Security, Operations, Encryption, Fortinet, CxO Events (322.1.5) Wednesday AM
John J. McLaughlin
Editor-In-Chief, Board Member, Professional Services Engineer, Community leader
Security
Operations
Encryption
Fortinet News
CxO Events
Security
Cybersecurity Resolutions For 2025: Prepare Your Business For What's Ahead
It's time to reflect on the cybersecurity challenges of 2024 and prepare for what lies ahead....more
Ransomware 2024: A Year Of Tricks, Traps, Wins And Losses
Ransomware criminals in 2024 stooped to new lows and high-level black hat trade craft. Targets included critical industries such as healthcare, public infrastructure, and the cloud....more
Stay Assured: Critical Insights Into Secrets Rotation
Isn't it intriguing how an object as intangible as 'information' can hold immense value in today's digitally connected world? In the realm of cybersecurity, Secrets Rotation plays a key role in safeguarding this valuable asset....more
Anomaly Detection For Cybersecurity
I won't revisit the arguments for anomaly detection as a crucial piece of cybersecurity. We've seen waves of anomaly detection over the years?-?and CISA, DARPA, Gartner, and others have explained the value of anomaly detection....more
Freedom In Cybersecurity: Keys To Unlock Potential
As we navigate the complex world of cybersecurity, are we leveraging the full potential of Non-Human Identity (NHI) management?...more
Operations
Stay Ahead With Proactive Machine Identity Management
Why is Proactive Machine Identity Management Essential?...more
What Security Lessons Did We Learn In 2024?
Proactive defenses, cross-sector collaboration, and resilience are key to combating increasingly sophisticated threats....more
DORA Regulation (Digital Operational Resilience Act): A Threat Intelligence Perspective
What is DORA (Digital Operational Resilience Act)?...more
Best Of 2024: GenAI To Spur Data Center Growth To $317 Billion By 2026
Generative AI and IoT will power the global data center market to $317 billion by 2026, more than twice its size in 2020....more
Encryption
How Secret Management Delivers True Business Value
How Do Non-Human Identities Impact Secret Management?...more
领英推荐
Encryption Backdoor Debate 'Done And Dusted,' Former White House Tech Advisor Says
When the FBI urges E2EE, you know it's serious business...more
Key Trends For 2025 Part I: Postquantum Cryptography
In 2025, postquantum cryptography (PQC) will drive major transformations in the PKI space, with announcements of PQC capabilities, adoption of quantum-safe Hardware Security Modules (HSMs), and standardized PQC algorithms in private PKI. Organizations must adapt early to safeguard sensitive data and stay ahead of emerging quantum threats....more
Fortinet News
Catching 'EC2 Grouper' - No Indicators Required!
Through the years of analyzing identity compromises in the cloud, we've seen the same attackers pop up regularly, some more frequently than others....more
CxO Events
Predict 2025 (January 9th)
Get ready to step into the future at Predict 2025, the premier virtual event that takes you beyond the buzzwords to explore the next big shifts in technology and business....more
The 14 Power Skills You Need to Shape a Culture of Excellence (Jan. 10th)
Power skills are the basis for strong leadership and influence across the C-suite and your team. The Gartner 14 Power Skills are a proven set of leadership competencies that enhance the impact that leaders, like you, can have in their organizations....more
A Deep Look at New Memories (Jan. 28th)
New Memories like MRAM, ReRAM, PCM, or FRAM are vying to replace embedded flash and, eventually, even embedded SRAM. Are there other memory technologies threatened with similar fates? What will the memory market look like in another 20 years?...more
Upcoming Webinars - Jan 9th to Jan 16th
Thursday, Jan 9, 2025 ET
Friday, Jan 10, 2025 ET
Monday, Jan 13, 2025 ET
Tuesday, Jan 14, 2025 ET
Wednesday, Jan 15, 2025 ET
Thursday, Jan 16, 2025 ET
ABOUT THIS NEWSLETTER SERVICE
"Enterprise IT News and Events" is a weekly curation of Enterprise IT News and Events articles from a wide range of Industry publications and Vendors. Insights, Best Practices, Webinars, Strategy, Humor, Guidelines, Podcasts, Technology, Leadership, IT Security, Analysis, Operations, Reviews, Trends, etc.