Teckedin - 2022 Curated Analysis, Surveys, Trends and Reports
  • Dark
    Light
  • PDF

Teckedin - 2022 Curated Analysis, Surveys, Trends and Reports

  • Dark
    Light
  • PDF

Thank you to our sponsor. All columns are sortable.


Title/LinkDescriptionCategory
VentureBeat - Career paths in cybersecurity: Key skills, salary expectations and job description
The following information about cybersecurity careers and salaries will help you know what to expect and which skills are most beneficial for people in the industry. It will also give you a rundown of potential roles and responsibilities.
Tech Jobs
GeekWire - Economic uncertainty starts to hit tech job market with reports of hiring slowdowns, rescinded offers
However, recruiters and tech leaders say the impact is not yet widespread, and depends highly on the sector in which a company is operating and the types of positions it’s filling. Engineers, for example, remain in high demand.
Tech Jobs
Becker's Health IT - Information security analyst pay by state
Information security analysts, who ensure security controls are in place, make an average of $113,270 annually, according to the latest data released March 31 by the U.S. Bureau of Labor Statistics.
Tech Jobs
VentureBeat - The creation of the metaverse: The market
But regardless of who gets credit, the metaverse is now as much a part of popular tech culture as things like blockchain, AR/VR, AI and quantum computing. All of which, by the way, are now combining to drive what the metaverse will eventually be. And that’s exactly what makes it so exciting.
Metaverse
ZDNet - Skills and security continue to cloud the promise of cloud-native platforms
The survey finds 83% are using either hybrid or multi-cloud, but nearly 50% say lack of in-house skills and limited talent stand in the way of migrating to or using Kubernetes and containers.  
Cloud
HotHardware - Cybersecurity Report Calls Out CEOs For Using Shockingly Weak Passwords
NordPass recently worked with independent cybersecurity researchers to assemble a list of passwords used by CEOs, C-level executives, business owners, and managerial-level team members. The resulting list was topped by an assortment of pitiful passwords used in large numbers.
Security
Network World - What is Nmap and why do you need it on your network?
Nmap, short for Network Mapper, is a free and open source tool used for vulnerability checking, port scanning and, of course, network mapping. Despite being created back in 1997, Nmap remains the gold standard against which all other similar tools, either commercial or open source, are judged.
Network Management
VentureBeat - What the U.S. government’s security testing protections mean for enterprises
The new policy offers protection for entities conducting “good-faith testing,” which is the investigation or correction of security flaws or vulnerabilities carried out in a way that’s designed to avoid any harm to individuals or the public
Security
Cyber Defense Magazine - True Cybersecurity Requires a Shift to A Data-Centric Philosophy
Literally every API represents a potential vulnerability. Akami’s 2020 State of Internet Security Report, in fact, found that 75% of all financial services industry cyber attacks targeted APIs. The result is a system of countless data silos, each with a discrete surface ripe for attack.
Security
eWeek - Late to the Enterprise AI Party? 3 Ways to Get Started
The good news is, thanks to advances in hardware and software, virtually any company can get started with an AI project. And they’d be in good company — the global AI market is expected to grow from $93.5 billion in 2021 to $641.3 billion in 2028.
Artificial Intelligence
VentureBeat - Report: Frequency of cyberattacks in 2022 has increased by almost 3M
In 2022, the number of Trojan-PSW (Password Stealing Ware) detections increased globally by almost a quarter compared to the same period in 2021 一 4,003,323 to 3,029,903. Trojan-PSW is a malware that steals passwords, along with other account information, which then allows attackers to gain access to the company network and steal sensitive information.
Security
sdxCentral - RAN Market Walks Into 2022
Dell’Oro Group noted in a recent report that overall RAN equipment sales during the first quarter increased at their slowest pace in more than two years. Those numbers include hardware, software, and firmware.
Network Management
VentureBeat - Report: Credential access is top risk for ransomware attacks
The report found credential access was the top area of risk for respondents (at 40%), followed by defense evasion (31%), execution (31%), initial access (29%) and privilege escalation (27%).
Security
TechHQ - Web3 storage witnessing exponential growth with more personal, enterprise uptake
In the world of Web3, there will be no digital gatekeepers to set the rules or take the lion’s share of the profits. In fact, it’s the users that will be in control. There is however more to that, like Web3 storage, a decentralized storage service, which is expected to grow exponentially in the coming years.
Web3
SC Media - Few IT pros say they have ‘mastered’ security in cloud-native environments
Recent research by Canonical showed that 38% of respondents believe that security remains the most important consideration whether operating Kubernetes, building container images or defining an edge strategy.
Security
VentureBeat - Report: Devs say the current model of data observability is broken
One of the most interesting, yet troubling, findings of the research is that 64% of respondents report over an hour mean time to recovery (MTTR), compared to 47% reported in last year’s report. What’s more, 53.4% of people surveyed last year claimed to have resolved production issues within an hour on average – this year, that number dropped to 35.94%.
Data & Analytics
Threatpost - Closing the Gap Between Application Security and Observability
Application security and observability capabilities can be used to set up Log4Shell-specific attack monitoring and incident detection. This quickly identifies Log4Shell log patterns, and with the help of platform log analytics and alerting capabilities, teams can configure alerting mechanisms for attacks on their environments.
Security
Yahoo!Finance - The Worldwide Container Security Industry is Expected to Reach $3.9 Billion by 2027
Development and operational teams save time and money by delivering software without having to continuously reconfigure infrastructure. Because containers do not need hypervisors, a significant portion of this savings comes from lower hypervisor licence costs.
Security
Health IT Security - Ransomware Groups Continue to Leverage Old Vulnerabilities
Notably, 11 of the 22 newly added vulnerabilities linked to ransomware were first disclosed in 2019, “indicating that ransomware groups are on the hunt for vulnerabilities with pre-existing means of exploitation,” the report noted.
Security
InfoSecurity Magazine - The New Era of Cyber-Attacks - Who is Most at Risk This Year?
With our critical national infrastructure increasingly connected, 2022 will see threat actors weaponize operational technology environments more successfully than ever before. Targeting systems that, once offline, will have a significant impact on our day-to-day lives.
Security
VentureBeat - Report: 60% of orgs have experienced data loss due to employee mistakes
Intentionally stealing data also causes strain on IT teams as the data revealed it takes up to three days for security and risk management teams to detect and remediate a data loss incident caused by a malicious insider on email.  
Security
The Journal - CoSN Survey of IT Leaders Shows Ransomware Underestimated, Cybersecurity Still Woefully Understaffed
The survey results also showed that school districts’ IT departments remain understaffed, particularly in providing remote support for students and staff and in managing cybersecurity risks, the report said, with just 21% of districts reporting they have a dedicated full-time employee overseeing cybersecurity.
Security
BetaNews - Three out of five organizations lose data due to email errors
User-created data (sensitive email content, text files, M&A documents), regulated data (credit card data, Social Security numbers, national ID numbers, employee data), and intellectual property are seen as hardest to protect.
Security
Apple Gazette - What Are the Most Common Email Security Threats
Unfortunately, many companies do not take the step of deleting old email accounts. If you do not delete unnecessary accounts, you simply have an extra portal of entry to your company. Do not let this happen. Make sure you get rid of your old accounts and remove this unnecessary risk.
Security
Forbes - How And Why Businesses Should Strengthen Their Cybersecurity
To me, the most concerning part of the assessment is a finding that some bad actors had shifted their focus away from so-called “big-game” targets. Instead, they turned their attention to midsized companies to avoid scrutiny.
Security
The Hacker News - Web Trackers Caught Intercepting Online Forms Even Before Users Hit Submit
The study involved crawling 2.8 million pages from the top 100 websites, and found that as many as 1,844 websites allowed trackers to capture email addresses before form submission in the European Union, a number that jumped to 2,950 when the same set of websites were visited from the U.S.
Security
Threatpost - APTs Overwhelmingly Share Known Vulnerabilities Rather Than Attack O-Days
Most advanced persistent threat groups (APTs) use known vulnerabilities in their attacks against organizations, suggesting the need to prioritize faster patching rather than chasing zero-day flaws as a more effective security strategy, new research has found.
Security
TechHQ - Web3 storage witnessing exponential growth with more personal, enterprise uptake
Even storage demands from the NFT industry and the Metaverse is setting the stage for massive capital investments and growth in the burgeoning Web3 storage industry.
Data Storage
VentureBeat - Report: 80% of cyberattack techniques evade detection by SIEMs
Rather than rely on subjective survey-based data, CardinalOps analyzed configuration data from real-world production SIEM instances to gain visibility into the current state of threat detection coverage in modern Security Operations Centers (SOCs).
Security
ZDNet - Developers think these five technologies will be the next big thing
According to its survey of 20,000+ coders, blockchain applications, cryptocurrencies, and NFTs have the highest share of developers learning about them.
Emerging Tech
VentureBeat - Report: 88% of business leaders would pay the ransom if hit by a cyberattack
Companies hit in the past were more inclined to pay as soon as possible to get immediate access to their data (33%, compared to 15% of companies that have never been victimized), or to pay after only a couple of days of unsuccessful decrypting attempts (30% vs. 19%).
Security
Redmond Magazine - IT Pros Describe Azure Virtual Desktop Practices and Gripes in New Study
The AVD deployments covered in the survey weren't large, with 73 percent of respondents indicating they had less than 1,000 users. The study's authors surmised that "AVD is probably appealing and accessible to organizations which traditionally are considered too small to adopt on-premises Citrix/VMware VDI."
Automation & Productivity
TMCNet - Data Shows Enterprise SIEMs Detect Fewer Than 5 of the Top 14 MITRE ATT&CK Adversary Techniques Used in the Wild
The company's second annual report analyzed aggregated and anonymized data from production SIEM instances to understand SOC preparedness to detect the latest adversary techniques in MITRE ATT&CK, the industry-standard catalog of common adversary behaviors based on real-world observations.
Security
AP - Ransomware Attacks are a ‘Clear and Present Danger’ for UK AEC Firms, According to New Benchmark Survey From Egnyte
Almost half (44 percent) of firms had experienced a ransomware attack in the past 24 months. Of these, 25 percent had experienced between two to four attacks and 5 percent had endured five attacks or more, with 28 percent of firms taking over a week to recover.
Security
CSO - The US federal cybersecurity bureaucracy: A guide
A high-level look at the national offices and organizations involved in protecting the US from cyber threats.
Security
Forbes - Regulating The Metaverse: Can We Govern The Ungovernable?
The sci-fi buff in me is drawn to the idea of visiting a futuristic virtual world, where we can experience a new type of reality. But the metaverse is no longer science fiction – and the responsible adult in me can’t help but consider the threats it could pose, both to individual consumers and businesses.
Metaverse
VentureBeat - Scalability and elasticity: What you need to take your business to the cloud
Both scalability and elasticity are related to the number of requests that can be made concurrently in a cloud system — they are not mutually exclusive; both may have to be supported separately.
Cloud
Computerworld - How many jobs are available in technology?
The April monthly tech jobs report released by the CompTIA industry association showed the tech industry added 12,300 jobs from February to March, 2022. Software developers (3,613) and systems engineers/architects (3,126) led the pack in terms of new positions available.
Tech Jobs
VentureBeat - The missing link in the cybersecurity market
The market’s hyper-segmentation forces security teams to involuntarily become system integrators, investing vast amounts of time and energy into carrying out market analysis, product validation, cross-product integration and product maintenance automation to create a coherent, effective organizational cybersecurity fabric.
Security
Datanami - Report: Almost Half of CMOs Claim Data Hinders Creativity
At the same time, the need for a dedicated marketing ops role to manage martech stacks has accelerated dramatically. 73% of CMOs are committed to introducing this role to their team: 45% already have someone in place, and a further 28% are currently hiring. Only 12% of CMOs have had one in place for more than a year.
Data & Analytics
Blocks & Files - GigaOm assesses unstructured data management market
The leaders are IBM (Spectrum Discover), Hitachi Vantara, Varonis (Data Security Platform), and NetApp (Cloud Data Sense). Future leaders are Cohesity, Data Dynamics, and Druva.
Data & Analytics
VentureBeat - Report: 5 key trends for AI’s future
Edge AI will enable digital moments by harnessing AI for real-time analytics closer to data sources. Gartner predicts that by 2025, more than 50% of all data analysis by deep neural networks will occur at the edge, up from less than 10% in 2021.
Artificial Intelligence
SiliconANGLE - Participate in your own rescue: ‘Dual ransomware’ attack highlights security hygiene urgency 
The healthcare provider did not even realize it was being extorted twice because the ransom note of the first attack had been concealed by the second. Two ransomware groups, two different attacks, one target environment, only a week apart.
Security
AiThority - The Security Oracle, Experts in the Security and Artificial Intelligence Space
“TSO’s disruptive robotic solution, (RCADS), is the enabling AI technology that makes it possible for Robots in the Sky and TSO’s family of robotic appliances to empower organizations to dynamically reconfigure access control and emergency communications systems to adapt to new security threats in sub-second response time,
Security
Threatpost - You Can’t Eliminate Cyberattacks, So Focus on Reducing the Blast Radius
The answer is network segmentation. This divides devices and workloads into logical segments with policies providing access controls between them. Just as the watertight bulkheads in a ship prevent a breach in the hull from sinking the vessel, segmentation prevents the lateral movement of malware across your network, preventing it from accessing critical assets.
Security
sdxCentral - CTOs Shouldn't Do Their Jobs Alone, Gartner Says
However, Gartner data shows only 52% of CTOs regularly engage with their organization’s CISO, and only 29% regularly engage with their CDO. “There’s a clear call to action. If you’re going to be involved in investing in cybersecurity and data analytics technologies, you need to be engaging with these kinds of dialogues,” she said.
IT Management
Markets Insider - Lumen mitigated DDoS attacks that targeted a single company more than 1,300 times

Of the 500 largest attacks in Q1, 97% targeted the Telecommunications, Gaming, Software and Technology, Hosting, and Government verticals.

Security
Network World - What is a private cloud?
Here's a clear definition of private cloud that should help lift some of misconceptions about what private cloud is and is not, and reaffirm that private cloud is definitely not dead.
Cloud
VentureBeat - Report: 44% decrease in average amount paid after ransomware attacks
 It showed that SMBs are primarily concerned with external threats — attack vectors including ransomware and phishing — and only 8% of the smallest businesses (<50 employees) have a dedicated cybersecurity budget.
Security
ZDNet - Just in time? Bosses are finally waking up to the cybersecurity threat
Senior figures from American, British and Australian cybersecurity agencies have said that business execs are now more aware of cyber threats and are actively engaging with their chief information security officer (CISO) and information security teams.
Security
VentureBeat - How to build a cloud security strategy that sells
Seek opportunities to embrace a DevSecOps mindset. For example, cloud forward businesses are using more non-human accounts than ever to develop products faster. In turn, attacks on non-human identities are rising significantly.
Cloud Security
Fivetran: Over 80 Percent of Companies Rely on Stale Data for Decision-Making
While ubiquitous for enterprises today, very few companies are able to correctly leverage the data of these systems for decision-making. According to the study, nearly 9 out of 10 companies report that they are unable to pull real-time insights from their legacy ERP systems to make smart business decisions.
Data & Analytics
VentureBeat - How Web3 and Cloud3 will power collaborative problem-solving and a stronger workforce
Now, Web3’s lesser-known but important counterpart, Cloud3, is also beginning to gain traction. Executives like Salesforce CEO Marc Bennioff are already mapping how their companies will adopt the new iteration of cloud computing — the core of which is built around working from anywhere — further supporting the workforce shift.
Automation & Productivity
Network World - 6 top network security threats and how to beat them
These "service-providers" face minimal risk, since they themselves aren't launching any attacks. "It’s a pretty sweet deal for them," he says. Additionally, the payment comes in the form of cryptocurrency, so they are difficult to track.
Security
VentureBeat - Why glTF is the JPEG for the metaverse and digital twins
The JPEG file format played a crucial role in transitioning the web from a world of text to a visual experience through an open, efficient container for sharing images. Now, the graphics language transmission format (glTF) promises to do the same thing for 3D objects in the metaverse and digital twins.
Emerging Tech
sdxCentral - Fortinet CEO: Cybersecurity Will Outgrow the Networking Market
“The bigger picture convergence is happening today and maybe a few trends have been keeping going this way, probably within the next 10, 20 years, security will overtake the network space and become the biggest one in the enterprise network,”
Network Management
TMCNet - IT Service Management Named a Top Choice for Managing Identity in the Enterprise, but Email and Spreadsheets are Close Behind, New Research Finds
For example, email (50%) was cited as the most popular option for controlling permissions and entitlements among all respondents. Comparatively, respondents from large companies (55%) and those who held IT roles (54%) favored more sophisticated methods, such as IT Service Management (ITSM) or workforce management platforms.
IT Management
CSO - 7 top software supply chain security tools
A modern application is mostly made up of third-party code. According to Forrester, the percentage of open-source code that makes up an average application’s code base rose from 36% in 2015 to 75% in 2020.
Security
Threatpost - FBI: Rise in Business Email-based Attacks is a $43B Headache
The FBI is also warning that another popular variations of the scam include collecting Personal Identifiable Information (PII) in order to perpetrate additional fraud such as tax-related scams and breaching cryptocurrency wallets.
Security
Blocks & Files - Project Alpine: native Dell storage services in the public cloud and CloudOps
Dell’s Project Alpine could open the door to the big cloud service providers adopting hybrid multi-cloud as a reality and porting their software to each other’s environments.
Cloud
ZDNet - IBM CEO: AI is near a key tipping point, but generalized AI is still decades out
It shows that currently, 35% of companies are using AI in their business, up to four points from 2021. Additionally, 30% say employees at their organization are already saving time with new AI and automation software and tools.
Artificial Intelligence
VentureBeat - Researchers discover hackers using SEO to rank malicious PDFs on search engines
Today, researchers at security service edge provider, Netskope, published the Netskope Cloud and Threat Report: Global Cloud and Malware Trends, which found that phishing downloads rose 450% over the past 12 months, and highlighted that attackers are using search engine optimization (SEO) to rank malicious PDF files on search engines.
Security
ZDNet - Cloud computing security: New guidance aims to keep your data safe from cyberattacks and breaches
Some of the key advice includes highlighting how cloud applications can be secure by default, which includes enforcing the use of multi-factor authentication to help secure accounts, even if the usernames and passwords are leaked or stolen.
Cloud Security
Datanami - KX Report: 80 Percent of Businesses See Revenue Increases Thanks to Real-time Data
Drawing on a combination of both quantitative and qualitative research and economic modeling, the report clearly demonstrates the measurable commercial and operational value that real-time data management and analytics technologies can deliver across major industry sectors. 98% of respondents reported increased customer satisfaction while 60% are seeing major efficiency and productivity gains.
Data & Analytics
VentureBeat - What is cybersecurity? Definition, importance, threats and best practices
Viruses, trojans, spyware and ransomware are all types of malware. These can be as insignificant as placing unwanted pop-ups on a computer or as dangerous as stealing sensitive files and sending them somewhere else.
Security
SiliconANGLE - The top trends driving technology providers in 2022 
Instead, a co-innovation ecosystem is an emerging approach that accelerates the development of solutions to industry problems, spreads risk and cost across the participants, and drives adoption of the end solution.
Tech Trends
VentureBeat - 5 ways AI can help solve the privacy dilemma
Data shows that 86% of people care about privacy for themselves and others — with 79% willing to act on it by spending time and money to protect their data. And to those cynics who say people moan about privacy and do nothing, the same study found that 47% have taken action because of a company’s data policies.  
Data Privacy
ZDNet - Data scientist vs data engineer: How demand for these roles is changing
Research suggests many companies can't find the talent they need, as they struggle to deal with turning their vast supplies of data into usable information.
Data & Analytics
VentureBeat - The Colonial Pipeline ransomware attack a year on: 5 lessons for security teams
“With encryption-in use data protection, should adversaries break through perimeter security infrastructure and access measures, structured as well as unstructured data can [and] will [be] undecipherable and unusable to bad actors – making digital blackmail significantly more difficult, if not impossible,” Raman said.
Security
eWeek - Unlocking Value with Unstructured Data Tagging
Tagging is the process of adding labels to categorize unstructured data, so users can easily search and find the data they need when they need it. Put simply, it’s adding and enriching the metadata on your data.
Data & Analytics
VentureBeat - The future of on-prem and the cloud
If you’re planning on using a hybrid infrastructure for an extended period of time, my advice is this: don’t. While it’s impossible to avoid a hybrid setup during a transition period, most organizations are best served by committing to cloud IaaS completely (or as much as possible) and following a plan that can get you there incrementally over the course of two to three years.
Cloud
ComputerWorld - Enterprise mobility 2022: UEM adds user experience, AI, automation 
Essentially combining enterprise mobility management (EMM) tools with PC management tools, UEM platforms help companies manage and protect a range of devices including smartphones, tablets, laptops, and desktop computers across multiple operating systems — all from a unified interface.
IT Management
VentureBeat - Report: 36% of security pros have adopted hardware-assisted cybersecurity
The report reveals that the top areas of focus for security innovation within organizations today are automation (41%), security at the silicon level (40%), cloud migration (40%) and education and training (38%).
Security
eWeek - Cloud Customer Beware: 3 Challenges with Cloud Migrations
For all of cloud computing’s potential, business leaders need to keep their feet firmly on the ground and recognize the sheer complexity of cloud migration. Research indicates that one in three cloud migrations fail and only 25% of businesses meet their migration deadlines.
Cloud
VentureBeat - Data mesh vs. data fabric: Eliminate humans or use them more intelligently
Data scientists and analysts are pushed to use pre-approved, pre-staged data found in centralized repositories, such as data warehouses, instead of being encouraged to use a broader array of datasets in their analysis.
Data & Analytics
ComputerWorld - 6 virtual collaboration solutions for remote teams
Every survey suggests workers are more willing to find a new job than return to the bad old days of presence-based micro-management. Arguments that returning to the workplace boost collaboration may have some weight, but  much of this relies on old-fashioned email and virtual meetings held from the office, rather than the home.
Automation & Productivity
VentureBeat - Why you need both consumer data and data management platforms
On the open web, an average publisher can only authenticate ~20% of its audience, meaning that ~80% of a publisher’s audience is blind to the CDP, which limits its scalability. There is no built-in mechanism to augment authenticated data with anonymous data, therefore a DMP is a crucial value-add.
Data & Analytics
VentureBeat - Report: 61% of data leaders say that manual processes slow down their projects
This slowdown has a big impact across organizations who are faced with hard-to-reconcile priorities — 85% see securing access to sensitive data viewed as critical for business, and as the way to minimize the risk of data breach or exposure to unauthorized parties, while one in three point to meeting data security, privacy or compliance requirements from their customers, while 27% are addressing the sensitive data access for compliance with consumer privacy regulations such as GDPR and CCPA
Data & Analytics
eWeek - 5 Cybersecurity Threats That Aren’t Going Away
As CIOs, CISOs, CTOs, and IT managers think about boosting cybersecurity strategies, they should consider what happened in the year prior and what might potentially get worse. Below are some of the cybersecurity threats that remain stubbornly consistent – and must be guarded against at all times.
Security
VentureBeat - Report: 80% of global datasphere will be unstructured by 2025
According to a new report by nRoad, analysts predict the global datasphere will grow to 163 zettabytes by 2025, and about 80% of that will be unstructured. In regulated industries, such as financial services, the challenges posed by unstructured data are exponentially higher.
Data & Analytics
eWeek - Artificial Intelligence Enables Next-Gen Data Loss Prevention
While the cloud has enabled businesses to not skip a beat during and post pandemic, this shift is creating the new IT challenge of managing fully distributed data, which is no longer on-prem. Data is everywhere. The traditional hub and spoke security model is not sufficient for securing data in the cloud. Every organization should be thinking about implementing modern data loss prevention (DLP) practices.
Data & Analytics
VentureBeat - As data privacy laws expand, businesses must employ protection methods
Another area where the laws differ is how each defines sensitive data. The CPRA’s definition is extensive and includes a subset called sensitive personal information. The VCDPA and CPA are more similar and have fewer sensitive data categories. However, their approaches to sensitive data are not identical.
Data Privacy
ZDNet - How cloud is redirecting technology career paths
IT tasks are elevating, as "many tedious and time-consuming manual tasks like data entry, system and application monitoring and some app development efforts will be taken over by technology solutions,
Cloud
VentureBeat - Report: 36% of security pros have adopted hardware-assisted cybersecurity
The report reveals that the top areas of focus for security innovation within organizations today are automation (41%), security at the silicon level (40%), cloud migration (40%) and education and training (38%).
Security
AiThority - How Startups are Leveraging the Cloud to Scale
The cloud offers maximum flexibility for growth in capacity and resources, so scalability is never an issue. As the business grows, entrepreneurs can access more resources on-demand and pay for them only when needed, saving money in the process.
Cloud
ZDNet - The 9 best cloud storage services: Cost, free storage, and features compared
Unlike many other cloud backup services, iDrive doesn't lock you down to a single computer. You can use one account to backup your Windows and macOS desktops, your Android smartphone and iPhones and tablets, and your network drives. There's also a Linux backup option, but it's meant for Linux servers.
Cloud Storage
VentureBeat - The challenge of making data science zero-trust
There are three fundamental tenets that can help to realign the emerging requirements of zero trust to the needs of data science: minimization, distributed data, and high observability.
Data & Analytics
Network World - 4 networking best practices learned from the Atlassian network outage
The document is frank, factual, and full of important revelations and should be required reading for any engineering and network manager. It should be used as a template for any business that depends on software to locate and fix similar mistakes that you might have made, and also serve as a discussion framework to honestly assess your own disaster recovery playbooks.
Security
ZDNet - Ethernet creator Metcalfe: Web3 will have all kinds of 'network effects'
"For the first time, I am trying to say exactly what kinds of value are created by networks," Metcalfe told ZDNet at the Williamsburg event. "What I have learned today is that knowledge graphs can go a lot farther if they are decentralized," said Metcalfe. "The key is the connectivity."
Web3
Threatpost - CANs Reinvent LANs for an All-Local World
This is exactly the conceptual leap behind a new type of network, known as a Cloud Area NetworkTM (CAN). CANs replace the old hub-and-spoke model with an overlay network mesh concept that enables any-to-any communication between users, devices, data centers, and web apps.
Network Management
AiThority - Understanding the Role of AI, Machine Learning and Natural Language Processing in RegTech Development
RegTech enhances timely regulatory compliance and mitigates risks in a transparent and auditable manner. It automates lengthy, time-consuming processes, reducing room for error and the need for manual work and costly resources.
Automation & Productivity
Diginomica - Digital transformation projects are not enough - we need continuous transformation
While digital transformation is undoubtedly a crucial means of modernising, expediting decision-making, and using innovation and creativity to enhance both experiences and financial performance, if the transformation simply ends following go live of the underpinning technology, the benefits will inevitably diminish over time.
Digital Transformation
Forbes - What You Need To Know Before You Start Working With Artificial Intelligence
I firmly believe that the true value of AI – estimated to be worth $13 trillion to the global economy by 2030 – will be realized due to it being accessible to businesses of all shapes and sizes, not just multinational corporations. A vast and eclectic ecosystem of cloud-based, “as-a-service” platforms reduces the need for expensive infrastructure investments and also means that niche solutions exist to help automate solutions in every industry.
Artificial Intelligence
Yahoo!Finance - 65% of Fraud Prevention Decision Makers Say Customer Authentication Fraud is a Major Concern
To protect themselves and their customers, 60% of respondents currently use OTPs as part of their customer authentication strategy. This is in large part due to the positive reputation it has with consumers: 72% of respondents say customers perceive OTP authentication as secure and 71% of respondents say that OTP authentication is user friendly.
Security
ZDNet - Open-source security: It's too easy to upload 'devastating' malicious packages, warns Google
The Package Analysis Project is one of the software supply chain initiatives from the the Linux Foundation's Open Source Security Foundation (OpenSSF) that should help automate the process of identifying malicious packages distributed on popular package repositories, such as npm for JavaScript and PyPl for Python.
Security
Forbes - Using Digital Twins And Preparing For The Metaverse
The metaverse is no different, and while it may be difficult to wrap your head around, taking the time to learn about digital twins and how they fit into virtual reality can be very beneficial.
Emerging Tech
CSO - Firms struggling with non-person identities in the cloud
To address their cloud identity woes, more than half the decision-makers (55%) say their organizations are investing in cloud identity governance (CIG) and cloud infrastructure entitlements management (CIEM) solutions and by 2023, 82% will be following suit.
Cloud Security
sdxCentral - Fortinet: 80% of Breaches Attributed to Cybersecurity Skills Gap 
While 87% of respondents have implemented a training program for cybersecurity awareness, 52% of them still believe their employees lack the necessary knowledge. Fortinet says this statistic raises questions around how effective the training programs are.
Security
VentureBeat - What it will take to implement Web3
Take Ethereum, for example; despite its popularity, the network is struggling with some severe limitations. For one, current levels of throughput, around 15 transactions per second, simply aren’t enough to support the type of traffic that worldwide adoption would bring about.
Web3
ZDNet - Mozilla finds mental health apps fail 'spectacularly' at user security, data policies
According to Mozilla's latest *Privacy Not Included guide, despite the deeply personal information these apps manage, they "routinely share data, allow weak passwords, target vulnerable users with personalized ads, and feature vague and poorly written privacy policies."
Data Privacy
SiliconANGLE - The ever-expanding cloud continues to storm the IT universe 
We’re seeing the largest enterprise tech companies focus on solving for hybrid and every public cloud company now has a strategy to bring their environments closer to where customers’ workloads live – in data centers and the edge.
Cloud
VentureBeat - Report: 95% of IT leaders say Log4shell was ‘major wake-up call’ for cloud security
The research found that 87% feel less confident about their cloud security now than they did prior to the incident. The research also found that even 3 months after the incident, 77% of IT leaders are still dealing with Log4J patching with 83% stating that Log4Shell has impacted their ability to address business needs.
Cloud Security
AiThority - Businesses Need to Consider AI Algorithms and Spatial Intelligence to Increase Success
Behavioral science has been around a long time and is a classic discipline charting and analyzing actions between people to predict patterns. But what if a business could get enough information about the behavior of its customers — in any number of physical locations pivotal to that organization’s success — without having to wait for a lengthy analysis?  This is where the difference between basic analytics and spatial analytics comes into play.
Artificial Intelligence
SiliconANGLE - Experience as the new uptime: Why automation is the silver bullet to get us there 
Network operators are just scratching the surface with network automation, and as technologies and networks continue to evolve and mature, automation will be a critical component in that process to ensure optimized user experiences. Without this automation, network operators will be forever fighting a losing battle against increasing complexity.
Automation & Productivity
AiThority - Latest Report: “A Cookieless World: The Shifting MarTech Landscape”
Data includes how both B2C and B2B companies are reallocating budgets and employing new technology solutions to circumvent reliance on cookies, as well as the speed of adoption and success rates of specific approaches.
Marketing Tech
TMCNet - Research: Log4Shell a Wake Up Call For Cloud Security With Patching Efforts and Business Impacts Continuing Into 2022
The research also found that even 3 months after the incident, 77% of IT leaders are still dealing with Log4J patching with 83% stating that Log4Shell has impacted their ability to address business needs.
Security
Infosecurity - Five Eyes Agencies List Top 15 Most Exploited Bugs of 2021
In addition to the top 15 list, the security agencies provided an extra list of bugs to patch, including noteworthy systems such as the Accellion File Transfer Appliance (FTA) which was targeted en masse by a cybercrime group with links to FIN11 and Clop ransomware.
Security
VentureBeat - Report: Only 18% of data leaders receive ‘necessary’ amount of funding
This new research reveals that while data leaders feel the pressure to remain competitive, the C-suite is dangerously behind in making needed investments in data and analytics.
Data & Analytics
eWeek - The Business Case for an Edge Deployment
Among other factors, responsiveness is a function of latency, or how long it takes for data to transfer from one point on a network to another. According to a recent survey by Quadrant Strategies, 86% of C-suite executives and senior IT decision makers agree that low-latency applications help differentiate their organizations from the competition.
Edge Computing
VentureBeat - The super malicious insider and the rise of insider threats
Forty-two percent of actionable incidents were related to IP and data theft, including the theft of trade secrets, source code and active collusion with a foreign nexus.
Security
Network World - 5 reasons restores can take longer than backups
The effect of the write penalty on performance can be minor or it can be major depending on the RAID level and/or the settings used in erasure coding. But all such arrays will have some write penalty, and you need to find out what yours is.
Data Storage
eWeek - Collaboration Platforms Are Critical To Successful Hybrid Work
Collaboration tools were initially considered important, but it is really advanced collaboration tools that have become critical to business success. Advanced collaboration tools feature centralized security and administration, and they provide flexibility for line-of-business workers to configure their own apps/workflows.
Automation & Productivity
VentureBeat - The real cost of cloud computing
Finding the balance between sending the data to the cloud and bringing computing close to data is a trillion-dollar question. The answer is not clear for now, but it’s clear that every technology provider and the consumer should start exploring cutting the cloud dependency.
Cloud
ZDNet - Inside a ransomware incident: How a single mistake left a door open for attackers
While BlackCat has a reputation for running a sophisticated ransomware operation, it was a simple technique that allowed malicious cyber criminals to gain initial access to the network – exploiting an SQL injection vulnerability in an internet-exposed SonicWall SRA 4600 firewall.
Security
AiThority - Domo’s Low-Code Data App Platform Helps Customers Develop Analytic Content 50 to 75 Percent Faster According to New Independent Study by Nucleus Research
With Domo, one customer who integrated 15 different siloed systems centralized analytics, eliminated multiple hours per week that previously were spent manually combining and cleaning data.
Data & Analytics
VentureBeat - Report: Orgs spend 3,850 hours annually cleaning up email-based cyberattacks
The study confirms that, despite investments in secure email gateways and user security awareness training, bad actors continue to use social engineering emails to breach organizations’ defenses. The resulting attack remediation requires 175 hours to resolve each breach, and the most common breach type is compromised Office 365 login credentials (account takeover).
Security
Network World - What is a SAN and how does it differ from NAS?
SAN is associated with structured workloads such as databases, while NAS is generally associated with unstructured data such as video and medical images. “Most organizations have both NAS and SAN deployed in some capacity, and often the decision is based on the workload or application,”
Network Management
VentureBeat - Top 5 data quality & accuracy challenges and how to overcome them
Statistically, poor data quality leads to increased complexity of data ecosystems and poor decision-making over the long term. In fact, roughly $12.9 million is lost every year due to poor data quality.
Data & Analytics
sdxCentral - Government Agencies Prioritize Secure Multi-Cloud Adoption
The study reached 500 agency leaders and IT decision makers at federal, state, and local governments in the United States and Canada. It found 74% of respondents choose cloud providers by prioritizing security. And 57% of agencies are concerned about data security as they increase cloud adoption.
Cloud
VentureBeat - Report: Karakurt attacks linked to Conti and Diavol ransomware groups
Additionally, researchers found examples of cryptocurrency moving between Karakurt and Conti wallets; some Karakurt victim payment addresses are actually co-hosted in the same wallets as Conti victim payment addresses.
Security
AiThority - Blockchain Development Seen as Transformative to the Technology Sector: Rapid Innovation Survey
Several of the top technology firms are exploring everything from launching their own native tokens, to changing their company names to something more metaverse related. Large software firms have created entire enterprise divisions dedicated to enabling data exchange and workflow automation with distributed ledger technology and blockchains
Blockchain
VentureBeat - Data orchestration and best practices: Everything you need to know
Using data orchestration tools will help to clean, sort, arrange and publish your data into a data store. The aim of this technique is for authoring, scheduling and monitoring data pipelines by accepting data from numerous storage places.
Data Management
VentureBeat - Report: 88% increase in OT vulnerabilities last year
The report provides a deeper look at how quickly cybercriminals capitalize on new security weaknesses –shrinking the window that organizations have to remediate vulnerabilities ahead of an attack.
Security
ZDNet - Phishing emails targeting LinkedIn accounts are on the rise. Here's what to watch out for
The phishing emails are designed to look like they come from LinkedIn, but if the recipient clicks the link, they're sent to a login page designed to look like LinkedIn, and if they enter their email address and password, they'll be handing them to the attacker, who can use that information to log in to the victim's LinkedIn account.
Privacy & Security
The Next Web - These are the 5 most in-demand cloud computing jobs in 2022
By 2030, the report predicts that the sector will make an annual revenue of $1.6 trillion. Interestingly, more than half of the market will consist of banking, financial services and insurance, IT and telecom services, and retail and consumer goods.
Tech Jobs
sdxCentral - Public Cloud Spending to Near $500B in 2022
Spending increases are projected to occur in every layer of public clouds with infrastructure-as-a-service (IaaS) and desktop-as-a-service leading the way with 30.6% and 26.6% year-over-year jumps, respectively.
Cloud
ZDNet - Ransomware: This gang is getting a lot quicker at encrypting networks
The group also targets organisations that make high revenues, potentially a tactic that is also deployed because the attackers believe they have the best chance of making large amounts of money from ransoms.
Security
VentureBeat - New DataGrail research finds companies could spend upwards of $400K/year complying with data privacy laws, doubling the 2020 cost
Businesses are being asked to process nearly double the number of privacy rights they processed in 2020. Total data privacy requests — access, modify, and delete requests —  jumped from 137 to 266 requests per 1 million identities
Data Privacy
VentureBeat - Ransomware targeting virtualization platforms is on the rise, Mandiant says
While a traditional ransomware attack requires deploying the malicious payload across multiple hosts in a victim’s environment, an attack on virtualization infrastructure can potentially infect hundreds of virtual machines at once. With this variety of attack, “hitting one machine is much more effective,
Security
Viritualization & Cloud Review - Cloud Computing Survey Shows Cost Control Struggles
As we have repeatedly reported, the continuing skills gap is often the top challenge listed by respondents -- along with security concerns, which are always top-of-mind. In the new Foundry report, however, challenges with cost control are right up there with those two perennial concerns, even eclipsing them.
Cloud
Datanami - Fighting Harmful Bias in AI/ML with a Lifelong Approach to Ethics Training
We already see the effects in recruitment algorithms that favor men and code-generating models that propagate stereotypes. Fortunately, executives know that they need to act, with a recent poll finding that over 50% of executives report “major” or “extreme” concerns about the ethical and reputational risks of their organization’s use of AI.
Artificial Intelligence
VentureBeat - Report: 95% of organizations are now practicing open innovation
Those pillars include implementing a dedicated team to support open innovation initiatives, senior leadership positions (with titles like “Manager of Open Innovation”), standardized innovation procedures and metrics, open source technology adoption and related licensing/IP management systems
Automation & Productivity
eWeek - Machine Identities Are Dangerously Vulnerable
Identity security is in the spotlight these days, and it’s easy to see why. The most recent Verizon Data Breach Investigations Report found that 61% of all breaches involve credential data.
Privacy & Security
VentureBeat - Surprising cybersecurity weak points business owners should look out for
From increasingly ingenious phishing schemes to breakthroughs in offensive AI, digital threats expose the weakness in our IT frameworks and data systems. Identifying these weaknesses is crucial, as 85% of IT professionals pivot toward passwordless technology.
Security
sdxCentral - Netskope: Unified SASE Is at Least a Decade From Practicality
The real value of SSE isn’t that it’s Cloud based or that because it’s cloud-native it’s more scalable — though these factors do help, he said. It’s that “you’ve created one brain” for security intelligence.
Security
Network World - What is DRaaS and how it can save your business from disaster
The DRaaS market is a sprawling, complicated one, with hundreds of providers offering a wide range of different approaches that replicate everything from data and virtual machines (VMs) to on-premises servers and mainframes.
Security
VentureBeat - Waiting for the metaverse? The revolution is already here
Meanwhile, tools are allowing regular users to create and explore 3D content, with the secret weapon being the modern smartphone, which is now a gateway for 3D content creation — the building block of any metaverse. Now anyone can scan a real-world scene or object in 3D, which has led to its own new medium of user-generated content.
Metaverse
eWeek - Key Advice for Improving Your Company’s Cybersecurity
In cases where third-party hardware or software is not scrutinized, vulnerabilities can be harder to discover but also more broadly distributed, which can make them harder to remediate. For example, the Equifax breach in 2017 was reported to be the result of a vulnerability in open-source software. And more recently, the world reacted to another open-source vulnerability in Log4j.
Security
Network World - Edge computing moves toward full autonomy
"Self-organizing and self-healing wireless mesh communications protocols, such as Zigbee, Z-Wave, ISA100.11a, or WirelessHART can create networks where devices can be deployed ad hoc and self-configure."
Edge Computing
sdxCentral - Palo Alto Networks' Unit 42 Claims Cloud Identities Too Permissive
In analyzing more than 680,000 identities across 18,000 cloud accounts from more than 200 different organizations as part of its latest Cloud Threat Report, researchers found that nearly 99% of IAM policies are overly permissive.
Security
SiliconANGLE - 3 insights you might have missed from the ‘Cisco: Simplifying Hybrid Cloud’ event 
Full-stack observability has become more of a priority for business as organizations build on app monitoring tools, from customer-facing software to operational solutions on the back end. Recent data provided to SiliconANGLE by Enterprise Technology Research showed that market opportunities in the observability space are wide open.
Cloud
VentureBeat - 10 things CISOs need to know about zero trust
Over the last eighteen months, the exponential rise in cyberattacks shows that patching perimeter-based network security isn’t working. Cyberattackers can still access networks by exploiting unsecured endpoints, capturing and abusing privileged access credentials and capitalizing on systems that are months behind on security patches.
Security
AiThority - New Research Finds Data Automation Adoption to Climb From 3.5% to 88.5% Over the Next 12 Months
Nearly all data teams (93%) anticipate the number of data pipelines in their organization to increase between now and the end of the year—with 57% projecting an increase of 50% or greater. Amid the rising number of data pipelines across their organization, nearly three in four respondents (72%) indicated that the need for data products is growing faster than their team size.
Data & Analytics
FedScoop - National AI Research Resource must balance the value of its data with privacy
“Yes, the task force is certainly discussing how privacy-enabling technologies could help enhance the privacy aspects of NAIRR usage,” Parashar told FedScoop. “However, the task force has also discussed how privacy requires more than just technical solutions, and we expect a full range of considerations when contemplating privacy, civil rights and civil liberties.”
Data Privacy
VentureBeat - StormForge seeks to simplify Kubernetes automation
68% of respondents to a recent survey conducted by the Cloud Native Computing Foundation (CNCF) said that their cloud and Kubernetes-related bills have increased. Of those, half saw costs jump more than 20% over the past year.
Cloud
Cyber Defense Magazine - The Risks and Costs of The Public Sector’s Device Sanitization and Destruction Practices
In some instances, government agencies mandate physical destruction of devices — for example, if equipment is used to store classified or secret data. However, for unclassified data-bearing assets, physical destruction is unnecessary. This missed opportunity to give old technology a new life increases IT operations and materials costs for already fiscally-constrained public sector organizations.
IT Management
SiliconANGLE - This is what cloud-native looks like for the Department of Defense
“We have Kubernetes running across embedded systems at the edge on clouds, on classified clouds and air-gapped environments. It’s really the enabler for us not to get locked into a single tech stack.”
Cloud
ZDNet - The best remote desktop software: Work from anywhere
Based on an exhaustive, in-depth study of today's leading software, these are the best remote desktop software for 2022.
Automation & Productivity
VentureBeat - Report: 94% of women in tech say they’re held to a higher standard than men
Navisite’s recent survey of women in tech found that not only are women being held to a higher standard than their male colleagues, but they’re being asked to perform the bulk of administrative tasks. In fact, 75% say that they or their female colleagues are consistently asked to handle more administrative tasks compared to their male counterparts, including being asked to send meeting invites, reserve meeting rooms or prepare refreshments
Tech Jobs
SiliconANGLE - As data drives reinvention, AWS leverages machine learning and serverless to meet enterprise needs
“Within analytics, everything that we offer has a serverless option. We announced serverless Redshift, serverless EMR, serverless Kinesis and Kafka. The goal here is to take away the need to manage infrastructure for customers so they can focus on driving differentiated business value.”
Data & Analytics
VentureBeat - Bad data: A $3T-per-year problem with a solution
A few years ago, IBM reported that businesses lost $3 trillion dollars per year due to bad data. Today, Gartner estimates $12.9 million to be the yearly cost of poor-quality data. Funds get wasted in digitizing sources as well as organizing and hunting for information — an issue that, if anything, has increased now that the world has shifted to more digitized and remote environments
Data & Analytics
Enterprise Talk - Responsibility for AI Ethics is Shifting from Tech Roles to the Business Executives, says IBM Study
The IBM study, “AI ethics in action: An enterprise guide to progressing trustworthy AI”, also shows that despite a growing requirement for developing trustworthy AI, including an improved performance in sustainability, social responsibility, diversity and inclusion, a gap remains between intentions and actions.
Artificial Intelligence
VentureBeat - What Stanford’s recent AI conference reveals about the state of AI accountability
Specifically, regarding accountable AI, panelists discussed advances and challenges related to algorithmic recourse, building a responsible data economy, computing the wording and conception of privacy and regulatory frameworks, as well as tackling overarching issues of bias.
Artificial Intelligence
Datanami - Ascend.io Survey Finds Data Automation to Surge Over Next 12 Months
Findings from more than 500 U.S.-based data scientists, data engineers, data analysts, enterprise architects, and—new this year—chief data officers (CDOs) reveal that despite 81% of respondents indicating that their team’s overall productivity has improved in the last 12 months, 95% of teams are still at or over capacity—just a 1% decrease from the 2021 study.
Data & Analy tics
sdxCentral - 5 Ways to Conquer Cloud Security
The technology enabler for the aforementioned strategy is policy as code. By aligning all teams under “the same source of truth regarding security,” enterprises can build a scalable technological foundation for cloud security.
Cloud Security
Datanami - Can We Trust AI — and Is That Even the Right Question?
“I think a lot of the time the way we think about it in relation to AI is, ‘what types of AI should we create?’ or ‘how should society perceive AI systems?’” Canca said. “But I think perhaps the more interesting thing to think about is: how does the AI eventually see us?”
Artificial Intelligence
ZDNet - Terrible cloud security is leaving the door open for hackers. Here's what you're doing wrong
According to the research, 99% of cloud users, services and resources provide excessive permissions. In most cases, these permissions and administrator privileges aren't needed by regular users, but there's the risk that, if cloud accounts are compromised, cyber attackers could take advantage of excess permissions to modify, create or delete cloud environment resources, as well as moving around networks to help expand the scope of attacks.
Cloud Security
VentureBeat - Improved optics could help the metaverse become as big as the internet
It’s important to note that the metaverse can only be realized through the technology that enables it. Augmented Reality (AR) and Virtual Reality (VR) offer the primary link to entering this alternate universe.
Metaverse
ComputerWorld - As employees return to the office, connectivity remains a concern
Flexible hybrid work arrangements such as hotdesking and the use of informal meeting areas could require better Wi-Fi connectivity, in particular.  “A lot of businesses…, their Wi-Fi doesn't stand up to that level of usage,"
Automation & Productivity
VentureBeat - Report: 55% of MSPs say IT infrastructure monitoring is their most valuable tech
For example, survey respondents said that faster root cause analysis was both the top IT monitoring challenge they face (cited by 46% of respondents) as well as the top AIOps capability critical to winning deals (48% of respondents).
IT Management
Network World - Who’s selling SASE and what do you get?
As an approach, SASE combines networking and security into a scalable cloud service that fits with the remote and hybrid work models companies use today. Potential benefits include easier network and security management, flexibility to scale up or down as business needs require, and lower costs.
Security
SiliconANGLE - Ripple effects from the Okta security breach are worse than you think 
Participating were some of the top CISOs in the community. The first one is really concerning: “We heard about this in the media.” The next one summarizes the overall sentiment: “Not a huge hit but loss of trust.” And this next one underscores the lock-in factor: “We can’t just shut Okta off like SolarWinds.”
Security
ZDNet - Turning point for artificial intelligence, which may or may not be dominated by the large cloud providers
"This integration is going to be hybrid, even more important than the cloud itself. Let's be very clear, it's not about operation, it's a lot of algorithms, it's a lot of different data, that integration piece, that will require system integration, architecture and design. That means that different types of firms will be involved in that work."
Artificial Intelligence
AiThority - Microsoft Industry Cloud Could Be a Worthwhile Consideration, According to Info-Tech Research Group
“The industry cloud market represents one of the largest vertical growth opportunities for technology suppliers,” says Ted Walker, a Principal Research Director at Info-Tech. “More than five hundred industry clouds have already been created globally, and revenue in this space is expected to exceed $20 billion by 2023.”
Cloud
VentureBeat - Data fabric versus data mesh: What’s the difference?
But underlining the challenges in analytics, more than 37% of respondents said that they weren’t confident in their ability to access “timely, relevant data for decision-making,” whether because of disparate storage sources or problems with developing data pipelines.
Data & Analytics
SiliconANGLE - Observability trends evolve as market must tackle cybersecurity with automation 
Being able to have observability across infrastructure — data storage, compute, network, containers and database — and through the CI/CD pipeline to client-side code and applications, even the code on which the company’s websites are built, is “the holy grail” of modern APM solutions.
Automation & Productivity
VentureBeat - ‘Denonia’ research points to new potential cloud cyberthreat, experts say
“The software relies entirely on fraudulently obtained account credentials,” AWS said — adding that “Denonia” does not really constitute malware “because it lacks the ability to gain unauthorized access to any system by itself.”
Security
eWeek - Cognos vs. Tableau: 2022 Software Comparison
IBM boasts a massive sales and services team, and global reach into large enterprise markets. Cognos, then, is likely to do well against Tableau within the existing IBM customer base. And right now, it appears to lead slightly in the cloud. But Tableau is ahead on overall features and is graded higher by Gartner.
Data & Analytics
VentureBeat - Report: Global IT spending expected to hit $4.4T
In fact, CIOs are accelerating IT investments in categories such as security, customer experience, analytics and cloud as they recognize the importance of remaining flexible and agile in responding to such factors.
IT Management
eWeek - The Dangers of Obsolete and Redundant Data
Businesses believe that retaining all their data will help mitigate potential risks, but the opposite is true. The more unaccounted-for data a company has, the higher the risk of falling victim to a cyberattack. When you are in the dark about your data, you don’t know what has gone missing.
Data Management
Forbes - Three Keys To Understanding The Cybersecurity Skills Gap (And Dealing With It)
Many firms that did not have a cybersecurity practice 10 years ago now have one or are building one. This is creating an escalating demand for cyber talents at all levels, including chief information security officers, developers, architects, trainers, auditors and pen testers.
Tech Jobs
Network World - 7 emerging network jobs that could boost your career
Traditional roles such as network administrator, network manager, and network architect are still relevant and in demand, says Jeff Weber, executive director in the technology practice at talent solutions provider Robert Half. But newer positions in areas such as cloud administration, cloud architecture and site-reliability engineering are hot, he says.
Tech Jobs
VentureBeat - Report: 35% of educational institutions have a SQLi vulnerability
According to a new study by Invicti Security, 35% of educational institutions and 32% of government organizations were found to be vulnerable to SQL injection (SQLi) in 2021. SQLi, a type of web vulnerability that allows malicious actors to modify or replace queries an application sends to its database, is especially threatening to these sectors because it has the potential to expose deeply personal information that attackers can use to assume identities.
Security
Datanami - Study Finds Businesses Can Realize 315 Percent ROI with KX Insights Data Analytics Platform
According to the study, a composite organization (see methodology) implementing KX could experience benefits of $5.72M over three years versus costs of $1.38M, adding up to a net present value (NPV) of $4.34M and a 315% Return on Investment.
Data & Analytics
VentureBeat - AI’s growing enterprise gaps explain why AWS SageMaker is growing
O’Reilly’s annual survey of enterprise AI adoption found that just 26% of organizations have AI projects in production, the same percentage as last year. In addition, 31% of enterprises report not using AI in their business today, a figure that is up from 13% last year.
Artificial Intelligence
TechSpot- Google-commissioned survey claims Microsoft tech makes governments less secure
Besides a majority of these government employees showing concern for future cyberattacks, and being unsatisfied with Microsoft's workplace offerings, Google said that governments' reliance on Microsoft tech made them more vulnerable to hacking.
Security
VentureBeat - The metaverse will fuel massive innovation (and Facebook isn’t the metaverse)
The truth is, the metaverse is a decentralized system that has a lot in common with peer-to-peer services like Napster, Skype, and BitTorrent. Oh, and Facebook and Meta do not.
Metaverse
SiliconANGLE - Three ways to build cost resilience into your cloud 
Many Gartner clients find out the hard way that cloud costs can spiral out of control more quickly and unexpectedly than traditional information technology costs. Because cloud usage is metered and billed in a “pay as you go” model, costs are highly sensitive to usage patterns.
Cloud
VentureBeat - Sustainability and the metaverse: 5 considerations for preparing for the next big tech paradigm shift
As enterprises prepare for Web 3.0 and consider how to do business at the convergence of emerging technologies, they may end up with massive online footprints that will generate an incredible need for data storage, which could lead to more products and more waste if not done thoughtfully.
Sustainability
VentureBeat - Data remediation: What it is and why it matters
This post provides an overview of the remediation process, its numerous benefits, and its different stages. Read on to discover how companies use this procedure to improve their workflow by reducing data overload.
Automation & Productivity
VentureBeat - How we can avoid the mistakes of Web2 when innovating around Web3
Web2 is driven by the entities that have the most data and can easily monetize the information they hold. Facebook might have been built as a social networking tool, but today Meta is essentially the top global data powerhouse. Web2 firms are trying to hang on to this business model.
Web3
StateScoop - Local cyber is finally getting its moment, city CISOs say
“Local government is right in the middle of everything that’s going on right now, and at the same time we’re seeing more effort in the federal government in actually helping to step up our game in cybersecurity.”
Security
VentureBeat - The difference between web and mobile search
“Do” transactional queries typically include an actionable verb, such as, “buy a red dress”, “record live video”, or “buy a concert ticket”. Users expect to find results that enable them to perform their desired action, and they expect the results to be relevant to their needs associated with that action.
Automation & Productivity
VentureBeat - AI governance adoption is leveling off – what it means for enterprises
Among respondents with AI products in production, the number of those whose organizations had a governance plan in place to oversee how projects are created, measured and observed was roughly the same as those that didn’t (49% yes, 51% no). Among respondents who were evaluating AI, relatively few (22%) had a governance plan.
Artificial Intelligence
Network World - SD-WAN may be getting cheaper
SD-WAN costs are apparently becoming more accessible, particularly at the lower-capacity end of the market, according to TeleGeography’s research, which said that median non-recurring charges for SD-WAN implementations—meaning charges for the SD-WAN appliances themselves, not for additional managed services—have decreased by about 15% compounded annually since 2018.
Tech Trends
VentureBeat - Gartner lists seven cybersecurity trends for 2022
Taken together from the standpoint of enterprises focused on new digital initiatives, the seven trends show clearly that cybersecurity needs to be a business enabler first. The two trending proof points of cybersecurity’s business value are decentralized decision-making and faster response times to business challenges.
Security
SiliconANGLE - As danger looms, the C-suite taps the brakes on tech spending
That represents a 700-basis point drop in three months — in a market where you can’t hire enough people. The percentage of companies hiring has gone from 10% during the pandemic to 50% today, according to ETR data. And we know there’s still an acute skills shortage. So you would expect more IT outsourcing, but it’s down.
Tech Trends
VentureBeat - Running legacy systems in the cloud: 3 strategies for success
No one gains a competitive advantage from worrying about infrastructure these days; they win with a laser focus on transforming their applications and their business. That’s a big part of cloud’s appeal – it allows companies to do just that because it effectively takes traditional infrastructure concerns off their plates.
Cloud
Network World - Aruba exec: Centralized policies, NaaS, segmentation are big
“Another idea is that instead of putting different policies in all these different places around the enterprise—like a policy for the user on VPN, then another a policy for the user in the branch and another for headquarters—if we instead said, centrally define this class of traffic going to these cloud destinations, we’re going to have company-wide policy of sending that to this particular cloud-hosted security vendor like Zscaler,”
Network Management
VentureBeat - Report: Majority of execs believe data is vital to sustain the metaverse
This business investment in the platform also highlights new questions – such as security in the metaverse or how the enterprise can best use this digital ecosystem – and data is the common thread. Eighty-nine percent of respondents considered metaverse data important to their business operations in the next 5 years.
Data & Analytics
eWeek - 5 Digital Transformation Strategies for Mid-Market CIOs
However, most small and mid-sized businesses, or SMBs, will have no choice in the matter. If they fail to offer a teleworker solution, mid-tier competitors will steal their employees away, and they could even find themselves unable to compete anymore.
Digital Transformation
VentureBeat - Google Cloud security survey is ‘aggressive’ move vs. Microsoft
This line of argument — that Microsoft is a fundamental part of the cybersecurity problem, rather than the solution — has been made in the past by Microsoft security rivals such as CrowdStrike. But the survey appears to be the most outspoken critique of this kind against Microsoft by Google Cloud so far.
Cloud Security
SiliconANGLE - Database competition heats up as AWS, Oracle and Snowflake reshape the landscape 
In addition to its enhancements for HeatWave, Oracle has published a set of benchmarks for the offering. The company published benchmark performance results against competing databases and has challenged other firms to run comparisons.
Data & Analytics
Enterprise Talk - Four Key ‘Human’ Pitfalls to Keep an Eye on in Digital Transformation
Some digital transformation initiatives are started because someone is infatuated with a new technology or tool and just wants to use it. Businesses must ensure that they thoroughly understand the ramifications of a new venture before committing to it, as well as whether it will deliver a good return and meet a reasonable business need.
Automation & Productivity
VentureBeat - Report: Employees spend 3.6 hours each day searching for info, increasing burnout
Unfortunately, Coveo found that the average employee spends 3.6 hours daily searching for information — an increase of one hour more from last year’s report. IT employees spend half their day (4.2 hours) looking for relevant information.
Automation & Productivity
Network World - Opinion Zero trust requires network visibility
This translates to logging information from network infrastructure at every level, from the core switches all the way “out” to the edge switches in the branch networks and all the way “in” to the virtual switches in the data center
Security
eWeek - California Privacy Rights Act and Enterprise Data Management: Key Updates
The new law broadens the existing CCPA definition of an individual’s sensitive data to include any information reasonably capable of being associated with a person. The new law also makes it easier for consumers to regulate the processing of sensitive information.
Data Privacy
VentureBeat - Everyone’s joining the metaverse, but the real business opportunity is building your own
While the rational entry plan for organizations to join the metaverse is diving headfirst into Decentraland, Sandbox, or other developed spaces, the real business opportunity lies in the creation of individual, unique metaverses for each company — offering consumers an immersive, end-to-end experience that is truly irreplicable and can evolve without boundaries.
Metaverse
sdxCentral - Should CISOs Face Criminal Charges for Negligence, Failure?
It depends on how the security enforces best practices and strategies across the whole organization, and also the technologists, developers, and others who are responsible for deploying those practices, he said. “If you take the approach of just blaming the security team, you’re blaming the one group that is absolutely concerned about security all day long.”
Security
Datanami - Comet Releases New Survey Highlighting AI’s Latest Challenges
Issues include the fact that many experiments are abandoned because some part of the data science lifecycle was mismanaged. This is due in large part to the manual tracking processes that organizations often put in place, which hinder effective team collaboration, and are not adaptable, scalable, or reliable.
Data & Analytics
ZDNet - State-backed hacking attacks are a big worry, but most firms don't know what to watch out for
According to analysis by cybersecurity company Trellix, half of all organisations think they've been the target of a nation-state cyberattack within the past 18 months, while a further 42% think they'll be subject to one in the future. Fewer than one in 10 businesses believe that they're not a target for nation-state hackers at all.
Security
VentureBeat - Computing’s new logic: The distributed data cloud
The distributed data cloud is not a single tool or platform, but an ecosystem pattern that gets data to the right place and the right person at the right time in a secure, governed, and trusted way. It includes a federated collection of data management and analytics services spanning public clouds, private clouds, and the network edge.
Data Management
ZDNet - Farewell ZDNet: Data remains the lifeblood of innovation
As we've noted, looking ahead is the great reckoning on how to deal with all of the data that is landing in our data lakes, or being generated by all sorts of polyglot sources, inside and outside the firewall. The connectivity promised by 5G promises to bring the edge closer than ever.
Data & Analytics
Network World - Use zero trust to fight network technical debt
In addition, the ZT network does not assume that a trust relationship is permanent or context free: Once it is on the network, a node must be authenticated and authorized for every network operation it attempts.
Network Management
VentureBeat - 4 key areas of opportunity for automation
To avoid disaster, take the steps out of the siloes and understand each one. Then you can think about which steps can still work using a low human touch without sacrificing quality or customer experience — and which components need more human intervention or interaction.
Automation & Productivity
SiliconANGLE - Cloud sales lift data center hardware and software spending to new heights 
Over the last 12 months, they have spent billions of dollars to kit out new data centers with servers, storage, networking and software. Indeed, the cloud infrastructure providers now account for almost half of all data center spending in the world, according to a report released today by Synergy Research Group.
Cloud
The Tech Report - Cybersecurity Priorities – Trends of the Future
Business leaders are expecting that more than $77 billion will be spent on security services outsourcing in 2022. This makes it the most expensive category of cybersecurity spending. According to recent research, 62 percent of companies already have a plan to outsource in the next 12 months.
Security
VentureBeat - Report: 70% of U.S. consumers want to use AI for their jobs
The majority would like AI to help with tasks such as mistake reduction (58%), problem-solving (57%), information discovery and process simplification (both 56%).
Automation & Productivity
eWeek - Data Security: 3 Things Most Organizations Overlook
Those three security challenges are untrusted computation programs, unvalidated input, and unauthorized data movement.
Data Management
sdxCentral - MITRE, Fortinet Map Cyberattack Flows to Identify ‘Choke Point’
The project is “a pictorial showing of what the adversary did at each step, and that’s such a valuable thing to show up to executives,” Skoog said. “It’s a means to communicate across different technical expertise with what’s happening.”
Security
Network World - Best backup for 7 major databases
There are many backup options for databases, but here are recommendations for Cassandra, DB2, DynamoDB, MongoDB, MySQL, Oracle, and PostgreSQL.
Data & Analytics
sdxCentral - Cloud Security Alert Fatigue Causing Chaos
The cloud security vendor surveyed more than 800 IT professionals across five countries and 10 industries for its 2022 Cloud Security Alert Fatigue Report. It found that 59% of respondents were pinged at least 500 times per day regarding potential security issues. And that 57% of respondents use five or more cloud service providers.
Cloud Security
VentureBeat - Why USD could be the HTML for the metaverse, digital twins and more
USD is in the same position today. It isnt great at everything, but it does the best job among dozens of alternatives for sharing 3D assets across tools, services and platforms in an open and extensible way. USD is already helping companies like Ubisoft and Ikea simplify some 3D workflows and seeing traction with rendering engines like Unity and Unreal.
Automation & Productivity
Cyber Defense Magazine - How to Fix Mid-Market Security Using Intelligent Automation and AI
In Coro’s recent report analyzing mid-market cyber security, we found that while 50% of medium-sized companies had email malware protection in place in 2021, 88% of them had misconfigured their protection settings. Meanwhile, only 16% of mid-sized companies had email phishing protection in place, and 71% of them had misconfigured settings.
Security
AiThority - The Importance of Data Literacy: Why It Is Important to Achieve Data Literacy
The open approach borrows conceptually from Bertelsmann University’s “Data Curriculum” which provides all employees with a universal training program in the field of Data. It focuses on six data “roles”  ranging from data scientist to business partner. These roles all tend to be found within most B2B businesses.
Data & Analytics
VentureBeat - Report: 81% of companies experienced a certificate-related outage in the past two years
Along with the rise of machine identities, the report showed that enterprises struggle with a lack of complete certificate visibility. This year’s survey revealed that the number of internally trusted certificates grew nearly 16% since last year, with the average business issuing 267,620 internally trusted certificates across its organization.
IT Management
Forbes - Chasing The Myth: Why Achieving Artificial General Intelligence May Be A Pipe Dream
Artificial General Intelligence, a concept that has not yet been brought to life, will, for all purposes, think and carry out complex tasks such as corporate restructuring and HR management using characteristic human qualities such as logical reasoning, empathy and human-centeredness while retaining the expected computational speed, accuracy and big data analytics associated with standard AI applications
Artificial Intelligence
ZDNet - Tech hiring is broken. Software developers could be the key to fixing it
According to a 2021 report by developer hiring marketplace Terminal, 56% of software engineers feel less enthusiastic about a job role after going through a poorly managed interview. Likewise, 49% of developers say they are more likely to pass on a job after being interviewed by someone who doesn't seem to understand the job, or the underlying technology requirements.
Tech Jobs
Forbes - Digital Signage: The Top Five Trends You Need To Know About In 2022
Since quality user experience is vital, retailers might be further integrating APIs. That's because they help with tasks such as user login and registration, file access and storage, database modification, client-to-client messaging and more.
Digital Signage
TMCNet - Global Survey Validates the Emergence of a New Practice Area in Enterprise IT Valued at $30 Billion
The global survey results of over 800 corporate finance executives validate the emergence of a new practice area in Enterprise IT that includes risk management, payments, real-time connectivity, treasury management and working capital finance.
IT Management
TechBullion - Metaverse is taking off, Adobe / Meta / WIMI leads a new trend
The application of underlying technologies, such as bitcoin, blockchain, VR, AR, artificial intelligence, big data, 5G communication, and wearable devices, is directly mature, and has gradually become an indispensable infrastructure for metaverse. Metaverse provides a larger increment and may have trillions of market sizes in the next decade.
Metaverse
TMCNet - More than Half Of Technology Leaders Believe Data Will Be Vital For Sustaining The Metaverse - Bright Data Research
To support their Metaverse strategy, more than three-quarters of leaders (84%) across the IT, telecom, and technology sectors say they are planning to look at procure data intelligence solutions to be deployed inside virtual worlds in the next two years.
Data & Analytics
VentureBeat - Report: Only 48% of orgs say they have implemented a formal ransomware strategy
Additionally, less than half of respondents (48%) have implemented a formal ransomware plan. Healthcare was the most prepared at 57% with a formal ransomware plan, and energy was the least at 44%, despite both sectors experiencing significant breaches over the past twelve months.
Security
Datanami - Qlik Report: Data Literacy to be Most In-Demand Skill by 2030 as AI Transforms Global Workplaces
As organizations shift from passive data consumption toward a state of Active Intelligence, where continuous data becomes integrated into working practices to trigger immediate actions, the report predicts how this will impact skills requirements and professional opportunities.
Data & Analytics
VentureBeat - Report: Cloud automation is key to future-proofing cybersecurity
Eighty-six percent of respondents are exploring ways to automate access controls, especially for privileged access. But even with 68% of respondents seeing increases in budgets and staff, they continue to face mounting threats from an expanding threatscape that’s challenging to address.
Security
TMCNet - State of the Cybersecurity Workforce: New ISACA Research Shows Highest Retention Difficulties in Years
Sixty-three percent of respondents indicate they have unfilled cybersecurity positions, up eight percentage points from 2021. Sixty-two percent report that their cybersecurity teams are understaffed. One in five say it takes more than six months to find qualified cybersecurity candidates for open positions.
Tech Jobs
Network World - Surprise! The metaverse could be great news for the enterprise edge
The problem is latency—the delay between when we initiate something in the metaverse and when our avatars mirror that action.  Significant loss of synchrony with the real world is an ugly problem for metaversing, and we can expect Meta and others to work to correct it by controlling latency.  If that happens, there’s hope for those enterprise edge/IoT applications.
Edge Computing
ZDNet - Social engineering attacks to dominate Web3, the metaverse
As some of us speculate on the potential future value of ENS domains and register them -- such as 'businessname.eth' -- these addresses could be used as leverage in phishing attacks, especially as ENS domains are recorded on the blockchain and cannot be removed through trademark disputes easily.  
Web3
VentureBeat - Report: 89% of enterprises have been attacked by Kubernetes ransomware
The situation in the U.S. is slightly better, with 42% reporting they have data protection in place for their Kubernetes environments. However, 55% of U.S. respondents at organizations that have deployed Kubernetes say they have already experienced a ransomware attack on their containerized environments, versus 48% globally.Security
ZDNet - APAC firms see need to train staff in digital skills, but few actually do so
Specifically, the ability to use cloud-based tools such as accounting and CRM (customer relationship management) software-as-a-service (SaaS) applications emerged as the top-most needed digital skill by 2025, according to a study commissioned by Amazon Web Services (AWS).
Digital Transformation
Network World - NaaS adoption will thrive despite migration challenges
By replacing conventional hardware-centric VPNs, firewall appliances, load balancers, and MPLS connections, NaaS technology promises adopters the ability to rapidly scale up and down in lockstep with demand while eliminating hardware costs and bolstering network security and service levels.
Network Management
sdxCentral - As Vendors Ditch SASE For SSE, What’s Actually Changed?
But for the most part, these SSE products aren’t so much new as they’re rebranded and repackaged SASE services that’ve been stripped of their SD-WAN capabilities, if they ever had them in the first place.
Security
VentureBeat - The risk of undermanaged open source software
In fact, according to Red Hat’s 2022 The State of Enterprise Open Source report, 89% of respondents believe that enterprise open source software is as secure or more secure than proprietary software.
Security
Network World - What is IPv6, and why is adoption taking so long?
Adoption of IPv6 has been delayed in part due to network address translation (NAT), which takes private IP addresses and turns them into public IP addresses. That way a corporate machine with a private IP address can send and receive packets from machines located outside the private network that have public IP addresses.
Network Management
SciTechDaily - New Quantum Technology To Make Charging Electric Cars As Fast as Pumping Gas
Researchers say that consequences can be far-reaching and that the implications of quantum charging can go well beyond electric cars and consumer electronics. For example, it may find key uses in future fusion power plants, which require large amounts of energy to be charged and discharged in an instant.
Quantum Computing
VentureBeat - XR pioneer calls for metaverse regulation
Furthermore, building a hyper-accurate user profile over time should be banned — biometric data like eye movements should not be stored indefinitely. Having less data makes AI-based targeted advertisements a little less potent. Ideally, most data streams should be kept strictly real time.
Metaverse
SiliconANGLE - Cisco: Complexity and number of cyberattacks jumped in 2021 
Ransomware was identified as the top security concern for 2022 by 38% of the respondents, followed by zero-day or heretofore undiscovered vulnerabilities (29%), exploitation of internet-facing apps (16%), phishing attacks (14%) and unauthorized access to stolen credentials (4%).
Security
eWeek - Top 20 Kubernetes Best Practices
A survey from the Cloud Native Computing Foundation (CNCF) revealed that 91% of respondents use Kubernetes, 83% of them in production. That’s up from 78% the previous year.
Cloud
VentureBeat - Report: 80% of employees say they’ll stay at a company offering data training
A new survey by Tableau and Forrester Research shows that data skills are increasingly vital, yet training lags. Eighty-two percent of decision-makers surveyed expect basic data literacy from employees in every department — including product, IT, HR and operations. And expectations are only increasing. By 2025, close to 70% of employees are expected to use data heavily in their job, up from 40% in 2018.
Data & Analytics
Datanami - Spending on AI Solutions Will Double in the US by 2025, Says IDC
Retail will remain the largest U.S. industry for AI spending throughout the forecast while Banking will be the second largest industry. Together, these two industries will represent nearly 28% of all AI spending in the United States in 2025 and will account for nearly $20 billion of the amount added to the U.S. total over the forecast.
Artifical Intelligence
VentureBeat - What you need to know about the state of the metaverse today
The major difference with Brave is its aggressive anti-ad approach that strips online ads from websites. Users will navigate social networks not with Facebook but with applications like Steemit, a blockchain based social network that gives users control over their personal information, protects their content, and provides an ownership stake in the platform based on their content contributions.
Emerging Tech
Cyber Defense Magazine - Directed Analytics – The Future of Data Management
Directed data analytics offers the next generation of data reporting, providing a multitude of data in a short period, displayed in a customized way that is fit for the user and company, and compiling the data into a broader industry context in order to visualize long-term trends and patterns
Data & Analytics
VentureBeat - AI critical to business success in post-pandemic world, study finds
Digital transformation continues to be a top priority for a third of business decision-makers, while boosting productivity is a priority for 28%. Interestingly, 26% of organizations are investing in ESG, which has become more of a priority than developing new products and services (24%) or accelerating financial growth (21%).
Automation & Productivity
Forbes - Building A Data-Driven Culture Within State Governments
Analytics can be complicated to the general business user and leveraging the capabilities of AI to break down those complications providing actionable insights from our data.
Data & Analytics
GTSC - There’s More to AI Bias Than Biased Data, NIST Report Highlights
“But these approaches do not adequately capture the societal impact of AI systems. The expansion of AI into many aspects of public life requires extending our view to consider AI within the larger social system in which it operates.”
Artificial Intelligence
Pew Research Center - AI and Human Enhancement: Americans’ Openness Is Tempered by a Range of Concerns
This survey looks at a broad arc of scientific and technological developments – some in use now, some still emerging. It concentrates on public views about six developments that are widely discussed among futurists, ethicists and policy advocates.
Artificial Intelligence
VentureBeat - Report: Bots cost businesses millions of their online revenue
If businesses cannot determine the difference between real customers and bots, this can make marketing analytics data useless. Businesses have burned through marketing budgets and made poor decisions based on bad marketing data.
Data & Analytics
Network World - What is a digital twin and why it's important to IoT
In essence, a digital twin is a computer program that takes real-world data about a physical object or system as inputs and produces as outputs predictions or simulations of how that physical object or system will be affected by those inputs.
Data & Analytics
ZDNet - Franchises, partnerships emerge in Ransomware-as-a-Service operations
In total, 65% of the leak sites monitored last year were managed by new players on the scene. The majority of targets are based in developed nations, including the US, Canada, Germany, Australia, Japan, and France.  
Security
Forbes - The Biggest Cyber Security Risks In 2022
Aside from the potential for breach of privacy, loss of money, and disruption to infrastructure from cyber-attacks, there's another genuine and pressing problem that's often overlooked: A loss in the trust in tech and data.
Security
VentureBeat - AI critical to business success in post-pandemic world, study finds
The study found a significant shift in attitudes towards AI, ML and data analytics: Over three-quarters (77%) of knowledge workers said that all three could benefit their company in the next 36 months.
Automation & Productivity
TMCNet - Universal Data Governance Framework Ensures Data Protection, Promotes Data Accessibility and Interoperability for New Data Types Beyond PII
 A good example is the United States. There is no common consensus to handle PII among the different states and industry actors. Navigating through all these regulatory requirements across different jurisdictions is very time-consuming and exhausting. In addition, the classification of new PII, such as audio recordings and IP addresses, remains unclear.
Data Governance
Insurance Newsnet - Insurance Fraud Report 2022: Real Time Data, A Crucial Asset In Fraud Fighting
Survey respondents have differing views on the challenges and benefits of fraud detection software solutions. The common theme however is the data challenge; from underwriting to claims to special investigations.
Data & Analytics
Network World - DDR5 memory is coming soon. Here’s why it matters.
DDR5 memory also features a minor power reduction. DDR5’s operating voltage is 1.1 volts, down from DDR4’s 1.2 volts. That may not seem like much, but multiply that over hundreds or even thousands of DIMMs in a data center, and you start to add up to some real power savings.
Automation & Productvity
sdxCentral - Private Network Complexities, Opportunities Abound
It also expects 4G LTE radio access network (RAN) infrastructure to remain the dominant technology for wireless networks through the five-year period, however 5G radios should see stronger adoption in the latter years.
5G
threatpost - Misconfigured Firebase Databases Exposing Data in Mobile Apps
Mobile apps that researchers found were left vulnerable by cloud misconfigurations were popular apps for dating, fitness, bookkeeping, logo design, e-commerce and more, some with more than 10 million downloads, according to the post.
Security
VentureBeat - Report: Edge technologies will drive emerging tech investments in 2022
Looking back to 2021, 5G drew the highest average investment in 2021, with survey respondents reporting an average of $465,000 invested in the technology. This was followed by IoT at $417,000 and edge technologies (i.e., edge AI and edge computing) at $262,000.
Edge Computing
ZDNet - These four types of ransomware make up nearly three-quarters of reported incidents
"The most prevalent ransomware strain in the fourth quarter of 2021 was LockBit 2.0, which was responsible for 29.7% of all reported incidents, followed by Conti at 19%, PYSA at 10.5% and Hive at 10.1%," said the researchers.
Security
Datanami - Cloudera Study Reveals 26 Percent of Businesses Are Reshaping Priorities Around ESG
New research from Cloudera, the enterprise data cloud company, reveals more than one quarter (26%) of business decision makers are now putting increasing investment in environmental, social and corporate governance (ESG) ahead of developing new products/services (24%) or accelerating financial growth (21%).
ESG
NetworkWorld - 5 SD-WAN gotchas to avoid
“Many folks supplemented their WANs with [Internet connectivity], and then left MPLS in.” In many regions, business-class Internet “is not a ton cheaper,” he says. In addition, as organizations go to Internet connectivity versus MPLS, they often increase bandwidth, so cost per megabit might go down, but total cost rarely does, he says.
Network Management
VentureBeat - Accenture lists top 5 tech trends for 2022
Blockchain is the backbone of Web3, an all-encompassing term for a decentralized internet, where no single entity can control the flow of information online. This means that instead of storing data on central servers, each member of a network will have access to the same data in the form of a distributed ledger.
Emerging Tech
IndustryWired - Top Applications of Decision Intelligence and AI in Businesses
Decision Intelligence eliminates the need for long conversations. With a DI platform, you have a nexus of truth that everyone on your team can refer to and trust. You know that the collected insights generated are unbiased, accurate, and reliable. This allows you to act faster and reduces conflict within your team.
Data & Analytics
VentureBeat - Report: Hardware still accounts for biggest portion of IT spending
Driven by the shift to remote work which places a premium on portable computing devices, companies plan to spend significantly more on laptops than on desktops — 19% of hardware budgets vs. 14%, respectively.
IT Management
eWeek - Top Data Analytics Tools & Software 2022
Some companies hire data analysts and business intelligence professionals; other have a team of data scientists helping them decode various data sources. In sum, having the right data analytics tools is part of the solution; having skilled big data experts is just as important.
Data & Analytics
KuppingerCole - Hyperautomation Changing Business
Hyperautomation integrates AI/ML in order to automate enterprise automation. In a nutshell – automate the automation. This can achieve enterprise-level scalability for automation that uses methodical processes to identify processes and tasks that could be automated, as well as increasing the capabilities and flexibility of the automation “bots” that carry out those tasks
Automation & Productivity
TMCNet - Orca Security Survey Finds Cloud Security Tool Sprawl Increasing the Flood of False Positive Alerts, Missed Critical Issues, and Team Burnout
This combination of multi-cloud adoption and disparate tooling is overwhelming security teams with a flood of inaccurate alerts. For example, 59% of respondents receive more than 500 public cloud security alerts per day, and 38% receive more than 1,000 per day.
Cloud Security
IndustryWired - Top 10 Use Cases of AI in Data Mining Algorithms, Explained
The data mining technique in mined data is used by artificial intelligence systems for creating solutions. Data mining serves as a foundation for artificial intelligence. AI in data mining is a part of programming codes with information and data necessary.
Artificial Intelligence
VentureBeat - Cloud security teams are ‘overwhelmed and desensitized’ by alerts, survey shows
Among the findings of the 2022 Cloud Security Alert Fatigue Report is that 59% of respondents report that they receive more than 500 alerts about public cloud security per day. Thirty-eight percent report receiving more than 1,000 of these alerts each day.
Security
Markets Insider - IT Talent Trends for 2022 Released by Info-Tech Research Group
What employees are looking for is changing. The biggest change from 2019, pre-pandemic, to today is an increase in the importance of culture, flexible or remote work, and work-life balance.
IT Management
Forbes - Whirlpools And Monsters: Identifying Key Cloud Risks
"Organizations with little or no cloud cost optimization plans rush into cloud technology investments. They end up overspending on cloud services by up to 70% without deriving the expected value from it."
Cloud
CUInsights - Robotic process automation: Why – and why now?
Remember that there was a fear, decades ago, that desktops would take away people’s jobs. Instead, desktops transformed those jobs, freeing people to do other tasks and work more intelligently. In the same way, RPA will simply change what people do and empower them to invest more in their uniquely human talents.
Automation & Productivity
VentureBeat - Can AI transform small businesses and grow prosperity across North America?
Small businesses don’t have the same access to online advertising ecosystems, or the knowledge to leverage them effectively. Beam.city has built industry knowledge into an algorithm that simplifies the experience for small businesses and guides them in where to best allocate marketing dollars.
Artificial Intelligence
Forbes - Transforming The Supply Chain With Data Analytics And Intelligence
In their "2021 Future of Supply Chain Survey," Gartner discovered that 43% of enterprises will continue to digitalize and integrate innovative technology into enterprise-wide systems. This means that in the coming year, the ability to augment operations and decision-making with data analytics will prove to be a transformative and highly-favored capability.
Data Analytics
BecauseBecause - Why Is Cloud Computing Important? Key Benefits Plus Your Jobs Prospects
The global cloud computing market is expected to more than double in size by 2025. We find out why cloud computing is important and what jobs are available for MBA graduates
Cloud
VentureBeat - How decision intelligence could put AI at the center of every business
Decision intelligence (DI) is now helping companies bridge the gap between theoretical AI and commercial AI, with Gartner predicting that more than a third of large organizations will be using DI within the next two years.
Artificial Intelligence
SiliconANGLE - How cybersecurity leaders can reframe their roles to succeed
As a result, the role of the cybersecurity leader has become increasingly elastic because of the growing misalignment of expectations from stakeholders within their organizations. This is causing burnout among security leaders, who are overworked from practicing in “always-on” mode.
Security
VentureBeat - Report: 25% of mobile endpoints have faced malicious apps
The report takes a look at the mobile attack surface, examining a year’s worth of mobile threat data in review, including a deeper concentration on mobile device threat and mobile application threat trends.
Security
ZDNet - As cloud costs spiral upward, enterprises turn to a thing called FinOps
While the survey's authors do not provide a similar composite spending figure for larger enterprises, they report that many spend $12 million or more annually on selected public cloud services -- 18% of enterprises spend this on AWS, 15% spend this on Microsoft Azure, and seven percent on Google Cloud Platform.
Cloud
Inside BigData - Cloud Database Trends Survey: Key Cloud Benefits of Database-as-a-Service (DBaaS) for Cloud Migration
In fact, 61% of respondents surveyed claimed they were either already fully migrated or working to complete their full database migration to the cloud. More than a third, 36%, were partially migrated or working on a partial migration, with the remainder still planning their migration.
Data & Analytics
VentureBeat - Executives discuss top challenges in deploying AI — and how to solve them
 Increasingly, adopting AI is leading to boosted profitability, with 27% of businesses responding to a December 2021 McKinsey survey claiming that at least 5% of their earnings before interest and taxes (EBIT) are now attributable to AI.
Artificial Intelligence
Techstartups - What is the Metaverse? The Metaverse Explained Simply
The metaverse also has another potential including the opportunities to leverage the technology in the areas of education and learning. The metaverse could be used to connect students, educators, and learners from all around the world and empower them to interact in meaningful ways.
Metaverse
VentureBeat - Digitization could drive manufacturing beyond Industry 4.0
During this shift, forty-eight % of organizations invested in cloud-enabled tools and technologies and 47 % in digital collaboration tools to support their remote workforce, according to an Accenture survey.
Automation & Productivity
VentureBeat - Edge computing will see new workloads, strong growth, IDC predicts
Edge computing looms as an important next step for AI and analytics applications that have been a target for cloud migration, but which have clogged up some of the data pipes to and from the cloud.
Edge Computing
AiThority - Applied AI Adoption: How to Get it Right
Yet, time and again we see companies, of all shapes and sizes, blindly invest in or deploy AI without a clear understanding of what problems they are looking to solve or the value they are trying to generate. This results in huge amounts of wasted time and money.
Artificial Intelligence
VentureBeat - 5 key levers IT management can pull to fight the talent crunch
Gartner research shows that the time to fill a role has increased by 18% since before the pandemic,  and a survey of HR leaders found that 48% of organizations report significant concerns about turnover.
IT Management
AiThority - Enter the Metaverse: Industries are Gearing up for Tech-driven Innovations
“As the metaverse is maturing quickly, this is a crucial time for digital transformation leaders to act. It can be adopted for several use cases to make business operations more personalized, improve customer engagement and increase revenues.”
Emerging Tech
VentureBeat - Report: Cybersecurity teams need nearly 100 days to develop threat defenses
A recent analysis by Immersive Labs of 35,000 cybersecurity team members inside 400 large organizations found that it takes over three months (96 days) on average to develop the knowledge, skills and judgment to defend against breaking threats.
Security
Blocks and Files - Flash and software-defined storage are taking over the datacenter
Server-attached SSDs are now growing in popularity. A majority of companies, 55 percent, use SATA-based SSDs in servers, with an additional 14 percent planning to within two years. A minority, 40 percent, use SAS SSDs, with another 16 percent intending to do so within two years.
Data Storage
Computerworld - IT workers grow restless, and younger ones want respect — Gartner
“IT is a super-heated labor market, right now,” Waller said. “There’s a great talent competition going on there. Sometimes we even compare it to the competition to get top athletes — particularly in key skill areas, such as cybersecurity, data science, cloud and agile development, etc.”
Tech Jobs
VentureBeat - What is a data lake? Definition, benefits, architecture and best practices
A number of vendors are expected to drive this growth, including Databricks, AWS, Dremio, Qubole and MongoDB. Many organizations have even started providing the so-called lakehouse offering, combining the benefits of both data lakes and warehouses through a single product.
Data & Analytics
Datanami - Enterprise Data Storage Market Size to Grow by $1.14B, Says Technavio
Over the projection period, the enterprise data storage market in APAC will benefit from significant expenditures in smart home and smart city projects by major countries such as Japan, China, and South Korea.
Data Storage
VentureBeat - Why and how the U.S. should increase cyber protection: A call to arms
It is incumbent upon the cybersecurity community to pursue holistic solutions for grids and networks through a “digital twin” construct that will identify, preempt, backup and recover from any emerging threats and continue to protect vital assets during periods of attack or disruption.
Security
ZDNet - Data centres are still a tempting target for hackers: Here's how to improve your security
Measures should also be put in place so in the case of a data centre being targeted by an attack designed to disrupt it, services can be maintained. For data centre operators, risk management should be driven by senior leaders to be most effective.
Security
eWeek - Understanding Database Virtualization: 5 Key Points
With the advent of database virtualization (DBV) – not data virtualization – a new methodology has entered the arena. DBV claims to break vendor lock-in on data warehouse technology. How applicable is it and how can IT leaders evaluate the technology?
Data & Analytics
VentureBeat - Report: Increased cloud usage secures spots for AWS, Azure, and Google Cloud as the top 3 providers
In addition to adoption (if an organization is using a cloud provider), usage levels are an important metric as well. As organizations increase overall cloud usage, they tend to gravitate toward market leaders. Data from this year’s survey indicates Azure seems to be either closing the gap — or has slightly surpassed — AWS with some users.
Cloud
ZDNet - A Forrester analyst's impressions from Mobile World Congress 2022
The slow and ongoing standardization process between 3rd Generation Partnership Project (3GPP) release cycles, as well as the lack of chipsets, devices, spectrum limitations, and modules that support emerging 3GPP 5G standards, remains a drag on the speedy 5G uptake.
IoT/Mobility
CSO - 8 takeaways for CISOs from the NSTAC zero-trust report
The report does an excellent job summarizing the history of zero trust, originating in the private sector, as well as the slew of zero-trust efforts, guidance and requirements that continue to stream from authoritative government sources.
Security
Forbes - The Future Course Of Process Automation Will Be Driven By AI, Not Bots
Deploying an RPA bot is analogous to using a hammer. It’s great for driving nails, but when confronted with a screw or another fastener, it cannot perform as expected. A bot that tries to do its job regardless of its inputs can cause damage (digitally speaking), possibly shutting down the workflow that relies upon it.
Artificial Intelligence
VentureBeat - With Mandiant, Google can challenge Microsoft’s security dominance
Microsoft is trying to support all of its own products and services to deliver security to customers, while “Google is a little more interested in supporting the SOC – the security operations center,” Firstbrook said.
Security
threatpost - The Uncertain Future of IT Automation
Cloud-native technologies make connectivity with remote devices easier while staying secure without the use of VPNs. They also improve visibility into the exact, real-time status of a device. IT teams will have an easier time pushing patches automatically without worrying about VPN bandwidth restrictions.
IT Management
VentureBeat - Pandemic pushes growth in robotic process automation
The new report from Forrester notes that the definition of the term is blurring as the general marketplace for automation grows, too. As RPA tools improve, they’re adding connections to other enterprise tools, producing what Forrester calls an “automation fabric market.”
Automation & Productivity
eWeek - Detecting the Unknown Unknowns in Cybersecurity
Many security solutions, even today, are still trying to use various types of signatures to detect malicious files, network traffic, human behaviors, and several others. Even tools that are trying to harness the immense power of large user communities to create vast databases of tens of thousands of different signatures are only effective to some extent. Overall, this strategy is not enough to provide good protection against the known threats.
Security
VentureBeat - IT professionals plan to adopt passwordless technology, according to ESG report
Today, an identity and access management research report created by Enterprise Strategy Group (ESG) unveiled that 85% of IT and cybersecurity professionals agree the adoption of passwordless technology is among top strategic initiatives.
Security
Security Boulevard - Automation is the Top Cloud Security Priority
Respondents have already integrated their DevOps toolchain into cloud deployments, yet organizations are still struggling with the lack of expertise that bridges security and DevOps.
Cloud Security
TechBullion - External Human weakness: why MFA isn’t the answer
Anything. Humans are vulnerable by nature: social engineering attacks may exploit their greed, their insecurities or simple confusion under stress. The tactics may be more or less sophisticated, and may or may not be supported by technological tricks such as deepfakes, but human vulnerability doesn’t change.
Privacy & Security
Industry Wired - Is there Better, Alternatives to Blockchain for Businesses
For example, Amazon’s Quantum Ledger Database simplifies the process of implementing a shared database designed for applications like ledgers, providing a cryptographically verifiable audit trail without all the overhead of a distributed ledger or blockchain.
Blockchain
VentureBeat - Email security bill of rights for a zero-trust world
And although business email compromise (BEC) attacks make up a small percentage of attacks, they cause the most damage: Our data suggest that BEC accounted for 1.3% of attacks but would have resulted in over $354 million in direct losses.
Privacy & Security
AiThority - By 2025, Chatbot Messaging App Accesses to Reach 9.5 Billion Globally
Advanced chatbot messaging apps are becoming conversant at simulating chats using audio, video, and GIFs too. The popularity of chatbots for messaging is gaining popularity on account of the massive demand for self-service customer experiences that can be delivered in real-time 24/7.
Automation & Productivity
VentureBeat - Why the future of the metaverse can only be decentralized
A social network based on a DAO upends this model to return value to those who generate it. Users have an ownership stake in the platform, and assuming it operates using the same ad-based revenue model, the user will receive a share of these revenues as a reward for their engagement.
Metaverse
Techstartups - Cyber threats keep evolving, and so should your defenses
Typically, there are over a hundred thousand cyberattacks in an hour or more than 2,000 per minute. When it comes to mobile devices, an average of 24,000 malicious mobile apps are blocked daily by mobile app stores.
Security
VentureBeat - AI-powered intelligent security makes the hybrid enterprise possible
To effectively counter this increased cyberthreat, the key for security teams is to get “very good at separating the signal from the noise,” he said. “And you can’t do that without AI and ML.”
Security
ZDNet - Rush to cloud computing is outpacing organizations' ability to adapt
Again, many of these issues will fall to IT teams to address -- and cannot be effectively outsourced to cloud providers. The survey finds only 21% of IT executives strongly agree that their cloud vendors provide all the necessary tools and processes to manage and optimize their cloud environments, while 42% somewhat agree.
Cloud
SiliconANGLE - Robotic process automation becomes a transformation catalyst. Here’s what’s new 
Cloud migration is an accelerant to digital business. Organizations are moving to the cloud and building new capabilities on top. A digital business goes beyond cloud and software as a service and puts data, artificial intelligence and automation at the core, leveraging cloud and SaaS, but it reimagines entire workflows and customer experiences.
Automation & Productivity
ComputerWorld - Coda and Notion turn up the heat on Microsoft Office
“These emerging 'living documents' will likely impact the competitive landscape and, for some companies, represent a viable alternative to Google’s or Microsoft’s productivity and collaboration apps.”
Automation & Productivity
VentureBeat - Decentralized identity using blockchain
Using the identity wallet, the user (i.e., the identity owner) can present proof of their identity to any third party. The wallet helps users give and revoke access to identity information from a single source, making it easier.
Security
Network World - NSA urges businesses to adopt zero trust for network security
Configuration tips for network admins include the use of secure, frequently changed passwords for all administrative accounts, limiting login attempts, and keeping potentially vulnerable systems patched and up-to-date. The report also describes safe configurations for SSH (secure shell), HTTP and SNMP (simple network management protocol).
Security
VentureBeat - Report: 9% of security incidents caused by USBs and other removable media
Trusted USB devices can be infected with malware variants that search for external storage devices connected to a victim host to infect them and spread further. This risk is much greater when endpoint users can transfer USB devices from personal devices to business assets.
Security
AIThority - Who Benefits From Democratized Data Analytics?
This is democratized data analytics in action. Everyone in the company makes smarter decisions throughout the day without ever leaving their existing workflows or having to learn entire new skill sets.
Data & Analytics
VentureBeat - Report: 95% of IT leaders feel open source tools are key to strong infrastructure
What was surprising was that 82% of IT leaders said they’d be more likely to select a vendor who contributes to the open source community, which was driven, in part, by a desire to sustain healthy open source communities.
IT Management
sdxCentral - VMware, Red Hat Lead 'Fierce' 5G Cloud-Native Platform Race
VMware and Red Hat are in “fierce competition” for the top 5G telco cloud-native platform, while Microsoft and Amazon Web Services (AWS) are market followers, according to ABI Research’s latest 5G telco cloud-native platforms ranking.
Cloud
SecurityWeek - Tens of Cybersecurity Firms Found Exposing Their Assets: Study
It’s not uncommon for major companies to unwittingly expose databases and other assets, but a study conducted by Reposify over a two-week period in January showed that 35 multinational cybersecurity companies and their more than 350 subsidiaries hosted over 200,000 exposed assets. These assets included databases, remote access sites, and cloud services.
Security
VentureBeat - Report: Majority of enterprises will still use Web2 until 2030
Between now and the end of the decade, enterprises will dabble with Web3 for applications that benefit from new blockchain-enabled business models and new social/gaming networks. In the nearer term, Gartner expects 25% of enterprises to integrate legacy apps and services with decentralized Web3 applications by 2024.
Web3
Data Center Dynamics - Object storage is emerging as the storage standard for data lakes
HDFS is widely used as a data lake storage solution, especially in connection with the tools of the Hadoop ecosystem: for example, MapReduce, Spark, Hive or Hbase. While Hadoop and HDFS are widely adopted, a number of recently developed analytics tools (including Splunk, Vertica, Elastic) are now available on the market for analyzing the high volumes of data in data lakes.
Data Storage
Network World - 7 DNS attack types and how to mitigate them
Almost half of respondents (48%) report losing more than $500,000 to a DNS attack, and nearly 10% say they lost more than $5 million on each breach. In addition, the majority of U.S. organizations say that it took more than one day to resolve a DNS attack.
Security
SC Media - Four ways to get the most out of a threat detection program
Behavioral detections target bottlenecks in attacker tactics, techniques and procedures (TTPs), allowing just one well-crafted and tuned analytic to defend against the equivalent of thousands of IOCs and help defend against unobserved or future variations of the attack.
Security
VentureBeat - Security doesn’t just have a talent problem – it has a spending problem too, survey shows
The survey found that 50% of security leaders believe their organization’s cybersecurity budget “fails to meet the minimum figure they need to remain on track with their security goals.”
Security
Datanami - New Report from expert.ai Forecasts 2022 to be ‘The Year of Language’ in Artificial Intelligence
Analysis across expert.ai’s sample of articles revealed data as the single, most discussed topic in 2021 spanning 15% of total articles, followed by technology (12%), customer (8.6%) and machine learning (5%).
Data & Analytics
eWeek - How Automation Drives Today’s IT
In practical, real-world terms, an automation efficiency in an ERP system can drive some fairly complex orchestration. Traditionally, every iota of that functionality will have been built by a developer, naturally limiting it somewhat. Today’s technology has fewer limitations, thanks to AI.
Automation & Productivity
Forbes - How To Break Through The RPA Ceiling By Implementing An Intelligent Automation Strategy
According to Gartner analysts, by this year, some 90% of organizations were expected to have adopted RPA in some form. Yet, those that try to scale RPA across their organizations fail 97% of the time, according to the results of a study by Deloitte.
Automation & Productivity
Analytics Insight - Top 10 Data Analytics Jobs in Big Tech Companies in March 2022
Not only data analytics jobs are extraordinarily financially rewarding, but it provides a host of opportunities for aspirants in the tech sector to learn about multiple topics related to artificial intelligence and big data.
Data & Analytics
SciTechDaily - Injecting Fairness Into AI: Machine-Learning Models That Produce Fair Outputs Even When Trained on Unfair Data
MIT researchers have found that machine-learning models that are popular for image recognition tasks actually encode bias when trained on unbalanced data. This bias within the model is impossible to fix later on, even with state-of-the-art fairness-boosting techniques, and even when retraining the model with a balanced dataset.
Artificial Intelligence
VentureBeat - Report: 93% of orgs are challenged by malware analysis
Among the top malware analysis challenges are lack of automation (58%), lack of integration (56%), and lack of team experience in using tools (45%).
Security
Network World - Virtual networks need a rethink to meet hybrid-, multi-cloud demands
Despite all the hype about the economy of scale of the cloud providers, the fact is that most enterprises achieve economies close enough to those of the cloud that the difference wouldn’t cover cloud provider profit margins.
Cloud
Industry Wired - Citizen Data Scientist: How to Become One?
A citizen data scientist need not be a professional with a world-class degree or certification. they act as bridges between the business team and data analytics teams with the specific role of generating insights using visualization tools and point–and–click interfaces.
Data & Analytics
Network World - Gartner: 5 ways to deal with network equipment shortages
Some vendors offer official refurbished equipment programs, including Cisco and HPE Aruba. They fully refurbish, recertify and support the hardware. It may be a few years old, but the lead time for this equipment is days or weeks. There are also independent third-party vendors of used equipment, like ITRenew.
IT Management
ZDNet - Ransomware sneaks in with remote workers and cloud-based IT says CyberRisk Alliance survey
The top attack vectors were all from outside the organization, with 37% citing remote worker exploits as a key issue. An additional 35% said cloud infrastructure was to blame, and 32% reported security problems with cloud-based apps.
Security
VentureBeat - The future of data science: Trends in a rapidly-growing industry
We are seeing an increase in people who went to school with a math background (or who might have started out in data engineering) wanting to make the switch to data science. This should be comforting news to anyone who got a degree in math (or a STEM-related field) and now wants to make a change in their career to be part of this rapidly growing industry
Data & Analytics
ZDNet - Application modernization makes a dent in the technology universe
It means continuing embrace of wholesale digital transformation for the business as a whole, built upon "As-a-Service" environments that provide capabilities ranging from artificial intelligence to IoT data management.  
IT Management
SciTechDaily - A Security Technique To Fool Would-Be Cyber Attackers – Method Safeguards a Computer Program’s Secret Information
Instead, a team of MIT researchers has devised a new approach that allows memory sharing to continue while providing strong security against this type of side-channel attack. Their method is able to speed up programs by 12 percent when compared to state-of-the-art security schemes.
Security
Government Technology - California’s Cybersecurity Chief Shares Priorities and Plans
Additionally, placing an emphasis on collaboration and transparency with the provider community will result in healthier and more efficient supply chain management. We all depend on outsourced critical services that vary along the maturity spectrum. The focus needs to be on supply chain risk management and how we use IT-enabled services to raise the bar.
IT Management
threatpost -6 Cyber-Defense Steps to Take Now to Protect Your Company
The Ransomware Spotlight Year-End Report identified 32 new ransomware families in 2021, bringing the total to 157 and representing a 26 percent increase over the previous year. These ransomware families are exploiting a total of 288 vulnerabilities – a 29 percent increase over the previous year.
Security
VentureBeat - Report: Two-thirds of consumers would rather use a chatbot than browse a website
Approximately 18% of consumers use chatbots to find business hours, while 17% are interested in learning more about product information, and 16% are looking to find a nearby business location; other use cases include making a customer service request (16%), requesting technical support (12%), requesting a quote (11%) and asking for personalized recommendations (9%).
Automation & Productivity
ZDNet - 7 solid reasons to consider AIOps
"AIOps is about applying AI to enhance IT operations," Thurai explains. "Contrary to some beliefs, it is not about improving AI with IT operations, but rather is the other way around."
Automation & Productivity
VentureBeat - Web3 holds the promise of decentralized, community-powered social networks
We spend much of our time using one or more Web2 platforms, be it for reading blogs, watching videos, or just scrolling through the internet. The platforms that we use generate billions of dollars, but the users never receive anything for their loyalty. Web3 changes this drastically by rewarding users for their participation.
Web3
Network World - Cisco IDs top 2022 security threats and what to do about them
Now new, less experienced combatants seek out a broader range of targets, using less surgical attacks. “This has led to more risky behavior than we’ve seen historically, without as much regard for collateral damage,” he wrote.
Security
eWeek - Hyperautomation Trends 2022: RPA, Low-Code, AI
Hyperautomation, according to Gartner, is “a business-driven, disciplined approach that organizations use to rapidly identify, vet, and automate as many business and IT processes as possible.”
Automation & Productvity
AiThority - Illusive Research Reveals Identity Risks on 1 in 6 Enterprise Endpoints
Exposed Identity Risks – More than 1 in 10 (13%) endpoints contain privileged account passwords that have been left exposed (e.g., cached credentials).
Security
eWeek - The Risk of Fraud in the Metaverse
The metaverse is exceptionally trendy, financially backed, and full of opportunities for businesses to change how they operate. However, leaders need to remain diligent in focusing on risk management and keeping the general public’s interest, patience, and attention
Privacy  & Security
InfoWorld - Use the cloud to strengthen your supply chain
The rise of industry clouds may change some of this. Indeed, it won’t take long for the public cloud providers to adopt and provide these types of services. Those who wish to gain this advantage will just use the services from the public cloud providers and not have to build their own.
Cloud
VentureBeat - Report: Ransomware groups show staying power, average lifespan is 17 months
In addition, it includes, but is not limited to, billions of data points ranging from network and endpoint detection devices that IBM monitors to X-Force Red engagements, X-Force’s threat intelligence insights and data provided by report contributors such as Intezer.
Security
AiThority - Daily AI Roundup: Biggest Machine Learning, Robotic And Automation Updates – Feb 23
The updates will feature state-of-the-art capabilities in artificial intelligence (AI), Machine Learning, Robotic Process Automation, Fintech, and human-system interactions.
Artificial Intelligence
ZDNet - SockDetour backdoor used in attacks on defense contractors, says Unit 42
SockDetour allows attackers to remain stealthily on compromised Windows servers by loading filelessly in legitimate service processes and using legitimate processes' network sockets to establish its own encrypted C2 channel.
Security
Forbes - Do Companies Have To Adjust To AI Or Vice Versa?
One of the first adjustments to be made while attempting AI-driven transformation is moving business operations and applications from an offline environment to a digital one. Essentially, this involves making the necessary investments to acquire the tools, technological platforms, data scientists, developers, researchers, testers and others.
Artificial Intelligence
SiliconANGLE - More cybersecurity consolidation: Cloudflare acquires Area1 and Darktrace buys Cybersprint
Area 1 was founded in 2014 and offers a product focused on eliminating targeted socially engineered cyberattacks. Pitched as providing the best cloud email security available, Area 1 claims that its service prevents 30% more phishing attacks than email gateways, cloud email suites and other defenses.
Security
VentureBeat - What consumers think about AI – and the impact on your industry and business (VB Live)
For instance, among consumers who said they weren’t informed about AI, only 20% thought AI would have a positive impact on society. That number shoots up to 50% percent among those who feel they have a handle on the technology.
Artificial Intelligence
TMCNET - Cloud Storage leaks grew by 150% in 2021, due to market pressures, new CybelAngel industry report reveals
"The key is visibility and speed in order to locate all exposed assets pertaining to an organization's attack surface before they are breached by malicious actors. As risks change each day, organizations need to be ready to respond through continuous monitoring."
Security
AutomationWorld - Leading IoT Vendors Commit to OPC UA Adoption
Key drivers behind this progression are, first and foremost, the global adoption of OPC UA as the open standard of choice for secure production-system interoperability across OT and IT networks, leveraging standardized data exchange.
IoT
Israel21c - Cyberattacks on cars increased 225% in last three years
Upstream Automotive Cybersecurity Report reveals that the top attack categories were data/privacy breach, car theft/break-ins and control systems.
Security
Redmond - Report: 76% of Orgs Faced Ransomware Attacks in 2021
42 percent were user actuated, meaning they clicked on a malicious link, often from a spam email. 43 percent were due to a lack of diligence from an administrator (patches, credentials, etc.)
Security
Geekwire - Web3 trends to watch: New apps, new consumer behavior, and a massive talent migration
First, top talent including engineers, product managers, and entrepreneurs are leaving their Web2 jobs to work at Web3 startups. Community optimism, green field tech opportunities, and allure of career momentum are attracting top talent.
Web3
VentureBeat - Google’s privacy changes: The war on cross-app tracking, cookies and third-party advertising
“The profiling of user behavior has long been the fuel of digital advertising. Even though Google has said they will wait two years for full implementation, that is a very short fuse for tech companies who rely on the ability to track and monetise user behavior."
Data Privacy
Network World - Zero trust requires clear architecture plans before changing core systems
Or, enforcement might be handled at the endpoint level for systems able to run a software-defined perimeter client, and the network only required to handle policy enforcement for devices that cannot (timeclocks or sensors, for example). In either case, those high-level choices should, as much as possible, be made before the redesigns in the separate technology spaces begin.
Security
Datanami - Five Ways to Shift to AI-First
In the ideal world, AI would be assisting with every phase of decision making fully embedded into systems and fully transparent to employees and customers.  But to achieve this goal, fundamental changes need to take place including a top-down shift in mindset, as well as implementation of MLOps tools to help IT teams to overcome technical hurdles that can prevent AI from reaching its full potential.
Artificial Intelligence
TMCNET - The Data Is In: Cloud Has Hit a Wall, and There's Only One Way to Vault Over It
These limitations are caused by too many groups across an enterprise using too many different tools and clouds, with 80% struggling to achieve comprehensive visibility into cloud usage and spend. Further complicating matters, these disparate tools and preferences are spread across islands of automation, which in turn create security vulnerabilities.
Cloud
threatpost - Gaming, Banking Trojans Dominate Mobile Malware Scene
Last year, banking trojans learned a number of new tricks. For example, the Fakecalls banker, which targets Korean mobile users, is now “[dropping] outgoing calls to the victim’s bank and plays pre-recorded operator responses stored in the trojan’s body,” according to the report.
Privacy & Security
Forbes - Making Sense Of The 'Unknown' With Data Intelligence And Hyperautomation
In a recent IDC webinar, analysts predicted that “By 2023, 50% of all supply chain forecasts will be automated using artificial intelligence, improving accuracy by 5 percentage points.” This 5% could be the equivalent of saving millions of dollars for manufacturing companies.
Automation & Productivity
sdxCentral - How CIOs Reckon With Talent Upheaval
“When IT workers are asked about their intent to stay, 22% indicate they are looking for a new job within the year. Active job postings in the U.S. for IT have continued to increase over the past year, driving stiff competition in an already scarce talent pool,
Tech Jobs
eWeek - Digital Twins Guide: Answering 3 Most Frequently Asked Questions
Leveraging data from existing systems, the digital twin allows manufacturers to extract greater value from years of investment without the need to “rip and replace.”
Digital Twins
VentureBeat - 5 top data and analytics trends to watch in 2022
The advancement in MLops will lead businesses to create stable machine learning models with application-level quality. In fact, Gartner predicts that by 2025, the 10% of enterprises that establish AI engineering best practices will generate at least three times more value from their AI efforts than the 90% of enterprises that do not.
Data & Analytics
Blocks & Files - Veeam Data Protection Trends: Assume you will be breached
Veeam’s 2022 Data Protection Trends report says that users now operate in a hybrid multi-cloud world, face rabid ransomware attacks, and need more data protected – and to have that data recovered more quickly, increasingly by SaaS processes and from the cloud.
Data Protection
Network World - Data-center network automation: Its pitfalls and how to avoid them
Network automation is notoriously difficult to implement due to the complexity of networks in general, and only 23% of the people surveyed were fully confident in their data-center network-automation strategies.
Network Management
TechStartups - Clearview, the controversial facial-recognition AI startup that uses social media photos to build a biometric database, seeks its first big deals with federal agencies
This year, Clearview is aiming to win its first big U.S. government contracts and expand its team by a third amid a series of legal challenges to Clearview for its alleged violation of various states’ biometric information and data privacy laws.
Data Privacy
VentureBeat - Report: 70% of orgs are spending $1M or more on AI
According to the results, more than 40% of organizations have reached high levels of maturity, from operational (AI in production, creating value) to transformational (AI is part of business DNA) status. To get there, a quarter of maturing organizations are spending $51 million or more on AI, compared to just 8% of experimenters.
Artificial Intelligence
HelpNetSecurity - To shift to data-driven security decision making: Start with the right data
In fact, recent research by Trend Micro found that the average organization has no less than 29 security monitoring solutions in place. This translates into an unmanageable amount of data flowing into the Security Operations Center (SOC), and makes it increasingly difficult to prioritize alerts and manage cyber risk.
Security
VentureBeat - What is intelligent document processing? Why IDP matters in the enterprise
Another IDP vendor, Zuva, focuses on contract and document review, offering trained models out of the box that can extract data points and present them in question-answer form. M-Files applies algorithms to the metadata of documents to create a structure, unifying categories and keywords used within a company
Automation & Productivity
eWeek - 3 Emerging Trends in Streaming Data
EDA enables data to be moved in real-time event streams via an event mesh – helping link together previously unconnected processes across business running multiple siloed systems. A global study of C-Suite and IT architecture professionals has found that 85% of organizations are looking to incorporate real-time data.
Data & Analytics
Network World - Top 7 next-generation firewall vendors 
Next-generation firewalls (NGFW) offer the same capabilities of a traditional firewall with added features such as Deep Packet Inspection (DPI), Integrated Intrusion Protection (IIP), Web Filtering, Antivirus, Antispam, Anti-Malware, SSL and SSH traffic inspection, all with an eye towards the detection and isolation of threats in real-time.
Security
Datanami - Axway Survey Finds People Are Willing to Open Up Their Data if it Leads to Better Experiences
 “It indicates there is an expectation for satisfying digital experiences. Securely opening up data while building on heritage infrastructure can help craft these experiences – while allowing companies to give us the privacy and security we crave,” added Padua.
Data Privacy
sdxCentral - Great Resignation Shines a Spotlight on Insider Threats
Surveys from security vendors like Tessian and Code42 reveal how ubiquitous the problem has become. In the U.S., 40% respondents said they had taken data with them when leaving a job, and 58% of them use the data for their new job, according to Tessian’s recent report. Plus, Code42 found 60% of surveyed employees admitted they took data from their last job to help the current role, according to Payne.
Security
VentureBeat - Report: 63% of IT pros say cyberthreats are top obstacle to cloud adoption strategy
Approximately 63% of IT professionals named cyberthreats that are designed to target cloud services as the top obstacle to cloud adoption. Similarly, 69% of IT professionals identified the need for consistent security coverage across all cloud infrastructures as the biggest barrier to multicloud adoption.
Cloud
SiliconANGLE - How to crack the code on data and analytics governance
Gartner predicts that through 2025, 80% of organizations seeking to scale up digital business will fail because they do not take a modern approach to D&A governance. If CDOs expect to deliver effective D&A strategies, they must crack the code on governance
Data & Analytics
VentureBeat - Running multiple APIs side-by-side with AI paves way to hyperautomation for business
Using multiple APIs led by AI is innovating operations, processes and leading customer experience, all key to business success. This makes a solid case for AI-driven APIs to lead the way into the future of Artificial General Intelligence.
Automation & Productivity
Forbes - The Top 10 Tech Trends In 2022 Everyone Must Be Ready For Now
Quantum computing will potentially give us computing power that is a trillion times more powerful than what we get from today’s advanced supercomputers.
Emerging Tech
TechBullion - The Key Artificial Intelligence and Machine Learning Trends for 2022
Another key AI trend we expect to see is the continued rollout of natural language processing systems. Indeed, natural language processing is an artificial intelligence technology that’s already received widespread acclaim and success, and the development of the GPT-3 model is further driving the potential.
Artificial Intelligence
Analytics Insight - Top 10 Data Science + Data Analytics Programs To Take up in 2022
Currently, data science consulting is more important than ever since it is helping companies grow and prepare for a better future. The foundation of data science is made of skilled data scientists who possess immense experience in domains like statistics, math, and computer science.
Data & Analytics
Digital Journal - Business Consulting: Everything as a Service accompanied with an Expertise Edge
The model combines the 3 C’s (business Context, Competitive positioning, and Customer preference), in a collaborative framework (synergies that cut across verticals and business units) to create a unique value proposition for customers.
IT Management
VentureBeat - To pay or not to pay is the question for cloud ransomware
According to Cybereason, 42% of companies that suffered an attack in 2021 recouped only a small portion of the financial damages caused by ransomware through insurance coverage. What’s more, in a survey of 1,263 companies, 46% of victims that submitted a ransom payment got their data back, but much of it was corrupted.  
Security
TechRepublic - Why multicloud environments can help improve security and redundancy
Single-cloud providers advertise redundancy by employing multiple data centers. However, data centers share a common control plane.“The control plane is what enables the cloud to function,” Gibbs said. “The cloud control plane orchestrates the network and data centers. If anything happens to the cloud control plane, that will likely turn into a single-point-of-failure outage.”
Cloud
ZDNet - Data is going to the cloud in real-time, and so is ScyllaDB 5.0
On the performance front, Laor emphasized ScyllaDB's new I/O scheduler, which has been in the works for about 6 years. It's built to match new hardware capabilities and works on the shard level. What ScyllaDB's people realized was that workloads with mixed read/write requests require special management, and this is what they worked on.
Data & Analytics
Cointelegraph - JPMorgan unveils research on quantum resistant blockchain network
QKD utilizes quantum mechanics and cryptography to enable two parties to exchange secure data and detect and defend against third parties attempting to eavesdrop on the exchange. The technology is seen as a viable defense against potential blockchain hacks that could be conducted by quantum computers in the future.
Blockchain
ZDNet - NIST outlines what IoT and software 'security labels' could look like
Allowing for a marketplace of standards, programs, and schemes to evolve would permit the market to drive how best to achieve the desired outcomes and offer the flexibility to suit a variety of stakeholders' needs. Doing so also would accommodate, and not hinder, a rapidly evolving technology landscape," writes Megas.
Emerging Tech
VentureBeat - 5 strategies to consider with cloud deployments
Enterprises should ask themselves if they have the elasticity of resource requirements to make the financial benefit of a cloud deployment work. If they have a stable workload, meaning a 24/7/365 workload that does not have peaks and troughs of resource requirements, it will be cheaper to run it on-premises or as a co-location
Cloud
Forbes - The Five Biggest Education And Training Technology Trends In 2022
E-learning is an increasingly popular option for workplace training, too – a study by IBM into its own remote learning initiatives found that its learners had been able to absorb five times more content, at one-third of the cost to the company, resulting in a saving of $200 million.
EDTech
eWeek - 3 Ways IT Can Support Your New Global Workforce
Judicious use of automation will offer extraordinary benefits, including triggering next steps in projects, communicating with customers in any time zone, and connecting employees. Automation will also increase a company’s need for rock-solid IT teams that can stay ahead of trends and keep everything running.
Automation & Productivity
VentureBeat -Report: 54% of orgs with advanced data analytics have increased their revenue
The survey also reinforced the fact that third-party service providers are key enablers in organizations’ data and analytics journey. In all, 68% of surveyed decision-makers expect to see an increase in their organizations’ spending on data and analytics in the next 12 months, which includes engaging third-party service providers for support in data and analytics-driven initiatives
Data & Analytics
The Hacker News - 4 Cloud Data Security Best Practices All Businesses Should Follow Today
Last but not least, it's a good idea for businesses to take steps to minimize the data they're entrusting to their cloud providers. After all, you don't need to protect data that's never uploaded in the first place. The idea is to refine business processes to collect only the data required to make them work.
Cloud Security
Forbes - Navigating Data: Tips For Leveraging One Of Your Organizations Greatest Assets
A common conversation around the executive table is, “We need to do more with our data.” An organization then sets off on a journey to implement data visualization tools or artificial intelligence solutions that require investments in people and technology. But after many months, the organization might still not have really achieved its desired outcomes
Data & Analytics
IndustryWired - Top 10 Emerging Technology Related to AI in The Banking Sector
With a DAO system in place, the returns will come fast. Banks that mainly rely on digital account opening have experienced 16% revenue growth year over year. from 39% to 46% plan to modify or enhance their existing DAO systems
Artificial Intelligence
TechRepublic - New study shows enterprises are making progress with cloud-based HPC
Rescale’s software platform enables scientists and engineers to get access to massive pools of the latest chip architectures that boast the fastest interconnects and memory to run enormous workloads over and over that simulate the real world.
Emerging Tech
Digital Information World - New Study Shows How Several Companies Collect Your Data Illegally
Twitter is another social media platform that does not obey these laws when it comes to trying to get users to consent to cookies, but it should be noted that social media platforms are not the only culprits in this regard. Airline sites such as Ryanair.com and the popular news site for the Daily Mail were both found to break data collection laws that apply in the EU as well as the UK.
Data Privacy
Finextra - Unlocking the potential of data to transform our world
 At present, there are currently up to 234,000 vacancies for data roles in the UK – finding people with the right skills is difficult. Small and medium-sized businesses are lagging in digital transformation too, and some organisations struggle to balance encouraging innovation and complying with regulation.
Data & Analy tics
AiThority - Optiv ‘A Visual Future of Cybersecurity’ Prepares Business Leaders for the Next Era of Attacks and Innovations
In the future, machine learning (ML) and AI will be used widely by both attackers and defenders. The applications are endless, both in the positive and the negative. AI will be used to improve health care, transportation, education and agriculture, but it will also be used in cyberattacks to automate target analysis, conceal malicious code and create intelligent malware that mimics trusted system components.
Security
The Register - Facebook is one bad Chrome extension away from another Cambridge Analytica scandal
Multiple Chrome browser extensions make use of a session token for Meta's Facebook that grants access to signed-in users' social network data in a way that violates the company's policies and leaves users open to potential privacy violations.
Data Privacy
VentureBeat - Ransomware attacks surged 2X in 2021, SonicWall reports
The 105% spike in ransomware attacks in 2021 was also a significant acceleration from the rate of increase in the previous year, when ransomware attacks climbed 62%, year-over-year, according to SonicWall.
Security
ComputerWorld - Why Apple spent billions to get to 5G — services
Those nations in which 5G services are delivering the fastest connection speeds are ripe for service evolution. Why work in an office when you can grab your iPad Air (soon with 5G) and work under a tree? The combination of fast mobile broadband and powerful hardware underpins a services opportunity we’ve not really begun to scratch.
5G
VentureBeat - Meta’s RSC supercomputer brings revolutionary power — and privacy and bias concerns
This blending of physical and digital identities brings cause for concerns. “The problem starts with the philosophy that there’s no need for privacy if you have complete transparency. And we’ve seen that ideology underline Facebook’s decision-making, and we’ve seen the consequences of that
Data Privacy
CMS Wire - Facebook Metaverse: The Future of Digital Experience Marketing?
"As long as you can make technology seem fresh and new and cool, you can avoid regulation," Donovan noted. "And you can run defense on that for several years before the government can catch up."
Emerging Tech
Diginomica - Frictionless Enterprise - how the XaaS Effect transforms customer engagement
XaaS is much more than simply adding a digital connection and switching to subscription billing. What matters most is how the provider uses that connection to enhance the customer experience throughout the product lifecycle.
Automation & Productivity
eWeek - 6 Best Practices to Clear Marketing Data Roadblocks
While 45% of marketers reported having a customer data platform (CPD) that gives them a unified and a single view of customers, only 38% of the survey participants said their customer segment and persona data is available in a format they can use for decision-making. Properly formatted and unified data is the foundation of real-time marketing.
Data & Analytics
Network World - Data-center spending is half that of cloud services
But numbers can be deceiving. Dinsdale said IBM is still growing its cloud revenues, just at a growth rate that is far below Amazon, Microsoft, and Google. So IBM is not losing ground, per se, in the revenue department, it’s just not gaining ground as fast as the others.
Cloud
Datanami - Nucleus Research Analyzes Adoption of Modern Data Warehouse Technology in New Value Matrix
“As development of fully-managed and serverless offerings accelerates, Nucleus expects customers to significantly limit the need for IT intervention and reduce expenses related to the over-provisioning of computation resources.”
Data & Analytics
Network World - 5 best practices for making smart-building LANs more secure
The controller model also helps with the security of the IoT links. Controller-based smart buildings use a custom IoT protocol (common ones are LoRa, LoRaWAN, Z-Wave, and Zigbee) with limited capabilities to limit how they could be exploited, so even if the device link was hacked, there’s a limit to what damage could be done.
Security
ZDNet - LinkedIn phishing scams increase 232% since Feb 1: report
"When clicked, the phishing links send the victim to a website that harvests their LinkedIn log-in credentials. The footer features elements from LinkedIn's genuine email footer, including their global HQ address, hyperlinks to unsubscribe and to their support section, and the recipient's information."
Privacy & Security
VentureBeat - Report: Recruiting developers will be 2022’s biggest challenge, say 53% of IT pros
The pandemic highlighted one of the most crucial challenges facing the software industry — the need for more professional software developers. Not only are there not enough developers to meet demand, but those who are available may lack the necessary software development skills for popular frameworks.
Tech Jobs
VentureBeat - Report: Only 21% of enterprises use zero trust architecture
However, despite acknowledging its importance, only 21% have so far adopted zero trust as a foundational model across their enterprise. Additionally troublesome is that only 32% of respondents consider their enterprises to have high cybersecurity maturity.
Security
TechTarget - The best enterprise storage arrays of 2021
Spinning disk retains a prominent position in the enterprise, but the current darling of the data center is flash storage. Flash adoption is no longer limited to larger organizations. Flexible flash configurations and expected price declines combine to make flash compelling to more midsize organizations.
Data Storage
AiThority - Top Augmented Analytics Trends to Watch out for in 2022
Most of the ABI products provide extensive dashboarding capabilities that enable analysts to put a data story for end-users but for augmented analytics to become mainstream it is imperative that the products are enabling end-users to extract and explore relevant data stories.
Data & Analytics
Blocks & Files - The new cloud infrastructure software stack
“Applications don’t live in a vacuum. Every app has a stack of technology components or layers that sits underneath … While the application stack still depends upon core infrastructure elements like compute, storage and networking, these have increasingly become commoditised.”
Cloud
VentureBeat - How to create data management policies for unstructured data
The lion’s share of all data is unstructured — files of all types including images, log files, trace files, output files, video, and audio, and which are spreading like wildfire. Data management policies must address the efficient movement and management of unstructured data.
Data Management
Datanami -CNCF Sees Record Kubernetes and Container Adoption in 2021 Cloud Native Survey
The survey, now in its sixth year, found that the usage of Kubernetes is continuing to grow and reached its highest level ever, with 96% of organizations using or evaluating the technology. Kubernetes has been fully embraced by large enterprises and is even growing in emerging technology hubs, like Africa, where 73% of respondents use Kubernetes in production.
Cloud
TechHQ - Russian hackers profited the most from ransomware payments
In a report from Chainanalysis, about 74% of payments made from ransomware attacks in 2021 went towards Russia-linked hackers. According to the research report, more than US$ 400 million worth of crypto-currency payments went to groups highly likely to be affiliated with Russia.
Security
InfoWorld - Overcoming the IoT interoperability hurdle
But this network of contributors is far from a well-oiled machine; disparate technologies deal with disparate data communication all over the world.
What’s needed is a set of IoT interoperability standards across data collection, stream processing, visualization, alerting, and machine learning and AI frameworks.
IoT
VentureBeat - Surging ransomware data leaks point to ‘weaponization of data,’ CrowdStrike says
“Antivirus is dead. The legacy antivirus products that are out there — the signature-based antivirus tools — are not effective anymore,” he said. “What is necessary are [tools] that use machine learning, in addition to signatures, to identify malicious activity.”
Security
Digital Journal - Endpoint Detection and Response Market – Global Industry Analysis, Size, Share, Growth and Forecast 2020 – 2027
The European region will dominate the market for Endpoint Detection and Response due to Growing demand for natural gas for generating power and heating spaces.
Security
ZDNet - What the metaverse means for you and your customers
So journey mapping has been obsolete for a decade or so. Too many channels and incongruent behaviour killed it. And don't let a consultant or a martech vendor try to convince you otherwise, reliant as they are upon it, to sell you more of their whatever.
Metaverse
EBN - The Great Resignation is driving data breaches and cybersecurity threats
Fifty-eight percent took information to help them in their new job, 53% believed that the documents belonged to them, 44% so they could share it with their new employer and 40% to leverage it for more money in their new position.
Privacy & Security
VentureBeat - How we can finally evolve from Web 2.0 to Web 3.0
For one, many self-described decentralized apps are far from being genuinely decentralized. It is not uncommon for the front end of these services to be running on cloud servers, meaning that access to them is still dependent on legacy infrastructure, and the blockchain is only occasionally tapped to send or receive data.
Web3
techopedia - Why ML Testing Could Be The Future of Data Science Careers
A considerable amount of time goes into testing and quality assurance activities. Experts and researchers believe 20 to 30% of the overall development time is spent testing the application; and 40 to 50% of a project's total cost is spent on testing.
Machine Learning
InfoWorld - Think you can out-cloud the cloud?
One way that AWS, Google, Microsoft, and other hyperscalers have optimized their energy consumption is by building with energy-efficient languages such as Rust. Not content to simply build with Rust, however, these and other companies are investing in the development of Rust (and other energy-efficient software and hardware technologies).
Cloud
eWeek - Cloud Migrations: Look Past the Mirage of Cost Savings
 For CEOs, cloud adoption is not just an engine for revenue growth and efficiency. Its speed, scale, innovation, and productivity benefits are essential to the pursuit of broader digital business opportunities, now and well into the future. Yet an overly narrow view of cloud-value economics and where value exists, often keeps companies from achieving the desired outcomes.”
Cloud
ZDNet - Cybersecurity M&A volume reaches $77.5 billion in 2021: report
There were more than 1,000 financing deals involving cybersecurity companies and 286 mergers and acquisitions. 2021 saw five cybersecurity IPOs in 2021 -- KnowBe4, DarkTrace, SentinelOne, Riskified and Forgerock -- with an average IPO raising $467 million.
Security
VentureBeat - How the metaverse could shape cybersecurity in 2022
For starters, there is the essential use of AR/VR devices that collect large amounts of user data and information such as biometric information, creating a potential for hack attacks. Moreover, the modern demand for user data is most likely to grow with the Metaverse, as it could provide leverage to collect more user data
Privacy & Security
SiliconANGLE - The improbable rise of Kubernetes to become the operating system of the cloud 
Kubernetes Part 1 explains the dynamics of the technology industry in the early part of last decade, the impact that AWS had on the DevOps movement, the importance of Docker, which blazed a new trail for developers, and how Google ultimately landed on the decision to open-source Kubernetes
Cloud
VentureBeat - Interoperability must be a priority for building Web3 in 2022
Embracing cross-chain communication means empowering developers to build on a network that best suits their needs knowing that their applications will be accessible to users across other blockchain platforms. This allows blockchain networks to continue to improve the applications they provide and their own infrastructure, instead of investing countless hours and vast sums of money into building individual bridges.
Web3
insideBigData - Data Scientists Reveal Roadblocks to Digital Transformation
For example, around four in 10 are dissatisfied with their company’s use of analytics and model deployment, while more than 20 barriers to effective working emerged, according to a survey of data scientists commissioned by analytics leader SAS.
Data & Analytics
TMCNET - Survey Shows 77% of Consumers Against Facebook Owning Metaverse Data
An overwhelming 87% would prefer a metaverse on the decentralized blockchain. This sentiment was even more pronounced among Gen Z respondents who were 10% more likely to prefer a blockchain metaverse than their Millennial counterparts.
Blockchain
VentureBeat - Report: Companies face a 37% chance of losing IP when employees quit
Additionally, 71% of cybersecurity leaders and practitioners report not knowing what and how much sensitive data departing employees are taking to new organizations. Though 96% of companies note they’re experiencing challenges protecting corporate data from insider risk, ownership of the problem is murky.
Security
Datanami - IDC Survey Illustrates Importance of Purpose-Built Enterprise AI Infrastructure
Of the 31% with AI in production, only one third claim to have reached a mature state of adoption wherein the entire organization benefits from an enterprise-wide AI strategy.
Artificial Intelligence
VentureBeat - Report: Cloud spending will soon outpace IT due to COVID-19
Of note, the majority (65.9%) of spending on application software will be directed toward cloud technologies in 2025.
Cloud
CSO - Look for attack surface management to go mainstream in 2022
What exactly is the attack surface?  In reality, it’s everything—internal assets, external corporate assets, third-party assets, people, everything.  That said, the emerging attack surface management category focuses on internet-facing assets alone.  Hmm, just another day in the perplexing cybersecurity realm.
Security
Finextra - Overcoming Cloud Adoption Challenges in Lending Operations
Research shows that 30-40% of lending resources’ time gets used up on non-core tasks due to legacy systems.
Cloud
Telecoms - What happens in metaverse stays in metaverse – or does it?
Yesterday it was reported that McDonalds filed several trademarks around the metaverse, including one that described as “a virtual restaurant featuring actual and virtual goods.”
Metaverse
ZDNet - Nearly $700 million spent on ransomware payments in 2020 alone: report
"In fact, despite these numbers, anecdotal evidence, plus the fact that ransomware revenue in the first half of 2021 exceeded that of the first half of 2020, suggests to us that 2021 will eventually be revealed to have been an even bigger year for ransomware," Chainalysis said.
Security
VentureBeat - Steps IT leaders can take now to get AI out of ‘pilot purgatory’
But right now, too many AI applications are stuck in the lab at the conceptual stage, and too few reach deployments in the “field” (i.e., production environments with real workloads, users, and problems). This gap is dangerous because AI improves through operationalization, learning from real-world data how to work faster and better.
Artificial Intelligence
Network World - Log4j hearing: 'Open source is not the problem'
“The weakness in Log4j, which can be exploited by only typing in 12 characters, is just one example of how widespread software vulnerabilities, including those found in open-source code, or code that is freely available and developed by individuals, can present a serious threat to national and economic security,” stated committee chairman Sen. Gary Peters (D-MI).
Security
ZDNet - Linux malware attacks are on the rise, and businesses aren't ready for it
Analysis from cybersecurity researchers at VMware warns that malware targeting Linux-based systems is increasing in volume and complexity, while there's also a lack of focus on managing and detecting threats against them. This comes after an increase in the use of enterprises relying on cloud-based services because of the rise of hybrid working, with Linux the most common operating system in these environments.
Security
Semiconductor Engineering - What Will Be The Killer App For 5G? Time To Place Your Bets
At $90.7 billion, mobile gaming now accounts for over half of gaming revenue. (By contrast, movies will rake in only $20.2 billion at the box office.) Likewise, AR seems to be making the transition from booth demo technology to something people will actually use.
5G
The National Law Review - Tech Transactions & Data Privacy 2022 Report: The FTC’s Expanding Role in Cybersecurity and Data Privacy Enforcement in 2022
During the second half of 2021, the FTC took two meaningful actions that signaled the FTC’s desire to expand its role in setting and enforcing cybersecurity and data privacy standards: the FTC clarified the scope of the often ignored HBN Rule and the FTC amended the Safeguards Rule to strengthen the data security requirements for financial institutions.
Data Privacy
VentureBeat - 3 data privacy trends to watch in 2022 and beyond
In just the first year of California’s CCPA, B2C companies received approximately 137 data subject access requests (DSARs) per million identities. At that time, California was the only state with a privacy law on the books. Virginia and Colorado added laws this year, and more states are trying to push privacy legislation forward.
Data Privacy
ZDNet - Tech jobs are booming: Here's what employers are looking for
According to job market statistics by CompTIA, IT occupations throughout the economy increased by 178,000 last month, with tech-related hiring contributing to the national growth of 467,000 jobs. Unemployment rates within tech occupations dropped to 1.7%, down from 2% in December 2021
Tech Jobs
CSO - Vigilance and Planning: Experts Share Their IT and Data Security Strategies 
“I’m focused on security of the DevOps/DevSecOps toolchain from man-in-the-middle and other attacks,” he says. “As the workplace becomes more hybrid, the toolchain becomes a more enticing target for threat actors raising the security stakes.”
Security
sogetilabs - What if quantum technology could solve the world’s biggest challenges?
Business leaders are aware of the benefits that this next generation of computation can bring, but they’re also concerned by the complexity of this fast-evolving area of technology. Estimates suggest as many as 40% of large enterprises will have quantum computing initiatives underway by 2025.
Quantum Computing
Techstartups - Here’s Why Web 3.0 Could Disrupt the Future of the Creative Industry and Data Management Systems
Simply put, Web 3.0 is a decentralized version of the web whose focus is to bring power back to the users. A trend that resonates with most people across the world given its value proposition in data privacy and security.
Data Privacy
SiliconANGLE - What to expect in cloud computing in 2022 and beyond 
HPE and Dell are interesting. They’re transitioning early private cloud businesses to GreenLake and Apex, respectively. And finally, after years of staring at their respective navels in cloud and milking legacy on-prem models, they’re building out cloudlike infrastructure, services and pricing models for their customers.
Cloud
VentureBeat - Report: 88% of IT leaders face integration challenges that slow digital transformation
Companies’ integration challenges and a growing number of applications — on average, organizations are using 976 individual apps — are not only hindering great customer experiences and digital transformation, but also costing organizations millions of dollars.
Digital Transformation
Cointelegraph - A quarter of people will have spent time in the metaverse by 2026: Research
The report also estimated that 30% of the organizations in the world will have products and services in the metaverse by 2026, with brands already gearing up to stake their claims in the digital world.
Metaverse
VentureBeat - The struggle to keep cloud budgets in check
The research found that budgetary strain was the number one concern facing people directly charged with managing cloud costs. Indeed, the CIOs and CTOs surveyed said they expected cloud spending to comprise 47% of the technology budget for SMEs in 2022 — a whopping 67% increase from 2021.
Cloud
SiliconANGLE - Seven intriguing enterprise startups for 2022 
Observability – especially based on the OpenTelemetry standard – is perhaps the most prominent theme. Machine learning is a close second. Data, however, is the common thread that pulls these innovative companies together, even though they all take a differentiated approach to their offerings.
Data & Analytics
ZDNet - Ransomware gangs are changing their tactics. That could prove very expensive for some victims
According to analysis by Coveware, this move has increased the risk profile of being involved with ransomware attacks, and thus decreases the pool of cyber criminals, because some will decide the potential for being arrested and extradited isn't worth the risk – to the extent that some are quitting.  
Security
VentureBeat - The Great Resignation is a myth: Meet the Great Reprioritization
A recent survey by Bankrate.com found that 55% of Americans plan to seek new jobs in the coming year. And Deloitte revealed that over 50% of CEOs cite talent recruitment and retention as the most significant challenges going into 2022.
Tech Jobs
Data Center Dynamics - Top data center and tech predictions for 2022
The metaverse will simply not develop enough this year to have any measurable impact on the edge computing sector. Without a doubt, as the metaverse matures, it will have a massive impact on edge computing. To enhance the user experience, it will have to push content and compute closer to the user.
Tech Trends
ComputerWeekly - Four emerging data integration trends to assess
In mapping the future of the technologies in the data integration ecosystem, Forrester identified data as a service, data mesh, knowledge graph and query accelerator as four technologies that fall into the “experiment” category. They are regarded as having low maturity and low business value.
Data & Analytics
TMCNET - More Than Half of Ransomware Victims Paid the Amount Demanded by Hackers in 2021
And why wouldn't they pay? Data is a valuable commodity. Sixty percent of companies have sensitive customer data (e.g. confidential information, credit card numbers, social insurance numbers, etc.) and nearly one third (28%) value their information assets (data, people, processes, recipes, etc.) at more than $1 million.
Privacy & Security
Location Analytics Market Estimated to Exceed US$ 45.77 Billion Globally By 2027: IMARC Group
Location analytics, also called geoanalytics, refers to the tools that aid in interpreting and analyzing real-time or historical geographical data. It is usually used to predict consumer behavior or buying patterns.
Data & Analytics
VentureBeat - Gartner’s IT spend forecast for 2022 shows CIOs ready to take risks
However, Lovelock cautions, the technology that CIOs choose to buy and implement needs to focus on more than simply ensuring that workers can access the internet and accomplish tasks remotely and securely. It should also allow venues for professional growth and self-service
IT Management
Computerworld - Q&A: CISO sees 'enterprise' browser as easier way to monitor employee web use
As we’re getting what we’re calling sanctioned apps or approved apps, we’ll start to say, 'You know what? Salesforce, Workday, Office — you can only get to those through this browser now.' So, we’ll enforce people who are interacting with your SaaS through this browser.
IT Management
VentureBeat - Metaverse 101: Defining the key components
To achieve a true VR or AR experience, a user must be able to interact with virtual content in natural and immersive ways. This distinguishes VR from 3D movies and 3D simulations. It also distinguishes AR from “heads-up displays” (HUDS) that present non-immersive content into a user’s line of sight, such as text, data, and flat images.
Metaverse
eWeek - Real-Time Data Management Trends for 2022
Organizations will need to glean insights from streaming data in real time to find new patterns and discover and act on them. Navigating data is like running whitewater, where you need to adapt instantly to a changing environment. Those that learn to run the rapids will succeed.
Data & Analytics
Techstartups - Facebook’s Meta, Snap, Twitter, and Pinterest lost $278 billion due Apple privacy changes
The report notes Meta’s value has fallen by $169 billion since April 26, 2021. Similarly, Snap has fallen by $50 billion, Twitter by $26 billion, and Pinterest by $33 billion. For Snap, Twitter, and Pinterest, those losses represent around half of their previous market values, a staggering decline.
Data Privacy
VentureBeat - Despite recent progress, AI-powered chatbots still have a long way to go
“Until models have deeper understanding, they will sometimes contradict themselves. Similarly, our models cannot yet fully understand what is safe or not. And while they build long-term memory, they don’t truly learn from it, meaning they don’t improve on their mistakes,”
Artificial Intelligence
AiThority - Biggest AI and Machine Learning Trends that Will Shift Tech Investments in 2022
In less than 5 years, AI and ML technologies are ruling every aspect of business function, including Marketing and Sales automation, SaaS development, E-commerce, blockchain DevOps, Cloud modernization, Drones and UAVs, and Space tech.
AI/ML
VentureBeat - Microsoft: ‘Dangerous mismatch’ in security due to slow MFA adoption
New statistics released in the report show that just 22% of Azure Active Directory identities utilize “strong” authentication in the form of MFA. The remaining 78% of Azure AD identities require only a username and password to authenticate, Microsoft disclosed.
Privacy & Security
AiThority - Metaverse Trends: Is 2022 the Year of the 3D CMS?
However, probably most tellingly, many business leader’s have realized they knew a lot less about their company and its customers than they thought. There were gaps in data collection, the skills needed to analyze and apply insights, and, critically, the flow of information across a business.
Marketing Tech
Datanami - Alteryx Report Reveals 88 Percent of Orgs Hindered by Legacy Spreadsheets
As businesses strive to move from being data-hoarders to driving real insights by democratizing analytics, the IDC Infobrief, “Data and Analytics in a Digital-First World”, reveals how complexities, constraints, skill gaps, and a lack of analytics automation are hurting productivity.
Data & Analytics
VentureBeat - The state of AI ethics: The principles, the tools, the regulations
“If we try to look for the broadest set of unifying principles, it necessitates that we become more and more abstract. This is useful as a point of discussion and framing conversations at the broadest level, and perhaps guiding research. When it comes to practical implementation, we need a little bit more concreteness,” he said
AI Ethics
ZDNet - Tech salaries, developer skills, cybersecurity, and more: ZDNet's research roundup
The "widespread hunger" for technology professionals might have seen the average salary for technologists hit a record high of $104,566 in 2021, but almost half of tech workers feel they are underpaid. Dice reports that 47.8% of tech workers feel underpaid – a marginal increase of nearly 2% compared to 2020.
Tech Jobs
VentureBeat - Report: 77% of enterprises have adopted multicloud housing
Multicloud’s promises of lowered costs and vendor lock-in elimination are impacting the CDN and cloud hosting markets in particular, with adoption of the three leading providers (Amazon Web Services, Google, and Microsoft Azure) increased by 20% in 2021.
Cloud
ZDNet - Cloud-computing spending just hit another huge milestone
While the metaverse is still being hashed out, Canalys sees use cases for the burgeoning virtual world in gaming, social media, workplace collaboration, education, real estate, ecommerce and digital commerce. Whatever it will become, it's all good news for cloud providers.
Cloud
VentureBeat - Report: 83% of IT leaders say a hybrid multicloud is the ideal operating model
Thirty-six percent of respondents said their clouds are fully interoperable, and a little more than half (56%) reported some level of interoperability between clouds. In addition to cloud interoperability issues, most respondents (80%) agree that moving a workload to a new cloud environment can be costly and time-consuming.
Cloud
eWeek - Best Website Vulnerability Scanners 2022
Vulnerability scanners and website vulnerability scanners are different. A website scanner does a remote scan of a website and often provides a graphic that can be included to show the site has been scanned. Vulnerability scanners, on the other hand, scan the IT network, endpoints, and infrastructure as they look for vulnerabilities
Security
TMCNet - The Payment Revolution: Blockchain Changing the Game
Mordor Intelligence puts a transaction value of the global digital payments market at $5.44 trillion in 2020 and forecast it to climb 11.21% annually to reach $11.29 trillion by 2026. Blockchain technologies also can provide an affordable solution to the 1.7 billion unbanked people in the world that contribute to the roughly $500 billion transferred internationally each year through personal remittances.
Blockchain
VentureBeat - Report: By 2025 carbon emissions of cloud services will be main factor in purchasing
An increasingly important part of said strategies is sustainable business, which is becoming a key tenant of responsible business practices. More than 90% of organizations increased their investments in sustainability programs between 2017 and 2020, according to previous Gartner surveys.
Sustainability
yahoo!Finance - Cybersecurity Report 2021: TXOne Networks Publishes In-Depth Analysis of Vulnerabilities Affecting Industrial Control Systems
 One important observation from the report is that cyber attacks on critical infrastructure can be resisted and made significantly easier to repel by applying the OT zero trust methodology, which includes device inspection, preserving critical applications and services, network segmentation, and virtual patching.
Security
ZDNet - This tech job has just been crowned the best in the country
Glassdoor's 25 Best Jobs List for 2022 found that software developers, data scientists, IT architects and full-stack engineers dominate the top spots when measured by salary, job satisfaction and the number of job openings.
Tech Jobs
Document Analytics Market: Meticulous Research® Reveals Why This Market is Growing at a CAGR of 48.1% to Reach $12.45 billion by 2027
Document analysis identifies and extracts critical information from incoming paper and electronic documents without extensive user interaction. It transforms the time-consuming and error-prone task of manually processing documents across different formats into a fast, effective, and intelligent automated learning workflow.
Data & Analytics
Geektime - The Cloud: 4 business trends from the past year and projections for the next
Cloud providers continue to offer storage and basic computing, but they're opening an entire vault of advanced technological services to businesses across the globe, including abilities that were only available to enterprises before.
Cloud
DEVPRO Journal - Automation and Robotics: The Future of Work Made Possible with Software
Businesses tend to turn to automation to solve a specific problem, for example, moving pallets from a dock or cleaning. They see localized ROI as productivity per employee who used to perform those tasks increases dramatically. But it’s really just the start. Companies need to optimize overall process flow – if there is a bottleneck somewhere else, there is no benefit.
Automation & Productivity
CSO - Outdated IoT healthcare devices pose major security threats 
The report found that IV (intravenous) pumps make up 38% of a hospital’s typical healthcare IoT footprint, and 73% of these pumps have at least one vulnerability that could jeopardize patient safety, data confidentiality or service availability if identified by a bad actor.
Security
TMCNet - AI-Powered Language is Fueling Customer Engagement According to Survey from Persado and Coresight Research
NLG is a key AI-driven technology in creative content generation and was cited by survey respondents as one of the top five most significant ways to leverage AI in digital marketing. Additionally, 78.3% of respondents hold AI accountable for creative development and execution-meaning that marketers can finally track the impact of words and phrases when using AI generated content.
Artificial Intelligence
telecoms - Building the foundation for mobile network data monetisation in the 5G era
Location is one of the most valuable types of network data that is highly coveted by all. It is used by operators internally for geo marketing and commercial purposes, but it is also extremely desirable for external businesses and governmental agencies. Smart cities, for instance, rely on location information to analyse population movement patterns for planning purposes,
5G
Network World - Gartner: Worldwide IT spending to reach $4.5T in 2022
The largest growth segment is enterprise software, which is projected to grow 11% to $672 billion. However, Gartner includes the cloud market in the enterprise software market, and that's where the growth is.
Cloud
Harvard Business School - Where Can Digital Transformation Take You? Insights from 1,700 Leaders
Digital natives in particular expect customer-company interactions, even in business-to-business industries, to be as fast and intuitive as tapping out a text or playing a video game. Not only must a company offer high-quality products or services, but the way they deliver them to the customer matters much more today than in the past.
Digital Transformation
Programming languages: Python dominates, but developers are adding new skills to stand out
While interest in C++ did see a noteworthy rise, Python and Java still dominate O'Reilly's platform usage. O'Reilly says it has seen usage of content about Mozilla-hatched Rust and Google-backed Go "growing rapidly". Both are popular for systems and infrastructure programming
DevOps
ZDNet - One in seven ransomware extortion attempts leak key operational tech records
Mandiant collected samples from victims that leverage operational technologies (OT) for their production. After pouring through the data dumps leaked on the name-and-shame websites, the researchers found everything from network and engineering diagrams to information on partner vendors and operator panels.
Security
eWeek - 7 Digital Transformation Trends Shaping 2022
One aspect of digital transformation that has been accelerated by hyperautomation is the AIOps sector. AIOps solutions can centralize data and leverage algorithms to aggregate and correlate alerts. Essentially, AIOps is the evolution of ITOps and has been at the core of many digital transformations.
Digital Transformation
VentureBeat - Drive smarter decision-making with explainable machine learning
Most importantly? Use your judgment. The great thing about explainable machine learning is that it can be, well, explained. If you don’t get it, it probably won’t drive value for your company.
Machine Learning
ZDNet - Microsoft Teams: Here's what's new in January 2022
The mirror my video feature can be used by educators who are using tools like a whiteboard or a virtual background with text in it. In those cases, the educator sees a text flipped. Now, they can un-mirror the text to see it correctly by going to Device Settings and toggling off Mirror my video.
Automation & Productivity
techopedia - Smart HR: How AI is Transforming Talent Acquisition
For instance, Recruiter.com has identified hybrid or remote work as a top trend for 2022—and with that comes the need for more robust and interactive engagement tools to promote a cohesive and productive culture. A tremendous amount of funding is currently flowing to employee engagement tools for this reason.
Automation & Productivity
Chron - Cyberattacks increasingly hobble pandemic-weary US schools
“It’s very difficult for the school districts to learn from each other, because they’re really not supposed to talk to each other about it because you might share vulnerabilities,” Elder said.
Security
ZDNet - Ransomware: Over half of attacks are targeting these three industries
According to detections by Trellix, banking and finance was the most common target for ransomware during the reporting period, accounting for 22% of detected attacks. That's followed by 20% of attacks targeting the utilities sector and 16% of attacks targeting retailers.
Security
VentureBeat - Report: More than half of execs see digital transformation as critical to business growth for 2022
To deliver on the promises of digital transformation, 35% of CIOs said they will prioritize leveraging infrastructure investments to move from traditional data centers to cloud-based, or leveraging enterprise-wide data and analytics to drive strategic decision-making
Digital Transformation
SDxCentral - AT&T: Security Top Concern as Edge Interest Surges
Early edge applications include loss prevention in retail, video-based quality inspection for manufacturing, telemedicine in health care, and surveillance and electronic voting in the public sector.
Edge Computing
AiThority - Should AI Be Centered on Machine Learning Algorithms or Data?
Selecting the right approach is vital to ensure we are appropriately building AI. Three dimensions should be considered: label noise, actionability, and amount of data.
Artificial Intelligence
TechStartups - How Does Artificial Intelligence Blockchain And Supply Chains Work?
Artificial intelligent blockchains can create new paradigms for global supply chains. On-chain oracles within blockchains provide real-time data for split-second decisions and actions. On-chain oracles prevent issues like trade credit contagion
AI/Blockchain
VentureBeat - Report: 80% of execs say their orgs’ tech needs not met
Most upper management and middle management executives believe that 40% or more of requests to IT are backlogged due to conflicting priorities and constraints. Midsized companies are most likely to find themselves held back by overloaded IT teams, with most of the managers of midsized firms stating 60% or more of their department’s requests to IT remain unfulfilled
IT Management
AiThority - SparkPost Global Survey Reveals 74% of Marketing Leaders Concerned with Impending Privacy Changes
The good news is most leaders recognise the importance of investing in aligning each marketing discipline, shoring up solid data practices, and bolstering their arsenal of branded content and communications channels.
Data Privacy
Network World - Top 10 outages of 2021
The biggest outages of 2021 had one thing in common: they affected major infrastructure or services providers and, as a result, affected large numbers of enterprises and end users. The lesson? Companies need to be careful about putting all their infrastructure eggs in one basket, or, if they must, to prepare for downtime if that particular service goes down.
Network Management
Technotification - Top 5 Cybersecurity Trends for 2022
The public’s patience has run out regarding data breaches and the seeming lack of accountability by businesses. Governments are beginning to respond with legislation that targets company directors, making them financially and legally responsible for data breaches that occur on their watch.
Privacy & Security
The Hill - Why Congress should pass data privacy legislation in 2022
Federal legislation is necessary to prevent the United States from becoming a patchwork of 50 different state laws, which would make enforcement more costly and impose unnecessary barriers to innovation in the digital economy, which runs on personal data.
Data Privacy
Dice - 8 Red Flags in Tech Job Postings You Shouldn’t Ignore
While job postings are meant to provide valuable information about a position and attract culturally compatible candidates, they often contain code words, descriptors or phrases that subtly signal a potentially toxic work environment, a boss with unrealistic expectations, or biased hiring practices.
Tech Jobs
VentureBeat - Report: 62% of orgs use voice technology to increase revenue
To fuel this innovation, 75% of respondents plan to increase their speech technology budget in 2022, and 92% believe this will drive widespread use of voice technology within five years.
Voice Tech
SDxCentral - Cisco: Data Privacy Is Key to Customer Trust
“With 94% of organizations saying they are reporting one or more privacy-related metrics to their board, and privacy investment rising, with an average budget up 13%, there’s no doubt that privacy continues to grow in importance for organizations, regardless of their size or location
Data Privacy
ZDNet - Scammers target us on social media now more than ever
According to the FTC, more than one in four people who lost money to fraud in 2021 said it started on social media in the form of an ad, post, or message. Findings also show that social media was more profitable to scammers last year than any other method of reaching people.
Privacy & Security
IT Business Edge - Why Business Technologists are Becoming Indispensable
Technology has become so sophisticated and ubiquitous that it is nearly impossible for enterprises to be successful without using technology to its full potential. To bridge the gap between business and technology, an enterprise needs the expertise of a business technologist.
IT Management
VentureBeat - The ethics of the metaverse
If we don’t have mental privacy and biological privacy, some of the new technologies could essentially read our minds, model our identity, reach fine-grained and contextually relevant conclusions, and then nudge our behaviors to the point where it undermines our intentional actions, Bye said.
Privacy
Security Boulevard - Best Practices for Application Security in the Cloud
For applications running in public cloud service provider (CSP) environments like Amazon Web Services, Microsoft Azure, and Google Cloud, responsibility for application security starts at the operating system layer. That said, AppSec teams should still factor in the risk of compromise of lower layers of the CSPs’ multi-tenant environment.
Cloud Security
InfoWorld - Slashing time to insight with unified data analytics
One of the greatest advantages of a unified platform is that you no longer have to manage five points of integration. In fact, you no longer even have to move your data in the first place. With unified data analytics, you bring the analytics to the data instead of the other way around.
Data & Analytics
VentureBeat - Report: Cloud adoption grew 25% in the past year
That said, the struggle to automate security was palpable, and no matter the reason an organization moves workloads to the cloud, security remains consistently challenging.
Cloud Security
Talk Business - State of the State 2022: State technology leaders reflect on 2021, look to 2022
“From supply chain to bioinformatics, we are awash in reams of data. Understanding industry needs – all the way to the individual company-level – remains quite challenging,”
IT Management
BMC - 12 Best Practices for Cloud Adoption
Here are 12 top practices you need to incorporate as you begin to use the cloud and make it part of your IT and app dev environments. The most successful organizations in their use of public cloud have all of these practices in place
Cloud
VentureBeat - How data transformed from technical resource to strategic business asset
It’s data, not algorithms, which make Google, Meta, and Amazon the big three in digital advertising. It is also data that made Netflix and Amazon two powerful production companies
Data & Analytics
eWeek - Humans Will Be the Story of AI in 2022: 4 Predictions
As such, automation of tasks with a high degree of variability or contextual nuance will shift toward supplementation. Examples include healthcare practitioners to paralegals to production line engineers. Less context-dependent, invariable and rote tasks will continue to be automated at pace.
Artificial Intelligence
ZDNet - Employers are desperate for data scientists as demand booms
"The number of tasks in our testing catalogue related to Data Science and Python grew in 2021 by 158.33% and 113.33% respectively."
Data & Analytics
Industry Week - The US Digital Skills Shortage Is Worse Than We All Thought
Moreover, almost two-thirds of new U.S. jobs created from 2010 to 2016 were ones requiring medium- to high-levels of digital skills, with those jobs also paying considerably more. In fact, U.S. occupations requiring high levels of digital skills on average pay 2.5 as much as jobs requiring only low levels of digital skills, while medium-level ones earned 1.5 as much.
Tech Jobs
Enterprise Talk - Enterprises Should Ensure Sustainability of AI Initiatives
With so much emphasis on AI and ML technologies in shaping the future, enterprises need to come with strategies to balance the power and potential of AI. In addition, they need to identify ways to maximize the positive outcomes for customers and society at large.
Artificial Intelligence
VentureBeat - How the metaverse will impact governance, privacy, fraud, identity, and more
But to the extent that the metaverse will be a transactional space, governmental regulation will apply whether it’s a walled garden or not, for instance on ecommerce and other internet-based transactions to some extent. You can’t totally escape government regulation.
Emerging Tech
AiThority - ‘Majority of Marketing Departments Rely on Outdated Data and Analytics Practices’ Says Report
Of the almost two-thirds of marketers who believe their company is analytically mature, some 77% have yet to achieve a single unified view of their marketing performance while 68% still depend on spreadsheets for reporting.
Data & Analytics
eWeek - Best Data Modeling Tools and Software for 2022
A data modeling solution is only as good as the data it accommodates. Even the best features are useless if you cannot plug in all essential data and put it to use.
Data & Analytics
ZDNet - Crypto industry status report: A slew of blockchains; smart contracts, DeFi and DAOs on the rise
Svanevik thinks that smart contracts are important for a number of reasons. First, they are unique in that they are autonomous -- they don't need to be invoked. Assuming there are no bugs and vulnerabilities, smart contracts are always up and running. Smart contracts also allow for composability and permissionless innovation:
Blockchain
VentureBeat - The metaverse: Where we are and where we’re headed
It’s clear that there will be a first big wave of innovation over the next 12 to 24 months, where “mixed reality” hardware produces breakthroughs for immersive experiences.
Emerging Tech
Virtualization & Cloud Review - What Cloud-Native Skills Are Most in Demand in 2022?
"Survey respondents are clear about their hiring priority in 2022: focus on the skills needed to enable cloud native. Many companies are setting up cloud competency centers and dedicated cloud teams as they skill up."
Tech Jobs
Tech.co - Over 90 Hacked WordPress Add-Ons Could Give Away Your Website Access
Researchers have found a total of 93 WordPress apps — 40 themes and 53 plugins — have been compromised as part of a large backdoor attack that gives threat-actors full access to the websites those add-ons have been used for.
Security
VentureBeat - Linux vulnerability can be ‘easily exploited’ for local privilege escalation, researchers say
In Unix-like operating systems, polkit (formerly known as PolicyKit) is used to control system-wide privileges. Polkit’s pkexec is a program that enables an authorized user to execute commands as a different user.
Security
EdSurge - What Could Web3 Mean for Education?
Some edtech entrepreneurs are eager for Web3 to arrive and change education. They envision an ecosystem where learners buy access to courses without enrolling in colleges; where teachers profit directly from their teaching; where students track progress on ever-lengthening credential chains; and where people who invest in the right tokens gather in learning groups to explore topics of mutual interest.
EdTech
TMCNET - Qumulo Unveils Top Unstructured Data Storage Predictions for 2022
Over the next year, there will be a greater need for storing file data in reliable namespaces and managing it across multiple repositories - in the cloud or on-prem - with impressive scalability, performance and cost savings.
Data Storage
Harvard Business Review - Can AI Teach Us How to Become More Emotionally Intelligent?
Many professional roles requiring strong communication skills, including leadership, public speaking, product management, virtual therapy, teaching, language learning, and bedside manner will benefit from AI that measures emotional intelligence. Indeed, by 2026, the combined market size for emotion detection and conversational AI are projected to grow to more than $55 billion.
Artificial Intelligence
Fast Company - How Blockchain can become the financial system the world needs
Today, the blockchain user experience is confusing and intimidating, and there are a variety of pitfalls that new users can fall into. Casual users often lose their keys, expose their private keys to hackers, or end up sending tokens to scam projects
Blockchain
AiThority - Predictions Series 2022: 2022 B2B Marketing and Sales Trends to Prepare For
Already, 30 percent of office phone lines will lead to nowhere. Another 25 percent of executives will have switched jobs during 2021, leaving us with 55 percent of our overall data being bad.
Marketing Tech
ZDNet - Staff negligence is now a major reason for insider security incidents
Over the past two years, insider threats have increased "dramatically," the report says, with 56% of insider-related incidents caused by a negligent employee. In total, 26% of incidents were linked to criminal inside activities, whereas 18% of threats were caused by the theft of employee credentials, potentially made possible through failures to manage personal device security or weak password use.  
Security
Digital Information World - We Don't Need More Data - We Need More Contextual Data: Data Enrichment vs Fraud
Several data enrichment tools on the market today are part of a wider suite or platform rather than standalone, albeit still providing similar functionality. This makes practical sense, as data enrichment is largely based on automation and aims to both speed up processes and enable enhanced insights. By integrating it into wider automation solutions, this data is placed within an even larger framework, thus better contextualized.
Data & Analytics
IndustryWired - Top 10 Machine Learning Startups Expected to Excel in 2022
For example, ML can make a predictive analysis app more precise, with the passing time. ML frameworks and models require an amalgamation of data science, engineering, and development skills. This article lists the top 10 machine learning startups that would become big in 2022.
Machine Learning
AiThority - bipp Analytics Unveils Predictions for the Business Intelligence and Data Analytics Industry
But, beyond a slick interface is a need for robust data models that act as enterprise-wide single sources of truth. If you’re not investing time to define a layer that hosts business logic to be explored by the rest of your organization, then self-service BI will do nothing except create an endless series of helpdesk tickets.
Data & Analytics
Seminconductor Engineering - Health Care Is Gold Mine For Hackers
In another case, hackers blocked access to the University of Vermont Medical Center’s data. Employees were unable to retrieve electronic health records (EHRs) and payroll programs. Surgeries had to be rescheduled. Lost revenue was estimated at $50 million.
Privacy & Security
Databricks' TPC-DS benchmark results and the analytics platform wars
Databricks, the champion of data lakehouse technology and its open storage format underpinnings, announced it set a world record for a data warehouse performance benchmark. Was the announcement hyperbole or legitimate vindication for the data lake and lakehouse technology models?
Data & Analytics
inside BigData - Leveraging the Power of Data and Analytics … Yeah, Yeah. A Pragmatic Approach in 5 Steps
This requires FIs to step back and reimagine how they engage with their customers. Not only do they need to understand the rich and robust data sets they already have, and to better orchestrate and analyse the data, but match that data with other, external services and data sources to provide a more rewarding and engaging customer experience.
Data & Analytics
MedCityNews - How payment integrity tools can help payers to tackle fraud, waste and abuse
When reports come in from providers, auditors will study certain portions of the claim (such as medical records) and capture all of the provider’s notes on the backend. From there, the machine starts learning trends in the reports and creating these new ML algorithms, which help identify outliers or mistakes in future claims.
Privacy & Security
yahoo!Finance - Bitcoin stealers: malware that raid crypto wallets
In its latest report it said sophisticated attacks take careful planning and skill to pull off, but through other types of malware, hackers can take a cheaper “spray-and-pray” approach, spamming millions of potential victims and stealing smaller amounts. The malware families sampled received 5,974 transfers from victims in 2021, up from 5,449 in 2020.
Privacy & Security
SiliconANGLE - Predictions 2022: Here’s what will happen in enterprise technology this year 
We’re seeing supercloud evolve, especially in hyperscale ecosystems. In our view, the two biggest things that are new are: 1) The technology is evolving where you’re seeing services truly integrate cross-cloud services; and 2) Digital transformation where a new innovation curve is developing and it’s not just about making your IT better. It’s about making everything software as a service and automating your entire company workflows.
Tech Trends
ZDNet - Tech salaries just hit record highs. But nearly half of IT staff still feel underpaid
The latest Dice Tech Salary Report found that 61% of technologists received a salary increase last year, up from 52% in 2020. Web developers saw the biggest increase in pay, shooting up by more than a fifth (21.3%) to $98,912, while the highest salaries were demanded by IT management, whose pay rose 6% to $151,983 between 2020 and 2021.
Tech Jobs
VentureBeat - How emerging tech will influence freedom, industry, and money in the metaverse
It is not just gaming and entertainment that stands to transform and expand with the onset of the metaverse. Synchrony, a fully functioning economy, and the interoperability of digital assets, information, and consumers means industries like supply chain management, property sales, and even office workflows stand to benefit from developments related to the metaverse
Metaverse
AiThority - 92% of Product Decision Makers Say Data & Analytics Critical to Success of Business
And for a direct tie to the bottom line, 96% note that an increase in average selling prices would be possible with personalized and customized analytics, with 46% noting they could charge 10-19% more for their products and services because of the analytics they provide
Data & Analytics
VentureBeat - Podcast advertising could be a blueprint for cookieless advertising
In order for the data-restricted audio industry to appease both advertisers and audiences, it is crucial, as a publisher, to have a firm comprehension of the industry’s key differentiators, and furthermore, to know how to circumnavigate them as it pertains to advertising.
Marketing Tech
eWeek - What Does 2022 Hold for Intelligent Automation?
The lines between digital process automation (DPA), iPaaS, no code, robotic process automation, and other forms of automation are blurring too. So we will most likely see a future trend toward IA platforms that provide the means to create, manage, and control operations that leverage multi-modal automation across both humans and digital robots.
Automation & Productivity
ZDNet - Cybersecurity: 11 steps to take as threat levels increase
Triggers for heightened risk include a spike in adversary capability from new zero-day flaws in popular software, or something "more specific to a particular organisation, sector or even country, resulting from hacktivism or geopolitical tensions," says the NCSC.
Security
SDxCentral - Will Google Debut 800G Data Center Switches in 2022?
“While the 200 and 400 Gb/s adoption at Google and Amazon mostly benefited the white box switch vendors, the accelerated 200 and 400 Gb/s deployment at Microsoft and Meta will benefit certain branded vendors such as Arista and Cisco,”
Cloud
Forbes - Cybersecurity in 2022 – A Fresh Look at Some Very Alarming Stats
“among the findings of a new study of pentesting projects from Positive Technologies, conducted among financial organizations, fuel and energy organizations, government bodies, industrial businesses, IT companies and other sectors. In 93 percent of cases, an external attacker can breach an organization's network perimeter and gain access to local network resources.”
Security
ZDNet - The never-ending effort to bake common business sense into artificial intelligence
Scarano poo-poos the notion that AI systems comprise anything close to a "digital workforce," noting that "it's just a way to sell more stuff. I can sell 50 digital workers rather than one system. But digital workforce is just a bunch of code that does a specific task, and that task can be repeatable, or be customized."
Artificial Intellgence
eWeek - An Overlooked Cybersecurity Threat: 5G
Establishing the types of data being handled and where that data resides, whether within on-premise devices, cloud providers, or remote employee laptops provides a key baseline to data risk awareness.
Security
VentureBeat - 3 ‘dark’ trends likely to power smart technology and communities by 2030
In 2030, p2p-based distributed apps could transform public transportation, access to fresh food, healthcare, energy, elder-care, journalism, policing, and beyond. Wise leaders will recognize the value of smart communities and build into the trend
Smart Tech
Digital Journal - Email Marketing Platforms Market May See a Big Move | Major Giants MailChimp, VerticalResponse, Emma, Constant Contact 
The market report primarily will help you to realize and find out the most forbidding and upsetting driving powers of Email Marketing Platforms in marketplace with anticipating the consequences on the worldwide industry
Marketing Tech
Dark Reading - IT Leaders Consider Security Tech a Part of Business Transformation
While the respondents list the usual suspects – big data/analytics, AI/machine learning, and cloud infrastructure – in the top 3, 19% say identity and access management has the most potential to significantly impact business operations.
IT Management
VentureBeat - The Log4Shell vulnerability: A postmortem
Log4j2 is ubiquitous among applications and the libraries on which they depend, meaning that many applications were utilizing Log4j2 without realizing it. Even applications not written in Java often are hosted in web containers, meaning that a project can have no apparent dependency on Log4j2 and still be exposed.
Security
Computerworld - Talent war to push CIOs toward consultancies, managed services in '22
“In order to maximize productivity of their existing IT staff, CIOs will be outsourcing more to free up time, training existing staff in the desired skills and hiring consultants to fulfill critical skilled roles. This will last at least through 2022.”
IT Management
Virtualization & Cloud Review - Networking/Security Convergence with SASE Marked in New Report
"Global organizations recognize [SASE] is the future, but not all are sure how to get there. Implementation timelines, the decision maker's role and the approach to SASE vary by company size and region, but all organizations share the top two concerns: complexity of management and high implementation costs,"
Network Security
TMCNET - Digital Twin Market Size is Projected To Reach USD 5545.2 Million By 2028 At A Cagr of 15.9%- Valuates Reports
The digital twin market is likely to grow as the focus on Industry 4.0 grows. Digital Twin enables a more virtual system-based design process, allowing any equipment or system to play a much more active part.
Digitial Twin
GeekWire - FastForward 2022 – Five mega-trends that will shape the payments industry in the coming year
These as-a-service models are not only high-performing – growing 5 – 8x faster than their traditional counterparts according to Zuora’s Subscription Economy Index – but also lays the foundation for companies to pivot to ecosystem as these different as-a-service models are connected together onto a single platform
FinTech
Forbes - Six Steps To Execute Responsible AI In The Enterprise
The EU AI Act is expected to be implemented by 2023, and it will change how businesses develop and utilize AI. Any business that offers an AI application to EU citizens or organizations will need to ensure its applications are aligned with EU Charter of Rights and other various laws, including ones in relation to discrimination and privacy. These applications will have to abide by the framework of "trustworthy AI" set forth by the act.
Artificial Intelligence
AiThority - Anti-Fraud Analytics Booms as Cyber War Rages
“Predictive modeling is up 25%. Text mining has nearly doubled, jumping from 33% to 65% in three years. These findings prove that, even as COVID has fueled rampant fraud, insurers are agilely stretching their advanced analytics and AI capabilities to counter rapidly changing threats.”
Data & Analytics
cointelegraph - Scaling and the Metaverse: The beginning of Web3
The support behind the decentralized value advocated by Web3 is a decentralized technology stack, the development of which is accompanied by scalability and security issues that are becoming crucial to solve.
Web3
Digital Information World - High Expectations from Marketing Technologies as we hit 2022
We went around to figure out what is the most significant thing for any company with respect to marketing. Most of the answers were about privacy, which was followed by AI, Metaverse, web3, and ESG.
Marketing Tech
Digital Journal - Cyber Insurance Market to Witness Impressive Growth by 2026 | Lloyds, AON, XL Group
This growth is primarily driven by Increasing Stringency of Government Regulations and Growing Cyber Threats, Demand for Integrated Cyber Solutions and Rising Severity of Cyber-Crimes, The Popularity of Cloud Security, Rapid Adoption of Cloud Computing, Data Center, and Wireless Communication.Security
Cyber Defense Magazine - OT/IT Security – Two Sides of the Same Coin
The industry is already embracing a more integrated approach to IT/OT security, with Gartner projecting “by 2025, 75 percent of OT security solutions will be delivered via multifunction platforms interoperable with IT security solutions.” Gartner further notes that “brownfield operational technology/information technology convergence acceleration and a growing number of greenfield cyber-physical systems push OT security needs to evolve, and more IT security leaders to become involved, as threats and vulnerabilities increase.”
Security
Martechvibe - Top Data Privacy Experts
In the cookieless world, with the General Data Privacy Regulation (GDPR) and the California Consumer Privacy Act (CCPA) holding strong, keeping up with new data privacy trends and measures will become inevitable for businesses, across industry.
Privacy
Datanami - Sisense Releases New Study: ‘The Business Intelligence Landscape’
And for a direct tie to the bottom line, 96% note that an increase in average selling prices would be possible with personalized and customized analytics, with 46% noting they could charge 10-19% more for their products and services because of the analytics they provide.
Data & Analytics
VentureBeat - Zero-trust trends for 2022
Insurance, financial services, and manufacturing CISOs told VentureBeat that creating a business case for zero trust made them realize how limited their visibility and control over endpoints are. CISOs and their teams find endpoints overcrowded with software agents, leaving them more vulnerable than before.
Security
Computerworld - Video vs. VR: What’s missing for successful collaboration? 
Being able to tell whether you are losing your audience, preloading the system so it can respond to questions, and providing a report at the end of a meeting to show engagement (and assure attendees leave satisfied) should be a higher priority than it is. Thankfully, options to do all of these are coming.
Automation & Productivity
Harvard Business Review - Research: Why Employees Violate Cybersecurity Policies
We found that across our sample, adherence to security conventions was intermittent. During the 10 workdays we studied, 67% of the participants reported failing to fully adhere to cybersecurity policies at least once, with an average failure-to-comply rate of once out of every 20 job tasks
Privacy & Security
Virtualization & Cloud Review - Zero Trust Study Shows Gaps Remain
Along with implementation gaps, enterprises report several challenges in building a Zero Trust strategy, starting with a lack of qualified vendors with a complete solution.
Security
Enterprise Talk - Cloud Trends to Look Out For In 2022
Analysts estimate only 15% of IT spend is in the cloud, but 90% of businesses have implemented cloud systems. The mismatch highlights how much room there is for growth, especially around core app modernization.
Cloud
Forbes - Five Fraud And Security Predictions For 2022
Credential stuffing, whereby attackers use automation to try different usernames and passwords at scale in order to break into accounts, saw massive increases in 2021. Expect that to continue. The Arkose Labs network detected a 98% increase in credential stuffing attacks over the past 12 months
Privacy & Security
The Fast Mode - Cato Networks' Survey Finds Gaps in Different SASE Approaches
Despite SASE being touted as the solution for security and network performance, respondent scores differed little between those who have and have not deployed SASE. For example, when asked how they react to performance issues with cloud applications, 67% of SASE users and 61% of non-SASE users claimed they would add bandwidth while 19% of SASE users and 21% of non-SASE users would purchase WAN optimization appliances.
IT Management
Data Center Dynamics - Concerns over cloud concentration risk grow
Our research shows that cloud providers have high levels of reliability, but they are not immune to failure. Complex backup regimes and availability zones, supported by load and traffic management, improve the resiliency and responsiveness of cloud providers, but they also come with their own problems.
Cloud
Inside Bitcoins - Chainalysis exposes simple malware stealing millions in crypto
The Chainalysis report looked into different malware, including information stealers, clippers, cryptojackers and trojans. These types of malware are cheap to acquire, and they can even be deployed by “low-skilled cybercriminals.
Security
yahoo!Finance - Time & Attendance Software Market to Reach $5.31 Bn, Globally, by 2030 at 9.4% CAGR: Allied Market Research
On the basis of component, the software segment held the major share in 2020, garnering nearly two-thirds of the global time & attendance software market. This is attributed to the factors such as need for automated system for optimizing and tracking the number of work hours of an employee, rising shift toward cloud based time and attendance software among the SMEs, and growing emphasis on workforce optimization as well as mobile applications
Automation & Productivity
Making Central Bank Digital Currencies bulletproof with business process intelligence
Business process intelligence provides end-to-end capabilities for strategic process transformation and the reinvention of customer experiences. Essentially, when it comes to CBDCs, the implementation of BPI would allow the analysis of each of the process gaps (scalability, security, regulatory requirements) based on real-time data.
Data & Analytics
Onapsis - The Elephant Beetle in the Room: Older, Unpatched SAP Vulnerabilities Are Still A Threat
The Onapsis Research Labs’ very own threat research found evidence of hundreds of hands-on-keyboard sessions targeting vulnerable SAP systems, including examples of threat actors living off the land, chaining multiple vulnerabilities together, and even applying patches, post-exploitation, to cover their tracks.
Security
TechBullion - Security predictions – Will this be the year trust dies?
Between remote working and the Internet of Things, edge computing is an area in rapid development. That means edge security will need an accordingly high degree of attention in 2022 – especially given the inherent risks. IoT devices are notoriously vulnerable (thanks to providers that may not have much experience with cybersecurity, and to supply chain issues), as is the home office environment.
Security
TMCNET - Cisco's Kenna Security Research Shows the Relative Likelihood of An Organization Being Exploited
The research conducted by Kenna Security, now part of Cisco and a market-leader in risk-based vulnerability management, and the Cyentia Institute, shows that properly prioritizing vulnerabilities to fix is more effective than increasing an organizations' capacity to patch them, but having both can achieve a 29 times reduction in an organizations' measured exploitability.
Security
TechRepublic - Deloitte: What to expect with cloud computing, the supply chain and sustainability for 2022
Deloitte found in the report that many industries are shifting to a service-based IT process via the cloud with some utilizing a hybrid-, multicloud focus to optimize important aspects of a business, like costs and optimizing organizational structure and compliance
Tech Trends
RTInsights - Flexibility and Scale Foremost in Cloud SIEM
The survey found a sharp increase in those using managed services—25% of respondents as opposed to just 6% from the 2020 survey. Cloud SIEM creates a highly accessible and flexible set of services to meet clients where they are while ensuring that security operations remain at peak proficiency.
Cloud Security
Slator - For Dataset Creation, Humans Should Evaluate Machine Text — New Research
The researchers believe their new system “brings together the generative strength of language models and the evaluative strength of humans” — perhaps in a way reminiscent of recent trends observed in MT, in which an MT model tackles the source text in a first round of translation and human linguists then refine the output via post-editing.
NLP
Forbes - Cybersecurity Trends To Watch Out For In 2022
As software has not adequately stopped hackers, perhaps the leading trend to watch in 2022 is a shift away from legacy applications and toward a more holistic and comprehensive security network that prioritizes hardware as the cornerstone of anticybercrime action.
Security
Intelligent CISO - Editor’s Question: How much of a concern is protecting critical infrastructure and how should organisations go about doing this pragmatically?
“The vulnerability of critical infrastructure is well known. Its operational networks have traditionally been unreachable – or air-gapped – from IT users and the outside Internet, meaning security is not top of mind within their design. However, the proliferation of Digital Transformation and automated processes mean they can now easily be accessed by remote users and applications directly through Wi-Fi, cellular or local area networks."
Security
SDxCentral - Op-Ed: Mid-Band 5G Meets American Incompetence
Even more frustrating is the lack of seriousness given to this matter in the years leading up to, throughout, and the year following the FCC’s auction of C-band spectrum. The FAA didn’t even start cataloging and requesting tests of the altimeters used by aircraft around the country until the C-band was supposed to be ready and clear for Verizon and AT&T to activate 5G service.
5G
VentureBeat - 5 ways AI and ML will improve cybersecurity in 2022
Using AI and ML to lure attackers into simulated environments to analyze their attack strategies, components, and code needs to start at the transaction level. Transaction fraud detection is one of five core areas where AI and ML can improve cybersecurity this yea
Security
AiThority - Cynerio Research Finds Critical Medical Device Risks Continue to Threaten Hospital Security and Patient Safety
Data shows that 53% of connected medical devices and other IoT devices in hospitals have a known critical vulnerability. Additionally, a third of bedside healthcare IoT devices – which patients most depend on for optimal health outcomes – have an identified critical risk.
Security
Diginomica - Manage permissions to keep applications safe and secure in the cloud
Yet, when set up properly, no application environment can be made safer than that of a public cloud provider. Often, when there is a security breach such as these, the problem was improper use of credentials — an employee had more access than they needed to do their job, an overzealous engineer took advantage of their access to scrape customer data, a file was accidentally exposed publicly.
Cloud Security
VentureBeat - Tips and guidelines for making software applications GDPR compliant
Developing GDPR-compliant software app can be a challenging task, particularly when it comes to implementing necessary data protection measures at every stage of SDLC that involves processing users’ personal data
Data Privacy
KPMG - Predictions for 2022 — a world of change, creative criminality and cyber security community
The Digital Operational Resilience Act and Network Information Systems Directive version two will hit the streets in Europe as regulators focus on the resilience of a very different world of digital infrastructure — and the systemic risks that come with that dependency. We will also see digital infrastructure fail in surprising ways, exposing links and connections between systems we didn’t know existed.
Security
TMCNET - To Err Is Human, and That's What Hackers Are Counting On
In just the past year, 36% of companies suffered a serious cloud security leak or breach due to cloud misconfiguration, according to The State of Cloud Security 2021 Report. Gartner expects that through 2023, at least 99% of cloud security failures will be the customer's fault, mainly in the form of cloud resource misconfiguration
Security
ZDNet - Automation could make 12 million jobs redundant. Here's who's most at risk
The tech analyst's latest Future of Jobs Forecast estimates that as many as 12 million jobs could be lost to automation across Europe by 2040, primarily impacting workers in industries such as retail, food services, and leisure and hospitality.
Automation & Productivity
Digital Journal - Employee Surveillance and Monitoring Software Market is Booming Worldwide | Teramind, Microsoft, Hubstaff
Further, its time tracking feature allows employers to gain insight into time spent on each project, client, or task and allocate tasks based on priority. The high growth of mobile applications for employee monitoring due to the increased adoption of mobile devices will create significant opportunities for the market.
Automation & Productivity
American City & County - Data protection, cloud advancement and containerization: 2022 state and local priorities
However, a new focus will be on modernization, including moving systems to the cloud, utilizing containerization and understanding how to sustain technology systems for years to come.
Cloud
VentureBeat - Report: U.S. is top target of phishing attacks worldwide
The Jan. 19 report from Outseer also found that the U.S. was the top hosting country for phishing attacks, accounting for 73% of internet service providers hosting these types of attacks.
Privacy & Security
TechTarget - 3 areas privacy and cybersecurity teams should collaborate
Given this common focus, leaders and practitioners of cybersecurity and privacy programs have a tremendous opportunity to work together. Let's look at three different ways: building a shared data inventory, collaborating on compliance and cross-populating steering committees.
Privacy & Security
VentureBeat - Report: 92% of IT decision-makers think process automation is ‘vital’
However, the survey also shows the fact that organizations continue to face challenges in their efforts to leverage process automation to its full potential. Just 12% of respondents say they’ve been implementing process automation as planned this year, citing a reliance on outmoded technology, lack of knowledge of how to get started, and confusion over industry terms such as hyperautomation and robotic process automation (RPA).
Automation & Productivity
The European Sting - The world is drowning in data. Why don’t we trade it like on a stock exchange?
The digital revolution is flooding the world with data. By 2025, an astounding 175 zettabytes – that’s 175 trillion gigabytes – of new data is expected to be generated annually, a fivefold increase on 2018. Much of that data will end up sitting idle on servers and hard drives –unused, unanalyzed, and, perhaps worst of all, unshared.
Data & Analytics
RS21 - 3 Trends to Improve Diversity, Equity, and Inclusion in Tech
With that in mind, here’s a look at three trends, led by nonprofits, for improving tech equity: (1) closing the tech talent gap; (2) mitigating bias; and (3) building professional networks.
Tech Trends
Industry Wired - How AI is Transforming Businesses? Top Use Of AI in Business
AI helps businesses to decide what to write about, which keywords to use, how often to publish, etc. In other words, AI can help to create high-quality and high-ranking content
Artificial Intelligence
Tom's Guide - What is C-Band 5G and why is it so controversial?
Even now, with the launch of C-Band-based 5G imminent, AT&T and Verizon have both agreed to dial back their launches by not activating the new service on towers near select airports. Even so, it's an issue dividing wireless carriers and airlines, even pitting government agencies against one another.
5G
Embedded - Trends driving the future of high-performance computing (HPC)
The amount of data that will be processed next year will increase exponentially, and so will the value and sensitivity of that data. Making sure that security is an essential component (rather than an afterthought) when designing for HPC components will be one of the top design challenges that engineers will face this year and every year moving forward.
Automation & Productivity
CSO - How to Best Protect Multi-cloud and Hybrid Environments
This inconsistency is impossible to avoid. Security controls (WAF, DDoS, bot management, API protection, etc.) are unique to each environment. So as customers attempt to reduce risk, improve performance, or gain specific features by spreading their workloads across multiple clouds, they’ll inevitably end up with multiple security solutions, increasing the likelihood of misconfiguration and mismanagement — a leading cause of compromised data
Cloud Security
Science Daily - Edge processing research takes discovery closer to use in artificial intelligence networks
This is an important step towards using thin-film transistors as artificial intelligence hardware and moves edge computing forward, with the prospect of reducing power needs and improving efficiency, rather than relying solely on computer chips.
Artificial Intelligence
Analytics Insight -Which Is More Appropriate For You: Data Scientist, Data Analyst or Data Engineer?
On the backend, the data engineer is always improving analytics solutions to guarantee that the data the company relies on is accurate and readily available. They’ll use a variety of technologies to guarantee that the data is managed appropriately and that the relevant information is available to anybody who needs it. A good data engineer saves the rest of the company a lot of time and effort.
Data & Analytics
HERE360 - Is 2022 the year urban mobility takes flight?
As we entered 2022, Chinese search provider Baidu launched XiRang, an app that gives access to a "Creator City" that contains visitor attractions and buildings that can host meetings and events. Baidu's CEO Robin Li says the metaverse will kick off a “golden era of AI over the next ten years" and the start of “man-computer symbiosis." It looks like virtual meetings could become more intriguing in 2022 and beyond.Smart Cities
Tech Xplore - Artificial intelligence can discriminate on the basis of race and gender, and also age
AI is often assumed to be more objective than humans. In reality, however, AI algorithms make decisions based on human-annotated data, which can be biased and exclusionary. Current research on bias in AI focuses mainly on gender and race. But what about age-related bias—can AI be ageist?
Artificial Intelligence
AiThority - Zylo’s SaaS Management Index Reveals Organizations Only Utilize 60% of SaaS Licenses, Leaving 40% Unused
Ownership of SaaS is shifting. IT teams are directly managing less of an organization’s SaaS – just 23% of the average company’s SaaS portfolio – a 35% reduction from last year – while business units are managing more.
IT Management
Cox Business - 9 Top Technology Trends for CIOs and IT Leaders to Consider to Future-proof Their Business
Gartner forecasts that “cloud-native platforms (CNPs) will serve as the foundation for more than 95% of new digital initiatives by 2025 — up from less than 40% in 2021.” Leaders at organizations that aren’t as far in their digital efforts as others will need to complete an assessment, prioritize cloud environments, and decide where to start.IT Management
Developer - Why empowering ‘knowledge workers’ is critical to business success
Give in-the-field workers mobile devices, so they can access critical information without returning to a desktop computer. Move company-wide applications to the cloud so workers can access them from anywhere. Embed existing business applications with insights from data, so professionals can make smarter decisions without turning to additional dashboards and data portals.
Automation & Productivity
SiliconANGLE - Gartner says tech spending to grow 5% to $4.5 trillion in 2022 
Through 2025, Gartner believes most companies will increase their reliance on external consultants amid greater urgency and an accelerated pace of change that widens the gap between their digital business ambitions and their internal capabilities.
IT Management
VentureBeat - 5 considerations for saving more and wasting less on cloud services
There are close to 100,000 EC2 instance types that can be used to host your application, and for each of those there are over 36 different commitment types that can be applied to them. That’s just in EC2 alone (not to mention other hosting options like serverless). Now imagine adding other managed services from AWS, and from other cloud providers such as GCP and Azure, with their own unique options and commitment structures.
Cloud
Bloomberg - Five Reasons Microsoft Is Making Activision Blizzard Its Biggest Deal Ever
Nadella’s corporate strategy has been coalescing around cloud, content and creators. Microsoft wants to get as much of Activision’s past and future content onto its cloud gaming service, Xbox Game Pass, which has been bolstering the software maker’s sales with a steady stream of subscription revenue.
Gaming
The Verge - A new use for AI: summarizing scientific research for seven-year-olds
But the deployment of these AI-language systems is controversial. Time and time again, it’s been shown that these tools encode and amplify harmful language based on their training data (which is usually just vast volumes of text scraped off the internet)
Artificial Intelligence
Manufacturing Global - Top 10 blockchain companies
Getting a blockchain headache? Here's our top 10 blockchain businesses to support your business
Blockchain
VentureBeat - Report: How AI and ML optimize the diagnosis process in health care
For example, ML helps oncologists not only pinpoint the location of a tumor, but can also accurately determine if it’s malignant or benign in milliseconds. Although computer-based predictions aren’t error-free, new research has indicated that its accuracy of classification hovers around 88%.
AI/ML
TechRepublic - 5 tools helping companies more effectively manage cybersecurity in 2022
Cybercrime is on the rise, with no signs of slowing down. Recent findings show a 358% increase in malware activity. Further, each day, the AV-TEST Institute registers over 450,000 new malicious programs and potentially unwanted applications, with new malware cropping up at an alarming rate
Security
ZDNet - The future of money: Where blockchain and cryptocurrency will take us next
The first thing to remember: Bitcoin and blockchain are not synonymous. Blockchain -- often defined as a shared, immutable ledger that securely links blocks of encrypted data transactions in a network -- is the medium for recording and storing Bitcoin transactions. Bitcoin operates on its own blockchain network.
Blockchain
AiThority - Oosto Open Letter To The White House “Facial Biometrics Regulations Will Enable A Safe Path For Organizations To Ethically Adopt These Emerging Technologies”
The White House OSTP is seeking input on any “past deployments, proposals, pilots or trials,” as well as any “current use of biometric technologies for…identity verification, identification of individuals, and inference of attributes including individual mental and emotional states,” according to the RFI.
Facial Recognition
DevPro Journal - Why Businesses Are Transitioning to Multicloud Strategies
The more of these services that a user consumes from a provider, the greater the lock-in to that vendor and the more difficult portability becomes. Regardless, the concept of vendor neutrality influences many multicloud strategies.
Cloud
Datanami - New Study Reveals 78 Percent of Companies Cite AI as a Key Revenue Driver in 2022
Three-quarters of respondents (75%) say improving access to deep learning is important for innovation within their industry. Organizations are exploring deep learning applications with natural language processing (NLP) (81%), computer vision (61%) and recommendation algorithms (55%).
Artificial Intelligence
Inside Big Data - How AI and ML technologies are Streamlining Language Creation and Impacting the Global Economy
There are some AI and ML driven ASR platforms available that combine speech recognition and authentication capabilities (i.e., voice biometrics) to amplify the speed and effectiveness of voice-enabled services. This type of technology can understand what your users are saying as well as identify and authenticate who is speaking.
Automation & Productivity
Bitcoin Magazine - Opinion: What The World Learned About Bitcoin in 2021
Tech products — software — must constantly change, update and upgrade to keep up with competition. Bitcoin is not typical software. Rather, it is something new: permaware. Permaware is a set of unchanging rules, written in code. It is designed for reliability and consistency, not features.
Emerging Tech
Blocks & Files - Spin orbits could make better MRAM
Magneto-Resistive Random Access Memory (MRAM) has so far generally failed to replace SRAM because its Spin Transfer Torque (STT-MRAM) implementation is too slow and doesn’t last long enough. A new variant — Spin Orbit Transfer MRAM (SOT-MRAM) — promises to be faster, have a longer life and use less power.
Data Storage
The Tech Report - Security Technology: Rising to the Cyber-Challenge
Privacy-enhancing computation is a developing body of encryption, data obfuscation, and privacy technologies. It’s aimed at securing data as it’s crunched. In addition, its design allows it to deal with particularly difficult scenarios. It tackles the times such as when there is data sharing across geographic boundaries, brand lines, or corporate divisions.
Privacy & Security
Information Age - Is AI superintelligence a threat to humanity?
“My concern, and what's the worst that could happen, is that long-term challenge about an artificial intelligence that does outstrip us; presumably at that point, overcoming the sorts of biases, but potentially creating much more catastrophic risks for the species,” he says.
Artificial Intelligence
T_HQ - Deny-by-default stops cyber threats from the get-go
Whitelisting is when only those in the approved list are allowed access to the system, and is the ultimate version of zero trust. Any and everything not on the whitelist is automatically blocked. ThreatLocker is like a bouncer; it won’t allow entry if not on the whitelist regardless of the entity’s friend or foe status.
Security
ComputerWorld - UK government ignites debate over privacy vs. safety
The report also explains that the UK government doesn’t seem to want to address the privacy-versus-security debate. Instead, it simply seeks to inflame reaction with an emotive campaign that raises public support for such a move while utterly ignoring the multitude of arguments against it.
Privacy & Security
Threatpost - Organizations Face a ‘Losing Battle’ Against Vulnerabilities
Cross-site scripting (XSS), an exploit where the attacker injects code into a legitimate website that will execute when the victim loads the website, was the most commonly identified vulnerability type last year, according to the report.
Security
VentureBeat - 4 emerging trends point to changes in the observability landscape in 2022
According to a recent report from New Relic, 90% of IT leaders and engineers claim that observability is critical to the success of their business, with 94% stating that it’s critical to their role
Data & Analytics
SiliconANGLE - Cybersecurity, blockchain and NFTs meet the metaverse
"Really one of the biggest things that organizations face is being able to have engineers that are qualified and technical enough to be able to support the complexity of the architecture. Deploying tools effectively is a good thing. But if it’s not tuned properly or if it’s not connected properly, that security tool can just add more attack vectors."
Emerging Tech
SDxCentral - Nutanix Report: 64% of Orgs Will Adopt Multi-Cloud Within 3 Years
Despite more organizations moving toward multi-cloud, challenges remain in navigating the environment. Managing security, data integration, and cost across cloud borders were among the top multi-cloud challenges cited by respondents.
Cloud
VentureBeat - New startup shows how emotion-detecting AI is intrinsically problematic
It’s not just startups that are investing in emotion AI. In 2016, Apple acquired Emotient, a San Diego firm working on AI algorithms that analyze facial expressions. Amazon’s Alexa apologizes and asks for clarification when it detects frustration in a user’s voice.
Artificial Intelligence
Network World - Zero Trust is hard but worth it
I asked my contact how many applications an average worker could access, and the company wasn’t able to get the answer. How, then, could the company know if the worker, or someone working through the worker’s laptop, was stealing data or contaminating operations?
Security
AiThority - Gaming Predictions Series 2022: Welcome Metaverse. NFTs Will Get Hyped in Gaming
The metaverse has not unseated Al and blockchain – rather, it’s an emerging technology that CEOs will need to pay attention to. Whereas five years ago CEOs did not necessarily know how they were going to integrate AI or blockchain into their businesses, there are now much more specific real-world examples of how they can do so. Now is the time for CEOs to be thinking about the metaverse in that same way – what applications will it have for their business in the future?
Emerging Tech
Blocks & Files - Hyve: busy hyperscaler bees buy hardware, not software
“The way edge computing changes storage requirements is that hotswap of SSDs has come back. Hotswap — or at least easy field servicing — has come back as a definite requirement.” Shenoy thinks that “Edge computing driving different form factors of servers is a given.”
Data Storage
ZDNet - The tech jobs boom is beginning to cool. And employers are changing their hiring tactics
This might suggest that the boom in demand for tech workers prompted by the pandemic is beginning to wane, with KPMG and REC finding that businesses are focusing their efforts on "hiring smarter, not faster".
Tech Jobs
VentureBeat - Device42 aims to identify Log4j vulnerabilities
The Log4j vulnerability has been assessed as a critical threat, or a 10, on the Common Vulnerability Scoring System (CVSS) by the National Vulnerability Database (NVD). CVSS is an open framework for communicating the characteristics and severity of software vulnerabilities.
Security
SiliconANGLE - What to do in ’22: six cloud trends for the year ahead 
Cloud services are not commodities; your multicloud architecture must capture the unique strengths of each provider. You don’t want to end up with least-common-denominator functionality across clouds. And you can’t expect any one tool to provide seamless governance, monitoring, asset tracking and security across clouds.
Cloud
VentureBeat - Data users demand simple actionable insights quickly 
These are exciting times for us data professionals. Unfortunately, I fear we are getting caught up in the tools hype. We are continuing to push more and more numbers, charts, and tables to our users. That is precisely the problem. We are not offering directions on what to do. Per Dell’s study, “Data overload has become a significant barrier to transformation”.
Data & Analytics
ZDNet - DHL, Microsoft, WhatsApp top phishing list of most imitated brands
The rest of the list includes LinkedIn, Amazon, FedEx, Roblox, PayPal and Apple. Omer Dembinsky, data research group manager at Check Point Software, said it is important to remember that cybercriminals are opportunists and will often take advantage of consumer trends by imitating popular brands.
Privacy & Security
eWeek - BI Tools 2022: Best Business Intelligence Software
Today’s systems span clouds and tap on-premises data sources, and work alongside data mining tools. They also rely on APIs to extend analytics capabilities across business partners and supply chains. Some platforms are also designed to pull data from edge computing deployments, and many platforms also include open-source tools and components that make them more flexible and adaptable.
Data & Analytics
ComputerWorld - 20 years after Gates’ call for trustworthy computing, we’re still not there
But for businesses, this month’s updates deliver a confusing and murky story. Microsoft has not exactly been a good trustworthy computing partner this month. Rather taking the past two decades to develop  bullet-proof, resilient systems, we get servers going into boot loops and admins having to boot into DOS  mode and run commands to uninstall updates.
Security
Security Intelligence - Everything You Need To Know About Ransomware Attacks and Gangs In 2022
These ransomware kits are sold on the dark web as a service, much like the Software-as-a-Service (SaaS) model. Ransomware-as-a-Service kits provide criminals the opportunity to launch ransomware attacks with minimal technical knowledge. No malware creation skills? No problem.
Security
ComputerWorld - In IT, Boomers are out, raises are rising — and change is coming
Another trend Gartner has tracked involves CIOs and other high-level IT leaders moving out of data center-specific roles and into larger business-centric job titles as the result of digital transformation (DX) initiatives.
Tech Jobs
Forbes - The High-Stakes Game Of Public Sector Cybersecurity
Modernizing IT platforms is a major priority for governments—cited as one of the main steps being taken to improve citizen and employee experiences (53%) and to make operations more resilient (48%), according to research from ThoughtLab, commissioned by ServiceNow.
Security
TMCNET - Global Data Governance Market Report 2022: Market to Reach $6 Billion by 2026 - Data Governance to Play a Pivotal Role Buoyed by Machine Learning and AI
The deluge of data from various sources and the valuable insights than can be gleaned from such data is pushing businesses to opt for advanced IT systems, which is driving the demand for data governance solutions. In addition, risk management and regulatory compliance are also driving the growth of data governance solutions.
Data Governance
yahoo!Finance - Global Artificial Intelligence (AI) in Call Centers Market to Reach US$3.5 Billion by the Year 2026
Developed markets of North America and Europe are the leading regional markets. The dominant share of the US is mainly attributed to the widespread adoption of AI technology in several end-use industries including media, e-commerce and manufacturing.
Artificial Intelligence
VentureBeat - Responsible AI will give you a competitive advantage
Without responsible AI practices in place, a company is exposed to serious financial, reputational, and  legal risks. On the positive side, responsible AI practices are becoming prerequisites to even bidding on certain contracts, especially when governments are involved; a well-executed strategy will greatly help in winning those bids.
Artificial Intelligence
eWeek - What Is Data Visualization? Benefits, Types & Best Practices
Datasets are growing fast. Forget data analytics – business leaders are struggling just to visualize and map out data to begin with. Data visualization works to fix this.
Data & Analytics
World Economic Forum - Can China and Europe find common ground on AI ethics?
 A shared realisation about their societal implications has raised awareness about the necessity to develop an international framework for the governance of AI, more than 160 documents aim to contribute by proposing ethical principles and guidelines.
Artificial Intelligence
VentureBeat - What to expect for data prep and data analytics in 2022 
In fact, researchers estimate that the Data Preparation Tools Market size will grow at a CAGR of over 20% to reach a total value of $13.15 billion by 2028, with organizations having a range of accessible data analytics providers to choose from, such as Alteryx, IBM Watson Studio, TIMi Suite, and Incorta.
Data & Analytics
TMCNET - Artificial Intelligence Platforms Market to grow by USD 17.29 bn | Evolving Opportunities with Alphabet Inc., Amazon.com Inc. & Microsoft Corp. | 17000+ Technavio Reports
The key factor driving growth in the artificial intelligence platforms market is the rise in demand for AI-based solutions. With the increasing application of robotics in repetitive and risky tasks, end-users are increasingly seeking avenues to eliminate the drawbacks of industrial automation and robotic technologies.
Artificial Intelligence
AiThority - Adopting a Search-First Mindset for Digital Marketing Success
But according to Hubspot research, 75% of people who carry out Google searches never reach the second results page. Ensuring your website is optimized to rank at the top of search engine results is an essential step for growth and, as such, should be a prioritized endeavor for all manner of businesses. 
Marketing Tech
VentureBeat - A deep dive into the visual collaboration market
The market includes a mixture of cloud and web-based collaboration tools, from online collaboration whiteboard tools like Miro, Mural, and Stormboard to visual management systems like iObeya.
Automation & Productivity
The Verge - Why you might want a secure file-sharing service now that you’re working from home
Instead, you should consider an enterprise-grade cloud-based file-sharing service, one that adds more layers of protection by encrypting your data, and that has fine-tuned access control. Egnyte, SecureDocs, ShareFile, and SugarSync are just a few of the more popular services
Automation & Productivity
eWeek - 5 Steps to Leveraging Machine Learning: The Shopify Use Case
The company has been at the forefront of ML adoption for anomaly detection and forecasting. That’s particularly impressive when considering that up to 85% of machine learning projects ultimately fail to deliver on initial promises and goals.
Machine Learning
VentureBeat - The metaverse will be buzzing in 2022
Grossman noted that AI, VR, AR, 5G, and blockchain may converge to power the metaverse — adding that the sum will be far greater than the parts in that convergence.
Emerging Tech
Datanami - IEEE Computer Society Unveils Its 2022 Technology Predictions
The top three tech trends that are anticipated to dominate in 2022 are datacentric AI, remote medicine, and health, safety, and wearable biomedical technologies.
Tech Trends
SiliconANGLE - Watch live: Companies to shed new light on latest cloud-native trends during AWS Startup Showcase Jan. 26 
The latest trends in the cloud native, open-source enterprise computing space will be a central focus for Season 2 Episode 1 of the upcoming AWS Startup Showcase: Open Cloud Innovations, scheduled to air on Jan. 26
Cloud
CompTIA - All the Cybersecurity Statistics, Figures and Facts You Need to Know in 2022 
Check out the following cybersecurity facts and statistics to understand the threat landscape for businesses.
Security
Datanami - New IDC Spending Guide Forecasts Double-Digit Growth for Investments in Edge Computing
IDC has identified more than 150 use cases for edge computing across various industries and domains. The two edge use cases that will see the largest investments in 2022 – content delivery networks and virtual network functions – are both foundational to service providers’ edge services offerings.
Edge Computing
CompTIA - Top 7 challenges IT leaders will face in 2022
“Very technically skilled workers who have experience with cloud environments, machine learning, data science, and software have always been in demand at tech companies, but now those skills are in demand at nearly every company, creating greater competition to land top-notch developers, software engineers, and data analysts,”
IT Management
Microsoft - 4 Approaches To Comprehensive Security That Help Leaders Be Fearless
According to the report, only 31 percent of organizations that reported being ahead with their Zero Trust implementation were impacted by NOBELIUM, the perpetrators of the SolarWinds attack.2 Compare that to the 75 percent negatively affected by this devastating cyberattack that reported lagging behind in their Zero Trust implementation.
Security
Digital Insurance - How AI, data analytics could help identify insurance fraud
AI does this by providing a fully transparent view of the customer, their claim and their network. This view then lets decision-makers automate, build and understand the timeline of events leading to a claim
Artificial Intelligence
TMCNet - Artificial Intelligence Platforms Market to grow by USD 17.29 bn | Evolving Opportunities with Alphabet Inc., Amazon.com Inc. & Microsoft Corp. | 17000+ Technavio Reports
68% of the growth will originate from North America for the artificial intelligence platforms market. The US is the key market for artificial intelligence platforms market in North America. The US and Canada together hold approximately 26% of all global AI-related patent applications, while IBM has the largest share of AI-related patents, followed by Microsoft and Google
Artificial Intelligence
The Fast Mode - Telcos Are Stepping Outside of Their Comfort Zone
Already this year, observers noticed that telcos redefined themselves, pivoting from telecom companies to tech companies. Telcos are no longer just connectivity providers and have become more tech-co focused. Having put a large amount of their investment and budgets in maintaining and developing IT systems, they want to be major IT players and software developers.
Telecom
CSO - Top cybersecurity M&A deals for 2022
Last year saw some companies that are not primarily in the cybersecurity market buy security firms to better protect their data and customers.
Security
Netwrix - Cybersecurity: What To Expect In 2022
Moreover, attacks are getting more expensive, with the average ransomware payment leaping from US$312,000 in 2020 to $570,000 in 2021. By 2031, there will be a new assault every 2 seconds and ransomware costs will reach $265 billion per year.
Security
VentureBeat - Report: Majority of malware downloads in 2021 were traced to cloud apps
The top source of credential attacks in 2020 were a few heavy hitters responsible for numerous login attempts. In 2021, however, credential attacks came from a much larger number of sources, each responsible for fewer login attempts.
Security
AiThority - 3 Data Trends Expected to Impact Marketers in 2022
This method can also use data to determine which keywords, ads, ad groups, and campaigns have the most impact on reaching your business goals. Data-driven attribution may help close the gaps made by third-party cookie losses and bring data to the forefront.
Data & Analytics
Network World - IoT in 2022: IoT turns into a service
“What’s really raised its head in 2021 and I think is going to be the dominant trend is much more closed business applications,” he said. “We saw a bunch of companies roll out strategies that prohibit selling the IoT platform on its own. They now sell the application, plus IoT.”
IoT/Mobility
SDxCentral - VMware, Nutanix Continue to Battle for HCI Market Dominance
Additionally, Huawei, Cisco, and Hewlett Packard Enterprise (HPE) made the top 5 HCI software vendor list. However, Cisco and HPE’s HCI revenue declined during the quarter. Cisco accounted for 4.4% of the HCI market, and its revenue dropped 14% year over year to $104 million. Meanwhile HPE’s revenue decreased 7.7% to $82 million in the third quarter of last year.
Data Storage
ZDNet - The shocking reason people are quitting tech companies (No, it's not money)
You might be desperate for a more exact definition of toxicity. Well, these researchers indicated "failure to promote diversity, equity, and inclusion; workers feeling disrespected; and unethical behavior."
Tech Jobs
VentureBeat - How Moveworks used Conversational AI to support hybrid work
A recent survey conducted by Replicant found that nearly 80% of consumers are willing to speak with conversational AI. Gartner predicts that enterprise-level chatbot implementation will see over a 100% increase in the next two to five years
Artificial Intelligence
SDxCentral - CNCF Report: Serverless Loses Steam, Goes Off Edge
The number of developers working on serverless architectures is slipping, according to a survey of more than 19,000 software developers conducted by SlashData and released by the CNCF. The report found the number of serverless developers — reportedly four million strong — declined from 27% of all developers in 2020 to 24% in 2021.
Tech Trends
Datanami - New Report Finds Self-Service Analytics Are Critical to Empowering Frontline Workers
A previous report by HBR found that 86% of business executives said frontline workers at their organization need better technology to make data-driven decisions, and named self-service analytics as a top technology they would adopt by 2022 to make this happen.
Data & Analytics
ZDNet - The race towards renewable energy is creating new cybersecurity risks
There are two key security issues in SCADA systems – the first is that many of these networks are old, sometimes to the extent they can't receive security updates, which means that if they're linked to internet-facing areas of the network, they can potentially be infiltrated by cyber criminals.
Security
Techstartups - Venture capitalists pumped over $675 billion into tech startups worldwide in 2021, doubling the previous record set in 2020
In San Francisco alone, some 133 startups saw their valuations climb to over $1 billion, followed by 69 in New York, 21 in Greater Boston, 20 in London, 16 in Bengaluru, and 15 in Berlin
Tech Startups
AiThority - The Rise of PPC Automation: Everything You Need to Know

In short, PPC automation is how we define the use of technology and machine learning to optimize your search engine marketing (SEM). Online search engines are being used more than ever before, and with 87% f smartphone wners using a search engine at least once a day, optimizing your SEM has never been more important. 

Automation & Productivity
TechTarget - Enterprise data storage 2021 Products of the Year finalists
Several trends stand out among the five categories of finalists this year, including protection against cyber attacks in backup products, a focus on the cloud and its integration across the board, and support for newer technologies such as containers.
Data Storage
Digital Information World - These Trends Are Revolutionizing The Technology World
Technology is vast and varied, and there are specific kinds of tech that might be a great deal more life changing than others. We are going to discuss ten of the most prominent tech trends out there right now that are liable to change the world as we know it through their innovation.
Tech Trends
Telus International - Forbes: Out Of The Shadows: Managing Shadow IT And Rogue RPA
These instances of unauthorized software deployed by teams outside the central IT department are known as shadow IT. This is a common issue that most companies encounter, and cases of it have grown exponentially in recent years with the adoption of cloud-based applications and services. In fact, research from McAfee previously showed that 80% of workers admit to having used SaaS applications without getting proper authorization.
IT Management
yahoo!finance - Europe’s Spending on IT, Business Services Hits Record in 2021, Amid Signs of Slowing Demand in Q4, ISG Index™ Finds
Managed services climbed 11 percent, to US $13.9 billion—its highest level in a decade—including a record US $11.4 billion for IT outsourcing (ITO), up 5 percent, and US $2.6 billion for business process outsourcing (BPO), up 45 percent. XaaS soared 41 percent, to a record US $12.6 billion, on 44 percent growth in infrastructure-as-a-service (IaaS), to a record US $9.2 billion, and 33 percent growth in software-as-a-service (SaaS), to a record US $3.4 billion.
IT Management
SecurityWeek - With the 'Great Resignation' Comes the 'Great Exfiltration'
It’s a double whammy for business – not only are they losing staff, but the leavers are taking corporate data with them. In the final 30 days of employment, leavers have been downloading far more data than usual. During this period, 29% of leavers downloaded more data, and 15% uploaded more data to personal cloud apps.
Security
IndustryWired - Dell Technologies: Cloud Security, AI, Risk management will be key trends for Data Protection in 2022
The recent Dell Technologies 2021 Global Data Protection Index highlights that 70% of respondents in India believe emerging technologies—such as cloud-native applications, Kubernetes containers, AI, and machine learning pose a risk to data protection, and the lack of data protection solutions for newer technologies is one of the top three data protection challenges for organizations.
Data Management
American City & County - Report: Cyber threats are on the rise while public defense measures lag
At 56 percent, the report says, “the general hacking community” is behind most of the security threats faced by public sector servers, closely followed by “careless/untrained insiders” (52 percent) and “foreign governments” at 47 percent. This is the first time in five years careless insiders weren’t the top security threat.
Security
AiThority - GSV Announces GSV EdTech 150, Top Companies In Digital Learning
North America — specifically the United States — is the most represented region accounting for 56% of the GSV EdTech 150. 11% of the GSV EdTech 150 hail from India, whose market is experiencing explosive growth with five EdTech unicorns that include BYJU’s, Eruditus, Unacademy, Upgrad, and Vedantu.
EDTech
SC Media - Why file-borne malware has become the weapon of choice for attackers
Today, sophisticated cybercriminals research their targets and develop specialized malicious code that’s likely to do the most damage or bring in the most money. In fact, SonicWall reported more than 260,000 “never-before-seen” malware variants in 2020. Known as zero-day attacks, this type of hidden malware increased by 74% from 2019, possibly because zero-days are most likely to escape detection by traditional antivirus solutions.Security
VentureBeat - How managed services will evolve in 2022: The data analytics revolution
In 2022, cloud-managed service providers are not only looking to support decision-makers in configuring and maintaining cloud environments, but also providing expertise on how to manage the data they store in the cloud, as more organizations demand access to insights at the cloud level.
Data & Analytics
Security Boulevard - Attackers More Successful at Delivering Malware Payloads
Cloud-delivered malware is now more prevalent than web-delivered malware. In 2021, malware downloads originating from cloud apps increased to 66% of all malware downloads when compared to traditional websites, up from 46% at the beginning of 2020.
Security
ZDNet - Log4j: How hackers are using the flaw to deliver this new 'modular' backdoor
The main module of the attacker's PowerShell framework validates network connections, enumerates characteristics about a compromised system, retrieves the C&C domain from a hardcoded URL, and takes, decrypts and executes subsequent modules
Security
Business Because - Technology Sector To Drive MBA Jobs Boom In 2022
Increasing hiring among tech companies means greater focus on digital and data-related skills—a key area for MBAs to focus on this year. “There’s an increase in demand for candidates with skills in analytics, machine learning, and artificial intelligence (AI),” Mitchell explains
Tech Jobs
InfoWorld - All roads lead to hyperautomation in 2022
When it comes to automation, the natural tendency for humans is to avoid it out of fear that it will replace their jobs. This has turned out not to be the case, however; automation instead enables human workers to learn and develop new skills that are more valuable to their organizations and their own careers
Automation & Productivity
Cyber Security Intelligence - Super Intelligent Machines - They’re Here
A leading expert on AI, Prof. Stuart Russell, of the University of California at Berkeley, is suggesting  a way forward for human control over super-powerful Artificial Intelligence, advocating the abandonment of the current “standard model” of AI, proposing instead a new model based on three principles - chief among them the idea that machines should know that they don’t know what humans’ true objectives are.
Artificial Intelligence
Network World - Latest 5G specs highlight IoT support, better spectrum efficiency
The latest 5G technical specifications from an overarching standards organization sets a roadmap for development that addresses streamlined IoT support, AI/machine learning, and more efficient use of wireless spectrum.
5G
The Hacker News - 2022 Cybersecurity Predictions from Lookout: Work From Anywhere Ends On-Premises Security
Whether an employee accidentally shares a document with the wrong person or a compromised account extracts information, data now moves at lightning speed. As we head into 2022, with hybrid and remote work cemented as the new norm, Lookout expects this to become an even bigger issue.
Security
CSO - CISA sees no significant harm from Log4j flaws but worries about future attacks
“We’ve been actively monitoring for threat actors looking to exploit” the vulnerability, and “at this time we have not seen the use [of the vulnerability known as Log4Shell] in significant intrusions,”
Security
yahoo!Finance - Virtual Private Network (VPN) Market Trends 2022 | North America, Europe, & APAC Industry Forecasts 2027: Graphical Research
The global VPN market size is estimated to showcase exponential growth during the forecast period, driven by the rising number of government initiatives and policies to encourage companies to use innovative yet reliable internet security measures.
Network Management
SDxCentral - What Security Tech Will CISOs Buy in 2022?
Marks pointed to ESG’s report that found nearly two-thirds (62%) of respondents said their organization will increase spending on cloud application security, followed by data security (58%) and cloud infrastructure security (56%). About half said they plan to increase spending on network security (55%) and endpoint security (50%).
Security
AiThority - SoftwareReviews Reveals The Best IT Asset Management Software
“ITAM feeds data into financial management including cloud cost optimization, compliance and legislation, project management, vendor management and enables accountability throughout all the lifecycle stages, including disposal.”
IT Management
Network World - Latest 5G specs highlight IoT support, better spectrum efficiency
If a commercial 5G service is available where customers wants to network IoT, all the customers need to do is ensure their IoT endpoints support the service and turn it on. That’s much simpler than architecting and deploying their own networks to support the IoT initiative.
5G
Computerworld - IT salary expectations for 2022: How much can UK IT pros expect?
The report also notes that demand for front-end developers is rising as businesses adapt to suit the new wave of online consumer behaviour caused by the pandemic. Additionally, 24% of CIOs are prioritising further cloud-based projects and initiatives, meaning the need for cybersecurity professionals will only continue to increase.
Tech Jobs
yahoo!Finance - Network Monitoring Market worth around $7 Bn by 2027; Global Market Insights Inc.
The growing popularity of SaaS-based network monitoring solutions is driving the market growth. SaaS-based network monitoring solutions provide comprehensive remote monitoring and can monitor all the IP devices within the IT network infrastructure
Network Management
ZDNet - Developers are in short supply. Here are the skills and programming languages employers need
Employers are finding it especially difficult to match candidates with their specialist business needs. This year, web development, DevOps and AI/machine learning are among the technical skills most sought after by tech recruiters, the survey found.
Tech Jobs
SCL - Digital Transformation and the New Wave of Troubled Outsourcing Projects
In this article, we set out how digital transformation can drive complexity and risk, why market norm outsourcing contracts might hinder rather than help, how fresh thinking when setting up contracts can improve the chances of success, and how parties can exercise the contract smartly to get projects back on track when problems do arise.
Digital Transformation
ZDNet - Cybersecurity: Last year was a record year for attacks, and Log4J made it worse
"New penetration techniques and evasion methods have made it much easier for hackers to execute malicious intentions. What's most alarming is that we're seeing some pivotal societal industries surge into the most attacked list. Education, government and healthcare industries made it into the top 5 most attacked industries list worldwide."
Security
SUSE - Dell Technologies partnership continues to shine with Joint Open Source Solutions
Containerization is the de facto mode of development for many teams these days because they can work more independently to deliver value faster. And containers have become synonymous with Kubernetes orchestration, which escalates it all with auto-scaling, security and management of containerized applications.
Open Source
The Sun - Hackers feared to have penetrated half of UK businesses due to staff working from home
Four out of five companies had no protections against cyber-criminals, the poll by the British Chambers of Commerce and IT firm Cisco found.
Security
Cyber Security Intelligence - Cyber Security Threats In 2022
Innovative cyber security vendor Darktrace has identified a growing trend of hackers targeting  for backup servers in an attempt to deliberately disable or corrupt backup files by deleting a single index file that would render all backups inaccessible.
Security
Datanami - Preparing for the Next Disruption: 10 Analytics Trends to Watch in 2022
“Curiosity helps businesses address critical challenges – from improving job satisfaction to creating more innovative workplaces. Curiosity will be the most sought-after job skill in 2022 because curious employees help improve overall retention, even during the Great Resignation.”
Data & Analytics
SDxCentral - Zero Trust Is More Important Than Ever, Security Practitioners Warn
Service providers might list zero-trust network access (ZTNA), software-defined perimeters (SDP), or identity-defined perimeters (IDP) products as silver bullets of a zero-trust architecture without pursuing a zero-trust strategy for the whole enterprise, so “we need to strategically remove implicit trust from IT systems and constantly validate every digital interaction in the process,
Security
CSO - 5 top hybrid cloud security challenges
“A hybrid environment naturally introduces more complexity; there are just so many more ‘windows and doors’ to lock, and more security maintenance—patching, etc.—to perform,"
Cloud Security
VentureBeat - How to build a data science and machine learning roadmap in 2022
Gartner notes that organizations undertaking DSML initiatives rely on low-cost, open-source, and public cloud service provider offerings to build their knowledge, expertise, and test use cases. The challenge remains of how best to productize models to be deployed and managed at scale.
Data & Analytics
Diginomica - Someone’s talking Blockchain, but don’t run and hide - this is about proof of value
This is a use case where Blockchain and its capabilities with transaction security and provenance could offer significant advantages, except for that one major deficiency, typified by the Bitcoin example: a TPS ranging between three and seven, and a transaction confirmation cycle time of around 10 minutes. In short, Blockchain can’t hack the business need or get remotely close…or can it?
Blockchain
Cyber Security Intelligence - What To Expect From Data Science In 2022
An emerging trend in data science is that it has started to converge with other disciplines such as AI, business intelligence, and digital marketing as well as technologies like IoT, cloud technology and 5G in order to provide even faster and improved results.
Data & Analytics
SC Media - Three takeaways from Google Cloud’s acquisition of Siemplify
 In reality, very few security issues have end-to-end predictability with binary outcomes. This was a leading driver in SOAR failing to live up to the hype – further undermining the stand-alone market and leading to bifurcation of SOAR functionality.
Security
The Fast Mode - The Future of Network Security: Three Predictions for 2022
In a survey of global CISOs by Cybersecurity Insiders for the CISO Cloud/SaaS Security Report, an overwhelming 94% reported being moderately to extremely concerned about security risks associated with the increased use of public clouds.
Cloud Security
Datanami - The Upcoming Year in Big Data: A 2022 Preview
 “In 2022, organizations will create a data fabric to drive enterprise-wide data and analytics and to automate many of the data exploration, ingestion, integration, and preparation tasks,"
Data & Analytics
Datanami - Successful Edge Computing Depends on a Symbiotic Edge and Core to Workload Relationship, According to IDC
IDC has identified four workloads from its Worldwide Enterprise Infrastructure Workloads Taxonomy that have a significant influence among edge use cases: business intelligence/data analytics; content delivery; text and image analytics; and networking & security.
Edge Computing
Georgia Tech - Responsibility Key to Broader Understanding and Acceptance of AI in 2022
As the year unfolds, experts expect to see responsibility “increasing in relevance and importance with wide-scale acknowledgment that ethics are crucial to prevent issues related to bias and discrimination in AI,”
Artificial Intelligence
Network World - The cloud comes down to earth
The enterprise data center is also veering toward the virtualized, containerized, ultra-scalable cloud model. For example, Dell, HPE, and Lenovo now offer on-prem clouds in the form of cloud infrastructure software running on pay-per-use hardware, overprovisioned to give you the headroom to increase capacity on the fly.
Cloud
AiThority - Tech Hiring Accelerates as National Employment Growth Slows
Eight metropolitan areas saw the number of tech job postings increase by more than 1,000 in December over November, from Dallas (15,959 total job postings) and Houston (6,331) in the Southwest, to Los Angeles (14,229) and Seattle (8,091) on the West Coast, to Atlanta (11,808) and Tampa (4,925) in the Southeast.
Tech Jobs
SiliconANGLE - Analyst predictions 2022: The future of data management 
"I believe that data governance is now not only going to be mainstream, it’s going to be table stakes. And all the things that you mentioned, the data, ocean, data lake, lake houses, data fabric, meshes, the common glue is metadata. If we don’t understand what data we have and we are governing it, there is no way we can manage it."
Data Management
ZDNet - New year, new job: The tech resignations are coming, so get ready
Employers will need to put just as much effort into making sure they retain existing tech staff, who already have extensive knowledge of the organization's technology and who understand the needs of the business and its customers.
Tech Jobs
VentureBeat - The ambient intelligence decade
The metaverse is not the only idea that is being supercharged by recent technical advances. Through smartphones and IoT devices, computing increasingly surrounds us becoming everywhere a part of the human environment. This represents a nexus of long-term trends, such as ubiquitous or pervasive computing and the mobile internet
Emerging Tech
Network World - How to buy enterprise firewalls
Most firewalls will perform well when traffic loads are light. It’s important to see how a firewall responds at scale, particularly when encryption is turned on. Roughly 80% of traffic is encrypted today, and the ability to maintain performance levels with high volumes of encrypted traffic is critical.
Network Management
ZDNet - Cloud computing, Log4j flaw, IT spending, and more: Tech research roundup 
On December 18, Google released a security report where Open Source Insights Team members James Wetter and Nicky Ringland said they found that 35,863 of the available Java artifacts from the Maven Central repository depend on the affected Log4j code.
Security
Network World - Hybrid cloud demands new tools for performance monitoring
“Only 36% of network operations professionals believe that their network management tools are as good at managing cloud networks as they are at managing on-prem networks,”
Cloud
ZDNet - Never been a better time to aspire to be a chief technology officer, study shows
Top CTO responsibilities cited in the survey include C-suite and board advisory (88%), software development lifecycle (72%), cybersecurity (69%), innovation strategy (61%), and business continuity (59%). CTOs also add data to their list of central responsibilities
IT Management
Yahoo!Finance - Seven years later, Web 3 is setting a standard for the decentralised economy
Web 3.0, on the other hand, leverages machine learning, artificial intelligence and blockchain to achieve real-world human communication in a new decentralised world with blockchain as its chief cornerstone. With many great offerings, Web 3.0 brings freedom from centralised regulation and gives it back to its users.
Emerging Tech
ZDNet - Is LiDAR on its way out? The business case for saying goodbye
"LiDAR is well suited for outdoor applications where there are a lot of unknowns and inconsistencies in terrain. That's why it's the best technology for self-driving cars. In indoor environments, machine vision makes the better technological case. As light photons are bouncing off objects within a warehouse, robots can easily get confused under the direction of LiDAR."
Automation & Productivity
VentureBeat - The positive side of ransomware for data transformation
The new architecture should be more responsive and interface with enterprise data via a smart API that can automate the processes by which data is fetched, merged, transformed, secured, and delivered, all without users having to put in a request to the data team.
Data Management
eWeek - 5 Tech Trends for 2022: Digital Transformation, Cloud and Talent Wars
The upskilling this will force into enterprise IT shops will be a key issue for them, as it will require changes to talent recruitment and retention well beyond what most companies have in place for what has traditionally been viewed as a low-impact cost center.
Tech Trends
The Verge - Matter was a major star at CES 2022, but can it maintain its shine?
“We can’t leave devices behind, or this whole program won’t work. The idea that everyone has to throw everything out and start again is just not going to work.” It remains imperative that Matter doesn’t leave existing smart homes in the dark.
Smart Tech
Yakima Herald - Commentary: Quantum technology could revolutionize business via data encryption, drug discovery and more
In pharmaceuticals, quantum computing could improve the precision and speed of drug development; in automotive, it could cut the time and cost of manufacturing; in chemicals, it could realize significant energy savings; and in finance, it could optimize risk management and free up capital.
Quantum Computing
Cnet - Privacy myths busted: Protecting your mobile privacy is even harder than you think
Dozens of settings in your phone's operating system and within your apps would need to be changed before you could say you'd completed the first two steps. That's why the final step -- installing privacy-focused apps like a VPN, Signal Messenger, Brave Browser, DuckDuckGo and the BitWarden password manager -- is crucial
Privacy & Security
eWeek - Secure Access Service Edge: Big Benefits, Big Challenges
The more difficult part of realizing SASE is the need for a security architecture that can be fully integrated and managed, much like software-defined networks are. But the majority of enterprises currently have a hodge-podge of security products in place that are nearly always stand-alone.
Security
VentureBeat - AI is quietly eating up the world’s workforce with job automation
For example, the popular AI copywriting app, Rytr, boasts over 600,000 users, and it’s growing at a brisk pace. In other words, over half a million people are using Rytr alone to fully or partially automate their writing.  It’s estimated that there are just over 1 million freelance writers around the world, who are increasingly competing with robots that don’t tire, don’t require payment, and can generate an unlimited amount of content.
Artificial Intelligence
Forbes - In The Digital 2020s, Jobs Are More Than Just Jobs
Master of edge computing: “Define the IoT roadmap, carefully evaluate the technical requirements and assess the feasibility for establishing the edge processing unit and measure the return on investment.
Tech Jobs
VentureBeat - 7 ways the technology sector could support global society in 2022 
It might benefit us more to see technology companies as one among many contributors to the future of human potential — alongside a myriad of expert philosophers, engineers, humanitarian workers, particle physicists — while recognizing that chasing goals that benefit their corporate structures more than they benefit society might be a significant distraction from the task at hand.
Sustainability
TMCnet - Biggest Cyber Threats That Small Businesses Face
''The absolute biggest mistake companies make about cybersecurity insurance and cybersecurity, in general, is that they don't need it and that they are not a target. And even worse, they think they are already protected'',
Security
VentureBeat - CES 2022: Eyeing an enterprise metaverse
The MCity metaverse-as-a-service concept allows companies to register a DNS-like .metaverse domain for a “campus” of 3D structures where they can hold events on a regular basis. The 3D rendering environment is based on Epic’s Unreal Engine, powered by Nvidia GPUs running in the Microsoft Azure cloud.  
Metaverse
threatpost - EoL Systems Stonewalling Log4j Fixes for Fed Agencies
Between technology issues and travel restrictions/shipping delays involved in replacing these systems, Keller predicts that agencies are months away from being able to address Log4j.
Security
SDxCentral - NetFoundry CEO: SASE Isn't Enough, Zero Trust Must Go Deeper
“All the major 2021 attacks, they’ve not been between the user and the app, they’ve been what I would call below the waterline of the iceberg, server to server, webserver to database, every single one of them,”
Security
CircleID - The Future of Data Storage
A single data center uses more electricity than a small town. We’re consuming electric generation resources and spinning off huge amounts of carbon dioxide to be able to save the 45 pictures taken at the birthday party you attended last night.
Data Storage
DarkReading - CISOs Plan What to Buy With Funds From the Infrastructure Bill
"I would spend the money to stitch together governance risk and compliance platforms, SIEM [security information and event management] and SOAR [security orchestration automation and response] technology, so that I can get more predictive analytics based on our risk posture,"
Security
VentureBeat - 4 healthcare cloud security recommendations for 2022
There’s no secret as to why: McKinsey has estimated that migrating to the cloud could generate up to $140 billion in additional value for healthcare companies by 2030 in terms of cost reduction, new product development and overall growth.
Cloud
Android Headlines - Cyber Attack Trends And Warnings By Cyber Expert Tal Dilian
He explains some ideas relating to GDPR, ransomware attacks, cloud security issues, and business data breaches that people and entities should keep in mind when protecting their information online.
Security
Dark Reading - Rethinking Cybersecurity Jobs as a Vocation Instead of a Profession
Within the cybersecurity industry, the prevailing mindset is that security practitioners are professionals. Thus, a direct consequence of this mindset is that a college degree is required for many cybersecurity jobs. A recent (ISC2) report indicates that 86% of the current cybersecurity workforce has a bachelor's degree or higher. Furthermore, a quick search on Indeed.com shows about 46,000 cybersecurity jobs, of which 33,000 (>70%) require a degree.
Security Jobs
Health IT Security - Top Healthcare Cybersecurity Predictions For Next Year
With data exfiltration, threat actors are less likely to get caught. These attacks have a higher success rate and are lower risk than encryption-based ransomware attacks. In addition, cybercriminals are almost as likely to get the ransom paid.
Security
VentureBeat - Evaluating technology to empower digital transformation success
A recent IDG MarketPulse survey found that less than a quarter of line of business (LOB) employees are automating their daily routines or modernizing existing workflows. And it’s not all due to a lack of skill or desire — almost 1 in 5 of the respondents to that survey outside of IT who are capable of contributing to digital transformation efforts are not doing so.
Automation & Productivity
ComputerWorld - No end in sight for the Great Resignation; workers keep quitting for better pay, benefits
The hospitality and healthcare industries took the biggest hits as workers left to find better wages and benefits. The transportation, warehousing, and utilities industries also saw employee flight in significant numbers.
Tech Jobs
SDxCentral - Is Home SD-WAN, Security the Future of Remote Work?
“I think where you start to see some differences and where the real value of these appliances come in, is the ability for the appliances to be able to optimize and prioritize application traffic or provide direct connections to cloud-based platforms.”
Network Management
AiThority - 70% Of US Broadband Households Own At Least One Streaming Video Product Connected To The Internet
Ownership of smart TVs and streaming media players continues to rise, and gaming console ownership has held steady after several years of losses. Consumers have fully embraced streaming services, with more than 80% of broadband households having at least one service and 49% having four or more services.
Streaming
Blocks & Files - Samsung shipped over half of world’s enterprise SSDs in Q3, say analysts
Intel and Samsung each accounted for about 35 per cent of enterprise SSD capacity shipped in 2019’s third quarter – but now Samsung has a market-dominating 53.6 per cent share while Intel’s has dropped to 15.2 per cent.
Data Storage
World Economic Forum - Emerging Economies More Optimistic About Artificial Intelligence, Survey Finds
60% of respondents believe that products and services using AI will make their life easier, but four in ten admitted that the use of AI makes them nervous.
Artificial Intelligence
ZDNet - Remote working jobs: These are the highest paying tech and management roles
The most recent Ladders Quarterly Remote Work Report, which is based on data on remote working opportunities from 50,000 companies, found that 18% of all professional jobs are now remote, including nearly 156,000 roles paying $100,000 or more.
Tech Jobs
Rapid7 - 2022 Cybersecurity Predictions: The Experts Clear Off The Crystal Ball
"My third eye tells me that ransomware will become state-sponsored. Governments will notice the successful actors in their countries, and rather than shut them down, they'll seek to co-opt their activities. In other words, pirates will be coopted into privateers."
Security
Dark Reading - Hybrid Multicloud Strategies Are Keeping the Public Sector at the Forefront of Threat Mitigation
To effectively adopt a defensive secure posture in a hybrid multicloud environment, development teams must ensure that security controls and features are built in at all levels of the environment, including at the data and application levels.
Cloud
ZDNet - Most enterprise execs already want to adopt quantum computing, survey says
The study queried 300 CIOs, CTOs, and "other VP-level and above executives" at global enterprises with annual revenues over $250 million. It found that the vast majority have already begun looking into quantum computing, with a larger 74% noting that companies will "fall behind" if they fail to tap into it.Quantum Computing
Forbes - How To Adopt A Best Practice Approach To Cloud Migrations
For example, when an enterprise migrates an application to a public cloud, the entire database must either travel with the application or remain accessible after the migration is finished. Without complete mapping for both local and external resources, the application and data may not function as intended. Not surprisingly, security risks also increase.
Cloud
The Next Platform - THE YEAR AHEAD IN DATACENTER COMPUTE
It would be great if the rumored Microsoft/Marvell partnership yielded another homegrown Arm server chip, and it would further be great if late in 2022 AWS put out a kicker Graviton4 chip just to keep everyone on their toes.
Automation & Productivity
CSO Magazine - Top 8 cybersecurity predictions for 2022
Remote work, virtual meetings, hybrid cloud networks, and SaaS adoption have all brought about complex IT infrastructures that are opening up new threat avenues. Meanwhile, CSOs also must help ensure their organizations are in compliance with new regulations.
Security
Digionomica - The last mile in AI deployment - answering the top questions
The "AI last mile" may represent the most significant risk to the enterprise. There is complexity in putting AI into production. Perhaps, IT principals are mesmerized by the terms "AI" and "AIOps," presuming it's just another case of project management and governance. AI may not only disrupt integration into existing business processes, but it can also do so in mysterious ways, and may escape scrutiny.
Artificial Intelligence
Network World - 3 types of edge-gateway vendors
As it stands, the edge-gateway market is immature and fractured. A range of infrastructure incumbents, providers of data-center gear, and startups have launched new edge-gateway products in the last couple of years, offering a variety of approaches to taming the edge.Edge Computing
Finextra - Blockchain may have a significant role in 2022
Blockchain-based services are being developed by a number of multinational organizations, including Spotify to manage copyrights and IBM to offer monitoring systems for shipping and retail chains.
Blockchain
SDxCentral - Top 5 Data Center Tech to Watch in 2022
Intel is expected to be first on the scene, due in part to a last-minute delay to its upcoming Sapphire Rapids Xeon Scalable Processors. The new Xeons are slated for release early this year and boast a number of tantalizing new features, including an all-new, multi-die architecture, Intel’s most advanced 10-nanometer manufacturing process, and on-die high-bandwidth memory.
Data & Analytics
VentureBeat - 2 big CES trends: PCs closing Apple’s silicon advantage and mutant laptops
AMD, Intel, and Nvidia are all competing with one another, and the added pressure of Apple’s own silicon is bringing out the best in all of them.
Tech Trends
Blocks & Files - Hitachi Vantara rated as best primary storage for large enterprises by GigaOm
The small business Radar diagram places DataCore, DDN, HPE, IBM, iXsystems and StorOne in the Challengers’ area with iXsystems the most mature and DataCore, DDN and StorOne scoring highest on innovation
Data Storage
TechBullion - Blockchain Will Rule 2022: 5 Upcoming Trends That Prove This
Owing to its impressive data storage techniques, experts anticipate the below-mentioned blockchain trends will serve as a trustworthy source of future record-keeping and financial transactions in 2022.
Blockchain
Intelligent CISO - How ransomware is destabilising cyber insurance – and what to do about it
But as the industry’s loss ratio rose for the third straight year in 2020, climbing more than 25 percentage points year over year to 72.8%, and ransomware events jumped 93% in the first half of 2021, something clearly has to change. Ransomware is neither unlikely or novel any longer, but rather has become a commoditised threat.Security
Security Intelligence - The 5 Most Hotly Contested Security Trends and Questions
The worst thing that organizations can do is take a hard stance with their cybersecurity efforts. The digital threat landscape is constantly evolving. If organizations settle into a viewpoint, they could elevate one source of risk into something unrealistic—all while missing other digital threats.
Security
Forbes - Why Words Matter In Cybersecurity
Calling all malicious cyber activity an attack fails to address questions about motive, impact and security. You don't know if victims have performed their due diligence from a security perspective. For example, was it the network secure or was it rife with unpatched vulnerabilities? You can't tell.
Security
Enterprisers Project - Digital transformation: Your 6 key teams in 2022
Based on my own experience in the enterprise IT domain, I can assert that digital transformation is here for the long haul. It will require enterprises to draw up tightly woven strategies and provide a handsome payoff for those that start planning early.
Digital Transformation
VentureBeat - CES 2022: AI is driving innovation in ‘smart’ tech
In particular, consumer device makers tend to want to take advantage of the cloud for software and data updates without being dependent on the cloud — with the smarts of the smart device resident on the device itself. So they’re worth studying as pioneers in edge computing.
Artificial Intelligence
Dark Reading - Putting Ransomware Gangs Out of Business With AI
Organizations need to take matters into their own hands with a new approach. By using AI that learns what normal business operations look like, anomalous behavior that inevitably arises from a ransomware attack can be identified at every stage, even when it’s using never-before-seen attack methods.
AI/Security
Forbes - The 10 Tech Trends That Will Transform Our WorldThe takeaway for businesses is that, as our interactions with machines become increasingly intelligent, customers will expect all manner of products and services to feature some sort of AI capability.
Tech Trends
The National Law Review - Life and Death of Technology: 2022
The Washington Post suggests that both Apple and Google may offer their own metaverse access portals this year. It will be interesting if these companies try to isolate their own technology in to separate sandboxes, or if they make a play for interoperability that will allow small companies to create content that can be played on every device.
Tech Trends
McKinsey & Company - The unsolved opportunities for cybersecurity providers
The elements that enterprises must secure (data, devices, people, networks, machines, and applications), how they must secure them (prevention, detection, response, and remediation), and why it’s important to secure them (to mitigate loss of lives and livelihoods) continue to evolve, and cybersecurity providers have yet to solve several crucial customer challenges.
Security
IT Business Edge - What’s Next for Ethical AI?
They are concerned about how AI advancements will affect our productivity and the exercise of free will; in short, what it means to be “human.” The fight for ethical AI is nothing but fighting for a future in which technology can be used not to oppress but to uplift humans.
Artificial Intelligence
Compare the Cloud - Forget Forms, Conversation is King
Conversational assistants are not just the next trend. They are the next stage in our digital evolution. Just like how CDs have been replaced by online streaming platforms in the music industry, chatbots will replace their webform predecessors.
Automation & Productivity
VentureBeat - Report: 43% of consumers feel transparency is key for positive AI innovations
The survey, which was designed to capture consumers’ understanding of AI, their overall perception and utilization, and any apprehensions related to data privacy and regulation, found that nearly half of consumers (45%) believe AI supports employees by making complex tasks easier.
Automation & Productivity
ZDNet - Google's 2021 Year in Review lays out hopes for practical quantum computing this decade
The company would like to accomplish all of these things before the calendar rolls around to 2030. Should it attain its goals, Google believes quantum computers could revolutionize multiple areas of technological development
Quantum Computing
Dice - What Tech Jobs Demand A.I. and Machine Learning Skills in 2022?
According to Emsi Burning Glass, which collects and analyzes millions of job postings from across the country, the number of job postings requesting A.I. skills will increase 297 percent over the next two years
Artificial Intelligence
The Record - State-of-the-art EDRs are not perfect, fail to detect common attacks
The research team tested these attacks against EDR software from Bitdefender, Carbon Black, Check Point, Cisco, Comodo, CrowdStrike, Elastic, ESET, F-Secure, Fortinet, Kaspersky, McAfee, Microsoft, Panda Security, Sentinel One, Sophos, Symantec, and Trend Micro. T
Security
ZDNet - Data 2022 outlook, part two: Reality bytes the data mesh
According to Google Trends, "data mesh" was one of the topics that  broke the internet in 2021 -- even more so than "data lakehouse." However, it's a topic that addresses a point of pain: We dump all sorts of data into data lakes or other silos, then we lose track of them or don't adequately utilize and govern them.
Data & Analytics
eWeek - Data Management in 2022: DataOps, Talent Shortages, Storage Overload
Instead of focusing on the detailed technical configurations of provisioning storage and resolving issues, the storage admin job will morph into a proactive role requiring a broader understanding of the full hybrid cloud infrastructure, including compute, AI and automation, DevOps, and containers.
Data Management
Constellation Research - Five trends shaping the cloud security conversation
Local encryption key generation and storage, and integrated transaction signing are now standard in mobile devices, and IoT device capability is heading the same way. Managing fleets of connected automobiles, smart electricity meters, and medical devices -- to cite some popular examples -- takes a dynamic mix of processing and storage at the edge and in the cloud.
Cloud Security
Finextra - 5 Digital, Crypto and Blockchain predictions for 2022
Digital asset interoperability and time to market remain a challenge, with traditional and multiple types of blockchain-enabled digital asset infrastructure being severely fragmented.
Blockchain
Insider Intelligence - Health systems will turbocharge their AI strategies in 2022—but it won’t come without challenges
In fact, nearly 72% of healthcare execs say they’d trust AI to support nonclinical, admin processes that take away time providers could be spending with patients, per Optum.
Artificial Intelligence
Data Center Dynamics - There's no ecommerce without web scraping and Big Data
Business competition is a game (in the sense of mathematical theory), where participants have partial information about possible decisions. They then make those decisipms based on the available information.
Data & Analytics
AiThority - Top Tech Innovation Companies Exhibiting at the CES 2022 That We Are Most Excited About
Samsung will also unveil four exciting projects from C-Lab Inside, its in-house venture program, and nine startups supported by C-Lab Outside, the company’s startup acceleration program, to the public.
Emerging Tech
Network World - When quantum computers forget: Overcoming decoherence
Overall, though, quantum computing will be a huge net plus for businesses, scientists, researchers and anyone who has to quicky perform what Harvard Business Review calls “combinatorics calculations.”
Quantum Computing
SDxCentral - AT&T’s SASE Strategy Champions Pragmatism
By consolidating secure web gateway, zero-trust network access, cloud access security broker, and cloud-based firewalls under a single vendor, enterprises can not only better support remote workers and contractors, but do so in a way that cuts down on the number of products required and allows for consistent policy enforcement across all channels
IT Management
VentureBeat - 30 startups that show how open source ate the world in 2021
But in among all the usual excitement that permeates the open source world, countless open source startups launched new products, attracted venture capitalist’s (VC) money, and generally reminded us of the role that open source plays in today’s technological landscape — including the data sovereignty and digital autonomy it promises companies of all sizes.
Open Source
TMCnet - 5 Ways to Keep Your Data Safe From The Inside Out
A security policy not only governs how your employees use company resources but also includes rules about what they should and shouldn't be doing.
Security
EnterpriseAI - As the Energy Industry Transforms, AI Automation is Its Next Opportunity
One forecast predicts an increase in power system costs by six to 13 percent in 2040. AI can help better balance and orchestrate the network by using AI-enabled decisions in optimizing system build-out, while improving battery optimization and energy management.
Artificial Intelligence
VentureBeat - How combining human expertise and AI can stop cyberattacks
CISOs tell VentureBeat they’re capturing more telemetry (i.e., remote) data than ever, yet are short-staffed when it comes to deciphering it, which means they’re often in react mode.
Security
ZDNet - Nearly half of Latin companies set to adopt AI by 2023
Companies in the region will also be seeking governance services relating to areas such as data management and security, according to the study that was carried out with 5,000 large Latin American businesses.
Artificial Intelligence
MarketingDive - The language of innovation: How AI is improving the translation experience for marketers
In a recent Industry Dive survey of 172 marketing executives, more than half noted that while AI was a critical component for language services, when having content translated or localized for their markets, simplicity was still very much a pain point.
Marketing Tech
Forbes - How Cybersecurity Can Keep Up With Waves Of Innovation
Unfortunately, each time this cycle has occurred, security innovation has lagged behind the new technology’s development and growth. As a general rule, it takes years for organizations to figure out how to secure a new platform.
Security
TotalRetail - Email Acquisition is the New Directive in the Post-Cookie Era
As governmental regulation and industry mandates have pushed the envelope towards the phaseout of third-party cookies as identifiers for unknown audiences across the internet, email addresses are becoming more important than ever, taking up the mantle as the currency of the entire online advertising ecosystem
Marketing Tech
VentureBeat - Top 5 trends for endpoint security In 2022
While 82% of CISOs have reevaluated their security policies in response to the support needed for work-from-home (WFH) and virtual teams, endpoints often lack needed patches to stay secure or are overloaded with conflicting software agents.
Security
ZDNet - How will Zuckerberg's Meta plans impact its dominance over social media in 2022?
Even though seven in ten respondents to a recent survey reported that they are not interested in Meta's virtual reality project, companies are developing platforms that enable users to engage.  
Emerging Tech
Datanami - NewVantage Partners Releases 2022 Data And AI Executive Survey
Investment in Data and AI initiatives continue to grow – the 2022 survey indicates that 97.0% of participating organizations are investing in Data initiatives and that 91.0% are investing in AI activities. This year, 92.1% of organizations report that they are realizing measurable business benefits, up from just 48.4% in 2017 and 70.3% in 2020.
Data & AI
Datamation - Top Network Security Trends
Many of the worst and latest network security breaches have happened because of user errors related to a lack of cybersecurity knowledge and best practices.
Security
Enterprise Storage Forum - Storage Tiering Market: Features, Benefits, and Providers
While SSDs are popular, hard disk drives (HDD) and tape continue to be relevant as part of the larger data storage hierarchy as different tiers to meet expanding data growth. Despite the wishes and prognostications by some, no one storage media or medium today, or at least for the next several years, will be able to support all data storage needs in a cost-effective manner.
Data Storage
AiThority - Augmented Reality In Healthcare Market Detailed In Latest Research Report By 2021-2028 | Zugara, Vuzix Corporation
The global augmented reality in healthcare market standpoint is set to run on a comparable plan of action as that of the IT industry in the 1980s. Numerous new players are anticipated to emerge on the scene. In any case, only a few would have the option to merge their positions around the world.
Augmented Reality
VentureBeat - Big data analytics expected to grow to $100B in value by 2027
We can see that big data analytics has not been recognized as an essential facet in the sales and marketing departments of the pharmaceutical industry — more so than in any other sector. In fact, big data is almost twice as prevalent across this area of the industry as artificial intelligence.
Data & Analytics
ZDNet - Data 2022 Outlook Part I: Will data clouds get easier and streaming get off its own island?
The next step for cloud providers is to tap the diversity of their portfolios, identify the synergies, and start bundling solutions that at least lift part of the burden of integration off the customer's shoulders
Cloud
ComputerWorld - 3 big workplace changes to expect in ‘22
Business interest in “bossware” style software that provides detailed analytics on employee actions has grown during the COVID-19 pandemic, drawing criticism from worker rights groups as overly intrusive.
Automation & Productivity
VentureBeat - Report: 60% of U.S. infosec professionals believe ransomware is as serious as terrorism
The survey explores how infosec leadership is responding to rapidly growing ransomware threats. Their responses are critical considering two-thirds (67%) of respondents from organizations with 500+ employees reported a ransomware attack last year — a number that rises to 80% for respondents from organizations with 3,000-4,999 employees.
Security
Tech.Co - Experts’ Predictions for the Future of Tech in 2022
Companies navigating the inclusion of remote workers must prioritize speed and security at scale, but will need greater flexibility as well. Traditional data center architectures and public cloud solutions won't be enough — expect large new expenditures in hybrid work cloud adoption.
Tech Trends
Chemical Engineering - IF DATA IS THE NEW GOLD, WHERE TO START DIGGING?
Among this mixture of promising potential and data overload, companies are struggling to define where and how to start. This article shines a bit of light on how an organization can make progress in its quest to transform its vast volume of process data into a decision-making asset.
Data & Analytics
PC Magazine - Security Predictions Point to 2022 as the Year of the Breach
The security company Lookout has issued some predictions as we head into 2022. It used that ITRC report and others, plus a survey of 2,000 people conducted in November, to extrapolate what's going to happen. Most of it isn't looking good.
Security
NextGov - US Still Lacks Federal Cyber Strategy After Decades of Attempts
Marinos noted the emergence this year of the Office of the National Cyber Director as a positive development toward fixing that. And in October, National Cyber Director Chris Inglis released a statement of “strategic intent.” But Marinos said the administration is still missing essential elements for executing an effective plan: goals and outcomes.  
Security

Was this article helpful?