Security, CxO Security Events, HPC, DR, Email, Developer, Dell, Fortinet (291.4.5)
John J. McLaughlin
Editor-In-Chief, Board Member, Professional Services Engineer, Community leader
Each week I select 80-110 items from mainstream IT publications and publish them on the website for “IT News and Events.” I also select?press releases and blog posts?from various mainstream IT vendors. Vendors can engage with [email protected] to have their own section in this and other ITNE newsletters which reach over 45,000 subscribers including the 5,250+ subscribers to the LinkedIN edition.
Tuesday, July 12th, 2022: 3:00 PM to 4:00 PM EDT
It might not be the most exciting responsibility, but the value of a well-executed patch management strategy can't be denied. Use these best practices to build a smooth process.
Enterprise patch management requires the right balance of preparation, speed and agility. Without the proper processes and tools at the ready, patch updates can quickly fall behind. And failing to stay on top of patching can result in unnecessary exposure to security breaches or inoperable systems, applications and service ...?more
Last year, cybercrimes were fueled by the COVID19 pandemic after the sudden shift to work from home and hybrid working culture.
As more workers started working from home and preferred to work remotely, businesses became more vulnerable to ransomware attacks. In the coming years we can expect more of the same and much more devastating cyberattacks to keep an eye on...?more
Experts tell teams to prepare for more regulation, platform consolidation, management scrutiny, and attackers with the ability to claim human casualties.
Security teams should prepare for what researchers say will be a challenging environment through 2023, with increased pressure from government regulators, partners, and threat actors ...?more
Cybercriminals continue to launch creative social engineering attacks to trick users. Meanwhile, social engineering misconceptions are exacerbating the risks of falling victim.
Social engineering is involved in the vast majority of cyberattacks, but a new report from Proofpoint has revealed five common social engineering assumptions that are not only wrong but are repeatedly subverted by malicious actors in their attacks...?more
Data is everywhere and anywhere, and as a result, data management is out of control
Once a user or customer has signed up for a service or purchased a product, they usually have no idea about where their data is being stored, with whom it is shared or how it is secured. The adoption of cloud services - while very beneficial in many ways - have made it nearly impossible for companies to have 100% control and knowledge about what is happening to data, where and at what time. The situation is even fuzzier in places where data is being stored and processed in several countries ...?more
Here's an interesting fact, according to Cisco's Annual Internet Report (2018-2023) White Paper, over two-thirds of the world's population will have internet access by next year.
By 2023, the overall number of internet users would have increased to 5.3 billion (66 percent of the global population), up from 3.9 billion (51 percent of the global population) in 2018. With the rise in internet usage, the need to protect sensitive data across industries has never been more important, especially in light of recent global events that have resulted in an increase in data breaches...?more
Over the last few months, it's become apparent that a fair amount of employees aren't ever returning to the office full time. Some may continue to work from home full time, but some may come into the office a couple of days a week.
Hybrid work is the new norm, but to successfully adopt this type of flexible work arrangement, organizations need to extend security to employees no matter where they're working ...?more
Discover, design, validate, promote, and sustain best practice cyber protection solutions to safeguard your people and processes.
As the cyber attack surface expands, the Center for Internet Security (CIS) has developed a comprehensive list of critical security controls (CSC) to identify gaps in your company's cyber defense strategy and security frameworks ...?more
Our best-in-class keynotes, conversations, and workshops give you insight into how leaders in every field approach their toughest problems. You'll leave prepared with game-plans for the biggest market shifts, and ready for the future of work.
How Should We Anticipate Unknown Threats? Creating a Proactive Organization for Swift Response...?more
Attend this complimentary virtual event on July 19th and you'll: ; Learn about the latest technologies that are revolutionizing identity governance and access management ; Get practical tips for overcoming obstacles to innovation ; Explore the state of Making Multi-factor Authentication (MFA) and how to speed up adoption and Understand the basics on machine identities and where they fit in your IAM strategy ...?more
Attend this webinar and you'll: Join a nuanced discussion about when to move to the edge versus the cloud. ; Learn tips for how to manage specific security challenges of edge computing. ; Explore how to securely build out the edge from the start and prepare the environment to manage expanding workloads and new applications. and Find out how to manage and secure an exploding number of devices on the edge ...?more
领英推荐
Jupiter, Europe's first exascale supercomputer, looks like it could be using NVMe SSDs, disk, IBM's Spectrum Scale parallel file system, TSM backup, and LTO tape for its storage infrastructure.
Jupiter stands for 'Joint Undertaking Pioneer for Innovative and Transformative Exascale Research'...?more
We have seen a spate of cloud service provider outages with overly negative economic impact.
The AWS outage in December 2021 disrupted Disney+, Ticketmaster, Slack and Netflix, among a host of others. The Facebook (now Meta) outage in October 2021 was particularly painful. It not only took down WhatsApp and Messenger, but also the livelihood of many small businesses in the developing world. Their services were down for almost six hours because of their dependency on Facebook as an authentication service and WhatsApp and Messenger for order-taking services...?more
In an era of increasingly dispersed workforces, CIOs are grappling with how to help IT staff in peril - and keep the business moving forward when events disrupt employees' ability to work.
Paul Wright is dealing with management dynamics that, although outside the usual realm of technology leadership, are nonetheless confronting CIOs more often ...?more
There's been an astounding 84% increase in business email compromise (BEC) attacks, according to the latest NordLocker Email Threat Report, which compared half-yearly statistics.
The news should be particularly alarming to organizations that use email services as their main means of internal communication or correspondence with their partners and clients...?more
Phishing and malware distribution on the rise, Trend Micro warns
The number of security threats coming through email is growing once again, according to new research from Trend Micro ...?more
The Agile methodology originated in software development but has since spread to many other areas of business due to its effectiveness.
The Agile methodology originated in software development but has since spread to many other areas of business due to its effectiveness. The Agile methodology eschews big product launches in favor of smaller, more incremental goals. In Agile development, teams constantly evaluate their tasks and processes so they can continually improve their products and performance...?more
Micron Technology, Inc. announced the world's highest-capacity microSD card with an extraordinary density of 1.5 terabytes (TB) at the Embedded World 2022 conference in Nuremberg, Germany.
Micron's new i400 is the world's first microSD card to use 176-layer 3D NAND storage technology with a focus on performance and endurance. It is specifically designed for edge storage applications with a focus on handling tasks like continuous high-quality video recording and multiple AI (artificial intelligence) capture events concurrently ...?more
The Agile methodology first emerged decades ago, and it's since become one of the foremost approaches to software development.
Today, 'agile' has become a buzzword that appears in many industry discussions with little explanation, making it easy to recognize the phrase but not its meaning. So, what is agile development, and why should software developers understand it?...?more
The open web application security project (OWASP) recently updated its top 10 list of the most critical security risks to web applications after four years. It represents the most radical shake-up since the list was introduced in 2003
The changes will undoubtedly have a big impact on how businesses address application security going forward and how developers and DevOps teams approach their jobs. This article will look at three of the most significant changes that have emerged in the new top 10 list....?more
Discover where AIOps integration with other IT management applications is heading.
AIOps applications are a hot topic, and their ability to integrate with other tools in the IT management ecosystem has big implications about how to step-up daily operations productivity ...?more
Digital, Cyber and Workforce Resiliency. How you can be certain your organization has all three components present.
Global events and conditions over the past two years have increased awareness of the need for organizations to be prepared. In their May 2021 study, McKinsey & Company clearly expressed that the speed and uncertainty of change requires companies build long-term plans to withstand the threat of disruption in order come out stronger. That summarizes the critical need for business resiliency toda ...?more
While the global cybersecurity skills gap has seen a slight improvement the past two years, the cyber workforce still needs to grow 65% to effectively defend organizations' critical assets.
Additionally, a Fortinet report found that 80% of breaches could be attributed to a lack of cyber skills or awareness. As a result, the talent shortage is a top concern for organizations that are looking for ways to increase their employees' cyber skillsets ...?more
Digital acceleration-specifically, those efforts to ensure that today's distributed workforce has access to business-critical applications and resources-has led some to ask whether 'the network' is dead.
Or, at a minimum, has been diminished in its importance. What seems to escape those asking such questions is that networks are everywhere. For offices, today's hybrid workforce divides their time between traditional on-premises networks and home offices. And there are plenty of industries, from healthcare to manufacturing, where there is no such thing as 'work from anywhere.' ...?more
Securing traffic at today's internet edge is not easy. Enterprise branches and campuses now access the internet directly, multiplying the amount of vulnerable network edges that must be managed and secured.
Making the task even more difficult is that 95% of internet edge traffic is also encrypted, rendering legacy solutions obsolete as they are unable to provide the level of inspection needed without crippling network performance...?more
Around the world, the way people work is changing dramatically. Increasingly, enterprises in a wide range of sectors recognize the advantages of hybrid working, a model where employees divide their working week between the home office and corporate facilities.
Hybrid working offers a wide range of benefits to enterprises and employees alike such as a happier, more engaged workforce and the ability to reduce the cost of running an office ...?more