Teckedin - 2023 Curated Analysis, Surveys, Trends and Reports
- 08 Jun 2023
- Print
- DarkLight
- PDF
Teckedin - 2023 Curated Analysis, Surveys, Trends and Reports
- Updated on 08 Jun 2023
- Print
- DarkLight
- PDF
Article Summary
Thank you to our sponsor. All columns are sortable
Title/Link | Description | Category |
---|---|---|
ZDNet - Should AI come to your doctor's office? OpenAI's co-founder thinks so | This healthcare provider is trying out AI-assisted 'hands-free charting' to generate notes and visit summaries -- with impressive results, at least in time savings. | Automation & Productivity |
Computerworld - WWDC: What’s new for enterprise admins and device management? | These become more versatile this year with updates to Continuity, Apple Wallet, and iCloud Keychain. Administrators also gain additional control to encourage users to sign into the apps and services they need. Managed Apple IDs can also be used in more situations, such as when enrolling a device in order to keep personal and work data separated. | IT Management |
The Hacker News - How to Improve Your API Security Posture | It involves identifying potential vulnerabilities and misconfigurations that could be exploited by attackers, and taking the necessary steps to remediate them. Posture management also helps organizations classify sensitive data and ensure that it's compliant with the leading data compliance regulations such as GDPR, HIPAA, and PCI DSS. | Security |
sdxCentral - Here’s how AI could destroy the planet | Today’s conversations around AI make assumptions regarding how the technology will be used from an efficiency perspective. It’s fairly expensive to train large language models (LLMs) used in generative AI technology, “so people are assuming … we’re barely going to use it,” he explained. | Sustainability |
TechRepublic - Verizon 2023 DBIR: DDoS attacks dominant, while pretexting drives BEC growth | BECs have evolved to include several sophisticated gambits, including one recently reported by Avanan, a unit of Check Point Software, involving the use of legitimate services, like Dropbox, to hide malware. | Security |
SiliconANGLE - Report: Just 42% of US workers see generative AI as a threat | “Generative AI is more uniquely suited for augmentation — primarily of knowledge workers — rather than automation,” she said. “At KPMG, we know that to realize the augmentation benefits like increased productivity, people will need to swiftly adopt the technology and learn how to work with it effectively. It’s a mindset and skills shift.” | Artificial Intelligence |
TechRepublic - New zero-click threat targets iPhones and iPads | Kaspersky’s zero-click attack report has caused controversy, as the Russian Federal Security Service claims thousands of Russians, including foreign diplomats and government officials, were targeted and compromised by the malware. Russia’s Federal Security Service has accused Apple and the U.S. National Security Agency of masterminding the attacks; Apple has denied this claim. | Security |
Network World - What is SDN and where is it going? | In a traditional network structure, decisions on how network packets get transmitted from one computer to another are made by the physical routers, switches, and firewalls that make up the network infrastructure. The functionality of these network devices is divided conceptually into elements called planes, including the data plane (sometimes called the forwarding plane), the control plane, and the management plane. | Network Management |
SiliconANGLE - Actually, AI will save the world, not destroy it, says venture capitalist Marc Andreessen | He believes that rather than take our jobs, AI “may cause the most dramatic and sustained economic boom of all time.” The article goes on to outline benefits on top of benefits. It’s certainly an interesting and persuasive, if single-minded, argument. His conclusion is that developers and companies should be allowed to reach for the stars and not be held back by “regulatory capture” and a “government-protect cartel. | Artificial Intelligence |
sdxCentral - Generative AI can, and will, be used against you | He pointed out that invoice fraud in general is a serious problem — this is when attackers pretend to be an executive or business owner and successfully convince a finance department to pay out a fraudulent invoice. Adding genAI to the mix only makes attacks more convincing; platforms can quickly generate fake text, voice, image and video. | Artificial Intelligence |
SiliconANGLE - There’s a lot of enterprise-grade secure browsers out there, but are they ready for prime time? | One way that the enterprise products — and some of the consumer ones such as Brave — work is by doing a sleight-of-hand trick. When the browser is fired up, the user is transported to the vendor’s data center and runs a virtual session, or a complete Linux virtual machine, so that any phishing or malware attempt can’t touch the endpoint. | Privacy & Security |
eWeek - 100+ Top Artificial Intelligence (AI) Companies 2023 | To chronicle this growth, this list of AI companies reflects the chaotic and moment-by-moment shifts disrupting the tech industry. It covers the full ecosystem of AI vendors: new generative AI companies, entrenched giants, AI purveyors across verticals, and upstart visionaries with a gleam in their eye. | Artificial Intelligence |
SiliconANGLE - How Auto-GPT will revolutionize AI chatbots as we know them | ChatGPT might seem magical to users for its ability to answer questions and produce content based on user prompts, such as summarizing large documents or generating poems and stories or writing computer code. However, it’s limited in what it can do because it’s capable of doing only one task at a time. During a session with ChatGPT, a user can prompt the AI with only one question at a time and refining those prompts or questions can be a slow and tedious journey. | Automation & Productivity |
SiliconANGLE - Oracle’s ‘Starlink’ cloud strategy gets interesting | Oracle typically doesn’t get first mention, not just among hyperscalers, but on its home turf of databases, its Autonomous Database processes many times more queries per hour than Snowflake Inc., which typically tends to get the spotlight. OK, that encompasses both transaction processing and data warehousing, so Oracle casts a wider net. But specifically, that’s more than 9 billion queries per hour. Who knew? | Data & Analytics |
Datanami - IDC Report: The Convergence of Modern Technologies Transforms IT Roles, Fueling Growth in DataOps and MLOps | “The census data shows that a dramatic, once-in-a-generation shift in the composition of the IT workforce is underway. This shift is akin to what took place during the years from 1997 to 2002 when the emergence of the commercial internet and the .com era turned priorities upside down for much of corporate IT and led to the hiring of vast numbers of web developers and networking experts,” | Tech Jobs |
Computerworld - IT is driving new enterprise sustainability efforts | For most IT organizations, says Bjoern Stengel, global sustainability research lead at IDC, “the low-hanging fruit is increasing infrastructure performance with equipment that has a lower carbon footprint and is more energy efficient.” | Sustainability |
sdxCentral - 4 security myths hindering CISOs effectiveness | “Rather than continuing to pursue more data and more analysis, savvy CISOs engage in a minimum effective insight approach,” Teixeira said. “Determine the least amount of information needed to draw a straight line between the enterprise’s cybersecurity funding and the amount of vulnerability that funding addresses.” | Security |
SiliconANGLE - New ways to reduce the chances of ransomware attacks | The IBM “X-Force Definitive Guide to Ransomware 2023” touches on tactics and is based on examining their customers’ anecdotal incidence response data as part of the company’s X-Force security practice. It found that in the past year, “the average time to complete a ransomware attack diminished from two months to fewer than four days — giving organizations very little time to detect and thwart potential attacks.” | Security |
ZDNet - The impact of generative AI on software team productivity is... complicated | "However, most of the code that is generated is security-vulnerable and might not pass enterprise-grade code. So, while AI can help accelerate coding, care should be taken to analyze the code, find vulnerabilities, and fix it, which would take away some of the productivity increase that AI vendors tout about." | Artificial Intelligence |
SiliconANGLE - Six technical security trends CISOs need to know in 2023 | Geopolitical risk continues to affect organizations worldwide in 2023, and many of these risks are emerging as supply chain exposures. This puts enterprises and their supply chains at increased risk for malware attacks, attacks on cloud infrastructure, attacks on system integrity and availability such as distributed denial of service, and data theft or loss. | Security |
Network World - How IT pros might learn to believe in AI-driven network-management | But members of network-engineering teams reported more skepticism than other groups—IT tool engineers, cloud engineers, or members of CIO suites—suggesting that people with the deepest networking expertise were the least convinced. In fact, 20% of respondents said that cultural resistance and distrust from the network team was one of the biggest roadblocks to successful use of AI-driven networking. | Network Management |
The Verge - Google’s AI-powered search experience is way too slow | If you’ve opted in to SGE, which is only available to people who sign up for Google’s waitlist on its Search Labs, AI summaries will appear right under the search box. I’ve been using SGE for a few days, and I’ve found the responses themselves have been generally fine, if cluttered. | Automation & Productivity |
SiliconANGLE - Cloud conundrum: The changing balance of microservices and monolithic applications | “There is no one-size-fits-all. If there are a set of services that have the exact same scaling and performance requirements, same security vectors, and most importantly, are managed by a single team, it is a worthwhile effort to see if combining them [into a monolithic app] simplifies your architecture | Cloud |
Computerworld - How many jobs are available in technology in the US? | Technology companies shed an estimated 4,725 jobs — a figure that includes nontechnical workers — in May, according to an analysis of the latest US Bureau of Labor Statistics (BLS) figures by IT industry group CompTIA. Job postings for open technology positions also eased off, down to about 234,000 from April’s 300,000, according to a new report from CompTIA. | Tech Jobs |
TechRepublic - ChatGPT vs Google Bard (2023): An in-depth comparison | ChatGPT and Google Bard are useful tools for producing text –– anything from summaries of information to creating a poem to writing an essay. ChatGPT was trained on text from the internet, and Google bard was trained on a specific dataset for conversations. This leads some to argue that ChatGPT is better at producing paragraphs and summaries and other text-based processing tasks, while Google Bard is better at conversations. | Automation & Productivity |
Computerworld - EU, US lawmakers propose AI code of conduct in absence of regulation | Although both jurisdictions are currently working on formal legislation intended to regulate AI, it could take years for those rules to be finalized and implemented. By comparison, this proposed draft is expected within weeks and would bridge the gap until any legislation has been passed. | Artificial Intelligence |
SiliconANGLE - Fixing email security: It’s still a rocky road ahead | So what accounts for the holdup? First, implementing these protocols — including yet a fourth one called Brand Indicators for Message Identification or BIMI, which brings visible brand logos in inboxes — is devilishly difficult. When I tried to implement them across my own domains, I needed professional help from Valimail to put this all together properly, plus several months of trial and error to get everything right. | Security |
Computerworld - Nvidia Neuralangelo: A faster path to the industrial metaverse | Unlike the consumer metaverse, which was largely backed by Facebook and was effectively dead on arrival, the commercial metaverse is doing rather well. Nvidia is currently the darling of Wall Street and is the primary driver for the commercial metaverse. But creating this industrial-grade metaverse and the digital twins of real objects in it requires a lot of heavy lifting in terms of 3D scanning to duplicate real objects in this virtual environment. | Metaverse |
sdxCentral - Is XDR another security buzzword? What you should know | Today, endpoint detection and response (EDR) vendors are pivoting their products toward extended detection and response (XDR) solutions. XDR has the potential to become an advanced form of EDR, but the market lacks a universal standard, said Gartner Senior Director Analyst Jon Amato, who predicts that within the next 12 months, dominant players will emerge and shape the definition and standards of the XDR market. | Security |
Network World - 6 lessons from the Amazon Prime Video serverless vs. monolith flap | A software-development team caused quite a stir recently with a blog post describing how it abandoned a serverless architecture project in favor of a monolith—and slashed cloud infrastructure costs by 90% in the process. | IT Management |
sdxCentral - What is quantum computing? Its architecture, advantages and disadvantages | Error correction is still difficult, making computation sometimes unreliable. Quantum hardware also requires an optimized environment, with many quantum processors only functional at or around absolute zero (-273°C), under no atmospheric pressure, and completely insulated from the earth’s magnetic field. Retrieving quantum results may also corrupt data. | Quantum Computing |
Computerworld - ChatGPT creators and others plead to reduce risk of global extinction from their tech | During a Q&A at MIT earlier this month, Hinton went so far as to say humans are nothing more than a passing phase in the development of AI. He also said it was perfectly reasonable back in the ’70s and ’80s to do research on how to make artificial neural networks. But today’s technology is as if genetic engineers decided to improve grizzly bears, allowing them to speak English and improve their “IQ to 210.” | Artificial Intelligence |
AiThority - Top 10 Gen AI Platforms that are Driving Transformation In B2B | Generative AI encompasses different algorithms (artificially generated images and texts), usually based on neural network architectures like generative adversarial network (GANs), that are trained on massive amounts of data, images or texts, to produce similar looking images or texts, yet not the same. | Artificial Intelligence |
Blocks & Files - Komprise and relevance in the AI age | Several storage suppliers are directly involved in delivering storage capacity to the GPU servers used in generative AI processing, including Dell, DDN, HPE, IBM, NetApp, Panasas, Pure Storage, VAST Data and Weka. Others are fielding data sets for use by the models such as Databricks, Snowflake and their ilk. Building vector databases? Think Pinecone. | Data Storage |
The Verge - OpenAI isn’t doing enough to make ChatGPT’s limitations clear | Users deserve blame for not heeding warnings, but OpenAI should be doing more to make it clear that ChatGPT can’t reliably distinguish fact from fiction. | Artificial Intelligence |
SiliconANGLE - Coalition of AI leaders sees ‘societal-scale risks’ from the technology’s misuse | A statement issued today and signed by more than 375 computer scientists, academics and business leaders warns of profound risks of artificial intelligence misuse and says the potential problems posed by the technology be given the same urgency as pandemics and nuclear war. | Artificial Intelligence |
Computerworld - The metaverse: Not dead yet | As the hype spotlight has shifted sharply to generative AI and all its dangers and possibilities, talk of the metaverse — or “Meh-taverse” — these days largely centers on its demise. And not without reason: Meta (formerly Facebook), which changed its name in 2021 to reflect its new focus, has spent billions on VR development with comparatively little return, at least so far. | Metaverse |
sdxCentral - The great CISO resignation: Why security leaders are quitting in droves | Recent research from anti data exfiltration and ransomware prevention company BlackFog revealed that nearly a third (32%) of CISOs or IT cybersecurity leaders in the U.S. and UK were considering leaving their current organization. Nine in 10 CISOs report being “moderately” or “tremendously” stressed, according to another study, and average CISO tenure is just two years and two months. | Security |
AiThority - Combating the Rise of Deepfakes in Cybercrime: Strategies for Combating the Issue | An Observatory Report from the Europol Innovation Lab found that by 2026, a staggering 90% of web material may have been produced automatically. Deepfakes undermine trust in digital technology and are becoming an increasing danger to organizations since they are frequently used to deceive and carry out social engineering attacks. | Security |
The Verge - Top AI researchers and CEOs warn against ‘risk of extinction’ in 22-word statement | The 22-word statement, trimmed short to make it as broadly acceptable as possible, reads as follows: “Mitigating the risk of extinction from AI should be a global priority alongside other societal-scale risks such as pandemics and nuclear war.” | Artificial Intelligence |
Computerworld - What are large language models — and how are they used in generative AI? | If you need to boil down an email or chat thread into a concise summary, a chatbot such as OpenAI’s ChatGPT or Google’s Bard can do that. If you need to spruce up your resume with more eloquent language and impressive bullet points, AI can help. Want some ideas for a new marketing or ad campaign? Generative AI to the rescue. | Automation & Productivity |
SiliconANGLE - GPUs get all the headlines, but the future of AI is real-time data | In this Breaking Analysis, we look at the infrastructure of AI examining the action at the silicon layer specifically around Nvidia’s momentum. Since much of AI is about data, we’ll also look at the spending data on two top data platforms, Snowflake and Databricks Inc., to see what the survey data says and examine the future of real-time data and automation as a catalyst for massive productivity growth in the economy. | Artificial Intelligence |
Andreessen Horowitz - Who Owns the Generative AI Platform? | We’ve observed that infrastructure vendors are likely the biggest winners in this market so far, capturing the majority of dollars flowing through the stack. Application companies are growing topline revenues very quickly but often struggle with retention, product differentiation, and gross margins. And most model providers, though responsible for the very existence of this market, haven’t yet achieved large commercial scale. | Artificial Intelligence |
Datanami - Airbyte’s Pioneering State of Data Survey Sheds Light on Global Data Engineering Practices | The most used data warehouses are Snowflake and Google BigQuery, then AWS Redshift and Databricks with Azure Synapse lagging behind. In the larger organization segments, Databricks popularity is near on par with Snowflake and BigQuery. | Data & Analytics |
Tech Startups - ‘Everyone is a programmer’ with generative A.I., Nvidia CEO says | Currently, generative AI tools using like ChatGPT and Google Bard can assist users with programming tasks. Just last month, Alphabet launched Google Bard AI which can write and debug software code. The new chatbot is able to generate, debug, and explain code. Bard supports 20 programming languages, including C++, Java, JavaScript, and Python, and can now integrate with other Google products. | Automation & Productivity |
sdxCentral - Password report: 65% spend more money on sites where logging in is easier | When forgetting their login credentials, American respondents (28%) rely heavily on resetting their password or username more than the global average (24%). And only 57% of Americans still have access to all of their accounts and the online products and services they have registered for — 39% of them track their login information and 18% of them use a password manager. | Automation & Productivity |
TechRepublic - Gartner releases 4 trends that will impact cloud, data centers and infrastructure in 2023 | Refactoring cloud infrastructure should focus on optimizing costs. This can be done through a series of steps that starts with eliminating redundant, overbuilt or unused cloud infrastructure, as well as building business resilience rather than service-level redundancy; using cloud infrastructure as a way to mitigate supply chain disruptions; and modernizing infrastructure. | Cloud |
VentureBeat - 4 trends shaping the future of practical generative AI | This use case for generative AI is urgent because access to institutional knowledge is vanishing. Enterprise data is growing at an explosive rate, yet Gartner estimates that over 80% of that data is unstructured (i.e. PDFs, videos, slide decks, MP3 files etc.), which makes it difficult for employees to find and use. | Artificial Intelligence |
TechRepublic - Tech Impact: Sustainable solutions to tackle tech plastic waste | For example, the Electronic Product Environmental Assessment Tool and the Global Reporting Initiative Standards have detailed wide-ranging environmental and sustainability benchmarks; these vary widely depending on industry. GRI, for example, takes into account energy use, the rights of indigenous people, biodiversity, waste and much more. | Sustainability |
VentureBeat - Generative AI poised to reshape workplace efficiency, revolutionize jobs: KPMG study | The survey findings reveal that a substantial 72% of respondents believe that GenAI has the potential to significantly enhance productivity within their organizations. Additionally, 66% of participants anticipate a transformation in the future work landscape, while 62% recognize the ability of AI to stimulate innovation and facilitate the development of novel products and services. | Artificial Intelligence |
Computerworld - The shadow IT fight — 2023 style | Are an enterprise’s employees supposed to report it to IT? Is that partner supposed to? You guessed it: nobody reports it to IT and yet there it is, accessing and interacting with sensitive corporate intellectual property. Is that particular partner interaction shadow IT? | IT Management |
SiliconANGLE - Veeam: Ransomware keeps rising, and paying fraudsters is still not the right approach | One of the most glaring report findings is that one in seven organizations could potentially have over 80% of their data compromised from a ransomware attack. This reflects a major deficiency in the protection measures currently implemented by many businesses. Even worse, 93% of these attacks target backups, and in three out of four cases, the attackers succeed in crippling an organization’s ability to recover. | Security |
AiThority - Gartner Data & Analytics Summit 2023: A Brief Day-by-Day Overview | It’s critical to understand that not every choice should or can be automated. We face the risk of developing data-driven businesses without conscience or a clear purpose if we only concentrate on advancing decision automation without taking into account the human aspect. | Data & Analytics |
Blocks & Files - ChatGPT, LLMs, and storage | Such GAIs, with their ability to understand text requests and output competent answers, have the potential to be applied across the entire enterprise and public sector IT landscape enabling fundamentally better search and analytics. Their use threatens/promises to replace and/or improve the productivity of knowledge workers of all sorts, ranging from call center and inside sales staff to accountants, lawyers and financial analysts over the next decade. | Tech Trends |
The Hacker News - 5 Must-Know Facts about 5G Network Security and Its Cloud Benefits | With its low latency, higher bandwidth, and extensive security measures, 5G strengthens the security of cloud connectivity. This upgrade enables secure and reliable transmission of sensitive information as well as real-time data processing. 5G allows organizations to confidently use cloud services to store and manage their data, reducing the risk of data breaches. | 5G |
Forbes - Information Technology’s Treasure Map To The Business Value Of Enterprise Storage | You may think it can take years and years for a storage array to attain an appealing return on investment (ROI) and pay for itself, as you venture into the inefficiency-infested, pitfall-strewn caverns of legacy and conventional enterprise storage. You may think it’s too hard to measure. Can you really know the business value of something so technical as enterprise storage? | Data Storage |
VentureBeat - How AI is curing advertisers’ privacy problem | As a result, there is a movement towards broader targeting and more creative variations within the social media industry because the algorithms can target sub-segments within the broader audience by using many more creative assets and machine learning (ML). And they can do so much more effectively than human media planners with their manually pre-planned segmentation and message maps. | Marketing Tech |
Network World - Converge NOCs with SOCs to save time and effort | At the very least, the lower tiers of separate NOC and SOC operations should be converged, so that there is neither duplication nor a game of hot potato as staff try to figure out what a problem actually is, and whether the response will be network focused, security focused, or both. Maintaining separate or semi-separate escalation paths is supportable given that lower-level convergence. | IT Management |
sdxCentral - Don’t pay ransom: US government updates ransomware guide as attacks rise | NCC Group recorded an unprecedented surge in ransomware attacks in March with 459 victims, a 91% increase over February. The all-time high volume was likely associated with the highly publicized GoAnywhere MFT vulnerability being exploited across the world. | Security |
ZDNet - All the major Bing Chat and AI announcements from Microsoft Build 2023 | As a result, ChatGPT will no longer be limited to information prior to 2021. Rather, ChatGPT will be able to access the web and have information of current events through the use of Bing's search engine. | ChatGPT |
TechRepublic - Google Bard cheat sheet: What is Bard, and how can you access it? | In response to a prompt, Bard can pull information from the internet and present a response. The large language model behind Bard delivers the response in natural language — in contrast to a standard Google search, where a result consists of a snippet of information or a list of links | Automation & Productivity |
AiThority - A Guide on How MLCopilot is Using LLMs & Empowering Developers to Straighten ML Processes | On the online side, the tool uses a prompt that incorporates pertinent examples from prior studies to determine the most effective strategy for completing a task. This is considered way more accurate than the manual selection and the application of algorithms. | Machine Learning |
sdxCentral - How Dell’s NativeEdge has finally solved complicated edge deployments | “The optimization piece comes in because then they will need less [proof of concepts], they could consolidate multiple applications into the same architecture and yet we will keep it highly open for different [operation technology] systems, IoT frameworks, applications, many partnering opportunities, a lot of customer choice, including the right-sizing of the hardware required with the same experience.” | Edge Computing |
Blocks & Files - How to master multicloud from the ground to cloud (and back again) | IT organizations must now grapple with how to manage, govern and rationalize a complex ecosystem that spans across public clouds, on premises, colocation facilities and edge locations. As a result, they may discover the innovation sought by consuming multiple cloud services is stymied by the toil of managing it all. This is what’s known as multicloud by default. | Cloud |
SiliconANGLE - US Surgeon General warns social media is driving a mental health crisis in the young | Murthy talked about the benefits of social media for the young but mirrored what many scientists have said in that there need to be protections regarding what information kids can access and how much time they spend in their social media universe. It’s well-known that children now often sleep less because of tech, exercise less and spend less time physically interacting with their peers – essential to mental growth and well-being. | Social Media |
ZDNet - Google's Bard AI says urgent action should be taken to limit (*checks notes*) Google's power | I asked Bard chatbot whether we should fear Google. It shared concerns about Google you'd never expect would come from an AI created by Google. | Artificial Intelligence |
The Hacker News - The Rising Threat of Secrets Sprawl and the Need for Action | The report shows a 67% year-over-year increase in the number of secrets found, with 10 million hard-coded secrets detected in 2022 alone. This alarming surge in secrets sprawl highlights the need for action and underscores the importance of secure software development. | Security |
Computerworld - Ethics — what ethics? For Microsoft, it’s full speed ahead on AI | The stakes couldn’t be higher. Microsoft CFO Amy Hood recently told analysts that a single percentage point of market share in search advertising is worth $2 billion. In the first quarter of 2023, Google had an 85% search market share, compared to 9% for Bing. So, there’s a lot of upside for Microsoft to reap billions if it can edge closer to Google. And that’s just in search. Microsoft sees more billions in additional AI-driven money in the cloud, productivity tools and more. | Artificial Intelligence |
Network World - 5G network slices could be vulnerable to attack, researchers say | About 75% of communication service providers worldwide said that they had experienced up to six security breaches of 5G networks within the past year, according to a November 2022 survey by GlobalData and Nokia. Half of the respondents said that they experienced an attack that resulted in the leakage of customer data, and nearly three quarters said that an attack had caused a service outage. | 5G |
sdxCentral - Top 5 cloud security risks and best countermeasures | Orca found around half of the analyzed organizations have at least one Git repository containing sensitive data, such as database passwords, API keys, encryption keys, hash salts and secrets. If that information is part of organizations’ source code, attackers can potentially extract them and compromise the systems. | Cloud Security |
VentureBeat - Forrester predicts 2023’s top cybersecurity threats: From generative AI to geopolitical tensions | The nature of cyberattacks is changing fast. Generative AI, cloud complexity and geopolitical tensions are among the latest weapons and facilitators in attackers’ arsenals. Three-quarters (74%) of security decision-makers say their organizations’ sensitive data was “potentially compromised or breached in the past 12 months” alone. That’s a sobering cybersecurity baseline for any CISO to consider. | Security |
Computerworld - G7 leaders warn of AI dangers, say the time to act is now | Leaders of the Group of Seven (G7) nations on Saturday called for the creation of technical standards to keep artificial intelligence (AI) in check, saying AI has outpaced oversight for safety and security. | Artificial Intelligence |
Network World - Ethernet turns 50, but its voyage has only begun | “The most impactful area for Ethernet at this point is inside large cloud data centers which have shown high growth including interconnecting AI/ML clusters which are ramping up quickly,” Bechtolsheim said. | Network Management |
sdxCentral - Forrester: Top 3 tips for choosing an MDR vendor | The report noted that some MDR vendors require automation for any vendor-performed response action, but only “assist” customers in non-automated actions. Human expertise still holds a significant value in understanding the threats. “Restricting response to automated actions does help reduce the cost of delivering the service to customers but lets down customers that are unable — or unready — to automate,” they wrote. | IT Management |
SiliconANGLE - AI, edge and multicloud lead the conversation in Las Vegas as Dell embraces role as enterprise collaborator | “We’ve had, over the last several years, roughly 1,000 AI and machine learning projects inside the company,” Dell said. “This is a massive unlock of the power of data. It’s going to accelerate the economy. We think this is a huge wave.” | Artificial Intelligence |
Computerworld - Apple bans employees from using ChatGPT. Should you? | “While AI-powered chatbots are trained and further refined by their developers, it isn’t out of the question for staff to access the data that’s being inputted into them. And, considering that humans are often the weakest element of a business’ security posture, this opens the information to a range of threats, even if the risk is accidental.” | ChatGPT |
eWeek - Web3 and Smart Contracts Enable a Scalable API Economy | The key is developing your digital service for Web3 is a very different mindset and approach than you might take if you are to develop your digital service for Web2. It will require some expertise in blockchain technologies and considerations for using a public or private blockchain. | Web3 |
VentureBeat - AI-powered automation enhances job fulfillment for nearly 60% of workers: Report | These factors are contributing to the emergence of what has been called the “automation generation” — professionals who proactively adopt automation and AI to enhance collaboration, foster creativity and boost productivity, regardless of age or demographic. | Automation & Productivity |
SiliconANGLE - The AI-powered hybrid-multi-super cloud | In this Breaking Analysis, we examine some of the key infrastructure players in hybrid multicloud, with a focus on Red Hat Inc. and Dell Technologies Inc., two firms that increasingly are partnering with each other as VMware Inc.s future evolves. We’ll share recent Enterprise Technology Research survey data on the position of several other hybrid/cross-cloud players, including Cloudflare Inc., Equinix Inc., Hewlett Packard Enterprise Co., IBM Corp., Oracle Corp., VMware and others. | Cloud |
ZDNet - Today's AI boom will amplify social problems if we don't act now, says AI ethicist | She also highlighted the significance of making AI systems transparent, understandable, and accountable while protecting individual privacy. Baxter stresses the need for cross-sector collaboration, like the model used by the National Institute of Standards and Technology (NIST), so that we can develop robust and safe AI systems that benefit everyone. | Artificial Intelligence |
VentureBeat - The thing missing from generative AI is the ‘why’ | For large brands, it’s likely to be a very different story — and the reason is the “why.” AI can ingest information and spit out new assets. AI can also test creatives and optimize toward the creatives that are performing. But when it comes to knowing why a creative performs better than another, AI falls short. For any enterprise that highly values its brand, AI will play a different role. | Artificial Intelligence |
AiThority - Transforming Businesses: Key Components of AI Orchestration and How it Works | The fact is, both automation and orchestration are crucial to establishing a seamless and successful digital transformation. AI Orchestration comes in handy to reduce duplication and streamline any repetitive process through automatization. Orchestration involves advanced logic and decision making and automation combines different elements to form orchestration. | Automation & Productivity |
eWeek - Generative AI Landscape: Current and Future Trends | In this guide to the generative AI landscape, we’ll explore what generative AI is capable of and how it emerged and became so popular. We’ll also examine current trends in the generative AI space and predict what consumers should expect from this technology in the near future. | Artificial Intelligence |
VentureBeat - How generative AI’s impact on digital advertising methodology is evolving | The current iteration of AI tools offers users unprecedented speed at creating text and visual assets — obviously an interesting proposition for brands and advertisers. But in the near term, the tools’ real benefits are less associated with brand-visibility efforts, and more on paving the way for innovative solutions and quick campaign ideations. | Artificial Intelligence |
Datanami - Toggled Survey: Businesses Grapple with Data Analytics in the Race for Greener, Smarter Buildings | “Most businesses are only scratching the surface of what the technology can do. Once facility managers start to capitalize on what their performance data is telling them and where to adjust, the true business value of a scalable and flexible IoT-enabled smart building network comes to life.” | Data & Analytics |
eWeek - Top 10 AI Detector Tools for 2023 | Consequently, there is a great need for AI detector tools. AI content detector software uses artificial intelligence (AI) to identify text written with a generative AI model. The software aims to provide readers with transparency and ensure that only quality content is published. | Artificial Intelligence |
The Verge - New AI research lets you click and drag images to manipulate them in seconds | Not only can you change the dimensions of a car or manipulate a smile into a frown with a simple click and drag, but you can rotate a picture’s subject as if it were a 3D model — changing the direction someone is facing, for example. One demo even shows the user adjusting the reflections on a lake and height of a mountain range with a few clicks. | Artificial Intelligence |
sdxCentral - CEOs cite AI as a priority (now what?) and sustainability gets real | “They talk about cost management, to some extent, but they usually focus elsewhere,” Raskino explained. “The proposition that the world seems to be putting behind AI is substantial augmentation of professionals and potentially replacing certain tasks. But CEOs have not been driving productivity in terms of output per worker. So we’ve got a powerful tool meeting a relatively unpracticed set of solutions.” | Artificial Intelligence |
VentureBeat - 4 priorities B2B technology leaders should strive to meet this year | Optimizing costs doesn’t necessarily mean refusing to sign new software contracts. Often, in fact, the smartest way to curb costs is to replace legacy systems with more modern and flexible tools that better suit the organization’s current business needs. An ecommerce solution that can manage both B2B and B2C applications might replace two separate legacy tools, for instance, dramatically reducing overall IT costs | IT Management |
sdxCentral - Dell’Oro digs into NaaS market growth indicators, inhibitors | While the firm’s analysis of the market’s total value is still under wraps, Morgan shared that the report evaluates NaaS as a subset of the public cloud–managed LAN market. “Most of these [NaaS] services only make sense” if they’re delivered in a way that allows equipment to be managed from a central point in the cloud, which is a key functionality of true NaaS offerings. | Network Management |
VentureBeat - Business leaders investing in generative AI, automation to reinvent physical operations: Report | Leaders are revising their supply chains and technology budgets to address these challenges and build resilience. The study also found that leaders are now embracing generative artificial intelligence (AI) and automation, with 84% planning to use generative AI and 91% automation to modernize their operations by 2024. Additionally, 51% are already using or planning to use autonomous vehicles or equipment this year. | Automation & Productivity |
ZDNet - 6 major risks of using ChatGPT, according to a new study | These risks include fraudulent services generation, harmful information gathering, private data disclosure, malicious text generation, malicious code generation, and offensive content production. | Privacy & Security |
VentureBeat - Predicting the future of endpoint security in a zero-trust world | Endpoints must become more intelligent, resilient and self-healing to support the many new identities they need to protect. Even the most hardened endpoints are at risk because they can’t protect against identity-based breaches. Putting any trust in identities is a breach waiting to happen. | Security |
Security Magazine - 47% of all internet traffic came from bots in 2022 | For the fourth consecutive year, the volume of bad bot traffic — malicious automated software applications capable of high-speed abuse, misuse and attacks — grew to 30.2%, a 2.5% increase over 2021. | Security |
Computerworld - Senate hearings see a clear and present danger from AI — and opportunities | Daniel Ho, associate director for Institute for Human-Centered Artificial Intelligence (HAI) at Stanford University, agreed, saying that by one estimate the federal government would need to hire about 40,000 IT workers to address cybersecurity issues posed by AI. | Artificial Intelligence |
VentureBeat - Early adopters of data streaming see up to 10x returns, survey finds | Confluent classified respondents into five groups based on the maturity of their data streaming stack. The so-called level 1 respondents (7%) had data streaming experiments in pre-production, level 2 folks (20%) had projects deployed for non-critical applications, level 3 (63%) had deployment for a few critical systems, while levels 4 and 5 (9%) had several deployments in production for critical systems with streams managed as a product. | Data & Analytics |
SiliconANGLE - We need more breach transparency, but a lot of obstacles are in the way | The U.K. authors go on to bust a few myths about transparency. Among them: Coverups are fine (they aren’t because they prevent others from learning tactics and early warning signs), reporting attacks can’t be done without public disclosure (privacy is more the norm now with many agencies), paying the ransoms is the most expedient solution (it often backfires or encourages the attackers to try to leak your data), and fines are only levied if your data is leaked (the two things are independent of each other and organizations can be fined for all sorts of violations). | Security |
TechRepublic - Sticking to traditional security playbook is mistake for cloud security: Palo Alto Networks SVP | Recent research by Palo Alto Networks’ Unit 42 found that more than 60% of organizations take over four days to resolve security issues, over 63% of codebases in production have unpatched vulnerabilities, and threat actors exploit a misconfiguration or vulnerability within hours. | Security |
SiliconANGLE - Report finds just one unpatched vulnerability increases the risk of a cyber insurance claim by 33% | Notable insights from the report included that in addition to “human inaction” — not patching software — human error is also a primary risk factor among companies that have cyber insurance. Phishing accounted for 76% of reported incidents, more than six times greater than the next-most popular attack technique. In the case of phishing, nearly all cyber insurance claims were a direct result of employees falling for phishing tricks | Security |
The Verge - Meta security analysts warn of malicious ChatGPT imposters | In the company’s new Q1 security report, Meta shares that malware operators and spammers are following trends and high-engagement topics that get people’s attention. Of course, the biggest tech trend right now is AI chatbots like ChatGPT, Bing, and Bard, so tricking users into trying a fake version is now in fashion — sorry, crypto. | Security |
TechRepublic - Splunk report sees upsides to observability | Respondents to the study who were leaders were nearly eight times as likely as beginners to say that their ROI on observability tools far exceeded expectations. Approximately 90% of leaders said they were “completely confident” in their ability to meet availability and performance requirements for their applications and were four times as likely to have resolved instances of unplanned downtime or serious service issues in just minutes versus hours or days. | IT Management |
Network World - IT pros worry about network data being fed to AI tools | As more IT organizations apply artificial intelligence (AI), machine learning (ML), and so-called AIOps technology to network management, network data is critical to success. AI/ML technology requires more and more data to learn individual networks, derive insights, and offer recommendations. Unfortunately, many organizations encounter problems when trying to feed network data to these AI tools | Network Management |
VentureBeat - 5 ways AI-driven patch management is driving the future of cybersecurity | Cyberattackers’ growing tradecraft now includes greater contextual intelligence about which CVEs are most vulnerable. The result: Manual approaches to patch management — or overloading endpoints with too many agents — leaves attack surfaces unprotected, with exploitable memory conflicts. | IT Management |
Computerworld - Survey: Most workers would welcome digital monitoring to boost productivity | A whopping 96% of “digital workers” indicated they would be willing to accept electronic monitoring of their online work in exchange for training opportunities or career development (34%); learning more about their job (33%); or gaining proactive help from IT (30%). | Automation & Productivity |
Blocks & Files - Storage races to innovate in face of data explosion | The whole area of IT storage is buzzing with innovation, as startups and incumbents race to provide the capacity needed in a world exploding with unstructured data. Chatbot technology, the I/O speed to get data into memory, the memory capacity needed, and the software to provide, manage, and analyze vast lakes of data all create massive opportunities. | Data Storage |
VentureBeat - OpenAI is rolling out ChatGPT Plugins to Plus subscribers. Here’s why that’s a big deal. | In March, OpenAI officially announced 11 third-party plugins, including branded offerings from Instacart, Kayak and Zapier. But the more than 70 third-party plugins that will be made available now include ones for chess play, recipe-finding, live soccer and nutrition. For those developers who want to create a ChatGPT plugin, there is a waitlist for access. | ChatGPT |
Blocks & Files - 4 ways CIOs can optimize IT and boost business value | Companies are seeking IT leaders who can be surgical about cutting costs and other critical measures for building business resiliency during a downturn, executive recruiters recently told CIO Journal. Also, financial leaders for leading technology providers noted in earnings calls that customers are optimizing their consumption of cloud software in the face of macroeconomic headwinds. | IT Management |
VentureBeat - ChatGPT is about to revolutionize cybersecurity | The widely available use of machine learning/artificial intelligence (ML/AI) for cybersecurity practitioners is relatively new. One of the most common use cases has been endpoint detection and response (EDR), where ML/AI uses behavior analytics to pinpoint anomalous activities. It can use known good behavior to discern outliers, then identify and kill processes, lock accounts, trigger alerts and more. | Security |
SiliconANGLE - As cloud computing gets more complex, so does protecting it. Here’s what companies need to do | Authentication isn’t as simple as just maintaining a single sign-on system, requiring integration to protect all kinds of clouds, across all vendors and across all on-premises equipment under a single umbrella. The nature of cloud computing itself is changing as differences among software as a service, platform as a service and infrastructure as a service have blurred together, making it harder to figure out the best protective scheme. | Security |
Computerworld - Prepare for generative AI with experimentation and clear guidelines | IT leaders may remember how, in the past 10 years or so, some user departments ran off to the cloud and made their own arrangements for spinning up instances of software — then dumped the whole mess into IT’s lap when it became unmanageable. Generative AI can make that situation look like child’s play, but there are strategies for starting to manage it ahead of time. | IT Management |
VentureBeat - The evolution of the chief data officer (CDO) and what it means for businesses today | The expectations of the CDO were tremendous, regardless of where they rolled up. The CDO was at the center, between IT and business leaders, and was responsible for managing the data “currency” that both sides were dependent on. | Data & Analytics |
SiliconANGLE - Dear CEO: Your employees are already using AI to do their work. What’s your AI plan? | Having basic guidelines for your employees to follow will be important. Your IT team may have strong opinions on which AI tools your company should or should not use. Your legal team may raise significant concerns over issues ranging from who owns the intellectual property generated from AI.to prohibited information that your legal team may not want inputted into an AI tool. Do not wait. Get ahead of this situation now. | Artificial Intelligence |
AiThority - Couchbase Survey Shows 9 Out of 10 Developers Are at or Over Capacity; Automation and SQL-based Query Capabilities Top Their Productivity Wish Lists | With so many developers at or over their work capacity, only 5.1% responded they have the ability to take on more projects. As developers’ overall workload increases, more developers are also taking on tasks outside of their normal purview. Specifically, when developers were asked if their responsibilities have been affected in the past 12 months, 3 out of 4 shared they sometimes or consistently take on responsibilities outside of their job description | DevOps |
SiliconANGLE - How technology service providers can raise their relevance in 2023 | Mobilize for change in product, go-to-market investments or other priorities in situations where the change in context or outlook appears significant and structural. This requires discerning the difference between cyclical challenges that will pass with time and sector challenges that will endure. Keep the organization prepared to respond to changes in context. | IT Management |
VentureBeat - Executives fear accidental sharing of corporate data with ChatGPT: Report | The State of Generative AI in the Enterprise report found that ChatGPT is the most popular chatbot in use amongst enterprises, with CopyAI (35%) and Anyword (26%) following closely behind as the second and third most commonly used. However, many companies have banned the use of generative AI tools in the workplace, with ChatGPT being the most frequently banned (32%), followed by CopyAI (28%) and Jasper (23%). | ChatGPT |
Network World - Multivendor 5G network slicing test claims 70% gain in deployment speeds | The test deployment used cloud-native network functionality provided by Enea, Oracle and Casa Systems, and orchestration systems from Nokia and Red Hat. Security was provided by Palo Alto, and active monitoring by Emblasoft. Services ran on Red Hat OpenShift, on hardware supplied by Intel, Nokia and HPE. | 5G |
Aithority - Nearly Half of Senior Leaders Believe Colleagues Have Inadvertently Shared Corporate Data with ChatGPT | Love/hate relationship: ChatGPT is both the most used and most banned tool. 47% of respondents (and 52% of respondents in regulated industries) cite using OpenAI’s popular free chatbot at work. CopyAI (35%) and Anyword (26%) were a distant second and third. But companies banning generative AI in the workplace number almost as high: ChatGPT is the most banned (32%), followed by CopyAI (28%) and Jasper (23%). | ChatGPT |
The Verge - Exclusive: Google’s Sundar Pichai talks Search, AI, and dancing with Microsoft | The company is very quick to point out that the “T” in ChatGPT stands for transformer, the large language model technology first invented at Google, but OpenAI and others have been first to market with generative AI products, and OpenAI has partnered with Microsoft on a new version of Bing that feels like the first real competitor to Google Search in a long time. | Artificial Intelligence |
AiThority - Nearly 40% of Enterprises Surveyed by expert.ai Are Planning to Build Customized Enterprise Language Models | A significant majority of enterprises (78.5%) realize that the efforts required to effectively train a usable and accurate enterprise-specific language model is a significant undertaking which will require dedicated resources and budget. Almost three-quarters of enterprises surveyed have budget or are discussing adding budget to support large language model (LLM) adoption. | Artificial Intelligence |
SiliconANGLE - The chief trust officer was once the next hot job on executive row. Not anymore. | But those bromides aside, the report is worth reading for its Cassandra-like warnings. For example, only 24% of the respondents are planning to increase budgets for digital trust activities. Even fewer say that their organization has a dedicated staff role for digital trust. And although the majority of respondents say it is important to have a framework for digital trust practices, only 20% currently use one. | Privacy & Security |
SecurityIntelligence - NSA Releases New Best Practices for Securing Home Networks | Many people think of a cyberattack as something that happens to large companies. However, home networks are increasingly the targets of cyber criminals, who use them as a gateway to corporate networks through remote workers. Since you are a remote worker, your habits and setup at home can actually be the cause of a major corporate breach, which is definitely a career-limiting, not career-enhancing, move. | Privacy & Security |
sdxCentral - Top 3 open source networking trends for 2023 | The challenge now is that organizations realize they have put all the various disaggregated network components back together to enable a full end-to-end stack for enterprise, cloud and telecom service providers. | Network Management |
Computerworld - Will Bing and Edge become the center of the Microsoft universe? | In search, Google has a stranglehold with 85% of the worldwide search market share in the first quarter of 2023, compared to 9% for Bing. In browsing, Edge fares even worse: it accounts for a 5% market share compared to 64% for Chrome and 20% for Safari. That’s a far cry from 2003, when Internet Explorer had a 95% market share. | Automation & Productivity |
SiliconANGLE - The future of open source in the age of AI: Analysts break down Open Source Summit insights | The organizational model, project model, licensing model and human equation are all areas of concern for open source in the face of the AI surge. However, startups, companies and non-profits will all leverage the value of open source, and finding a balance between using open source and making money will be important, Furrier added. | Artificial Intelligence |
The Hacker News - Why Honeytokens Are the Future of Intrusion Detection | "There are clear steps organizations can take beyond common safeguards and security tools to strengthen their defenses and increase their chances of detecting, thwarting or minimizing attack [...] Honeypots, or fake accounts deliberately left untouched by authorized users, are effective at helping organizations detect intrusions or malicious activities that security products can't stop". | Security |
ZDNet - 70% of employees are happy to delegate work to AI, according to new Microsoft report | The employees would be open to receiving assistance in all different sectors including administrative tasks (76%), analytical (79%), creative work (73%), finding the right information (86%), summarizing their meetings and action items (80%), and even planning their day (77%). | Automation & Productivity |
SiliconANGLE - Desperately seeking cloud repatriation | The post posited that cloud expenses would become an increasingly large component of cost of goods sold for cloud native software-as-a-service companies at scale. And these costs would become so dilutive to profits that it would either force repatriation or a large discount concession from cloud providers. The authors used the Dropbox case study as an example of the potential savings from repatriation where the company saved $75 million by moving infrastructure back on prem. | Cloud |
Datanami - New Pure Storage Survey Underscores Importance of IT Modernization to Support New Tech Initiatives | More Than Half of IT Buyers are Prioritizing AI/Machine Learning and Sustainability Technology Investments: IT buyers have cited that their top investments planned for the next five years are AI/machine learning (52%) and sustainable technology (51%). While less than half (46%) predict they’ll invest in infrastructure automation or orchestration. | IT Management |
sdxCentral - What is network-as-a-service (NaaS)? Its benefits, its features and what it replaces | NaaS replaces legacy network architecture like hardware-based VPNs and MPLS connections or on-premises networking appliances like firewalls and load balancers. NaaS vendors use software to run networking functions so customers can set up their own networks without using hardware. | Network Management |
ZDNet - 8 habits of highly secure remote workers | To practice safe remote working, if you have to work in a public place, you should avoid connecting to public Wi-Fi. Working in public spaces has its own set of risks, but public Wi-Fi networks will only amplify your risks of getting hacked and put corporate sensitive information at risk. | Privacy & Security |
VentureBeat - AI ethics for ad professionals: 10 rules of engagement | This mostly leaves it up to us to make choices about how to use AI. In my role in brand strategy at a creative agency, I’ve already seen people debating these choices: Is it okay to use ChatGPT to write a peer review? What about generating AI mockups for a presentation? | AI Ethics |
sdxCentral - Palo Alto Networks SVP identifies top SASE trends: AI, managed services | Recent statistics showed a 161% increase in usage of tools like Cobalt Strike, which enable large-scale attacks, while at least 100 new URLs are created daily using generative pre-trained transformer (GPT) technology, he added. | Security |
VentureBeat - A CISO’s perspective on a TikTok ban and what it means for enterprises | But for businesses that use TikTok for marketing or employ any of the 150 million Americans who have the app, what’s to be done? The answer, for now, lies in following basic security hygiene practices for all data-collecting apps, not just TikTok. | Security |
ZDNet - AI will change the role of developers forever. Here's why that's good news | The technology has helped to accelerate software deployment cycles by 75% and reduced the build process from 22 minutes to just five, allowing IT professionals to focus on higher-value tasks, such as creating new services that meet business requirements. | Artificial Intelligence |
SiliconANGLE - Where is our national cybersecurity strategy? All over the place | One place that is ripe for improvement is with the federal government sprawling procurement system. However, as one law firm suggests, there aren’t any new regulations proposed in the paper that will specifically drive better cybersecurity practices and norms. This sprawl – and the resulting complexity — don’t instill any confidence if we will continue to require the lowest-cost bidder to solve our cybersecurity problems. | Security |
VentureBeat - A mayday call for artificial intelligence | According to the Times article, Hinton’s immediate concern is the ability of AI to produce human-quality content in text, video and images and how that capability can be used by bad actors to spread misinformation and disinformation such that the average person will “not be able to know what is true anymore.” | Artificial Intelligence |
Computerworld - How to choose the right UCaaS platform for your company | Unified Communications as a Service brings voice, text chat, meetings, and other communication technologies together into a single integrated platform. Here’s what to look for when shopping for a UCaaS platform, along with six top vendors to consider. | Automation & Productivity |
ZDNet - ChatGPT and the new AI are wreaking havoc on cybersecurity in exciting and frightening ways | Generative AI has helped bad actors innovate and develop new attack strategies, enabling them to stay one step ahead of cybersecurity defenses. AI helps cybercriminals automate attacks, scan attack surfaces, and generate content that resonates with various geographic regions and demographics, allowing them to target a broader range of potential victims across different countries. | Security |
Motherboard - Tech by Vice - Scary 'Emergent' AI Abilities Are Just a 'Mirage' Produced by Researchers, Stanford Study Says | The researchers found that AI abilities only appeared to suddenly emerge when people used specific metrics to measure the task. The researchers wrote that a person’s choice of a "non-linear" or "discontinuous" measurement can result in what appear to be sharp and unpredictable changes that are then falsely labeled as emergent abilities when in reality the performance curve is increasing smoothly. | Artificial Intelligence |
The Hacker News - Lack of Visibility: The Challenge of Protecting Websites from Third-Party Scripts | Third-party scripts are often invisible to standard security controls like Web Application Firewalls (WAFs) because they are loaded from external sources that are not under the control of the website owner. When a website loads a third-party script, it is executed in the user's browser alongside the website's own code. | Security |
TechRepublic - HackerOne: How the economy is impacting cybersecurity teams | HackerOne published the results of its new study, which reveals that half of the organizations surveyed experienced increased cybersecurity vulnerabilities in the last year as they faced security budget cuts and layoffs. HackerOne is the world’s biggest ethical hacker community. | Security |
Network World - How to shop for network observability tools | “If you cannot get visibility into all the components comprising the digital experience, everything that is between the end user clicking the mouse to the deepest part of a cloud or data center network, then you are flying blind, you are incurring a lot of risk, and you could be overspending, too,” | Network Management |
sdxCentral - Cisco customers focus on data center sustainability, worry about complexity | “Responsibilities for sustainability are increasingly being passed down from CIOs to infrastructure and operations leaders to improve IT’s environmental performance, particularly around data centers,” Gartner Senior Principal Analyst Autumn Stanish explained. “This has led many down the path of greater spend and investment in environmental solutions,” | Sustainability |
The Verge - OpenAI’s regulatory troubles are only just beginning | The GPDP has said it “welcomes” the changes ChatGPT made. However, the firm’s legal issues — and those of companies building similar chatbots — are likely just beginning. Regulators in several countries are investigating how these AI tools collect and produce information, citing a range of concerns from companies’ collection of unlicensed training data to chatbots’ tendency to spew misinformation. | Data Privacy |
TechRepublic - Generative AI defined: How it works, benefits and dangers | Generative AI is based on machine learning processes inspired by the inner workings of the human brain, known as neural networks. Training the model involves feeding algorithms large amounts of data, which serves as the foundation for the AI model to learn from. This can consist of text, code, graphics or any other type of content relevant to the task at hand. | Artificial Intelligence |
TechRepublic - Spaces in Google Chat: 4 new features for better connectivity and management | Each space may be configured to allow colleagues in your organization to access the space either via a shared link or a search. Spaces shared in this way are accessible to anyone in the organization, which works well for broad interest topics, such as policy discussions, how-to tips or cultural concerns (e.g., books, research or focused interest group communities). | Automation & Productivity |
VentureBeat - Is it time to ‘shield’ AI with a firewall? Arthur AI thinks so | Arthur AI is now taking its AI observability a step further with the launch today of Arthur Shield, which is essentially a firewall for AI data. With Arthur Shield, organizations can deploy a firewall that sits in front of large language models (LLMs) to check data going both in and out for potential risks and policy violations. | Artificial Intelligence |
sdxCentral - ChatGPT’s rock star status has executives buying into generative AI | Gartner today announced that a poll of 2,500 executives revealed that almost half (45%) reported that ChatGPT’s rock star status has prompted them to up their AI investments. And 70 percent said that their organization is currently investigating and exploring generative AI. Nineteen percent are already in pilot or production mode. | Artificial Intelligence |
VentureBeat - 10 ways ChatGPT and generative AI can strengthen zero trust | Generative AI can deliver the greatest value in the shortest time when we look at it as a continuous learning engine that finds correlations, relationships and causal factors in threat data — and that never forgets. ChatGPT and generative AI can be used to create “muscle memory,” or immediate reflex, in cybersecurity teams to stop breaches. | Security |
Computerworld - AI deep fakes, mistakes, and biases may be unavoidable, but controllable | “This is a problem in general with technologies,” said Margaret Mitchell, chief ethics scientist at machine learning app vendor Hugging Face. “It can be developed for really positive uses and then also be used for negative, problematic, or malicious uses; that’s called dual use. I don’t know that there’s a way to have any sort of guarantee any technology you put out won’t have dual use. | Artificial Intelligence |
VentureBeat - Lack of AI and automation adoption hinders employee productivity: Slack report | “Part of the confusion comes from a growing schism between leaders and teams over how to properly define and measure productivity in today’s environment. Organizations need to take a more holistic approach, and that includes enabling employees to experiment with tools and technology to drive better results.” | Automation & Productivity |
ZDNet - The 6 biggest AI features to expect from Google I/O 2023 | In order to keep up with Bing Chat, it has also been rumored that Google is working on integrating AI features into its own search engine, utilizing users' browsing habits to curate personalized recommendations, including purchases and basic information in a conversational manner. | Artificial Intelligence |
Blocks & Files - Gartner: Begun the cloud file services wars have | Palmer starts from more or less the same points: unstructured (file) data is growing and organizations are using the scalability of the public cloud for several things, bursting compute capacity, bursting storage, archival storage, remote worker access and so forth. | Cloud |
Datanami - AI is Top Digital Priority in the Path to Operational Resilience: Accenture Study | With a talent strategy that mirrors data and digital maturity, enterprises averaged nearly three-times (11%) higher productivity when prioritizing training and specialized skills to address talent needs. This was further echoed by investments being made in new ways of working (cited by 94%) and the 90% of (COO, CIO, CHRO) respondents who plan to increase specialized and technical talent over the next three years. | Artificial Intelligence |
Network World - How to handle IT vendors' worst bad habits | Enterprises also say that vendors often finger-point even when there’s no other network vendor involved, instead blaming the enterprise network operations staff or perhaps some past sales or technical support person now conveniently not working for the vendor any longer. | Network Management |
SiliconANGLE - Is it time to deploy passkeys across the enterprise? Here’s what you need to know | Certainly, it’s about time we moved away from passwords. According to the 2022 Verizon Data Breach Incident Report, 80% of data breaches still begin with a phishing or “man-in-the-middle” attacks, using hijacked account credentials to take over an account. And according to HYPR’s “State of Passwordless Report,” a third of information technology help desk time is spent on password resets. Passkeys can prevent these sorts of attacks and cut down on these support calls. | Security |
VentureBeat - 92% of businesses use AI-driven personalization but consumer confidence is divided | The fourth annual State of Personalization Report by the customer engagement platform revealed that while 62% of business leaders see customer retention as a top benefit of personalization, only 41% of consumers are comfortable with companies using AI to personalize their experiences. | Artificial Intelligence |
ZDNet - AI might enable us to talk to animals soon. Here's how | Decoding animal communication could lead to the development of tools that aid in conservation research with non-invasive methods. Scientists could gain the ability to understand previously undiscovered characteristics of how animals within a species communicate, but also how they hunt, eat, develop relationships with each other, and how they see and process the world around them | Artificial Intelligence |
Network World - Certifications that can land you a job as a network-automation engineer | The first major use case for network automation is DevOps workflows. Given the highly dynamic nature of the modern application stack there are scenarios where adjusting the underlying network for scalability or availability adds value to the application-hosting architecture. | Tech Jobs |
Computerworld - Apple, platform security, and the next big war | He was championing encryption and opposing the creation of designer vulnerabilities that can be exploited by any entity that knows they exist. Since then, we’ve seen a cancerous tumult of surveillance as a service that companies such as the NSO Group break out, each of them using the kind of hard-to-find flaws governments may insist on platform providers creating. | Security |
VentureBeat - AI will unlock a new level of human potential | That may be true, but AI will not take our jobs or destroy the world, though that’s a concern shared by 37% of Americans. If we can embrace AI, it will free humanity of repetitive mental work, open new doors professionally and unleash people’s creativity. This massive technological advance will play a huge role in driving human progress and growing our economies. | Artificial Intelligence |
Computerworld - Generative AI is about to destroy your company. Will you stop it? | If coders lied as often as ChatGPT, they would be fired immediately. Stunningly, some enterprise execs seem to be just fine with that — as long as AI continues to code quickly and for so little money. | Artificial Intelligence |
VentureBeat - Report shows 92% of orgs experienced an API security incident last year | The report, scheduled to release on May 5, also revealed that 57% experienced multiple API security incidents, highlighting that many organizations still have a lot more to do to defend cloud-native applications and APIs against threat actors. | Security |
Forbes - Information Technology’s Treasure Map To The Business Value Of Enterprise Storage | You may think it can take years and years for a storage array to attain an appealing return on investment (ROI) and pay for itself, as you venture into the inefficiency-infested, pitfall-strewn caverns of legacy and conventional enterprise storage. You may think it’s too hard to measure. Can you really know the business value of something so technical as enterprise storage? | Data Storage |
VentureBeat - New AI tools poised to revolutionize 3D engineering | For example, if an architect is looking to put a certain type of room — a laundry room, maybe — inside a house or apartment with a certain floor plan, the AI within the building information modeling (BIM) software will have seen enough successful examples of this being done in other situations to know exactly how to seamlessly make it happen. | Automation & Productivity |
sdxCentral - How a pre-mortem can tell you what’s wrong with zero trust | “I think one of the things we forget is that the modern enterprise is 10 to 20 years of technical depth, pulled forward by the latest cloud, blockchain, AI/ML thing and it’s only the AI/ML thing that we are scared about,” he said. “One of the concerns from a people, process and scope perspective is making sure that we haven’t over rotated, ignoring the existing oftentimes much larger technical base.” | Security |
The New York Times - ‘The Godfather of A.I.’ Leaves Google and Warns of Danger Ahead | Dr. Hinton said he has quit his job at Google, where he has worked for more than decade and became one of the most respected voices in the field, so he can freely speak out about the risks of A.I. A part of him, he said, now regrets his life’s work. | Artificial Intelligence |
Computerworld - As Europeans strike first to rein in AI, the US follows | A proposed set of rules by the European Union would, among other things. require makers of generative AI tools such as ChatGPT,to publicize any copyrighted material used by the technology platforms to create content of any kind. | Artificial Intelligence |
SiliconANGLE - Don’t be fooled by slowing cloud growth: Cost optimization is a feature, not a bug | Hyperscale clouds remain the epicenter of innovation in tech and foundation models such as GPT will only serve to harden this fundamental fact. Our data suggests the deceleration in cloud spend is a function of two related factors: 1) cautious consumption patterns; and 2) aggressive cloud optimization, which is being promoted by the big three cloud vendors in an attempt to lock customers into longer-term commitments. | Cloud |
VentureBeat - Cybersecurity meets AI: Augmenting and accelerating humans | As is often the case with many new and exciting technologies, the perceived short-term impact of the latest news-making developments is probably overestimated. At least that’s my view of the immediate within the narrow domain of application security. Conversely, the long-term impact of AI for security is huge and is probably underappreciated, even by many of us in the field. | Security |
Techrepublic - Google’s 2FA app update lacks end-to-end encryption, researchers find | On April 25, security researchers Tommy Mysk and Talal Haj Bakry, who are known collectively on Twitter as Mysk, warned users of Google’s Authenticator 2FA app to not turn on a new syncing feature. Mysk discovered a flaw in the feature in which “secrets” or credentials shared across devices are not end-to-end encrypted; this could allow attackers or Google to view those credentials. | Security |
ZDNet - Smartphone trends in 2023: Here's what's coming next | As well as the usual advances in processing power, display technology, AI-powered photography and videography, and power management, there's a lot of activity on the form-factor front -- notably with folding and flip-open phones. We may also see the first phone with a rollable screen in 2023. | Tech Trends |
VentureBeat - Tenable report shows how generative AI is changing security research | The research focuses on four new tools designed to help human researchers streamline reverse engineering, vulnerability analysis, code debugging and web application security, and identify cloud-based misconfigurations. | Security |
The Hacker News - Wanted Dead or Alive: Real-Time Protection Against Lateral Movement | Just a few short years ago, lateral movement was a tactic confined to top APT cybercrime organizations and nation-state operators. Today, however, it has become a commoditized tool, well within the skillset of any ransomware threat actor. This makes real-time detection and prevention of lateral movement a necessity to organizations of all sizes and across all industries. | Security |
Computerworld - How to pick the best content services platform for your business | “That’s the biggest challenge I see with most organizations — they think that they’re going to suddenly bring one of these systems in and it’s going to bring everything under control,” he said. “Individuals have to realize that it’s a different way of working and that they have to put all their documents in this repository and they have to set metadata, [for example].” | Automation & Productivity |
Blocks & Files - Backup and security one and the same for CISOs | Essentially, there are three ways to stop attackers. You either prevent them from entering in the first place, or you detect and eliminate them if they get through the defenses. But you’ve got to have a robust recovery strategy in place if the first two fail. So it’s becoming more likely that the CISO’s who understand all three are required will opt for service providers who can deliver each layer. | Security |
eWeek - Tangoe Report: Complexity, Cost Eat Into Cloud Benefits | The survey found that 82% of businesses plan to increase their spend in software as a service (SaaS), unified communications as a service (UCaaS) and infrastructure as a service (IaaS). But almost that same number, 80%, see costs as a challenge with their current cloud deployments. | Cloud |
sdxCentral - 5 most dangerous new attack techniques (yes, they include AI) | Search Engine Optimization (SEO) a new tool for bad guys. Katie Nickels, certified instructor at the SANS Institute, said that from her perspective, search engine optimization (SEO) is a growing risk. To be clear, these are the same basic SEO approaches and techniques that publishers and websites have been using since the dawn of the very first search engines. Though instead of SEO used for positive purposes, it is being abused for nefarious gains by miscreants | Security |
VentureBeat - How post-quantum cryptography will help fulfill the vision of zero trust | Anne Dames of IBM warned that enterprises need to start thinking about which of their systems are most threatened by potential rapid advances in quantum computing. She advised the audience that public key cryptography systems are the most vulnerable ones. | Security |
SiliconANGLE - Ocean’s roar of generative AI and expanding dark web capture security world’s attention at RSA | SANS Institute researcher Stephen Sims described how ChatGPT rejected his initial attempt to write a ransomware attack using the tool. Yet when Sims broke down the request into separate steps, such as writing encryption code and checking for a bitcoin wallet, the AI platform delivered. | Security |
Network World - Who is selling NaaS, and what do you get? | According to IDC analyst Brandon Butler, “NaaS is a cloud-enabled, usage-based consumption model that allows users to acquire and orchestrate network capabilities without owning, building, or maintaining their own infrastructure. | Network Management |
sdxCentral - 10 tips to build a long-lasting career in enterprise IT | There are examples of companies where management suddenly decide to replace its in-house security team with a managed security service provider (MSSP). What appears to be a comfortably secure and long-term career can disappear in a heartbeat. Thus, the cultivation of new technology skills, programming languages and certifications should never stop. | Tech Jobs |
SiliconANGLE - The cybersecurity conundrum: integrated platforms vs. best-of-breed solutions | “You have to keep security policies up to date,” he said. “Some systems pool while some use telemetry, and so you could end up with this inconsistent data. It’s about analyzing the data that you have to be able to find those needles in the stack of needles. If you’re working off your own data set and everything is consistent, you can do that better than if you’re trying to cobble together data sets from multiple vendors.” | Security |
Network World - Aruba banks on integrated security, AI, NaaS for enterprise growth | “What we've heard from customers about NaaS is they want flexibility and agility, and it's not one size fits all,” Hughes said. “And so you have situations like someone that wants to pay all upfront, but they'd love someone to manage it for them or someone that wants to pay over time, but they want to control everything very tightly themselves.” | Network Management |
SiliconANGLE - RSA 2023 and the security identity crisis, part two | The narrative from security vendors is organizations don’t spend enough money on cyber defense. Maybe… but will spending more actually address the problems organizations face? The conventional wisdom is it will help; or at least it can’t hurt. But as we and others have pointed out over the years, a crowded market and mega venture capital funding have created more tools, more complexity and more billionaires… but are we safer? | Security |
Network World - Your decommissioned routers could be a security disaster | Retired enterprise routers—and the sensitive data that's still on them—are showing up on the used-equipment market where attackers could mine them for vulnerabilities to exploit. | Security |
sdxCentral - How to balance security and transparency for responsible AI | One of the keys to this for data scientists and developers is getting the AI models right – and up to date – for use in the real world. Security then can step in and protect the models from intruders intent upon creating mayhem in the networks. For example, as of this month, ChatGPT’s mindstore did not yet include data from 2022 or 2023. | Security |
ZDNet - Generative AI can make some workers a lot more productive, according to this study | A working paper by the National Bureau of Economic Research found that access to generative AI can increase workers' productivity by 14% on average, as measured by the amount of customer issues the agents were able to resolve per hour. | Automation & Productivity |
SiliconANGLE - The future of cybersecurity and AI: An exclusive interview with John Chambers | The importance of data in the AI-driven security landscape shouldn’t be overlooked, as companies will be hesitant to share their data with others, Chambers pointed out. As such, the ability to effectively use and analyze data through AI algorithms will become increasingly important. | Security |
sdxCentral - RSA on how to use 'good AI' to beat 'bad AI' in next-gen identity authentication | “Just having credentials to log on is not sufficient anymore,” Taylor told SDXCentral. “You need more than that. We are starting to see things like AI malware. People are using AI engines for hacking, which is a terrifying prospect – because when you think about the most predominant AI, it’s in social platforms. | Security |
VentureBeat - KPMG: US executives unprepared for immediate adoption of generative AI | Generative AI has become a buzzword among executives and boards, as the technology has become increasingly accessible. However, organizations are struggling to keep up with its rapid development. The KPMG survey found that less than 50% of respondents believe they have the necessary technology, talent and governance to implement generative AI successfully. | Artificial Intelligence |
Computerworld - Schools look to ban ChatGPT, students use it anyway | ChatGPT and other generative AI technologies are already being used by students to write essays and answer questions posed by teachers and professors, and academia must learn to incorporate and not ban these new tools, experts say. | ChatGPT |
SiliconANGLE - Beyond the firewall: Exploring AI-driven security and the future of hybrid work | Another key focal point is the increasing significance of AI in security, which will lead to three fundamental changes: altering the user experience, improving the efficacy of security and increasing the efficiency of security professionals. AI will help drive a platform approach to security, allowing for better correlation across multiple domains and providing an end-to-end picture of security threats. | Security |
VentureBeat - For recession-proof security spending, embrace the value of multi-layered integrations | Two-thirds (66%) of respondents in Mimecast’s newly released State of Email Security Report 2023 said their organization’s cyber-defense budget is less than it should be. The sentiment reinforces a similar tone from the annual report’s 2022 version, which found that respondents with a reduced cyber budget were nearly united (95%) in agreeing their organization’s cyber-resilience was impaired. | Security |
ZDNet - ChatGPT's 'accomplishment engine' is beating Google's search engine, says AI ethicist | For example, millions of users add "site:reddit" to their search queries to find authentic opinions and experiences from Reddit rather than commercial content optimized for Google. And, the rise of TikTok as a search alternative among Gen Z users and the emergence of generative AI-like chatbots have also challenged traditional search methods by surfacing social video content that doesn't originate from Google-owned YouTube | Search |
Datanami - Report: Cloud Managed Services Market Worth $164B by 2027, Growing at a CAGR of 10.6% | The government sector is spending on cloud to drive digital transformation and to serve citizens with better processes. The increasing need for managed services in this sector is driven by the lack of skilled professionals and a limited IT budget. | Cloud |
VentureBeat - 6 tips for combatting vendor lock-in and the data gravity challenge | This is exacerbated when vendors make it difficult, costly or nearly impossible to move data to another solution provider’s service. The larger the dataset and the more services that are used, the harder and more expensive it is to move. This phenomenon is referred to as “data gravity.” | Data Management |
Datanami - Active Archive Alliance 2023 State of the Industry Report Now Available | At the center of an active archive resides an intelligent data management system. This software system plays the central role of automatically placing data where it belongs for cost, performance and workload priorities. The data management layer uses technologies such as metadata and global namespaces to make data accessible, searchable and retrievable on whatever storage platform or media it may reside. | Data Management |
VentureBeat - How Veza helps companies map data access and stop insider threats | In fact, research shows that insider threats are incredibly common. Cyberhaven found that nearly one in 10 employees (9.4%) will exfiltrate data over a six-month period, with customer data (44.6% of incidents) and source code (13.8%) being the most common assets leaked. | Privacy & Security |
Threecolts - Social Media Statistics You Need to Know in 2023 | TikTok was the most popular iPhone app in the United States in 2021, while 26 percent of the entire US adult population gets news from YouTube. Further, the Pew Research Center study established that 59 percent of respondents consider YouTube an important source of news, while Facebook remains the most-used social network for news. | Social Media |
sdxCentral - Big changes coming to Kubernetes cloud native networking | Other limitations of the Ingress API outlined by Utt include an insufficient permissions model and a focus largely only on HTTP traffic. The challenges of the Ingress API have been well known in the cloud native community for several years, which has led to the development of a replacement known as the Gateway API. | Network Management |
VentureBeat - How to vet your vendors: Ensuring data privacy and security compliance | A company’s compliance record is only as strong as its weakest link, so they must vet and approve any potential vendors and partners before signing on to work with them, as well as assess their existing vendors to confirm that they are data compliant. | Data Privacy |
Computerworld - Do the productivity gains from generative AI outweigh the security risks? | Using generative AI to code is dangerous for a variety of reasons, but its efficiencies will tempt corporate leaders — especially CIOs and business execs — to use it anyway. A senior AWS executive at Amazon argues the decision doesn’t have to be an either/or calculation. | Artificial Intelligence |
SiliconANGLE - Dissecting Gartner’s new Security Service Edge Magic Quadrant | One notable point in the Gartner definition is the inclusion of visibility or digital experience management, which hasn’t historically been part of security. IT leaders have been laser-focused on employee and customer experience and the ability to monitor the performance of apps is critical today. A security platform is ideally suited to provide visibility as it sees every packet that traverses the network and can infer application and user experience. | Security |
Computerworld - Global cloud spending expected to jump 21.7% as IaaS leads the way | Nag said that the next phase of IaaS will also be driven by emerging technologies, particularly as applied to customer experience. He explains that many of these technologies also help businesses interact better with their customers in real time, for example with generative AI-powered chatbots, and are reliant upon cloud infrastructure and platform services to meet growing demands for compute and storage power. | Cloud |
InfoWorld - Why generative AI will turbocharge low-code and no-code development | While early results show that ChatGPT can be helpful — including for reviewing code — developers programming complex applications will likely never be able to entirely offload coding to AI tools. Generative AI, however, is poised to revolutionize use of low-code and no-code development environments, analysts said | Artificial Intelligence |
VentureBeat - Why data gravity is helping cloud providers become cybersecurity companies | At its core, cybersecurity is a data problem. First, it is data that is being secured, and second, whoever has the security data has the ability to find patterns, identify anomalies and generate useful insights. All this makes it surprising that not everyone in the industry has heard and understands the role of the data gravity effect. | Security |
TechStartups - Google CEO Sundar Pichai warns: Society is not prepared for the impact and rapid advancement of AI | “We need to adapt as a society for it,” Pichai told Pelley, adding that jobs that would be disrupted by AI would include “knowledge workers,” including writers, accountants, architects, and, ironically, even software engineers. | Artificial Intelligence |
Datanami - Generative AI Benchmark Report: Banking & Retail Lead the Way in Harnessing This Tech | The Conversica Conversation Index Report delves deeply into the performance of the GPT wave, measuring the results of generative AI-powered conversations applied to revenue-focused outcomes across industries, geographies, and specific use cases in Marketing, Sales and Customer Success (CS) environments | Artificial Intelligence |
VentureBeat - Report: Security teams take an average of 6 days to resolve alerts | In any case, the report highlights that many security teams are making the same mistakes, which are leading to alert generation. For instance, 80% of alerts are triggered by just 5% of security rules in most organizations’ cloud environments. | Security |
Blocks & Files - Gartner anoints file systems and object storage ‘peer insights’ winners | Analyst house Gartner says its customers have listed the companies they think are above average distributed file systems and/or object storage suppliers. Topping the list was Huawei, MinIO, Nutanix, Pure and WEKA. | Data Storage |
The Verge - Social media is doomed to die | Users want what the platform was originally for — be it ephemeral messaging, sharing photos, or otherwise. Surprising, energized spaces to connect with friends in a new way. But these use cases inevitably have a limit. You can only post so many photos. You only have so many friends to message. And for investors and advertisers, that’s a problem. | Apps |
VentureBeat - Report finds 82% of open-source software components ‘inherently risky’ | Lineaje also found significant risk among widely-used open-source solutions, analyzing the top 44 popular projects of the Apache Software Foundation and discovering that 68% of dependencies are from non-Apache Software Foundation open-source projects, many with opaque origin and update mechanisms. | Security |
Datanami - ManageEngine Study Reveals Observability and AIOps Knowledge Gap Hinders Customer Experience Improvements | The primary challenge with observability was a lack of understanding. More than 57% of the IT decision makers who responded stated that their organization was not fully familiar with the concept of observability. Similarly, more than 65% of respondents said their organizations lacked a proper understanding of AIOps and its use cases. | Automation & Productivity |
VentureBeat - Why unifying endpoints and identities is the future of zero trust | Attackers are cashing in on the proliferation of new identities being assigned to endpoints and the resulting unchecked agent sprawl. Scanning every available endpoint and port, attackers are automating their reconnaissance efforts using AI and machine learning, and enterprises can’t keep up. | Security |
Computerworld - Q&A: How 2023 college grads can boost chances of finding their IT dream job | In 2023, there is a skills mismatch, according to Tarner. That is, the tech job marketplace has changed and employers want candidates with less conventional soft skills, along with technical skills not typically attained in a brick-and-mortar classroom. | Tech Jobs |
sdxCentral - Generative AI like ChatGPT fuels sophisticated phishing attacks | The team analyzed 280 billion daily transitions and 8 billion daily blocked attacks over 2022 and found a nearly 50% increase in phishing attacks compared to 2021. Additionally, the education sector emerged as the most targeted industry, followed by finance and insurance, and government in 2022. | Privacy & Security |
SiliconANGLE - Akamai research finds application and API attacks jumped 137% in 2022 | 2022 was found to be a record-breaking year for application and API attacks, with the 137% increase said to be a major concern as organizations are adopting more web applications and APIs to enhance their business and increase ease of use for customers. The report found that Local File Inclusion remains the top attack vector, with year-over-year growth of 193%. | Security |
VentureBeat - Much ado about generative AI: The money, the potential, the pitfalls | “Models like Stable Diffusion and ChatGPT are setting historical records for user growth, and several applications have reached $100 million of annualized revenue less than a year after launch. Side-by-side comparisons show AI models outperforming humans in some tasks by multiple orders of magnitude. | Artificial Intelligence |
ZDNet - Generative AI is changing your technology career path. What to know | AI -- and generative AI, which creates content from training data -- will impact technology careers in two ways. As a tool, AI will boost professionals' productivity and capabilities. At a business level, the growth in automation means increased demand for AI-specific skills to design, build, and maintain such systems. | Tech Jobs |
Datanami - New IBM Study Reveals Inadequate Data Hinders Progress Against ESG Goals | The study* reveals that surveyed executives point to inadequate data (41%) as the biggest obstacle to their ESG progress, followed by regulatory barriers (39%), inconsistent standards (37%) and inadequate skills (36% | Sustainability |
SiliconANGLE - Taming complexity: A holistic approach to multicloud management | By presenting end-to-end solutions, Aria eliminates the need for going from one app to another, according to Padmanabhan. For instance, Aria Guardrails makes multicloud seamless by dealing with log-ins and credentials. | Cloud |
Computerworld - How will Apple help IT manage third-party app stores? | I very much hope that Apple will create an API developers of device management software can use to allow IT to disable access to third-party app stores, or at least to limit such access to only those that have passed security policy review. | IT Management |
SiliconANGLE - Report: Google is racing to build a new, AI-powered search engine to stave off ChatGPT | Google has reportedly been in a frenzy since last December, when executives first realized the significance of OpenAI LP’s ChatGPT and how it could pose a challenge in search. The threat to Google’s decades-long dominance of the search industry only increased in February, when Microsoft Corp. announced plans to integrate ChatGPT with Bing. | ChatGPT |
ZDNet - Future ChatGPT versions could replace a majority of work people do today, says Ben Goertzel | Goertzel also commented on the difference between AI models considered "narrow" and those that are AGI, emphasizing that AGI would be capable of human-like thinking and creativity. He noted that developers are closer to achieving AGI than ever before. | ChatGPT |
VentureBeat - Why privacy-preserving synthetic data is a key tool for businesses | As cleverly as synthetic data is created, it can just as easily be reverse-engineered to extract personal data from the real-world samples used to make it. This can, unfortunately, become the doorway hackers need to find, manipulate and collect the personal information of user samples. | Data Privacy |
sdxCentral - How AI will drive the metaverse (and vice versa -- eventually) | Notably, Illenberger sees AI being used in the creation of virtual worlds, objects and characters. For example, AI algorithms can generate realistic environments, creatures, and objects. This can reduce manual demands on human artists and designers. | Artificial Intelligence |
SiliconANGLE - RSA 2023 highlights a cybersecurity identity crisis in the age of AI | There’s little doubt that attackers will use GPT to develop more sophisticated and better-written phishing techniques and increasingly clever evasion methods. As well, adversaries will use AI to better target high-value assets and sniff out those that are most exposed. | Security |
VentureBeat - How mass layoffs can create new risks for corporate security | “Insider threat risk includes theft of sensitive data, embezzlement, sabotage of critical systems, creation of backdoors into corporate environments or even causing reputational harm.” | Security |
sdxCentral - What ChatGPT does for data automation – and what it doesn’t | Although they are “growing intelligence pretty fast,” Goren warned that users should be aware that these natural language processors are capable of hallucinating information. ChatGPT is a writer of fiction and nonfiction mixed together. It can choose either of those roles depending on what it thinks is going to give users the best “human readable answer.” | ChatGPT |
VentureBeat - Everywhere and nowhere: Metaverse leaders plan for data centers on a whole new scale | “I believe that the infrastructure that we need to build out is going to be different for the metaverse as a whole compared to the data centers we have today. There are going to be differences even within these two classes of the metaverse, the consumer one and the industrial metaverse.” | Metaverse |
SiliconANGLE - C3 AI’s Tom Siebel sees power and peril in AI’s march to the mainstream | It’s hugely disruptive, as were the printing press and the production line. Did the steam engine that drove the Industrial Revolution eliminate jobs? Absolutely, but it created 1,000 jobs for every guild craftsman’s job it eliminated. Will AI eliminate jobs? Absolutely, and I think for every job that’s eliminated it’s going to create 100 others just like every other technological change. | Artificial Intelligence |
VentureBeat - CISA pressures tech vendors to ship secure software ‘out of the box’ | The guidance, a report named “Shifting the Balance of Cybersecurity Risk: Principles and Approaches for Security-by-Design and -Default,” aims to “encourage every technology manufacturer to build their products in a way that prevents customers from having to constantly perform monitoring, routine updates, and damage control on their systems.” | Security |
sdxCentral - Palo Alto Networks joins Netskope, Zscaler as ‘leaders’ in Gartner SSE Magic Quadran | Gartner named Netskope and Zscaler as “leaders” for the second year in a row in its annual Magic Quadrant ranking of security service edge (SSE) vendors, while Palo Alto Networks replaced McAfee Enterprise (rebranded as Skyhigh Security last March) in that prestigious quadrant for the first time. | Security |
VentureBeat - Managing machine identities in a zero-trust world | The typical enterprise has 45 times more machine identities than human ones — and many organizations don’t even know exactly how many they have. More than six in 10 enterprises are unsure of their organization’s key and certificate count, up 17% from last year. | Security |
AiThority - Unveiling SnapGPT: Impact of GPT-4 on Data and App Integration | So far we are extremely impressed with the improved accuracy of the GPT-4 responses. It is worth noting that GPT-4 is currently more expensive per token (prompt length) and slightly slower in response generation. That said, the cost and time seem justified for the improved response accuracy. | Artificial Intelligence |
VentureBeat - ChatGPT can turn toxic just by changing its assigned persona, researchers say | The study — which the researchers say is the first large-scale toxicity analysis of ChatGPT — found that the large language model (LLM) carries inherent toxicity that is heightened up to six times when assigned a diverse range of personas (such as historical figures, profession, etc). | Artificial Intelligence |
sdxCentral - Guess what? Email security is still a problem – BEC attacks on the rise | While many organizations rely on the native security capabilities of their cloud email providers, the report found that’s often not nearly enough. According to the report, 77% of business email compromise (BEC) attacks were able to bypass the built-in protection layers email providers have in place. BEC overall rose by 72% year over year, according to the report. | Security |
Blocks & Files - StorPool: The traditional SAN is dead. Arise, software-defined multi-controller block storage | The traditional SAN, which is a dual-controller, shared disk system is just too inflexible. What happens if six months after you install your building block, you realize you need lower latency or higher capacity? How do you do that without breaking up your building blocks? | Data Storage |
Computerworld - Down in Q1, US IT job market rebounded slightly in March: Report | “Layoffs at big tech companies are having an adverse on overall IT hiring,” Janco CEO Victor Janulaitis said in the report. “More CIOs are looking at a troubling economic climate and are evaluating the need for increased headcounts based on the technological requirements of their specific business operations.” | Tech Jobs |
Network World - 3 ways network teams can influence SASE decisions | Unfortunately for the network team—and the enterprise—all the energy for SASE being centered on cybersecurity means that network staffs and network functions can get short shrift in the selection process, with the staff being looped in as an afterthought or included only in the final selection via a proof-of-concept deployment. | Network Management |
Datanami - Progress Research Study: 65% of Organizations Suffer from Data Bias | Biases are often inherited by cultural and personal experiences. When data is collected and used in the training of machine learning models, the models inherit the bias of the people building them, producing unexpected and potentially harmful outcomes | Data & Analytics |
sdxCentral - What is technical debt? And 3 ways to overcome it | A 2023 IDG survey found that tech debt has become the No. 2 issue for IT executives, second only to skills shortages. IDG defines tech debt as “the measure of the cost of reworking a solution caused by choosing an easy, yet limited, solution.” | It Management |
VentureBeat - Clearing visibility and unifying security tools with a cloud-native application protection platform (CNAPP) | Cloud-native application protection platforms (CNAPPs) aim to declutter and streamline this landscape. A CNAPP pulls multiple security and protection capabilities together into one single platform to help identify risk across a cloud-native application and its infrastructure. | Security |
TechStartups - Tech startup funding plunges by 55%, deepening fear of another dot-com bubble burst | According to a recent report by Bloomberg, startups in the US raised only $37 billion from VCs in the first quarter, the lowest in 13 consecutive quarters. Citing new data from research firm PitchBook and the National Venture Capital Association, the report stated that the first quarter marked the lowest number of deals, fewer than 3,000, in five years as nervous investors reduced the size of their checks to startups. | Tech Trends |
VentureBeat - How machine learning can help crack the IT security problem | While digital transformations and cloud migrations are undoubtedly smart decisions that all organizations should make (and those that haven’t yet, what are you doing!), security systems meant to protect such IT infrastructures haven’t been able to keep pace with threats capable of undermining them. | Security |
Computerworld - How many jobs are available in technology in the US? | Technology employment across all industry sectors increased by an estimated 197,000 positions for the month, according to CompTIA’s analysis of BLS data. “This represents the highest level of employer hiring activity as measured by job postings in seven months,” CompTIA said in its Tech Jobs Report. | Tech Jobs |
ZDNet - 'OpenAI is product development, not AI research,' says Meta's chief AI scientist LeCun | "OpenAI pivoted from an AI research lab that was relatively open, as the name indicates, to a for-profit company, and now a kind of contract research lab mostly for Microsoft that doesn't reveal anything anymore about how they work, so this is product development; this is not R&D." | Artificial Intelligence |
VentureBeat - Top three computer vision trends to follow in 2023 | Many of us interact with computer vision applications every day, from Apple’s Face ID and Tesla Autopilot to the Meta Quest and Google Lens. Computer vision gives machines the ability to “perceive” the world like humans do and use that knowledge to augment human efforts. The potential is immense, and analysts agree: The computer vision market is expected to expand to $9.62 billion according to research from Report Ocean. | Tech Trends |
SiliconANGLE - How vVols are breaking traditional storage barriers | Despite vVols being mostly on-prem, they aid in the cloud migration journey, depending on the storage framework, according to Massae. vVols are also a perfect fit for enterprises adopting a cloud service-provider model. | Data Storage |
Computerworld - Global IT spending forecast to rise 5.5%, fueled by software, services | The software category is predicted to show the largest year-on-year growth figures in Gartner’s forecast, at 12.3%. That’s driven largely by analytics and business intelligence, as well as custom applications for work, Lovelock said. | Tech Trends |
TechRepublic - More phishing campaigns are using IPFS network protocol | IPFS identifies files by their content rather than their location. Each file is given a unique cryptographic hash called CID; the content identifier can be used to retrieve the file from any node on the network that stores a copy. This makes it easy to distribute and access content, even if the original source is offline or unavailable. | Security |
AiThority - New Prediction: ChatGPT Content Would Flood Social Media Platforms | By combining your first party data from CDPs and CRMs, you can generate customer-centric posts that resonate better with the audience from specific age-groups. From identifying their social media conversations to describing their conversations, ChatGPT can turn your social media efforts into a powerful communication channel. | ChatGPT |
VentureBeat - Meeting the challenge of skill gaps in the age of digital transformation | The biggest trend is upskilling technology literacy for previously non-technical workers, as the number of digital solutions proliferate in workers’ daily lives — cloud-based tools or automation-focused tools, for instance. The other growing gap is in the cloud space. | Tech Jobs |
eWeek - Real-Time Data Management Trends for 2023 | Real-time data management is the application of intelligence to data as soon as it’s created or acquired, rather than being stored for later analysis. Data is processed and forwarded to users as soon as it’s collected – immediately without any lag. | Data Management |
Computerworld - Should we do more business with our iPhones? | Even simple tasks such as expense tracking, simple document editing, or time sheet recording are mostly done on other devices, which suggests the scale to which iPhone-toting knowledge workers aren’t fully exploiting the full potential of their device. What makes this particularly odd is that when handling personal "stuff," most people already engage in bill payments, online shopping, and equivalent tasks. | Automation & Productivity |
sdxCentral - Direct-path attacks skyrocket, now represent half of DDoS attacks | Netscout released its annual DDoS Threat Intelligence Report this week, revealing a number of new trends as threat adversaries have shifted tactics as part of a never-ending game of cat and mouse with network defenders. Looking at aggregate traffic, Netscout reported that it saw peak DDoS alert traffic hit a staggering high of 436 petabits (a petabit is one million gigabits) in a single day. | Security |
Computerworld - Pausing AI development is a foolish idea | The right approach would be to create such an authority beforehand, so there’s some way to assure the intended outcome. I tend to agree with former Microsoft CEO Bill Gates that the focus should be on assuring AI reliability, not trying to pause everything. | Artificial Intelligence |
AiThority - New Bitdefender Survey Reveals Top Cybersecurity Challenges and Concerns for Businesses Globally | “The results of this survey demonstrate, more than ever, the importance of layered security that delivers advanced threat prevention, detection and response across the entire business while improving efficiencies that allow security teams to do more with less.” | Security |
CSO - UK data regulator issues warning over generative AI data protection concerns | Almond also said that, for organizations processing personal data for the purpose of developing generative AI, there are various questions they should ask themselves, centering on: what their lawful basis for processing personal data is; how they can mitigate security risks; and how they will respond to individual rights requests | Data Privacy |
sdxCentral - Gartner's Top 8 Security Predictions: CISOs Will Focus on Individuals | The analysts forecast that half of CISOs will adopt human-centric design for their security programs by 2027 to minimize operational friction and maximize control adoption. This approach prioritizes the individual over technology, threat, or location as a recent Gartner research showed that over 90% of employees admitted they knowingly engage in unsecured actions, despite being aware of the risks. | Security |
Network World - 3 ways network teams can influence SASE decisions | Unfortunately for the network team—and the enterprise—all the energy for SASE being centered on cybersecurity means that network staffs and network functions can get short shrift in the selection process, with the staff being looped in as an afterthought or included only in the final selection via a proof-of-concept deployment. | Network Management |
SiliconANGLE - OpenAI details how it’s striving to improve the accuracy and safety of its AI systems | At the same time, blocks have been implemented to prevent its systems from generating hateful, harassing, violent or adult content. These are being improved continuously, and GPT-4 is said to be 82% less likely to respond to requests for disallowed content than its previous model, GPT-3.5. | Artificial Intelligence |
sdxCentral - Low code/no code solves skill shortages, but there’s a catch | DevOps engineers are “really, really hard to find,” said Venkat Thiruvengadam, CEO of DevSecOps software provider DuploCloud. “It’s this unique skill set where you need to be a developer and you need to be an operator – and operator also means being aware of security and compliance and whatnot, especially in the SaaS world.” | Tech Jobs |
ZDNet - ChatGPT is more like an 'alien intelligence' than a human brain, says futurist | Despite the awe-inspiring potential, Rosedale highlighted that current AI models are limited by their ability to read and write to memory at the same time -- resulting in "zombie AIs" that cannot listen and reason like humans. | Artificial Intelligence |
VentureBeat - MLPerf Inference 3.0 results show 30% performance gain across multiple vendors | Among the vendors that participated in the MLPerf Inference 3.0 effort are Alibaba, ASUS, Azure, cTuning, Deci, Dell, GIGABYTE, H3C, HPE, Inspur, Intel, Krai, Lenovo, Moffett, Nettrix, Neuchips, Neural Magic, Nvidia, Qualcomm, Quanta Cloud Technology, rebellions, SiMa, Supermicro, VMware and xFusion. | Automation & Productivity |
AiThority - Coosto Predicts Their ChatGPT Integration Will Create 90% Of All Social Posts | Coosto announced its integration with ChatGPT technology, which allows Coosto users to produce fully automated content linked to their brand and relevant market trends. The ChatGPT Content Generator takes into account factors such as message length per platform, tone of voice, market trends, language, and sentiment. | ChatGPT |
Datanami - New Unravel Data Survey Finds Two Thirds of Data Teams Report Cloud Spending as Critical KPI | “In just the course of a year we’ve seen a significant shift in how these growing, cross-functional teams are prioritizing DataOps as an established discipline across their organizations in a similar way that DevOps became an entrenched practice among software teams a decade ago. But despite this progress, this year’s survey also demonstrates that issues like FinOps, cloud utilization, and data security continue to present unique challenges to data teams.” | Data Management |
sdxCentral - Unlocking the encryption dilemma: How AI/ML-powered deep packet inspection brings visibility to encrypted traffic | Threat adversaries are increasingly hiding attacks in encrypted data traffic. Encryption also makes it significantly more difficult for organizations to protect against compliance issues and potential data loss. The unfortunate reality for many organizations is that encryption poses challenges such as reduced visibility and control, which can disrupt networks that heavily depend on deep insights to manage and secure their assets. | Privacy & Security |
VentureBeat - 4 high-paying tech jobs to know about this week | Machine learning is another area that unsurprisingly pays well. Comprehensive.io’s data indicates that a Machine Learning Scientist can earn around $133,000 at the lower end of the scale, right up to $630,000. | Tech Jobs |
Network World - Colocation vs. cloud: SEO firm finds cloud to be cost prohibitive for its high density computing | There’s a wide swath of colocation providers, ranging from firms with just a few locations to global giants like Equinix. According to Allied Market Research, the colocation market was worth $46 billion in 2020 and is projected to top $202 billion by 2030, growing at a CAGR of nearly 16% from 2021 to 2030. | Cloud |
VentureBeat - Zero trust for web and application access: Developing a cybersecurity playbook for BYOD and beyond | “Recessions make the revenue risk aspects of a zero-trust business case real, showing why securing browsers deserves urgency.” More than anything else, CISOs from the banking, financial services and insurance industries fear inbound attacks aimed at exploiting browsers’ weaknesses to launch sophisticated phishing and social engineering attacks. | Security |
SiliconANGLE - Semiconductors rebound, but enterprise tech spending remains soft | The catalyst for this Breaking Analysis was a research post SPEAR put out on LinkedIn asking if the semi rebound spells good news for broader enterprise software. In that note, SPEAR showed the chart above which is pretty self-explanatory – you have Nvidia, AMD and the SOXX ETF significantly outperforming two names SPEAR owns, Snowflake and Zscaler. | Tech Trends |
Computerworld - Ransomware as a service? Windows users can still fight back. | Beyond that, attackers are also targeting search results for the information tools IT teams need to do their job. A search result could, for example, point admins to a malicious tool that tricks them into installing a potential back door. That access is then sold on the black market. | Security |
Datanami - Compute and Storage Cloud Infrastructure Spending Stays Strong as Macroeconomic Headwinds Strengthen in Q4 of 2022, IDC Reports | Spending on shared cloud infrastructure reached $16.8 billion in the quarter, increasing 18.5% compared to a year ago. For the full year in 2022, spending on shared cloud infrastructure totaled $61.5 billion, growing 20.1% year over year. IDC expects to see continuous strong demand for shared cloud infrastructure, which is expected to surpass non-cloud infrastructure in spending in 2023. | Cloud |
VentureBeat - The strange new world of AI power, politics and the ‘pause’ | The AI Beat | No longer are AI debates just about technology, or science, or even reality. They are also about opinions, fears, values, attitudes, beliefs, perspectives, resources, incentives and straight-up weirdness. | Artificial Intelligence |
SiliconANGLE - Netscout finds DDoS attacks have jumped almost sixfold since 2019 | The report’s highlights include peak distributed denial-of-service alert traffic reaching as high as 436 petabits and more than 75 trillion packets in a single day. Service providers are said to have rigorously scrubbed a large percentage of this traffic, while enterprises eliminated an additional daily aggregate average of 345 terabytes of unwanted traffic. | Security |
AiThority - Conversational AI is Now the Heart of Customer Experience | With multiple names, including bot, chatbot, agent assist, virtual agent (VA), or intelligent virtual assistant (IVA), CAI provides self-service options for customers and assistance to employees across the front and back office, creating a hybrid digital/human workforce. | Automation & Productivity |
SiliconANGLE - Splunk report finds security leaders are seeing increased cyberattacks and outages | Key findings from the report include bad actors going unnoticed on corporate networks for extended periods of time. Disturbingly, respondents reported that, on average, more than two months go by from when a bad actor gains access to when businesses become aware of the intrusion. | Security |
AiThority - Why We Need to Ban ChatGPT in Elementary Schools | Problem-solving, critical, creative, and strategic thinking are essential skills required by employers in any field. Writing papers and solving complex word problems are just some examples of how students develop these skills. Yet the use of the chatbots makes this effort no longer necessary. | Artificial Intelligence |
VentureBeat - How microservices have transformed enterprise security | Microservices have upended this paradigm. They allow DevOps to ring-fence security flaws or concerns and address them without worrying about breaking their entire application stack. This doesn’t just mean a quicker turnaround for security patches, but more resilient and efficient DevOps teams and IT stacks overall. | Security |
Computerworld - Should we fear the rise of artificial general intelligence? | The expectation is that GPT, which stands for Generative Pre-trained Transformer, will advance to become GPT-5 — and that version will be an artificial general intelligence, or AGI. AGI represents AI that can think for itself, and at that point, the algorithm would continue to grow exponentially smarter over time. | Artificial Intelligence |
ZDNet - ChatGPT's intelligence is zero, but it's a revolution in usefulness, says AI expert | While it's easy to be impressed by AI's ability to perform tasks like natural language processing, Kaufman argued that large language models like GPT-3 merely mimic intelligence without truly possessing it. In particular, they lack the capacity to tackle challenges they have yet to encounter before. | Artificial Intelligence |
VentureBeat - The role missing from the tech company C-suite | Additionally, it’s an important focus for companies because at least 70% of developers feel they substantially or completely influence purchasing decisions, with 87% of companies consulting developers during the procurement process, and 91% of developers saying it matters that they are consulted. | IT Management |
Datanami - NetApp’s 2023 Cloud Complexity Report Highlights Shifting Demands of a Multicloud Environment | Data complexity has reached a boiling point for companies globally, and tech executives are feeling the pressure to contain its impact on the business. However, technical and organizational challenges may stunt their cloud strategies, with 88% citing working across cloud environments as a barrier, while 32% struggle just to align on a clear vision at the leadership level. | Cloud |
Computerworld - Being future ready in a generative AI world | So how do leaders prepare for change at this speed? Both CEOs said success depends on a laser-like focus on the customer; understand how they’re adapting the technology, how it affects hybrid work (which both feel is here to stay), and then develop and modify plans for future products and services accordingly. | Artificial Intelligence |
ZDNet - Job scams powered by ChatGPT could try to rob you. How to protect yourself | But as generative AI becomes more advanced, chatbots like ChatGPT can be leveraged to write impressively accurate job descriptions. If a job scammer uses AI to write a job description, you'll have to pay closer attention to the recruiter's identity to determine if the listing is fake. | Security |
Tech Republic - Ransomware attacks skyrocket as threat actors double down on U.S., global attacks | The NCC Group also reported that ransomware LockBit 3.0 was the leading arrowhead, with the eponymous threat group having launched 129, or 54%, of ransomware salvos last month, including an attack on the U.K.’s Royal Mail. The security group reported that LockBit’s targeting of utilities, health care and consumer staples escalated it to the top three threat actors for the first time, with 20 incidents, a 150% increase in victims in this sector since January. | Security |
VentureBeat - Securing cloud tech stacks with zero trust will drive growth of confidential computing | Board members on risk management teams recall Meltdown and Spectre vulnerabilities that target processors that rely on branch prediction and advanced speculative actions. CIOs and CISOs say boards need to see pilot data and simulated attacks thwarted before they go into production with confidential computing. | Security |
SiliconANGLE - Goldman Sachs report says AI could put 300 million jobs at risk | The researchers figure that one of the biggest disruptions will be for people who do administrative jobs. They predict 46% of tasks in this milieu will be automated with AI. Some 44% of jobs will go in legal professions, they added. Other industries greatly affected will be architecture and engineering (37%), business financial operations (35%), community and social services (33%) and management (32%) | Artificial Intelligence |
Blocks & Files - Samsung forecasts petabyte SSD in a decade | Samsung exhibited a prototype 128TB SSD at last year’s August Flash memory Summit in San Jose, calling it a petabyte “scale” SSD. This used QLC (4 bits/cell) NAND, supported zoned name spaces and came with a PCIe/NVMe interface. | Data Storage |
sdxCentral - Ransomware Attacks Target Critical Infrastructure – And It’s Paying Off | In IT, tech and telecom, 69% of attacks originated via email, 56% by web traffic or web apps, and 39% by network traffic. | Privacy & Security |
AiThority - Escalating Security Gaps and Costly User Experience Issues Exposed, With Three out of Four Attack Vectors Connected to Authentication | This third annual edition reveals that insecure authentication is a primary cause of cyber breaches and that cumbersome login methods take an unacceptable toll on employees and business productivity. Respondents indicate that a passwordless approach would increase productivity (45%), improve user experience (86%), strengthen security (86%) and accelerate adoption of multi-factor authentication (42%). | Security |
sdxCentral - Microsoft, OpenAI Copilot Security to Aid ‘But Not Replace’ Human Analysts | Forrester analysts pointed out that currently, the security industry is inundated with misleading marketing claims such as “autonomous SOCs,” “AI assistants,” and “AI analysts.” However, Microsoft Security Copilot finally made AI do more than enhance threat detection. | Security |
Network World - Predictive networking promises faster fixes | The integration of AI tools into predictive network technology also has the potential to be an economic game-changer. "With mature AI and ML tools at their disposal, service providers and organizations alike can reduce the costs of problem discovery and resolution," | Network Management |
TechStartups - Impact of technology and social media on mental health: Here are the top 10 predictions for the future | The results of this survey suggest that the lifestyle presented in “The Social Dilemma” may not be as far-fetched as we thought. With issues of misinformation and fake news, it’s important to take a critical look at how we use social media and what impact it may have on our society in the future. | Tech Trends |
VentureBeat - GPT-4 kicks AI security risks into higher gear | CyberArk, meanwhile, was able to bypass filters to create polymorphic malware, which can repeatedly mutate. CyberArk also used ChatGPT to mutate code that became highly evasive and difficult to detect. | Security |
eWeek - Chat GPT vs. Google Bard: Generative AI Comparison | Chat GPT wins on overall feature set, but Google Bard wins on computational resources. And don’t expect Google to accept overall second place. It is throwing a lot of resources at the AI competition. | Artificial Intelligence |
Datanami - Virtana Releases Latest State of Multi-Cloud Management Report | The report found that 83% of IT leaders are using more than one cloud service provider (CSP), and 44% are using more than three CSPs. The survey results demonstrate growing management and data complexities that come from the high number of cross-provider interactions. | Cloud |
Scientific American - Wearable Brain Devices Will Challenge Our Mental Privacy | A last bastion of privacy, our brains have remained inviolate, even as sensors now record our heartbeats, breaths, steps and sleep. All that is about to change. An avalanche of brain-tracking devices—earbuds, headphones, headbands, watches and even wearable tattoos—will soon enter the market, promising to transform our lives. And threatening to breach the refuge of our minds. | Privacy & Security |
VentureBeat - Why SASE will benefit from faster consolidation of networking and security | Seventy-five percent of enterprises are pursuing vendor consolidation, up from 29% just three years ago, with secure access service edge (SASE) experiencing significant upside growth as a result. SASE is also proving effective at improving enterprise security postures by providing zero trust network access (ZTNA) at scale. | Security |
sdxCentral - 5G FWA Potential Remains Robust Despite Tech Concerns | The research firm noted the capability for 5G technology to support quality of service (QoS) requirements tied to unlimited data offerings will bolster support for FWA services. Increased spectrum support and enhanced antenna beamforming technology will also allow 5G-based FWA services to compete more directly from a performance perspective with wireline-based broadband services. | 5G |
Computerworld - How Microsoft became tech’s top dog again | But the move involved a lot more than that. It represented Nadella’s recognition that the future of AI wasn’t in smart assistants like Cortana, Siri, and Alexa. Instead, he saw the future of AI — and possibly the future of computing — would be in generative AI like what is now ChatGPT. | Artificial Intelligence |
VentureBeat - How to prepare for a world without passwords | So what is a passkey, and why is it different? A passkey is a passwordless credential, where the website and the authenticator are communicating by exchanging keys. These cannot be seen or accessed by humans, removing all human-related risks of password usage. | Privacy & Security |
TechRepublic - Even after armed with defense tools, CISOs say successful cyberattacks are ‘inevitable’: New study | “For decades, new problems in security have arisen and small companies come up with innovative solutions to address these. But buying individual best-in-breed solutions from new vendors puts the burden on the customer to ingest all of these solutions and integrate them,” | Security |
VentureBeat - Analysts share 8 ChatGPT security predictions for 2023 | ChatGPT will lower the barrier to entry for cybercrime. Crafting convincing phishing emails will become easier. Organizations will need AI-literate security professionals. Enterprises will need to validate generative AI output. Generative AI will upscale existing threats. | ChatGPT |
Computerworld - Microsoft Copilot could fix a long-running Office problem | The initial instructions that direct the underlying AI on what to collect — and what the finished product should look like — can be centralized and applied to all of Office. That would dramatically simplify and reduce the time needed to create a complex document with charts, pictures, and dynamic data that keeps a document, webpage, or other content up to date | Automation & Productivity |
VentureBeat - Skills mapping: Turning skills to workforce gold | Studies show that while a skill used to last 15 to 20 years, the shelf-life of any skill is now only 3 to 5 years. The one-size-fits-all approach to learning is no longer going to cut it, even if the system we grew up in is telling us otherwise. | e-Learning |
Datanami - IDC Report: Responsible AI Integral to Unlocking Benefits for B2B Enterprises | The survey underscores the key role artificial intelligence will have for B2B enterprises in 2023 and beyond. Executives expressed eagerness for their organizations to adopt responsible AI, citing customer satisfaction (30%), improved sustainability (30%) and increased profits (25%) as top expected business benefits. | Artificial Intelligence |
Blocks & Files - Enterprises need one hybrid cloud operating model to rule them all, says Nutanix | “What this year’s ECI [study] shows and what we’re hearing from customers is that there’s a need in the market for a cloud operating model to help build, operate, use, and govern a hybrid multi-cloud to support all types of applications – starting today and planning for tomorrow.” | Cloud |
InformationWeek - CIOs Must Make Call on AI-Based App Development | Using a technology like low code/no code would take care of the front end of an application, however many go far beyond the top layer and require the services of a data management expert on staff. | IT Management |
ZDNet - Look out, Bing. ChatGPT is getting access to the internet, too | Some of the first companies to create plugins for ChatGPT include Expedia, Instacart, Kayak, Klarna Shopping, Fiscal Note and more. With these plugins, users will be able to take advantage of each company's individual assistance within ChatGPT. | ChatGPT |
Datanami - Gartner Survey Reveals Less Than Half of Data and Analytics Teams Effectively Provide Value to the Organization | The survey found that CDAOs are tasked with a broad range of responsibilities, including defining and implementing D&A strategy (60%), oversight of D&A strategy (59%), creating and implementing D&A governance (55%) and managing data-driven culture change (54%). | Data & Analytics |
AiThority - Transforming Work As We Know It: 8 Things You Can Do With Microsoft Copilot 365 | This recently launched natural language chat is compatible with different applications including documents, emails, and chats. Only a select group of people will have access to Business Chat on Teams, Bing, or Microsoft365.com. | Automation & Productivity |
InformationWeek - How to Downsize IT With Minimal Damage | Lewis suggests comparing your organization’s cost structure to similar bodies. “Understand the cost levers that exist in various cost categories and build a heat map of optimization opportunities.” He also recommends targeting short-term savings without losing sight of longer-term, bigger ticket items, such as technical debt reduction or application rationalization. | IT Management |
AiThority - Salesforce Report: Ad Spending Strategies Face Acid-test; Spotlight on CX, Web3 and AI | However, a large volume of work is still completed manually, including advertising sales (58%), content production (57%) and churn prediction (39%). | Automation & Productivity |
35 Generative AI Tools for 2023 That You Should be Using Right Now | In this post, we are looking at the top 35 generative AI tools from the visual, audio, text generator, and code generator form, that are completely transforming the AI game, and empowering brands to take assistive technology to another level. | Artificial Intelligence |
ZDNet - The best AI chatbots: ChatGPT and other cutting-edge alternatives to try | The good thing is there are plenty of AI chatbots that are just as capable, and available whenever you need them. We put together a list of the best AI chatbots and AI writers on the market and detailed everything you need to know before choosing your next writing assistant. | Automation & Productivity |
sdxcentral - How to Create an Effective Cyberdefense Strategy in an AI-Driven World | The code generation capabilities of AI are also a potential risk, as Fisher noted they are more capable of writing scripts that are commonly used in ransomware. She noted that the barrier for somebody who doesn’t actually have much training to generate phishing emails and write ransomware has gone down dramatically. | Security |
AiThority - Applause AI and Voice Applications Survey Shows ChatGPT Ahead of the Curve with User Satisfaction but Reveals User AI Bias Concerns | Applause, a world leader in testing and digital quality, reveals that nearly one-third (30%) of users of chatbots, interactive voice response (IVR) services and conversational assistants are dissatisfied with their experiences. In addition, the study has revealed concerns about inherent bias that can negatively influence engagements and outcomes with AI-driven voice applications. | ChatGPT |
Network World - Cloud vs on-prem: SaaS vendor 37signals bails out of the public cloud | Hansson’s argument is simple: By pulling server workloads off the Amazon AWS infrastructure, purchasing new hardware from Dell, and running his business from a colocation facility, he will save millions of dollars. | Cloud |
TechRepublic - Massive adversary-in-the-middle phishing campaign bypasses MFA and mimics Microsoft Office | Microsoft has already seen millions of phishing emails sent every day by attackers using this phishing kit. Learn how to protect your business from this AitM campaign. | Privacy & Security |
VentureBeat - 4 key trends from the Gartner IAM Summit 2023 | Identity is the new network perimeter. In a world powered by cloud computing, every human and machine identity, whether it exists on-premises or in the cloud, needs to be protected to prevent a breach. Yet the Gartner IAM Summit, which began yesterday in Grapevine, Texas, highlights that most organizations still have a long way to go. | Privacy & Security |
sdxCentral - IDC Forecasts Security Spending to Outpace Rest of IT | “Almost all industries and company size segments will see low double-digit growth through 2026, driven by the expansion of cloud and container deployments, the need to secure remote access to resources, and the compliance requirements of privacy and data protection legislation.” | IT Management |
Network World - How network pros can fight being squeezed out of cloud decisions | As cloud and IT professionals begin managing network hardware, it can be tempting for organizations to overlook the critical role that network experts play in ensuring the success of a multicloud infrastructure. "Far from becoming redundant, network professionals are uniquely equipped to tackle the complex and essential responsibilities that come with a multi-cloud environment," | Cloud |
Blocks & Files - AIOps cuts support ticket numbers but not support desk jobs, claims report | More than 60 percent of business and MSP help and support desk operations saw an incident ticket cut with artificial intelligence (AIOPs) help, claims a 57 page OpsRamp research report that seems to indicate that AIOps doesn’t kill support desk jobs. HPE is buying OpsRamp and so enabling GreenLake to have an ITOM presence | IT Management |
TechRepublic - Ransomware gangs’ harassment of victims is increasing | Targeting such sensitive information as health records and financial records, the attackers will publish the data on Dark Web leak sites where other criminals can access and exploit it for their own purposes. These incidents of data theft have shot up to around 70% of all cases on average, up from 40% in mid 2021. | Privacy & Security |
sdxCentral - AI Has a Long-Term Memory Problem (How to Make Neural Networks Less Forgetful) | Many of today’s leading AI systems are recurrent neural networks (RNNs). This deep-learning method uses past information to improve performance on current and future inputs. One of the most applied of these is the Long short-term memory (LSTM) model. | Artificial Intelligence |
Network World - Best-of-breed networking: There’s an opportunity for white boxes in the WAN | Today, 37% of those same enterprises say they have multivendor networks and another 9% say they have open networks. In the net, a bit over 40% of those single-vendor enterprises have shifted their vendor mix over time, and the biggest reason given is pedestrian: Acquisitions and mergers brought in other vendors. The second-biggest reason is more interesting: Their single vendor did something dramatic to discredit themselves. | Network Management |
Blocks & Files - Infinidat hybrid array RoI? 11 months, says IDC in sponsored white paper | The IDC researchers claim the “interviewed companies uniformly found that InfiniBox provided a robust infrastructure for more efficient storage management and significantly improved data compression, with high value at low cost. | Data Storage |
Computerworld - Generative AI comes to Office: What it means (and who’s at risk) | The tool’s strongest power is quantitative, because you can do far more in less time with it. (It has some qualitative capabilities, too, but those are less mature at this stage.) All too often, people who focus on quality do so at the expense of quantity, so boosting output using AI tools might allow them to turn out more top-notch work; conversely, those who work quickly may be sacrificing quality — so increasing their output will only make things worse. | Artificial Intelligence |
VentureBeat - Shared spectrum, converged networks will shape enterprise connectivity in 2023 and beyond | In our experience, most enterprises that employ both networks see about 80 to 90% of traffic moving over Wi-Fi and the remainder over cellular, reinforcing that Wi-Fi is the workhorse of connectivity, and cellular as the specialized option for critical applications. | Network Management |
The Verge - Microsoft’s new Copilot will change Office documents forever | Copilot appears in Office apps as a useful AI chatbot on the sidebar, but it’s much more than just that. You could be in the middle of a Word document, and it will gently appear when you highlight an entire paragraph — much like how Word has UI prompts that highlight your spelling mistakes. You can use it to rewrite your paragraphs with 10 suggestions of new text to flick through and freely edit, or you can have Copilot generate entire documents for you. | Automation & Productivity |
Blocks & Files - AWS S3: You can check out but can never leave | Only Alibaba, with its $6,150 charge, is worse than AWS’s $4,300 cost. OVH and Scaleway have zero egress charges. Backblaze charges $0.01/GB to download data, meaning $10 to download 50TB, the same as Digital Ocean. | Data Storage |
VentureBeat - On-device AI is transforming computing for hybrid workforces | Millions of people turn on their cameras and microphones every day across multiple applications, from Discord and Google Meet to Microsoft Teams, Slack, Zoom and many more. A recent study showed that 75% of people judge colleagues based on their audio quality in meetings, while 73% judge based on video quality. | Automation & Productivity |
ZDNet - What is GPT-4? Here's everything you need to know | For example, with GPT-4, you could upload a worksheet and it will be able to scan it and output responses to the questions. It could also read a graph you upload and make calculations based on the data presented. | Artificial Intelligence |
sdxCentral - SASE CTO Weighs In on the Future of Network Infrastructure ‘As-a-Service’ | Analyst firm Gartner reported enterprises are turning to internet services for their WAN connectivity as SD-WAN replaces aging network equipment. The analyst firm expects that by 2026, 45% of enterprise locations will exclusively use internet services for their WAN connectivity. | Network Management |
VentureBeat - How access management helps protect identities in the cloud | CISOs tell VentureBeat that access management (AM), identity and access management (IAM) and privileged access management (PAM) are under attack by threat actors who can quickly monetize stolen identities by becoming access brokers or working with access brokerages. | Privacy & Security |
Blocks & Files - Most failed disk drives fail just before they hit 3 years’ use, says data recovery biz | The current pending sector count refers to the number of damaged or unusable sectors the hard drive developed during routine read-and-write operations.” It excluded drives that failed from non-predictable events such as electrical surges, malware, natural disasters, or accidental mishandling. | Data Storage |
TechRepublic - How to prevent data theft by existing and departing employees | The i3 team investigated almost 700 cases of data theft by departing employees; this was twice as many cases as 2021. Based on the incidents, DTEX determined that 12% of employees take sensitive information with them when they leave an employer. The stolen information included customer data, employee data, health records and sales contracts. | Privacy & Security |
VentureBeat - Unleashing the potential of AI: The power of an end-to-end environment for innovation | Every enterprise technology wave of the last 20 years, from databases and virtualization to big data and others, has imparted a crucial lesson. AI – and the infrastructure that enables it – is no exception. To gain the traction and widespread adoption that can spark innovation requires standardization, cost management and governance. Unfortunately, many organizations today struggle with all three. | Artificial Intelligence |
sdx Central - What the Metaverse's Infrastructure Will Look Like (and Why Your Virtual Life Depends on It) | Ultimately, Nguyen said the metaverse will be an “ecosystem for innovation” with no single technology or infrastructure. Just as with the internet, infrastructure requirements will continually evolve. | Metaverse |
Blocks & Files - Gartner: So long HCI MQs, hello full-stack HCI software | The full stack components are hypervisor, containers, storage, network, infrastructure management, cloud management and monitoring. The global full stack HCI market is worth more than $1 billion. The report writers think that, “as full-stack HCI software has evolved, the integrated support of orchestration tools such as Kubernetes has increased across many providers. | Network Management |
SiliconANGLE - Study finds humans beat ChatGPT when creating phishing attacks | The study analyzed over 53,000 email users in over 100 countries, comparing the win rate of simulated phishing attacks created by human social engineers and those created by large artificial intelligence language models. Although the potential for ChatGPT to be used for malicious phishing activity exists, human social engineers outperform AI in inducing clicks on malicious links. | Privacy & Security |
AiThority - The 3 Building Blocks to Make AI Accessible | One of the biggest challenges in creating accessible AI is the complexity of the technology and the need for niche roles, such as data scientists, to operate it. Most AI systems require specialized knowledge and expertise to develop, deploy, and maintain. This can create a barrier to entry for many users, especially those with limited technical expertise. | Artificial Intelligence |
ZDNet - ChatGPT's most lauded capability also brings big risk to businesses | Its ability to mimic humans with its responses has ignited much of the hype currently swirling around the AI-powered tool and is also what presents the biggest threat. | ChatGPT |
SiliconANGLE - R-Ladies aims to bridge data science gender gap, says Microsoft cloud advocate | “Data science such a broad field that it doesn’t require you to come from a specific background,” she noted. “The most successful data science teams are the teams that have all these different backgrounds. So if you think that we as data scientists … started programming when we were nine, that’s not true. You can be 30, 40 shifting careers.” | Tech Jobs |
VentureBeat - How NLP is turbocharging business intelligence | “NLP-driven analytical experiences have democratized how people analyze data and glean insights — without using a sophisticated analytics tool or craft[ing] complex data queries,” | Data & Analytics |
SiliconANGLE - Generative AI: hype or reality? AWS, Cohere and Stability AI analyze new tech applications | Despite the already brilliant capabilities that LLMs are showing with products like Bard and ChatGPT, their range of use is still quite limited. Advancing their potential would imply things like an external knowledge base, where these models stay up to date in real time. Equipping these AI tools to access and use APIs, for instance, can greatly improve how they approach end-user queries. | Artificial Intelligence |
VentureBeat - Cryptocurrency is fueling the ransomware boom. Here’s how to protect yourself | The way crypto has upended cybercrime payments has changed the nature of cybercriminals’ fraudulent schemes, too. Credit card fraud, e-gold Ponzi schemes, GreenDot Moneypak schemes and gift card fraud from some of the biggest retailers cumulatively earns cybercriminals hundreds of millions of dollars. | Privacy & Security |
Computerworld - Unnecessary meetings draining employee productivity: Report | Knowledge workers surveyed for the report also estimate that 4.9 hours per week would be saved if their company had improved processes, such as streamlined application usage. The research found that the average number of apps used at work sits at 8.8 for knowledge workers and 10 for those at director level or higher. | Automation & Productivity |
VentureBeat - The hottest party in generative AI is productivity apps | After years of being relegated to nerdy, wallflower AI status while self-driving cars, robot dogs and the future of the AI-powered metaverse got the spotlight, generative AI’s email-writing, blog-producing, copy-powering abilities are suddenly popular. And top companies from startups to Big Tech are developing tools to gain admittance to the generative AI bash. | Automation & Productivity |
sdxCentral - Why You Should Never Bet Against Ethernet | The Ethernet Alliance is also working on certification efforts for Power-over-Ethernet (PoE). While there have long been PoE standards, there hasn’t been a full-scale certification effort in the same way that there is for Wi-Fi in the wireless world. Jones said that while PoE mostly works today, there have been some instances of vendor technologies that weren’t interoperable. | Network Management |
Computerworld - GrammarlyGo and the coming wave of generative AI productivity | GrammarlyGo is a prompt-based implementation of ChatGPT (though it could use other frameworks in the future). If you are writing a paper or a column like this one, it will ask you a series of questions — and from the resulting answers, it will write the piece faster than you could type it. | Automation & Productivity |
sdxCentral - How OpenSSF Aims to Make Log4j-Like Incidents Rare | Founded in 2020, OpenSSF is a cross-industry organization hosted by the Linux Foundation that brings together individuals and companies including Cisco, GitHub, Google, and VMware, to develop better security tools and practices for open source application development without bias toward a specific ecosystem or vendor. | Security |
AiThority - How ChatGPT Will Transform Customer Service | Neither automation nor AI can ever fully substitute humans—capable of empathy, flexibility, and emotional intelligence—who can manage the nuanced interpretations that are nearly always required to generate the best customer service outcome. | ChatGPT |
Blocks & Files - Who’s winning and losing in the storage market? | NetApp is slowly distancing itself from HPE in storage revenue terms, though both rise above the rest. Three suppliers are edging towards HPE – Pure, followed by Snowflake and Nutanix, which has been overtaken by Snowflake. | Data Storage |
Network World - Artificial intelligence helps solve networking problems | “The center of gravity has shifted from the corporate data center to a hybrid multicloud environment, but the network was designed for a world where all traffic still flows to the data center. This means that many of the network elements that dictate traffic flow and policy are now beyond the reach and control of the enterprise’s networking teams,” | Network Management |
AiThority - Generative AI is Over-hyped: Bias and Security Risks Biggest Barriers | While implementing Generative AI remains the top priority for senior IT leaders (33%) in the next 18 months, there are perennial operational challenges, security risks, and latent biases in the technology that could douse the fiery intent of high-growth companies scaling with this technology. | Artificial Intelligence |
TechRepublic - CrowdStrike: Attackers focusing on cloud exploits, data theft | CrowdStrike said cloud-conscious actors gain initial cloud access by using valid accounts, resetting passwords or placing web shells designed to persist in the system, then attempting to get access via credentials and cloud providers’ instance metadata services. | Security |
AiThority - ChatGPT Won’t Replace Your Marketing Job, But it’s Critical to Leverage for Success | At AiAdvertising, we believe that the power of marketers + machines is significant. Those in marketing and adtech who learn how to use ChatGPT, discover the best way to prompt the machine, and understand how to validate and leverage the data will be the ones who succeed. | ChatGPT |
Blocks & Files - A tale of two realities: women in hi-tech balancing progress and backlash | While the proportion of women graduating with core STEM degrees is increasing steadily, the gender split remains at 26 percent, since the number of men graduating with core STEM degrees is increasing at a faster rate. This trend is also reflected in the STEM workforce, with women accounting for just 24 percent. | Tech Jobs |
Dark Reading - Employees Are Feeding Sensitive Biz Data to ChatGPT, Raising Security Fears | In a recent report, data security service Cyberhaven detected and blocked requests to input data into ChatGPT from 4.2% of the 1.6 million workers at its client companies because of the risk of leaking confidential information, client data, source code, or regulated information to the LLM. | Privacy & Security |
VentureBeat - The good, the bad and the ugly: The world of data is changing | Beyond needing to meet companies’ goals to create more compelling customer experiences and optimize operations, technology leaders will see data play an increasingly integral role in their career evolutions in new and interesting ways: According to Gartner, 25% of traditional large enterprise CIOs will be held accountable for digital business operational results — effectively becoming “COO by proxy” by next year. | Data & Analytics |
Computerworld - Jamf VP explains enterprise security threats — and how to mitigate them | The report points to a range of ways in which privacy, once broken, creates security instability, including nation states that subvert device security to watch, photograph, and record what people do in order to blackmail or otherwise exploit victims. | Security |
VentureBeat - Research shows two-thirds of orgs have had breaches caused by remote working | More specifically, respondents cited network access control, antivirus solutions, multi factor authentication (MFA) and cloud security solutions such as cloud access security broker (CASB) as the most important tools for securing work-from-anywhere environments in the future. | Security |
SiliconANGLE - Palo Alto Networks report finds organizations struggle to detect and respond to cyberattacks | More than 80% of respondents say they have embedded security professionals in DevOps teams at an average ratio of 10 developers for every security professional. The report notes that security must enable development and it’s critical to an organization’s success to equip developers with the proper security tools that don’t hinder their ability to build and deploy applications quickly. | Security |
sdxCentral - 5G SASE Marketing Heats Up, But Is It All Hype? | Most network and security vendors agree that as 5G deployments proliferate, changes in network architecture will require cybersecurity to change too. “Centralized internet breakout and backhauled user connections contradict the intent of 5G. This is why SASE and 5G are naturally complimentary,” | Security |
Computerworld - Maybe one day every platform will be as secure as Apple | The proposal suggests that privacy protection will no longer be something big tech can argue against – companies will be required to prioritize privacy. That’s fine if you run a business that does not require wholesale collection and analysis of user information, which has always been Apple’s approach. The best way to keep information private, the company argues, is not to collect it at all. | Privacy & Security |
Axios - Chatbots trigger next misinformation nightmare | Generative AI programs like ChatGPT don't have a clear sense of the boundary between fact and fiction. They're also prone to making things up as they try to satisfy human users' inquiries. | Artificial Intelligence |
VentureBeat - Virtual reality is finally ready to revolutionize education | In fact, their labs are structured to provide 15 minutes of immersive experiences for every three hours of traditional learning. And no, their goal is not to replicate the stale 1950s-era labs that many students still must endure in high schools and colleges today. Instead, their approach is to use the creativity and flexibility of virtual worlds, combined with Hollywood-style storytelling, to engage students in an interactive narrative that keeps them focused while addressing specific learning goals. | VR |
TechRepublic - To deliver innovative experiences, organizations must develop a clear cloud strategy | Cloud strategy starts by determining which workloads are not cloud-ready — cases where data sovereignty, security and latency (and, in some cases, costs) rule out public cloud in the near- to medium term. Simply transitioning the rest of your applications and data to cloud can result in greater resilience, but without modernization, it is simply a change in data centers. | Cloud |
VentureBeat - A SaaS leader’s guide to pricing in 2023 | The focus is shifting from rapid growth to efficiency. Already, CFOs are carefully examining contracts to identify potential cost savings: 57% of IT teams say they’re under pressure to reduce their SaaS spend, and the trend is likely to escalate in 2023. It’s up to SaaS vendors to anticipate this: Only those demonstrating real value and flexibility to their customers will survive | Security |
AiThority - Research Reveals LockBit Ransomware Surges While Android Droppers Emerge as Top Business Threat | “This report acts as a guide to those organizations by focusing their limited time on a small number of critical threats across Windows, Mac, and Android. If organizations can understand what it takes to prevent these threats, they are well placed to stop a huge number of other attacks as well.” | Security |
TechRepublic Top 10 open-source security and operational risks of 2023 | According to Endor’s report, attackers can target legitimate resources from an existing project or distribution infrastructure to inject malicious code into a component. For example, they can hijack the accounts of legitimate project maintainers or exploit vulnerabilities in package repositories. This type of attack can be dangerous since the malicious code can be distributed as part of a legitimate package and can be difficult to detect. | Security |
The Hacker News - Security and IT Teams No Longer Need To Pay For SaaS-Shadow IT Discovery | In 71.4% of companies, employees use an average of 2.4 SaaS applications that have been breached in the past three months. On average, 58% of SaaS applications are used by only one employee. A quarter of organizations' SaaS users are external | IT Management |
VentureBeat - 5 key factors for successful cloud transformation | Data is the lifeblood of innovation, and there’s no stemming the flow: A survey published in January 2022 revealed that in North American enterprises with more than 1,000 employees, the average monthly rate of growth in data volume was a staggering 63%, and the average number of data sources was 400. It is absolutely unviable to manage information of this size and complexity with on-premise infrastructure. This is why more than 99% of respondents said they would migrate their data to the cloud within two years | Cloud |
Computerworld - IT’s lovefest with GPT-3 needs to meet reality now | There are few pieces of technology — ever — that have enjoyed a deeper lovefest from the media and the consumer public than ChatGPT and other efforts built atop vanilla GPT-3. And enterprise IT executives have been stampeding to develop homegrown apps based on GPT-3. | Emerging Tech |
Network World - MWC analysis: Conditions are ripe for cloud providers to drive faster network services. | The bad news is that the API focus of MWC was aimed mostly at exposing providers’ OSS/BSS features to developers or exploiting things like knowing device location, things that given the GPS in smartphones could be as easily exploited by a cloud provider or even a smartphone vendor. | Cloud |
Venturebeat - Device virtualization is key to IoT adoption | Second, success in IoT adoption is earned through iteration: Since the IoT has a myriad of elements, organizations need to gather data from devices, convert it into analysis, act upon that insight, and do it all over again in a continuous feedback loop that’s always refining, learning and improving the various IoT constituents | IoT |
sdxCentral - How Security Vendors Can Support the White House National Cybersecurity Strategy | “the new White House cyber strategy is a rallying cry for developer security. Organizations should address developer security now before rules are put in place that will impose fines and other penalties on organizations that fail to do so.” | Security |
CSO - Unpatched old vulnerabilities continue to be exploited: Report | The top five exploited vulnerabilities in 2022 include several high-severity flaws in Microsoft Exchange, Zoho ManageEngine products, and virtual private network solutions from Fortinet, Citrix and Pulse Secure. | Security |
SiliconANGLE - An open standard threatens to disrupt the cloistered world of wireless networking | Supporters say it could have the same impact on the telecommunications industry that Unix and TCP/IP had on the data center in the 1990s when open standards disrupted the proprietary – and highly profitable – domain of a few large equipment makers, brought prices crashing down and changed the economics of data processing | Network Management |
Technical.ly - The remote work scam that’s blowing up in the recruiting industry | Once the target is “hired,” they’re told that they’re going to send them some money to help them get set up with office expenses, which requires the target to give them their bank information, which they say they’ll also use to send your paychecks. | Privacy & Security |
VentureBeat - OpenAI has grand ‘plans’ for AGI. Here’s another way to read its manifesto | The AI Beat | “If someone told me that Silicon Valley was ran by a cult believing in a machine god for the cosmos & “universe flourishing” & that they write manifestos endorsed by the Big Tech CEOs/chairmen and such I’d tell them they’re too much into conspiracy theories. And here we are.” | Artificial Intelligence |
The Sofware Report - The Power 500 Software Companies of 2023 | In addition, investors in both the public and private markets are eager to back those software companies that will catapult us into the next era of operational efficiency. And with a growing emphasis on remote and hybrid work environments, we’re still in the early innings of pervasive business adoption of cloud-based infrastructures, strategies, and solutions. | Tech Trends |
sdxCentral- Crowdstrike Reports Cloud Attacks, Microsoft Vulnerabilities, SIM Swapping Biggest Threats | Among the key findings in the report is that cloud exploitation grew by 95%. Perhaps even more troubling is that there are now more “cloud-conscious” threat actors – that is attackers with an emphasis and skills in the cloud – than ever before by a wide margin. | Security |
The Verge - This is Meta’s AR/VR hardware roadmap for the next four years | With regards to the VR roadmap, employees were told that Meta’s flagship Quest 3 headset coming later this year will be two times thinner, at least twice as powerful, and cost slightly more than the $400 Quest 2. | AR/VR |
VentureBeat - AI-generated content detection tools put to the test | Why not automate it? Ever since ChatGPT hit the news, many software companies — including OpenAI — have launched authentication tools that help users identify text written by AI software. In this article, we examine some of the top automated AI-content detection tools and put them to the test | Artificial Intelligence |
ZDNet - Just how big is this new generative AI? Think internet-level disruption | One fundamental limit to ChatGPT's capabilities is the hard stop on its knowledge. Its corpus ends in 2021. ChatGPT is oblivious to any information, trends, issues, or popular cultural themes that have occurred since 2021. | Artificial Intelligence |
Computerworld - Q&A: ChatGPT isn't sentient, it’s a next-word prediction engine | "The best we understand right now is these models intrinsically are word prediction engines. At its most basic level, it’s just predicting the next best word. In some cases, when it predicts that next best word, that word is no longer factually accurate for the particular question. But given that word, the next best word given after that continues down that path, and then you build a series of words that go down a path that’s no longer accurate — but it’s very convincing in the way it’s been written. | Artificial Intelligence |
VentureBeat - NCA executive director shares top cybersecurity risks in 2023 | “So, although attacks there will continue — and sufficient deterrence measures have a long way to go — bad actors are now seeking out more nascent spaces to execute low-tech, high-impact attacks within education, gaming, aviation and automotive. In fact, we’ve already seen several high profile DDoS attacks in the latter two categories in the last months. Expect that to continue. | Security |
sdxCentral - IBM, Microsoft, and Google Race to Close Quantum Skills Gap | “People who have traditional software development experience, are good at creating control electronics, have experience working in a lab with radiofrequency electronics, and [have] a traditional EE [electrical engineering] background are all in very high demand,” she added | Tech Jobs |
Datanami - Big Data Services Market to Grow by $154B from 2023-27: Technavio | By component, the market will observe significant growth in the solution segment. Growing competition and the need to understand consumer behavior across numerous channels are increasing the use of big data and big data analytics solutions among businesses. This is one of the key factors driving the growth of the segment. | Data & Analytics |
VentureBeat - How to use zero trust and IAM to defend against cyberattacks in an economic downturn | “A key finding from the report was that upwards of 60% of interactive intrusions observed by OverWatch involved the use of valid credentials, which continue to be abused by adversaries to facilitate initial access and lateral movement,” | Security |
SiliconANGLE - How 5G will help blaze the trail to the long-awaited metaverse | Although 5G hasn’t yet delivered on its promised bandwidth and hasn’t fully rolled out everywhere, wireless telecom companies are still investing billions of dollars to make it universally available. During 2020 and 2021, the big four collectively spent nearly $100 billion in back-to-back auctions for the so-called mid-spectrum radio band considered essential for 5G communications. | Metaverse |
Infinidat - The Hot Trend − Security and Enterprise Storage Together | Enterprises need to make sure they are fully securing their data, both at rest and in motion. With datastores moving between on-premises enterprise data centers and the public cloud in hybrid environments, security experts agree that it’s vital to invest in creating secure datastores for both primary data sets and for backup datasets that use immutable snapshots and air-gapping. | Data Storage |
VentureBeat - Big tech isn’t evil — it’s just wrong | These companies with their innovative approaches unlocked a universe of sharing and tracking in the name of progress. They found a way to harness data to grow their businesses, while creating a no-questions-asked society of data sharers. They helped us consumers get comfortable with sharing, without helping us protect ourselves. | Tech for Good |
TechRepublic - Dice’s salary report indicates it’s still a good time to work in tech | “Combined with the 52% who are likely to change employers within the next year, you have a double-edged sword for organizations: More skilled tech talent is available, but retention will be even more difficult,” the report said. “Expressing appreciation and value to tech professionals remains a key to retention, across all industries and roles.” | Tech Jobs |
VentureBeat - Experts predict how AI will energize cybersecurity in 2023 and beyond | Cybercriminal gangs and sophisticated advanced persistent threat (APT) groups actively recruit AI and ML specialists who design malware that can evade current-generation threat detection systems. What attackers lack in size and scale, they more than make up for in ingenuity, speed and stealth. | Security |
Computerworld - As Microsoft embraces AI, it says sayonara to the metaverse | Microsoft officially denies it, but the company has practically shut down work on the metaverse. The speed with which it happened is stunning — and it’s a cautionary tale for businesses tempted to invest in the technologies currently on their hype lists. | Emerging Tech |
TechRepublic - Digital forensics and incident response: The most common DFIR incidents | As a result, digital forensics found new ways to integrate that complexity with incident response teams. It allowed more deep-dive analysis on systems while not shutting them down, and now digital forensics and incident response are usually together in the SecOps team within the Security Operations Center. | Privacy & Security |
VentureBeat - Forrester: Question generative AI uses before experimentation | “The important thing for leaders — whether it’s at the C-level or a couple clicks down — is to take a very investigative, skeptical and questioning approach in adopting generative AI,” he said. | Artificial Intelligence |
Datanami - Pepperdata Survey Uncovers the State of Kubernetes 2023 and Emergence of Cloud Cost Remediation as Top Priority | The survey aimed to gain insights into the types and sizes of containerized applications and other workloads on Kubernetes clusters, as well as the FinOps tools and practices used to optimize Kubernetes deployments and control costs. | Cloud |
Computerworld - 5 reasons videoconferencing is on the decline (again) | The benefits of videoconferencing are clear: reduced travel costs, safer employees, higher productivity, happier employees, and a better work/life balance. While the ongoing need to connect remote workers to their companies will likely head off a catastrophic collapse of the industry, it won’t rise to its full potential until the issues Ive listed are addressed. | Automation & Productivity |
Matt Turck - The 2023 MAD (Machine Learning, Artificial Intelligence & Data) Landscape | First, we’ve made the decision this year again to keep both data infrastructure and ML/AI on the same landscape. One could argue that those two worlds are increasingly distinct. However, we continue to believe that there is an essential symbiotic relationship between those areas. | Machine Learning |
Datanami - Latest Risk Report from Concentric AI Shows 60% Increase in Oversharing of Sensitive Data over the Past Year | The report revealed the number of overshared files rose 60 percent in 2022 compared to 2021, highlighting the significant impact of hybrid remote work, cloud migration and information sprawl across on-premises and cloud data, as well as email and messaging environments, on data security. | Data Privacy |
TechRepublic - Report: Stress will drive a quarter of cyber defenders out the door | In a new report, the firm predicts that nearly half of cybersecurity leaders will change jobs, and that by 2025, lack of talent or human failure will be responsible for over half of significant cyber incidents. | Security |
VentureBeat - What will security and threat prevention look like in Web3? | But, while touted for its decentralization and user- (and data-) centricity, when it comes to security and threat detection, “Web3 is outgunned, plain and simple,” asserts Christian Seifert of Forta Network. “We need new, faster and more surgical threat prevention measures, and we need them now.” | Web3 |
Datanami - Comet Releases MLOps Industry Report | 2023 Machine Learning Practitioner Survey | Bias has been one of the leading topics related to AI in recent years. Some view bias as overhyped, with ML practitioners capable of implementing best practices to mitigate it, while others think it is a problem that will continue to plague AI systems. The latest survey reveals how ML practitioners are approaching bias. | Machine Learning |
TechRepublic - 5G Open RAN gains momentum: Next steps and challenges | TIP explained that breaking away from the business models that have dominated the connectivity industry for decades implies a significant shift. Historically, wireless systems have been closed and controlled by a single vendor, but the industry must pivot from competition to collaboration and open multi-vendor markets. | 5G |
SiliconANGLE - Veeam: Orchestrated and tested backup and recovery strategy is critical to data protection | The survey reflects a high level of concern, despite the increased level of spending. For example, 30% of companies still expect to recover resources during a data crisis manually, and only 18% currently have an orchestrated workflow capability. | Data Management |
ZDNet - These experts are racing to protect AI from hackers. Time is running out | AI is becoming a key part of our lives. Hacking it could cause chaos, so the race is on to build defenses. | Artificial Intelligence |
VentureBeat - New research suggests that privacy in the metaverse might be impossible | And by “simple motion data,” I mean the three most basic data points tracked by virtual reality systems – one point on the user’s head and one on each hand. Researchers often refer to this as “telemetry data” and it represents the minimal dataset required to allow a user to interact naturally in a virtual environment. | Privacy & Security |
Datanami - Panasas Survey Shows Specialty Knowledge as Biggest Challenge for Managing High-Performance Storage | Survey results show an overwhelming 96% of respondents across the US, UK, and Germany face challenges in building and managing high-performance storage. In addition to over half of respondents (52%) citing specialty knowledge as the top challenge, | Data Storage |
VentureBeat - Salesforce survey sees data trove untapped — data skills spend to rise | A new global survey conducted by Salesforce has revealed that as many as 41% of business leaders see lack of understanding as a major barrier to unlocking the full potential of their data assets. However, the survey suggests these same business leaders will continue to spend to boost data skills in the organization | Data Management |
Network World - Multicloud: Keep providers separate and distinct or integrate them? | One model for cloud adoption treats each external cloud as another data center, connected only as additional WAN destinations, and leaves them otherwise distinct. That would mean routing-level connections only, with separate network management and controls for each. The other model is allowing deeper integration, including tunneling Layer 2 protocols and centralizing control not only between on-prem data centers and cloud but among and across clouds. | Cloud |
VentureBeat - 2023 data, ML and AI landscape: ChatGPT, generative AI and more | We’ve made the decision to keep both data infrastructure and ML/AI on the same landscape. One could argue that those two worlds are increasingly distinct. However, we continue to believe that there is an essential symbiotic relationship between those areas. Data feeds ML/AI models. The distinction between a data engineer and a machine learning engineer is often pretty fluid. Enterprises need to have a solid data infrastructure in place in order before properly leveraging ML/AI. | Tech Trends |
sdxCentral - How Platform Engineers Help Narrow Cloud Skills Gap | Although platform engineers need to be skilled in technologies like Kubernetes, SQL systems, and data storage, Thiruvengadam noted soft skills are just as important to build a solid team. “It’s the soft skills that make for good platform engineers [who] are likely to remain more consistent as time passes,” he explained | Tech Jobs |
ZDNet - What is ChatGPT and why does it matter? Here's everything you need to know | According to analysis by Swiss bank UBS, ChatGPT is the fastest growing app of all time. In January, only two months after its launch, UBS analysis estimates that ChatGPT had 100 million active users. For comparison, it took nine months for TikTok to reach 100 million | ChatGPT |
Network World - Wi-Fi HaLow: Wireless for the internet of things | Wi-Fi HaLow, the marketing term the Wi-Fi Alliance has chosen for the IEEE 802.11ah standard, is a long- range, low-power, low-speed version of traditional Wi-Fi. It shows promise with deployment of Internet of Things (IoT) devices such as sensors, wearables, machine-to-machine (M2M) applications, smart buildings, and smart cities. | IoT |
sdxCentral- Endpoint Security Is SASE Vendor Stretch Goal | “Can we also protect the endpoint when the user is on a customer site such that somebody can’t transfer data off of that endpoint,” Tolbert said, adding that he sees the need for “bigger emphasis on data protection, especially at the endpoint and then just broader endpoint security integration.” | Security |
VentureBeat - 5 key cybersecurity trends for 2023 | Cybercriminals continue efforts to steal credentials from users to gain access to networks. Historically, they’ve used email, but they are increasingly using social engineering. In the first half of 2022, around 70% of email attacks contained a credential phishing link. | Security |
Datanami - Should Companies Disclose if Their Content Was Written by AI? | It’s easy to see why GPT-3 has been such a hit since its introduction in May 2020. The technology has helped countless companies generate landing pages, draft press releases, write bios and blogs, and as a result helped to free up copywriters to take on tasks of higher priority. This technology, like all good technologies, is cheaper and faster than anything before it. | Artificial Intelligence |
GTSC - Homeland Security - GAO Provides an Update on Federal Protection of Privacy and Data | In GAO’s September 2022 review of 24 agencies, the watchdog found that most had generally established policies and procedures for key privacy program activities. These activities included, among other things, developing system-of-records notices that identify types of personal data collected, conducting privacy impact assessments, and documenting privacy program plans. | Data Privacy |
VentureBeat - Google Cloud CISO Phil Venables: Zero trust ‘essential’ to protect the cloud | With IAM tools, you’re able to grant access to cloud resources at a granular level, creating more access control policies for attributes such as device security status, IP address, resource type and date and time, to better ensure appropriate access controls are in place. | Security |
Datanami - Americans Don’t Trust AI and Want It Regulated: Poll | Only 48% of Americans told Harris Poll that they believe AI is safe and secure, while 78% say they are very or somewhat concerned that AI can be used for malicious intent. A similar percentage (77%) said they were concerned AI could be used to generate deepfakes. Less than half (49%) said they would be okay with AI being used for a chat about “routine medical questions” and for allowing the federal government to use it to assist benefits processing. | Artificial Intelligence |
VentureBeat - 3 ways businesses can strike the ideal marketing and IT balance | For organizations looking to be more efficient and work smarter to maximize their data, being overly IT-focused or overly media/marketing-focused could hold them back. Standing on both legs instead of one will make businesses more fortified at a time when most are striving for resiliency. | MarketingTech |
CSO - New Mirai botnet variant V3G4 targets Linux servers, IoT devices | A new variant of Mirai — the botnet malware used to launch massive DDoS attacks —has been targeting 13 vulnerabilities in IoT devices connected to Linux servers, according to researchers at Palo Alto Network’s Unit 42 cybersecurity team. | Security |
sdxCentral - Cloudflare Fights Off Record-Breaking DDoS Attacks, What’s Coming Next? | “This attack was approximately 100 gigabits per second (gbps),” Omer Yoachimik, product manager at Cloudflare, told SDxCentral. “It is important to note that there is a difference between request-intensive attacks, bit-intensive attacks, and packet-intensive attacks – they are not apples-to-apples comparisons.” | Security |
Network World - Oracle outages serve as warning for companies relying on cloud technology | “Cloud based solutions, like their on-premise equivalents, need to be architected for true high availability and continuity," said Sam Higgins, an analyst at market research firm Forrester. "Having a cloud foundation and a global footprint does not immediately give you 100% uptime for an application. Especially for applications with a long on-premise history and heritage.” | Cloud |
sdxCentral - Network Security Revenue Rebounds, Moderation Coming | “With 400Gb Ethernet pipes coming online and Ethernet expected to continue to increase in speed, each speed step is the driver for a new wave of high-end hardware firewalls,” Sanchez told SDxCentral in an email. “Hardware is really the only way still to process the enormous amount of data. On the other hand, I see standalone low-end firewalls shifting to become secure SD-WAN boxes.” | Network Management |
Computerworld - Enterprise mobility 2023: UEM meets DEX | Another force is integration with endpoint analytics and endpoint security tools, to build proactive and resilient defenses against better-skilled adversaries, Wilson says. In addition, there is a greater focus on intelligence and automation to drive operational efficiency and improve digital employee experience (DEX). | Automation & Productivity |
Blocks & Files - Storage security toughen-up for compliance and cyberwar in 2023 | Importantly, EO 14028 implies that suppliers lacking comprehensive security will not be doing business with the US government. In effect, cybersecurity responsibility is being deferred to solutions providers, and away from their customers, having a game-changing impact on procurement procedures – and cybersecurity provisioning. | Security |
Computerworld - Q&A: What happened when a customer support company upgraded some features to ChatGPT? | "These open APIs that OpenAI has are very expensive compared to any normal API you might use. It just costs a lot of money whenever you get it to summarize something you do. It might cost you like five cents or 10 cents. That gets very expensive. It’s a lot cheaper than paying for a human to do it themselves, but this is something businesses are going to have to figure out. How do we price this? | Automation & Productivity |
Datanami - To Improve Data Availability, Think ‘Right-Time’ Not ‘Real-Time’ | When done successfully, this framework gives the business stakeholders the power to “dial the knob” of data freshness, cost, and quality. As we saw in the BOPIS example, dialing the knob is a massive competitive advantage for both the business and the data engineers because the data freshness can adjust to the needs of the business without relying on infrastructure changes | Data Management |
VentureBeat - How edge devices and infrastructure will shape the metaverse experience | Edge computing, networking and related advancements are required for the metaverse to prove out estimates like Accenture’s. That consultancy expects the metaverse to fuel a $1 trillion revenue opportunity by the end of 2025. | Metaverse |
AiThority - Explainable AI: 5 Popular Frameworks To Explain Your Models | To explain it in layman’s language, Explainable AI can be defined as a compilation of different methods and processes that enable human users to understand the predictions made by their machine learning models. It is primarily used to describe an AI model, forecast its expected impact and point out its potential biases. | Artificial Intelligence |
Computerworld - How enterprises can use ChatGPT and GPT-3 | Enterprises can use the out-of-the-box approach to augment or create content, manipulate text in emails to soften language or take a particular tone, and to summarize or simplify content. “This can be done with limited investments,” Gartner explained in its report. | Artificial Intelligence |
Datanami - Prompt Engineer: The Next Hot Job in AI | Technology professionals who want to catch the hottest wave in AI at the moment may consider becoming prompt engineers, which appears to be one of the most in-demand professions for 2023. And developers who want to get the most out of large language models such as ChatGPT may want to check out prompt engineering tools, an emerging category of tools designed to direct the LLM toward a desired outcome. | Tech Jobs |
sdxCentral - SASE 'Undermines' SD-WAN, GigaOm Says | A new emphasis on the three – SSA, SSE, SASE – has led to the SD-WAN landscape becoming “increasingly blurred, with incumbent vendors repackaging and repositioning legacy products as integrated platforms, acquiring new technologies, or making strategic alliances to fill the gaps in their portfolios.” | Network Management |
Datanami - Everything You Need to Know About Human Annotated Data | It will be an understatement to say that the amount of data generated every day is colossal and to some extent, unstructured. In reality, we produce around 2.5 quintillion bytes of data every single day and most of it is not classified clearly or accurately. | Data Management |
sdxCentral - Okta Finds Increasing ‘All-In’ Zero-Trust Attitude | The survey also found the use of risk-based policies for networks has increased 147% over the past two years; a 60% increase in the use of passwordless Web Authentication (WebAuthn) and a 21% increase in the use of device-trust configurations over the past two years; and that 24% of those surveyed used security keys and biometrics last year. | Security |
Datanami - Bright Data Survey: Majority of Data Professionals Consider Public Web Data Crucial to Their Mission | 100% said their organization uses publicly available web data in their operations to some extent, with 94 percent saying that it is used in their day-to-day operations. | Data & Analytics |
Blocks & Files - Pure: The disk/flash crossover event is closer than you think | Emerson says flash $/TB will continue to decline because, firstly, more layers can be added to 3D NAND and, secondly, PLC (5 bits/cell penta level cell) flash will increase density faster than cost of manufacture. He writes: “Moving from four to five bits per cell would improve density by 25 percent, which presents an obvious cost-efficiency advantage.” | Data Storage |
SiliconANGLE - Digging into Google’s point of view on confidential computing | There’s not a ton in the ETR dataset on the topic of confidential computing. It’s a technology that’s deeply embedded into silicon and computing architectures, so it’s not as visible to chief information officers and the information technology decision makers in ETR’s quarterly surveys. But at the highest level, security remains the No. 1 priority being addressed by organizations in the coming year, as shown above. | Privacy & Security |
Datanami - Nucleus Research Releases 2023 Data Warehouse Technology Value Matrix | Looking ahead through 2023, Nucleus expects customers to prioritize a solution’s managed services, ease of use and integration, and capabilities to support advanced use cases such as machine learning and real-time streaming. | Data & Analytics |
SiliconANGLE - How ChatGPT will – and won’t – change the face of business | ChatGPT has been hailed as everything from the future of search to the end of term papers, but it’s far from a sentient being. While OpenAI LLC’s chatbot is a wonder at explaining the infield fly rule in Shakespearean English, detractors have noted that its answers can be overly simplistic, confusing or just plain wrong. | Artificial Intelligence |
Datanami - Infrastructure and Compute Are Top Barriers to AI, Run:ai Report Reveals | The survey also pointed to another shift over the past year as the number of organizations deploying less than half of their AI models in production increased from 77%, according to last year’s survey, to 88% this year. Weighted for average, just 37% of AI models make it into production. | Artificial Intelligence |
Network World - Why network pros need a seat at the application-planning table | Almost 90% of that same group say that their companies’ application cost overruns and benefit shortfalls were either predictable based on network behavior, or a direct result of mistakes that network professionals could have caught. | Network Management |
SiliconANGLE - Cloud and DevOps outlook for 2023: Getting more out of data | “A lot of times, they’re trying to really understand how their business utilizes these clouds and where their spend is going in those clouds,” Strechay explained. “Can they use lower tiers of storage? Do they really need the best processors? Do they need to be using Intel, or can they get away with AMD or Graviton2 or 3?” | Cloud |
AiThority - Could ChatGPT Herald the Next Stage for CX AI Adoption? | However, unlike existing chatbots that interact with people in a ‘seemingly intelligent’ conversational manner, the GPT-3 neural network ML model enables ChatGPT to deliver responses that Gartner suggests: ‘appear to have understood the question, the content and the context’ of the user’s question. | Artificial Intelligence |
sdxCentral - Cisco Reinforces Frictionless Zero Trust, ‘Intelligent MFA’ | The index is based on data from a survey of 6,700 security leaders across 27 global markets. It found respondents selected identity and device management as two of the three top cybersecurity threats, and only 20% of them considered their organizations “mature” in readiness to protect identity. | Security |
SiliconANGLE - Generative AI drives an explosion in compute: The looming need for sustainable AI | You’ve heard about “moving beyond Moore’s Law” and the physical limitations of packing more transistors onto larger die sizes. Chiplets are helping to address these challenges, but current solutions have a key weakness when it comes to AI inference: Shuttling data in and out of random-access memory leads to significant slowdowns. | Sustainability |
VentureBeat - The profound danger of conversational AI | I’m referring to the increasing possibility that currently available AI technologies can be used to target and manipulate individual users with extreme precision and efficiency. Even worse, this new form of personalized manipulation could be deployed at scale by corporate interests, state actors or even rogue despots to influence broad populations. | Artificial Intelligence |
Computerworld - How many jobs are available in technology in the US? | While the overall US unemployment rate dropped to a figure not seen since 1969 (to 3.4%, from 3.5% a month earlier), the number of technology workers hired in January fell into negative territory for the first time in more than two years. Technology occupations throughout the economy declined by 32,000 for the month, representing a reduction of -0.5%, according to CompTIA. | Tech Jobs |
VentureBeat - Getting results from your zero-trust initiatives in 2023 | “Don’t start with the technology; start with a protect surface,” Kindervag advised during our interview. CISOs and CIOs tell VentureBeat that their zero-trust initiatives and strategies can be affordable as well as effective. As Kindervag advises, starting with the protect surface and identifying what’s most important to protect simplifies, streamlines and reduces the cost of zero-trust initiatives. | Security |
SiliconANGLE - Cloud players sound a cautious tone for 2023 | n this Breaking Analysis, we share our view of what’s happening in cloud markets – not just for the hyperscalers but other firms that have hitched a ride on the cloud. And we’ll share new Enterprise Technology Research data that shows why these trends are playing out, tactics customers are employing to deal with their cost challenges, and how long the pain is likely to last. | Cloud |
Blocks & Files - Cloudian sees cloud software going on-prem | "On-prem computing is here to stay. A quarterly survey of enterprise VARs indicates that 40 percent of workloads will remain on-prem, a figure that has remained steady for about two years now. Migration to the cloud did accelerate during the early part of the COVID era, but what we are seeing now is customers bringing some of those workloads back on-prem." | Cloud |
VentureBeat - Could blockchain be your next big career choice? | The healthcare sector has cottoned on, using blockchain’s ledger technology for secure sharing of medical records and data management, and global governments are using it for voting systems, land registry and identity management. | Blockchain |
sdxCentral - Juniper CEO Remains ‘Optimistic’ Despite Slower Spend Forecast | The company saw “a normalization of buying patterns amongst our cloud and service provider customers,” Rahim noted. “As we expected, overall demand moderated in the December quarter, with total orders declining more than 20% year-over-year.” | Cloud |
SiliconANGLE - AI threats and open-source vulnerabilities top host of security issues facing cloud-native community | Implementation of zero-trust security in the enterprise, supply chain vulnerability, threats to cryptography from quantum computing, and the rise of powerful artificial intelligence engines such as OpenAI LLC’s ChatGPT are high on the list of worries among cloud-native security personnel. | Security |
Blocks & Files - HCI is more than a blip on GigaOm’s radar | Comparing this year’s enterprise HCI Radar (above) to last year’s (below), we can see that Nutanix is now ahead of Microsoft, VMware and Dell in the leader’s ring, and that Cisco has gone backwards from being a leader in 2022 to a challenger this year. SmartX has moved from the new entrant’s ring into the challenger’s ring where newcomer ArcherOS is placed as well. | Network Management |
Blocks & Files - Mr Backup spills the beans on 30 years in the storage industry | "Now anything mission-critical is RAID-protected, and most things are solid state. Today’s admins (and people with their own personal data) just don’t have the same respect for backups they once did, and assume far too much as a result." | Data Management |
sdxCentral - Forrester Finds Enterprises Will Focus on Resiliency in Face of Recession | That said, the firm said virtual machine (VM)-centered workloads should now be regarded as legacy,” and anticipates 40% of organizations will take a cloud-native-first strategy this year. Many are expected to also increase investment in K8s as a distributed compute backbone for current applications and new workloads that can be run more efficiently in K8s’ environments. | IT Management |
Computerworld - Big banks' proposed digital wallet payment system likely to fail | The system will be managed by Zelle’s parent company, Early Warning Services LLC (EWS). It will have about 150 million Visa and Mastercard credit and debit cards connected at launch, with plans to add other card networks later, according to an EWS blog. | FinTech |
VentureBeat - Making security invisible with adaptive access management | With every organization obsessed with speed as a competitive differentiator, it is no wonder that CIOs are tasked with streamlining login and system access user experiences. When security measures are fast and seamless, users are much more likely to embrace them, contributing to, rather than detracting from, speed and accelerated response. | Securty |
Computerworld - Tech jobs dominate the top 25 'best' jobs in the US, Indeed says | Online job site Indeed this week released its list of the 25 best jobs in the US, and the top slot went to full stack developer, which offers a median annual salary of $130,000 and allows for a mostly remote or hybrid workplace. | Tech Jobs |
sdxCentral - ISG Launches SDN Study to Shape Enterprise Network Strategy | “A change is evident in how enterprises purchase networks,” Basu told SDxCentral in an email. “ISG is witnessing a tendency to shift toward the concept of network-as-a-service (or network as a subscription) among enterprises, which can sidestep heavy [capital expense].” | Network Management |
VentureBeat - What the FBI’s Hive takedown means for the ransomware economy | “The real challenge lies in the protection racket that exists between the cybercrime cartels and the Russian regime, which endows them with untouchable status from western law enforcement." | Security |
Datanami - IDC Survey Finds Data Sovereignty and Compliance Issues Shaping IT Decisions | Almost half the respondents (48%) to IDC’s Cloud Pulse 2Q22 survey (n=1350) say that data sovereignty and industry compliance have factored highly in discussions about their future IT architectures. And just 4% of respondents believe their IT organizations will not be impacted by data sovereignty and compliance considerations. | Data Management |
AiThority - Understanding AIOps and Its Impact on Cybersecurity Management | In the current scenario, AIOps are the need of the hour, especially as the pandemic ushered in a lot of changes in the working style. Today, some companies are completely remote and some are following the hybrid working model, in either case, businesses are under tremendous pressure to detect data anomalies, critical issues, and multiple service interruptions. | IT Management |
Blocks & Files - A block data migration specialist talks about … block data migration | Typically, you use block migration tools for block data and file migration tools for file data. That said, there are exceptions to this rule depending on the desired outcome. | Data Storage |
Datanami - GigaOm Report Reveals Advantages of Modern Approach to Data Access Control | Immuta required just eight policy changes to accomplish the same security objectives compared to 745 policy changes with legacy role-based access control (RBAC) used by other data security platforms, representing a 92x improvement. | Data Management |
sdxCentral - SecurityGen Talks Top 5G Network Security Priorities | Last week, SecurityGen released its top five priorities for telecom operators in 2023. Its council boiled down to a memorandum for telcos: Because operators are such high-target entities for ransomware, they must take a more hands-on and collaborative approach in addressing the security threats of openly integrated – and moreover nonstandalone – 5G technology. | Security |
VentureBeat - Why leveraging privacy-enhancing tech advances consumer data privacy and protection | However, despite the many benefits that insights from location data provide, to the average person, consumer data privacy remains a top concern. This often leaves businesses struggling to achieve the fine balance between using data to uncover meaningful insights while ensuring consumer privacy. | Data Privacy |
ZDNet - Technology spending will rise next year. And this old favourite is still a top priority | In short, digital leaders believe an investment in technology – whether that's on-demand IT, data analytics or automation – will help their organisations deal with what's already a hugely challenging business environment. | Tech Trends |
VentureBeat - IBM: Quantum computing poses an ‘existential threat’ to data encryption | The report argues that quantum computing poses an “existential risk” to classical computer encryption protocols, and notes that cybercriminals are potentially already exfiltrating encrypted data with the intention of decrypting it once quantum computers advance as part of “harvest now, decrypt layer attacks.” | Data Protection |
VentureBeat - T-Mobile data breach shows API security can’t be ignored | With cloud adoption increasing dramatically over the past few years, analysts have long warned enterprises that a tidal wave of API exploitation has been brewing. Back in 2021, Gartner predicted that in 2023, API abuse would move from infrequent to the most frequent attack vector. | Security |
Networld World - Pros and cons of managed SASE | Managed SASE can be appealing for enterprises that want a single provider for deployment and management of WAN and security infrastructure, but there can be tradeoffs depending on provider flexibility, platform interoperability, and cost. | Network Management |
SiliconANGLE - Uber, Walmart and others set out to redefine the modern cloud data stack | Most applications today codify forms or business processes. But there is growing momentum behind application tools in the cloud that can orchestrate people, places or things. An example of this can be seen in the work of dbt Labs, a Philadelphia-based data analytics startup that is creating a development framework built on the modern data stack. By adding a semantic layer to describe data, dbt Labs is seeking to build new bridges between data science and data analytics. | Data & Analytics |
sdxCentral - GlobalData: Zero Trust Will Gain Traction in 2023 | Bicknell also expects a zero-trust officer role to emerge at organizations to “coax, cajole, and bully companies on their zero-trust journey. | Security |
Network World - IT to shoulder more responsibility for data center sustainability | Cutting-edge server chips are turning heads for their potential to boost performance, but next-generation processors also run hotter than older designs, and data-center operators will struggle to figure out what to do with limited guidance from chip makers. | Sustainability |
VentureBeat - How to get started with intelligent automation | Process mining, which is technology for discovering, optimizing, and monitoring processes, is proving to be an ideal starting place for businesses ready to embrace automation and begin their digital transformation journeys. | Automation & Productivity |
Blocks & Files - Iron Mountain on getting rid of storage junk | “Secure disposal practices start with strong data protection and asset management practices – drives should be encrypted, tracked, and maintained via tags tied to an inventory system." | Data Storage |
AiThority - Key Trends Driven by Data and Computing in 2023 | “Observable” data include key digitized artifacts, such as logs, traces, API calls, dwell time, downloads and file transfers, that appear when any stakeholder takes any kind of action." | Data & Analytics |
SiliconANGLE - Analysts anticipate next wave of innovation from new breed of data applications | “Keep your eye on this North Star, where instead of building apps that are based on code, you’re building apps that are defined by data coming off things that are linked to the real world, like people, places, things and activities,” Gilbert said. “Amazon.com is defined by stuff coming off data in the Amazon ecosystem or Marketplace.” | Emerging Tech |
Networld World - T-Mobile, Xfinity are tops in latest Ookla speed test report | The median download speed for T-Mobile customers, Ookla said, reached over 151Mbps, marking a sharp increase from the company’s 116Mbps mark in the previous quarter, which was already good enough to make T-Mobile the fastest mobile carrier by a distance. | 5G |
AiThority - The A-Z on Transforming Content: What is Generative AI? | Generative AI also known as GI, brings together the power of artificial intelligence and machine learning to create and personalize short as well as long-form content. With the constant technological evolution, GI’s approach has also explored a variety of machine learning techniques including deep learning, Generative Adversarial Network (GAN), and transformers. | Artificial Intelligence |
Blocks & Files - Toshiba exec says SSDs can never replace HDDs | “259 million HDDs were shipped last year – a case in point. Their total capacity reached 1.338 zettabytes, an increase of almost one-third compared to 2020. Never before have HDDs been shipped with more combined storage capacity.” | Data Storage |
SiliconANGLE - ChatGPT won’t give OpenAI sustainable first-mover advantage | You’ve got the big cloud and internet giants all poised to go after this opportunity. Microsoft investing up to $10 billion, and Google has evidently sounded the code red. There’s Apple, of course, and several alternatives on the market today such as Chinchilla, Bloom or Jasper. | Artificial Intelligence |
sdxCentral - 7 Layers: FortiGuard Labs Sees Nation-State Actors, Cybercriminals Colluding | Fortinet’s FortiGuard Labs recently released its predictions for 2023, highlighting the trend of advanced persistent cybercrime enabling a new wave of destructive attacks at scale and fueled by cybercrime-as-a-service. | Security |
SiliconANGLE - Supercloud debate offers insight into key choices confronting enterprise IT | “It all works great as long as you are in one platform,” Mohan said. “But if your primary goal is to choose the most cost-effective service irrespective of which cloud it sits in, then things start falling sideways. How do I move my workload from one platform to another platform? That tooling does not exist.” | IT Management |
AiThority - How AI Is Becoming the Next Frontier in Cybersecurity | Novel viruses often known as zero-day threats infiltrate data centers before the security team can widely circulate updated signatures. The problem security teams face today is traditional cyber applications are not able to update malware signatures quickly enough. | Security |
sdxCentral - How Economic Downturn Adds Complications to CISO Role | “The role of the CISO has been growing in importance for a while now as companies increasingly recognize the importance of securing their data,” Kapoor told SDxCentral in an email. “It is one of the hardest jobs in IT, where the number of job responsibilities and the importance of said responsibilities keep increasing.” | Security |
SiliconANGLE - Gartner sees robust IT spending growth in 2023 | Spending on data center systems, which leaped 12% in 2022, will see the biggest slowdown this year, with growth expected to fall to just 0.7%. Spending on software is expected to jump 9.3%, with IT services growing a healthy 5.5%. Overall IT spending will be dragged down the most by a decline in spending on devices, which more buyers than expected have opted to keep in their pockets rather than replace this year. | IT Management |
Blocks & Files - Data management is still human labor for most Register readers | The report, Data Management is Still Manual Labor for Most Register Readers, looked at three general topics: storage tiers and data placement; on-premises and public cloud data movement; and use of data warehouses and lakes. | Data Management |
SiliconANGLE - Supercloud2 explores cloud practitioner realities and the future of data apps | But creating a consistent experience across clouds and on-prem estates has been an elusive capability for most organizations, forcing tradeoffs and injecting friction into the system. The need to create seamless experiences is clear and the technology industry is starting to respond with platforms, architectures and visions of what we’ve called supercloud. | Cloud |
Datanami - Growing Developer Skills Expand US Market for AWS: ISG | Google and Microsoft are challenging AWS by introducing highly advanced tools for analytics, AI and machine learning in the cloud, ISG says. These offerings, including tools from Google’s DeepMind and Microsoft’s partnership with OpenAI, often enter the mix first in the U.S., traditionally an early adopter of cloud technologies. | Training |
SiliconANGLE - Supercloud forecast: the new data architecture requirements | “From there, thought about rethinking database architectures and file formats so that we can take each one of these services and bring them together, whether distributed or centrally, such that customers can access and get answers — whether it’s operational data, whether it’s business data, AKA search or SQL.” | Data & Analytics |
AiThority - The Role of Artificial Intelligence in Email Customer Service | In addition to chatbots and predictive analytics, AI is also being used to automate more complex customer service tasks, such as email categorization and prioritization, and even the generation of personalized signatures through an email signature creator. | Automation & Productivity |
Computerworld - Gen Zers and Millennials split over the appeal of remote work | The study found that about half (49%) of millennials surveyed want to work fully remote, whereas only 27% of Generation Z (Gen Zers) feel the same way; they're much more likely than average “to be seeking in-person” work opportunities. Oddly, Gen X and baby boomers felt less impassioned about remote options. Only 40% of either group indicated “their ideal workplace setting” should be remote. | Automation & Productivity |
eWeek - Tech Predictions for 2023: AI, Cloud, Edge, Cybersecurity, and More | Artificial intelligence: The stunning debut of ChatGPT in November put us on notice: AI is growing exponentially, offering a toolset (for free!) that would’ve been sci-fi not that long ago. | Tech Trends |
VentureBeat - Google’s Muse model could be the next big thing for generative AI | Muse leverages conditioning on pretrained language models used in prior work, as well as the idea of cascading models, which it borrows from Imagen. One of the interesting differences between Muse and other similar models is generating discrete tokens instead of pixel-level representations, which makes the model’s output much more stable. | Artificial Intelligence |
TechRepublic - Securing the edge begins with securing IoT devices | IoT is vulnerable to security attacks because many IoT device manufacturers fail to install adequate security on their devices. Many of these devices have been developed by startup companies that are focused on getting their offerings quickly to market, even if security and governance are skipped. | Security |
SiliconANGLE - Analysts forecast key enterprise data trends for 2023 | “It’s really a three-to-five-year time period that graph databases will become significant,” Olofson said. “They still need accepted methodologies that can be applied in a business context, as well as proper tools for people to use them seriously. But I stand by the idea that it is taking off because Neo4j, which is the leading independent graph database provider, had a very good year.” | Data & Analytics |
VentureBeat - OpenAI, Georgetown, Stanford study finds LLMs can boost public opinion manipulation | For example, adversaries can use LLMs to create dynamic personalized content at scale or create conversational interfaces like chatbots that can directly interact with many people simultaneously. The ability of LLMs to produce original content will also make it easier for actors to conceal their influence campaigns. | Artificial Intelligence |
Computerworld - Microsoft aims to improve OKR adoption with Viva Goals integrations | In order to improve the level of understanding and foster a greater sense of cohesion around goal setting, Microsoft has announced it is enhancing Viva Goals integration with the company's Teams collaboration software. This will allow leaders and employees to receive notifications around OKR activity, bring goal-setting into conversations, and create, edit, and make check-ins to OKRs directly in a Teams chat. | Automation & Productivity |
Datanami - IDC: Spending on Cloud Infrastructure Continues Strong Growth in Q3 2022 | Spending on shared cloud infrastructure reached $16.8 billion in the quarter, increasing 24.4% compared to a year ago. IDC expects to see continuous strong demand for shared cloud infrastructure with spending expected to surpass non-cloud infrastructure spending in 2023. | Cloud |
ZDNet - Metaverse minus the headset: A deeper look at Lenovo's Project Chronos | There was also an intriguing announcement from Lenovo -- Project Chronos, a camera-based full body motion-capture system that allows you to animate an avatar in the metaverse without the need for a headset or other wearable sensors. | Metaverse |
VentureBeat - 3 factors that can ensure zero trust success | The first factor is overall complexity. It is often noted that complexity is the enemy of security. Overly complex and difficult solutions and policies make security unusable and promote workarounds that circumvent the solution or practice. The old Post-It notes with passwords on the side of an employee’s monitor as a way to deal with stringent password policies used to be a good example of this. | Security |
Computerworld - The productivity promise (and perils) of generative AI | But much like searching on the web, you need to develop skills for these tools so you can word a command or query that quickly delivers the result you want. Without that skill, you’ll struggle — either because you haven’t taken the time to fully detail your query or you don’t know how to properly word it. | Artificial Intelligence |
VentureBeat - AWS security heads offer top cybersecurity predictions for 2023 | “MFA [multifactor authentication] adoption will continue to grow for both business and personal use, including increased use of biometric forms of authentication that improve security and convenience (that is, unlocking devices with a fingerprint or face identification). | Security |
Network World - 7 ways to secure backup data | Encrypted backup data cannot be used to extort your company. Attackers might be able to exfiltrate it, but it will be useless without the keys. Encryption technology has evolved to a point that this can be handled with relative ease, allowing you to encrypt all backups wherever they are stored. | Security |
sdxCentral - Dell CTO: We Can Demonstrate ‘Zero Trust Is Actually Real’ | The center is designed to provide a secure data center for organizations to test configurations and validate zero-trust use cases, which allows organizations to test configurations based on the Department of Defense (DoD) Zero Trust Reference Architecture before deployment into their own environments. | Security |
Network World - What to expect from SASE certifications | Compared to other networking certifications, like the CCNA, which is more about how to operate the technology, Cato’s SASE and SSE certifications are high-level overviews. “Our certification is more about what SASE and SSE mean, what are the implications, and what it means to different IT teams,” | Tech Certs |
ZDNet - Hackers are using this old trick to dodge security protections | Scattered Spider is a financially motivated cybercrime operation, which researchers say takes particular interest in telecoms and the business outsourcing sectors, with the objective of gaining access to mobile carrier networks. | Security |
sdxCentral - Low-Code Security Requires Shared Responsibility Model | The LCNC market is so successful because of its its naturally faster speed of application development and deployment. “There is one stakeholder that can do everything from thinking about the need to solving the need [on] their own,” he said. That doesn’t mean, however, that those citizen developers or business technologists should be solely responsible for the security risks posed by low-code application development. | Security |
AiThority - How Much is Tech Actually Costing You? Understanding the True Cost of Ownership | Many companies use the latest technology to be as efficient and competitive as possible, but research indicates a good number of them may be wasting money on tech. One study by Gartner, a global research and advisory firm, found that companies spend $13,000 per employee annually on software as a service (SaaS), but $4,000 is unnecessary due to overlapping solutions. | IT Management |
Network World - 8 hot networking technologies for 2023 | Unified Secure Access Service Edge (SASE) tightly integrates security and networking into a single platform. The technology uses a single-pass scanning architecture combined with a unified policy that's configured via a unified console that draws from a unified data lake. | Network Management |
Computerworld - Your next job recruiter might be an AI bot | As many as 49% of candidates turn down a job offer because of poor recruiting, according to PwC's Future of Recruiting survey. Along with improving the candidate interview experience, organizations need higher quality candidates who are also more likely to remain, and they're turning to AI to find, cull, and woo job candidates. | Tech Jobs |
sdxCentral - VMware: Customers Want ‘Open Architecture’ SASE | “Or said differently, to minimize the inefficiencies of two vendors, enterprises are asking SD-WAN and SSE partners to collaborate to achieve a tight integration across both management and data planes. This gives the enterprise more options on how they start their journey to a single vendor SASE architecture.” | IT Management |
VentureBeat - How upskilling and training providers help close the cybersecurity skills gap | One of Hack the Box’s main competitors in the market is Immersive Labs, which raised $66 million in funding in October 2022, and offers security teams a platform for continually testing and measuring cyber resilience, with defensive and offensive upskilling training content and exercises tailored toward executive, cybersecurity, and risk and compliance teams. | Security |
Datanami - Neutronian Releases Expanded Q1 2023 Data Privacy Scores Rankings List | For the first time, Neutronian has included the top 800 publisher domains in the rankings (including NYTimes.com, Pinterest, Yahoo, NBC, CBS, and Conde Nast) to highlight the level of data privacy on sites where digital campaigns are running. | Data Privacy |
VentureBeat - AI may be red-hot, but Scale AI layoffs send shivers | But last night, an Insider’s report that the unicorn company had laid off 20% of its 700-person staff sent shivers down the spines of those who thought AI was generally immune to the current wave of tech layoffs — especially at this red-hot AI moment when news that Microsoft is reportedly in talks to invest $10 billion in OpenAI and buzzy generative AI startups like Jasper and Stability AI are boasting over $100 million raises. | Artificial Intelligence |
sdxCentral - Axis Promotes Public Cloud as SSE Priority | While Hines said the term “hybrid” has been overused in the market, the new reality of dispersed users and more branch locations can’t be ignored. “All those branches, they all have different levels of needs — some have users, some have printers and IoT devices,” he added. “The whole reality here is you’re not going to have to require a full SD-WAN or network stack at every single location.” | IT Management |
VentureBeat - How ChatGPT in Microsoft Office could change the workplace | The AI Beat | The stream of Microsoft news made me wonder: How would these apps-on-steroids, used by billions of companies globally, change how we work? Especially once Google gets fully in the game, integrating its own generative AI capabilities into Google Workspace? Will AI become as mundane in our day-to-day work lives as the humble spreadsheet? | Automation & Productivity |
ZDNet - People are already trying to get ChatGPT to write malware | "Threat actors with very low technical knowledge - up to zero tech knowledge - could be able to create malicious tools. It could also make the day-to-day operations of sophisticated cybercriminals much more efficient and easier - like creating different parts of the infection chain," | Security |
eWeek - The AI Market: An Overview | IDC predicts the worldwide AI market, including software, hardware, and services, will grow from $327.5 billion in 2021 to $554.3 billion in 2024 with a five-year compound annual growth rate (CAGR) of 17.5%. | Artificial Intelligence |
sdxCentral - Where Is Edge Headed in 2023? | The hybrid workplace has been adopted globally, allowing millions of employees to work from any location and making edge technology implementation a top priority. As such, Gartner estimates that three-quarters of enterprise-related data will be created and processed at the edge by 2025. | Edge Computing |
VentureBeat - Ransomware attacks dropped 61% last year, but orgs can’t be complacent | One such sign of complacency is the decrease in the number of organizations with incident response plans, dropping from 94% to 71%, which could make these companies less effective at responding to data beaches, and give threat actors more opportunities to exfiltrate critical data assets. | Security |
Computerworld - This lawsuit against Microsoft could change the future of AI | But there's a dirty little secret at the core of AI — intellectual property theft. To do its work, AI needs to constantly ingest data, lots of it. Think of it as the monster plant Audrey II in Little Shop of Horrors, constantly crying out “Feed me!” Detractors say AI is violating intellectual property laws by hoovering up information without getting the rights to it, and that things will only get worse from here. | AI Ethics |
VentureBeat - Report: 85% of demand-generation campaigns involve chatbots | The State of Chatbots in B2B Demand Generation report reveals that marketers have also found great success using chatbots to generate new leads, help educate prospects about their company’s products and services, segment their audience base, build stronger customer relationships, qualify leads for their sales team, and more. | Marketing Tech |
sdxCentral - Too Soon to Invest in Wi-Fi 6E, Gartner Says | Despite growing enterprise investment in Wi-Fi 6E infrastructure, most end-user devices such as laptops, tablets and smartphones are still limited to 802.11ac and 802.11ax, and cannot use the 6 GHz spectrum quite yet. | Network Management |
Blocks & Files - VMware and Nutanix still dominating HCI market | As before, VMware leads in revenue and market share ($982.3 million, 41.5 percent) followed by Nutanix ($581.2 million, 24.6 percent) with Huawei, Cisco and HPE distantly behind. | Data Storage |
VentureBeat - Director of data analytics: Role and key skill requirements | A data analytics director must first be a data analyst conversant in creating, maintaining, improving and correctly integrating analytical tools and processes across an organization’s internal departments. | Tech Jobs |
SiliconANGLE - CIOs are in a holding pattern – but ready to strike at data monetization | The bottom line is, for the moment at least, the mindset is not to cut everything, rather it’s to put a pause on cleaning up legacy hairballs and continue to fund initiatives to drive monetization. Cloud has become fundamental and getting data “right” is a consistent theme that appears to be an underpinning of initiatives getting funded today. | Data & Analytics |
sdxCentral - How to Build Successful Data Stacks | Companies using a multi-tool systems environment are struggling to keep pace because they’re managing a tangle of single-function systems that weren’t designed to work together. Businesses are reaching their breaking point as they tire of assembling and managing upstack tools and not seeing enough returns on those investments. | Data Management |
Network World - Work from home is here to stay, so how should IT adjust? | Migrating from hardware-centric, on-premises systems to cloud-based services helps organizations scale in order to handle a remote workforce, but IT execs should beware that this type of shift often moves problems around, rather than eliminating them altogether, or creates new ones. | IT Management |
TechRepublic - Data ingestion vs. ETL: How are they different? | Data ingestion is an umbrella term for the processes and tools that move data from one place to another for further processing and analysis. It typically involves transporting some or all data from external sources to internal target locations. | Data Management |
AiThority - Applications of Data Science & Machine Learning (DS/ML) | This list is far from comprehensive – in general, DS/ML is almost omnipresent in our daily lives, with countless iterations impacting almost everything we do. The popularity of DS/ML models shows no sign of slowing, and inevitably will become increasingly integrated into our daily lives until we barely remember life before it. | Machine Learning |
VentureBeat - ChatGPT and the unbundling of online search | There are several reasons to believe that a ChatGPT-powered Bing (or any other search engine) will not seriously threaten Google’s search near-monopoly. LLMs have several critical problems to solve before they can make a dent in the online search industry. | Automation & Productivity |
SiliconANGLE - Enterprise support for the metaverse flourishes at this year’s CES | Earlier this week, Accenture PLC released research findings during CES that showed more than half of consumers surveyed view the metaverse as a business opportunity and 88% of C-suite executives believe the metaverse will have an important role in their organizations’ future growth. | Metaverse |
VentureBeat - Why cloud observability will be critical in 2023 | Over the past decade, there has been a solid push to increase agility in enterprise IT to support the digitization of business processes and services. This trend has led to various technological innovations, such as infrastructure virtualization and containerization. However, traditional IT monitoring tools need to be equipped to handle the complexity and vast amount of telemetry data that come with deploying new containerized microservices. | Cloud |
Storage.com - Opinion of Storage Vendors on 2022 Market | Flexible storage consumption models have been top of the agendas for most CIOs and IT leaders for a few years now. But 2022 was the year when the discerning CIO was quick to spot the difference between a product on subscription and a true service. Customers recognized and firmly rejected legacy financial leasing models dressed as STaaS). | Data Storage |
VentureBeat - Why IAM’s identity-first security is core to zero trust | Two core areas of the zero trust framework — enforcing least privileged access and implementing segmentation — are challenging, as enterprises are seeing huge growth in machine identities. These machine identities (such as bots, robots, and Internet of Things (IoT) devices) on organizational networks are increasing at twice the rate of human identities. | Security |
Computerworld - How many jobs are available in technology in the US? | CompTIA’s analysis also showed that 30% of all tech jobs postings are for positions in emerging technologies, such as artificial intelligence, or in roles requiring emerging tech skills. | Tech Jobs |
VentureBeat - Top AI conference bans ChatGPT in paper submissions (and why it matters) | It didn’t take long for a brisk social media debate to brew, in what may be a perfect example of what businesses, organizations and institutions of all shapes and sizes, across verticals, will have to grapple with going forward: How will humans deal with the rise of large language models that can help communicate — or borrow, or expand on, or plagiarize, depending on your point of view — ideas? | Artificial Intelligence |
Blocks & Files - Pure Storage on its predictions for 2023 | "The benefits of flash for data storage are undeniable – it has until now been largely a question of cost, and what workloads a customer has justify the additional cost for flash. To bridge that gap, customers have had to make tradeoffs, or manage tiering between flash and disk to save costs." | Data Storage |
sdxCentral - Cisco, Aruba, Juniper Among Gartner LAN Leaders | Gartner again gave a nod to Cisco, Extreme Networks, Hewlett Packard Enterprise (HPE)/Aruba, and Juniper Networks as leaders in its Magic Quadrant for Enterprise Wired and Wireless LAN Infrastructure, with Huawei joining that list for the first time | Network Management |
Network World - Cloud providers should unify virtual networking and SD-WAN | Traditional VPNs based on MPLS require usage of border gateway protocol (BGP), routers, and often some form of carrier Ethernet access, all of which can drive small-site connection costs so high that CFOs cringe at any suggestion that the sites should be on the company network. But, as worker empowerment through application and data access became more important to businesses, they were trapped. So along came SD-WAN. | Network Management |
AiThority - “Evolve or Die”: AWS Re:Invent Delivers Inspiration in a Cost-Conscious Environment | In the past, AWS has been reluctant to tell its customers how they should use the ever-growing functionalities of the cloud. They leave it to internal teams to discern the best way to leverage the vast library of AWS services. But it may be time for AWS to be more opinionated. For instance, customers now can select from about 600 instance types | Cloud |
sdxCentral - Top SASE Execs Make 2023 Predictions | Gartner also announced its single-vendor SASE leaders. The firm’s definition specifies that a complete SASE offering combines network edge capabilities like SD-WAN, and a set of cloud-centric security service edge (SSE) capabilities, including secure web access gateway (SWG), cloud access security broker (CASB), firewall-as-a-service (FWaaS), and zero-trust network access (ZTNA). | Security |
AiThority - Edge Adoption is Growing Across Industries—Here’s Why | The Edge OT are the advanced computing devices that will power the smart factory by managing machines and equipment focused on advanced analytics, maintenance and augmented reality, and is projected to grow by as much as 13%. | Edge Computing |
Blocks & Files - Opinion: Online disk archives are just wrong | In other words, an active archive covers non-primary data, meaning secondary (nearline) and tertiary (offline) data with no mention of online media being restricted to caching. The AAA is saying you can have an online archive. | Data Storage |
Datanami - CelerData Cofounder and CEO Identifies Cloud and Real-Time Analytics Predictions for 2023 | “Cloud costs, consumption models, and ROI will come under the microscope as organizations look for ways to tighten spending in light of economic uncertainty. In response, many cloud vendors will become more creative in product development, service offering, and pricing structure in an effort to retain existing customers and become more competitive for new business.” | Cloud |
Computerworld - Raises for some IT pros could jump 8% in 2023, exceeding inflation | In 2022, however, merit increases for IT pros lept to 5.61%, with the median salary for all IT professionals rising from $95,845 to $101,323. The median salary for an IT executive rose to $180,000. | Tech Jobs |
ZDNet - These grim figures show that the ransomware problem isn't going away | Researchers suggest that much of the rise in reported ransomware attacks against local governments can be linked to a single incident in Miller County, Arkansas, where one compromised mainframe resulted in malware being spread to endpoints in 55 different counties. | Security |
The Hacker News - The FBI's Perspective on Ransomware | To help ransomware victims and to prevent ransomware, the FBI has set up 56 Cyber Task Forces across its field offices. These Task Forces work closely with the IRS, the Department of Education, the Office of Inspector General, the Federal Protective Service and the State Police. They're also in close contact with the Secret Service and have access to regional forensics labs. | Security |
VentureBeat - Consumer and business interest in the metaverse is growing | Accenture | According to the research, more than half (55%) of the roughly 9,000 consumers surveyed see the metaverse as a business opportunity for creating and monetizing content. Most (89%) C-suite executives also believe the metaverse will have an important role in their organization’s future growth, according to a parallel survey of 3,200 C-suite executives. | Metaverse |
sdxCentral - Are Enterprises Prepared for Data Pipeline Failure? | Data pipelines enable the movement of data and support customer experience, which should render observability at this layer an enterprise priority. A majority (63%) of execs dealing with data networking pipeline failures noted those issues negatively impact their organization’s customer experience. | Data Management |
The Hacker News - Enforcement vs. Enrollment-based Security: How to Balance Security and Employee Trust | The applications these tools don't support are often the riskiest because they don't meet common industry and security standards, including SAML for authentication and SCIM for user management. At Cerby, these are called "unmanageable applications," and according to their research, 61% of SaaS applications are unmanageable. | Security |
sdxCentral - Analysys Mason: Telcos, Cloud Platforms Will Make the Metaverse Real | “What we need is really scalable compute and really low latencies. If all of that processing does happen in the cloud, rather than happening locally on your Meta Quest Pro headset, then it does become possible to create those kinds of experiences, but the platform needs to exist.” | Metaverse |
AiThority - Click Fraud Prevention Service Polygraph Advises Advertisers To Invest In Search Engine Optimization | Click fraud is an online scam where website publishers generate income by programming bots to repeatedly click on advertisements. Since the advertisements are displayed on the scammers’ websites, for every fake click, the advertisers pay fees to the advertising networks, and the advertising networks share the money with the criminals. | Marketing Tech |
Network World - AI is coming to the network | AI tools that feel different to work with, that change the way network admins work with their tools, are beginning to enter the market. A solid example is the introduction of virtual assistants that can have meaningful conversations about what is happening in the network, and that can (if allowed) take actions that alter network function. | IT Management |
VentureBeat - 5 reasons why data privacy compliance must take center stage in 2023 | And U.S.-based companies limited to domestic business are paying attention, too. While there is no national data privacy referendum in the U.S., four states — Colorado, Connecticut, Utah and Virginia — will begin enforcing state data privacy legislation in 2023. | Data Privacy |
sdxCentral - Will 2023 Be the Year of NaaS? | IDC reported that 69% of global respondents to a recent survey are planning to invest in network transformation over the next 12 months, highlighting network-as-a-service (NaaS) as a challenger to legacy network models that necessitate substantial upfront capital. | Network Management |
Blocks & Files - Object storage: Coldago moves Quantum up and Cloudian down in the rankings | The Coldago Research Map 2022 for Object Storage lists and ranks 15 vendors playing in the object storage market segment. They are, in alphabetic order: Cloudian, Cohesity, Commvault, DataCore, Dell, Hitachi Vantara, IBM, MinIO, NetApp, Pure Storage, Quantum, Scality, Spectra Logic, VAST Data and WEKA | Data Storage |
Computerworld - 4 up-and-coming employee mobile apps | The app, which supports both Android and iOS devices, gives operational managers a complete view of their deskless enterprise. It allows workers and managers to use a single system for scheduling, resource travel, time management, and analytics and data reporting. | Automation & Productivity |
VentureBeat - 14 data predictions for enterprise growth in 2023 | “Part of the problem is that CIOs today have to manage too many systems. Too many disjointed data pools lead to duplicated, siloed and locked-up data, which is not only timely and costly to manage and analyze, but also leads to security issues." | Data Management |
Network World - 9 steps to protecting backup servers from ransomware | Backup servers get attacked in two ways—by exploiting a vulnerability or logging in using compromised credentials. Disabling all but the necessary inbound ports can stop both. Only ports the backup software needs to perform backups and restores should be left open, and they should be accessible only via a VPN dedicated to the backup serve | Security |
ZDNet - ChatGPT's next big challenge: Helping Microsoft to challenge Google search | Bing could be getting ChatGPT-enhanced search capabilities as early as March in a move that capitalizes on Microsoft's $1 billion investment in Open AI in 2019, which included an exclusive multi-year cloud-computing partnership to build new Azure AI supercomputing technologies. | Automation & Productivity |
VentureBeat - Defensive vs. offensive AI: Why security teams are losing the AI war | Eighty-eight percent of CISOs and security leaders say that weaponized AI attacks are inevitable, and with good reason. Just 24% of cybersecurity teams are fully prepared to manage an AI-related attack, according to a recent Gartner survey | Security |
SiliconANGLE - Report: Apple’s mixed reality headset will get auto-adjusting lenses and more | A particularly alluring feature mentioned in the report suggests that small motors will automatically adjust the internal lenses to match the user’s vision in order to provide the clearest view possible. It will do so using the wearer’s interpupillary distance – the range between the pupils – in order to provide the largest field of view possible for each individual. | Emerging Tech |
Network World - Looking ahead to the network technologies of 2023 | During COVID, one of the less-reported changes enterprises made was to start using the Internet to support work-from-home requirements. They then figured out that if they supported workers via the Internet, they could take their traffic directly into the data center and bypass VPNs. Thus, the Internet started to erode VPN traffic growth, and that’s going to continue and accelerate in 2023. | Network Management |