the past decade and a half of increasing diversification of compute engines at Intel (and in the market at large) and the end of Moore's Law, it is no surprise that Intel bought FPGA maker Altera, bought neural network processor makers Nervana Systems and Habana Labs, and has started up a discrete GPU compute engine business for the second or third time, depending on how you want to count the 'Knights' family of many-cored X86 processors from the middle 2010s that spun out of its canceled 'Larrabee' GPU project, which had a short life between early 2008 and late 2009. (You could think of Larrabee as a 'software-defined' GPU running on X86 cores with 512-bit vector co-processors, with a lot of the GPU functions implemented in software.)?more
SUSE Linux Enterprise 15 SP4 arrives with Confidential Computing and SLSA Level 4 Compliant Supply Chain security certification.
Security is a primary consideration of Linux and open-source software today. So when European Linux giant SUSE released the SUSE Linux Enterprise 15 Service Pack 4 (SLE 14 SP4) it came as no surprise that it incorporated top security features.
This included a Supply chain Levels for Software Artifacts (SLSA) Level 4 compliance. SLSA, pronounced "salsa," is an end-to-end framework for ensuring the integrity of software artifacts throughout the software supply chain." Started by Google, SLSA is now a Linux Foundation project.?more
Today's fast-evolving digital economy calls for scalable solutions to complex business demands. Look for candidates with the skills to execute accordingly
Colleagues and job seekers often ask me, as a CIO, what I'm looking for when it comes to hiring. I tell them, 'I'm looking for ranchers, not pet owners.'.. more
Missteps put you at risk of encountering ethical and toxic workplace challenges.While the concept of monitoring employee performance is not new, hybrid work has fostered greater interest in keeping tabs on workplace productivity. However, it poses ethical challenges and, when done incorrectly, creates a toxic work environment.
According to Gartner research, the number of large employers using tools to track their workers has doubled since the beginning of the pandemic to 60%, with this number expected to rise to 70% within the next three years.?more
The most successful teams include members of different generations. It's time to debunk these myths about workers of various age groups
Generational stereotypes aren't always insulting, but they can be harmful and limit our ability to design and deliver the solutions users want. Many people tend to think of the youngest generation of workers as the most innovative and the oldest as technophobic and resistant to change...?more
Wednesday, June 22nd, 2022: 1:00 PM to 2:00 PM EDT
Email is the online equivalent of direct mail, with the same potential to grow your business exponentially.
But email can also be a very risky proposition if you're not taking advantage of the correct email security protocols.
So, in this blog, let's understand the three main areas of email security namely- SPF, DKIM, & DMARC... more
It only takes one successful attack to spell disaster for a company. Learn how to protect your company with this email security best practice guide.
The number of emails sent each day is expected to top 330 billion this year.
Cybercriminals know this, with phishing and other email-targeting tactics the top attack vectors ― because they work so well. And as we discussed in the first article of this two-part series, "For MSPs, Next-Gen Email Security Is a Must," advances in automation have made it easy to run these attacks at scale, with no organization too small to target anymore.?more
Quality assurance (QA) isn't a new phrase for developers
Most know it as a staple part of the software process that is crucial for producing quality code. But throughout the pandemic, with extreme pressure for businesses to transform quickly, it's a discipline at risk of being dismissed by organisations and tech leaders as a last-minute, box ticking exercise - but at what cost? Many have neglected QA in search of that quick app launch or new digital service, leading to an unwanted surprise or customer disappointment when they don't work.?more
How do you choose the cloud programming language that best suits your current and future needs? Explore 11 popular options and their use cases.
Cloud computing programming takes many forms. For back-end developers, it might mean the development of a cloud-native app or the continuous delivery of an interconnected set of microservices. For administrators, it might mean the development of a script that automatically provisions cloud-based resources. For web developers, it might mean the development of an Angular or React app that consumes cloud-hosted resources.?more
Earlier this year, we stumbled upon a short post titled Developer Experience Is Security from industry analyst Rachel Stephens. It revealed itself as an inspiring manifesto for all developers who are now increasingly expected to enhance their security practices throughout the software development lifecycle.
Developers who have barely reaped the fruits of the DevOps cultural change of the past decade and now finding themselves on the cusp of yet another profound transformation.
This time, however, we want things to be different...?more
As digital transformation accelerates, companies of all shapes and sizes are left with little choice than to update their app portfolios for the modern era
And while consumers might notice aesthetic changes like swish new websites or online services, developers know those shifts aren't so pretty behind the scenes. Rather, organisations will be facing complex technical challenges that will need a serious rework of current systems to solve.?more