Storage, Security, CxO Podcasts, Blockchain, Operations, DR, IoT, Email, Cisco, Dell, Fortinet (297.3.Thursday)

Storage, Security, CxO Podcasts, Blockchain, Operations, DR, IoT, Email, Cisco, Dell, Fortinet (297.3.Thursday)

Storage

Security

CxO Podcasts

Blockchain

Operations

DR

IoT

Email

Cisco News

Dell News

Fortinet News

No alt text provided for this image
DARKReading: A Roadmap to Zero Trust: Steps for Meaningful Progress Amongst the Hype (Feb. 1st)

Storage

5 Top Storage Hardware Predictions For 2023

Many of the predictions about the future of storage and data protection concern the cloud, software-defined architectures, different protocols, and the latest batch of fancy storage applications.

But underpinning it all is a hardware foundation without which none of it would be possible. Here are some of the top predictions for 2023 related to storage hardware:

1. Flash and Tape, Not Disk

2. Cost Optimization Drives On-Premises Storage

3. Object Storage Dominance

4. Tough Times for Appliances

5. Tape Cheaper Than Cloud? ...?more

The Future Of Data Storage Must Handle Heavy Volume

Storage manufacturers have an eye on the future with investments in technologies, but it's unclear if they will be able to effectively counter the exponential rise in data volumes.

We're drowning in data, and it continues to pour in from every front. So, where are we going to store it all? ...?more

5 Top Storage Software Predictions For 2023

There are countless storage, backup, and data protection applications currently in existence. With each passing month, more are released.

Occasionally, there is a groundbreaking software development that changes the face of storage. Perhaps the primary target of storage software application development right now, though, is managing and monitoring the cost of cloud storage...?more

No alt text provided for this image
Security Boulevard: Time to Cut the Cord: Four Easy Steps for Cloud-Native Firewall Migration (Jan. 26th)

Security

Moving Beyond Security Awareness To Security Education

Security awareness training should be part of every organization's cybersecurity program.

Employees can't prevent risk if they don't know what risk is. Even the most seasoned cybersecurity professional had to learn that you don't click the link in a random email! ...?more

Top 10 Data Center Security Stories Of 2022

A look at security news for data centers from physical security to ransomware to cybersecurity in 2022.

The past year seemed filled with sobering trends or warning signs for data center security providers, including news that cyberattackers were bypassing multi-factor authentication (MFA) security measures and that the National Institute of Standards and Technology (NIST) announced the winner of the six-year-competition to create quantum-safe algorithms ...?more

Google Outlines 6 Cybersecurity Predictions For 2023

It's no secret that cybercrime is a growth industry. Just last year, the FBI estimated that internet crime cost $6.9 billion.

The worse news is that Google's cybersecurity predictions for 2023 anticipate that this malicious economy will only continue to expand and diversify ...?more

Open Source Vulnerabilities Add To Security Debt

The number of open source vulnerabilities that Mend identified and added to its vulnerability database in the first nine months of 2022 was 33 percent greater than the first nine months of 2021, reflecting both the growth in the number of published open-source packages and the acceleration of vulnerabilities.

As businesses continue to heavily rely on their applications for success, this growing threat is a mounting concern.

The report's representative sampling through January to September 2022 of approximately 1,000 North American companies found that only 13 percent of vulnerabilities seen were remediated, compared with 40 percent remediated by those using modern application security best practices. ...?more

No alt text provided for this image
Security Boulevard: Botnets, DDoS and Deception: The 2023 API Threat Landscape (Jan. 25th)

CxO Podcasts

The Edge Is Real This Time

Edge computing is getting more real every day. What emerged as a viable architecture to support distributed computing has now taken center stage. So, as it stands now, how do we define edge?

What technologies make up the edge in 2022? Is it truly coming together as a computer paradigm or is it just another term that came out of the marketing mill to disappear tomorrow or be used for something else? ...?more

Enterprise IT In 2023 And Beyond

I spoke with a panel of top thought leaders about the future of enterprise tech in 2023 and the years ahead.

Among the topics we covered:

  • First, as you look at 2022, what was a big theme that shaped enterprise IT sector this year?
  • So let's look ahead: what's a key enterprise tech trend that you expect to grow in 2023?
  • Looking further ahead: What are some key enterprise IT milestones we can expect in a few/several years ahead?
  • Lastly, what about a trend in enterprise tech that companies aren't expecting? What should companies prepare for now that they aren't expecting?

(29:32) ...?more

What Is Employee Experience? (17:19)

How can companies create an intentional employee experience, which is genuinely part of the future of work? We talk with Workday's Ali Fuller, who explains.

Employee experience describes all the touch points and interactions that employees have with their organization and work environment. Although it includes the direct benefits employees receive, such as salary and health insurance, less tangible factors like the quality of relationships with coworkers and supervisors, are equally important.

(17:19) ...?more

Year In Review 2022 - Gestalt IT Rundown (43:36)

Join us for the Rundown of all our 2022 Rundowns!

We're looking at the big picture and linking the various stories throughout the year. See how things like DPU and ARM drove companies like AMD and Intel to make big moves in the industry. How did technologies like 5G and Quantum Computing impact the world? Are companies looking to move away from China's chipmaking dominance? Will hackers steal your info? Tune in for a super-sized Rundown of all these stories and more! ...?more

No alt text provided for this image
Enterprise Data Governance Online (Jan 25th)

Blockchain

23 Blockchain Predictions For 2023

Andrew Keys, of DARMA Capital, previews developments in zero-knowledge, Ethereum, NFTs, Filecoin, Cosmos, regulations, and much more.

Since 2016 I have ended each year with predictions for the blockchain ecosystem for the year ahead. 2022 has been one of the most tumultuous years in crypto, with a litany of decentralized and centralized entities already evaporated or on their last leg. It feels like we are in the final convulsions of a nascent ecosystem, expelling bad actors and bad practices in a dramatic but ultimately maturing process. Here's what we'll see on the other side. ...?more

No alt text provided for this image
DARKReading: The Craziest Cyberattacks Seen In the Wild and How You Can Avoid Them (Jan. 24th)

Operations

IT Operations And Management In 2022: Focus On Automation

The need to automate more was a prevailing IT operations and management theme in 2002, as were helping organizations better manage ITOps, DevOps, and clouds.

2022 was a busy year across all segments of the IT operations and management space ...?more

The State Of Operational Technology (OT) Security: A Rapidly Evolving Landscape

Security experts weigh in on how the OT security landscape has evolved over the last decade, and where it could be going next as threats continue to mount.

Operational technology powers some of the most critical equipment on the planet. Yet the cybersecurity that protects this technology is, for the most part, only about a decade old...?more

Three Steps Towards A More Secure Operational Technology (OT) Infrastructure

Years ago, the biggest concern from the plant floor was that an employee-made mistake would cause a problem that would halt production.

More recently, the increase in external cyberattacks has forced organizations to split focus, allocating resources towards both internal management and defense against external malicious actors ...?more

No alt text provided for this image
TechTalk: Virtual Southeast (Jan 18th)

DR

Why You Need To Consider Disaster Recovery-As-A-Service

Discover how DRaaS can simplify operations and minimize risk in a cost-effective, customizable, and scalable way.

In today's connected, always-on world, unplanned downtime caused by a disaster can exact substantial tolls on your business from a cost, productivity, and customer experience perspective. Investing in a robust disaster recovery program upfront can save considerable costs down the road...?more

IoT

4 Major Trends In IoT Analytics In 2023

From enhanced digital twin tech to the rise of computer vision, here are some key trends expected in the new year.

Over the years, analytics has become an integral part of IoT. Industrial organizations such as manufacturers, as well as transportation and energy companies, and governments worldwide, continue to embrace these technologies to enhance operational efficiency and enable significant cost and operational savings. ...?more

No alt text provided for this image
TechTalk: Analyst Series With IDC, East (Jan. 17th)

Email

Digital Transformation And The Evolving Role Of CIOs

What does digital transformation mean for the CIO? How has their role evolved through the three stages of transformation, and what does this mean for the future? Let's dive in.

Enterprises have been talking about digital transformation for quite a while. It's about rethinking how we use technology to drive new or improved strategy, people, and operations to meet changing business and customer needs. But what does digital transformation mean for the CIO? How has their role evolved through the three stages of transformation, and what does this mean for the future? Let's dive in. ...?more

What are RUA and RUF in DMARC?

DMARC, or Domain-based Messaging Authentication, Reporting, and Conformance is an effective email authentication system that protects against phishing attacks and detects fraud.

The protocol also offers domain insights and visibility using two reporting features: RUA and RUF...?more

Your Corporate Email System Is Under Attack: Here's How To Better Protect It

It's well known that email is one of the most important attack vectors for corporate systems, but how do you keep up with attack developments? Mike Puglia offers some advice.

Since email was first developed in 1971, it has become increasingly critical to business operations. Today, bad actors are utilising its importance to gain access to critical systems, compromise data and threaten organizational infrastructures...?more

No alt text provided for this image
DevOps: Mistakes to Avoid when Migrating Data and Applications Across Multi-Cloud (Jan 17th)

Cisco News

Top Five 2022 Highlights From Cisco IoT Industrial Networking

2022 has been a year of acceleration for digitization of physical infrastructure.

Industrial Internet of Things (IIoT) has helped our customers around the globe in transforming industries like manufacturing, ports, mining, transportation, utilities, and public sector. As we reflect on the last year, there's a lot to be proud of. Let's look at some key moments and see what we achieved together. ...?more

No alt text provided for this image
Security Boulevard: Best Practices to Secure Your Software Supply Chain (Jan. 12th)

Dell News

Avoiding Tech Support Warranty Scams This Holiday Season

The holidays are a time for friends and family, not fraud. Follow Dell's tips to avoid a tech support warranty scam this season.

The holiday season is often called the 'most wonderful time of year,' but it is also a time of increased scams. Fraud campaigns try to capitalize on the flurry of retail purchases, goodwill and general stress of the holidays to cash in...?more

Improving Sustainability With Ai And Making AI More Sustainable

AI helps organizations find ways to operate more sustainably, while technology advancements are reducing the energy required for AI.

Organizations across a wide range of industries are stepping up efforts to become more sustainable and energy efficient. Increasingly, artificial intelligence (AI) is becoming a trusted tool to help them accomplish those goals ...?more

Why Automated Discovery Changes the Game for NVMe/TCP

SmartFabric Storage Software (SFSS) removes the need for one-by-one configuration of each host interface to each storage interface.

Back in August, I wrote about how you can boost your workload performance with an NVMe IP SAN and how Dell Technologies helps simplify adoption by validating the components used within the NVMe/TCP ecosystem and providing automation with SmartFabric Storage Software. In this post, I want to focus on the automated discovery, our secret sauce to simplify the deployment ...?more

No alt text provided for this image
Predict 2023 (Jan. 12th, 2023)

Fortinet News

Ransomware Roundup - Play Ransomware

On a bi-weekly basis, FortiGuard Labs gathers data on ransomware variants of interest that have been gaining traction within our datasets and the OSINT community

The Ransomware Roundup report aims to provide readers with brief insights into the evolving ransomware landscape and the Fortinet solutions that protect against those variants ...?more

The Taxman Never Sleeps

For most people, taxes are a certainty. In the United States and Canada, tax forms are usually submitted by individuals and businesses in the spring (although, due to COVID, extensions were granted for anyone that asked for them).

So, our interest was piqued when we came across an e-mail that included a tax form seemingly from the United States Internal Revenue Service (IRS) in early November... the e-mail FortiGuard Labs discovered was, unsurprisingly, malicious. ...?more

Fortinet Named A Leader In The 2022 Gartner Magic Quadrant For Network Firewalls, Placed Highest In Ability To Execute

FortiGate Next-Generation Firewalls deliver the industry's best ROI, provide AI/ML-powered threat protection, and support the convergence of networking and security

Fortinet announced that it has been named a Leader in the 2022 Gartner Magic Quadrant for Network Firewalls, marking the thirteenth time Fortinet has been recognized in this Magic Quadrant. Fortinet placed highest in Ability to Execute and is recognized for its Completeness of Vision in the Magic Quadrant....?more

No alt text provided for this image
A white-label, enterprise IT newsletter service that is designed to help B2B sales reps keep their name and information in front of customers and prospects by providing them with trusted news and insights

要查看或添加评论,请登录

John J. McLaughlin的更多文章

社区洞察

其他会员也浏览了