Security, CxO Events, CxO Podcasts, Technology, Operations, Cloud, Backup, Marketing, Cisco, IBM, Red Hat (296.4.Friday)

Security, CxO Events, CxO Podcasts, Technology, Operations, Cloud, Backup, Marketing, Cisco, IBM, Red Hat (296.4.Friday)

No alt text provided for this image
Joohn J. McLaughlin

Security

CxO Events

CxO Podcasts

Technology

Operations

Cloud

Backup

Marketing

Cisco News

IBM News

Red Hat News

No alt text provided for this image
Smart City Expo Miami - SUSTAINABLE is the NEW SMART (Dec 12-14)

Security

5 Top Endpoint Detection And Response (EDR) Trends In 2022

Endpoint detection and response (EDR) is such a battleground between security vendors that it has spawned a whole collection of additional terms as they seek to differentiate their wares or put a new wrapper around existing products and services.

XDR and managed detection and response (MDR) are two of the most prominent. No doubt a few more will appear soon. But regardless of the label, the goal is to protect endpoints from attack, detect breaches, and response via various remediation actions. Here are some of the top trends in EDR: ...?more

What is Security Service Edge(SSE) and How Does It Help to Achieve secure Access Security Edge (SASE) ?

Every technology has its downside. Likewise, internet use also has its drawback of cyber threats, which we already know.

All the companies are struggling to secure their virtual assets from cyber-attacks to run a successful business. But the threat possibilities are worsening with new concepts like working from remote locations and cloud computing ...?more

5 Free Resources From The Cybersecurity And Infrastructure Security Agency (CISA)

To assist businesses in enhancing their security capabilities, CISA offers free cybersecurity products and services.

The Cybersecurity and Infrastructure Security Agency (CISA) is an agency of the United States Department of Homeland Security. CISA is in charge of enhancing cybersecurity and infrastructure protection at all levels of government, coordinating cybersecurity initiatives with American U.S. states, and enhancing defenses against cyberattack ...?more

Why Endpoint Security Will Be A Renewed Priority For Businesses Of All Sizes In 2023

A recent spate of high-profile security breaches at some of the largest enterprises in Australia has reminded everyone of the importance of security.

Cyber crime is estimated to cost the Australian economy around $42 billion per year, and that number is only increasing. The biggest challenge when it comes to cyber crime is that there are so many different security risks to manage. Three of the biggest risks moving into 2023 and beyond are: ...?more

No alt text provided for this image
Thursday, January 13th, 2022: 1:00 PM to 3:00 PM

CxO Events

IIOT World Manufacturing & Supply Chain Days (Dec. 7-8th)

IIoT World Manufacturing & Supply Chain Days will bring together Industrial IoT (IIoT) subject matters experts from all over the world to share insights on IIoT & AI technologies applied in the Manufacturing Industry and Supply Chain.

Some of the topics to be discussed are:

  • Digital Transformation trends for Manufacturing & Supply Chain;
  • Data Management in Supply Chain;
  • Cybersecurity Risks in Manufacturing Supply Chains;

The content is targeted to CxOs, executives, as well as technology-oriented executives, engineers, IT/OT professionals. ...?more

DARKReading: Cloud Security Essentials (Dec. 7th)

During this webinar you will: Find out how to put together a secure hybrid cloud strategy; Understand how remote workers can help or hurt the organization's overall security posture.

The pandemic accelerated cloud technology adoption to better support and streamline remote workers, but going to the cloud is not just a set-it-and-forget-it strategy for security. The potential attack surface actually expands with the cloud, and without the proper controls and management of cloud-based assets, your organization could be at risk of cyberattacks. In this webinar, you will learn how to stay on top of your organization's multiple online accounts across multiple cloud services, to properly configure cloud security controls for the best security posture, and how to manage, maintain, and adjust security across cloud services and assets.

Hosted by DARKReading ...?more

DevOps.com: Digital Transformation (Dec. 12th)

Making speed a priority in software development and delivery is essential in today's digital economy. Both consumers and internal employees now expect their applications to not just be fast, but to also provide continuously updated application experiences.

Best DevOps practices are, of course, at the core of achieving that goal. The challenge now is implementing those best practices at the level of scale required to drive a rapidly expanding digital economy.

Hosted by DevOps ...?more

AngelBeat: AWS Technology & Solutions - Re:Invent Re:Cap & Highlights (Dec. 13th)

Cloud, AI, DevOps, Security, Kubernetes, Serverless, Data Analytics and more, on the AWS Platform, is the focus of this Tuesday, December 13, Webinar. This is a great opportunity to get a focused, concise and highly relevant 're:Cap' from the AWS re:Invent global summit, held just a few weeks earlier.

See the website for speakers and schedule; click on name and subject for more information. The program starts at 1 PM ET, 10 AM PT. Three (3) CPE credit hours are provided. There is a $100 gift card raffle at the end. It will be well worth a few hours out of your day.

Hosted by Angelbeat ...?more

No alt text provided for this image
DARKReading: Cloud Security Essentials (Dec. 7th)

CxO Podcasts

Business Transformation: How To Become An AI Company?

On this episode of CXOTalk, Dr. Karim R. Lakhani from the Harvard Business School explains how established organizations can develop the enterprise AI strategy and capabilities needed to transform and compete in a cloud-based world.

Dr. Lakhani is the co-founder and chair of the Digital, Data & Design (D^3) Institute at Harvard, founder and co-director of the Laboratory for Innovation Science at Harvard, and the principal investigator of the NASA Tournament Laboratory. He is also the co-founder & co-chair of the Harvard Business Analytics Program, a university-wide online program transforming executives into data-savvy leaders. ...?more

CIO Leadership Live with Dan West, CDIO of Health and Social Care in Northern Ireland

Dan West, Chief Digital Information Officer (CDIO) for Health and Social Care in Northern Ireland, discusses health and social care reform, innovating through uncertainty, and balancing transformation with business-as-usual.

Speaking to CIO UK editor Doug Drinkwater, he also reveals how digital is improving operational efficiency and patient experiences, and the challenges that lie ahead through Covid-19, political instability, and the cost-of-living crisis. ...?more

No alt text provided for this image
CIO/CSO: Understanding Cyber Attackers And Their Methods (Dec. 7th)

Technology

SC22 Provides Glimpse Into Tomorrow's Data Center

I had the privilege of attending SC22, the supercomputing conference, on November 13-18, 2022, in Dallas, TX.

Supercomputing centers are early adopters of technologies that will soon be common in most data centers. Thus, the sessions I attended, the attendees I spoke with, and the solutions on display in the exhibit hall provided me with an eye-opening glimpse into tomorrow's data center...?more

Operations

Modular Data Centers: Practical Use Cases For Your Enterprise

This booming sector of the data center industry can address the challenges faced by traditional builds.

Modular data centers are an increasingly growing sector. The global modular data center market was valued at $21.3 billion in 2021 and is projected to reach $52.4 billion by 2027, according to Research and Market ...?more

5 Considerations For Choosing The Right Data Center

Data centers are becoming more important than ever, so it is important to choose a dependable data center provider for your business.

We have talked extensively about the benefits of data centers in the past. We mentioned that they are valuable for ecommerce businesses and many other sectors. However, many companies still don't know how to choose them ...?more

No alt text provided for this image
DevOps.com: Digital Transformation (Dec. 12th)

Cloud

Achieve Defense-In-Depth In Multi-Cloud Environments

Today, 90% of organizations are operating in hybrid and multi-cloud environments-a number that has increased over the past two years due to the acceleration of digital transformation efforts required to support a hybrid workforce.

While this flexibility and agility enable the remote workforce and faster application delivery, the proliferation of multiple parallel infrastructures has also created new challenges for CISOs and CIOs. Whether an organization's data lives on-premises or in the cloud, there are security and monitoring challenges that come with this added complexity. ...?more

Cloud Storage: Key Storage Specifications

We look at the key specs in cloud storage, including availability - such as five nines - bandwidth, IOPS and latency, capacity and tiering functionality, egress charges and security

Enterprise cloud storage is more flexible and offers more features and performance than ever. Even among the three main cloud services - Google Cloud Platform, Amazon Web Services and Microsoft Azure - there is now a comprehensive range of capacity, availability, performance and security options ...?more

Security Incident Response In The Cloud: A Few Ideas

This quick blog is essentially a summary of our (joint with Marshall from Mandiant) Google Cloud Next 2022 conference presentation (video) and a pointer to a just-released podcast on the same topic - security incident response (IR) in public cloud.

In our Next presentation, we only had 18.5 minutes to present a few fun and insightful things about security incident response in the cloud...?more

Breaking Analysis: Re:Invent 2022 Marks The Next Chapter In Data & Cloud

The ascendency of AWS under the leadership of Andy Jassy was marked by a tsunami of data and corresponding cloud services to leverage data.

Those services mainly came in the form of primitives - i.e. basic building blocks that were used by developers to create more sophisticated capabilities...?more

No alt text provided for this image
AngelBeat: AWS Technology & Solutions - Re:Invent Re:Cap & Highlights (Dec. 13th)

Backup

Data Management, Backup Becoming The CISO's' Responsibility

More and more CISOs are taking on responsibility for wider data management strategies, and this trend looks set to grow next year

While data management strategies, including disaster recovery and backup, have historically tended to be the domain of the chief technology officer (CTO) and IT teams, some of these functions are becoming the domain of the chief information security officer (CISO) and cyber security teams, a trend that is likely to accelerate during the coming months ...?more

Marketing

7 Reasons Why You Should Outsource Content Creation

Content creation is an important part of marketing for technology companies. With longer buyer journeys than most B2B products, the need for educating those buyers with helpful content is more important than ever

While the need for content in technology companies is great, your time and budgets are under increasing pressure. Additionally, hiring for industry expertise and content writing skills don't often go together ...?more

No alt text provided for this image
DARKReading: Security Considerations for Working with Cloud Services Providers (Dec. 14th)

Cisco News

Adapt And Overcome: What The Story Of The Tardigrade Can Teach Us About Resilience

When you think about the most resilient creatures in the animal kingdom, what comes to mind?

Perhaps the camel, which can survive for 6 months with no food or water. Or maybe it's the honey badger, which tends to drink snake venom like cranberry juice ...?more

Black Belt Academy Updates Content For Stages 1, 2, And 3

The Cisco Black Belt Academy is a simplified enablement framework consisting of carefully curated content.

Allowing Cisco Partners to enhance their competitive advantage, the Cisco Black Belt Academy gives Cisco Partners the opportunity to learn more about the broad spectrum of Cisco ecosystem solutions, engage more confidently with customers, and ultimately execute sales....?more

No alt text provided for this image
BWGStrategy: Future Healthcare Trends for 2023 (Dec. 13th)

IBM News

You Have Thanksgiving Turkey To Thank For LASIK

In November 1981, a group of IBM researchers found that it was possible to use lasers to safely cut into living tissue. Thanks to some leftover turkey, we now have corrective surgeries like LASIK.

The Thanksgiving dinner table isn't the most common place to be inspired to invent. All the turkey and sides might make most people think about dozing off rather than coming up with ways to change the lives of millions of people around the world...?more

Red Hat News

Red Hat OpenShift: How To Create And Integrate A Private Registry With Stronger Security Capabilities

A private registry can be useful for storing Linux container images for your applications in an internal, controlled (and potentially more secure) infrastructure.

Linux containers are technologies that allow you to package and isolate applications with their entire runtime environment-all of the files-necessary to run. This makes it easy to move the contained application between environments (dev, test, production, etc.) ...?more

Friday Five - November 25, 2022

The Friday Five is a weekly Red Hat blog post with 5 of the week's top news items and ideas from or about Red Hat and the technology industry. Consider it your weekly digest of things that caught our eye.

  • Code Comments Episode 2: Rethinking Networks In Telecommunications
  • The New Stack - Red Hat Helps Make Kubernetes Security More Accessible
  • ZDNet - Say hello to Red Hat Enterprise Linux 9.1
  • Enterprise Talk - Leveraging Open Source Technology to Drive Digital Transformation
  • How we use Red Hat Insights to build better products

...?more

Red Hat Shares - Edge Computing For 5G And Telecommunications

The Red Hat Shares newsletter helps IT leaders navigate the complicated world of IT―the open source way.

Why telcos are prioritizing edge computing

A recent Research and Markets report by Grand View Research states, 'the telecom edge is estimated to grow exponentially' by 2030. Many telecommunications service providers are making edge computing―moving workloads and services from the core toward the edge of the network, where data is used - a priority as they modernize existing infrastructure and seek new revenue streams. ...?more

You Asked. We Acted: Three Ways To Ensure Customer Experience Success In 2023

The time for annual planning has arrived, and my team has been much like many other organizations over the past several weeks - fully heads down in planning.

While we have been thinking ahead to our priorities for next year, we have also been taking time to reflect on how we helped to improve our customers' and partners' experience this year....?more

No alt text provided for this image

要查看或添加评论,请登录

John J. McLaughlin的更多文章

社区洞察

其他会员也浏览了