Security, CxO Events, CxO Podcasts, Technology, Operations, Cloud, Backup, Marketing, Cisco, IBM, Red Hat (296.4.Friday)
John J. McLaughlin
Editor-In-Chief, Board Member, Professional Services Engineer, Community leader
Security
CxO Events
CxO Podcasts
Technology
Operations
Cloud
Backup
Marketing
Cisco News
IBM News
Red Hat News
Security
Endpoint detection and response (EDR) is such a battleground between security vendors that it has spawned a whole collection of additional terms as they seek to differentiate their wares or put a new wrapper around existing products and services.
XDR and managed detection and response (MDR) are two of the most prominent. No doubt a few more will appear soon. But regardless of the label, the goal is to protect endpoints from attack, detect breaches, and response via various remediation actions. Here are some of the top trends in EDR: ...?more
Every technology has its downside. Likewise, internet use also has its drawback of cyber threats, which we already know.
All the companies are struggling to secure their virtual assets from cyber-attacks to run a successful business. But the threat possibilities are worsening with new concepts like working from remote locations and cloud computing ...?more
To assist businesses in enhancing their security capabilities, CISA offers free cybersecurity products and services.
The Cybersecurity and Infrastructure Security Agency (CISA) is an agency of the United States Department of Homeland Security. CISA is in charge of enhancing cybersecurity and infrastructure protection at all levels of government, coordinating cybersecurity initiatives with American U.S. states, and enhancing defenses against cyberattack ...?more
A recent spate of high-profile security breaches at some of the largest enterprises in Australia has reminded everyone of the importance of security.
Cyber crime is estimated to cost the Australian economy around $42 billion per year, and that number is only increasing. The biggest challenge when it comes to cyber crime is that there are so many different security risks to manage. Three of the biggest risks moving into 2023 and beyond are: ...?more
CxO Events
IIoT World Manufacturing & Supply Chain Days will bring together Industrial IoT (IIoT) subject matters experts from all over the world to share insights on IIoT & AI technologies applied in the Manufacturing Industry and Supply Chain.
Some of the topics to be discussed are:
The content is targeted to CxOs, executives, as well as technology-oriented executives, engineers, IT/OT professionals. ...?more
During this webinar you will: Find out how to put together a secure hybrid cloud strategy; Understand how remote workers can help or hurt the organization's overall security posture.
The pandemic accelerated cloud technology adoption to better support and streamline remote workers, but going to the cloud is not just a set-it-and-forget-it strategy for security. The potential attack surface actually expands with the cloud, and without the proper controls and management of cloud-based assets, your organization could be at risk of cyberattacks. In this webinar, you will learn how to stay on top of your organization's multiple online accounts across multiple cloud services, to properly configure cloud security controls for the best security posture, and how to manage, maintain, and adjust security across cloud services and assets.
Hosted by DARKReading ...?more
Making speed a priority in software development and delivery is essential in today's digital economy. Both consumers and internal employees now expect their applications to not just be fast, but to also provide continuously updated application experiences.
Best DevOps practices are, of course, at the core of achieving that goal. The challenge now is implementing those best practices at the level of scale required to drive a rapidly expanding digital economy.
Hosted by DevOps ...?more
Cloud, AI, DevOps, Security, Kubernetes, Serverless, Data Analytics and more, on the AWS Platform, is the focus of this Tuesday, December 13, Webinar. This is a great opportunity to get a focused, concise and highly relevant 're:Cap' from the AWS re:Invent global summit, held just a few weeks earlier.
See the website for speakers and schedule; click on name and subject for more information. The program starts at 1 PM ET, 10 AM PT. Three (3) CPE credit hours are provided. There is a $100 gift card raffle at the end. It will be well worth a few hours out of your day.
Hosted by Angelbeat ...?more
CxO Podcasts
On this episode of CXOTalk, Dr. Karim R. Lakhani from the Harvard Business School explains how established organizations can develop the enterprise AI strategy and capabilities needed to transform and compete in a cloud-based world.
Dr. Lakhani is the co-founder and chair of the Digital, Data & Design (D^3) Institute at Harvard, founder and co-director of the Laboratory for Innovation Science at Harvard, and the principal investigator of the NASA Tournament Laboratory. He is also the co-founder & co-chair of the Harvard Business Analytics Program, a university-wide online program transforming executives into data-savvy leaders. ...?more
Dan West, Chief Digital Information Officer (CDIO) for Health and Social Care in Northern Ireland, discusses health and social care reform, innovating through uncertainty, and balancing transformation with business-as-usual.
Speaking to CIO UK editor Doug Drinkwater, he also reveals how digital is improving operational efficiency and patient experiences, and the challenges that lie ahead through Covid-19, political instability, and the cost-of-living crisis. ...?more
领英推荐
Technology
I had the privilege of attending SC22, the supercomputing conference, on November 13-18, 2022, in Dallas, TX.
Supercomputing centers are early adopters of technologies that will soon be common in most data centers. Thus, the sessions I attended, the attendees I spoke with, and the solutions on display in the exhibit hall provided me with an eye-opening glimpse into tomorrow's data center...?more
Operations
This booming sector of the data center industry can address the challenges faced by traditional builds.
Modular data centers are an increasingly growing sector. The global modular data center market was valued at $21.3 billion in 2021 and is projected to reach $52.4 billion by 2027, according to Research and Market ...?more
Data centers are becoming more important than ever, so it is important to choose a dependable data center provider for your business.
We have talked extensively about the benefits of data centers in the past. We mentioned that they are valuable for ecommerce businesses and many other sectors. However, many companies still don't know how to choose them ...?more
Cloud
Today, 90% of organizations are operating in hybrid and multi-cloud environments-a number that has increased over the past two years due to the acceleration of digital transformation efforts required to support a hybrid workforce.
While this flexibility and agility enable the remote workforce and faster application delivery, the proliferation of multiple parallel infrastructures has also created new challenges for CISOs and CIOs. Whether an organization's data lives on-premises or in the cloud, there are security and monitoring challenges that come with this added complexity. ...?more
We look at the key specs in cloud storage, including availability - such as five nines - bandwidth, IOPS and latency, capacity and tiering functionality, egress charges and security
Enterprise cloud storage is more flexible and offers more features and performance than ever. Even among the three main cloud services - Google Cloud Platform, Amazon Web Services and Microsoft Azure - there is now a comprehensive range of capacity, availability, performance and security options ...?more
This quick blog is essentially a summary of our (joint with Marshall from Mandiant) Google Cloud Next 2022 conference presentation (video) and a pointer to a just-released podcast on the same topic - security incident response (IR) in public cloud.
In our Next presentation, we only had 18.5 minutes to present a few fun and insightful things about security incident response in the cloud...?more
The ascendency of AWS under the leadership of Andy Jassy was marked by a tsunami of data and corresponding cloud services to leverage data.
Those services mainly came in the form of primitives - i.e. basic building blocks that were used by developers to create more sophisticated capabilities...?more
Backup
More and more CISOs are taking on responsibility for wider data management strategies, and this trend looks set to grow next year
While data management strategies, including disaster recovery and backup, have historically tended to be the domain of the chief technology officer (CTO) and IT teams, some of these functions are becoming the domain of the chief information security officer (CISO) and cyber security teams, a trend that is likely to accelerate during the coming months ...?more
Marketing
Content creation is an important part of marketing for technology companies. With longer buyer journeys than most B2B products, the need for educating those buyers with helpful content is more important than ever
While the need for content in technology companies is great, your time and budgets are under increasing pressure. Additionally, hiring for industry expertise and content writing skills don't often go together ...?more
Cisco News
When you think about the most resilient creatures in the animal kingdom, what comes to mind?
Perhaps the camel, which can survive for 6 months with no food or water. Or maybe it's the honey badger, which tends to drink snake venom like cranberry juice ...?more
The Cisco Black Belt Academy is a simplified enablement framework consisting of carefully curated content.
Allowing Cisco Partners to enhance their competitive advantage, the Cisco Black Belt Academy gives Cisco Partners the opportunity to learn more about the broad spectrum of Cisco ecosystem solutions, engage more confidently with customers, and ultimately execute sales....?more
IBM News
In November 1981, a group of IBM researchers found that it was possible to use lasers to safely cut into living tissue. Thanks to some leftover turkey, we now have corrective surgeries like LASIK.
The Thanksgiving dinner table isn't the most common place to be inspired to invent. All the turkey and sides might make most people think about dozing off rather than coming up with ways to change the lives of millions of people around the world...?more
Red Hat News
A private registry can be useful for storing Linux container images for your applications in an internal, controlled (and potentially more secure) infrastructure.
Linux containers are technologies that allow you to package and isolate applications with their entire runtime environment-all of the files-necessary to run. This makes it easy to move the contained application between environments (dev, test, production, etc.) ...?more
The Friday Five is a weekly Red Hat blog post with 5 of the week's top news items and ideas from or about Red Hat and the technology industry. Consider it your weekly digest of things that caught our eye.
...?more
The Red Hat Shares newsletter helps IT leaders navigate the complicated world of IT―the open source way.
Why telcos are prioritizing edge computing
A recent Research and Markets report by Grand View Research states, 'the telecom edge is estimated to grow exponentially' by 2030. Many telecommunications service providers are making edge computing―moving workloads and services from the core toward the edge of the network, where data is used - a priority as they modernize existing infrastructure and seek new revenue streams. ...?more
The time for annual planning has arrived, and my team has been much like many other organizations over the past several weeks - fully heads down in planning.
While we have been thinking ahead to our priorities for next year, we have also been taking time to reflect on how we helped to improve our customers' and partners' experience this year....?more