Security, Edge, Database, Virtualization, Encryption, Cisco, Red Hat, Webinars (323.2.8) Thursday PM
John J. McLaughlin
Editor-In-Chief, Board Member, Professional Services Engineer, Community leader
Security
Edge
Database
Virtualization
Encryption
Cisco News
Red Hat News
Security
Achieving Independent Control Over Cloud Data
Can organizations truly claim to have complete, independent control over their cloud data?...more
The Future Of AI Agent Authentication: Ensuring Security And Privacy In Autonomous Systems
Artificial intelligence is becoming increasingly autonomous, the need for robust authentication and security mechanisms for AI agents has never been more critical....more
What We Learned From Infiltrating 22 Credential Stuffing Crews
IT and security professionals are trained to look ahead - anticipating the next big attack vector, whether it's AI-powered malware or sophisticated zero-day exploits....more
Complexity: The Silent Killer Of Cybersecurity
The cybersecurity landscape is a complex and ever-evolving ecosystem. At its core lies a fundamental paradox: the more tools we deploy to protect our digital assets, the more complex and vulnerable our security posture becomes....more
Edge
How Edge AI Is Diving Telco Innovation & Competitive Advantage
Many telecom providers have buckled to the consumer pressure for more data, faster speeds and greater global coverage and reliability; carving into their margins....more
Edge Monster Predictions For 2025
As we look ahead to 2025, the Edge Monsters see a number of key themes emerging at the edge....more
Database
Making Sense Of Database Complexity
IT leaders are grappling with increasingly complex database environments. According to a new survey from Redgate, key concerns include protecting sensitive data, navigating regulatory compliance, and managing the rise of multi-database platforms....more
The When, Why & How In Switching To Open Source Databases
For well over a decade, enterprise adoption of open-source database technologies has been on a steady rise....more
Virtualization
Docker Security In 2025: Best Practices To Protect Your Containers From Cyberthreats
Docker has established itself as an essential pillar of software development. In 2024, more than 15 billion container images were downloaded on Docker Hub, in addition to 13 million developers using Docker all over the globe....more
领英推荐
Encryption
The UK's War On Encryption Affects All Of Us
The encryption wars have reached a fever pitch, and the most contentious battle is not happening in the United States, where much of the action has been in the past - like the government's efforts to restrict exports of encryption software until the 1990s and the FBI's standoff with Apple in 2016....more
What Is An Encryption Backdoor?
Talk of backdoors in encrypted services is once again doing the rounds after reports emerged that the U.K. government is seeking to force Apple to open up iCloud's end-to-end encrypted (E2EE) device backup offering....more
Cisco News
The Critical Role of CISOs in Managing IAM - Including Non-Human Identities
Who should own IAM in the enterprise? Identity and access management (IAM) started as an IT function, with the entire focus on giving human users the right access to the right systems....more
Cisco Embeds Security Services In New Line Of Programmable Switches
Cisco Systems Inc. today announced a family of data center switches that enable services to be embedded directly into the switching layer, beginning with security services....more
Cisco Integrates Security Into New Data Center Switches
The N9300 Series Smart Switches integrate AMD DPUs and Hypershield software, enabling built-in security at the switch level....more
Red Hat News
EPMS: The Cornerstone Of Cybersecurity In Defense Operations
In a landscape where cyber threats evolve daily, the Defense Information Systems Agency's (DISA) Enterprise Patch Management System (EPMS) plays a critical role in maintaining the cybersecurity of the Department of Defense (DoD)....more
Introducing RHEL AI 1.4: Powering the Next Wave of Generative AI Innovation
The field of generative AI (gen AI) is evolving rapidly, and Red Hat Enterprise Linux AI (RHEL AI) is at the forefront of this transformation. RHEL AI 1.4 introduces support for a new, powerful Granite 3.1 model with multi-language support and a larger context window....more
Virtualization In 2025 And Beyond
Looking back, every decade has brought a new wave of innovation based on unmet customer needs and technology advancements....more
Upcoming Webinars - March 6th to March 26th
Thursday, Mar 6, 2025 ET
Tuesday, Mar 11, 2025 ET
Wednesday, Mar 12, 2025 ET
Thursday, Mar 13, 2025 ET
Wednesday, Mar 26, 2025 ET
ABOUT THIS NEWSLETTER SERVICE
"Enterprise IT News and Events" is a weekly curation of Enterprise IT News and Events articles from a wide range of Industry publications and Vendors. Insights, Best Practices, Webinars, Strategy, Humor, Guidelines, Podcasts, Technology, Leadership, IT Security, Analysis, Operations, Reviews, Trends, etc.