Security, CRM, AI, Big Data, FOSS, DR, Networks, Developer, Cisco, Fortinet, Red Hat, CxO Events (318.1.Thursday)
John J. McLaughlin
Editor-In-Chief, Board Member, Professional Services Engineer, Community leader
Security
CRM
AI
Big Data
FOSS
DR
Networks
Developer
Cisco News
Fortinet News
Red Hat News
CxO Events
This webinar delves into the critical role of test data in software testing, exploring how high-quality, production-like data can make or break the accuracy and effectiveness of your tests. Register
Security
Data Breaches For The Month August 2024
This month has been a challenging month for organizations worldwide as several high-profile data breaches occur and become headlines....more
Complying With PCI DSS Requirements By 2025
Version 4.0.1 of the Payment Card Industry Data Security Standard (PCI DSS), which came into effect back in April, incorporates a few important changes to make it fit for the modern digital world, addressing how technologies, the threat landscape and payment processes have changed....more
CTEM: The Next Frontier In Cybersecurity
Understanding the cybercrime ecosystem has never been more important than in 2024. Ransomware attacks and data breaches continue to proliferate, and it's imperative that executives understand what's driving the increase and more importantly how to prevent oneself from becoming a victim....more
The Achilles' Heel Of Enterprise Security: How Moving On From Microsoft Active Directory Strengthens Your Security Posture
High-profile, wide-ranging cybersecurity breaches-the SolarWinds supply chain attack, the Colonial Pipeline ransomware incident, Russian hacking of Microsoft-have brutally exposed the consequences of having inadequate identity security controls....more
An Introduction To Trackers And The Data They Collect
Trackers are everywhere and come in many different forms. Some tracking methods are more invasive than others; this post aims to explain what 'trackers' are, how they work, and give examples of the data they collect....more
CRM
Five Top Innovating CRM Companies For 2024: The CRM Conversation Starters
In keeping with artificial intelligence's virtual takeover of the business technology world, nearly all of this year's Conversation Starters had AI at the center of their prodigious efforts....more
The Best CRM Software And Solutions: The 2024 CRM Industry Leader Awards
It's no longer a question of when artificial intelligence will have a seismic impact-it's happening now....more
The Best CRM Software, Solutions, And Innovators: The 2024 CRM Industry Awards
If it wasn't clear enough already, we'll just say it here plainly: Artificial intelligence has earned all its hype....more
The Best Data Management Solutions: The 2024 CRM Industry Leader Awards
Emerging technologies such as the Internet of Things (IoT) and artificial intelligence are adding large amounts of data to business systems every minute of the day, amounting to dozens of zettabytes every year....more
This webinar will explore the intricacies of the data science lifecycle, with an emphasis on data preparation, feature engineering, and ML pipeline deployment, providing attendees with valuable insights into streamlining these processes and accelerating AI outcomes. Register
AI
How Can AI Drive Revenue? Here Are 10 Approaches
Artificial intelligence has captured the imagination of many a boardroom. Now, the emphasis has shifted to capturing revenue through AI-driven use cases....more
InfoQ AI, ML And Data Engineering Trends Report - September 2024
The future of AI is open and accessible. We're in the age of LLM and foundation models. Most of the models available are closed source, but companies like Meta are trying to shift the trend toward open-source models....more
Big Data
How Data Privacy Laws Are Changing The Way Businesses Handle Unstructured Data
The volume of unstructured data has exploded over the last few years, comprising a significant portion of the data that is generated on a daily basis. With emails, social posts, images, videos and files, there is a wealth of unstructured data in any given business....more
How To Utilize AI For Improved Data Cleaning
You spend most of your workweek preparing and cleaning datasets. What if you could cut that time in half? With AI, you could streamline your workflows while improving accuracy and quality. How can you incorporate this technology into your process?...more
Is The Modern Data Stack Out Over Its Skis?
Input from theCUBE and data practitioner communities suggests that acceleration in compute performance and the sophistication of the modern data stack (MDS) is outpacing the needs of many traditional analytic workloads....more
In today's competitive manufacturing landscape, optimizing operational efficiency is crucial for success. Register
领英推荐
FOSS
White House And CISA Double Down On Securing Open Source Software: A New Era Of Vigilance
In April, the tech world faced a concerning incident involving XZ Utils, a widely used open-source compression tool....more
GNU Screen 5 Proves It's Still Got Game Even After 37 Years
GNU screen is included in most Linux distros, but newer, fancier tools such as tmux often outshine it....more
8 Best Free And Open Source Vulnerability Detection Tools
Security is paramount. Security involves defence in depth. Approaching security one step at a time, with consistency and rigour, you can mitigate threats, and keep intruders at bay....more
DR
CIO Lessons On Business Continuity After The Crowdstrike Outage
Checking the links between IT systems and reviewing business continuity plans can help CIOs stop the next major interruption before it happens....more
Networks
5G vs. WiFi 6: Which Technology Will Dominate in 2024?
In the rapidly changing arena of connectivity, there are two emerging technologies standing in the foreground. Assuring high-end performance with a better user experience, the question lingers as to which technology is going to rule the connectivity market in the year 2024....more
6 Ways AI Could Improve Network Management
Network managers and networking equipment vendors are looking to artificial intelligence (AI) and generative AI (GenAI) to help improve and simplify the management of their networking devices....more
SD-WAN: The Evolution Continues
We go through the alphabet soup of secure networks, propelled by artificial intelligence and 5G, which have rejuvenated software-defined wide area network technology...more
Wireshark 4.4 Boosts Network Protocol Visibility
The creator of the popular open-source network protocol analyzer talks about what's new in Wireshark 4.4, how governance has changed, and what to expect next....more
In this webcast, James Tarala, Senior Faculty at the SANS Institute and Managing Partner at Cyverity, will explain the state of cybersecurity standards in 2024 with a scorecard comparison of popular standards based on specific, measurable research. RegisterDeveloper
Top API Risks And How To Mitigate Them
While APIs play an essential role in most modern business strategies, they can also introduce serious security threats. Learn some of the top API risks and how to mitigate them....more
Top Programming Trends To Follow In 2025
Programming is going to be one of the fields that will face the fastest evolution in 2025 due to emerging technologies, changing industrial demands, and advancement in computing power....more
Shell Scripting Is Still Relevant! 7 Reasons To Learn Bash Scripting
Shell scripting is a lot more powerful than many people realize. With the right commands, shell scripting can automate many tasks and even make life easier for the user. Here's why you shouldn't sleep on bash scripting and why it's worth learning....more
Cisco News
Cisco Networking Academy Unveils New Unified Teaching And Learning Experience On Netacad.Com
Cisco Networking Academy continues to innovate across our platform and curriculum to ensure learners and instructors have access to best-in-class IT education content and experiences....more
Leveraging Threat Intelligence In Cisco Secure Network Analytics
Cisco Secure Network Analytics provides pervasive network visibility and security analytics for advanced protection across the extended network and cloud....more
The Future Of Cybersecurity: AI Does Play A Role
Karissa will present on Cisco Networking Academy's Women Rock-IT webinar series in October, during cybersecurity awareness month....more
In this webcast, James Tarala, Senior Faculty at the SANS Institute and Managing Partner at Cyverity, will explain the state of cybersecurity standards in 2024 with a scorecard comparison of popular standards based on specific, measurable research. RegisterFortinet News
Emansrepo Stealer: Multi-Vector Attack Chains
In August 2024, FortiGuard Labs observed a python infostealer we call Emansrepo that is distributed via emails that include fake purchase orders and invoices....more
Threat Actors Exploit GeoServer Vulnerability CVE-2024-36401
GeoServer is an open-source software server written in Java that allows users to share and edit geospatial data. It is the reference implementation of the Open Geospatial Consortium (OGC) Web Feature Service (WFS) and Web Coverage Service (WCS) standards....more
Red Hat News
Sharing is caring: How to make the most of your GPUs part 2 - Multi-instance GPU
In the part one about fractional GPUs, we talked about time slicing as "carpooling" for your GPU - getting more people (processes) into the same car (GPU) to use it more efficiently....more
Understanding Open Source Software In 2024
What we today call open source was originally called 'Free Software.' The word 'free' wasn't meant to refer to the price of the software, but to independence and liberty from corporate control....more
In this 90-minute workshop, we'll focus on how identity and entitlements management applies to cloud environments and its place in a holistic security strategy. Register
CxO Events
Gartner: The Most Impactful Emerging Technologies for 2025 (Sept. 16th)
Find out which technologies are considered fast movers, fast followers, majority followers or laggards in their respective markets. You will walk away from this session with answers to your vital questions, a copy of the research slides and recommended actions to help you achieve your goals....more
TDWI: Data Monitoring, Management, and Observability - Results of New TDWI Best Practices Research (Sept. 16th)
Join TDWI's VP of Research, Fern Halper, as she explores the results of TDWI's latest research and moderates a panel of experts discussing data monitoring, management, and observability....more
IDC: Technical Debt: It's Not a Curse Word, but a Strategic Asset (Sept. 18th)
In this webcast, James Tarala, Senior Faculty at the SANS Institute and Managing Partner at Cyverity, will explain the state of cybersecurity standards in 2024 with a scorecard comparison of popular standards based on specific, measurable research....more
NETWORKComputing: How to Make Network Management Easier in 2024-25 (Sept. 19th)
In this event, learn what tools, technologies, techniques, and skills can help your team bear the weight of these demands....more
We feel that there has been a shift with a desire to build more effective relationships with supervisors, managers, and senior leaders, as well as with colleagues, clients, and strategic partnerships.
Join us for 2025 Budget Planning Guides LIVE: Technology And Security Webinar. Explore guidance and benchmarks on where to increase, decrease, and experiment with technology and security budgets. Register
Is your security team overwhelmed by an endless security backlog? Have you ever questioned why a developer left their AWS credentials in their code? Do you wish you had a way to multiply your security team? Register