- 30 Dec 2022
- 410 Minutes to read
- DarkLight
Teckedin - 2022 Curated Analysis, Surveys, Trends and Reports
- Updated on 30 Dec 2022
- 410 Minutes to read
- DarkLight
Thank you to our sponsor. All columns are sortable.
Title/Link | Description | Category |
---|---|---|
VentureBeat - Report: Nearly 50% of phishing attacks in 2021 aimed at government employees were attempted credential theft | One in eight government employees were exposed to phishing threats. With more than two million federal government employees alone, this represents a significant potential attack surface as it only takes one successful phishing attempt to compromise an entire agency. | Privacy & Security |
AiThority - Snap Researchers Introduce NeROIC for Object Capture and Rendering Applications | NeROIC stands for Neural Rendering of Objects from Online Image Collection. This machine learning-trained model acquires and analyzes object representations in 2D and 3D frames to enable various types of object-centric rendering applications. Let’s examine NeROIC and how its application can simplify the image acquisition and rendition processes. | Automation & Productivity |
VentureBeat - How leading endpoint security providers compare on enterprise performance | A skilled attacker can scan and find unprotected endpoints on an enterprise network in seconds, taking just one hour and 24 minutes to move from the initial point of compromise to other systems. That’s 14 minutes faster than last year, based on Falcon OverWatch’s findings in the 2022 CrowdStrike Global Threat Report. | Security |
Computerworld - Low-code development platforms to grow 25% in 2023 | Along with LCAP, hyperautomation technologies such as business process automation, robotic process automation and citizen automation and development platforms (CAPD), are expected to reach almost $32 billion in 2024; that's up from $18.5 billion in 2021. | Automation & Productivity |
VentureBeat - 3 KPMG cybersecurity predictions for 2023 | Predictions include big tech firms emphasizing digital trust to keep up with cyber regulation, the incident response window decreasing as threat actors leverage automation, and approaches to zero trust moving from idle evangelism to active implementation. | Security |
The Verge - The LastPass disclosure of leaked password vaults is being torn apart by security experts | While the company insists that your login information is still secure, some cybersecurity experts are heavily criticizing its post, saying that it could make people feel more secure than they actually are and pointing out that this is just the latest in a series of incidents that make it hard to trust the password manager. | Privacy & Security |
VentureBeat - The hottest IT skills for 2023 – even in a recession | Projections about the need for cybersecurity talent are bullish. Between April 2021 and April 2022, employers posted almost three quarters of a million cybersecurity openings. Government data projects a 35% surge in cybersecurity jobs between 2021 and 2031 — more than double the expected rise in demand for general IT jobs. | Tech Jobs |
FedScoop - Software bills of material face long road to adoption | ||
VentureBeat - Report: Data silos cause employees to lose 12 hours a week chasing data | Airtable and Forrester’s Crisis of a Fractured Organization survey reveals that large organizations today use 367 software apps and systems on average to manage their various workflows. These varying tools create data silos that hide critical data, encourage multiple sources of truth, and make it harder for teams to find the information they need. | Data Management |
eWeek - Cloud Predictions 2023: The Innovation Question | I think it’s good news that AMG aren’t launching fantastic new services left and right anymore. Because that means, as Brian pointed out, that the core capabilities of cloud computing are now in place and stable. In turn, that is great news for users. | Cloud |
VentureBeat - Google AdWords scam epidemic shows social engineering is evolving | As part of these scams, dubbed “MasquerAds,” fraudsters produce fake advertisements designed to rank on search engines and direct targeted users toward malicious phishing sites. These sites are designed to direct users to download malicious payloads hidden with file sharing or code hosting servers like GitHub or Dropbox. | Privacy & Security |
VentureBeat - AI-as-a-service makes artificial intelligence and data analytics more accessible and cost effective | Enterprises are looking to implement a broad spectrum of AI applications, from text analysis software to more complex predictive analytics tools. But building an in-house AI solution makes sense only for some businesses, as it’s a long and complex process. | Artificial Intelligence |
sdxCentral - Google Cloud Bets on Curated Open Source Software | Open source curation exists on a smaller scale today via packages tied to a supported version of Linux or paid versions of open source systems like Apache Spark. But right now “most of the packages we depend on are not curated,” Brewer wrote. “Given the widespread risk, this will have to change.” | Cloud |
SiliconANGLE - How the industrial metaverse will transform manufacturing | But there’s another potential set of uses that may actually spread faster, in industries that train workers, manufacture products or operate infrastructure. This is what is known as the industrial metaverse, and it uses virtual and augmented reality to blend the physical and digital worlds to transform how businesses design, manufacture and interact with objects. | Automation & Productivity |
AiThority - How AI is Playing Catalyst in Strengthening the Hybrid Working Environment | Zoom uses a Deep Learning algorithm to improve audio quality during meetings. With the help of toolkits such as Keras, Tensorflow, or PyTorch, the system applies a host of learning models such as Voice Activity Detection, Speaker Recognition, Speech Enhancement, and Music Detection. | Automation & Productivity |
Network World - Looking ahead to the network technologies of 2023 | In the cloud, in branch locations, and in the data center, the mission of connectivity will shift from the “physical network” to the virtual. Companies’ “networks” will be an overlay on multiple, diverse, physical networks. Applications will connect to virtual networks, and it’s virtual networks that will provide us security and that we’ll manage to assure information access and content delivery. | Network Management |
AiThority - 6 Types of Data Analysis That Data Scientists Are Talking About | EDA determines whether the statistical technique you have considered is appropriate or not. Scientists rely on this method to look at the data before making any kind of assumptions. Common data science tools such as Python and R are used to create an EDA. | Data & Analytics |
ZDNet - Machines that think like humans: Everything to know about AGI and AI Debate 3 | Famed linguist and activist Noam Chomsky said today's impressive language models such as ChatGPT "are telling us nothing about language and thought, about cognition generally, or about what it is to be human." A different kind of AI is needed, he said, to answer the question of the Delphic Oracle, "What kind of creatures are we?" | Artificial Intelligence |
sdxCentral - Deloitte Debriefs Cloud Sustainability in 2023 | What’s changing regarding sustainability goals is the increased emphasis on observability, monitoring, and sustainability scores with things like checks on software code, optimizing existing IT, and making applications easier and more power-consumption friendly | Sustainability |
Blocks & Files - Coldago supplier rankings for cloud, enterprise and high-performance file storage | The Enterprise file storage supplier ranking places Microsoft at the top followed by NetApp and Pure Storage. IBM, Dell and VAST Data complete the Leaders’ area list. There are no Niche or Specialist suppliers at all in this file storage map, and five Challengers: iXsystems, SUSE, Qumulo and Veritas. | Data Storage |
AiThority - How Artificial Intelligence Will Help Facilitate the Hybrid Working Environment | In this article, we’ll explore how AI can be used to make hybrid working environments a reality for companies of all sizes. We will also define what exactly constitutes a “hybrid working environment” so as to better understand its implications for both employers and employees alike, and how it may impact HR trends. | Automation & Productivity |
Blocks & Files - Ahana: Lakehouses need community-governed SQL | Enterprises can now choose among different fit-for-purpose analytics engines for these components. However, working with various engines requires higher levels of technical expertise and mastery of different query and programming languages. Most organizations have few experts qualified to run sophisticated analytics; therefore, the whole process can become error-prone, slow, and confusing. | Data & Analytics |
sdxCentral - Gartner Crowns Fortinet, Palo Alto Networks, Check Point Network Firewalls Leaders | The firm noted network firewalls are evolving into hybrid-mesh firewalls with the emergence of cloud firewalls and firewall-as-a-service (FWaaS) offerings. It expects more than 60% of organizations will have multiple firewall deployments by 2026, while new deployments of FWaaS distributed branch-office firewalls will increase from 10% this year to 30% by 2026. | Network Management |
Techstartups - Okta source code stolen as a result of GitHub repositories hack. Was remediation possible? | Okta’s source code has been stolen by malicious actors earlier this month. Security experts from GitProtect.io, a GitHub backup vendor advise stopping underestimating attacks on cloud environments, and DevOps or SaaS tools. The end of the year is the perfect time for an examination of conscience on cybersecurity. | Security |
AiThority - Oracle Scores Highest in All Use Cases in 2022 Gartner Critical Capabilities for Cloud Database Management Systems for Operational Use Cases | As the industry’s first and only self-driving database, Oracle Autonomous Database runs natively on Oracle Cloud Infrastructure (OCI), and can automatically secure highly available databases, configure and optimize for specific workloads, and scale resources when needed. | Data Management |
Network World - What is Zero Trust Network Architecture (ZTNA)? | To allow employees to access network resources, a Zero Trust architecture requires a combination of technologies, including identity management, asset management, application authentication, access control, network segmentation, and threat intelligence. | Security |
Computerworld - Why enterprises should embrace remote work in 2023 | The lesson is that even in traditional in office workplaces, management needs to lean toward goal-based management, not observation-driven response. | Automation & Productivity |
AiThority - Conduent Customer Experience Management Data Analysis: Technology Consumers Remain in Chat Channel | According to analysis from Conduent Incorporated, a global technology-led business process solutions company, customer service via chat grew from 14% of all interactions in January 2020 to 30% in January 2022 and remained at around that level through October 2022. | Automation & Productivity |
Blocks & Files - Having an efficiency standard like SNIA’s is good. But what about public cloud? | Comment: The Emerald energy initiative from the SNIA holds great promise to better measure storage efficiency and lower carbon emissions, but it’s missing a public cloud storage element, and that can only come with the cooperation of the big three hyperscalers. | Data Storage |
AiThority - 5G Network: Challenges (& Solutions) for Emerging Businesses in 2023 | The 5G technology is an improved version of the 4G LTE technology. 5G promises fast speed, bandwidth, and low latency, but it has more to give that could bring revolutionary changes, and every sector is anxious to deploy this unrivaled technology to reap considerable benefits and gain a competitive advantage. | 5G |
Computerworld - Why it makes sense for Apple to join the ‘Fediverse’ | Of course, those companies that are prepared to make investments in content moderation can offer customers the chance to join them there while also shouldering some of the costs of this kind of decentralized network — a customer-focused decision that would probably deliver more bang per buck than the ads budget on soc-med. | Social Media |
AiThority - cnvrg.io ML Insider 2022 Survey Reveals AI Investment will Increase Despite Economic Recession | Organizations are increasingly confident in the value of AI, with 89% of organizations benefitting from their AI solutions. However, AI maturity still remains low. Over 57% of respondents are running less than 5 machine learning models in their product and 14% do not have AI implemented in their organization at all. | Artificial Intelligence |
Network World - More work for admins: When labor-saving management tools don't ease workloads | For example, with the new platform in place, management may require network staff to enter more information related to a ticket’s context and resolution into a knowledge bank, or to layer on additional customer-centric tasks akin to “Would you like fries with that?” and not directly related to the tickets per se, or even the kinds of work originally targeted for automation and labor-savings. | Automation & Productivity |
sdxCemtral - SASE Posts Another Healthy Quarter Headed Into the New Year | “SASE deployed,” or what some call unified SASE – refers to the actual deployment of a full suite of SASE-related products and services by a single vendor – or the extent to which customers are using a single vendor to provide all of the SASE-related products and services they need rather than piecing together a solution from multiple vendors. | Security |
AiThority - Seerist Releases White Paper on Turning Infinite Data Into Insightful Risk and Threat Strategies | This white paper was written to demonstrate how leaders can better leverage global data to make more informed, strategic decisions by combining the power of machine learning, human analysis, and natural language capabilities. | Data & Analytics |
sdxCentral - Forrester Wave Shows 'Intense' Cloud Competition in Data, Analytics | The market research firm’s Q4 2022 report on public cloud development and infrastructure platforms concluded hyperscalers’ “sheer breadth of offering might best align with the needs of large enterprises and big government agencies,” however, “other cloud providers can succeed with more discrete approaches to the market around data, analytics, development, and integration,” Sustar wrote. | Cloud |
The Hacker News - Cybercrime (and Security) Predictions for 2023 | With the rapid modernization and digitization of supply chains come new security risks. Gartner predicts that by 2025, 45% of organizations worldwide will have experienced attacks on their software supply chains—this is a three-fold increase from 2021. Previously, these types of attacks weren't even likely to happen because supply chains weren't connected to the internet. But now that they are, supply chains need to be secured properly. | Security |
Network World - Data center networking trends to watch for 2023 | Hybrid and multicloud initiatives will continue to shape enterprise IT in 2023, and the impact on data-center networking will be felt across key areas including security, management, and operations. Network teams are investing in technologies such as SD-WAN and SASE, expanding automation initiatives, and focusing on skills development as more workloads and applications span cloud environments. | Tech Trends |
Datanami - Ahana Cofounders Make 2023 Data Predictions | End user experience becomes a top priority: As deep integrations of data platforms become standard, the reduced complexity will usher a focus on end user experience. The data platform will become abstracted even further to end users. Instead of worrying about the underlying engines and data structures, end users will be able to easily and seamlessly leverage powerful underlying engines for interactive, batch, real-time, streaming and ML workloads. | Data & Analytics |
sdxCentral - MEF Reveals Standard Framework to Counter SASE Confusion | “The SASE vendor ecosystem is fragmented with a lack of common terminology,” Hubbard wrote. “Organizations are challenged to compare SASE feature sets and solutions resulting in confusion that can lead to incomplete service offerings that don’t meet needs and expectations.” | Security |
Network World - How to reduce 2023 network costs: The cloud | It used to be that they believed cost reductions could be achieved with new technologies like hosted router software or white-box devices, but this year they reported concerns that integration costs and risks were too high. | IT Management |
AiThority - New Research Looks at the Future of ChatGPT and Generative AI in the Enterprise | “Whether ChatGPT thinks it’s a gimmick or not is irrelevant if there are no concrete use cases for the tool,” says Roberts. “Fortunately for OpenAI and others operating in this space, many generative AI use cases exist, including enterprise support, customer interactions, and even new product development.” | Artificial Intelligence |
Grading our 2022 enterprise technology predictions | We’re closely watching the vendor consolidation trend in 2023. According to a recent Palo Alto Networks survey of 1,300 SecOps pros, on average, organizations have more than 30 tools to manage, and reducing those is a logical way to optimize costs. | Tech Trends |
Computerworld - GPT: High-tech parlor trick or the first real AI for everyday use? | As James Kobielus has written for our sister site InfoWorld, Microsoft has its DeepSpeed and Google its Switch Transformer, both of which can process 1 trillion or more parameters (making GPT-3 look primitive by comparison). | Automation & Productivity |
AiThority - Tips for Bringing Cloud Costs Down to Earth | According to analysts at IDC, cloud costs and spending will drop a full two points this year. KPMG research has found nearly 70% of US tech leaders say they’ve yet to see a significant return on cloud costs or investments. In a McKinsey survey, 75% of respondents said they had exceeded budget on their cloud migration process, with roughly 40% admitting they were also behind schedule. | Cloud |
Network World - Ransomware: It’s coming for your backup servers | The attackers might try to directly access your backup data over the network via NFS or SMB, and if they can—and it's unencrypted—their job is done. If they can’t, they go directly at the operating system of the backup server using a system exploit or compromised credentials to gain Administrator/root access. | Security |
AiThority - Socure Named a Leader in Inaugural Identity Verification Solutions Report by Independent Research Firm | Socure has built the industry’s most comprehensive and accurate identity-verification graph. To deliver the highest-assurance assessments of consumers in the market, Socure analyzes and correlates every facet of a digital identity while utilizing over 17,000 features, 8 billion rows of data, and a continuous feedback loop of decision outcomes from 1,400+ customers. | Security |
Datanami - Elastic Recognized as a Leader in Security Analytics by Independent Research Firm | Far and away, Elastic’s data visualizations steal the show. Graphs are infused throughout the offering and can be made on the fly in many areas of the product, including while querying and case notes. | Data & Analytics |
Blocks & Files - Why hybrid data storage needs a single managed console | This situation also leaves key datasets largely locked into the infrastructure where they were generated and/or first stored. Moving all data into one, cohesive data repository, so it can be analysed to inform business decisions, becomes clunky. | Data Storage |
Datanami - Tamr Announces Research Findings on Enterprise Data Initiatives for 2023 | Becoming data-driven is an imperative for any modern business that desires digital transformation. While more organizations are becoming data-driven, many still face enormous challenges in mastering their core data because it is incorrect, incomplete, out-of-date, duplicative or siloed, which makes it unreliable and difficult to use. | Data Management |
sdxCentral - Evaluating the Edge Computing Vendor Landscape | The current vendor landscape includes providers of data center services, content delivery network (CDN) edge services, edge analytics and machine learning (ML), edge communications infrastructure, edge management and orchestration, vertical industry edge solutions, edge data management, edge computing server solutions, and IoT platforms. | Edge Computing |
Digital Information World - New Research Raises Alarm Against Advertising Tool That Exposes Users’ Data To Twitter | The news comes through a new study by researchers that have uncovered the ordeal which might be exposing the likes of various firms, governments, and even users to so many security risks linked to the digital social network. | Data Privacy |
AiThority - AI Adoption Requires Strong Governance Through Ethical and Risk Management Frameworks, Says Info-Tech Research Group | There is no one-size-fits-all AI governance structure. As such, Info-Tech encourages organizations to identify roles and responsibilities at strategic, tactical, and operational levels; establish an AI governance council; and identify all groups supporting AI initiatives. | Artificial Intelligence |
SiliconANGLE - How Palo Alto Networks became the gold standard of cybersecurity – and what it has to do to stay on top | The company’s architectural approach was to do the heavy lifting in the cloud. This eliminates the need for customers to deploy sensors or proxies on-premises. Same with sandboxes on-prem, which can be vulnerable to overwhelming attacks. Think about it: If your sandbox is on-prem, it’s not getting updated every day — no way. Or even every week. | Security |
Network World - Gartner: Top trends to know for infrastructure and operations in 2023 | “SASE allows users to connect to applications in a secure fashion and improves the efficiency of management. I&O teams implementing SASE should prioritize single-vendor solutions and an integrated approach.” | Tech Trends |
The Hacker News - Researchers Detail New Attack Method to Bypass Popular Web Application Firewalls | The generic bypass "involves appending JSON syntax to SQL injection payloads that a WAF is unable to parse," Claroty researcher Noam Moshe said. "Most WAFs will easily detect SQLi attacks, but prepending JSON to SQL syntax left the WAF blind to these attacks." | Security |
Computerworld - Tech layoffs in 2022: A timeline | While enterprise IT spending is still forecast to grow over the next year as companies use tech to battle expected recession, bright spots offered by enterprise spending on cloud infrastructure and SaaS applications hasn't been enough to completely lighten the overall picture for tech industry giants. | Tech Jobs |
Blocks & Files - Resilience? We’ve heard of it. Forrester data durability study shows Big 3 are ahead | It defines data resilience as the capability to back up and secure data in hybrid on-premises/public cloud environments supporting SaaS and container environments. Products or services should secure the backup infrastructure from cyberthreats, recover from failure, navigate shared-responsibility models for hosted services, and address data privacy and sovereignty concerns. | Data Management |
AiThority - 67% of Companies Admit They Have Lost Deals Because of Low Confidence in Their Security Strategy, According to Research from LogRhythm | Respondents overwhelmingly indicated that customers and partners are demanding higher standards, highlighting that security has evolved beyond internal consideration. Ninety-one percent reported that their company’s security strategy and practices must now align to customers’ security policies and standards. Partners also exert a new level of due diligence with 85% of respondents stating their company must provide proof of meeting partners’ security requirements. | Security |
sdxCentral - Networking Vendors Misuse Language, Mislead End Users, Gartner Says | Lerner highlighted five key areas of network innovation from Gartner’s point of view: universal zero-trust network access (ZTNA), NetDevOps, multi-cloud networking software, network-as-a-service (NaaS), and secure access service edge (SASE). | Network Management |
Datanami - Privitar: Majority of Data Leaders Unable to Use More than 40% of Data Due to Security and Privacy Concerns | While the data that is available to those surveyed is readily accessible (84% can receive data in less than a week), this represents only a fraction of the data they need to access to drive innovation. In reaction, more than two-thirds (70%) of respondents currently have or plan to invest in a data privacy solution within the next year. | Data & Analytics |
ZDNet - What is ChatGPT and why does it matter? Here's what you need to know | The language model can answer questions, assist you with tasks such as composing emails, essays and code. Usage is currently open to public free of charge because ChatGPT is in its research and feedback-collection phase. | Automation & Productivity |
sdxCentral - Blockchain in Telecom Market Set to Soar Through 2028 | An earlier research from GlobalData’s suggested global executives discerned blockchain as hype – if they understood it at all. But telecom’s enterprise adoption has gained significant traction throughout the year with carriers like Verizon adopting it for dispute management and newly public XNET looking to establish itself as a multi-service blockchain mobile network operator (MNO). | Blockchain |
Datanami - Lack of Data Capabilities Impedes Organizations’ Success, Global Survey Finds | "We must move from ‘cloud first’ to ‘data first’ as the North Star of digital transformation – meaning that organizations align their strategic, organizational and technological choices with the overarching goal of leveraging data as a strategic asset.” | Data & Analytics |
sdxCentral - Addressable SASE Market Worth 'Tens of Billions,' Futuriom Reports | SASE is part of a larger movement toward consolidating tools and integrating them with cloud architectures, Futuriom said, as the framework provides an opportunity for “integration of many security functions, to provide more secure cloud and remote access, and replace traditional virtual private networks (VPNs).” | Security |
SiliconANGLE - Deloitte identifies trust as a common theme in its 2023 Tech Trends | Deloitte’s 2023 trends can be split into two subsets, the first of which is enduring realities. These pioneering and innovative trends are being driven by advancements in interaction, information and computation, Deloitte says, and are focused on how trust influences enterprise risk, human-computer interaction and the integrity of data. | Tech Trends |
Blocks & Files - Atempo foresees structured data explosion | He said he ”sees the structured and unstructured worlds converging with a need for unified storage.” That means a single piece of storage software will be able to handle blocks, files and objects, as Ceph does today. | Data Storage |
Datanami - Scality Announces Its Data Storage Predictions for 2023 | Scality’s forecast considers how big data storage solutions will evolve to meet these challenges, including how data security will remain a key storage industry driver, and how the Three I’s — intelligent features, innovation, and integration — present new hope for data center efficiency and effectiveness. | Data Storage |
AiThority - UJET Research Reveals Chatbots Increase Frustration for 80% of Consumers | 78% of consumers were forced to connect with a human after failing to resolve their needs through an automated service channel. | Automation & Productivity |
SiliconANGLE - The new reality: Cybersecurity firms revert to the mean | In this Breaking Analysis, we explain how cybersecurity trends are reverting to the mean and tracking more closely with other technology investments. We’ll make a couple of valuation comparisons to show the magnitude of the challenge and which cyber firms are feeling the heat, and which aren’t as much. | Security |
Computerworld - How many jobs are available in technology in the US? | In November, US tech companies added 14,400 workers, and tech jobs in all industry sectors grew by 137,000 positions, according to a new report from CompTIA. | Tech Jobs |
sdxCentral - Palo Alto Networks on Managed SASE Requirements | Ronco said the first requirement for a managed SASE service is “single screen, cloud-based management.” Enterprises can choose to build their own integrations for these management portals, but regardless, “management needs to be extremely flexible and needs to enable fully managed and co-managed services.” | IT Management |
Computerworld - JumpCloud hits AWS marketplace as Apple's enterprise market grows | “When it comes to matters of IT, companies want to make it easier to manage all their assets in one place, and that means focusing on identity first,” said Tom Bridge, JumpCloud’s Principal Product Manager, Apple. "In the past, this meant looking at Windows machines. But that model is not applicable anymore." | IT Management |
SiliconANGLE - Five top takeaways from AWS re:Invent 2022 | I believe this process of taking internal apps and launching them as SaaS services will become standard practice for AWS. Future apps could include procurement, HR, expense management or anywhere else AWS feels it has an advantage. | Automation & Productivity |
Blocks & Files - Forrester’s translytical neologism and rankings – with Oracle on top | The characteristics of such software products include optimization for both reads and writes, distributed in-memory architecture, multi-model, advanced workload management, AI/ML, and cloud architectures to support modern workloads. Example workloads are real-time integrated insights, scalable microservices, machine learning (ML), streaming analytics, and extreme transaction processing. | Data & Analytics |
Blocks & Files - Web3 storage is not ready for enterprise backup | "There are many downsides and upsides for each network architecture, however, the biggest benefit of decentralized systems is – from my point of view – censorship resistance. Due to the lack of a central authority that controls everything, decentralized networks cannot censor or de-platform anyone due to their race, sex, age, etc." | Network Management |
sdxCentral - AT&T Security AVP on Zero-Day Exploitation, Log4Shell, SBOM | As the first anniversary of the discovery of Log4Shell (Log4j) vulnerabilities approaches, AT&T AVP of Security Jennifer Morovitz discussed the broad impact of this zero-day threat and how it brought more attention to software bill of materials (SBOM) in an interview with SDxCentral. | Security |
ZDNet - We are still failing to learn the most important lesson in cybersecurity. That needs to change, fast | The alert came after an investigation into a cyberattack against what CISA and the FBI describe as a 'federal civilian executive branch' organization. If a government body can't plug the security holes correctly, then what chances do other organizations have? | Security |
sdxCentral - What Problem Is the Metaverse Solving? | The metaverse has been oscillating between hype and happening in recent months. While it was deemed a major disruptive technology during a Gartner IT Symposium 2022 keynote, opposing concerns about network demands, from 5G to fiber, as well as its social impact keep its future clouded in opacity. | Metaverse |
AiThority - Prestige Ransomware Attack Highlights Need to Update Cyber Security | The author then cites increasingly sophisticated methods, and a focus on healthcare and infrastructure, among other patterns that have emerged. He continues by urging best practices for credentials, including least privilege and zero trust policies. He concludes the article by encouraging the proper configuration of security tools. | Security |
TechStartups - ChatGPT: Here’s why everyone is talking about OpenAI’s new chatbot that does almost everything—from writing codes, and telling stories to engaging in conversations | For now, the ChatGPT is currently free to use with an OpenAI account during a testing phase. Unlike the GPT-3 model found in OpenAI’s Playground and API, ChatGPT provides a user-friendly conversational interface and is designed to strongly limit potentially harmful output. | Artificial Intelligence |
Blocks & Files - Cirrus Data and the next frontier: Moving SAN blocks to the cloud | With software like Pure’s Cloud Block Store the cloud destination can have a familiar on-prem SAN array interface. Vendors like Dell, with Project Alpine, and HPE are moving their block array software to the cloud. That provides a familiar SAN environment across the on-prem and cloud worlds for many of the installed SANs. | Cloud |
CSO - Researchers found security pitfalls in IBM’s cloud infrastructure | Developed by researchers from security firm Wiz, the attack combined a privilege escalation vulnerability in the IBM Cloud Databases for PostgreSQL service with plaintext credentials scattered around the environment and overly permissive internal network access controls that allowed for lateral movement inside the infrastructure. | Security |
The Hacker News - What the CISA Reporting Rule Means for Your IT Security Protocol | CISA's rule will enforce fast reporting, which will probably move organizations to speed up investigation and response, so initial reports are timely while showing mitigating actions. The rule will likely result in frequent reporting as the broader list of incidents includes scans and attempted incidents, not just successful intrusions. | Security |
sdxCentral - Versa Networks Bests Cisco in New Cloud Firewall Evaluation | Non-profit CyberRatings.org completed an independent test of eight security vendors in its first cloud network firewall comparative evaluation. Forcepoint, Fortinet, Juniper, and Versa Networks’ achieved the highest ‘AAA’ rating, while Cisco fell short with a ‘CC’. | Cloud Security |
Network World - Is SASE right for your organization? 5 key questions to ask | The leading SASE vendors are a mix of networking incumbents and well-funded startups. These include Cato Networks, Cisco, Fortinet, HPE, Palo Alto Networks, Perimeter 81, Versa, VMware, and Zscaler. | Security |
sdxCentral - Op-Ed: Security Companies Cannot Escape Economic Downturn | Dell’Oro Group Research Director Mauricio Sanchez echoed Winckless in that even though large security companies have deep pockets, they don’t necessarily pivot faster than some of the pure players that focus on specific facets of the environment. “There’s still a lot of runway for startups to continue to innovate and at least execute [ahead of] the larger ones,” he said. | Security |
CSO - Software projects face supply chain security risk due to insecure artifact downloads via GitHub Actions | To attack a vulnerable project’s CI/CD pipeline that downloads and uses artifacts generated by other workflows, attackers only need to fork the repositories containing those workflows, modify them in their local copies so they produce rogue artifacts and then make pull requests back to the original repositories without those requests having to be accepted. | Security |
Blocks & Files - Web3 storage needs to ditch cryptocurrency | Second, the need for blockchain processing is another thing that will hold Web3 storage back. This distributed ledger idea is computationally intensive and time-consuming. Traditional storage does not bear this computational burden. | Web3 |
AiThority - 9 out of 10 Security Leaders State That Control Failures are the Primary Reason for Data Breaches | Incidents that should have been stopped by an expected control followed closely, with 68% exasperated by this inability to stop preventable breaches. Respondents also pointed to issues with data and tooling as a bigger driver for security team resignations than demands for higher salary and greater seniority. | IT Management |
Blocks & Files - Coldago finds no leaders among unstructured data suppliers | We consider for this report only unstructured data for open systems for enterprises around various solutions capabilities such as analytics, data movement, security, governance and compliance, product architecture and management, media, systems and devices support. | Data Management |
Network World - 5 DNS services to provide a layer of internet security | Because there are so many DNS services available, only those that provide some type of automatic or preconfigured content filtering are discussed here with a description of what the user sees sent when the filter kicks in, which can range from a boring ,"This site can’t be reached," page to customizable block page. | Network Management |
Datanami - BigDATAwire (Formerly Datanami) Reveals Winners of 2022 Readers’ and Editors’ Choice Awards | “Navigating the world of big data isn’t easy these days, as the number of players has skyrocketed,” said BigDATAwire Managing Editor Alex Woodie. “That’s why the Readers’ Choice Award is so valuable, as it signals which products have met the ultimate test: Adoption by real-world users. Congratulations to all the winners of the 2022 Readers’ Choice Awards!” | Data Management |
Network World - Data-center requirements should drive network architecture | The data center is now a lot more dynamic than it used to be, which means the data-center network has gotten a lot more agile, more elastic. We have “horizontal” traffic between application components and “vertical” traffic between applications, cloud front-end GUIs, the internet, and users. We have a dynamic fabric. | Network Management |
ZDNet - Tech in 2023: 6 new priorities for your shortlist | "I remember when cloud came and everybody was asking: 'What's cloud?' We can't take as long as it took to get things going with the cloud. With the metaverse, we have to get our act together. We have to understand it and start to test and see how that technology might make a difference to us." | Tech Trends |
Blocks & Files - Analyst reports major NAND market contraction | The NAND market shrank by almost a quarter in the third quarter, according to TrendForce, hit by plummeting demand as consumers bought fewer PCs and phones with server sales declining as well. | Tech Trends |
sdxCentral - Zero-Trust Management a Big Corp Challenge, Perimeter 81 Finds | It found that 14% of the respondents from larger companies (more than 1,000 employees) selected zero-trust policy implementation as the top five security challenges for 2021, while 8% of those from organizations with 50 to 499 employees made the same choice. | Security |
AiThority - Expert Web Developers Weigh In On The Pros & Cons Of A Single-Page Website | There are now 4.32 billion mobile internet users as of 2021, which is over 90% of the global internet population, as per Statista. The average mobile-only user, BrightLocal reported, views only 1.88 pages per session. Single-page websites have been an emerging trend in web development, coinciding with the continued increase in mobile usage. | Tech Trends |
SiliconANGLE - Cloud marketplaces transform how business software is bought and sold | Cloud marketplaces, which are listings of complementary products and services that buyers can purchase from companies they do business with – grew at more than seven times the rate of total business-to-business e-commerce sales in 2021, according to Vertical Web Media LLC. | IT Management |
sdxCentral - Telecom May Land Top Engineering Talent Amid Tech Layoffs | Additionally, Karat’s insight found that the hiring close rates for large enterprises within sub-sectors such as telecom and banking are surpassing those from hyper-growth and start-up companies for the first time in several years. | Tech Jobs |
AiThority - The Electronic Medical Records Market Sees A Rising Adoption Of The Natural Language Processing Techniques By The Business Research Company | NLP techniques are used in EHRs to capture unstructured data, analyze the grammatical structure, determine the meaning and summarize the data. As a result, NLP approaches can cut costs, while thoroughly extracting large amounts of data analytics information. | Data & Analytics |
Gartner Debunks Cloud Strategy Confusion | Even though data centers are the physical locations that make up what’s known as the cloud, Gartner warns against confusing a data center strategy with a cloud strategy. Organizations need to keep these separate while ensuring they’re aligned together “because that affects the role that cloud computing will play in their organization, | Cloud |
Network World - 10 most powerful network management companies | A single platform that does it all probably doesn’t exist. But we’ve identified 10 leading vendors that are working hard to get there. This subjective list is weighted heavily in favor of vendors with broad platforms, rather than point products, and with vendors that have demonstrated an intention to aggressively expand their portfolio of capabilities rather than stand pat in a particular niche. | Network Management |
ZDNet - Three tech trends on the verge of a breakthrough in 2023 | Finding ways to make cloud usage more efficient and cost effective are likely to be key considerations next year – although IT budgets will be rising, that doesn't mean there is room for waste. Indeed, it's heartening to see that sustainability is again rising up the agenda for many tech organisations, something that we're likely to see more of in 2023 and beyond. | Tech Trends |
sdxCentral - Verizon’s ‘Critical Components’ to Getting SASE Right | The SASE architecture combines network edge capabilities like SD-WAN and a set of security capabilities Gartner dubbed the security services edge (SSE) – a cloud-delivered suite that includes zero-trust network access (ZTNA), cloud-access security broker (CASB), secure web gateway (SWG), and firewall-as-a-service (FWaaS). | Security |
AiThority - Predictions Series 2022: AiThority Interview with CXOs at Aryaka, a Leader in SASE Solutions | As zero trust grows in importance and delivers tangible value in keeping enterprise networks secure, it will lead to a better understanding of zero trust as a model among decision makers. This shared understanding will lead to further, more meaningful implementation through multiple layers of enterprise networks. | Tech Trends |
ZDNet - Remote work is here to stay. So why is everyone still getting it so wrong? | Much more successful was a "hybrid-flexible" setup, offering leaders and employees the opportunity to choose where they work from. | Automation & Productivity |
ZDNet - Tech in 2023: Here's what is going to really matter | A digital immune system (DIS) uses a variety of techniques – including AI-augmented testing and software supply chain security – to improve the quality and resilience of business-critical systems. | Tech Trends |
SiliconANGLE - Organizations pay increasing amounts each year to address cybersecurity incidents | Topping the findings is that organizations are paying a “hefty” $1,197 per employee each year to address successful cyber incidents across email services, cloud collaboration apps, services and web browsers. On average, that means a 500-employee company is spending an average of $600,000 annually. | Security |
sdxCentral - Gartner Identifies Major Cloud Strategy Mistakes | The analyst firm defines cloud strategy as a single, concise perspective on cloud computing‘s role in an organization. A solid cloud strategy should be a short, consumable, 10- to 20-page document or slide deck, and it should be driven by the broader business strategy. | Cloud |
Datanami - Almost Two-Thirds of Organizations Suffer from ‘Data Drift’, Mindtech Survey Reveals | When it comes to attitudes towards synthetic data, 85% of organizations are already making use of synthetic data to train computer vision systems, and feel that quality (65%), simplicity (61%), scalability (58%), faster training times (55%), and cost (52%) are the main strengths of adopting synthetic data. | Data Management |
Blocks & Files - MinIO boss: Times are going to get very tough for appliance vendors | The early evidence is powerful – both Snowflake and Microsoft will GA external tables functionality in late 2023. Now companies will be able to leverage object storage for any database without ever needing to move those objects directly into the database; they can query in place. | Data Storage |
sdxCentral - How Cloud Transformation Can Impact Zero-Trust Deployment | The reason why we say it’s an opportunity is the cloud is set up to be able to enforce zero-trust controls at scale across the smallest level of detail if you automate it and put it in place, but if you don’t, then it creates all these holes in your environment that you can’t rely on your traditional perimete | IT Management |
SiliconANGLE - Why a recession is great for companies with high cloud computing bills | Cloud workloads change constantly. Those that were once mission-critical may no longer be. Or, you may have invested in certain types of workload configuration – such as mirroring workloads across multiple cloud regions in order to increase reliability – that are no longer necessary because the requirements of the workloads have changed. | Cloud |
ComputerWeekly - C-suite mystified by cyber security jargon | Although the C-suite are now keenly aware of the threats to their organisation, and how often they are attacked, many struggle to understand the terminology that cyber security professionals would consider everyday language, but to them sounds more like jargon. As a result, many are struggling to prioritise appropriate action on cyber issues, a new Kaspersky report has found. | IT Management |
sdxCentral - IDC Study Puts DIY SD-WAN Difficulties on Display | Respondents in the GTT-sponsored study cited difficulties related to hiring and retaining a skilled in-house workforce, keeping up with technology developments, and the ability to “negotiate favorable terms with technology vendors” as challenges they faced when taking a do-it-yourself (DIY) approach to SD-WAN. | Network Management |
ZDNet - Cybersecurity, cloud and coding: Why these three skills will lead demand in 2023 | According to Hepburn, even with the threat of a recession weighing heavy on business leaders' minds, skilled IT security staff are something employers can't effort to skimp on in 2023. "Leaving an organisation vulnerable to cyber-attacks also leaves it open to operational dysfunction, loss of earnings and significant reputational damage, | Tech Jobs |
Computerworld - What Amazon, Twitter, Meta, and others got wrong with layoffs | The flury of high-profile tech layoffs in recent months belies the fact that the unemployment rate for tech workers is around 2.3%. What those companies got wrong — their hiring strategy. | Tech Jobs |
TechRepublic - Google Cloud looks forward to confidential computing but eyes hardware changes | “Confidential computing is really the method by which a cloud vendor or a host environment can tie its own hands,” said Brent Hollingsworth, director of the Epyc software ecosystem at AMD. “They can prevent themselves from being able to see data at a fundamental level in a way they were not previously able to do.” | Cloud |
SiliconANGLE - Luna Moth ransomware group invests in call centers to target individual victims | Luna Moth, however, has evolved in that it has done away with the malware portion of the attack, instead using legitimate and trusted system management tools to interact directly with a victim’s computer to exfiltrate data to be used for extortion manually. By using legitimate tools, Luna Moth can ensure the activity isn’t detected as malicious and hence unlikely to be flagged by traditional security products. | Security |
sdxCentral - Forrester: The Metaverse Doesn't Exist — Yet | While the Metaverse Standards Forum established this year is attempting to orchestrate this interoperability, relying on over 1,500 members to submit standards for adoption, “Unfortunately, without consistency — and with a notable lack of Apple in the Forum (expected to release its XR device in 2023) — things will continue to rely more on de facto standards like the Unity and Unreal engines,” | Metaverse |
Computerworld - The future of security: smarter devices that protect themselves | Jamf already has a security solution for Macs that shows this direction of travel, called Jamf Protect. It can detect threats, monitor compliance, and automatically respond to some security incidents. When it was introduced in 2019, it showed a future for security protection. | Security |
ZDNet - Microsoft: Hackers are using this 'concerning' tactic to dodge multi-factor authentication | In these attacks, the attacker compromises a token issued to someone who's already completed MFA and replays that token to gain access from a different device. Tokens are central to OAuth 2.0 identity platforms, including Azure Active Directory (AD), which aim to make authentication simpler and faster for users, but in a way that's still resilient to password attacks. | Security |
Computerworld - Offboarding processes pose security risks as job turnover increases: Report | Research from YouGov finds that poor offboarding practices across industries including healthcare and tech are putting companies at risk, including for loss of end-user devices and unauthorized SaaS application use. | Security |
Network World - Cisco study: Network teams look to SDN, automation to manage multicloud operations | “For the first time, agility and business performance have overtaken cost and network management as the key concerns for IT teams, with 42% of respondents citing a more agile development environment as their top reason for moving to multiple clouds,” | Network Management |
Computerworld - How intelligent automation will change the way we work | Incorporating cognitive technologies with business process automation can bring significant gains in efficiency, revenue, and customer satisfaction — if it’s done right. Here’s how companies should approach automation and how workers can keep up. | Automation & Productivity |
Datanami - Infosys Report: Over $460B Incremental Profits Possible with Better Data and AI Practices | According to new research from the Infosys Knowledge Institute, the thought leadership and research arm of Infosys, companies can generate over $460 billion in incremental profit if they do three things: improve data practices, trust in advanced AI, and integrate AI with business operations. However, despite high expectations for data and artificial intelligence (AI), most companies fail to act on these areas to convert data science to business value. | Data Management |
ZDNet - Technology spending will rise next year. And this old favourite is still a top priority | White suggests the explanation for this growth is that digital transformation projects during the past two years have stimulated executives' interests in technology. | IT Management |
Datanami - IDC FutureScape: Top 10 Predictions for the Future of Digital Innovation | The rate of innovation in organizations with excellent enterprise intelligence was on average 2.5x faster than organizations with poor enterprise intelligence, according to IDC’s August 2021 Future of Intelligence Survey. Getting the data and analytics equation right, however, will require partnerships, rigor, efficiency, and ethics – all areas that are addressed in IDC’s Future of Digital Innovation predictions. | Digital Transformation |
TechRepublic - Top cybersecurity threats for 2023 | Going into 2023, cybersecurity is still topping the list of CIO concerns. This comes as no surprise. In the first half of 2022, there were 2.8 billion worldwide malware attacks and 236.1 ransomware attacks. By year end 2022, it is expected that six billion phishing attacks will have been launched. | Security |
sdxCentral - Gartner Reports Disruption-Proof Sustainability Investment On the Rise | As organizations migrate their workloads to multi-cloud environments and adopt cloud-native architectures like microservices and containers, they’re promised and often realize sustainability savings in areas like energy or water usage. | Sustainability |
AiThority - New Report from Common Sense Media Evaluates the Privacy Policies of the Most Popular Virtual Reality Headsets on the Market | The report, “Privacy of Virtual Reality: Our Future in the Metaverse and Beyond,” examines the privacy trends and practices of seven of the top VR devices and found that none of them meet the minimum privacy and security requirements recommended to keep kids safe. | Privacy & Security |
sdxCentral - IonQ CTO Compares Cloud-Based vs. On-Premise Quantum Computing | The platform uses Dell EMC PowerEdge R750xa servers paired with IonQ’s simulation engine, quantum processing unit (QPU), Aria software, and its cloud-based quantum computing capabilities. | Quantum Computing |
ZDNet - Hiring or firing? Why job cuts at big tech don't always show the full picture | CompTIA's analysis, which is based on data from the US Bureau of Labor Statistics, found that overall employment in tech has grown by 193,900 workers in 2022 so far – a healthy 28% higher than this time last year. | Tech Jobs |
Network World - World’s fastest supercomputer is still Frontier, 2.5X faster than #2 | Without any increase in its speed—1.102EFLOP/s—Frontier still managed to score 2.5 times faster that the number two finisher, Fugaku, which also came in second in the June rankings. An exascale computer is one that can perform 1018 (one quintillion) floating point operations per second (1 exaFLOP/s). | Automation & Productivity |
sdxCentral - Microsoft Gets Technical on Cloud Sustainability Guidance | Customers have made it clear that environmental sustainability is a business imperative by asking Microsoft how to achieve and prepare for the evolving cast of sustainability requirements, incentives, and regulations, Taylor explained. And in terms of sustainable cloud infrastructure, the most common concerns center around lowering energy usage and costs, but carbon emissions as well. | Sustainability |
Computerworld - Q&A: RPI president says CHIPs Act will spur quantum computing, next-gen tech | Intel, Samsung, TSMC, and others have been executing plans for new domestic computer chip development and manufacturing plants, but those efforts are running into a new headwind: there aren't enough high-tech workers. | Quantum Computing |
ZDNet - Employers want tech skills, but you don't have to be a developer to get a better job | Demand for data scientists and data analysts are growing rapidly because of the unique skillsets these individuals possess, but even learning how to use basic reporting software to generate insight can impress managers and increase a candidate's hireability. | Tech Jobs |
Ermetic - IBM Cost of a Data Breach 2022 – Highlights for Cloud Security Professionals | By understanding how much the cost of a data breach can impact one's organizational budget, it's easier -- and more productive -- to engage in conversations about the impact of breaches and actions to take to avoid them. It will also help security teams show they are a business enabler and how implementing security controls can save money that can be applied to the business productively. | Security |
ComputerWorld - Jamf Q3 data confirms rapid Mac adoption across the enterprise | Macs accounted for 13% of all PCs sold, “the highest Mac share on record,” he said. His company continues to believe the Mac will become the dominant enterprise endpoint by 2030. | Tech Trends |
sdxCentral - Forrester: The Shift to Cloud Drives Zero-Trust Edge Adoption | The components for zero-trust edge include secure web gateway (SWG), SD-WAN, cloud access security broker (CASB), and zero-trust network access (ZTNA). Mullins noted some vendors in the market already offer “full-service” solutions that have all those elements. | Security |
AiThority - InRule Technology Enhances Bias Detection, Empowering Greater Explainability and Lower Risk for Enterprise Machine Learning | This report provides unparalleled explainability and empowers users to swiftly assess models for harmful bias to prevent undesirable performance for individuals with protected characteristics, such as age, race, religion, etc. | Machine Learning |
sdxCentral - IBM GM on Optimizing Enterprise Network Management | The move came as NTT released its 2022 Global Network Report which found ubiquitous dissatisfaction with current network capabilities among enterprise leaders – with cybersecurity and private 5G as central factors driving the move to modernize. | Network Management |
CSO Magazine - Researchers show techniques for malware persistence on F5 and Citrix load balancers | From an attacker's perspective, this limitation makes compromising networking devices in a persistent way much harder, which is why mass attacks against home routers, for example, involve automated botnets that periodically rescan and reinfect routers that have been restarted. | Security |
sdxCentral - Dell'Oro Says Demand for 400G Routers Rising Rapidly | According to Peev, 400 Gb/s technology will lead the “next phase of internet backbone expansion” because the internet backbone includes traffic from both cloud and telco service providers, and transports traffic from mobile and broadband service networks and cloud infrastructure. | Network Management |
VentureBeat - Tim Berners-Lee shares his vision of a collaborative web | Now Berners-Lee is working on a new data-sharing standard called Solid that could help deliver on the initial vision, and a company, Inrupt, to help commercialize this vision. He cautions that this new Web 3.0 vision for giving back control of our data differs wildly from current Web3 efforts built on less efficient blockchains. | Web3 |
SiliconANGLE - Cloud repatriation is a hot topic for CIOs. Don’t do it. | But, no, you shouldn’t do it. For every 37signals that moves a workload back on-premises, there are tens of thousands more enterprises going the other way, and for good reason. In an uncertain economy, the last thing you want is to lock yourself into very inelastic hardware purchases and software licenses. | Cloud |
Network World - Should security systems be the network? | Recently during a research interview with a small but fast-growing business, for the first time I encountered an organization with a “no-network-vendor” network. That is, instead of using Cisco or Dell or even a white-box solution for switching and routing, the company deployed only Fortinet equipment for its entire network. That is, every network component is part of the security infrastructure for them. | Security |
sdxCentral - Edge Data Center Server Segment to Surge | “A new class of latency-sensitive applications in the form of [MEC], and virtualization of the baseband functions in the radio access networks in the form of open RAN, will pave the way for the explosive growth of a new class of servers located at the network edge,” | Network Management |
ZDNet Cybersecurity leaders want to quit. Here's what is pushing them to leave | It found that many IT security leaders are struggling to keep up with evolving threats and new cybersecurity practices, while also reporting issues around recruitment, retention and work-life balance that are prompting many to turn away from the industry. | Tech Jobs |
Network World - Researchers show techniques for malware persistence on F5 and Citrix load balancers | However, in a targeted attack scenario against enterprise networks, attackers would prefer to remain stealthy and not attack the same device multiple times so they don’t trigger any detections that might be put in place after a vulnerability becomes public. They would also prefer to have long-term access to such devices and use them as bridges into the internal networks, as well as pivot points from where they could perform lateral movement and expand their access to other non-public devices. | Security |
AiThority - 5G is Innovating Towards Next Generation Wireless Networks | As we move towards the future of the connected world, our industry must first understand areas that 5G is not addressing to create a 6G vision and establish future standards. Companies, governments, standards organizations, and academia are just now beginning to consider the possibilities of the next wave of wireless technology for 2030 and beyond.” | 5G |
sdxCentral - Gartner Assures EMEA Cloud Spending Will Rise Next Year | In the context of projected budget increases, Lovelock explained it’ll be a balancing act for enterprise CIOs in 2023. They’ll need to use digital technologies like cloud-native applications and artificial intelligence (AI) to help other departments optimize the efficiency of their operations and save on costs, while at the same time deploying tech that builds upon the company’s value proposition, revenue, and client support. | Cloud |
TechRepublic - Amazon Web Services vs Microsoft Azure: Compare top cloud migration tools | Amazon Web Services and Microsoft Azure are leaders in cloud computing, each providing features and capabilities to simplify the migration processes for organizations. While they offer similar features, each solution takes a unique approach to help users with cloud migration. | Cloud |
AiThority - DCPL Speeds Businesses’ Transition to a Decoupled Technology Architecture | According to the minds behind DCPL, the decoupled accelerator, (pronounced decouple) a revolution among businesses of all sizes is definitely underway. Today’s developers are ditching legacy tools and techniques and in favor of best-of-breed components easily available via the cloud and APIs. This switch has led to explosive growth with composable infrastructure, a $4 billion market, projected to exceed $23 billion by 2030. | Automation & Productivity |
Datanami - New Veritas Research Shows 94% of Enterprises Are Significantly Overspending on Public Cloud | For example, nearly all (99%) respondents believed that the CSP would be responsible for protecting some of their assets in the cloud. This is rarely the case as most CSPs make it very clear that, while they are on the line to ensure the resiliency of the cloud, their customers shoulder the responsibility for the data and applications in the cloud. | Cloud |
AiThority - Anomaly Detection: Its Real-Life Uses and the Latest Advances | Various machine learning models such as Artificial Neural Networks (ANN), Support Vector Machines (SVM), Autoencoders, and K-Nearest Neighbors have been used for anomaly detection. They each have their strengths and weaknesses. One key criterion for model selection is the time and effort needed to prepare the data for that particular model. | Machine Learning |
TechRepublic - How industrial IoT is forcing IT to rethink networks | IIoT is redefining the types of data that enterprises use, and how networks process this data. For example, an IIoT network primarily transmits and processes unstructured data, not fixed record transactional data. | Network Management |
sdxCentral - Quantum Computing Market Projected to Reach $1.7B by 2026 | The research looked into various segments in the quantum computing market and found that machine learning is expected to witness the highest growth rate in the coming years. This segment includes the integration of quantum algorithms within machine learning programs. | Quantum Computing |
TechRepublic - 5 tips to improve data quality for unstructured data | Proper data quality management is based upon the principles of assessment, remediation, enrichment and maintenance, whereby data is continually analyzed. Irrelevant, outdated, unnecessary and/or incorrect elements are weeded out or corrected throughout the data quality management process. | Data Management |
AiThority - Developers Drive the Remote Work Future, Jamstack Community Survey Report by Netlify Shows | “The findings will not only help developers learn from their peers but also help business leaders better understand how developers can be change makers within their organizations. They can learn about what tools and processes they need to be most impactful.” | Automation & Productivity |
Network World - 3 ways to reach the cloud and keep loss and latency low | Every service or microservice call across the network is another opportunity for loss and latency to hurt performance. Values that might be acceptable when back-and-forths are few can become unbearable when there are ten or a hundred times as many thanks to modern application architectures. | Network Management |
sdxCentral LightCounting: Optical Components Market to Rebound by 2027 | While optics demand is strong across all market segments, “continuing bottlenecks in the global supply chain negatively impacted sales of 400G DR4 and 100G DR1+ transceivers to Amazon in the first 9 month[s] of 2022,” | Tech Trends |
AiThority - Technology Advancement Unfolds Unprecedented Opportunities for the Audio Streaming Services Market | The integration of evolving technologies, such as machine learning (ML) and artificial intelligence (AI), is improving the discovery experience of audio streaming platforms by offering users music, podcasts, and audiobooks based on their preferences. Furthermore, the accelerated adoption of smart devices is fueling the demand for these services and ensuring a seamless customer experience, driving growth in the audio-streaming industry. | Tech Trends |
Datanami - IDC: Structured Data Management Drives Most Spending on Compute and Enterprise Storage Systems in H1 2022 | Unstructured Databases and AI Lifecycle were two workloads experiencing the highest growth in hardware infrastructure demand with spending growing at 52.9% and 40.2% respectively from 1H21. Unstructured Databases are still one of the smallest consumers of compute and storage infrastructure at $2.3 billion, while AI Lifecycle workload, which includes platforms mostly related to AI training tasks, accounted for $4.4 billion. | Data Management |
ZDnet - Password-hacking attacks are on the rise. Here's how to stop your accounts from being stolen | According to Microsoft, the volume of password-based attacks has risen to an estimated 921 attacks every second – representing a 74% increase in just one year for what's the primary method through which accounts are compromised. | Security |
AiThority - Global Web 3.0 Market Size Expected to Reach $81 Billion by 2030 as Branding & Marketing Needs Increase | Why? Web 3.0’s first iterations are about how people acquire and share content as a social signal, join virtual communities, and ultimately co-create valuable customer experiences. In marketing, Web 3.0 may bring immersive participation and intelligent peer-to-peer transactions to the customer experience approach. It represents a potential power shift in allowing consumers to control their personal data. | Web3 |
The Verge - Never pay the ransom — a cybersecurity CEO explains why | Steve told me there’s so much personal information in a hospital system that a single patient’s record can sell for a huge premium over entire datasets from other kinds of companies. And, if the cryptocurrency explosion has accomplished anything, it’s making ransomware attacks easier and more lucrative for bad guys. | Security |
Computerworld - How many jobs are available in technology in the US? | Tech job postings reflect the total of “help wanted” ads companies listed last month. There were 317,000 such postings in October, according to CompTIA. It was the first time since April 2022 that the number of job postings increased over the prior month. | Tech Jobs |
TechRepublic - 6 ways to reduce your IoT attack surface | Many people have long associated IoT attacks with lower-level threats like distributed denial of service and crypto-mining botnets. But in reality, there are a growing number of ransomware, espionage and data theft attacks that use IoT as the initial access point into the larger IT network, including the cloud. | Security |
SiliconANGLE - Cloudflare’s supercloud: This is what multicloud should have been | Its disruptive DNA is increasingly attracting novel startups and established global firms looking for a reliable, secure, high-performance, low-latency and more cost-effective alternative to Amazon Web Services Inc. and legacy infrastructure solutions. | Cloud |
The Hacker News - Your OT Is No Longer Isolated: Act Fast to Protect It | For example, if at all practical, consider segmenting the networks used by OT and apply application whitelisting to ensure that only authorized OT applications can send and receive data over that network. Keep a close eye on network traffic and analyze logs so you can catch attackers in the act – before it's too late. | Security |
Datanami - What Does Data and Analytics Need for 2023? Forrester Shares Predictions | Forrester today released its 2023 predictions for data and analytics (D&A), and the prognostication isn’t pretty. Frighteningly little progress has been made toward becoming data-driven in a meaningful way among a large swath of organizations sampled by the analyst group. | Data & Analytics |
TechRepublic - The six types of virtualization in cloud computing | Storage management is one area of cloud computing that has been improved in recent years through virtualization. Storage virtualization involves collecting and merging several physical storage units and rendering them as one storage cluster over a network. | Cloud |
Datanami - AWS Report Explores the Priorities of Today’s CDO | The exact parameters of the job are in question for some, with 19% of respondents reporting having an unclear job definition and 16% revealing their job definition is overly broad. Additionally, 62% of respondents stated they feel the CDO role is less understood than other C-level roles. | Data Management |
The Hacker News - Researchers Find Links b/w Black Basta Ransomware and FIN7 Hackers | Attack chains involving Black Basta are known to leverage QBot (aka Qakbot), which, in turn, is delivered by means of phishing emails containing macro-based Microsoft Office documents, with newer infections taking advantage of ISO images and LNK droppers to get around Microsoft's decision to block macros in files downloaded from the web by default. | Security |
Venturebeat - 5 ways your business can practice safe data to avoid security threats | Network security has traditionally been thought of as outside versus inside: bad actors outside, good actors inside. But with the rise of cloud and with access to networks by mobile phones, desktops, laptops and any number of other devices, it’s no longer feasible or responsible to have such a neat separation. | Security |
TechRepublic - Sustainability and IoT ‘bricks’ top list of Forrester’s 2023 edge computing predictions | Zero-trust edge and multicloud networking are two emerging markets Forrester points out as good ways to set up that handshake in the modern era. ZTE services automatically apply zero trust across the application traffic entering and exiting a remote site. Companies like Aviatrix and F5 Volterra provide multicloud networking to gather disparate offerings into a single multicloud network platform. | Edge Computing |
ZDNet - Meet the companies that will shape the metaverse | There's a growing sense that we're at a pivot point in this technology's history, where it will either explode into the "next big thing," or fizzle into the background, the way VR tech has several times before | Metaverse |
Blocks & Files - Cohesity: Don’t rely on ransomware guarantees | Our understanding is that if you download software in your environment thinking it’s a harmless application and it turns out it hides ransomware, you are not covered. Additionally, these companies don’t pay the ransom – they pay recovery costs. | Security |
The Hacker News - Why Identity & Access Management Governance is a Core Part of Your SaaS Security | Gartner has recently named a new security discipline called Identity Threat Detection and Response (ITDR) that incorporates detection mechanisms that investigate suspicious posture changes and activities, and responds to attacks to restore the integrity of the identity infrastructure. | IT Management |
Datanami - Survey of 600 Data Leaders Highlights State of Data Policy Management Practices | The survey also found that data policy management is likely to continue evolving as data security and privacy concerns remain at the forefront for consumers and businesses alike. Looking ahead, customer trust and engagement are expected to become the top incentives for data policy management orchestration, according to the research. | Data Management |
VentureBeat - Compliance is one of today’s biggest competitive differentiators — here’s why | “There’s a lot of emphasis right now on ensuring you’re operating in a capacity that has both operational and technical security in mind, so that you can scale your organization and prove to potential partners, or anybody who is going to be using your product or service, that you’re taking risks seriously, | Compliance |
ZDNet - OpenSSL dodges a security bullet | At first, it looked like the OpenSSL 3.x security bug was going to be truly awful. While it was feared to be a critical error that could lead to remote code execution (RCE), upon a closer examination it turned out to be not so horrid after all. | Security |
TechRepublic - How to identify and avoid common data migration mistakes | Another mistake related to testing is leaving all of the testing to developers. Developers can and should certainly be involved in the testing process as technology professionals, but people from all other areas of the business should join them by actively participating in testing. | Data Management |
Datanami - Report: 60% of Employees Using AI Regard It as a Coworker, Not a Job Threat | Furthermore, organizations with employees who derive value from AI are 5.9 times as likely to see significant financial benefits from it than organizations where employees do not get value from AI, according to a report from MIT Sloan Management Review (MIT SMR) and Boston Consulting Group (BCG) being released today. | Automation & Productivity |
TechRepublic - What is a private cloud? | One of the biggest challenges with private clouds is increased complexity. Private clouds require significant investment in hardware and software, as well as careful planning and management. As a result, they can be considerably more expensive to set up and maintain than public clouds. | Cloud |
AiThority - Predictions Series 2022: Redefining AI in a Human Context | But in a Human-in-the-Loop approach, transparency enables a better, more balanced result through human + machine outcomes. Transparent AI is the only real route to delivering ethical AI, which in turn is the only way that the technology can be sustainable. | Artificial Intelligence |
SiliconANGLE - Even the cloud is not immune to the seesaw economy | But our research suggests that customers are reallocating and optimizing that committed spend. For example, they’re shifting data to lower-cost storage tiers or increasingly taking advantage of better price-performance processors such as AWS’ Graviton. As well, we see smaller companies that were paying by the drink (strictly on demand) moving to reserved instances to lower their cloud bills. | Cloud |
AiThority - Unveiling the Key to Data Democratization with Embedded Analytics | There’s change taking shape in the embedded analytics landscape. Numerous firms are touting the importance of analytics for building products and competing in the marketplace. In fact, according to a recent Dresner Advisory Services market study, 89% of organizations say embedded analytics is critical to their BI strategies. | Data & Analytics |
TechRepublic - An overview of hierarchical storage management | HSM systems typically consist of three key components: A data migration policy, algorithms for managing data, and a mechanism for tiering or caching data. The data migration policy defines how data should be moved between different storage devices based on factors such as frequency of use or importance | Data Storage |
Blocks & Files - How simple, stateful storage and Kubernetes streamlines developer productivity | CSI provides a thin shim between the container orchestrator and the backend storage systems that is unique for each vendor. Now that it is mature and widely recognized by developers, customers can pop to the CSI documentation and see all the drivers for various storage interfaces. | Data Storage |
Nextgov - Agencies Shouldn’t 'Just Trust' Software Vendors' Security Assurances, IG Warns | The executive order detailed a set of security practices—such as “establishing multi-factor, risk-based authentication and conditional access across the enterprise”—that it said should be included in guidelines for the development of software, which NIST would issue. And it instructed the director of OMB to “take appropriate steps to require that agencies comply with such guidelines” in their procurement and use of software. | Security |
VentureBeat - Inside Microsoft’s security threat landscape (and how you can protect your company) | In 2021, major agencies like the National Security Agency (NSA), FBI, CISA and CIA detailed the 15 most common vulnerabilities and exposures (CVEs) exploited by hackers. Of those, 60% (nine) were due to deficiencies in Microsoft’s designed, operated and owned systems, including seven CVEs within Microsoft’s Exchange Server. | Security |
TechRepublic - What is data migration? | While there are many reasons for an organization to perform data migration, one of the primary objectives is to improve the performance and efficiency of the system. Read on as we explain how data migration works and some of the pros and cons that come with moving data to new environments and platforms. | Data Management |
Business Insider - What is iCloud Private Relay? How the Apple service can help protect your online privacy | If you are concerned about your privacy, you can enable Apple's iCloud Private Relay, which hides data like your IP address and DNS records so no one (not even Apple) can see your identity, location, or search history. | Data Privacy |
TechRepublic - 2022 cyber threat report details growing trends | Some changes in regional data have also been reported. Attacks on North America increased by 2%, which is much lower than the global average. Yet, Europe has shown a 29% increase in cyberattacks, and attacks in Asia grew by 32%. | Security |
HelpNetSecurity - Your CCTV devices can be hacked and weaponized | Plus, many cameras are also equipped with facial recognition technology, hacking into a server that stores and analyzes footage and data can give cybercriminals unfettered access to someone’s identity and any other information stored. | Security |
Computerworld - As videoconferencing needs change, it's time to plan for what comes next | I’ve been covering videoconferencing and collaboration since the late 1980s. There's been a recurring cycle: companies get excited about a technology, invest in it, then lose interest to a degree that vendors exit the market, leaving customers exposed. | Automation & Productivity |
TechRepublic - Why Apple would gain from RCS adoption and how WhatsApp currently benefits | RCS is a massive improvement over SMS, and its host of features make messaging an engaging option for Android users, as the service is currently only available for Android phones. Imagine sending high resolution photos and videos, or emoji reactions with end-to-end encryption — things that made you depend on WhatsApp, but can now be done within the built-in message app. | Automation & Productivity |
SiliconANGLE - Symantec researchers find new hacking tools used in stealthy ‘Cranefly’ campaign | Standing out from typical attack groups, Cranefly has a particularly long dwell time, often spending at least 18 months on a victim’s network while staying under the radar. Avoidance techniques include installing backdoors on appliances that don’t support security tools, such as SANS arrays, load balancers and wireless access point controllers. | Security |
Datanami - New Pecan AI Survey Finds Data Science is Not Benefiting Marketers | While companies tout the criticality of consumer data on a variety of fronts, from predicting future purchases to customer churn, the reality is that more than 4 out of 5 marketing executives report difficulty in making data-driven decisions despite all of the consumer data at their disposal, | Marketing Tech |
AiThority - Demystifying Data Integration for a Clear Business Win | On average, enterprises have approximately 254 applications, 40-60 tools per team and more than half (56%) of SaaS applications are not owned or managed by a company IT department. As app sprawl increases, data from each app gets siloed and becomes inaccessible to other parts of the organizations, teams and apps. | Data Management |
VentureBeat - Overcoming the Challenges of Working with Small Data | It’s important to understand the concept of small data first. Small data, as opposed to big data, is data that comes in small volumes that are often comprehensible to humans. Small data can also sometimes be a subset of a larger dataset that describes a particular group. | Data & Analytics |
TechRepublic - Forrester sees AWS under pressure in 2023 cloud computing predictions | The report points out that companies will pay more attention to cloud spending due to inflation. This move would benefit third-party cloud cost management and optimization providers, offering a clear-eyed, vendor-neutral approach. Although this development would rattle the big players or hyperscalers in the cloud market, they will adapt by luring customers with services that are more efficient, easier to adopt and offer sovereign capabilities alongside stronger security. | Cloud |
AiThority - Follow the “Four Vs” to Achieve Artificial Intelligence Maturity | AI needs a continuous stream of feedback to build its intelligence. In legal industry terms, that means continuously feeding invoices, client information, law firm information, case results, and all other relevant data into the system. The greater the volume of information, the stronger and more mature the AI. | Artificial Intelligence |
SiliconANGLE - Madrona releases its IA40 2022 list of intelligent application startups | Many of the startups in the IA40 2022’s list Early Stage category provide AI-focused tools for engineers. Credo AI makes software that facilitates responsible machine learning development, while LinearB Inc. and Tabnine Inc. offer tools designed to help engineers write code faster. | Artificial Intelligence |
TechRepublic - Data quality trends to watch | The 2022 State of Data Quality report from Ataccama reveals that automation and modernization efforts have still not been universally adopted. While seven in ten enterprises surveyed (69%) have begun their DQM journeys, they still have not achieved high maturity levels. The technology is there, but companies are struggling to use it and are only scratching the surface of DQM’s potential. | Automation & Productivity |
VentureBeat - Gartner report: 70% of organizations will implement structured automation by 2025 | The survey found that with just 43% of I&O teams currently automating monitoring and analytics, 83% find such automation efforts to be valuable. Similarly, only 36% of I&O teams are automating incident and problem resolution, but it’s considered valuable by more than three-quarters of those respondents. | Automation & Productivity |
SiliconANGLE - ‘A hardware nerd-fest of the top minds’: TheCUBE analysts preview upcoming Supercomputing show | The importance of hardware was eclipsed by the rise of cloud computing. But, of course, hardware never went away. Instead, it evolved and gained new relevance as the basis on which cloud is built. Although it remains invisible to most, high-performance computing and those ubiquitous black boxes, touch all use cases of new technology, from smartwatches to robotics to genome sequencing. | Tech Trends |
Datanami - ESG Report Finds Datadobi’s StorageMAP Combats Unstructured Data Challenges | According to the report, the challenges associated with data growth and multiplication are creating a huge data deluge, inundating IT infrastructure with more complexity and cost. ESG research reveals that, as a result, over half of the organizations (55%) surveyed report that unstructured data makes up at least half of the data they have under management in total. | Data & Analytics |
Computerworld - Is performance tracking about to go mobile? | That means IT could soon be involved in selecting, implementing, and supporting productivity and performance monitoring solutions that keep tabs on workers wherever they are — even if they’re not sitting in front of a computer. | Automation & Productivity |
SiliconANGLE - Three insights you might have missed from IFS Unleashed | Increased reliance by consumers on technology to purchase dinner, airline tickets, and even a car with a few clicks on a smartphone is leading to expectations that enterprise systems will deliver the same friction-free experience. Enterprise tech announcements now often include signs of this through the use of descriptors such as “streamlined,” “standardized” and “quicker.” | Automation & Productivity |
Computerworld - Why more than half of IT leaders may be looking for new jobs | Two new surveys indicate that more than half of IT decision makers and leaders are job hunting because they lack of voice in the C-suite, see few training and advancement opportunities and feel pressures from a lack of IT staffers to meet growing tech needs. | Tech Jobs |
Tech Startups - Will Crypto Payments Ever Compete with Platforms Like Venmo and Paypal? | For people who want to send money to friends or family quickly and cheaply, crypto payments are an attractive option. Several service providers facilitate such transactions to ensure money arrives quickly. One such market player is Zonda Pay, a way to accept cryptocurrency payments and convert them to EUR on the fly. | FinTech |
ZDNet - Cybersecurity teams are reaching their breaking point. We should all be worried | Mimecast said cybersecurity teams face "a pressure cooker of ongoing attacks, disruption, and burnout" that is making it even more difficult to attract and retain much-needed cybersecurity professionals to keep businesses secure. | Tech Jobs |
VentureBeat - Report: 97% of C-level executives worry about videoconference security | Sixty-nine percent believe cyberattackers could breach their videoconferencing platforms, and 84% stated that if they were breached, they believed attackers could steal intellectual property, sensitive company data and trade secrets. | Security |
The Hacker News - Download eBook: Top virtual CISOs share 7 tips for vCISO service providers | In a new eBook, titled 'Top virtual CISOs share: 7 tips on how vCISO service providers can maximize services, increase revenues, and improve margins" (Download here), vCISO platform provider Cynomi interviewed some of America's top vCISO service providers (MSSPs, MSPs, consulting firms and solo vCISO practitioners), to get the most insightful tips that can help other vCISOs provide a better and more profitable service. | Security |
SiliconANGLE - Survey says! Takeaways from the latest CIO spending data | Today we’re going to review the macro spending data, convey where chief information officers think their cloud spend is headed, look at the actions organizations are taking to manage uncertainty, and then review some of the technology companies that have the most positive and negative outlooks in the ETR data set. | IT Management |
Computerworld - The best states in the US for tech jobs | The top five states in September include California (with 35,947 tech job openings); Texas (27,284 openings); New York (16,142); Virginia (15,280); and Florida (14,015). Illinois was a close sixth, with 13,714 tech job postings. | Tech Jobs |
Blocks & Files - Cohesity, VAST arrive in Gartner’s object MQ | There were 15 suppliers in the 2021 report, when Pure Storage was promoted to ‘Leaders’ box status, and both Nutanix and Weka entered for the first time. Now we have 17 suppliers with Cohesity and VAST making their first appearance. | Data Storage |
Computerworld - Sustainable IT: An environmental and social approach to business tech | “Sustainable IT is an umbrella term that describes an environment-focused approach to the design, use, and disposal of computer hardware and software applications and the design of accompanying business processes," | Sustainability |
Blocks & Files - HPE looks to disaster recovery for storage growth | There are four of these: Data Center Switching, Data Protection and Lifecycle Management, Hybrid Cloud Management, and AI at Scale Infrastructure. | Data Storage |
VentureBeat - Deloitte State of AI Report 2022 calls out underachievers | Most notably, the Deloitte report found that while AI continues to move tantalizingly closer to the core of the enterprise – 94% of business leaders agree that AI is critical to success over the next five years – for some, outcomes seem to be lagging. | Artificial Intelligence |
SiliconANGLE - How to drive innovation and growth with cloud technology | If you plan to use a different hypervisor as the VM host – vSphere to Amazon Web Services’ EC2 – there will be more considerations, since the behavior of the hypervisor will differ from one to another (CPU co-scheduling, transparent memory sharing and DMA are all significant considerations). For cloud-native approaches, serverless options use 12-factor methods that support concurrency through quick instantiation of functions using policy-coordinated provisioning. | Cloud |
VentureBeat - How embracing automation could change the future of work | Yet, there are still leaders who are paralyzed by indecision or simply do not know how to evolve. By making small changes to the way their organizations work, they will be able to shape brighter, more fulfilling futures for employees. | Automation & Productivity |
ZDNet - Selling an emotion and a feeling: How these companies see VR as the future of business | The global VR and AR market is expected to reach $97.76 billion by 2028—a considerable jump from its 2020 value of $4.16 billion. | AR/VR |
SiliconANGLE - Five ways to tell whether Kubernetes is a good fit for your app – or not | Even if your application runs as microservices using containers, Kubernetes isn’t necessarily the best way to deploy it. There are other, simpler solutions – like Amazon ECS or Lambda – for running containers. And if your application isn’t a set of microservices at all, Kubernetes is hands-down not a good way to run it. | Cloud |
ZDNet - The metaverse is coming, and the security threats have already arrived | "This is tricky, because in the metaverse you might never hear someone's real voice. You might never see someone's real face. You could interact with a scam artist for days, for months, potentially for years and develop a trust relationship that has nothing to do with actual reality," she explains | Metaverse |
Datanami - Hakkoda Survey: More than 75% of Financial Services Leaders Want to Stop Using Excel | Key failure points listed by the survey respondents include its inability to handle big data or complex calculations, support remote collaboration, provide data visualization, and deliver real-time insights. When asked if they would rather be stuck in an elevator for three hours or do another internal rate of return (IRR) report in Excel, 42% of respondents chose the elevator. | Data & Analytics |
SiliconANGLE - Analyzing nuggets from Microsoft Ignite and Google Cloud Next | The content at these events had many overlapping themes, including modern cloud infrastructure at global scale, applying advanced machine intelligence, end-to-end data platforms, the future of work, automation and a taste of the metaverse and Web 3.0. | Tech Trends |
VentureBeat - Which cybersecurity metrics matter most to CISOs today? | What differentiates fast-track directors, VPs, and C-level executives progressing in their careers in cybersecurity is how they connect what they’re doing to deliver business value. They’re not relying on the hundreds of canned metrics that security tools can produce at the click of a mouse. | Security |
The Hacker News - How To Build a Career as a Freelance Cybersecurity Analyst — From Scratch | With each passing year, the cybersecurity threat landscape continues to worsen. That reality makes cybersecurity analysts some of the most sought-after technology professionals in the world. And there are nowhere near enough of them to meet the demand. At last count, there were over 3.5 million unfilled cybersecurity jobs worldwide — and that number is still growing. | Tech Jobs |
VentureBeat - Top AI investors reveal State of AI in 2022 | In 2021, diffusion AI models were overtaking GANs, the previously dominant AI models for image generation, on a few benchmarks. Today, diffusion AI models are used to power the likes of DALL-E 2, Imagen, Midjourney and Stable Diffusion, spreading to text-to-video, text generation, audio, molecular design and more. | Artificial Intelligence |
Computerworld - Google Smart Lock: The complete guide | Google Smart Lock is an unlocking feature for Android devices and Chromebooks. In Android, the system allows you to keep your phone unlocked in certain preapproved, known-to-be-safe circumstances. | Automation & Productivity |
Blocks & Files - GRAID’s killer RAID competitive comparison | GRAID’s marketeers have run up a comparison between the SR-1000, a Broadcom MegaRAID hardware card; one of the MegaRAID 9560 series, and Intel’s VROC software RAID, and it’s pretty compelling. | Data Storage |
ZDNet - Meet the companies that will shape the metaverse | As we head into one of the most crucial months in the ongoing development of the metaverse and the VR hardware that powers it, we take a look at the companies shaping these early days with their hardware, software, and services. | Metaverse |
Blocks & Files - Filecoin: The Airbnb of archival storage | Filecoin, by Protocol Labs, is a multi-faceted storage infrastructure for archival data, operating inside a framework of the cryptoeconomy. It’s designed to make a network of storage providers operate like an enterprise-class setup. | Data Storage |
VentureBeat - How cloud PAM can transform the enterprise | The faster enterprises migrate workloads to the cloud, the greater the risk of potential breaches. Relying on legacy on-premises PAM systems to protect new cloud infrastructure is like buying a new car and insisting on having traditional key locks instead of Bluetooth-enabled key fobs. | Cloud |
VentureBeat - Who controls the metaverse? Spoiler alert: It’s not policymakers | Rizvi says policymakers could eventually have an impact by creating standards to help increase access by requiring that interoperability be built into every major platform, which would likely reduce costs for consumers. | Metaverse |
Blocks & Files - Something’s missing from global file systems | Rarely does a CIO say their business has a global file data access problem and they need a supercloud-type global file system to solve it. Yet, arguably, they do and, in principle, a global file system operating across a hybrid and multi-cloud environment is exactly what they need to fix it. | IT Management |
AiThority - Top 5 Technology Trends for 2023 | AI is still the top trend, only with a different focus. Metaverse is a new entry this year and is seen playing an important role in making businesses more sustainable. Embedded data and analytics held the number 4 position for a second-straight year. | Tech Trends |
Blocks & Files - Disk drive market to plunge due to inflation, war and hyperscalers’ already high inventories | TrendFocus is expecting around 39 million disk drives to be shipped in calendar Q3, down 42 percent on the same period a year ago and 14 percent lower than the prior quarter. | Data Storage |
SiliconANGLE - IDC: Personal computer shipments declined 15% in the third quarter | PC makers shipped 74.25 million computers in the third quarter, down 15% from 87.31 million computers a year ago, according to IDC. The sales drop follows a similar 15.3% year-over-year decline in the previous quarter. IDC today attributed the weakening sales primarily to a combination of “cooling demand and uneven supply” in the PC market. | Tech Trends |
Datanami - SnapLogic Study Reveals a Third of IT Leaders Have Been Forced to Deprioritize or Cancel Tech Projects | The survey, conducted in the UK and US, found the top three biggest demands on tech teams’ time included integrating new applications / platforms (48%), dealing with problems caused by ‘shadow IT’ (47%), and managing legacy systems (40%). | IT Management |
Blocks & Files - Pavilion Data – last NVMe over Fabrics flash array startup – has died | Apeiron, E8, Excelero, Mangstor (later Exten), Vexata (bought by StorCentric) and now Pavilion have all crashed, burned, been acquired or otherwise lost their independence. | Data Storage |
SiliconANGLE - Latest CIO survey shows steady deceleration in tech spending | This growth still represents 200 to 300 basis points above historical norms. And looking ahead to next year, CIOs are expecting accelerated growth, edging back toward the 6% level. As noted, visibility is less clear than in pre-COVID years. But the bottom line is digital transformations are continuing to push IT spending above historical levels. | IT Management |
VentureBeat - Report: Security remains key driver of service mesh adoption | The KubeCon EU respondents — practitioners in devops, development and IT architecture — revealed that end-to-end encryption was the biggest driver of service mesh adoption, cited by 65% of respondents. Observability was the second most important driver, cited by 41%. | Security |
AiThority - The Uncertainty Bias in AI and How to Tackle it | It’s been well established that AI systems will replicate and often exacerbate the bias inherent in its training dataset. However, even when measures are taken to level the playing field, a subtle but equally undesirable result may occur because of prediction uncertainty. | Artificial Intelligence |
VentureBeat - Report: 81% of IT teams directed to reduce or halt cloud spending by C-suite | Rising inflation and interest rates, along with fears of a potential recession have put increasing financial and operational strain on organizations. As a result, many companies are reevaluating their digital ambitions as cloud spending is brought under the microscope. | Cloud |
Blocks & Files - Storage and the Supercloud | The Supercloud “comprises a set of services abstracted from the underlying primitives of hyperscale clouds (e.g. compute, storage, networking, security, and other native resources) to create a global system spanning more than one cloud.” | Cloud Storage |
Datanami - Precisely Releases Future of Data Architecture Study | Furthermore, 52% of business users agree that existing data is not suitable for necessary business analysis, compared to only 36% of central data and analytics teams. The results show a clear disconnect between data and analytics teams and their key stakeholders – with business users unable to rely on trusted data for confident decision-making. | Data & Analytics |
ZDNet - Ransomware: This is how half of attacks begin, and this is how you can stop them | These applications and services could be internet-facing because organisations need them to enable employees to work remotely – or organisations might not even be aware that these applications are exposed to the internet at all. | Security |
Computerworld - Online privacy: Best browsers, settings, and tips | For example, the incognito or private browsing mode that turns off browser history on your local computer doesn’t stop Google, your IT department, or your internet service provider from knowing what sites you visited; it just keeps someone else with access to your computer from looking at that history on your browser | Data Privacy |
AiThority - AIThority Primer: Building Analytics and Top Players in the Market | IT companies are realigning their spend on network infrastructure and building to embrace a more environmental-friendly and sustainable operation with building data analytics or BDA. In this AIThority.com primer series, we have picked the best examples of analytics for building units with examples from the leading innovation companies and solution providers. | Data & Analytics |
Blocks & Files - Seagate DNA lab chip technology explored | “We’re basically looking at ways to leverage chemistry to improve the write speeds, shortening the length of time it takes to put DNA pieces together, because right now it’s very slow … Over the write speeds today, we need several orders of magnitude improvement.” | Data Storage |
SiliconANGLE - Data privacy imperative will drive adoption of warehouse-native applications | To deliver competitive customer data analytics, innovators are centering their data strategies around the governance pillars of permission, ownership, and control with respect to customer data. Operationally, organizations are doubling down on a raft of policies to support governance at large scale. | Data & Analytics |
Blocks & Files - Gartner: Flash array revenue to overtake HDD | Gartner estimated the external storage compound annual revenue growth rate to 2026 to be 1.5 percent. Within that, SSAs were growing 4.6 percent and HDD/hybrid arrays declining 1.6 percent. The analyst group cut the numbers another way, saying primary storage revenues would grow 0.2 percent while secondary storage revenues would rise 7.1 percent. | Data Storage |
SiliconANGLE - Report finds insiders are a bigger data exposure risk than most executives think | Unsurprisingly, the prime time for data exfiltration is between the time employees give notice and their last day on the job. Cyberhaven measured a nearly 38% increase in incidents during that period and an 83% jump in the two weeks before an employee resigned. Incidents jumped 109% on the day employees were fired. | Security |
VentureBeat - Blockchain could repair our broken global supply chain | Businesses can use blockchain technology to track cargo, much as orders and shipments are tracked by the end customers of a retailer like Amazon. Blockchain’s value lies in the ability it gives parties to share data quickly and securely in a way that’s also decentralized. | Blockchain |
Geekwire - U.S. cybersecurity agency leader Jen Easterly on partnerships, workforce, making tech accountable | “One of the things I talk a lot to our technology teammates about is the increasing need to create technology that is secure by design. … It is unfortunate that we’ve now accepted this cultural norm that software just comes with a ton of vulnerabilities." | Security |
VentureBeat - Ignorance isn’t bliss: How tech users lack fundamental cybersecurity knowledge | 43% of respondents had never heard of multifactor authentication (MFA). | Security |
sdxCentral - Closing Digital Divide Needs 'Inclusive Set of Solutions' | Whether it’s addressing the homework gap or delivering internet connections to U.S. Indian reservations, the panel focused on the notion that infrastructural fault lines run through multiple communities – in rural, suburban, and even densely urban areas – and that means it isn’t a one-solution-fits-all scenario. | Network Management |
Computerworld - Mozilla: Apple, Google, and Microsoft lock you into their browsers | Apple, Mozilla noted, requires all developers deploying iOS browsers to use Apple’s own Safari WebKit engine. When security issues arise on WebKit, all iOS browser users are equally vulnerable until Apple finds, fixes, and publishes patches. “This is just one reason why a range of browsers, using different browser engines, is desirable,” Mozilla said | Automation & Productivity |
VentureBeat - What the zero-trust security market looks like beyond 2022 | Ericom’s Zero-Trust Market Dynamics Survey found that 80% of organizations plan to implement zero-trust security, and 83% agree that zero trust is strategically necessary for their ongoing business. Additionally, 96% of security decision-makers say zero trust is critical to their organization’s success. | Security |
AiThority - Survey Reveals 95% of Consumers Demand that Brands Protect their Data and Privacy to Build Trusted, Sustainable Relationships | “This is an existential moment for brands; while the U.S. government looks to enforce online privacy, the survey is a clarion call for companies who are waiting for a new regulatory framework and the looming cookieless future in 2024.” | Data Privacy |
ZDNet - Walls between technology pros and customers are coming down at mainstream companies | "That final user experience is critical to us," he explains. "We encourage our technology professionals to get out of the office and onto our construction job sites to gain a better understanding of what the trade and field workers do on a regular basis, and identify possible opportunities for technology to help them in their day-to-day activities." | Automation & Productivity |
AiThority - How the Delayed Adoption of Conversational Commerce is Actually a Good Thing | With 86% of customers willing to pay more for better customer experiences, brands are ripe with the opportunity to fully lean into Conversational Commerce today. Among the different forms of customer support, live chat has the highest satisfaction level at 75% followed by email (61%) and phone (44%). The D2C ecosystem and consumer behavior have evolved far enough to support cCommerce. | Automation & Productivity |
ZDNet - Hackers are making DDoS attacks sneakier and harder to protect against | In the first new type of attack, a wide range of services and/or devices are targeted with smaller portions of traffic compared to a regular DDoS incident. The idea is that multiple different pipelines of the target are overwhelmed, without triggering the thresholds that would initiate protection against unusually high levels of traffic. | Security |
Network World - Software vulnerabilities pose a risk to network infrastructure | In this era of software-defined networks, an ever-increasing number of network appliances are just proprietary software running on generic switching hardware or even a plain vanilla x86 server with extra network cards. That shift in emphasis from the hard to the soft has made the software stacks running the network a new source of risk and worry for cybersecurity. | Security |
ZDNet - Open Source Initiative expands its role to AI and machine learning | The key difference, then and now, between the two is that free software is about the ethics of sharing code, while open source is focused on the practical benefits of sharing code. | Automation & Productivity |
VentureBeat - Report: 13% fewer companies expect technology budgets to stay level or increase in 2023 vs. 2022 | According to Bain, more than 75% of the largest venture capital investments in recent years went to IT infrastructure and industry-focused enterprise software companies, illustrating the potential for innovation. | IT Management |
The Hacker News - 5 Network Security Threats And How To Protect Yourself | Attackers use automated tools to identify and exploit vulnerabilities and access unsecured systems, networks or data - however big or small your organisation. Finding and exploiting vulnerabilities with automated tools is simple: the attacks listed above are cheap, easy to perform and often indiscriminate, so every organisation is at risk. | Security |
SiliconANGLE - UiPath is a rocket ship resetting its course | The point is ML/AI and RPA appear to be more discretionary than certain sectors, including cloud. Containers most likely continue to benefit from the fact that much of the activity is spending on internal resources – i.e. developers — as much of the action in containers is free and open source. Security is not shown, but as we’ve previously reported, it’s somewhat less discretionary than other sectors. | Tech Trends |
sdxCentral - Data Center Industry Weighs Revenue, Sustainability Goals | “Whether self-regulated through something like the iMasons Climate Accord or more strictly regulated through the [Securities and Exchange Commission] in the U.S. and the Corporate Sustainability Reporting Directive in the [European Union], the industry will soon have much more robust need for sustainability assessment, accounting, reporting, and monitoring," | Sustainability |
ZDNet - Bosses spying on you? Here's the most disastrous truth about surveillance software | It described the varying levels of privacy offered by varying types of software. It explained that Microsoft is one of the companies that doesn't believe simple activity translates into material productivity. | Automation & Productivity |
VentureBeat - Report: 90% of orgs believe cybersecurity risk isn’t being addressed | According to Foundry’s 2022 Security Priorities Study, an overwhelming majority (90%) of security leaders believe their organization is falling short in addressing cybersecurity risk. Those surveyed experienced these pitfalls from different issues, such as convincing the severity of risk to all or parts of their organization (27%), and believing their organization isn’t investing enough resources to address risks (26%). | Security |
Network World - IoT technology is hitting an inflection point for businesses | Part of the reason for this acceleration, according to the research, is that enterprises now believe they can expect relatively fast ROI from their expenditure on IoT. This ROI can take a huge range of different forms—from savings on maintenance thanks to more in-depth monitoring in a manufacturing setting, to more effective in-store marketing in retail—but the consensus appears to be growing that quick ROIs are now achievable. | IoT |
sdxCentral - Cisco Talos Tracks Insider Attack Surge | The Cisco Talos intelligence group over the past year saw an increase in incidents involving insider threats such as malicious insiders and unwitting assets, and is recommending organization’s add social engineering to their policies, procedures, and education programs. | Security |
ZDNet - Programming languages: It's time to stop using C and C++ for new projects, says Microsoft Azure CTO | Microsoft drove home this point in 2019 after revealing 70% of its patches in the past 12 years were fixes for memory safety bugs due largely to Windows being written mostly in C and C++. Google's Chrome team weighed in with its own findings in 2020, revealing that 70% of all serious security bugs in the Chrome codebase were memory management and safety bugs. It's written mostly in C++. | Security |
sdxCentral - Forrester Warns Against Procrastinating Cloud Native | Cloud-native technologies like serverless computing, for example, are usually in developers’ toolkits as soon as they see what’s available and how it can impact them. But with governance questions, especially around the shared responsibility model, “it can get very complicated very quickly,” he said. | Cloud |
VentureBeat - The Apple security landscape: Moving into the world of enterprise risk | Likewise, this year alone, there have been 8 publicly disclosed zero-day vulnerabilities used in attacks on iPhone and Mac devices. The most recent, CVE-2022-32917, enables an attacker to run malicious code on a user’s device with kernel privileges. | Security |
ZDNet - Remote workers insist they're very productive at home. 'Paranoid' bosses don't agree | Microsoft depicts productivity paranoia as a vicious circle. Businesses using employee-tracking technology undermine employee trust, which in turn can lead to "productivity theater", where workers knowingly join pointless video meetings and respond to emails at times that look good. | Automation & Productivity |
ZDNet - Why MFA matters: These attackers cracked admin accounts then used Exchange to send spam | The point of the elaborate attack was to make mass spam – promoting a fake sweepstake – look like it originated from the compromised Exchange domain rather than the actual origins, which were either their own IP address or third-party email marketing services, according to Microsoft. | Security |
sdxCentral - Forrester’s ‘Keys to Cloud Success’ | For IT decision-makers to use the cloud successfully, the analyst firm suggests they “put every cloud decision up against their business strategy,” regardless of their organization’s maturity level. This includes analyzing how much business value can be derived from building a private cloud platform versus leveraging one from a public cloud vendor or from operating cloud-native applications on-premises instead of migrating them. | Cloud |
Blocks & Files - Cirrus Data: Migration for blockheads | Block-level data migrations can involve complexities such as installing drivers at the hosts, changing FC zones, and LUN masking, with SAN downtime required to sort them out. Cirrus has its own patented Transparent Datapath Intercept (TDI) software technology to fix these problems. | Data Management |
sdxCentral - Okta Finds MFA Attack Surge as Bad Actors Target Weak Authenticators | If the target uses weak secondary factors, “attackers can try to bypass MFA using techniques that either downgrade MFA to single-factor authentication, intercept the second factor, or disable/weaken an organization’s ability to enforce MFA policies such as modifying trusted IP configurations or session reuse, for instance,” | Security |
VentureBeat - Third-party risk: What it is and how CISOs can address it | According to Gartner, organizations that hesitate to expand their ecosystem for fear of the risks it can create will likely be overtaken by organizations that boldly decide to seize the value of third-party relationships, confident in their ability to identify and manage the accompanying risks effectively. Therefore, it’s critical to handle third-party security risks efficiently and effectively. | Security |
Datanami - Pluralsight Study Finds Only 8% of Global Tech Workers Have Significant Cloud-Related Skills | While the study found that 75% of tech leaders say they’re building all new products and features in the cloud moving forward, only 8% of technologists have significant cloud-related skills and experience. Additionally, 64% of respondents say that they are new to cloud learning and are looking to build basic cloud fluency. | Tech Jobs |
sdxCentral - SSE, SD-WAN Convergence Difficult, NTT Notes | “MPLS is horribly expensive. The telcos have been riding that wave and making phenomenal margins for years,” Hinderyckx added. But he said people have come to realize the internet is “strong enough and solid enough to actually run all of your traffic, including the mission critical traffic across.” | Network Management |
Datanami - NSF Releases Open Knowledge Network Roadmap Report | As an essential component of a national artificial intelligence and data science infrastructure, an open knowledge network is envisioned to provide an open, inclusive, community-driven platform to support new applications and frontiers in AI and data science research, such as ensuring fairness, diversity, equity and inclusion. | Data & Analytics |
SiliconANGLE - KubeCon preview: As Kubernetes goes mainstream, scalability becomes vital | “Now that Kubernetes is part of your day-to-day, I think starting this year, it’s going to be at the next level. Gone are the times of just running your Prometheus at individual cluster level. Now you need a solution that operates at this massive scale across different distributions and your edge locations.” | Cloud |
Blocks & Files - Evaluating global file systems and NAS cloud filers | A second global file system design is one used by the public cloud services themselves; think AWS EFS and FSx, Microsoft Azure Files, and Google Cloud Filestore. They have no on-premises component at all. The Evaluator Group sets them aside and has analyzed on-premises NAS+cloud component systems and cloud-based global file systems with edge caching systems only. | Data Management |
VentureBeat - Unified endpoint management (UEM) tools: What’s new in Gartner’s Magic Quadrant | Consolidation and its effects on leading UEM vendors’ strategies is a core theme that resonates through Gartner’s latest Magic Quadrant for Unified Endpoint Management Tools. IBM, Ivanti, ManageEngine, Matrix42, Microsoft and VMware have made product, service and selling moves in response to how focused CISOs are on consolidation. | Security |
ZDNet - When digital transformation goes wrong: Five ways to get back on track | "Digital and analytics transformations are often deployed across organizations, involving many departments and third parties. Soft factors like skills, mindsets, and ways of working, as well as hard factors like technology, infrastructure, and data flow, are all being changed at once during such a transformation," | Digital Transformation |
sdxCentral - Turing Shares Top Global Developer Hiring Trends | Global hiring platform Turing pulled from company data – which includes over two million developers and engineers working through the platform – to present the top 15 requested developer skills and the top five industries currently hiring the most. | Tech Jobs |
ZDNet - What is ambient computing? Everything you need to know about the rise of invisible tech | Instead of having to directly interact with different computing devices to get desired results – for example, using your phone to make a phone call and your remote to turn on a TV– ambient computing allows all of your devices to work together seamlessly to fulfill your needs. | Automation & Productivity |
VentureBeat - Report: Ransomware attack frequency and amount demanded down in H1 2022 | According to a new report from Coalition, ransomware attack frequency and cost are down. From H2 2021 to H1 2022, ransomware payment demands decreased from $1.37 million to $896,000. Of the incidents that resulted in a payment, Coalition policyholders paid an average of roughly 20% the initial amount demanded. | Security |
AiThority - Could Instances of NLP Bias Derail AI? | The black-box nature of ML models can make it difficult to explain the decisions made by the models. Furthermore, models can overfit datasets or become overconfident and do not generalize well to unseen examples. However, in most cases, the dataset used for training and evaluation is the culprit for introducing bias. | Artificial Intelligence |
VentureBeat - Microsoft Teams vulnerability shows danger of collaboration apps | For example, according to research released by Vectra yesterday, versions of Teams for Windows, Mac and Linux are storing authentication tokens in plain text on the underlying device. This is significant because it means if an attacker hacks a system where Teams is installed they can gain access to authentication tokens along with other information. | Security |
SiliconANGLE - Stolen SSO credentials from top companies found for sale on the dark web | The BitSight researchers dug into listings on the dark web and found that 25% of the S&P 500 and half of the top 20 most valuable public U.S. companies have SSO credentials listed for sale. More than 1,500 new SSO credentials were also found to become available in June and July alone. | Security |
ZDNet - Highly skilled tech workers are becoming a rarity, and companies have tough decisions to make | The onboarding process for remote employees is especially tricky, as companies have to figure out how to make their company culture a memorable experience for remote employees. A days-long process filled with hours-long, information-packed Zoom meetings yields poor job performance, according to a survey by Perceptyx. | Tech Jobs |
VentureBeat - Vulnerability management: Most orgs have a backlog of 100K vulnerabilities | Each of these vulnerabilities presents a potential entry point for attackers to exploit and gain access to sensitive information. However, many organizations lack the internal expertise or resources to patch these vulnerabilities at the pace required to keep their environments secure. | Security |
Network World - 5 Ways to Mitigate Your New Insider Threats in the Great Resignation | Implementing a successful security awareness program is more challenging than ever for your security team—the new blood coming in causes cultural dissonance. Every new employee brings their own security habits, behavior, and ways of work. Changing habits is slow. Yet, companies don't have the luxury of time. They must get ahead of hackers to prevent attacks from new insider threats. | Security |
sdxCentral - Forrester Deems Hybrid Cloud the Norm | Enterprise efforts to push migration forward resulted in a lot of spending that played a significant role in propelling innovation, according to Sustar. “The sheer shift in emphasis towards cloud and away from data center forced innovation, forced the pace of new development, forced the move into containerized applications, into production. | Cloud |
Datanami - New Relic Releases 2022 Observability Forecast Report | Nearly three-quarters of respondents said C-suite executives in their organization are advocates of observability, and more than three-quarters of respondents (78%) saw observability as a key enabler for achieving core business goals, which implies that observability has become a board-level imperative. | IT Management |
ZDNet - Highly skilled tech workers are becoming a rarity, and companies have tough decisions to make | The notion that tech executives are open to hiring workers without degrees points to a shift in hiring requirements. Three-quarters (67%) of those surveyed felt that the traditional hiring and onboarding process is too long, too pricey, and needs re-imagining. | Tech Jobs |
Datanami - Anaconda Releases 2022 State of Data Science Report | 90% of professional respondents indicated that their organizations are concerned about the potential impact of a talent shortage, with 64% saying they were most concerned about their organization’s ability to recruit and retain technical talent. 56% feel that insufficient talent or headcount in the data science area is one of the biggest barriers to the successful enterprise adoption of data science. | Data & Analytics |
ZDNet - The future of the web will need a different sort of software developer | What is certain is that while there is a lot of noise about the hottest programming languages and the evolution of Web3, blockchain and the metaverse, none of this will matter if the industry doesn't have highly skilled software developers to build them. | Emerging Tech |
Datanami - Verta Releases 2022 State of Machine Learning Operations Study | In fact, 45% of the survey respondents reported that their company reported having a data or AI/ML platform team in place to support getting models into production, and just 46% have an MLOps platform in place to facilitate collaboration across stakeholders in the ML lifecycle, suggesting that the majority of companies are unprepared to handle the anticipated increase in real-time use cases. | Machine Learning |
The Hacker News - How to Do Malware Analysis? | According to the 2022 Malwarebytes Threat review, 40M Windows business computers' threats were detected in 2021. And malware analysis is necessary to combat and avoid this kind of attack. In this article, we will break down the goal of malicious programs' investigation and how to do malware analysis with a sandbox. | Security |
VentureBeat - Is confidential computing the future of cybersecurity? Edgeless Systems is counting on it | “People will want and expect it for most workloads, just like they expect antivirus and firewalls to be present,” he said. “CISOs will soon need to explain to their CEOs why they’re not using confidential computing.” | Security |
Network World - Software-defined perimeter: What it is and how it works | An SDP is specifically designed to prevent infrastructure elements from being viewed externally. Hardware, such as routers, servers, printers, and virtually anything else connected to the enterprise network that are also linked to the internet are hidden from all unauthenticated and unauthorized users, regardless of whether the infrastructure is in the cloud or on-premises. | Security |
VentureBeat - How Zesty aims to meet cloud infrastructure management challenges | “Zesty is breaking the inefficient cycle with dynamic cloud infrastructure. This new way of working with infra enables customers to automatically scale cloud resources to optimally match application demand at any given time and adjust immediately to any changes as they occur," | Cloud |
ZDNet - The Future of the Web: The good, the bad and the very weird | But big tech companies also see the emergence of these metaverse technologies as another opportunity to build their next, and perhaps the final walled garden. Whoever wins out in this new virtual world could find themselves with a permanently defensible near-monopoly on access to this digital universe, where they are making the decisions about what we see and do, and collecting all the money. | Metaverse |
VentureBeat - Analytics spending is on the rise: Here’s how to make the most of it | Essentially, the survey found that 90% of the organizations witnessing improved customer metrics were either good or great at utilizing all data sources, while a significant 84% looked at all data types. This aspect ties directly to well-defined data accessibility and governance policies. | Data & Analytics |
Datanami - IDC: AI Spending Grew 20.7% Worldwide in 2021 | “The reality is, AI offers solutions to everything we are facing at the moment. AI can be a source for fast-tracking digital transformation journeys, enable cost savings in times of staggering inflation rates and support automation efforts in times of labor shortages.” | Artificial Intelligence |
Computerworld - As telehealth use plummets, the healthcare industry faces a crossroads | The road toward adoption of telehealth — the use of electronic communications to provide care and other services — has been long. Before the COVID-19 pandemic took hold in 2020, the adoption rate in the US, nearly 60 years after telehealth technology was first introduced, was just 0.9% of outpatient visits. | Healthcare Tech |
VentureBeat - Why the explainable AI market is growing rapidly | There’s no dearth of startups in the AI and MLops space, with a long list of startups developing MLops solutions including Comet, Iterative.ai, ZenML, Landing AI, Domino Data Lab, Weights and Biases and others. Qwak is another startup in the space that focuses on automating MLops processes and allows companies to manage models the moment they are integrated with their products. | Artificial Intelligence |
Datanami - New Research Shows Analytics Outpaces Other Software Spending in Next 12-18 Months | Further, even fewer are maximizing advanced analytics, as less than 30 percent of decisions are informed by artificial intelligence and machine learning for most organizations. To help businesses maximize their analytics investments, the global IDC survey uncovered the impacts of people, data, and analytics automation on return on investment (ROI). | Data & Analytics |
VentureBeat - Digital twins, unprecedented collaboration: What the metaverse means for developers | Today, there isn’t one single metaverse, although various platforms and companies would like you to believe otherwise. Instead, multiple platforms could be considered metaverses (or “verses” for short) in their own right, including HyperVerse, Decentraland, The Sandbox and even the mostly-for-kids platform Roblox. | Metaverse |
SiliconANGLE - How IT leaders can embrace responsible AI | Responsible AI is an umbrella term for aspects of making appropriate business and ethical choices when adopting AI. It encompasses decisions around business and societal value, risk, trust, transparency, fairness, bias, mitigation, explainability, accountability, safety, privacy, regulatory compliance and more. | Artificial Intelligence |
The Hacker News - Why Vulnerability Scanning is Critical for SOC 2 | It's both a technical audit and a requirement that comprehensive information security policies and procedures are documented and followed. As with all the best compliance certifications and accreditation, it is not just about joining the dots. It involves a complex set of requirements that must be documented, reviewed, addressed and monitored. | Security |
VentureBeat - Deepfakes aren’t going away: Future-proofing digital identity | Everyone, ranging from everyday consumers with little technical knowledge to state-sponsored actors, has easy access to phone applications and computer software that can generate fraudulent content. Furthermore, it’s becoming increasingly difficult for humans and fraud detection software to distinguish between real video or audio and deepfakes, making the technology a particularly malicious fraud vector. | Security |
Computerworld - Extended reality — where we are, what’s missing, and the problems ahead | VR/MR is what we think of when we talk immersion. Both require the entire image be rendered with the difference between VR and MR being how much is imaginary and how much is real. With VR, the entire scene exists only in software, nothing is real, and cameras (if there are cameras) are mostly used to keep you from running into things. | Emerging Tech |
ZDNet - Big changes ahead for the cloud business model, top CTO predicts | Enterprise blockchain may still be in experimental mode, but it may soon change the way applications and systems are designed, moving from an architecture maintained by individual organizations to architectures in which applications and data are shared and secured across multiple entities -- in essence, a truly decentralized form of computing. | Blockchain |
Computerworld - Collaboration tech evolves for the post-COVID future | “Your company may not want your personal phone to be your education system because it’s not very secure,” Bersin said. “But there are [secure] applications now, such as WorkJam, that are designed for end-to-end communications with people who don’t have computers. And the big vendors are trying to figure out how to build [out those applications] as well." | Automation & Productivity |
Information Week - How to Make Vendor Technology Bakeoffs Work | Because each solution is actually being road tested in a simulated production environment and pitted against at least one other solution, being awarded a contract by a buyer goes far beyond just having the highest RFP ranking. It's even better than succeeding in a small proof of concept. | IT Management |
The Hacker News - Shopify Fails to Prevent Known Breached Passwords | According to Hive Systems' infographic, a five-character password can be cracked instantaneously, regardless of complexity. Given the ease with which shorter passwords can be cracked using brute force, organizations should ideally require complex passwords that are at least 12 characters in length. | Security |
sdxCentral - Gartner Gives CIOs the Key to Drive Digital Transformation | First, CIO’s should adopt “neophilia” – or a tendency to like anything new. The firm suggested effective digital CIOs embrace the tendency to ask “what do we want to achieve?” rather than “what have we got?” in order to reject current assumptions and pursue innovation. | IT Management |
Information Week - Crash Course on E-Discovery for CIOs and CDOs | Here are nine things you need to know about e-discovery – from what it looks like (and it’s not just about saving email) legal preparations, how to cut costs, how to preserve evidence, and when or why to get advice from legal pros – in case your organization finds itself in a legal trouble. | Records Management |
The Hacker News - 6 Top API Security Risks! Favored Targets for Attackers If Left Unmanaged | Shadow, hidden, or deprecated APIs which fall out of your security team's visibility create more opportunities for successful cyberattacks on unknown APIs, API parameters, and business logic. Traditional tools like API gateway lack the ability to offer a complete inventory of all APIs. | Security |
sdxCentral - Gartner Names Akamai, Cloudflare, Imperva Cloud WAAP Leaders | Gartner evaluated 11 cloud WAAP vendors. Amazon Web Services (AWS) and Fastly made it into the “challengers” quadrant; Radware was the only vendor in the “visionaries” square; and Gartner labeled Microsoft, F5, Fortinet, Barracuda, and ThreatX “niche players.” | Cloud |
VentureBeat - Level up your first-party data strategy: How to make your data work for you | Although nearly 90% of marketers recognize the importance of first-party data, more than one-third report difficulty maintaining its quality and accuracy. | Data & Analytics |
SiliconANGLE - What private emerging tech companies don’t tell you about their business | What we’re seeing here are some very high evaluation rates in the green. H2O, we mentioned. SecurityScorecard jumped up again. Chargebee, Snyk, Salt Security, Armis. A lot of security names are up here, Aqua, Netskope, which has been around forever. I still can’t believe it’s in an Emerging Technology Survey, but so many of these names fall in data and security again, which is why we decided to pick those out. | Emerging Tech |
VentureBeat - RPA market sees explosive growth as firms look to automate more tasks | Helping to drive RPA growth is the fact that is has become “industry agnostic, and truly horizontal across many verticals,” Ray told VentureBeat. “Although we have seen huge adoptions around finance, banking, insurance, contact centers, manufacturing and healthcare.” | Automation & Productivity |
SiliconANGLE - Supercloud enables holistic management of entire IT infrastructure | “So instead of building all these various things that we have to do individually in each of the cloud providers, we’re trying to do so within a cross-cloud service layer, which removes us from dealing with the complexity of the underlying multicloud services and makes it manageable.” | Cloud |
VentureBeat - Report: Data access hurdles affect AI adoption for 71% of enterprises | Even as decision-makers and CXOs remain bullish on AI’s potential, enterprises are struggling to make the most of it at the ground level. Case in point: a new report from data integration giant Fivetran that says 71% of companies find it difficult to access all the data needed to run AI programs, workloads and models. | Artificial Intelligence |
sdxCentral - Ransomware Attack Emulation Unveils Effectiveness of Zero-Trust Segmentation | What Bishop Fox did to protect against bias was to differentiate the red and blue team roles, and make sure the red team, aka the attackers, do not change their tactics and follow the same script with the same amounts of delays no matter what they learned from previous tests. Additionally, the team built a complex enterprise network entirely in the cloud and heavily used automation for consistency. | Security |
Computerworld - How many jobs are available in technology? | Overall employer job postings for tech positions eased in August to just under 320,000 from 372,000 in July, with 31% of jobs posted last month for positions in emerging technologies, such as artificial intelligence, machine learning and IoT, or in roles that require emerging tech skills, such as data analytics and automation software. | Tech Jobs |
SiliconANGLE - Major security bugs are a long-term threat: Here’s why and what’s next | Of greater concern has been the difficulty for enterprises to apply a fix. A July report from CyCognito Inc. found that 70% of firms in a subset of companies examined that had previously addressed Log4j were struggling to patch vulnerable assets and prevent a recurrence. Twenty-one percent of organizations in the report experienced triple-digit percentage growth in the number of exposed vulnerable assets. | Security |
VentureBeat - Report: Cybersecurity awareness increased to 97% in the last year | The study found that properly implemented awareness training programs move the needle of enterprise risk where technology alone cannot. As many as 87% of study participants stated that effective IT security is not possible without employee training. | Security |
Blocks & Files - LTO tape to keep rolling for 5 more generations | The LTO Program Technology Provider Companies – HPE, IBM, and Quantum – said the new roadmap will see the LTO Ultrium standard double capacity with each new generation. | Data Storage |
VentureBeat - What is reinforcement learning? How AI trains itself | Reinforcement learning is part of the training process that often happens after deployment when the model is working. The new data captured from the environment is used to tweak and adjust the model for the current world. | Artificial Intelligence |
Techstartups - Rethinking Data Privacy With ParallelChain’s Unique Blockchain Architecture | The ParallelChain Private blockchain is a Layer 1 network, similar in some ways to blockchains like Ethereum, Avalanche, and Binance Chain. However, it’s also very different from these networks in that it provides not one, but two interconnected blockchains. One is public, just like most blockchains, while the other uses some innovative tricks to stay private. | Blockchain |
VentureBeat - How data can reveal weaknesses in your customer onboarding process | Acquiring a new customer costs five times more than it does to retain an existing customer. It’s a good idea, then, to emphasize retention. While we look at best practices and data used by a company’s post-onboarding functions, we find that the onboarding function itself doesn’t have retention through value delivery as a goal. | Automation & Productivity |
sdxCentral - Cybersecurity Insurance Revenue Projected to Surge | “Regarding cybersecurity, European nations like Germany are portraying themselves as technologically independent nations equal to China and the United States,” with funding support from governments, Straits Research noted. | Security |
SiliconANGLE - Three-quarters of mobile applications found to contain valid AWS access tokens | Of the apps with AWS credentials, 77% contained AWS access tokens allowing access to private AWS cloud services. Nearly half of those apps had valid AWS tokens giving access to millions of private files on Amazon S3. | Security |
VentureBeat - Report: SaaS app spending up, but security lags behind | So it’s not surprising that a recent study by Axonius found 66% of organizations are currently spending more on SaaS compared to a year ago. And there’s no sign that this trend is slowing down, as a large majority (74%) claims that more than half of their apps are now SaaS-based, while only a third (34%) said they were concerned about the costs associated with this rising usage. | Security |
ITProToday - Let’s Stop Gatekeeping in Cybersecurity | Acronyms like SIEM, XDR, NDR, EDR, SOAR – or even the more obscure HDR or ROAR – shroud the cybersecurity industry in secrecy and complexity, making it inaccessible for the average consumer. Even more baffling is that analysts, practitioners, and vendors have different definitions of each acronym, which makes it nearly impossible to understand what products you need. | IT Management |
AiThority - Emotional AI: How Cultural Factors Influence Gen Z Attitude Toward Technology | Today, we have developed AI-driven augmentative machine intelligence tool to understand and analyze human emotions using non-verbal cues in the most effective manner. However, the unregulated nature, increasing risk of biases and a lack of re-calibration for cultural differences makes it important to understand its acceptability among Generation Z, the demographic most vulnerable to it. | Artificial Intelligence |
ITProToday - Tech Job Market Robust, Unemployment Rate at Historic Low | An analysis from CompTIA of data from the U.S. Bureau of Labor Statistics found tech occupations across all industry sectors increased by nearly 240,000 positions in July, and IT industry employment has jumped by 143,700 jobs this year, an increase of 55% year-over-year. The analysis also found that the tech jobs unemployment rate fell to 1.7%. | Tech Jobs |
VentureBeat - Twitter and TikTok’s data privacy controversies show the dangers of third-party apps | Out of all the revelations emerging about big tech’s management of users’ personal data, TikTok’s suspected use of keystroke tracking or keylogging is perhaps the most shocking. | Data Privacy |
ITProToday - Digital Transformation, Cybersecurity, IT Staffing Top C-Suite Concerns | Meanwhile, 58% of corporate leaders said they would benefit most from enhanced reporting around cybersecurity and technology, and nearly half of survey respondents plan to increase their investments in IT security and privacy. | IT Management |
VentureBeat - Data privacy truly matters to your customers. It’s time to make it a core business value | Regulatory compliance isn’t enough to win over consumers. In fact, consumers have little interest in the regulatory fine print: According to the survey, over three-quarters of people have never heard of the General Data Protection Regulation (GDPR), while 9 out of 10 people haven’t the foggiest idea what the Virginia Consumer Data Protection Act (VCDPA) is. | Data Privacy |
ITProToday - Ransomware Security for IT Pros: 2022 Report | This Tech Insights report features articles on developing ransomware security programs, detecting attacks when they are underway, and how to deal with infections when they happen. | Security |
VentureBeat - Are virtual collaboration tools a necessary evil for enterprises? How to mitigate the risk | But with their advent and explosion in growth, it’s been made abundantly clear that these tools pose significant security risk. Organizations face a conundrum in preventing data exposure and misuse while also diligently tracking communication and, in regulated industries, ensuring compliance. | Automation & Productivity |
AiThority - Google Revises its SEO-first Algorithm to Filter out “Bad Quality” Content | Google announced the launch of “helpful content update” to update Search with fine quality content. This would associate with quality and informative content and not necessarily evaluate content based on its traditional SEO-centric algorithms. Which means content writers and marketers can no longer push SEO-driven content to rank higher on the Search and gain malicious advantage on SERPs | Automation & Productivity |
VentureBeat - Report: 65% of IT leaders are investing in unstructured data analytics | Enterprises are storing more data than ever. How much? According to the Komprise 2022 Unstructured Data Management report, more than half are managing 5 petabytes or more of data compared to less than 40% in 2021. Most (68%) are spending more than 30% of their IT budget on data storage, backups and disaster recovery. | Data & Analytics |
AiThority - Emotional AI: How Cultural Factors Influence Gen Z Attitude Toward Technology | New models are developed for machine learning, human-computer interface, creative arts/ web 3.0, human health, mobile gaming, perceptual information retrieval, text analytics, document processing automation, and wearable computers or connected devices/ the Internet of Things (IoT). | Artificial Intelligence |
VentureBeat - Skyrocketing AEC data pushes need for data governance best practices | “While this is in line with other industry reports, the fact that, on average, our customers have nearly quadrupled their data storage – from 0.9 TB in 2017 to 3.5 TB in 2021 – is a rather striking indication of how AEC firms have become data companies.” | Data Management |
VentureBeat - Grow up: 5 reasons why many businesses are still in ‘AI adolescence’ | While the “AI adults” (dubbed Achievers in the research) are only a small group — representing 12% of companies — they are reaping big rewards: By outperforming their peers on AI, they are increasing their revenue growth by 50% on average. | Artificial Intelligence |
Computerworld - Android, ChromeOS, and the future of app discovery | To wit: Chromebooks today offer a full-fledged desktop-caliber web browsing environment. They let you install progressive web apps, Android apps, Linux apps, and even Windows apps, if you really want to get wild. | Automation & Productivity |
VentureBeat - APIs and zero trust named as top priorities for CISOs in 2023 | Consolidating their organization’s tech stacks, defending budgets and reducing risk are three of the top challenges facing CISOs going into 2023. Identifying which security technologies deliver the most value and defining spending guardrails is imperative. | Security |
Threatpost - Ransomware Attacks are on the Rise | Hiveleaks and BlackBasta are the result of that restructuring. Both groups are “associated with Conti,” the authors noted, Hiveleaks as an affiliate and BlackBasta as a replacement strain. “As such, it appears that it has not taken long for Conti’s presence to filter back into the threat landscape, albeit under a new identity.” | Security |
VentureBeat - Solve the problem of unstructured data with machine learning | Advancements in ML technology now enable organizations to efficiently process unstructured data and improve quality assurance efforts. With a data revolution happening all around us, where does your company fall? Are you saddled with valuable, yet unmanageable datasets — or are you using data to propel your business into the future? | Data & Analytics |
eWeek - Leading Enterprise IT Vendors 2022 | Tableau’s natural language processing capabilities received a huge boost thanks to the firm’s 2021 acquisition of Narrative Science. Narrative Science’s technology automatically analyzes, builds, and communicates data insights in a narrative format, which can make the data easier to understand for many users. | Automation & Productivity |
VentureBeat - McKinsey report: Two AI trends top 2022 outlook | Applied AI, considered by McKinsey as based on proven and mature technologies, scored highest of all 14 trends on quantitative measures of innovation, interest and investment, with viable applications in more industries and closer to a state of mainstream adoption than other trends. | Tech Trends |
SiliconANGLE - Twilio and Cloudflare hackers have now breached 130 organizations | According to Group-IB, the attacker’s initial objective was to obtain Okta identity credentials and two-factor authentication codes from users of the targeted organizations. With this information, the attackers could gain unauthorized access to any enterprise resources the victims had access to. | Security |
VentureBeat - Deep Dive: Why 3D reconstruction may be the next tech disruptor | Data-driven 3D modeling, or 3D reconstruction, is a growing computer vision domain increasingly in demand from industries including augmented reality (AR) and virtual reality (VR). Rapid advances in implicit neural representation are also opening up exciting new possibilities for virtual reality experiences. | Emerging Tech |
The Hacker News - Cybercrime Groups Increasingly Adopting Sliver Command-and-Control Framework | "Given Cobalt Strike's popularity as an attack tool, defenses against it have also improved over time," Microsoft security experts said. "Sliver thus presents an attractive alternative for actors looking for a lesser-known toolset with a low barrier for entry." | Security |
sdxCentral - Gartner Guides Cisco to ‘Responsible’ AI Governance | Almost all (96%) of respondents expect AI will help reduce risk and increase quality within their organizations, and business functions such as networking/cloud, IT infrastructure, and supply chain will benefit most from AI implementation. | Artificial Intelligence |
VentureBeat - 3 ways cloud architects can boost their impact | It’s a basic rule of economics that any company, or individual, strives to get the most done with the least effort. So, start with what you have and build on it. There’s no need to reinvent the wheel. Use the wheels you have and start driving today. You’ll be able to get moving faster. | Cloud |
Network World - Network availability: Are you your own worst enemy? | The biggest source of network complexity isn’t the proliferation of networks or devices. Enterprises connect about the same number of sites they did a decade ago, and the only place where the number of network devices has increased significantly in that period is the data center. The problem is layers of technology. | Network Management |
The Hacker News - The Rise of Data Exfiltration and Why It Is a Greater Risk Than Ransomware | Either way – public exposure of information can be a threat greater than ransomware because ransomware demand can be resolved by paying up (or by retrieving backups). Leaked information – well – that's something that may be unfixable. It's easy to see why threat actors can find extortion based on information leakage to be an even more attractive target than mere ransomware | Security |
sdxCentral - IDC Pushes Consumption Models for IT Sustainability | In the like-minded vendor selection process, IT organizations are looking for vendors that have sustainability initiatives built into their own operations, and they want to truly understand that vendor’s sustainability journey to see what others have been through and if they’re really on the same path. | Sustainability |
VentureBeat - Can NIST move ‘trustworthy AI’ forward with new draft of AI risk management framework? | “Security leaders can also leverage the six characteristics of trustworthy AI to evaluate purchases and build them into Request for Proposal (RFP) templates,” Holland said, adding that the model could “help defenders better understand what has historically been a ‘black box‘ approach.” | Artificial Intelligence |
sdxCentral - Blockchain Use in Health Care to Generate $16.3B by 2031 | Furthermore, the report found that pharmaceutical and medical device companies dominated market growth last year with $241.85 million owed to the “replacement of [a] traditional system with blockchain.” The health care payers’ segment also saw its highest CAGR [41.4%] during the “blockchain in health care market forecast period.” | Blockchain |
Network World - What are data centers? How they work and how they are changing in size and scope | Experts have been predicting that the on-premises data center will be replaced by cloud-based alternatives, but many organizations have concluded that they will always have applications that need to live on-premises. Rather than dying, the data center is evolving. | Data Management |
VentureBeat - Why Apple products are more vulnerable than ever to security threats | Last week, on August 17, Apple announced that it had discovered two zero-day vulnerabilities for iOS 15.6.1 and iPadOS 15.6.1. The first would enable an application to execute arbitrary code with kernel privileges, the second would mean that processing maliciously crafted web content may lead to arbitrary code execution. | Security |
Datanami - KX: U.S. Businesses Could Gain $2.3T in Total Revenue with Real-time Analytics | The manufacturing industry alone could benefit from nearly $1 trillion after implementing real-time data, and revenues within the finance and insurance sector could increase by nearly $637 million. | Data & Analytics |
VentureBeat - The emergence of the chief automation officer | The CAO will be responsible for implementing business process and IT operations decisions across the enterprise to determine when and what type of automation strategy is best suited for each business imperative while working with a wide range of leaders across all business pillars | Automation & Productivity |
sdxCentral - GitLab Survey Shows Dev-Sec Tensions Amid Shift-Left Push | GitLab found 57% of security team members claim their organization has already shifted left or plans to this year, and one-third of security teams are planning a shift left more than two years from now. In addition, the survey found security is the top investment area for 2022, with cloud computing in second place. | Security |
Network World - What is CXL, and why should you care? | If you purchase a server in the next few months featuring Intel’s Sapphire Rapids generation of Xeon Scalable processor or AMD’s Genoa generation of Epyc processors, they will come with a notable new function called Compute Express Link (CXL)—an open interconnect standard you may find useful, especially in future iterations. | Automation & Productivity |
VentureBeat - How cybersecurity vendors are misrepresenting zero trust | The zero-trust vision that cybersecurity vendors are selling isn’t the reality enterprises are experiencing. The disconnect begins during initial sales cycles, where the promises of ease of use, streamlined API integration and responsive service lead to enterprises buying solutions that don’t work. Unfortunately, enterprises are getting more challenges than the vision vendors sold. | Security |
sdxCentral - Lookout CTO: Single-Vendor SASE Will Take Years | “Instead of moving all these point security products to the cloud one at a time, people are looking for platforms that can solve vendor consolidation, improve the bottom line, and deliver the whole security as a service,” he told SDxCentral. | Security |
Datanami - Accenture Releases Life Sciences Technology Vision 2022 Report | According to the report, life sciences leaders (91% of medical technology executives and 85% biopharma executives) expect the metaverse to have a positive impact on their organizations and nearly half of the biopharma executives surveyed believe the metaverse will have a breakthrough or transformational impact on their organizations. | Metaverse |
VentureBeat - The shift to the cloud could be costing businesses more than it’s saving | The market is down, companies are looking to cut costs, and many are reassessing their cloud spending. But cloud reliance is so vital to business continuity today that many organizations are reluctant to touch their often-bloated cloud budgets, even if they know there is fat to trim. | Cloud |
VentureBeat - Report: 78% of data management pros struggle to identify cloud data | More than eight in 10 data management decision-makers (82%) cite forecasting and controlling costs as a data ecosystem challenge. Usage-based pricing models that coincide with cloud computing introduce month-to-month cost variability. What was once meticulously planned and budgeted on-premises, is now unpredictable. | Data Management |
Computerworld - Collaboration application spending grows in the face of economic uncertainty | The growth extends across all the collaboration markets and submarkets identified by IDC. These include team collaboration applications, like Slack and Microsoft Teams; conferencing applications, such as Zoom, Webex, and the conferencing portions of Google and Microsoft Teams; enterprise application platforms, such as Khoros and Salesforce; virtual events, such as Cvent and On24; and email. | Automation & Productivity |
VentureBeat - Conversational AI chatbots: 3 myths, busted | “I think it’s partly because there’s still an awful lot of salespeople and people in the media who portray conversational AI as if it’s magic,” she said. “As if just by designing a conversational bot, all your dreams will come true.” | Artificial Intelligence |
Blocks & Files - Bocada says automated BackupOps is coming | The report says that while just over half of backup operations take place on-premises today, backup professionals expect over 60 percent of these operations to move to the cloud within the next three years. As organizations transition to cloud-only or hybrid-cloud environments, there is an acknowledgement that backup oversight must transition there as well. | Data Management |
VentureBeat - Privacy, personalization and advantages of first-party data | When it comes to understanding and relating to these customers the opportunity for natural, intuitive voice AI as a channel is enormous. But the stakes are high, and responsibility for personalization and privacy should not be left to another business. | Data Privacy |
sdxCentral - Daily Roundup: Ransomware Variants Double in 1H 2022 | As threats continue to evolve, there is evidence that the spread of wiper malware as part of adversary toolkits is increasing. Wiper malware trends are more destructive and sophisticated attacks that destroy data by wiping it clean. | Security |
VentureBeat - Cloud security: Increased concern about risks from partners, suppliers | Also troubling, 43% of respondents said that protecting customer data was their primary cloud and web security objective for 2022 — yet just 36% had dedicated DLP solutions in place. | Cloud Security |
Blocks & Files - Mainframers are keeping tape as they add cloud backup, archive storage | Also the data stored in the clouds is in tape image format, even though some of the users do not have tape on premises: “Interviews indicated that even though some are not using tape, they are still using tape images stored on disk-based systems such as an IBM TS7700 system. The commentary about moving away from operational practices around tape or tape images was that it would be very difficult to change.” | Data Storage |
GeekWire - How Microsoft’s AI convinced me to switch to Edge, and where the browser still falls short | Significant improvement in voice quality: But the grabber for me is the increasing authenticity of some of the Microsoft voices: the inflections, the pauses, the lack of the tell-tale robotic vocal fry. | Automation & Productivity |
VentureBeat - Report: Cloud-adoption success depends on IT’s relationship with business | Of those who ranked themselves as equal partners to the business, a majority (68%) said they experienced the most increased speed-to-market from cloud adoption. On the other side of the spectrum, IT firefighters were most likely to cite budgets and funding (41%) and executive buy-in (31%) as challenges in their cloud adoption journey. | Cloud |
Datanami - DataStax Releases ‘State of Data Race 2022’ Report | The report revealed that the data race is not only heating up, but rapidly shifting toward real-time data—the data that powers in-the-moment use cases such as recommendations and personalization, or always-up-to-date inventory and logistics. | Data & Analytics |
VentureBeat - Report: 94% of CDOs believe data privacy technology increases revenues | Every day we generate 2.5 quintillion bytes of data; it’s up to chief data officers to determine its value and opportunities for strategic growth. If a business can manage its data, as well as collaborate with other businesses in a secure and compliant way, the opportunity for improved outcomes is immense. | Data & Analytics |
Network World - 7 ways to fight network tool sprawl | Tool sprawl occurs when organizations acquire licenses (or not, in the case of open source) for multiple tools that tackle related, but not completely overlapping, issues. Layered security is the most obvious example of this, but the problem bedevils networking, DevOps, cloud teams, etc. | Network Management |
Datanami - Mezmo Reports DevSecOps Brings Significant Results Despite Low Adoption | According to the study, only 22% of respondent organizations have developed a formal DevSecOps strategy integrating security into software development lifecycle (SDLC) processes, but an overwhelming percentage of those report a positive impact on accelerating incident detection (95%) and response (96%) efforts. | DevOps |
Network World - Cloud environments challenge network visibility | EMA defines a network-visibility architecture as an overlay of traffic mirroring, aggregation, and distribution tools that delivers network traffic data to other systems. It captures packet data from the cloud and on-premises networks and feeds it to security tools and performance analysis systems, such as intrusion detection or application performance-management software. | Cloud |
VentureBeat - Nearly half of enterprises operate with only a ‘limited’ product data strategy | In the last 12 months, only 33% of the lot saw faster time-to-market as against 52% of advanced companies. The levels of innovation (51% vs. 63%), employee productivity (50% vs. 62%), and manufacturing efficiency (41% vs. 58%) were also lower. | Data & Analytics |
Network World - Enterprise adoption of smartNICs faces challenges | The Ethernet controller and adapter market will grow from $3.2 billion in 2021 to $5 billion in 2026, with smartNICs contributing significantly to the growth, according to Dell’Oro Group. In addition, server network connectivity will transition to higher speeds, according to the research firm, which predicts 100 Gbps and higher-speed ports will account for 44% of the shipments in five years. | Network Management |
VentureBeat - Black Hat 2022 reveals enterprise security trends | Infrastructure, devops, and enterprise software vulnerabilities discovered by researchers made the enterprise-specific sessions worth attending. In addition, improving identity access management (IAM) and privileged access management (PAM), stopping ransomware attacks, reducing Azure Active Directory (AD) and SAP HTTP server attacks, and making software supply chains more secure dominated the enterprise sessions. | Security |
sdxCentral - Mendix, Microsoft, Outsystems Among Low-Code Market Drivers | As enterprises seek agility and adaptability, many are pairing centralized application investment with owning their own app development and data analytics tools. And low-code platforms are an obvious answer to this “business appetite for technology self-service,” | Tech Trends |
VentureBeat - Report: Hacking is the top cause of data breaches | Insider risk is a perennial topic of discussion. Is the insider threat fact or fiction? The answer is not a simple yes or no. Of the breaches with a confirmed origin, only 23% of incidents originated from within the victim organization and of that figure, the majority, 61%, were attributable to data handling mistakes. | Security |
AiThority - XDR Momentum Grows as Industry Calls for Solution to Common Security Challenges | CISOs look to XDR, especially advanced threat detection, to improve security efficacy. They also want XDR to streamline SecOps and bolster staff productivity to alleviate staff shortages. | Security |
VentureBeat - 10 blockchain startups to watch | Gartner predicts the business value generated by blockchain will increase, reaching $176 billion by 2025 and $3.1 trillion by 2030. In addition, Grand View Research estimates the global blockchain technology market will grow at a rate of 85.9% between 2022 and 2030. | Blockchain |
ZDNet - Hackers are finding ways around multi-factor authentication. Here's what to watch for | Another method cyber criminals can exploit to bypass MFA is by using malware which actively steals codes. For example, the hackers could gain access to an account by using trojan malware to watch a user gain access to their account, then use the access they have from the infected device to go about their business. | Security |
VentureBeat - Fears of AI sentience are a distraction | The artificial intelligence (AI) and machine learning (ML) programs that underpin chatbots are capable of extraordinary achievements, of which we have only seen the very tip of the iceberg. But putting themselves in the shoes of human beings — and feeling their feelings — is not among their current, or likely future, achievements. | Artificial Intelligence |
VentureBeat - The problem with our cybersecurity problem | We need a new approach, and lessons from a generation ago can point us in the right direction. Back then, cybersecurity professionals created disaster recovery and business continuity plans, calculating downtime and its disruptive effects to justify investment in a holistic approach. We can do that again, but it will require less focus on tools and more clarity of purpose. | Security |
eWeek - Citrix vs. VMware: VDI/DaaS Comparison 2022 | DaaS provides virtual desktop services as well as applications that are aimed at enabling a seamless remote workforce, allowing organizations to raise productivity and efficiency and heighten security, and to remove many of the complexities involved in VDI. Instead of managing the underlying hardware in the data center, those functions can be pushed into the cloud and handed off to an external provider. | Automation & Productivity |
VentureBeat - Why edge is eating the world | An architecture pattern that lends itself nicely to these constraints is Serverless. Instead of hosting a machine yourself, you just write a function, which then gets executed by an intelligent system when needed. You don’t need to worry about the abstraction of an individual server anymore: you just write functions that run and basically scale infinitely. | Edge Computing |
sdxCentral - Splunk: Zero Trust 'Critical' in a Permissionless World | Evolving the way companies think about their networks, Shelton continued, comes down to categorization for zero-trust access (ZTA) – pillars of identity, devices, network, applications, and data. Businesses can mature these pillars independently as their security controls grow to develop sophisticated amounts of visibility, analytics, automation, and governance. | Security |
InformationWeek - 10 Creative Ways to Slice IT Costs | “Define product-centric IT and cloud budgets, including business and IT4IT products, and align all business processes, applications, infrastructure, people, and technologies to these products. This way, you can invest in the areas that enable higher business value while implementing mechanisms to control costs in other areas through automations and DevSecOps,” says Kulkarni. | IT Management |
VentureBeat - Report: Data engineers spend 2 days per week firefighting bad data quality | Respondents reported that on average, 40% of their time is spent evaluating or checking data quality. Additionally, more than half of respondents ranked building or fixing pipelines as taking the most amount of their time throughout the day. | Data & Analytics |
Network World - How many jobs are available in technology? | Tech industry employment saw a net gain of 12,700 workers, the 20th consecutive month of growth. So far this year, the tech sector has gained 143,700 jobs, an increase of 55% year-over-year, according to CompTIA. | Tech Jobs |
VentureBeat - How cross-operational teams can improve security posture | In a new research study commissioned by data management company Cohesity, 81% of respondent IT and security operations (SecOps) decision makers agreed that, at the very least, IT and SecOps should share the responsibility of their organization’s data security strategy. | Security |
SiliconANGLE - Top takeaways and analyst insights from the Supercloud 22 event | Another hotly debated topic was if there will be one supercloud to rule them all or many different superclouds created to meet the unique needs of an organization or industry. Open-source and proprietary models are facing off, as Snowflake Inc. and Databricks Inc. demonstrate two very different approaches to creating a supercloud. | Cloud |
VentureBeat - Twilio and Cisco breaches highlight the dangers of social engineering attacks | During the attack, hackers created an SMS phishing scam (or smishing attempt), which impersonated Twilio’s IT department and warned employees that their passwords had expired or needed to be changed. | Security |
sdxCentral - Don't Use Bug Bounties as ‘Botox’ to Cover Internal Security Flaws | “Because what you will find is that at about the 18-month or two-year mark of running a bug bounty program internally you will lose key people and the program will collapse under its own weight,” Moussouris said. | Security |
AiThority - Online RL-based DayDreamer can Train a Robot without New Machine Learning Algorithms and Simulation | The pace at which the Dreamer learns so quickly and outperforms other models can be attributed to its simple pipeline for Online RL, its immaculately designed robot hardware without simulators and enhanced interaction between its supervised learning-based world model and neural networking policy | Automation & Productivity |
Network World - Cisco embraces multi-cloud networking software | “MCNS products address traffic routing, secure ingress/egress and integrate with available public cloud services," Gartner wrote. "These products are delivered as software, which can be self-managed and/or delivered as a service, and are accessible via application programming interfaces (APIs) and user interfaces (UIs). | Network Management |
AiThority - New AI Facial Recognition and Emotion Detection Solution Powered by Intetics | Emotion AI products and solutions are incorporated into many industries to help deliver an emotionally rich experience. It can aid in the diagnosis of mental and neurological disorders in healthcare. Help educators engage students more in the lessons they are teaching. Assist talent acquisition specialists in locating the best prospects for hiring. | Artificial Intelligence |
VentureBeat - Rising cloud spending may not signal the end of traditional infrastructure | In a survey of respondents using mainframe technology, 80% of IT professionals said mainframe technology remains critical to business operations. Enterprise organizations have layer upon layer of technology that has accumulated over time, in an intricate web of applications and processes that support their business. | Cloud |
sdxCentral - Chris Krebs: Cybersecurity Will be ‘Near-Term Bearish, Long-Term Bullish’ | Technological innovations will collect and generate more data, along with the cloud migration, which makes cyberspace become an “unthinkable complexity.” At the same time, ransomware has gone professionalized and the number of threat actors is exploding. | Security |
VentureBeat - 9 common data governance mistakes and how to avoid them | Simply put, a strong data governance program has clear rules and guidelines for how data should be created or gathered, stored, protected, accessed, used and shared. It’s as much about human activity as it is about technology processes. | Data Management |
AiThority - Sisense Research Reveals Critical Barriers Preventing Data Analytics Adoption Across APAC | According to the Future of Data Analytics Report 2022 – Asia Pacific Edition, almost two-thirds (61%) of respondents are concerned about data transmission. Respondents also shared effective analysis of data (58%) and inadequate systems in place to manage risk (58%) are a concern. | Data & Analytics |
VentureBeat - Why managed detection and response (MDR) adoption is growing among small businesses | As a result, Forrester research found that 64% of SMBs running an SOC internally or in a hybrid internal/external model have ten or fewer employees operating their SOC, with 32% running one with five or fewer employees. In addition, while 81% of SMBs surveyed are monitored by an internal security operations center (SOC), more than half (57%) do not operate 24 hours a day, seven days a week. | Security |
SiliconANGLE - Gartner to enterprises: Keep tabs on these 25 emerging tech trends | These new technologies are mostly centered on innovations that stem from blockchain and cryptocurrency, and include the metaverse, nonfungible tokens, super apps, Web3, decentralized identity, digital humans, digital twins of customers and internal talent marketplaces. | Emerging Tech |
VentureBeat - 10 top artificial intelligence (AI) solutions in 2022 | The AI software market includes not just technologies with built-in AI processes, but also the platforms that allow developers to build AI systems from scratch. This could range from chatbots to deep and machine learning software and other platforms with cognitive computing capabilities. | Artificial Intelligence |
Datanami - Monte Carlo Survey: Data Engineers Spend Two Days Per Week on Bad Data | Worse, 58% said the total number of incidents has increased somewhat or greatly over the past year, often as a result of more complex pipelines, bigger data teams, greater volumes of data, and other factors. | Data & Analytics |
VentureBeat - Network misconfigurations cost organizations 9% of annual revenue | The report also found that organizations were failing to effectively address misconfigurations due to inconsistent auditing activity. In fact, most organizations are only auditing their devices annually, with switches and routers checked for misconfigurations in 96% of cases, an approach best described as risk assessment by sampling. | Network Management |
SiliconANGLE - Supercloud may be the eventual solution to multicloud problems, say industry analysts | So, while most companies may have multiclouds, each cloud operates in a silo, with separate development and operating environments, different APIs and primitives and so on. This means companies can’t benefit from cross-cloud functionality but do suffer from higher costs, security risks and friction in sharing data. | Cloud |
Datanami - Appen Releases Annual State of AI and Machine Learning Report | According to the report’s findings, 51% of participants agree that data accuracy is critical to their AI use case. To successfully build AI models, organizations need accurate and high-quality data. Unfortunately, business leaders and technologists report a significant gap in ideal vs reality in achieving data accuracy. | Data Management |
VentureBeat - Ransomware gangs move away from exploiting Microsoft Office macros | Expel’s Quarterly Threat Report found that a macro-enabled Microsoft Word document (VBA macro) or Excel 4.0 macro was the initial attack vector in 55% of pre-ransomware incidents in Q1 of this year, but in Q2 that figure fell to 9%, a decrease of 46% after Microsoft’s decision to block macros by default. | Security |
Network World - Just-in-time IT infrastructure: How to attain it for strategic advantage | Another key component of flexibility is portability. Environments that require three-months to migrate an application from one server to another just don’t cut it in the modern data center. The infrastructure should have enough abstraction built in that migrating a workload from one data center to another, or even temporarily to the cloud, is a simple matter of triggering the migration with a script or an import wizard. | IT Management |
ZDNet - This company didn't spot the flaw in their network. But three ransomware gangs did | According to analysis of the incidents, the first sign of suspicious activity occurred on December 2nd 2021, with an unknown attacker, possibly an initial access broker – a malicious hacker who breaches networks and sells access to other cyber criminals – establishing a remote desktop protocol (RDP) session on the organisation's domain controller for almost an hour. | Security |
VentureBeat - Introduction to observability: What it is and why it’s important | If you were asked which of your microservices are experiencing the most errors, what the worst-performing part of your system is, or what the most common frontend error your customers are experiencing, would you be able to answer those questions? | IT Management |
sdxCentral - Decentralization Haunts Security, Cloud Transitions | “Half the malware downloads we see originate from cloud apps, and attackers do that to bypass block lists to exploit trust,” Canzanese said. “Once they’re on the endpoints, we see them also using their own infrastructure, using cloud apps like Twitter, GitHub, Slack for command and control traffic as well.” | Security |
Network World - Report: Cloud services can be made more resilient but at a premium | Enterprises have options for making cloud services more resilient but at a price premium of up to 111% over the base price of services that offer no protection, according to a study by Uptime Institute. | Cloud |
VentureBeat - Artificial intelligence (AI) vs. machine learning (ML): Key comparisons | Within the last decade, the terms artificial intelligence (AI) and machine learning (ML) have become buzzwords that are often used interchangeably. While AI and ML are inextricably linked and share similar characteristics, they are not the same thing. Rather, ML is a major subset of AI. | AI/ML |
SiliconANGLE - Complicated rivalry between Snowflake and Databricks spotlights key trends in enterprise computing | The attention surrounding this burgeoning competition between the two data storage and analytics firms highlights the growing influence of superclouds, exemplified by companies like Snowflake and Databricks that provide an abstraction layer above and across hyperscale infrastructure. It is a rivalry that foreshadows a new wave of technology influencers as the two firms compete for control of the enterprise’s most important asset – data itself. | Data & Analytics |
VentureBeat - Why the lack of metaverse integration in today’s VR ecosystem needs to be addressed | In short, these projects are designed to devise an unprecedented, new virtual world that is on a level equivalent to that of world-class gaming titles — all while mixing in key aspects of blockchain and crypto tech such as non-fungible tokens (NFTs), native cryptocurrencies, and a decentralized asset market. | Metaverse |
AiThority - Hashed Emails – Not the Solution for the Post-cookie World | Some corners of the industry have turned to transacting directly on hashed emails as an alternative to cookies and device IDs. While this can be a shortcut to getting publishers and marketers started matching their datasets, the technique is lacking for a number of mission-critical reasons – it only works on direct deals, it is not security safe, it doesn’t give the publisher full control, and it’s not person-based | Marketing Tech |
VentureBeat - Zeroing in on zero party data: Embracing privacy and personalization | The challenge is that many organizations have not previously depended on discovering and utilizing their own data sources, meaning they must develop new response strategies. These include allocating more resources to contextual marketing tactics, building zero and first-party data assets, and forming compliant second-party relationships. | Data & Analytics |
VentureBeat - How digital twins are transforming network infrastructure: Future state (part 2) | The market for digital twins is expected to grow at a whopping 35% CAGR (compound annual growth rate) between 2022 and 2027, from a valuation of $10.3 billion to $61.5 billion. Internet of things (IoT) devices are driving a large percentage of that growth, and campus networks represent a critical aspect of infrastructure required to support the widespread rollout of the growing number of IoT devices. | Network Management |
VentureBeat - How digital twins are transforming network infrastructure, part 1 | Today, we’ll look at the current state of networking and how digital twins are helping to automate the process, as well as the shortcomings that are currently being seen with the technology. | Network Management |
sdxCentral - Shift-Left Security Fails to Protect APIs, Salt Security Finds | While more than half (53%) of the surveyed professionals already prioritized identifying and remediating API security gaps during development and 59% of them look for API issues in testing, a large majority (94%) of them reported API security incidents, which indicate a need for increased runtime protection, the report pointed out. | Security |
VentureBeat - Gartner research: 2 types of emerging AI near hype cycle peak | Frank says it is part of a larger trend called “influence AI” that “seeks to automate elements of digital experience that guide user choices at scale by learning and applying techniques of behavioral science.” | Artificial Intelligence |
Network World - 802.11x: Wi-Fi standards and speeds explained | The following is an explanation of Wi-Fi standards broken into four sections: popular core standards, future standards that are still under development, standards that are designed for niche applications and historical standards that might not be in use anymore. | Network Management |
VentureBeat - GraphQL is a big deal: Why isn’t it the industry standard for database querying? | Not only do apps send data to backends, but apps need data from the backend. For example, recommendations, the status of a delivery, account balances. And that’s what GraphQL is for: Getting data to and from the backend. It is a more modern API that connects apps to backends. | Data & Analytics |
AiThority - Accessing the Full Power of Text Data as Part of Your Insights Framework | Most companies have huge amounts of text data and, for the most part, it is giving them little to no information. Free, or unstructured, text data is rampant across business ecosystems, containing vital insights from things like social media chatter, product reviews and customer feedback. | Data & Analytics |
VentureBeat - What is data-warehouse-as-a-service (DWaaS)? Definition, key functions and solution providers | With the volume of enterprise data growing at a breathtaking pace (e.g., IDC projects a 23% CAGR to 175 zettabytes by 2025), the adoption of modern data infrastructure has become inevitable. Companies of all sizes and sectors are inevitably adopting more effective data solutions. | Data & Analytics |
AiThority - Wipers and IoT Botnets Dominate the Threat Landscape | Since Russia began its invasion of Ukraine in February 2022, Nozomi Networks Labs researchers saw activity from several types of threat actors, including hacktivists, nation-state APTs, and cyber criminals. They also observed the robust usage of wiper malware, and witnessed the emergence of an Industroyer variant, dubbed Industroyer2, developed to misuse the IEC-104 protocol, which is commonly used in industrial environments. | Security |
GeekWire - New report details cybersecurity challenges and strategies in the middle market | Even with the decline in reported attacks, companies recognize the risks in the current dynamic threat environment, with 72% of executives anticipating that unauthorized users will attempt to access data or systems in 2022, a sharp rise from 64% last year and the highest number since RSM began tracking data in 2015. | Security |
AiThority - Public Cloud 5G Workloads to Grow at 88 percent CAGR, $4.6 Billion over Five Years, According to Dell’Oro Group | “Most of the HCP press releases are about HCPs adding network solutions for Enterprises that desire 5G device connectivity via a Hybrid Cloud at the edge location. Our projections are for Public Cloud revenues, not Hybrid Clouds at the edge of the networks. | Cloud |
Blocks & Files - Gartner Backup and Recovery Magic Quadrant says hello to newbie | Commvault leads the rankings, closely followed by Veeam and Rubrik with Veritas in hot pursuit, followed by Cohesity also in close pursuit, and then Dell a little way behind. We note that Rubrik has been ranked as having the most Completeness of Vision and Veeam has the highest Ability to Execute, while Commvault has the strongest balance between these two measures. | Data Management |
VentureBeat - How automation is transforming security and compliance | It takes a combo of security — or the ongoing practices and policies that you put in place to care for your customers’ data and protect the integrity of your business — and compliance. That, and the associated standards, is what demonstrates your great security posture, especially as more standards emerge. | Automation & Productivity |
Datanami - Tricentis Survey Reveals Majority of Organizations Recognize Value in AI-Augmented DevOps | The survey found that testing is where organizations are expecting the greatest value from AI-augmented DevOps, with nearly 70% of respondents rating the potential of AI-augmented testing as extremely or very valuable. | DevOps |
threatpost - Securing Your Move to the Hybrid Cloud | The question then becomes: How can an organization maintain consistent governance, policy enforcement and controls across different clouds? And how can it ensure that it maintains its security posture when moving between them? | Security |
Datanami - Gigamon: Deep Observability Forecasted to Grow From $278M to $2B by 2026 | “Deep observability as an emerging, fast-growing market presents a significant opportunity for IT leaders to re-evaluate how they gain value from their digital tools." | Tech Trends |
VentureBeat - Software is finally eating the physical world, and that may save us | As we create digital copies of our physical selves and our planet, we can begin building potential solutions to problems faster while testing them on our digital twins first. This will have profound implications in the quality of our lives – far beyond the changes wrought by software eating the digital world and giving us social media, “likes,” simpler travel and easier banking. | Emerging Tech |
Network World - 3 places edge-computing challenges can lurk | Often, though, the model creates new redundancies that drive up costs—for instance storage. Instead of one central copy of each file, the edge network may keep a separate copy at each edge node. If your edge network is small, a few extra copies may be great for adding redundancy. But when you’ve got 200 or more edge nodes, your storage costs could be 200 times greater. | Edge Computing |
VentureBeat - Insider risk: Employees are your biggest cyberthreat (and they may not even know it) | Today’s workforce is data-dependent and widely distributed. The use of cloud collaboration technology is sprawling. Data is highly portable, users are often remote and off the network, and file-sharing technology is widespread. It’s no wonder, then, that insider risk is of greater concern than ever. | Security |
AiThority - Global Study Reveals Search-Powered Technologies are Driving the Future of Digital Business | The research illustrates how search-powered technologies—the tools that enable the search of data across multiple sources—fuel business-critical initiatives, including cloud migration and utilization, cybersecurity, and customer experience. | Automation & Productivity |
Network World - Top IT vendors report good financials, onging supply woes | Gartner has reported that pre-pandemic, product lead times of four to six weeks were common. “Now, 200-300 days is common, and we’ve seen 430-plus days quoted in writing to customers. We expect lead times to remain high through early 2023, followed by slow incremental improvement over the course of months,” Gartner stated in a recent report. | IT Management |
threapost - Universities Put Email Users at Cyber Risk | Ninety-seven percent of the top 10 universities in the United States, the United Kingdom and Australia are subjecting students, staff and administration to higher risks of email-based impersonation and other attacks because their systems lack basic security, according to new research from Proofpoint revealed Tuesday | Security |
VentureBeat - IBM report shows healthcare has a growing cybersecurity gap | This year, 2022, is on pace to be a record-breaking year for enterprise breaches globally, with the average cost of a data breach reaching $4.35 million. That’s 12.7% higher than the average cost of a data breach in 2020, which was $3.86 million. It also found a record 83% of enterprises reporting more than one breach and that the average time to identify a breach is 277 days | Security |
VentureBeat - Understanding the evolution of the metaverse for business | The metaverse is the next (not final) iteration of the internet where human interactions will be a combination of virtual, real-time, three-dimensional, and physical experiences. Our ways of working, creating, buying and consuming are already radically changing. The impact of the change will be deeper than the impact of the smartphone. | Metaverse |
ZDNet - Reported ransomware attacks are just the tip of the iceberg. That's a problem for everyone | According to ENISA, it wasn't possible to confirm whether a ransom was paid in 94.2% of all the incidents they analysed, something that the agency says "limits our understanding and thus our ability to perform a proper analysis and mitigate the threat of ransomware". | Security |
VentureBeat - Bam! AI exits the Batcave to confront the jobs market | But it’s possible that AI could have the opposite effect and drive demand for skilled workers in new jobs. In this scenario, rote administrative work might indeed give way to algorithmic processes, but new opportunities are created for workers in data-intensive businesses. | Automation & Productivity |
sdxCentral - Fiber Fuels Broadband Spend Boom, Dell’Oro Finds | “For over a decade now, broadband spending has been pretty predictable and relatively flat at a macro level,” he said. But now, “it’s as if the entire industry woke up and said, yes, now is the time to retrofit my broadband networks for the next 10 to 15 years.” | Network Management |
VentureBeat - 3 things that need to happen for Web3 to (really) take off | There is an ever-expanding list of Web3 startups, be it DeFi protocols, NFTs, decentralized autonomous organizations (DAOs), play-to-earn (P2E) games, data storage and social media services. | Web3 |
Network World - What is a WAN? Wide-area network definition and examples | Your office network, home Wi-Fi, cellphone, smartwatch, doorbell camera and vehicle-based Internet connection are just endpoints on a vast global WAN that is constantly evolving to carry more traffic, and to carrt that traffic faster as the demands for near-instantaneous access to resources increase. | Network Management |
VentureBeat - What is supervised machine learning? | It is also an essential part of solving problems where there is no readily available training data that contains all the details that must be learned. Many supervised ML problems begin with gathering a team of people who will label or score the data elements with the desired answer. | Machine Learning |
sdxCentral - Illumio: How Does Your Zero-Trust Score Stack Up? | “Zero Trust Segmentation pioneers are 2.7x more likely to have highly effective attack response processes in place, are 2.1x more likely to have avoided a critical outage during an attack over the last 24 months, and save (on average) $20.1 million annually in downtime costs.” | Security |
VentureBeat - Afraid to delete data? Think again | Another issue with storing large amounts of obsolete data is that it clutters file servers, draining productivity. A 2021 survey by Wakefield Research found that 54% of U.S. office professionals agreed that they spend more time searching for documents and files than responding to emails and messages. | Automation & Productivity |
SiliconANGLE - How the cloud is changing security defenses in the 2020s | In this Breaking Analysis, we share our puts and takes from the recent AWS re:Inforce conference with an update on the latest hyperscale infrastructure-as-a-service market shares and insights from ETR survey data. We’ll also dig deeper into some technical aspects of Amazon Web Services Inc.’s Nitro, a system we believe is one of AWS’ secret weapons, with a focus on confidential computing and what it means for the future of systems architecture. | Security |
Network World - Network security depends on two foundations you probably don’t have Before adding more layers to network security, con | The concept of a “role” is very useful in limiting the number of explicit connection permission policies an enterprise needs. However, it depends on two things. First, the role’s rights must be strictly set to ensure that nobody has access to things their job doesn’t justify. Having a hierarchy of roles can help by eliminating redundant policy statements. Second, the validation of user identity has to be strong, so that they’re assigned the correct role and so that someone with no role is given no access. | Network Management |
Geekwire - New filing: Microsoft added record 40,000 employees in past year, up 22%, before job cuts | One notable effect of the growth is that Microsoft now employs more people in operations, about 85,000 employees as of June 30, than in product research and development, about 73,000 employees, according to its latest filing. The two job categories were of similar size inside the company until about two years ago. | Tech Jobs |
VentureBeat - SBOMs: What they are and why organizations need them | According to the U.S. Department of Commerce, SBOMs should offer a complete, formally structured, machine-readable list of these components, as well as libraries and modules required to build the software, the supply chain relationships between them, and their given vulnerabilities. | Security |
Datanami - Timescale Releases Third State of PostgreSQL Report | “By organizing and delivering the State of PostgreSQL report, we help developers and developer-centric companies and communities better understand what is happening with Postgres today: the different types of Postgres users, the kinds of use cases they are tackling, the places they go to share and learn, how that is all changing, and the opportunities for improvement in the Postgres community overall,” | Data & Analytics |
VentureBeat - 5 top trends driving data infrastructure strategies, according to Gartner | “The cloud will be the top trend that underpins everything else. We’re seeing a shift in the market right now,” Ronthal said. He noted that last year was almost the tipping point away from on-premises, which is when 50% of revenue for the database management systems market goes to cloud providers. He expects 2022 to be the tipping point toward the cloud. | Cloud |
SiliconANGLE - What recession? Tech spending stays robust as digital transformation plans forge ahead | “This is the first post-‘as-a-service’ recession,” said Philip Carter, a group vice president at International Data Corp. “IT has moved from being capital to an operating expense. The [traditional spending] lumpiness isn’t completely removed but it’s much less of a factor.” | IT Management |
AiThority - Blockchain Trends Disrupting IT and DevOps Industry | InterPlanetary File System (IPFS) is a project that combines storage and communication. IPFS is a fairly mature application with a developed ecosystem. It was one of the early applications that looked at blockchain in a new light. | Blockchain |
sdxCentral - MEF Panel: SASE Standardization Is Critical for Convergence | But despite the chaos around what SASE and SSE parameters are exactly, the panel was in agreement that the convergence of networking and security is now critical. | Security |
Threatpost - Phishing Attacks Skyrocket with Microsoft and Facebook as Most Abused Brands | According to the report by researchers at Vade, phishing attacks abusing the Microsoft brand increased 266 percent in the first quarter of 2022, compared to the year prior. Fake Facebook messages are up 177 percent in the second quarter of 2022 within the same timeframe. | Privacy & Security |
VentureBeat - Who owns your data? Re-imagining data management for Web3 | The lack of available user data harms small businesses, which rely on social media mammoths for information and algorithms to conduct effective advertising campaigns. Google seems to recognize this issue and appears willing to work with Meta to allow marketing data to be shared as it implements privacy changes. | Data Privacy |
Network World - Edge data center market to double in next 5 years, researchers say | Edge data centers, which the report defined as “small data centers located close to the edge of a network”—that is, closer to the end-user than the public cloud—are currently a $9.3 billion global market, the researchers said, which they predict will nearly double in size in the next half-decade. | Network Management |
VentureBeat - How edge computing is accelerating innovation across hardware, software and service provider domains | According to a report from AT&T Cybersecurity, 75% of security leaders are either planning, in the process of deploying, or have fully deployed an edge use case. This is largely attributed to the technology’s capacity to conserve bandwidth, speed up response times and enable data processing with fewer restrictions. | Edge Computing |
Threatpost -Threat Actors Pivot Around Microsoft’s Macro-Blocking in Office | The use of macros-enabled attachments by threat actors decreased about 66 percent between October 2021 and June 2022, according to new data by Proofpoint revealed in a blog post Thursday. The beginning of the decrease coincided with Microsoft’s plan to start blocking XL4 macros by default for Excel users, followed up with the blocking of VBA macros by default across the Office suite this year | Security |
sdxCentral - Personal Cloud Apps Drive Data Sprawl, Netskope Finds | Netskope released its latest Cloud Threat Report on data sprawl, examining how organizations use cloud apps to create, upload, share, and store data. The report found the number of cloud apps organizations use continues to climb – up 35% in the first five months of 2022. | Cloud |
VentureBeat - What identity threat detection and response (ITDR) means in a zero-trust world | Identities are one of the most attacked perimeters an enterprise has, and the trend continues to accelerate. Cyberattacks aimed at bypassing identity access management (IAM) are succeeding, with cyberattackers moving laterally across enterprise networks undetected. | Security |
SiliconANGLE - IBM Security report finds data breaches are costlier than ever before | Whether companies are exclusively to blame for lax cybersecurity is arguable, but many were found lacking in adopting cutting-edge and more modern security practices. Eighty percent of critical infrastructure organizations studied were found to have not adopted zero-trust strategies, seeing average breach costs rise to $5.4 million – a $1.17 million increase compared with those that do. | Security |
VentureBeat - 75% of IT security professionals say they don’t get the support they need | Going further, 63% said that their company’s board still doesn’t fully understand identity security and the role it plays in enabling better business operations. | IT Management |
ZDNet - Cloud computing use is growing, but so is regulation | European firms are reaching a new scale of public cloud usage, with 92% of companies in the UK, France and Germany saying they have adopted cloud computing, with 78% reporting they use a hybrid cloud, and 75% using multiple public clouds mostly on US-made technology, according to research by analyst firm Forrester. | Cloud |
VentureBeat - Report shows a third of employees don’t understand importance of cybersecurity | Research from Tessian released today found that while 99% of IT and security leaders agreed a strong security culture is important in maintaining a strong security posture, 30% of employees do not think they personally play a role in maintaining their company’s cybersecurity posture. | Security |
Network World - Enterprise SSD prices are in for a drop | The cause is an oversupply combined with the threat of a recession, according to Taiwanese market research firm TrendForce. The firm said a combination of slowing demand across all segments of the NAND memory business, along with a reluctance to invest in additional capacity, has led to the glut. | Data Storage |
VentureBeat - How to gain an unfair advantage over cyberattackers: “Mission control” cybersecurity | Most organizations cannot afford to employ full-time security operations center (SOC) analysts to handle the alerts generated by the myriad of products in their environment. As a result, infosec’s day-to-day work becomes an endless struggle of filtering through and responding to alerts, which distracts the team from focusing on implementing security processes, policies and controls to improve overall security posture and maturity. | Security |
ZDNet - Your biggest cyber-crime threat has almost nothing to do with technology | What makes BEC such a rich opportunity for scammers is there's rarely a need to be a highly skilled hacker. All someone really needs is a laptop, an internet connection, a bit of patience – and some nefarious intent. | Privacy & Security |
VentureBeat - Data sovereignty: The hidden economic trade-offs | Thus, data sovereignty laws may compel organizations to store data locally even though it may cost more to do so. Storing many pockets of data in different countries may not only be more expensive, but it could significantly complicate data analysis and normal business processes. | Data Management |
ZDNet - Digital presenteeism is creating a future of work that nobody wants | According to a report by software companies Qatalog and GitLab, inequalities in workplace hierarchies and an abundance of remote-working tools are creating a "pervasive culture of digital presenteeism" that is damaging productivity and leading staff to work longer hours. | Automation & Productivity |
VentureBeat - Designing the metaverse: Challenges and questions | As in the early days of Web2 with crowded websites and ads everywhere, there is the potential that disguised ads among other dark patterns can be mine traps in the metaverse, working to break the trust bond between the platform and the user. Even if we are able to avoid the dark patterns, the metaverse may still have elements continually pop into view, making it difficult to concentrate on a single action. | Metaverse |
ZDNet - Regrets, they have a lot. Companies feel sorrow over big IT purchases | What are the salespeople at tech companies thinking? Are they straining their every sinew to help companies buy the right technology for their actual needs? Or might many know a mark when they see one and be motivated only by the glorious maximality of the potential sale? | IT Management |
sdxCentral - Trellix: U.S. Business Services Are Major Ransomware Targets | Telecom led the top 10 global customer sectors with 53% ransomware detection, followed by business services, media and communications, finance, and transportation and shipping. | Security |
SiliconANGLE - Analysts see rise of the supercloud as creating a new chapter in enterprise IT | A prime example of the supercloud principle in action can be seen in the growth of Snowflake Inc. The Data Cloud provider built its business on top of the AWS platform, and it has emerged as a powerhouse that now spans multiple clouds and supports distributed data at scale. | Cloud |
VentureBeat - 3 reasons the centralized cloud is failing your data-driven business | Edge native, in comparison to cloud native, is built for decentralization. It is designed to ingest, process, and analyze data closer to where it’s generated. For business use cases requiring real-time insight, edge computing helps businesses get the insight they need from their data without the prohibitive write costs of centralizing data. | Cloud |
Forbes - Why And How CIOs And CISOs Should Incorporate Storage Into Their Cybersecurity Strategies | "I’ve seen cybercriminals targeting primary storage and secondary, backup or disaster recovery storage with greater sophistication. Cybercriminals can take advantage of the company’s enterprise storage systems and do it in deceptive and sneaky ways." | Security |
Datanami - AtScale Research Demonstrates Benefits of Using a Semantic Layer for BI & AI Initiatives | A semantic layer maps complex enterprise data into well-defined business metrics, creating a single, consistent, structured, integrated data product (dataset) ready for analysts and data scientists to consume. A semantic layer enables centralized governance while supporting distributed data product creation across teams. | Data & Analytics |
eWeek - The Future of Artificial Intelligence | AI has become a prevalent piece of modern life. When you search something on Google, you’ll be dealing with its Multitask Unified Model (MUM) AI algorithm, the latest in a series of AI at the core of Google’s search engine. If you own Amazon’s Alexa or a similar home virtual assistant, you’ve brought an AI into your home. | Artificial Intelligence |
sdxCentral - Broadcom Survey Shows Security Clash With User Experience | The survey found more than half of respondents prioritize security over the end-user experience, often doing so “at the expense of productivity and customer satisfaction.” Underscoring conflict between the two, 46% of respondents said they have bypassed security to improve user experience. | Security |
VentureBeat - How simple data analytics can put your data to work before you are ‘ML Ready’ | “I think a lot of CEOs, chief operating officers and CFOs with companies that have collected large volumes of data run into this issue, where everyone uses the same name for metrics, but the value is different depending on which data source they got it from. And that should almost never be the case,” he noted. | Data & Analytics |
Network World - Network automation, SASE, 5G rank among enterprise priorities | “There are lots of applications consuming SaaS, public cloud workloads, private cloud workloads, off-prem workloads, and organizations have to figure out how they’re going to connect users to those workloads. You can't backhaul any more to your private data center, and then go out through your nice tidy DMZ to the internet. That is just a terrible experience for most people,” Anderson said | Network Management |
VentureBeat - Forrester’s best practices for zero-trust microsegmentation | Of 14 microsegmentation vendors referenced in the report who tried to secure their private networks with limited segmentation, or by adopting a network access control (NAC) solution, 11 failed. | Security |
Network World - The emergence of multi-cloud networking software | Multi-cloud networking software (MCNS), which is available from industry stalwarts like Cisco and VMware, as well as a slew of startups, is designed to address the challenge of how to safely and efficiently connect networks and applications across multiple public cloud environments. | Cloud |
VentureBeat - Ransomware attacks drop 34% in Q2 but experts warn of potential ‘uptick’ | While this is a welcome reprieve for security teams, the report suggested that the reason for the decrease is the reorganization of the Conti cyber gang and Lockbit’s release of its 3.0 ransomware-as-a-service (RaaS) offering. | Security |
ZDNet - Banks have opportunity to plug digital identity gap in metaverse | Birch noted the lack of a global digital identity that was recognised regardless of where the individual was. Pointing to banks as potential players that could lead in this space, he said these financial services institutions already were experienced in Know Your Customer (KYC) processes. | Privacy & Security |
VentureBeat - Report: 47% of orgs experienced a voice phishing attack last year | The majority of enterprises are unaware of the volume of unwanted voice traffic (phone calls) that traverses their voice network, or the significance of threats lurking in unwanted traffic — robocalls, spoof calls, scam calls, spam calls, spam storms, vishing, smishing and social engineering. | Security |
sdxCentral - Is Twitter Underestimating Bot Activity? | Musk recently estimated that at least 20% of Twitter’s accounts are spam bots and admitted 20% is likely a low-ball percentage. And based on Woods’ research and industry experience, he estimates that more than 80% of Twitter accounts are actually bots. | Privacy & Security |
VentureBeat - The current state of zero-trust cloud security | “Clearly what’s showing up time and again is that traditional legacy security tools are not working,” said Jawahar Sivasankaran, president and chief operating officer of Appgate, which today released the findings of a study examining pain points around securing cloud environments and the benefits of ZTNA. | Security |
VentureBeat - Why more orgs are moving away from the big 3 public cloud vendors | This was highlighted clearly in a new study released by Techstrong Research and Linode yesterday, which showed that while 93% of organizations use the top three cloud providers: Amazon Web Services, Microsoft Azure, and Google Cloud Compute, almost two-thirds are considering or are ready to buy from a trusted alternative cloud vendor. | Cloud |
sdxCentral - SSE, SASE Revenues Snowball, Dell’Oro Finds | The Dell’Oro report also found firewall-as-a-service (FWaaS) and zero-trust network access (ZTNA) revenues cumulatively more than doubled. However, Sanchez attributed slower growth of secure web gateway (SWG) and cloud access security broker (CASB) revenues, which cumulatively grew just under 30%, to the already large share of the market the two technologies have occupied for years. | Security |
Network World - 5 mistakes to avoid when implementing zero-trust | Cybersecurity vendors, sensing a big opportunity, have rushed to market an array of products labeled as zero-trust technologies. An informal survey that analyst firm IT-Harvest conducted of websites belonging to some 2,800 vendors showed 238 of them featuring zero-trust prominently. | Security |
VentureBeat - Data quality now outranks security in new governance initiatives | A key takeaway is that the pursuit of high-quality data has overtaken data security as the most important motivator for data governance initiatives. Forty-one percent of IT leaders agreed that their business decision-making relies fundamentally on trustworthy, high-quality data. | Data Management |
Network World - What is Wi-Fi 7, and will it replace wired Ethernet? | Wi-Fi 7 or 802.11be is the next Wi-Fi standard being worked on by the Institute of Electrical and Electronics Engineers that promises speeds of a whopping 46Gbps, nearly five times faster than Wi-Fi 6, as well as reduced latency. | Network Management |
SiliconANGLE - Beyond the edge: Why SASE means improved security for your entire network | SASE solutions offer a single place for managing policies, configuration and monitoring across the network. Creating a single-pane-of-glass visibility across the entire client-workload transaction simplifies management and allows teams to respond to threats with greater agility and effectiveness. | Security |
sdxCentral - Palo Alto Networks, Cisco, Fortinet Top WAN Security Vendors, TeleGeography Finds | The research also found that almost all of the respondents who claimed they adopted zero-trust security had multi-factor authentication (MFA) in place. Other widely adopted features include single sign-on (SSO), remote user and device access policies, privileged access management, and user behavior analytics. | Security |
SiliconANGLE - Answering the top 10 questions about supercloud | It was a new architecture that integrates infrastructure, unique platform attributes and software to solve new problems that the cloud vendors in our view weren’t addressing by themselves. It seemed to us that the ecosystem was pursuing opportunities across clouds that went beyond conventional implementations of multi-cloud. | Cloud |
VentureBeat - Digital accessibility: What to do when the data says you don’t exist | Incomplete data is almost inevitable given the analytical tools at our disposal. Typical tools track by traditional methods, including clicks and page views. Again this means that people who can’t access a product already won’t show up in the data. | Data & Analytics |
ZDNet - As hiring freezes and layoffs hit, is the bubble about to burst for tech workers? | As business leaders brace for surging inflation and higher costs, hiring and salary freezes are likely to follow – leaving emboldened tech workers feeling markedly less buoyant, and perhaps with less options in job negotiations than they have recently become accustomed to. | Tech Jobs |
VentureBeat - How emerging tech can protect your customers’ data privacy | I believe the key to winning and maintaining confidence in your data protection capabilities includes your ability to secure both data and the applications that process it from the rest of your IT infrastructure. That way, even when your network is compromised, your data is not. | Data Privacy |
Datanami - Equinix Global Tech Trends Survey Finds IT Leaders Planning for Growth Despite Recession Fears | In the US, the top five threats to business growth included security breaches and data leaks (73%), cyberattacks (68%), changing regulatory requirements around data privacy (67%), an explosion of data from adopting new technologies (67%), and downtime caused by infrastructure issues (65%). | IT Management |
ZDNet - Data scientist: Industry reaches 'point of maturity' as specializations grow | In fact, Glassdoor had more than 10,000 data scientist job postings as of publication. The site also said data scientist is third on its list of 50 best jobs in America for 2022. Enterprise architect and full-stack engineer were in first and second place. | Tech Jobs |
VentureBeat - What is the difference between a customer data platform (CDP) and a data management platform (DMP)? Definitions, collection methods and analysis best practices | While to the uninitiated they might sound like the same thing, there are important differences between the two and significant benefits of both. The main differentiators are their use, the types of data they collect, how personalized that data is and how long they retain that data. | Data & Analytics |
Computerworld - How many jobs are available in technology? | “In our interviews, we have found that Wall Street has stopped hiring, and a number of job offers for recent IT college graduates have had offers that were extended pulled back," | Tech Jobs |
VentureBeat - 2022 cybersecurity forecasts predict growth, emphasizing resilience | AI adoption and sales within cybersecurity platforms are projected to grow from $10.5 billion in 2020 to $46.3 billion in 2026, attaining a 28% CAGR in the forecast period. | Security |
ZDNet - Endless cyber-threat pressure could leave security staff burnt out. Here's what you need to change | The NCSC warns that organisations might find it difficult to maintain a strengthened cybersecurity posture for a long period of time, particularly because increased workloads for cybersecurity staff can "can harm their wellbeing and lead to lower productivity", which could result in a rise in "unsafe behaviours or errors" | Security |
9 cloud jobs with the biggest salaries | From a survey of 778 cloud professionals, the study discovered that on average, salaries in cloud roles increased last year by 4.3%, and those who had participated in 40 or more hours of training in the past year received higher salary increases. | Tech Jobs |
VentureBeat - Cybersecurity degrees: types, comparisons and best practices for selection | Anyone completing a cybersecurity course at a college can look forward to a rewarding and well-paid career. The median base salary for cybersecurity professionals in the U.S. is now more than $100,000 per year. That can rise in excess of $150,000 based on factors such as experience, possessing a master’s degree or promotions to executive or manager level. | Tech Jobs |
SiliconANGLE - Gartner estimates PC sales to drop by almost 10% this year | As to why this is happening, Gartner blamed a range of factors, including the global uncertainty caused by conflicts around the world, rising prices from inflation and supply problems, lockdowns in China and also the fact that some products simply won’t be available. | Tech Trends |
Network World - NaaS: Is it right for you, and how do you pick a vendor? | Enterprises have become comfortable switching from the purchase-and-refresh cycle for servers, storage and applications to a cloud-based as-a-service approach. So, why not take the same tack when it comes to the network? | Network Management |
VentureBeat - Cyber threat analyst: Key job skills and expected salary | Cyber threat analysts are professional intelligence experts. They use scientific and technical skills to analyze and address cyber threats for defensive and remedial purposes. This article discusses the role of a cyber threat analyst, the expected salary and scales and some essential skills for a successful cyber threat analyst career. | Tech Jobs |
Network World - IDC: Enterprises still moving workloads back from the cloud | A survey found that 71% of respondents expect to move all or some of their workloads currently running in public clouds back to private IT environments over the next two years. Only 13% expect to run all their workloads in the cloud, according to the survey sponsored by Supermicro. | Cloud |
VentureBeat - Vulnerability management: All you need to know | Vulnerability management is an important part of cybersecurity strategy. It involves proactive assessment, prioritization and treatment, as well as a comprehensive report of vulnerabilities within IT systems. | IT Management |
sdxCentral - SASE Exceeds Expectations, Study Finds | Secure access service edge (SASE) deployments are surpassing client expectations, especially in the areas of remote work connectivity, security performance, cost savings, visibility into the IT environment, and user experience. | IT Management |
VentureBeat - 4 AI research trends everyone is (or will be) talking about | Their research discusses what they refer to as emergent abilities of large language models (LLMs). An ability is considered to be emergent if it is not present in smaller models but is present in larger models. The thesis is that existence of such emergence implies that additional scaling could further expand the range of capabilities of language models. | Artificial Intelligence |
sdxCentral - ESG Service Spend Set to Surge, IDC Says | Many organizations have voluntarily reported their climate-related performance, such as scope-1 and 2 emissions and carbon intensity. In fact, Hewlett Packard Enterprise (HPE) fast-tracked its plans to be a zero-carbon company, chopping a decade off its original timeline. | ESG |
VentureBeat - Zero-trust market shows signs of maturity at RSA 2022 | CrowdStrike taking on the challenge of providing real-time telemetry data and long-term data archiving with Humio for Falcon and their launch of Asset Graph, which shows the vendors understand zero trust is about architectures and frameworks first. Real-time telemetry data is invaluable in building a zero-trust architecture. | Security |
ZDNet - Ransomware attacks are the biggest global cyber threat and still evolving, warns cybersecurity chief | Working alongside other law enforcement agencies, Cameron said that the NCSC is working to understand the criminal system that helps drive ransomware attacks – and how the nature of ransomware gangs and the techniques they're using to facilitate ransomware campaigns continue to evolve | Security |
VentureBeat - Report: 63% of IT leaders say their orgs lack support for cloud resources | This is particularly burdensome for organizations that operate in multicloud or hybrid cloud environments. Fifty-eight percent stated that their organization experienced greater risk and incurred additional expenses and unnecessary costs due to the infrastructure capabilities, consequently limiting the ability to drive innovation. | Cloud |
sdxCentral - Here's Why Mega Security Vendors Are Pushing the Platform Approach | As security teams are struggling with burnout and talent shortages, some of them are pivoting to work with fewer vendors in order to avoid overwhelming numbers of security alerts, tools, and management consoles. This is one of the major reasons why mega security vendors are touting their platform approach. | IT Management |
Network World - How to reduce cloud costs | The good news is that there are many tools and services designed to help organizations manage and optimize cloud costs. Tracy Woo of Forrester Research recently updated her report on this market segment. And Gartner has this list of 20 vendors under its “Cloud Management and Tooling” category. | Cloud |
sdxCentral - Juniper: Enterprise AI Adoptions Surge, Enhancing Security Is Key | Almost all (96%) of respondents expect AI will help reduce risk and increase quality within their organizations, and business functions such as networking/cloud (25%), IT infrastructure (21%), and supply chain (15%) will benefit most from AI implementation. | Artificial Intelligence |
VentureBeat - The psychology of phishing attacks | In addition, employees were more prone to error when fatigued, which threat actors regularly exploit. Tessian reported in 2021 that most phishing attacks are sent between 2 and 6 p.m., the post-lunch slump when employees are most likely to be tired or distracted. | Security |
eWeek - 4 Challenges of the SOC: How Decision Intelligence Can Help | The report also revealed that 62% of respondents believe there aren’t enough staff on their cybersecurity teams, and 20% say it takes over six months to locate qualified individuals for vacant positions. There is now a 2.7 million-person cybersecurity skills gap in the world. | Security |
VentureBeat - 3 reasons to consider adopting AI cybersecurity tools | While it’s not a silver bullet, AI is instrumental in detecting, preventing and responding to cyberattacks when paired with cybersecurity best practices — and it enables faster and more accurate security decision-making. | Security |
SiliconANGLE - Tech spending intentions hold steady despite macroeconomic concerns | Part of the reason for the spending levels are holding up is inflation. Stuff costs more so spending levels are higher, forcing IT managers to prioritize. Security remains the No. 1 priority and is less susceptible to cuts. Cloud migration, productivity initiatives and data projects remain top priorities. | IT Management |
VentureBeat - Protecting the modern workforce requires a new approach to third-party security | In many cases, outsourcing to temporary workers or external partners makes good business sense. Sometimes, given the constraints of the talent pool, there’s simply no other option for a company. Either way, organizations should be aware of the security risks that third parties bring — and the steps they can take to minimize the chances of a breach occurring. | Security |
AiThority - Startups Want Chatbots, but 80% Lack the Knowledge about Conversational AI | The survey says that 100% of startups think that chatbot’s integration is one of the most efficient ways to make their business more seamless. At the same time, the majority (almost 80%) mention that they are struggling with the development of chatbots and they are not well aware of how to implement chatbots, the survey says. | Automation & Productivity |
VentureBeat - Malware and best practices for malware removal | Today, malware attacks are everywhere you turn, from web pages to emails to software downloads on computer systems to mobile devices. According to PurpleSec’s recent report, in a single week, more than 18 million websites are malware-infested. | Security |
Network World - Private 5G promising for enterprises, but growth stymied by pandemic, lack of hardware | Price is also an issue. Since the hardware is new, the economies of scale haven't kicked in yet. And if a 5G project uses licensed spectrum, then there are the connectivity costs. "Do you want to be charged for every light or thermostat and pay for that connection?" Kindness says. | 5G |
AiThority - Could Instances of NLP Bias Derail AI? | The black-box nature of ML models can make it difficult to explain the decisions made by the models. Furthermore, models can overfit datasets or become overconfident and do not generalize well to unseen examples. However, in most cases, the dataset used for training and evaluation is the culprit for introducing bias. | Artificial Intelligence |
Blocks & Files - Odaseva points out API bottlenecks in SaaS backup | In the 2021 Evolution of Data Protection Cloud Strategies report from analyst firm ESG, 64 percent of IT decision-makers surveyed said that they are partially or fully responsible for backing up the data they have in SaaS applications. Of course, that leaves more than one-third (35 percent) who say they depend solely on their SaaS vendor to protect their organization’s data, which is far too high. | Data Management |
Datanami - Expert.ai Recognized as a Strong Performer in Text Analytics Platforms Evaluations | The document-oriented Forrester report states that “…text analytics – technologies that mine data from enterprise documents – has become a critical enterprise capability….” | Data & Analytics |
sdxCentral - Amazon, Microsoft, Google Drive Public Cloud Surge | The report found that those three players powered robust 36% growth in the infrastructure-as-a-service (IaaS) and platform-as-a-service (PaaS) public cloud segments, which hit $44 billion in revenues during the quarter. | Cloud |
eWeek - Splunk vs. ELK: Log Management and Analysis Comparison 2022 | Splunk and ELK are both excellent tools designed to solve a great many challenges related to security and performance monitoring. You can’t go too far wrong with either one. Both are strong in log management. Both offer fine analytics tools. Users rate both highly. In truth there is little to choose between them. Splunk gets the nod from Gartner, but that is understandable with ELK being open source. | Data & Analy tics |
Blocks & Files - DNA data storage wants to standardize | This transformed data is encoded into short DNA fragments and packed inside some kind of container, such as a glass bead, for preservation. One gram of DNA can theoretically store almost a zettabyte of digital data – one trillion gigabytes. Such fragments can be read in a DNA sequencing operation. They are tiny and can theoretically last for thousands of years or more. | Data Storage |
VentureBeat - How AI is quietly revolutionizing the back office | Not all back office processes are the same, however, and some will take to this new paradigm more quickly than others. The task at hand, then, is to determine which functions aren’t just the easiest to automate but will contribute most directly to the bottom line. | Automation & Productivity |
SiliconANGLE - Wikibon: Enterprises must embrace real-time analytics | “Real-time analytics is a prerequisite for transactional analytics, where the transaction applications issue real-time analytic queries. Wikibon believes that transactional analytics will profoundly simplify and automate business processes and dramatically improve costs, quality and customer satisfaction,” stated Floyer, who observed that “the author has yet to meet a senior executive who is happy with their traditional data warehouse.” | Data & Analytics |
VentureBeat - Report: 84% of orgs experienced an identity-related breach last year | The IDSA found that identity security investments have emerged as a focal point with cloud, zero trust and digital transformation initiatives leading the way. However, basics such as MFA, de-provisioning, and privileged access reviews are still lacking. | Security |
SiliconANGLE - Conquering ‘shadow IT’: How enterprises are trying to tame the cloud software beast | It was eye-opening to see the number of active licenses attached to ex-employees or users who had never used the software at all, Wood said. “We’ve only had Zluri for a couple of months but I’d say we’ve saved $150,000 by eliminating shadow IT, pulling back on some services and not overbuying,” she said. | IT Management |
ZDNet - Tech jobs: These are the 10 most in-demand developer, cybersecurity and cloud roles | Information security engineers require good knowledge of Linux, UNIX, and Java systems, as well as knowledge of software writing, SSL, SSH, and SIEM systems. According to Glassdoor, the average salary for this role is $119,000. | Tech Jobs |
VentureBeat - What Gartner’s top cybersecurity predictions for 2022-23 reveal | Implied in the predictions is advice to focus not just on ransomware or any other currently trending type of cyberattack, but to prioritize cybersecurity investments as core to managing risks and see them as investments in the business. | Security |
ZDNet - 80% of organizations will have hyperautomation on their technology roadmap by 2024 | The highest demand for automation came from research and development (39%), administrative/operations (38%), customer service (33%), and marketing (26%) teams. | Automation & Productivity |
VentureBeat - Report: Orgs with zero-trust segmentation avoid 5 major cyberattacks annually | Most surprisingly, the report found that 47% of security leaders do not believe they will be breached — despite increasingly sophisticated and frequent attacks and rising zero-trust adoption rates (even though “assume breach” is a core principle of zero trust). | Security |
Network World - Data archiving: It doesn’t have to be on tape | For most organizations that reach a certain size, standardized linear tape open (LTO) magnetic tape is the best choice. But for those that cannot justify the cost or believe tape is a thing of the past, there are three viable alternatives: object storage in the cloud, on-premises disk storage, and optical media. | Data Storage |
VentureBeat - Why businesses take a month or more to deploy ML models and what you can do | But what many companies often don’t realize early on is that the initial stage must then be followed by another, arguably more challenging phase – deployment. This second stage involves moving the ready model to production, testing and fine-tuning it, and then scaling up accordingly. | Machine Learning |
eWeek - It’s Time to Rethink Breach Management | For example, it isn’t unusual for an organization to have data scattered across dozens of cloud services and SaaS applications. This might include AWS RedShift, Athena and DynamoDB; Azure Blobs and Azure SQL Database; and Google Cloud Storage and BigQuery. Elements might also extend into Oracle platforms, SaaS tools such as Salesforce, Slack and Workday, and various self-managed tools, apps and data warehouses. | Security |
ZDNet - Metaverse: Momentum is building, but companies are still staying cautious | "I do believe that one day business will commonly be conducted in a fully immersive 3D visual metaverse. But it will not happen in the 2020s. It probably won't happen in the 2030s." | Metaverse |
Blocks & Files - Boffins design NAND and persistent memory in single SSD reference architecture | RDMA transfers are utilised by modern databases to accomplish this logging as fast as possible. The eight authors of a paper published in SIGMOD ’22, “X-SSD: A storage system with native support for database logging and replication”, think the current method is not portable, has a complex data path and low interoperability. | Data Storage |
sdxCentral - Forrester: Gilded Age of Security Unicorns Has Ended | First, businesses should hire talent that the cyber unicorns are letting go of. More so, talent should not be ignored if they lack experience on a corporate cybersecurity team. The staffing and skills gap in the industry is large, and businesses should open their doors to hires from different organizations that most likely will have diverse backgrounds with ample experience from other regions, verticals, and people. | Tech Jobs |
eWeek - Best Machine Learning Platforms 2022 | Although ML is closely related to statistical analysis and data mining—and there are often overlaps across these disciplines—what sets ML apart is the ability to spot patterns, trends and properties that would otherwise go unnoticed or remain out of reach. | Machine Learning |
VentureBeat - Creating a powerful data department with data science | Today, speak to any business leader and nearly all will say that data science is a critical focus for their organization. Yet the reality is they’re struggling — recent research shows many firms are unfit for data, for a myriad of reasons including organizational capability, lack of talent, poor quality data and collection processes, to name a few. | Data & Analytics |
Blocks & Files - Veritas takes autonomous data management moonshot | Veritas’s strategy comprises developing autonomy features, adding virtual air-gapped protection in the cloud, and AI-based ransomware resilience. It wants to deliver protection, availability, and compliance within and across hybrid, private, and public clouds with subscription and as-a-service business models | Data Management |
Datanami - GigaOm Benchmark Study Names SingleStore Best Database | The study revealed that SingleStoreDB delivers a 50% lower TCO against the combination of MySQL and Snowflake and a 60% lower TCO compared to the combination of PostgreSQL and Redshift, leading OLTP and OLAP database combinations that customers stitch together in an attempt to power SaaS, APIs and data-intensive applications. | Data & Analytics |
VentureBeat - The truth about AI and ROI: Can artificial intelligence really deliver? | According to the 2022 IBM Global AI Adoption Index, 35% of companies report using AI today in their business, while an additional 42% say they are exploring AI. Meanwhile, a McKinsey survey found that 56% of respondents reported they had adopted AI in at least one function in 2021, up from 50% in 2020. | Artificial Intelligence |
ZDNet - Information technology jobs and top careers | In May 2021, tech professionals earned a median salary of $97,430 per year, according to the U.S. Bureau of Labor Statistics (BLS). The BLS projects 13% job growth in computer and information technology occupations from 2020-30. | Tech Jobs |
sdxCentral - Amazon, Microsoft, Google See Surging Serverless Interest | Datadog noted that Amazon Web Services’ (AWS) Lambda remains the benchmark for serverless usage, which is not surprising as Lambda was the genesis of the current serverless movement. Jumping off of Lambda, the report found that more than 20% of Lambda aficionados were using AWS’ Elastic Container Service (ECS) Fargate platform to “launch containers without managing and provisioning EC2 instances.” | IT Management |
VentureBeat - ISC2 highlights how hiring practices can fix the cyberskills gap | The report comes as cybersecurity professionals are demanding greater career development potential in their roles, with Pluralsight data showing that 48% of tech workers have considered getting a new job because they believe they did not receive enough upskilling opportunities. | Tech Jobs |
VentureBeat - The intelligent way to detect fraud | More than 90% of executives surveyed recently cited fraud prevention as a key driver in the adoption of AI-enabled risk detection in the past year. Perhaps the primary advantage that AI brings to fraud detection is its ability to learn as it operates. | Artificial Intelligence |
ZDNet - Cloud computing rush means big opportunities and big threats ahead | Then it's perhaps no surprise that cloud security is the fastest growing segment of the security market, with spending jumping from $595 million in the US in 2020 to $841 million last year, largely because companies are discovering that it's a more complicated topic than they realised. | Security |
SiliconANGLE - As tech world weighs options for software supply chain security, a call for urgency | In early April, the FDA released draft cybersecurity guidance with a total product lifecycle approach for medical device manufacturers. Schwartz stated her belief that it was critical for device companies to provide a shared inventory of third-party components and has made it clear that the latest guidance will force medical equipment suppliers to address software supply chain security. | Security |
Network World - 8 certifications to prepare for hybrid and multi-cloud | Vendors target the certifications to the organizations they sell to. “For example, an infrastructure provider would target engineers and technicians in an infrastructure and operations organization, whereas a software development platform provider would target architects and developers in development organizations,” Lowery says. | Cloud |
VentureBeat - Report: Over 1B Google Play downloads for financial apps targeted by malware | Researchers identified Teabot as the trojan malware targeting the largest number of mobile financial applications (410), followed by ExobotCompact.D/Octo (324). The most targeted banking application is “BBVA Spain | Online Banking,” which has been downloaded over 10 million times, and is targeted by six of the 10 reported banking trojans. | Security |
sdxCentral - AWS, IBM, Cisco Lead Surging Cybersecurity Market | Oracle and Sophos slid one level lower than the big three, though still occupying the “established leaders” quadrant in the Juniper Research square. Micro Focus rode the border between that top level and a busy “leading challenges” grouping, which included a fistful of established players like Fortinet, Palo Alto Networks, and Splunk. | Security |
VentureBeat - The attacker’s toolkit: Ransomware-as-a-service | The RaaS model allows the developers of a ransomware variant to recruit affiliates that exclusively use their ransomware in targeted attacks on organizations. Any ransom payments extorted out of the victims are then divided up between the ransomware developers and affiliate who conducted the attack. | Security |
ZDNet - The data science and AI market may be out for a recalibration | At the beginning of 2022, the first sign that something may be changing became apparent. As an IEEE Spectrum analysis of data released by online recruitment firm Dice showed, in 2021, AI and machine learning salaries dropped, even though, on average, U.S. tech salaries climbed nearly 7%. | Tech Jobs |
VentureBeat - AI-powered legal ediscovery helps dig through data at scale | MarketsandMarkets estimates the global ediscovery market size to grow from $9.3 billion in 2020 to $12.9 billion by 2025. Driving that growth is a focus on proactive governance with data analytics; the emergence of new content sources; an increase in the amount of litigation across the globe; and an increase in electronically stored and social media penetration. | Data & Analytics |
sdxCentral - Randori Acquisition is part of IBM’s Commitment to Security | In the past year alone, 69% of businesses have been compromised by unknown, unmanaged, or poorly managed internet-facing assets, he added. | Security |
Datanami - Accenture: More Than 60% of Companies Are Only Experimenting with AI | According to the research, AI maturity is the degree to which organizations outperform their peers in a combination of AI-related foundational and differentiating capabilities. These capabilities include the technology — data, AI, cloud — as well as organizational strategy, Responsible AI, C-suite sponsorship, talent and culture. | Artificial Intelligence |
SiliconANGLE - New Zscaler report finds ransomware continues to run amok | The biggest threats identified in the report during that time period were double-extortion, supply chain attacks, ransomware rebranding, geopolitical incited ransomware attacks and ransomware-as-a-service. | Security |
VentureBeat - 8 reasons ERP is back and on the rise | Throughout the years, the ERP companies have been folding in the best improvements to build something that is modern, service-oriented and completely integrated with every company’s stack. | Automation & Productivity |
Datanami - Denodo’s Cloud Survey Finds Organizations Concerned About Managing New Cloud Systems | While organizations of all sizes and vertical markets are turning to the cloud to ensure flexibility and resilience in the face of these challenges, small to medium sized businesses have driven investment in cloud infrastructure services to support workload migration, data storage services, and cloud-native application development. | Cloud |
VentureBeat - Report: 85% of digital builders would leave their job due to poor tech | Additionally, nearly two-thirds (65%) of respondents also said that the software and tools their company gave them to work with was a direct reflection of how they value them as an employee. Another two-thirds (66%) of digital builders also indicated that the software they use impacts their job satisfaction “a lot.” | Automation & Productivity |
sdxCentral - Zero Trust Segmentation Saves Users $20M Annually, Illumio Found | 90% of the respondents stated advancing zero-trust strategies is among their top three security priorities this year, and 39% of organizations’ annual budgets for security controls are aimed at advancing zero-trust initiatives, the report found. | Security |
VentureBeat - For the metaverse to grow, mobile digital identities are necessary | I believe that the metaverse isn’t just a destination we reach through technological devices, but rather a digital identity we carry across platforms and experiences. It seems that regardless of how we define this concept, the role of digital identity remains a constant across all visions of the metaverse. | Metaverse |
AiThority - Top Hardcore Skills Needed To Become a Blockchain Engineer | A blockchain engineer is a one-stop shop capable of designing, developing, analyzing, implementing, and supporting a distributed blockchain network. According to reports, blockchain jobs have increased by nearly 271% since 2020 and are expected to quadruple by the end of 2022. | Tech Jobs |
Threatpost - Old Hacks Die Hard: Ransomware, Social Engineering Top Verizon DBIR Threats – Again | In general, the results of DBIR merely confirm well-established trends, such as the growing threats of ransomware – up 13% this year – and the inescapability of the “human element”, which was tied to 82% of all breaches. | Security |
VentureBeat - How the privacy and data storage features of Web3 can empower society | From Web1 to Web2, we’ve made great strides in decentralizing data, empowering users to create content and share it via websites. That’s where the buck stops, as users do not own and control their data. Moreover, since big tech companies run Web2 for the most part, users do not know what genuine privacy and ownership feel like. | Web3 |
SiliconANGLE - Small is beautiful: Tech’s focus on enterprise customers is hurting innovatio | Even more urgently, only 11% of these business leaders believe their current business models will be economically viable through 2023, with 63% claiming their companies need to “build new digital businesses to help them get there.” | Automation & Productivity |
eWeek - How to Guard Against the Biggest Cloud Security Threats | In a recent report, McAfee connected the rise of cloud breaches and the state of multi-cloud adoption. Their report found that, in recent years, nearly 70 percent of exposed records—5.4 billion total—were caused by unintentional Internet exposure due to misconfigured cloud services. | Security |
Techstartups - Humans now only make up 38.5% of internet traffic – The other 61.5% is non-human (bots, hacking tools, others) | The Barracuda report reveals that automated traffic including bots and hacking tools takes up 64% of internet traffic. Of the 64%, 39% of all traffic was from bad bots while just 25% of automated traffic was made up of good bots, such as search engine crawlers and social network bots. Humans represent 36% of all internet traffic. | Automation & Productivity |
Network World - Who is selling Zero Trust Network Access (ZTNA) and what do you get? | Gartner analyst John Watts says many organizations currently are implementing Zero Trust tactically as a VPN replacement approach. The primary use cases for these organizations are to enable secure access to internal apps for remote workers; to provide remote access for the extended workforce; and to provide secure access to users of privileged accounts | Security |
sdxCentral - Gartner Crowns Amazon No. 1 Public Cloud As Microsoft, Google Gain Ground | Amazon Web Services (AWS) maintained its domination of the global public cloud services market in terms of market share and revenue growth in 2021. But rivals Google (No. 4) and Microsoft (No. 2) grew at a much faster rate than the longstanding cloud giant, according to Gartner, Inc. | Cloud |
VentureBeat - CISOs say ransomware is the least concerning threat to enterprises | Fifty-one percent of the respondents in Proofpoint’s survey revealed an increase in attacks in the last 12 months and pointed to compromised insider attacks as the probable cause. The survey showed that 67% of respondents considered negligent insiders and compromised insiders to be the major causes of data loss in their organizations. | Security |
Blocks & Files - The four storage horsemen of the epochalypse | We have compared the storage growth rates for Dell, HPE, NetApp, and Pure Storage and spotted standout differences with HPE declining, Dell starting an upswing, NetApp rising on the back of 8 consecutive growth quarters, and Pure starting its eighth year of growth, albeit with a two-quarter hiccup in 2021. | Data Storage |
VentureBeat - 45% of cybersecurity professionals have considered quitting the industry | Thirty-eight percent of respondents to Deep Instinct’s report admitted to paying a ransom, 46% claimed their data was still exposed by the hackers, and 44% said they couldn’t restore their data. | Security |
SiliconANGLE - CIOs welcome users’ bid for more IT budget control – mostly | Ameritas’ democratized approach to ownership of IT projects is an example of good intentions creating unintended consequences. Business leaders who take control of their own IT need often lack the knowledge or discipline to manage applications as they grow, not to mention integrate them with other parts of the IT portfolio. | IT Management |
VentureBeat - Before automating your business processes, improve them | And, since automation continues to be the “holy grail” of accelerating digital transformation, companies are learning that just because they can automate a process doesn’t mean they should. Choosing the wrong processes for automation can dismantle an entire business initiative and ruin ROI expectations. | Automation & Productivity |
eWeek - Agent vs. Agentless in Cloud Security: Why Both are Needed | However, there’s a set of control plane data that’s only available from outside of those services and containers. Not to mention the cloud services that don’t have the ability to run an agent. These managed services are a valuable piece of your cloud solutions, and you need visibility into their actions as well, but they can only be accessed through an agentless approach. | Cloud Security |
sdxCentral - Ciena, Fujitsu, Infinera, Cisco Drive Optical Network Growth | “Long-term secular demand is very strong, driven by the acceleration of cloud adoption and traffic growth and the desire to get higher capacity and more bandwidth closer to the end user,” | Network Management |
Network World - Network Service Mesh: Linking multicloud workloads | Called Network Service Mesh, the project would enable cloud-based Kubernetes workloads to communicate securely regardless of where they are located in disparate clouds and is under the auspices of the Cloud Native Computing Foundation, which is part of the Linux Foundation. | Network Management |
VentureBeat - Turning AI failure into AI success stories | Rather than simply unleashing the technology first on one goal and then another in a linear fashion, which is the habit for most traditional technology initiatives, a more effective approach is to direct it at three critical capabilities: business transformation, enhanced decision-making and systems and process modernization. | Artificial Intelligence |
AiThority - Top Skills Needed to Become an AI Engineer | AI can incorporate massive data sets. AI engineers must be well-versed in the tools and processes for managing these large data sets. A background in Apache Spark architecture, Hadoop, Cassandra, and MongoDB will help. | Tech Jobs |
eWeek - Security and Backup Alignment Critical to Ransomware Recovery | A whopping 24% of organizations were not able to get their data back, even when the ransom was paid. When paying ransom, most (72 percent) organizations used some form of insurance. Fifty-seven percent of respondents said they have cyber insurance that includes ransomware coverage, 30 percent have cyber insurance without ransomware coverage, and 13 percent don’t have cyber insurance. | Security |
VentureBeat - Everyone has moved their data to the cloud — now what? | A recent TDWI Research study of 244 companies using a cloud data warehouse/lake revealed that an astounding 76% experienced most or all of the same on-premises challenges. | Cloud |
Network World - SASE or SSE? Don’t let hype distract from enterprise needs | Gartner itself has been instrumental in a roll-back from the idea of SASE to the less-broad secure service edge (SSE) bundle, which includes CASB, SWG, and ZTNA. Gartner introduced the SSE bundling option in its 2021 Strategic Roadmap for SASE Convergence. | Network Management |
sdxCentral - Will You Hire a Virtual CISO? | “Most companies under 1,000 people really just need a fractional CISO, they don’t need a full-time CISO, nor can they afford one,” Gray said, adding that “The virtual CISO fits, I’d say, all the way up to maybe 2,500 employees.” | Tech Jobs |
VentureBeat - 3 most common — and dangerous — holes in companies’ cyber defenses | At some companies, an administrator credentialed for one part of a network is automatically granted access to another. It’s a recipe for disaster. If there’s no pressing need for them to be there, it only adds another gateway to attack. | Security |
Threatpost - Verizon Report: Ransomware, Human Error Among Top Security Risks | Indeed, “supply chain was responsible for 62 percent of system-intrusion incidents this year,” researchers reported. Moreover, unlike a financially motivated threat actor, perpetrators of these crimes are often state-sponsored actors who prefer to “skip the breach and keep the access,” maintaining persistence on organization’s networks for some time, researchers said. | Security |
VentureBeat - Emerging digital twins standards promote interoperability | “Historically, these [standards] all used to be with respect to things like processes and properties and characteristics of physical things. And they continue to be so, but in addition, they are now about the data as well.” | Data & Analytics |
SiliconANGLE - The nirvana of cloud storage: Google Cloud’s secret weapon | That has created the perception that Google lags behind. But the company has a secret weapon in its cloud arsenal: Its cloud-based consumer services are already deployed at a larger scale than a Fortune 10 company needs. | Cloud |
AiThority - 92% of HR Leaders Will Increase Use of Artificial Intelligence as Solution for Rising Talent Challenges | “Talent intelligence has the power to reshape how leaders face today’s greatest challenges. By infusing data and insights into decision making, they can take a comprehensive approach to manage all talent and architect a future-ready workforce.” | Artificial Intelligence |
Analytics Insight - WILL EDGEML PUT AN END TO THE FLOURISHING CLOUD COMPUTING MARKET SOON? | The EdgeML library provides a suite of efficient machine learning algorithms designed to work off the grid in severely resource-constrained scenarios. The library allows the training, evaluation, and deployment of these algorithms onto various target devices and platforms. | Cloud |
Blocks & Files - Will tape play a ‘critical role’ in the zettabyte era as its supporters hope? | Tape’s inherent physical air gap is a good point but the virtual air gaps marketed by backup storage, unstructured data storage, cloud storage, and cybersecurity companies are generally acknowledged to be effective and so its superiority here is lessened. | Data Storage |
CSO - IDaaS explained: How it compares to IAM | While there are some exceptions, IDaaS is typically delivered via the cloud and can be offered as a multitenant offering or dedicated delivery model depending on the organizational requirements and the capabilities of the provider in question. | Security |
SiliconANGLE - Broadcom will tame the VMware beast | Unified Endpoint Management looks more than respectable, but that business is a rock fight with Microsoft Corp. VMware Cloud includes things such as VCF and VMware’s cross-cloud offerings. NSX came from the Nicira acquisition. Tanzu is not yet pervasive and one wonders if VMware is making any money there. | Tech Trends |
Datanami - Three Ways Companies Can Cope with the AI and Analytics Talent Crunch | Microsoft for example is doubling its budget for employee salary increases, according to an article in Bloomberg. With the starting salary for a new engineer estimated to be around $160,000 per year, that is no small chunk of change for the second largest American company by market capitalization | Tech Jobs |
HelpNetSecurity - How confident are CISOs about their security posture? | While the world’s CISOs spent 2021 coming to terms with new ways of working, many now feel much more in control of their environment: 48% feel that their organization is at risk of suffering a material cyber attack in the next 12 months, down from 64% last year. | Security |
Digital Journal - Information Security Forum Predicts Cyber Threats That Will Disrupt Businesses by 2024 | “That’s why organizations in a bid to remain agile and competitive are increasingly turning to trust as a substitute for control. However, by 2024 we believe this trust will disintegrate, exposing organizations to an ever-expanding array of threats.” | Security |
Network World - Cisco: Enterprises grapple with hybrid-cloud security, operational complexity | “While hybrid cloud provides a range of opportunities and benefits for organizations, many are acutely aware of the challenges in operating these environments. Cloud-native architectures and emerging technologies compete for the attention of staff and for budgets, while security and networking challenges remain top of mind," | Cloud Security |
VentureBeat - Report: Average time to detect and contain a breach is 287 days | For organizations without a solid understanding of their exposed attack surface, moving to a cloud environment only highlighted that knowledge gap. | Security |
SiliconANGLE - Supercloud is becoming a thing | We used the term supercloud to describe an abstraction layer that resides above and across hyperscale infrastructure, connects on-premises workloads and eventually stretches to the edge. Our premise is that supercloud goes beyond running services in native mode on each individual cloud. | Cloud |
VentureBeat - Report: 92% of HR leaders plan on using AI to acquire talent | In fact, 92% are planning on increasing their use of AI in at least one area of HR, including areas such as talent acquisition and management processes, onboarding new employees, and payroll processing. | Automation & Productivity |
eWeek - Heroku vs. AWS: 2022 Cloud Platform Comparison | It’s best to think of AWS as a general-purpose platform for the cloud – although it has many tools and capabilities that are appealing to developers and data scientists. Heroku’s focus is on harnessing and monetizing Salesforce data – although the cloud platform is suited for numerous other development purposes. | Cloud |
VentureBeat - Career paths in cybersecurity: Key skills, salary expectations and job description | The following information about cybersecurity careers and salaries will help you know what to expect and which skills are most beneficial for people in the industry. It will also give you a rundown of potential roles and responsibilities. | Tech Jobs |
GeekWire - Economic uncertainty starts to hit tech job market with reports of hiring slowdowns, rescinded offers | However, recruiters and tech leaders say the impact is not yet widespread, and depends highly on the sector in which a company is operating and the types of positions it’s filling. Engineers, for example, remain in high demand. | Tech Jobs |
Becker's Health IT - Information security analyst pay by state | Information security analysts, who ensure security controls are in place, make an average of $113,270 annually, according to the latest data released March 31 by the U.S. Bureau of Labor Statistics. | Tech Jobs |
VentureBeat - The creation of the metaverse: The market | But regardless of who gets credit, the metaverse is now as much a part of popular tech culture as things like blockchain, AR/VR, AI and quantum computing. All of which, by the way, are now combining to drive what the metaverse will eventually be. And that’s exactly what makes it so exciting. | Metaverse |
ZDNet - Skills and security continue to cloud the promise of cloud-native platforms | The survey finds 83% are using either hybrid or multi-cloud, but nearly 50% say lack of in-house skills and limited talent stand in the way of migrating to or using Kubernetes and containers. | Cloud |
HotHardware - Cybersecurity Report Calls Out CEOs For Using Shockingly Weak Passwords | NordPass recently worked with independent cybersecurity researchers to assemble a list of passwords used by CEOs, C-level executives, business owners, and managerial-level team members. The resulting list was topped by an assortment of pitiful passwords used in large numbers. | Security |
Network World - What is Nmap and why do you need it on your network? | Nmap, short for Network Mapper, is a free and open source tool used for vulnerability checking, port scanning and, of course, network mapping. Despite being created back in 1997, Nmap remains the gold standard against which all other similar tools, either commercial or open source, are judged. | Network Management |
VentureBeat - What the U.S. government’s security testing protections mean for enterprises | The new policy offers protection for entities conducting “good-faith testing,” which is the investigation or correction of security flaws or vulnerabilities carried out in a way that’s designed to avoid any harm to individuals or the public | Security |
Cyber Defense Magazine - True Cybersecurity Requires a Shift to A Data-Centric Philosophy | Literally every API represents a potential vulnerability. Akami’s 2020 State of Internet Security Report, in fact, found that 75% of all financial services industry cyber attacks targeted APIs. The result is a system of countless data silos, each with a discrete surface ripe for attack. | Security |
eWeek - Late to the Enterprise AI Party? 3 Ways to Get Started | The good news is, thanks to advances in hardware and software, virtually any company can get started with an AI project. And they’d be in good company — the global AI market is expected to grow from $93.5 billion in 2021 to $641.3 billion in 2028. | Artificial Intelligence |
VentureBeat - Report: Frequency of cyberattacks in 2022 has increased by almost 3M | In 2022, the number of Trojan-PSW (Password Stealing Ware) detections increased globally by almost a quarter compared to the same period in 2021 一 4,003,323 to 3,029,903. Trojan-PSW is a malware that steals passwords, along with other account information, which then allows attackers to gain access to the company network and steal sensitive information. | Security |
sdxCentral - RAN Market Walks Into 2022 | Dell’Oro Group noted in a recent report that overall RAN equipment sales during the first quarter increased at their slowest pace in more than two years. Those numbers include hardware, software, and firmware. | Network Management |
VentureBeat - Report: Credential access is top risk for ransomware attacks | The report found credential access was the top area of risk for respondents (at 40%), followed by defense evasion (31%), execution (31%), initial access (29%) and privilege escalation (27%). | Security |
TechHQ - Web3 storage witnessing exponential growth with more personal, enterprise uptake | In the world of Web3, there will be no digital gatekeepers to set the rules or take the lion’s share of the profits. In fact, it’s the users that will be in control. There is however more to that, like Web3 storage, a decentralized storage service, which is expected to grow exponentially in the coming years. | Web3 |
SC Media - Few IT pros say they have ‘mastered’ security in cloud-native environments | Recent research by Canonical showed that 38% of respondents believe that security remains the most important consideration whether operating Kubernetes, building container images or defining an edge strategy. | Security |
VentureBeat - Report: Devs say the current model of data observability is broken | One of the most interesting, yet troubling, findings of the research is that 64% of respondents report over an hour mean time to recovery (MTTR), compared to 47% reported in last year’s report. What’s more, 53.4% of people surveyed last year claimed to have resolved production issues within an hour on average – this year, that number dropped to 35.94%. | Data & Analytics |
Threatpost - Closing the Gap Between Application Security and Observability | Application security and observability capabilities can be used to set up Log4Shell-specific attack monitoring and incident detection. This quickly identifies Log4Shell log patterns, and with the help of platform log analytics and alerting capabilities, teams can configure alerting mechanisms for attacks on their environments. | Security |
Yahoo!Finance - The Worldwide Container Security Industry is Expected to Reach $3.9 Billion by 2027 | Development and operational teams save time and money by delivering software without having to continuously reconfigure infrastructure. Because containers do not need hypervisors, a significant portion of this savings comes from lower hypervisor licence costs. | Security |
Health IT Security - Ransomware Groups Continue to Leverage Old Vulnerabilities | Notably, 11 of the 22 newly added vulnerabilities linked to ransomware were first disclosed in 2019, “indicating that ransomware groups are on the hunt for vulnerabilities with pre-existing means of exploitation,” the report noted. | Security |
InfoSecurity Magazine - The New Era of Cyber-Attacks - Who is Most at Risk This Year? | With our critical national infrastructure increasingly connected, 2022 will see threat actors weaponize operational technology environments more successfully than ever before. Targeting systems that, once offline, will have a significant impact on our day-to-day lives. | Security |
VentureBeat - Report: 60% of orgs have experienced data loss due to employee mistakes | Intentionally stealing data also causes strain on IT teams as the data revealed it takes up to three days for security and risk management teams to detect and remediate a data loss incident caused by a malicious insider on email. | Security |
The Journal - CoSN Survey of IT Leaders Shows Ransomware Underestimated, Cybersecurity Still Woefully Understaffed | The survey results also showed that school districts’ IT departments remain understaffed, particularly in providing remote support for students and staff and in managing cybersecurity risks, the report said, with just 21% of districts reporting they have a dedicated full-time employee overseeing cybersecurity. | Security |
BetaNews - Three out of five organizations lose data due to email errors | User-created data (sensitive email content, text files, M&A documents), regulated data (credit card data, Social Security numbers, national ID numbers, employee data), and intellectual property are seen as hardest to protect. | Security |
Apple Gazette - What Are the Most Common Email Security Threats | Unfortunately, many companies do not take the step of deleting old email accounts. If you do not delete unnecessary accounts, you simply have an extra portal of entry to your company. Do not let this happen. Make sure you get rid of your old accounts and remove this unnecessary risk. | Security |
Forbes - How And Why Businesses Should Strengthen Their Cybersecurity | To me, the most concerning part of the assessment is a finding that some bad actors had shifted their focus away from so-called “big-game” targets. Instead, they turned their attention to midsized companies to avoid scrutiny. | Security |
The Hacker News - Web Trackers Caught Intercepting Online Forms Even Before Users Hit Submit | The study involved crawling 2.8 million pages from the top 100 websites, and found that as many as 1,844 websites allowed trackers to capture email addresses before form submission in the European Union, a number that jumped to 2,950 when the same set of websites were visited from the U.S. | Security |
Threatpost - APTs Overwhelmingly Share Known Vulnerabilities Rather Than Attack O-Days | Most advanced persistent threat groups (APTs) use known vulnerabilities in their attacks against organizations, suggesting the need to prioritize faster patching rather than chasing zero-day flaws as a more effective security strategy, new research has found. | Security |
TechHQ - Web3 storage witnessing exponential growth with more personal, enterprise uptake | Even storage demands from the NFT industry and the Metaverse is setting the stage for massive capital investments and growth in the burgeoning Web3 storage industry. | Data Storage |
VentureBeat - Report: 80% of cyberattack techniques evade detection by SIEMs | Rather than rely on subjective survey-based data, CardinalOps analyzed configuration data from real-world production SIEM instances to gain visibility into the current state of threat detection coverage in modern Security Operations Centers (SOCs). | Security |
ZDNet - Developers think these five technologies will be the next big thing | According to its survey of 20,000+ coders, blockchain applications, cryptocurrencies, and NFTs have the highest share of developers learning about them. | Emerging Tech |
VentureBeat - Report: 88% of business leaders would pay the ransom if hit by a cyberattack | Companies hit in the past were more inclined to pay as soon as possible to get immediate access to their data (33%, compared to 15% of companies that have never been victimized), or to pay after only a couple of days of unsuccessful decrypting attempts (30% vs. 19%). | Security |
Redmond Magazine - IT Pros Describe Azure Virtual Desktop Practices and Gripes in New Study | The AVD deployments covered in the survey weren't large, with 73 percent of respondents indicating they had less than 1,000 users. The study's authors surmised that "AVD is probably appealing and accessible to organizations which traditionally are considered too small to adopt on-premises Citrix/VMware VDI." | Automation & Productivity |
TMCNet - Data Shows Enterprise SIEMs Detect Fewer Than 5 of the Top 14 MITRE ATT&CK Adversary Techniques Used in the Wild | The company's second annual report analyzed aggregated and anonymized data from production SIEM instances to understand SOC preparedness to detect the latest adversary techniques in MITRE ATT&CK, the industry-standard catalog of common adversary behaviors based on real-world observations. | Security |
AP - Ransomware Attacks are a ‘Clear and Present Danger’ for UK AEC Firms, According to New Benchmark Survey From Egnyte | Almost half (44 percent) of firms had experienced a ransomware attack in the past 24 months. Of these, 25 percent had experienced between two to four attacks and 5 percent had endured five attacks or more, with 28 percent of firms taking over a week to recover. | Security |
CSO - The US federal cybersecurity bureaucracy: A guide | A high-level look at the national offices and organizations involved in protecting the US from cyber threats. | Security |
Forbes - Regulating The Metaverse: Can We Govern The Ungovernable? | The sci-fi buff in me is drawn to the idea of visiting a futuristic virtual world, where we can experience a new type of reality. But the metaverse is no longer science fiction – and the responsible adult in me can’t help but consider the threats it could pose, both to individual consumers and businesses. | Metaverse |
VentureBeat - Scalability and elasticity: What you need to take your business to the cloud | Both scalability and elasticity are related to the number of requests that can be made concurrently in a cloud system — they are not mutually exclusive; both may have to be supported separately. | Cloud |
Computerworld - How many jobs are available in technology? | The April monthly tech jobs report released by the CompTIA industry association showed the tech industry added 12,300 jobs from February to March, 2022. Software developers (3,613) and systems engineers/architects (3,126) led the pack in terms of new positions available. | Tech Jobs |
VentureBeat - The missing link in the cybersecurity market | The market’s hyper-segmentation forces security teams to involuntarily become system integrators, investing vast amounts of time and energy into carrying out market analysis, product validation, cross-product integration and product maintenance automation to create a coherent, effective organizational cybersecurity fabric. | Security |
Datanami - Report: Almost Half of CMOs Claim Data Hinders Creativity | At the same time, the need for a dedicated marketing ops role to manage martech stacks has accelerated dramatically. 73% of CMOs are committed to introducing this role to their team: 45% already have someone in place, and a further 28% are currently hiring. Only 12% of CMOs have had one in place for more than a year. | Data & Analytics |
Blocks & Files - GigaOm assesses unstructured data management market | The leaders are IBM (Spectrum Discover), Hitachi Vantara, Varonis (Data Security Platform), and NetApp (Cloud Data Sense). Future leaders are Cohesity, Data Dynamics, and Druva. | Data & Analytics |
VentureBeat - Report: 5 key trends for AI’s future | Edge AI will enable digital moments by harnessing AI for real-time analytics closer to data sources. Gartner predicts that by 2025, more than 50% of all data analysis by deep neural networks will occur at the edge, up from less than 10% in 2021. | Artificial Intelligence |
SiliconANGLE - Participate in your own rescue: ‘Dual ransomware’ attack highlights security hygiene urgency | The healthcare provider did not even realize it was being extorted twice because the ransom note of the first attack had been concealed by the second. Two ransomware groups, two different attacks, one target environment, only a week apart. | Security |
AiThority - The Security Oracle, Experts in the Security and Artificial Intelligence Space | “TSO’s disruptive robotic solution, (RCADS), is the enabling AI technology that makes it possible for Robots in the Sky and TSO’s family of robotic appliances to empower organizations to dynamically reconfigure access control and emergency communications systems to adapt to new security threats in sub-second response time, | Security |
Threatpost - You Can’t Eliminate Cyberattacks, So Focus on Reducing the Blast Radius | The answer is network segmentation. This divides devices and workloads into logical segments with policies providing access controls between them. Just as the watertight bulkheads in a ship prevent a breach in the hull from sinking the vessel, segmentation prevents the lateral movement of malware across your network, preventing it from accessing critical assets. | Security |
sdxCentral - CTOs Shouldn't Do Their Jobs Alone, Gartner Says | However, Gartner data shows only 52% of CTOs regularly engage with their organization’s CISO, and only 29% regularly engage with their CDO. “There’s a clear call to action. If you’re going to be involved in investing in cybersecurity and data analytics technologies, you need to be engaging with these kinds of dialogues,” she said. | IT Management |
Markets Insider - Lumen mitigated DDoS attacks that targeted a single company more than 1,300 times | Of the 500 largest attacks in Q1, 97% targeted the Telecommunications, Gaming, Software and Technology, Hosting, and Government verticals. | Security |
Network World - What is a private cloud? | Here's a clear definition of private cloud that should help lift some of misconceptions about what private cloud is and is not, and reaffirm that private cloud is definitely not dead. | Cloud |
VentureBeat - Report: 44% decrease in average amount paid after ransomware attacks | It showed that SMBs are primarily concerned with external threats — attack vectors including ransomware and phishing — and only 8% of the smallest businesses (<50 employees) have a dedicated cybersecurity budget. | Security |
ZDNet - Just in time? Bosses are finally waking up to the cybersecurity threat | Senior figures from American, British and Australian cybersecurity agencies have said that business execs are now more aware of cyber threats and are actively engaging with their chief information security officer (CISO) and information security teams. | Security |
VentureBeat - How to build a cloud security strategy that sells | Seek opportunities to embrace a DevSecOps mindset. For example, cloud forward businesses are using more non-human accounts than ever to develop products faster. In turn, attacks on non-human identities are rising significantly. | Cloud Security |
Fivetran: Over 80 Percent of Companies Rely on Stale Data for Decision-Making | While ubiquitous for enterprises today, very few companies are able to correctly leverage the data of these systems for decision-making. According to the study, nearly 9 out of 10 companies report that they are unable to pull real-time insights from their legacy ERP systems to make smart business decisions. | Data & Analytics |
VentureBeat - How Web3 and Cloud3 will power collaborative problem-solving and a stronger workforce | Now, Web3’s lesser-known but important counterpart, Cloud3, is also beginning to gain traction. Executives like Salesforce CEO Marc Bennioff are already mapping how their companies will adopt the new iteration of cloud computing — the core of which is built around working from anywhere — further supporting the workforce shift. | Automation & Productivity |
Network World - 6 top network security threats and how to beat them | These "service-providers" face minimal risk, since they themselves aren't launching any attacks. "It’s a pretty sweet deal for them," he says. Additionally, the payment comes in the form of cryptocurrency, so they are difficult to track. | Security |
VentureBeat - Why glTF is the JPEG for the metaverse and digital twins | The JPEG file format played a crucial role in transitioning the web from a world of text to a visual experience through an open, efficient container for sharing images. Now, the graphics language transmission format (glTF) promises to do the same thing for 3D objects in the metaverse and digital twins. | Emerging Tech |
sdxCentral - Fortinet CEO: Cybersecurity Will Outgrow the Networking Market | “The bigger picture convergence is happening today and maybe a few trends have been keeping going this way, probably within the next 10, 20 years, security will overtake the network space and become the biggest one in the enterprise network,” | Network Management |
TMCNet - IT Service Management Named a Top Choice for Managing Identity in the Enterprise, but Email and Spreadsheets are Close Behind, New Research Finds | For example, email (50%) was cited as the most popular option for controlling permissions and entitlements among all respondents. Comparatively, respondents from large companies (55%) and those who held IT roles (54%) favored more sophisticated methods, such as IT Service Management (ITSM) or workforce management platforms. | IT Management |
CSO - 7 top software supply chain security tools | A modern application is mostly made up of third-party code. According to Forrester, the percentage of open-source code that makes up an average application’s code base rose from 36% in 2015 to 75% in 2020. | Security |
Threatpost - FBI: Rise in Business Email-based Attacks is a $43B Headache | The FBI is also warning that another popular variations of the scam include collecting Personal Identifiable Information (PII) in order to perpetrate additional fraud such as tax-related scams and breaching cryptocurrency wallets. | Security |
Blocks & Files - Project Alpine: native Dell storage services in the public cloud and CloudOps | Dell’s Project Alpine could open the door to the big cloud service providers adopting hybrid multi-cloud as a reality and porting their software to each other’s environments. | Cloud |
ZDNet - IBM CEO: AI is near a key tipping point, but generalized AI is still decades out | It shows that currently, 35% of companies are using AI in their business, up to four points from 2021. Additionally, 30% say employees at their organization are already saving time with new AI and automation software and tools. | Artificial Intelligence |
VentureBeat - Researchers discover hackers using SEO to rank malicious PDFs on search engines | Today, researchers at security service edge provider, Netskope, published the Netskope Cloud and Threat Report: Global Cloud and Malware Trends, which found that phishing downloads rose 450% over the past 12 months, and highlighted that attackers are using search engine optimization (SEO) to rank malicious PDF files on search engines. | Security |
ZDNet - Cloud computing security: New guidance aims to keep your data safe from cyberattacks and breaches | Some of the key advice includes highlighting how cloud applications can be secure by default, which includes enforcing the use of multi-factor authentication to help secure accounts, even if the usernames and passwords are leaked or stolen. | Cloud Security |
Datanami - KX Report: 80 Percent of Businesses See Revenue Increases Thanks to Real-time Data | Drawing on a combination of both quantitative and qualitative research and economic modeling, the report clearly demonstrates the measurable commercial and operational value that real-time data management and analytics technologies can deliver across major industry sectors. 98% of respondents reported increased customer satisfaction while 60% are seeing major efficiency and productivity gains. | Data & Analytics |
VentureBeat - What is cybersecurity? Definition, importance, threats and best practices | Viruses, trojans, spyware and ransomware are all types of malware. These can be as insignificant as placing unwanted pop-ups on a computer or as dangerous as stealing sensitive files and sending them somewhere else. | Security |
SiliconANGLE - The top trends driving technology providers in 2022 | Instead, a co-innovation ecosystem is an emerging approach that accelerates the development of solutions to industry problems, spreads risk and cost across the participants, and drives adoption of the end solution. | Tech Trends |
VentureBeat - 5 ways AI can help solve the privacy dilemma | Data shows that 86% of people care about privacy for themselves and others — with 79% willing to act on it by spending time and money to protect their data. And to those cynics who say people moan about privacy and do nothing, the same study found that 47% have taken action because of a company’s data policies. | Data Privacy |
ZDNet - Data scientist vs data engineer: How demand for these roles is changing | Research suggests many companies can't find the talent they need, as they struggle to deal with turning their vast supplies of data into usable information. | Data & Analytics |
VentureBeat - The Colonial Pipeline ransomware attack a year on: 5 lessons for security teams | “With encryption-in use data protection, should adversaries break through perimeter security infrastructure and access measures, structured as well as unstructured data can [and] will [be] undecipherable and unusable to bad actors – making digital blackmail significantly more difficult, if not impossible,” Raman said. | Security |
eWeek - Unlocking Value with Unstructured Data Tagging | Tagging is the process of adding labels to categorize unstructured data, so users can easily search and find the data they need when they need it. Put simply, it’s adding and enriching the metadata on your data. | Data & Analytics |
VentureBeat - The future of on-prem and the cloud | If you’re planning on using a hybrid infrastructure for an extended period of time, my advice is this: don’t. While it’s impossible to avoid a hybrid setup during a transition period, most organizations are best served by committing to cloud IaaS completely (or as much as possible) and following a plan that can get you there incrementally over the course of two to three years. | Cloud |
ComputerWorld - Enterprise mobility 2022: UEM adds user experience, AI, automation | Essentially combining enterprise mobility management (EMM) tools with PC management tools, UEM platforms help companies manage and protect a range of devices including smartphones, tablets, laptops, and desktop computers across multiple operating systems — all from a unified interface. | IT Management |
VentureBeat - Report: 36% of security pros have adopted hardware-assisted cybersecurity | The report reveals that the top areas of focus for security innovation within organizations today are automation (41%), security at the silicon level (40%), cloud migration (40%) and education and training (38%). | Security |
eWeek - Cloud Customer Beware: 3 Challenges with Cloud Migrations | For all of cloud computing’s potential, business leaders need to keep their feet firmly on the ground and recognize the sheer complexity of cloud migration. Research indicates that one in three cloud migrations fail and only 25% of businesses meet their migration deadlines. | Cloud |
VentureBeat - Data mesh vs. data fabric: Eliminate humans or use them more intelligently | Data scientists and analysts are pushed to use pre-approved, pre-staged data found in centralized repositories, such as data warehouses, instead of being encouraged to use a broader array of datasets in their analysis. | Data & Analytics |
ComputerWorld - 6 virtual collaboration solutions for remote teams | Every survey suggests workers are more willing to find a new job than return to the bad old days of presence-based micro-management. Arguments that returning to the workplace boost collaboration may have some weight, but much of this relies on old-fashioned email and virtual meetings held from the office, rather than the home. | Automation & Productivity |
VentureBeat - Why you need both consumer data and data management platforms | On the open web, an average publisher can only authenticate ~20% of its audience, meaning that ~80% of a publisher’s audience is blind to the CDP, which limits its scalability. There is no built-in mechanism to augment authenticated data with anonymous data, therefore a DMP is a crucial value-add. | Data & Analytics |
VentureBeat - Report: 61% of data leaders say that manual processes slow down their projects | This slowdown has a big impact across organizations who are faced with hard-to-reconcile priorities — 85% see securing access to sensitive data viewed as critical for business, and as the way to minimize the risk of data breach or exposure to unauthorized parties, while one in three point to meeting data security, privacy or compliance requirements from their customers, while 27% are addressing the sensitive data access for compliance with consumer privacy regulations such as GDPR and CCPA | Data & Analytics |
eWeek - 5 Cybersecurity Threats That Aren’t Going Away | As CIOs, CISOs, CTOs, and IT managers think about boosting cybersecurity strategies, they should consider what happened in the year prior and what might potentially get worse. Below are some of the cybersecurity threats that remain stubbornly consistent – and must be guarded against at all times. | Security |
VentureBeat - Report: 80% of global datasphere will be unstructured by 2025 | According to a new report by nRoad, analysts predict the global datasphere will grow to 163 zettabytes by 2025, and about 80% of that will be unstructured. In regulated industries, such as financial services, the challenges posed by unstructured data are exponentially higher. | Data & Analytics |
eWeek - Artificial Intelligence Enables Next-Gen Data Loss Prevention | While the cloud has enabled businesses to not skip a beat during and post pandemic, this shift is creating the new IT challenge of managing fully distributed data, which is no longer on-prem. Data is everywhere. The traditional hub and spoke security model is not sufficient for securing data in the cloud. Every organization should be thinking about implementing modern data loss prevention (DLP) practices. | Data & Analytics |
VentureBeat - As data privacy laws expand, businesses must employ protection methods | Another area where the laws differ is how each defines sensitive data. The CPRA’s definition is extensive and includes a subset called sensitive personal information. The VCDPA and CPA are more similar and have fewer sensitive data categories. However, their approaches to sensitive data are not identical. | Data Privacy |
ZDNet - How cloud is redirecting technology career paths | IT tasks are elevating, as "many tedious and time-consuming manual tasks like data entry, system and application monitoring and some app development efforts will be taken over by technology solutions, | Cloud |
VentureBeat - Report: 36% of security pros have adopted hardware-assisted cybersecurity | The report reveals that the top areas of focus for security innovation within organizations today are automation (41%), security at the silicon level (40%), cloud migration (40%) and education and training (38%). | Security |
AiThority - How Startups are Leveraging the Cloud to Scale | The cloud offers maximum flexibility for growth in capacity and resources, so scalability is never an issue. As the business grows, entrepreneurs can access more resources on-demand and pay for them only when needed, saving money in the process. | Cloud |
ZDNet - The 9 best cloud storage services: Cost, free storage, and features compared | Unlike many other cloud backup services, iDrive doesn't lock you down to a single computer. You can use one account to backup your Windows and macOS desktops, your Android smartphone and iPhones and tablets, and your network drives. There's also a Linux backup option, but it's meant for Linux servers. | Cloud Storage |
VentureBeat - The challenge of making data science zero-trust | There are three fundamental tenets that can help to realign the emerging requirements of zero trust to the needs of data science: minimization, distributed data, and high observability. | Data & Analytics |
Network World - 4 networking best practices learned from the Atlassian network outage | The document is frank, factual, and full of important revelations and should be required reading for any engineering and network manager. It should be used as a template for any business that depends on software to locate and fix similar mistakes that you might have made, and also serve as a discussion framework to honestly assess your own disaster recovery playbooks. | Security |
ZDNet - Ethernet creator Metcalfe: Web3 will have all kinds of 'network effects' | "For the first time, I am trying to say exactly what kinds of value are created by networks," Metcalfe told ZDNet at the Williamsburg event. "What I have learned today is that knowledge graphs can go a lot farther if they are decentralized," said Metcalfe. "The key is the connectivity." | Web3 |
Threatpost - CANs Reinvent LANs for an All-Local World | This is exactly the conceptual leap behind a new type of network, known as a Cloud Area NetworkTM (CAN). CANs replace the old hub-and-spoke model with an overlay network mesh concept that enables any-to-any communication between users, devices, data centers, and web apps. | Network Management |
AiThority - Understanding the Role of AI, Machine Learning and Natural Language Processing in RegTech Development | RegTech enhances timely regulatory compliance and mitigates risks in a transparent and auditable manner. It automates lengthy, time-consuming processes, reducing room for error and the need for manual work and costly resources. | Automation & Productivity |
Diginomica - Digital transformation projects are not enough - we need continuous transformation | While digital transformation is undoubtedly a crucial means of modernising, expediting decision-making, and using innovation and creativity to enhance both experiences and financial performance, if the transformation simply ends following go live of the underpinning technology, the benefits will inevitably diminish over time. | Digital Transformation |
Forbes - What You Need To Know Before You Start Working With Artificial Intelligence | I firmly believe that the true value of AI – estimated to be worth $13 trillion to the global economy by 2030 – will be realized due to it being accessible to businesses of all shapes and sizes, not just multinational corporations. A vast and eclectic ecosystem of cloud-based, “as-a-service” platforms reduces the need for expensive infrastructure investments and also means that niche solutions exist to help automate solutions in every industry. | Artificial Intelligence |
Yahoo!Finance - 65% of Fraud Prevention Decision Makers Say Customer Authentication Fraud is a Major Concern | To protect themselves and their customers, 60% of respondents currently use OTPs as part of their customer authentication strategy. This is in large part due to the positive reputation it has with consumers: 72% of respondents say customers perceive OTP authentication as secure and 71% of respondents say that OTP authentication is user friendly. | Security |
ZDNet - Open-source security: It's too easy to upload 'devastating' malicious packages, warns Google | The Package Analysis Project is one of the software supply chain initiatives from the the Linux Foundation's Open Source Security Foundation (OpenSSF) that should help automate the process of identifying malicious packages distributed on popular package repositories, such as npm for JavaScript and PyPl for Python. | Security |
Forbes - Using Digital Twins And Preparing For The Metaverse | The metaverse is no different, and while it may be difficult to wrap your head around, taking the time to learn about digital twins and how they fit into virtual reality can be very beneficial. | Emerging Tech |
CSO - Firms struggling with non-person identities in the cloud | To address their cloud identity woes, more than half the decision-makers (55%) say their organizations are investing in cloud identity governance (CIG) and cloud infrastructure entitlements management (CIEM) solutions and by 2023, 82% will be following suit. | Cloud Security |
sdxCentral - Fortinet: 80% of Breaches Attributed to Cybersecurity Skills Gap | While 87% of respondents have implemented a training program for cybersecurity awareness, 52% of them still believe their employees lack the necessary knowledge. Fortinet says this statistic raises questions around how effective the training programs are. | Security |
VentureBeat - What it will take to implement Web3 | Take Ethereum, for example; despite its popularity, the network is struggling with some severe limitations. For one, current levels of throughput, around 15 transactions per second, simply aren’t enough to support the type of traffic that worldwide adoption would bring about. | Web3 |
ZDNet - Mozilla finds mental health apps fail 'spectacularly' at user security, data policies | According to Mozilla's latest *Privacy Not Included guide, despite the deeply personal information these apps manage, they "routinely share data, allow weak passwords, target vulnerable users with personalized ads, and feature vague and poorly written privacy policies." | Data Privacy |
SiliconANGLE - The ever-expanding cloud continues to storm the IT universe | We’re seeing the largest enterprise tech companies focus on solving for hybrid and every public cloud company now has a strategy to bring their environments closer to where customers’ workloads live – in data centers and the edge. | Cloud |
VentureBeat - Report: 95% of IT leaders say Log4shell was ‘major wake-up call’ for cloud security | The research found that 87% feel less confident about their cloud security now than they did prior to the incident. The research also found that even 3 months after the incident, 77% of IT leaders are still dealing with Log4J patching with 83% stating that Log4Shell has impacted their ability to address business needs. | Cloud Security |
AiThority - Businesses Need to Consider AI Algorithms and Spatial Intelligence to Increase Success | Behavioral science has been around a long time and is a classic discipline charting and analyzing actions between people to predict patterns. But what if a business could get enough information about the behavior of its customers — in any number of physical locations pivotal to that organization’s success — without having to wait for a lengthy analysis? This is where the difference between basic analytics and spatial analytics comes into play. | Artificial Intelligence |
SiliconANGLE - Experience as the new uptime: Why automation is the silver bullet to get us there | Network operators are just scratching the surface with network automation, and as technologies and networks continue to evolve and mature, automation will be a critical component in that process to ensure optimized user experiences. Without this automation, network operators will be forever fighting a losing battle against increasing complexity. | Automation & Productivity |
AiThority - Latest Report: “A Cookieless World: The Shifting MarTech Landscape” | Data includes how both B2C and B2B companies are reallocating budgets and employing new technology solutions to circumvent reliance on cookies, as well as the speed of adoption and success rates of specific approaches. | Marketing Tech |
TMCNet - Research: Log4Shell a Wake Up Call For Cloud Security With Patching Efforts and Business Impacts Continuing Into 2022 | The research also found that even 3 months after the incident, 77% of IT leaders are still dealing with Log4J patching with 83% stating that Log4Shell has impacted their ability to address business needs. | Security |
Infosecurity - Five Eyes Agencies List Top 15 Most Exploited Bugs of 2021 | In addition to the top 15 list, the security agencies provided an extra list of bugs to patch, including noteworthy systems such as the Accellion File Transfer Appliance (FTA) which was targeted en masse by a cybercrime group with links to FIN11 and Clop ransomware. | Security |
VentureBeat - Report: Only 18% of data leaders receive ‘necessary’ amount of funding | This new research reveals that while data leaders feel the pressure to remain competitive, the C-suite is dangerously behind in making needed investments in data and analytics. | Data & Analytics |
eWeek - The Business Case for an Edge Deployment | Among other factors, responsiveness is a function of latency, or how long it takes for data to transfer from one point on a network to another. According to a recent survey by Quadrant Strategies, 86% of C-suite executives and senior IT decision makers agree that low-latency applications help differentiate their organizations from the competition. | Edge Computing |
VentureBeat - The super malicious insider and the rise of insider threats | Forty-two percent of actionable incidents were related to IP and data theft, including the theft of trade secrets, source code and active collusion with a foreign nexus. | Security |
Network World - 5 reasons restores can take longer than backups | The effect of the write penalty on performance can be minor or it can be major depending on the RAID level and/or the settings used in erasure coding. But all such arrays will have some write penalty, and you need to find out what yours is. | Data Storage |
eWeek - Collaboration Platforms Are Critical To Successful Hybrid Work | Collaboration tools were initially considered important, but it is really advanced collaboration tools that have become critical to business success. Advanced collaboration tools feature centralized security and administration, and they provide flexibility for line-of-business workers to configure their own apps/workflows. | Automation & Productivity |
VentureBeat - The real cost of cloud computing | Finding the balance between sending the data to the cloud and bringing computing close to data is a trillion-dollar question. The answer is not clear for now, but it’s clear that every technology provider and the consumer should start exploring cutting the cloud dependency. | Cloud |
ZDNet - Inside a ransomware incident: How a single mistake left a door open for attackers | While BlackCat has a reputation for running a sophisticated ransomware operation, it was a simple technique that allowed malicious cyber criminals to gain initial access to the network – exploiting an SQL injection vulnerability in an internet-exposed SonicWall SRA 4600 firewall. | Security |
AiThority - Domo’s Low-Code Data App Platform Helps Customers Develop Analytic Content 50 to 75 Percent Faster According to New Independent Study by Nucleus Research | With Domo, one customer who integrated 15 different siloed systems centralized analytics, eliminated multiple hours per week that previously were spent manually combining and cleaning data. | Data & Analytics |
VentureBeat - Report: Orgs spend 3,850 hours annually cleaning up email-based cyberattacks | The study confirms that, despite investments in secure email gateways and user security awareness training, bad actors continue to use social engineering emails to breach organizations’ defenses. The resulting attack remediation requires 175 hours to resolve each breach, and the most common breach type is compromised Office 365 login credentials (account takeover). | Security |
Network World - What is a SAN and how does it differ from NAS? | SAN is associated with structured workloads such as databases, while NAS is generally associated with unstructured data such as video and medical images. “Most organizations have both NAS and SAN deployed in some capacity, and often the decision is based on the workload or application,” | Network Management |
VentureBeat - Top 5 data quality & accuracy challenges and how to overcome them | Statistically, poor data quality leads to increased complexity of data ecosystems and poor decision-making over the long term. In fact, roughly $12.9 million is lost every year due to poor data quality. | Data & Analytics |
sdxCentral - Government Agencies Prioritize Secure Multi-Cloud Adoption | The study reached 500 agency leaders and IT decision makers at federal, state, and local governments in the United States and Canada. It found 74% of respondents choose cloud providers by prioritizing security. And 57% of agencies are concerned about data security as they increase cloud adoption. | Cloud |
VentureBeat - Report: Karakurt attacks linked to Conti and Diavol ransomware groups | Additionally, researchers found examples of cryptocurrency moving between Karakurt and Conti wallets; some Karakurt victim payment addresses are actually co-hosted in the same wallets as Conti victim payment addresses. | Security |
AiThority - Blockchain Development Seen as Transformative to the Technology Sector: Rapid Innovation Survey | Several of the top technology firms are exploring everything from launching their own native tokens, to changing their company names to something more metaverse related. Large software firms have created entire enterprise divisions dedicated to enabling data exchange and workflow automation with distributed ledger technology and blockchains | Blockchain |
VentureBeat - Data orchestration and best practices: Everything you need to know | Using data orchestration tools will help to clean, sort, arrange and publish your data into a data store. The aim of this technique is for authoring, scheduling and monitoring data pipelines by accepting data from numerous storage places. | Data Management |
VentureBeat - Report: 88% increase in OT vulnerabilities last year | The report provides a deeper look at how quickly cybercriminals capitalize on new security weaknesses –shrinking the window that organizations have to remediate vulnerabilities ahead of an attack. | Security |
ZDNet - Phishing emails targeting LinkedIn accounts are on the rise. Here's what to watch out for | The phishing emails are designed to look like they come from LinkedIn, but if the recipient clicks the link, they're sent to a login page designed to look like LinkedIn, and if they enter their email address and password, they'll be handing them to the attacker, who can use that information to log in to the victim's LinkedIn account. | Privacy & Security |
The Next Web - These are the 5 most in-demand cloud computing jobs in 2022 | By 2030, the report predicts that the sector will make an annual revenue of $1.6 trillion. Interestingly, more than half of the market will consist of banking, financial services and insurance, IT and telecom services, and retail and consumer goods. | Tech Jobs |
sdxCentral - Public Cloud Spending to Near $500B in 2022 | Spending increases are projected to occur in every layer of public clouds with infrastructure-as-a-service (IaaS) and desktop-as-a-service leading the way with 30.6% and 26.6% year-over-year jumps, respectively. | Cloud |
ZDNet - Ransomware: This gang is getting a lot quicker at encrypting networks | The group also targets organisations that make high revenues, potentially a tactic that is also deployed because the attackers believe they have the best chance of making large amounts of money from ransoms. | Security |
VentureBeat - New DataGrail research finds companies could spend upwards of $400K/year complying with data privacy laws, doubling the 2020 cost | Businesses are being asked to process nearly double the number of privacy rights they processed in 2020. Total data privacy requests — access, modify, and delete requests — jumped from 137 to 266 requests per 1 million identities | Data Privacy |
VentureBeat - Ransomware targeting virtualization platforms is on the rise, Mandiant says | While a traditional ransomware attack requires deploying the malicious payload across multiple hosts in a victim’s environment, an attack on virtualization infrastructure can potentially infect hundreds of virtual machines at once. With this variety of attack, “hitting one machine is much more effective, | Security |
Viritualization & Cloud Review - Cloud Computing Survey Shows Cost Control Struggles | As we have repeatedly reported, the continuing skills gap is often the top challenge listed by respondents -- along with security concerns, which are always top-of-mind. In the new Foundry report, however, challenges with cost control are right up there with those two perennial concerns, even eclipsing them. | Cloud |
Datanami - Fighting Harmful Bias in AI/ML with a Lifelong Approach to Ethics Training | We already see the effects in recruitment algorithms that favor men and code-generating models that propagate stereotypes. Fortunately, executives know that they need to act, with a recent poll finding that over 50% of executives report “major” or “extreme” concerns about the ethical and reputational risks of their organization’s use of AI. | Artificial Intelligence |
VentureBeat - Report: 95% of organizations are now practicing open innovation | Those pillars include implementing a dedicated team to support open innovation initiatives, senior leadership positions (with titles like “Manager of Open Innovation”), standardized innovation procedures and metrics, open source technology adoption and related licensing/IP management systems | Automation & Productivity |
eWeek - Machine Identities Are Dangerously Vulnerable | Identity security is in the spotlight these days, and it’s easy to see why. The most recent Verizon Data Breach Investigations Report found that 61% of all breaches involve credential data. | Privacy & Security |
VentureBeat - Surprising cybersecurity weak points business owners should look out for | From increasingly ingenious phishing schemes to breakthroughs in offensive AI, digital threats expose the weakness in our IT frameworks and data systems. Identifying these weaknesses is crucial, as 85% of IT professionals pivot toward passwordless technology. | Security |
sdxCentral - Netskope: Unified SASE Is at Least a Decade From Practicality | The real value of SSE isn’t that it’s Cloud based or that because it’s cloud-native it’s more scalable — though these factors do help, he said. It’s that “you’ve created one brain” for security intelligence. | Security |
Network World - What is DRaaS and how it can save your business from disaster | The DRaaS market is a sprawling, complicated one, with hundreds of providers offering a wide range of different approaches that replicate everything from data and virtual machines (VMs) to on-premises servers and mainframes. | Security |
VentureBeat - Waiting for the metaverse? The revolution is already here | Meanwhile, tools are allowing regular users to create and explore 3D content, with the secret weapon being the modern smartphone, which is now a gateway for 3D content creation — the building block of any metaverse. Now anyone can scan a real-world scene or object in 3D, which has led to its own new medium of user-generated content. | Metaverse |
eWeek - Key Advice for Improving Your Company’s Cybersecurity | In cases where third-party hardware or software is not scrutinized, vulnerabilities can be harder to discover but also more broadly distributed, which can make them harder to remediate. For example, the Equifax breach in 2017 was reported to be the result of a vulnerability in open-source software. And more recently, the world reacted to another open-source vulnerability in Log4j. | Security |
Network World - Edge computing moves toward full autonomy | "Self-organizing and self-healing wireless mesh communications protocols, such as Zigbee, Z-Wave, ISA100.11a, or WirelessHART can create networks where devices can be deployed ad hoc and self-configure." | Edge Computing |
sdxCentral - Palo Alto Networks' Unit 42 Claims Cloud Identities Too Permissive | In analyzing more than 680,000 identities across 18,000 cloud accounts from more than 200 different organizations as part of its latest Cloud Threat Report, researchers found that nearly 99% of IAM policies are overly permissive. | Security |
SiliconANGLE - 3 insights you might have missed from the ‘Cisco: Simplifying Hybrid Cloud’ event | Full-stack observability has become more of a priority for business as organizations build on app monitoring tools, from customer-facing software to operational solutions on the back end. Recent data provided to SiliconANGLE by Enterprise Technology Research showed that market opportunities in the observability space are wide open. | Cloud |
VentureBeat - 10 things CISOs need to know about zero trust | Over the last eighteen months, the exponential rise in cyberattacks shows that patching perimeter-based network security isn’t working. Cyberattackers can still access networks by exploiting unsecured endpoints, capturing and abusing privileged access credentials and capitalizing on systems that are months behind on security patches. | Security |
AiThority - New Research Finds Data Automation Adoption to Climb From 3.5% to 88.5% Over the Next 12 Months | Nearly all data teams (93%) anticipate the number of data pipelines in their organization to increase between now and the end of the year—with 57% projecting an increase of 50% or greater. Amid the rising number of data pipelines across their organization, nearly three in four respondents (72%) indicated that the need for data products is growing faster than their team size. | Data & Analytics |
FedScoop - National AI Research Resource must balance the value of its data with privacy | “Yes, the task force is certainly discussing how privacy-enabling technologies could help enhance the privacy aspects of NAIRR usage,” Parashar told FedScoop. “However, the task force has also discussed how privacy requires more than just technical solutions, and we expect a full range of considerations when contemplating privacy, civil rights and civil liberties.” | Data Privacy |
VentureBeat - StormForge seeks to simplify Kubernetes automation | 68% of respondents to a recent survey conducted by the Cloud Native Computing Foundation (CNCF) said that their cloud and Kubernetes-related bills have increased. Of those, half saw costs jump more than 20% over the past year. | Cloud |
Cyber Defense Magazine - The Risks and Costs of The Public Sector’s Device Sanitization and Destruction Practices | In some instances, government agencies mandate physical destruction of devices — for example, if equipment is used to store classified or secret data. However, for unclassified data-bearing assets, physical destruction is unnecessary. This missed opportunity to give old technology a new life increases IT operations and materials costs for already fiscally-constrained public sector organizations. | IT Management |
SiliconANGLE - This is what cloud-native looks like for the Department of Defense | “We have Kubernetes running across embedded systems at the edge on clouds, on classified clouds and air-gapped environments. It’s really the enabler for us not to get locked into a single tech stack.” | Cloud |
ZDNet - The best remote desktop software: Work from anywhere | Based on an exhaustive, in-depth study of today's leading software, these are the best remote desktop software for 2022. | Automation & Productivity |
VentureBeat - Report: 94% of women in tech say they’re held to a higher standard than men | Navisite’s recent survey of women in tech found that not only are women being held to a higher standard than their male colleagues, but they’re being asked to perform the bulk of administrative tasks. In fact, 75% say that they or their female colleagues are consistently asked to handle more administrative tasks compared to their male counterparts, including being asked to send meeting invites, reserve meeting rooms or prepare refreshments | Tech Jobs |
SiliconANGLE - As data drives reinvention, AWS leverages machine learning and serverless to meet enterprise needs | “Within analytics, everything that we offer has a serverless option. We announced serverless Redshift, serverless EMR, serverless Kinesis and Kafka. The goal here is to take away the need to manage infrastructure for customers so they can focus on driving differentiated business value.” | Data & Analytics |
VentureBeat - Bad data: A $3T-per-year problem with a solution | A few years ago, IBM reported that businesses lost $3 trillion dollars per year due to bad data. Today, Gartner estimates $12.9 million to be the yearly cost of poor-quality data. Funds get wasted in digitizing sources as well as organizing and hunting for information — an issue that, if anything, has increased now that the world has shifted to more digitized and remote environments | Data & Analytics |
Enterprise Talk - Responsibility for AI Ethics is Shifting from Tech Roles to the Business Executives, says IBM Study | The IBM study, “AI ethics in action: An enterprise guide to progressing trustworthy AI”, also shows that despite a growing requirement for developing trustworthy AI, including an improved performance in sustainability, social responsibility, diversity and inclusion, a gap remains between intentions and actions. | Artificial Intelligence |
VentureBeat - What Stanford’s recent AI conference reveals about the state of AI accountability | Specifically, regarding accountable AI, panelists discussed advances and challenges related to algorithmic recourse, building a responsible data economy, computing the wording and conception of privacy and regulatory frameworks, as well as tackling overarching issues of bias. | Artificial Intelligence |
Datanami - Ascend.io Survey Finds Data Automation to Surge Over Next 12 Months | Findings from more than 500 U.S.-based data scientists, data engineers, data analysts, enterprise architects, and—new this year—chief data officers (CDOs) reveal that despite 81% of respondents indicating that their team’s overall productivity has improved in the last 12 months, 95% of teams are still at or over capacity—just a 1% decrease from the 2021 study. | Data & Analy tics |
sdxCentral - 5 Ways to Conquer Cloud Security | The technology enabler for the aforementioned strategy is policy as code. By aligning all teams under “the same source of truth regarding security,” enterprises can build a scalable technological foundation for cloud security. | Cloud Security |
Datanami - Can We Trust AI — and Is That Even the Right Question? | “I think a lot of the time the way we think about it in relation to AI is, ‘what types of AI should we create?’ or ‘how should society perceive AI systems?’” Canca said. “But I think perhaps the more interesting thing to think about is: how does the AI eventually see us?” | Artificial Intelligence |
ZDNet - Terrible cloud security is leaving the door open for hackers. Here's what you're doing wrong | According to the research, 99% of cloud users, services and resources provide excessive permissions. In most cases, these permissions and administrator privileges aren't needed by regular users, but there's the risk that, if cloud accounts are compromised, cyber attackers could take advantage of excess permissions to modify, create or delete cloud environment resources, as well as moving around networks to help expand the scope of attacks. | Cloud Security |
VentureBeat - Improved optics could help the metaverse become as big as the internet | It’s important to note that the metaverse can only be realized through the technology that enables it. Augmented Reality (AR) and Virtual Reality (VR) offer the primary link to entering this alternate universe. | Metaverse |
ComputerWorld - As employees return to the office, connectivity remains a concern | Flexible hybrid work arrangements such as hotdesking and the use of informal meeting areas could require better Wi-Fi connectivity, in particular. “A lot of businesses…, their Wi-Fi doesn't stand up to that level of usage," | Automation & Productivity |
VentureBeat - Report: 55% of MSPs say IT infrastructure monitoring is their most valuable tech | For example, survey respondents said that faster root cause analysis was both the top IT monitoring challenge they face (cited by 46% of respondents) as well as the top AIOps capability critical to winning deals (48% of respondents). | IT Management |
Network World - Who’s selling SASE and what do you get? | As an approach, SASE combines networking and security into a scalable cloud service that fits with the remote and hybrid work models companies use today. Potential benefits include easier network and security management, flexibility to scale up or down as business needs require, and lower costs. | Security |
SiliconANGLE - Ripple effects from the Okta security breach are worse than you think | Participating were some of the top CISOs in the community. The first one is really concerning: “We heard about this in the media.” The next one summarizes the overall sentiment: “Not a huge hit but loss of trust.” And this next one underscores the lock-in factor: “We can’t just shut Okta off like SolarWinds.” | Security |
ZDNet - Turning point for artificial intelligence, which may or may not be dominated by the large cloud providers | "This integration is going to be hybrid, even more important than the cloud itself. Let's be very clear, it's not about operation, it's a lot of algorithms, it's a lot of different data, that integration piece, that will require system integration, architecture and design. That means that different types of firms will be involved in that work." | Artificial Intelligence |
AiThority - Microsoft Industry Cloud Could Be a Worthwhile Consideration, According to Info-Tech Research Group | “The industry cloud market represents one of the largest vertical growth opportunities for technology suppliers,” says Ted Walker, a Principal Research Director at Info-Tech. “More than five hundred industry clouds have already been created globally, and revenue in this space is expected to exceed $20 billion by 2023.” | Cloud |
VentureBeat - Data fabric versus data mesh: What’s the difference? | But underlining the challenges in analytics, more than 37% of respondents said that they weren’t confident in their ability to access “timely, relevant data for decision-making,” whether because of disparate storage sources or problems with developing data pipelines. | Data & Analytics |
SiliconANGLE - Observability trends evolve as market must tackle cybersecurity with automation | Being able to have observability across infrastructure — data storage, compute, network, containers and database — and through the CI/CD pipeline to client-side code and applications, even the code on which the company’s websites are built, is “the holy grail” of modern APM solutions. | Automation & Productivity |
VentureBeat - ‘Denonia’ research points to new potential cloud cyberthreat, experts say | “The software relies entirely on fraudulently obtained account credentials,” AWS said — adding that “Denonia” does not really constitute malware “because it lacks the ability to gain unauthorized access to any system by itself.” | Security |
eWeek - Cognos vs. Tableau: 2022 Software Comparison | IBM boasts a massive sales and services team, and global reach into large enterprise markets. Cognos, then, is likely to do well against Tableau within the existing IBM customer base. And right now, it appears to lead slightly in the cloud. But Tableau is ahead on overall features and is graded higher by Gartner. | Data & Analytics |
VentureBeat - Report: Global IT spending expected to hit $4.4T | In fact, CIOs are accelerating IT investments in categories such as security, customer experience, analytics and cloud as they recognize the importance of remaining flexible and agile in responding to such factors. | IT Management |
eWeek - The Dangers of Obsolete and Redundant Data | Businesses believe that retaining all their data will help mitigate potential risks, but the opposite is true. The more unaccounted-for data a company has, the higher the risk of falling victim to a cyberattack. When you are in the dark about your data, you don’t know what has gone missing. | Data Management |
Forbes - Three Keys To Understanding The Cybersecurity Skills Gap (And Dealing With It) | Many firms that did not have a cybersecurity practice 10 years ago now have one or are building one. This is creating an escalating demand for cyber talents at all levels, including chief information security officers, developers, architects, trainers, auditors and pen testers. | Tech Jobs |
Network World - 7 emerging network jobs that could boost your career | Traditional roles such as network administrator, network manager, and network architect are still relevant and in demand, says Jeff Weber, executive director in the technology practice at talent solutions provider Robert Half. But newer positions in areas such as cloud administration, cloud architecture and site-reliability engineering are hot, he says. | Tech Jobs |
VentureBeat - Report: 35% of educational institutions have a SQLi vulnerability | According to a new study by Invicti Security, 35% of educational institutions and 32% of government organizations were found to be vulnerable to SQL injection (SQLi) in 2021. SQLi, a type of web vulnerability that allows malicious actors to modify or replace queries an application sends to its database, is especially threatening to these sectors because it has the potential to expose deeply personal information that attackers can use to assume identities. | Security |
Datanami - Study Finds Businesses Can Realize 315 Percent ROI with KX Insights Data Analytics Platform | According to the study, a composite organization (see methodology) implementing KX could experience benefits of $5.72M over three years versus costs of $1.38M, adding up to a net present value (NPV) of $4.34M and a 315% Return on Investment. | Data & Analytics |
VentureBeat - AI’s growing enterprise gaps explain why AWS SageMaker is growing | O’Reilly’s annual survey of enterprise AI adoption found that just 26% of organizations have AI projects in production, the same percentage as last year. In addition, 31% of enterprises report not using AI in their business today, a figure that is up from 13% last year. | Artificial Intelligence |
TechSpot- Google-commissioned survey claims Microsoft tech makes governments less secure | Besides a majority of these government employees showing concern for future cyberattacks, and being unsatisfied with Microsoft's workplace offerings, Google said that governments' reliance on Microsoft tech made them more vulnerable to hacking. | Security |
VentureBeat - The metaverse will fuel massive innovation (and Facebook isn’t the metaverse) | The truth is, the metaverse is a decentralized system that has a lot in common with peer-to-peer services like Napster, Skype, and BitTorrent. Oh, and Facebook and Meta do not. | Metaverse |
SiliconANGLE - Three ways to build cost resilience into your cloud | Many Gartner clients find out the hard way that cloud costs can spiral out of control more quickly and unexpectedly than traditional information technology costs. Because cloud usage is metered and billed in a “pay as you go” model, costs are highly sensitive to usage patterns. | Cloud |
VentureBeat - Sustainability and the metaverse: 5 considerations for preparing for the next big tech paradigm shift | As enterprises prepare for Web 3.0 and consider how to do business at the convergence of emerging technologies, they may end up with massive online footprints that will generate an incredible need for data storage, which could lead to more products and more waste if not done thoughtfully. | Sustainability |
VentureBeat - Data remediation: What it is and why it matters | This post provides an overview of the remediation process, its numerous benefits, and its different stages. Read on to discover how companies use this procedure to improve their workflow by reducing data overload. | Automation & Productivity |
VentureBeat - How we can avoid the mistakes of Web2 when innovating around Web3 | Web2 is driven by the entities that have the most data and can easily monetize the information they hold. Facebook might have been built as a social networking tool, but today Meta is essentially the top global data powerhouse. Web2 firms are trying to hang on to this business model. | Web3 |
StateScoop - Local cyber is finally getting its moment, city CISOs say | “Local government is right in the middle of everything that’s going on right now, and at the same time we’re seeing more effort in the federal government in actually helping to step up our game in cybersecurity.” | Security |
VentureBeat - The difference between web and mobile search | “Do” transactional queries typically include an actionable verb, such as, “buy a red dress”, “record live video”, or “buy a concert ticket”. Users expect to find results that enable them to perform their desired action, and they expect the results to be relevant to their needs associated with that action. | Automation & Productivity |
VentureBeat - AI governance adoption is leveling off – what it means for enterprises | Among respondents with AI products in production, the number of those whose organizations had a governance plan in place to oversee how projects are created, measured and observed was roughly the same as those that didn’t (49% yes, 51% no). Among respondents who were evaluating AI, relatively few (22%) had a governance plan. | Artificial Intelligence |
Network World - SD-WAN may be getting cheaper | SD-WAN costs are apparently becoming more accessible, particularly at the lower-capacity end of the market, according to TeleGeography’s research, which said that median non-recurring charges for SD-WAN implementations—meaning charges for the SD-WAN appliances themselves, not for additional managed services—have decreased by about 15% compounded annually since 2018. | Tech Trends |
VentureBeat - Gartner lists seven cybersecurity trends for 2022 | Taken together from the standpoint of enterprises focused on new digital initiatives, the seven trends show clearly that cybersecurity needs to be a business enabler first. The two trending proof points of cybersecurity’s business value are decentralized decision-making and faster response times to business challenges. | Security |
SiliconANGLE - As danger looms, the C-suite taps the brakes on tech spending | That represents a 700-basis point drop in three months — in a market where you can’t hire enough people. The percentage of companies hiring has gone from 10% during the pandemic to 50% today, according to ETR data. And we know there’s still an acute skills shortage. So you would expect more IT outsourcing, but it’s down. | Tech Trends |
VentureBeat - Running legacy systems in the cloud: 3 strategies for success | No one gains a competitive advantage from worrying about infrastructure these days; they win with a laser focus on transforming their applications and their business. That’s a big part of cloud’s appeal – it allows companies to do just that because it effectively takes traditional infrastructure concerns off their plates. | Cloud |
Network World - Aruba exec: Centralized policies, NaaS, segmentation are big | “Another idea is that instead of putting different policies in all these different places around the enterprise—like a policy for the user on VPN, then another a policy for the user in the branch and another for headquarters—if we instead said, centrally define this class of traffic going to these cloud destinations, we’re going to have company-wide policy of sending that to this particular cloud-hosted security vendor like Zscaler,” | Network Management |
VentureBeat - Report: Majority of execs believe data is vital to sustain the metaverse | This business investment in the platform also highlights new questions – such as security in the metaverse or how the enterprise can best use this digital ecosystem – and data is the common thread. Eighty-nine percent of respondents considered metaverse data important to their business operations in the next 5 years. | Data & Analytics |
eWeek - 5 Digital Transformation Strategies for Mid-Market CIOs | However, most small and mid-sized businesses, or SMBs, will have no choice in the matter. If they fail to offer a teleworker solution, mid-tier competitors will steal their employees away, and they could even find themselves unable to compete anymore. | Digital Transformation |
VentureBeat - Google Cloud security survey is ‘aggressive’ move vs. Microsoft | This line of argument — that Microsoft is a fundamental part of the cybersecurity problem, rather than the solution — has been made in the past by Microsoft security rivals such as CrowdStrike. But the survey appears to be the most outspoken critique of this kind against Microsoft by Google Cloud so far. | Cloud Security |
SiliconANGLE - Database competition heats up as AWS, Oracle and Snowflake reshape the landscape | In addition to its enhancements for HeatWave, Oracle has published a set of benchmarks for the offering. The company published benchmark performance results against competing databases and has challenged other firms to run comparisons. | Data & Analytics |
Enterprise Talk - Four Key ‘Human’ Pitfalls to Keep an Eye on in Digital Transformation | Some digital transformation initiatives are started because someone is infatuated with a new technology or tool and just wants to use it. Businesses must ensure that they thoroughly understand the ramifications of a new venture before committing to it, as well as whether it will deliver a good return and meet a reasonable business need. | Automation & Productivity |
VentureBeat - Report: Employees spend 3.6 hours each day searching for info, increasing burnout | Unfortunately, Coveo found that the average employee spends 3.6 hours daily searching for information — an increase of one hour more from last year’s report. IT employees spend half their day (4.2 hours) looking for relevant information. | Automation & Productivity |
Network World - Opinion Zero trust requires network visibility | This translates to logging information from network infrastructure at every level, from the core switches all the way “out” to the edge switches in the branch networks and all the way “in” to the virtual switches in the data center | Security |
eWeek - California Privacy Rights Act and Enterprise Data Management: Key Updates | The new law broadens the existing CCPA definition of an individual’s sensitive data to include any information reasonably capable of being associated with a person. The new law also makes it easier for consumers to regulate the processing of sensitive information. | Data Privacy |
VentureBeat - Everyone’s joining the metaverse, but the real business opportunity is building your own | While the rational entry plan for organizations to join the metaverse is diving headfirst into Decentraland, Sandbox, or other developed spaces, the real business opportunity lies in the creation of individual, unique metaverses for each company — offering consumers an immersive, end-to-end experience that is truly irreplicable and can evolve without boundaries. | Metaverse |
sdxCentral - Should CISOs Face Criminal Charges for Negligence, Failure? | It depends on how the security enforces best practices and strategies across the whole organization, and also the technologists, developers, and others who are responsible for deploying those practices, he said. “If you take the approach of just blaming the security team, you’re blaming the one group that is absolutely concerned about security all day long.” | Security |
Datanami - Comet Releases New Survey Highlighting AI’s Latest Challenges | Issues include the fact that many experiments are abandoned because some part of the data science lifecycle was mismanaged. This is due in large part to the manual tracking processes that organizations often put in place, which hinder effective team collaboration, and are not adaptable, scalable, or reliable. | Data & Analytics |
ZDNet - State-backed hacking attacks are a big worry, but most firms don't know what to watch out for | According to analysis by cybersecurity company Trellix, half of all organisations think they've been the target of a nation-state cyberattack within the past 18 months, while a further 42% think they'll be subject to one in the future. Fewer than one in 10 businesses believe that they're not a target for nation-state hackers at all. | Security |
VentureBeat - Computing’s new logic: The distributed data cloud | The distributed data cloud is not a single tool or platform, but an ecosystem pattern that gets data to the right place and the right person at the right time in a secure, governed, and trusted way. It includes a federated collection of data management and analytics services spanning public clouds, private clouds, and the network edge. | Data Management |
ZDNet - Farewell ZDNet: Data remains the lifeblood of innovation | As we've noted, looking ahead is the great reckoning on how to deal with all of the data that is landing in our data lakes, or being generated by all sorts of polyglot sources, inside and outside the firewall. The connectivity promised by 5G promises to bring the edge closer than ever. | Data & Analytics |
Network World - Use zero trust to fight network technical debt | In addition, the ZT network does not assume that a trust relationship is permanent or context free: Once it is on the network, a node must be authenticated and authorized for every network operation it attempts. | Network Management |
VentureBeat - 4 key areas of opportunity for automation | To avoid disaster, take the steps out of the siloes and understand each one. Then you can think about which steps can still work using a low human touch without sacrificing quality or customer experience — and which components need more human intervention or interaction. | Automation & Productivity |
SiliconANGLE - Cloud sales lift data center hardware and software spending to new heights | Over the last 12 months, they have spent billions of dollars to kit out new data centers with servers, storage, networking and software. Indeed, the cloud infrastructure providers now account for almost half of all data center spending in the world, according to a report released today by Synergy Research Group. | Cloud |
The Tech Report - Cybersecurity Priorities – Trends of the Future | Business leaders are expecting that more than $77 billion will be spent on security services outsourcing in 2022. This makes it the most expensive category of cybersecurity spending. According to recent research, 62 percent of companies already have a plan to outsource in the next 12 months. | Security |
VentureBeat - Report: 70% of U.S. consumers want to use AI for their jobs | The majority would like AI to help with tasks such as mistake reduction (58%), problem-solving (57%), information discovery and process simplification (both 56%). | Automation & Productivity |
eWeek - Data Security: 3 Things Most Organizations Overlook | Those three security challenges are untrusted computation programs, unvalidated input, and unauthorized data movement. | Data Management |
sdxCentral - MITRE, Fortinet Map Cyberattack Flows to Identify ‘Choke Point’ | The project is “a pictorial showing of what the adversary did at each step, and that’s such a valuable thing to show up to executives,” Skoog said. “It’s a means to communicate across different technical expertise with what’s happening.” | Security |
Network World - Best backup for 7 major databases | There are many backup options for databases, but here are recommendations for Cassandra, DB2, DynamoDB, MongoDB, MySQL, Oracle, and PostgreSQL. | Data & Analytics |
sdxCentral - Cloud Security Alert Fatigue Causing Chaos | The cloud security vendor surveyed more than 800 IT professionals across five countries and 10 industries for its 2022 Cloud Security Alert Fatigue Report. It found that 59% of respondents were pinged at least 500 times per day regarding potential security issues. And that 57% of respondents use five or more cloud service providers. | Cloud Security |
VentureBeat - Why USD could be the HTML for the metaverse, digital twins and more | USD is in the same position today. It isnt great at everything, but it does the best job among dozens of alternatives for sharing 3D assets across tools, services and platforms in an open and extensible way. USD is already helping companies like Ubisoft and Ikea simplify some 3D workflows and seeing traction with rendering engines like Unity and Unreal. | Automation & Productivity |
Cyber Defense Magazine - How to Fix Mid-Market Security Using Intelligent Automation and AI | In Coro’s recent report analyzing mid-market cyber security, we found that while 50% of medium-sized companies had email malware protection in place in 2021, 88% of them had misconfigured their protection settings. Meanwhile, only 16% of mid-sized companies had email phishing protection in place, and 71% of them had misconfigured settings. | Security |
AiThority - The Importance of Data Literacy: Why It Is Important to Achieve Data Literacy | The open approach borrows conceptually from Bertelsmann University’s “Data Curriculum” which provides all employees with a universal training program in the field of Data. It focuses on six data “roles” ranging from data scientist to business partner. These roles all tend to be found within most B2B businesses. | Data & Analytics |
VentureBeat - Report: 81% of companies experienced a certificate-related outage in the past two years | Along with the rise of machine identities, the report showed that enterprises struggle with a lack of complete certificate visibility. This year’s survey revealed that the number of internally trusted certificates grew nearly 16% since last year, with the average business issuing 267,620 internally trusted certificates across its organization. | IT Management |
Forbes - Chasing The Myth: Why Achieving Artificial General Intelligence May Be A Pipe Dream | Artificial General Intelligence, a concept that has not yet been brought to life, will, for all purposes, think and carry out complex tasks such as corporate restructuring and HR management using characteristic human qualities such as logical reasoning, empathy and human-centeredness while retaining the expected computational speed, accuracy and big data analytics associated with standard AI applications | Artificial Intelligence |
ZDNet - Tech hiring is broken. Software developers could be the key to fixing it | According to a 2021 report by developer hiring marketplace Terminal, 56% of software engineers feel less enthusiastic about a job role after going through a poorly managed interview. Likewise, 49% of developers say they are more likely to pass on a job after being interviewed by someone who doesn't seem to understand the job, or the underlying technology requirements. | Tech Jobs |
Forbes - Digital Signage: The Top Five Trends You Need To Know About In 2022 | Since quality user experience is vital, retailers might be further integrating APIs. That's because they help with tasks such as user login and registration, file access and storage, database modification, client-to-client messaging and more. | Digital Signage |
TMCNet - Global Survey Validates the Emergence of a New Practice Area in Enterprise IT Valued at $30 Billion | The global survey results of over 800 corporate finance executives validate the emergence of a new practice area in Enterprise IT that includes risk management, payments, real-time connectivity, treasury management and working capital finance. | IT Management |
TechBullion - Metaverse is taking off, Adobe / Meta / WIMI leads a new trend | The application of underlying technologies, such as bitcoin, blockchain, VR, AR, artificial intelligence, big data, 5G communication, and wearable devices, is directly mature, and has gradually become an indispensable infrastructure for metaverse. Metaverse provides a larger increment and may have trillions of market sizes in the next decade. | Metaverse |
TMCNet - More than Half Of Technology Leaders Believe Data Will Be Vital For Sustaining The Metaverse - Bright Data Research | To support their Metaverse strategy, more than three-quarters of leaders (84%) across the IT, telecom, and technology sectors say they are planning to look at procure data intelligence solutions to be deployed inside virtual worlds in the next two years. | Data & Analytics |
VentureBeat - Report: Only 48% of orgs say they have implemented a formal ransomware strategy | Additionally, less than half of respondents (48%) have implemented a formal ransomware plan. Healthcare was the most prepared at 57% with a formal ransomware plan, and energy was the least at 44%, despite both sectors experiencing significant breaches over the past twelve months. | Security |
Datanami - Qlik Report: Data Literacy to be Most In-Demand Skill by 2030 as AI Transforms Global Workplaces | As organizations shift from passive data consumption toward a state of Active Intelligence, where continuous data becomes integrated into working practices to trigger immediate actions, the report predicts how this will impact skills requirements and professional opportunities. | Data & Analytics |
VentureBeat - Report: Cloud automation is key to future-proofing cybersecurity | Eighty-six percent of respondents are exploring ways to automate access controls, especially for privileged access. But even with 68% of respondents seeing increases in budgets and staff, they continue to face mounting threats from an expanding threatscape that’s challenging to address. | Security |
TMCNet - State of the Cybersecurity Workforce: New ISACA Research Shows Highest Retention Difficulties in Years | Sixty-three percent of respondents indicate they have unfilled cybersecurity positions, up eight percentage points from 2021. Sixty-two percent report that their cybersecurity teams are understaffed. One in five say it takes more than six months to find qualified cybersecurity candidates for open positions. | Tech Jobs |
Network World - Surprise! The metaverse could be great news for the enterprise edge | The problem is latency—the delay between when we initiate something in the metaverse and when our avatars mirror that action. Significant loss of synchrony with the real world is an ugly problem for metaversing, and we can expect Meta and others to work to correct it by controlling latency. If that happens, there’s hope for those enterprise edge/IoT applications. | Edge Computing |
ZDNet - Social engineering attacks to dominate Web3, the metaverse | As some of us speculate on the potential future value of ENS domains and register them -- such as 'businessname.eth' -- these addresses could be used as leverage in phishing attacks, especially as ENS domains are recorded on the blockchain and cannot be removed through trademark disputes easily. | Web3 |
VentureBeat - Report: 89% of enterprises have been attacked by Kubernetes ransomware | The situation in the U.S. is slightly better, with 42% reporting they have data protection in place for their Kubernetes environments. However, 55% of U.S. respondents at organizations that have deployed Kubernetes say they have already experienced a ransomware attack on their containerized environments, versus 48% globally. | Security |
ZDNet - APAC firms see need to train staff in digital skills, but few actually do so | Specifically, the ability to use cloud-based tools such as accounting and CRM (customer relationship management) software-as-a-service (SaaS) applications emerged as the top-most needed digital skill by 2025, according to a study commissioned by Amazon Web Services (AWS). | Digital Transformation |
Network World - NaaS adoption will thrive despite migration challenges | By replacing conventional hardware-centric VPNs, firewall appliances, load balancers, and MPLS connections, NaaS technology promises adopters the ability to rapidly scale up and down in lockstep with demand while eliminating hardware costs and bolstering network security and service levels. | Network Management |
sdxCentral - As Vendors Ditch SASE For SSE, What’s Actually Changed? | But for the most part, these SSE products aren’t so much new as they’re rebranded and repackaged SASE services that’ve been stripped of their SD-WAN capabilities, if they ever had them in the first place. | Security |
VentureBeat - The risk of undermanaged open source software | In fact, according to Red Hat’s 2022 The State of Enterprise Open Source report, 89% of respondents believe that enterprise open source software is as secure or more secure than proprietary software. | Security |
Network World - What is IPv6, and why is adoption taking so long? | Adoption of IPv6 has been delayed in part due to network address translation (NAT), which takes private IP addresses and turns them into public IP addresses. That way a corporate machine with a private IP address can send and receive packets from machines located outside the private network that have public IP addresses. | Network Management |
SciTechDaily - New Quantum Technology To Make Charging Electric Cars As Fast as Pumping Gas | Researchers say that consequences can be far-reaching and that the implications of quantum charging can go well beyond electric cars and consumer electronics. For example, it may find key uses in future fusion power plants, which require large amounts of energy to be charged and discharged in an instant. | Quantum Computing |
VentureBeat - XR pioneer calls for metaverse regulation | Furthermore, building a hyper-accurate user profile over time should be banned — biometric data like eye movements should not be stored indefinitely. Having less data makes AI-based targeted advertisements a little less potent. Ideally, most data streams should be kept strictly real time. | Metaverse |
SiliconANGLE - Cisco: Complexity and number of cyberattacks jumped in 2021 | Ransomware was identified as the top security concern for 2022 by 38% of the respondents, followed by zero-day or heretofore undiscovered vulnerabilities (29%), exploitation of internet-facing apps (16%), phishing attacks (14%) and unauthorized access to stolen credentials (4%). | Security |
eWeek - Top 20 Kubernetes Best Practices | A survey from the Cloud Native Computing Foundation (CNCF) revealed that 91% of respondents use Kubernetes, 83% of them in production. That’s up from 78% the previous year. | Cloud |
VentureBeat - Report: 80% of employees say they’ll stay at a company offering data training | A new survey by Tableau and Forrester Research shows that data skills are increasingly vital, yet training lags. Eighty-two percent of decision-makers surveyed expect basic data literacy from employees in every department — including product, IT, HR and operations. And expectations are only increasing. By 2025, close to 70% of employees are expected to use data heavily in their job, up from 40% in 2018. | Data & Analytics |
Datanami - Spending on AI Solutions Will Double in the US by 2025, Says IDC | Retail will remain the largest U.S. industry for AI spending throughout the forecast while Banking will be the second largest industry. Together, these two industries will represent nearly 28% of all AI spending in the United States in 2025 and will account for nearly $20 billion of the amount added to the U.S. total over the forecast. | Artifical Intelligence |
VentureBeat - What you need to know about the state of the metaverse today | The major difference with Brave is its aggressive anti-ad approach that strips online ads from websites. Users will navigate social networks not with Facebook but with applications like Steemit, a blockchain based social network that gives users control over their personal information, protects their content, and provides an ownership stake in the platform based on their content contributions. | Emerging Tech |
Cyber Defense Magazine - Directed Analytics – The Future of Data Management | Directed data analytics offers the next generation of data reporting, providing a multitude of data in a short period, displayed in a customized way that is fit for the user and company, and compiling the data into a broader industry context in order to visualize long-term trends and patterns | Data & Analytics |
VentureBeat - AI critical to business success in post-pandemic world, study finds | Digital transformation continues to be a top priority for a third of business decision-makers, while boosting productivity is a priority for 28%. Interestingly, 26% of organizations are investing in ESG, which has become more of a priority than developing new products and services (24%) or accelerating financial growth (21%). | Automation & Productivity |
Forbes - Building A Data-Driven Culture Within State Governments | Analytics can be complicated to the general business user and leveraging the capabilities of AI to break down those complications providing actionable insights from our data. | Data & Analytics |
GTSC - There’s More to AI Bias Than Biased Data, NIST Report Highlights | “But these approaches do not adequately capture the societal impact of AI systems. The expansion of AI into many aspects of public life requires extending our view to consider AI within the larger social system in which it operates.” | Artificial Intelligence |
Pew Research Center - AI and Human Enhancement: Americans’ Openness Is Tempered by a Range of Concerns | This survey looks at a broad arc of scientific and technological developments – some in use now, some still emerging. It concentrates on public views about six developments that are widely discussed among futurists, ethicists and policy advocates. | Artificial Intelligence |
VentureBeat - Report: Bots cost businesses millions of their online revenue | If businesses cannot determine the difference between real customers and bots, this can make marketing analytics data useless. Businesses have burned through marketing budgets and made poor decisions based on bad marketing data. | Data & Analytics |
Network World - What is a digital twin and why it's important to IoT | In essence, a digital twin is a computer program that takes real-world data about a physical object or system as inputs and produces as outputs predictions or simulations of how that physical object or system will be affected by those inputs. | Data & Analytics |
ZDNet - Franchises, partnerships emerge in Ransomware-as-a-Service operations | In total, 65% of the leak sites monitored last year were managed by new players on the scene. The majority of targets are based in developed nations, including the US, Canada, Germany, Australia, Japan, and France. | Security |
Forbes - The Biggest Cyber Security Risks In 2022 | Aside from the potential for breach of privacy, loss of money, and disruption to infrastructure from cyber-attacks, there's another genuine and pressing problem that's often overlooked: A loss in the trust in tech and data. | Security |
VentureBeat - AI critical to business success in post-pandemic world, study finds | The study found a significant shift in attitudes towards AI, ML and data analytics: Over three-quarters (77%) of knowledge workers said that all three could benefit their company in the next 36 months. | Automation & Productivity |
TMCNet - Universal Data Governance Framework Ensures Data Protection, Promotes Data Accessibility and Interoperability for New Data Types Beyond PII | A good example is the United States. There is no common consensus to handle PII among the different states and industry actors. Navigating through all these regulatory requirements across different jurisdictions is very time-consuming and exhausting. In addition, the classification of new PII, such as audio recordings and IP addresses, remains unclear. | Data Governance |
Insurance Newsnet - Insurance Fraud Report 2022: Real Time Data, A Crucial Asset In Fraud Fighting | Survey respondents have differing views on the challenges and benefits of fraud detection software solutions. The common theme however is the data challenge; from underwriting to claims to special investigations. | Data & Analytics |
Network World - DDR5 memory is coming soon. Here’s why it matters. | DDR5 memory also features a minor power reduction. DDR5’s operating voltage is 1.1 volts, down from DDR4’s 1.2 volts. That may not seem like much, but multiply that over hundreds or even thousands of DIMMs in a data center, and you start to add up to some real power savings. | Automation & Productvity |
sdxCentral - Private Network Complexities, Opportunities Abound | It also expects 4G LTE radio access network (RAN) infrastructure to remain the dominant technology for wireless networks through the five-year period, however 5G radios should see stronger adoption in the latter years. | 5G |
threatpost - Misconfigured Firebase Databases Exposing Data in Mobile Apps | Mobile apps that researchers found were left vulnerable by cloud misconfigurations were popular apps for dating, fitness, bookkeeping, logo design, e-commerce and more, some with more than 10 million downloads, according to the post. | Security |
VentureBeat - Report: Edge technologies will drive emerging tech investments in 2022 | Looking back to 2021, 5G drew the highest average investment in 2021, with survey respondents reporting an average of $465,000 invested in the technology. This was followed by IoT at $417,000 and edge technologies (i.e., edge AI and edge computing) at $262,000. | Edge Computing |
ZDNet - These four types of ransomware make up nearly three-quarters of reported incidents | "The most prevalent ransomware strain in the fourth quarter of 2021 was LockBit 2.0, which was responsible for 29.7% of all reported incidents, followed by Conti at 19%, PYSA at 10.5% and Hive at 10.1%," said the researchers. | Security |
Datanami - Cloudera Study Reveals 26 Percent of Businesses Are Reshaping Priorities Around ESG | New research from Cloudera, the enterprise data cloud company, reveals more than one quarter (26%) of business decision makers are now putting increasing investment in environmental, social and corporate governance (ESG) ahead of developing new products/services (24%) or accelerating financial growth (21%). | ESG |
NetworkWorld - 5 SD-WAN gotchas to avoid | “Many folks supplemented their WANs with [Internet connectivity], and then left MPLS in.” In many regions, business-class Internet “is not a ton cheaper,” he says. In addition, as organizations go to Internet connectivity versus MPLS, they often increase bandwidth, so cost per megabit might go down, but total cost rarely does, he says. | Network Management |
VentureBeat - Accenture lists top 5 tech trends for 2022 | Blockchain is the backbone of Web3, an all-encompassing term for a decentralized internet, where no single entity can control the flow of information online. This means that instead of storing data on central servers, each member of a network will have access to the same data in the form of a distributed ledger. | Emerging Tech |
IndustryWired - Top Applications of Decision Intelligence and AI in Businesses | Decision Intelligence eliminates the need for long conversations. With a DI platform, you have a nexus of truth that everyone on your team can refer to and trust. You know that the collected insights generated are unbiased, accurate, and reliable. This allows you to act faster and reduces conflict within your team. | Data & Analytics |
VentureBeat - Report: Hardware still accounts for biggest portion of IT spending | Driven by the shift to remote work which places a premium on portable computing devices, companies plan to spend significantly more on laptops than on desktops — 19% of hardware budgets vs. 14%, respectively. | IT Management |
eWeek - Top Data Analytics Tools & Software 2022 | Some companies hire data analysts and business intelligence professionals; other have a team of data scientists helping them decode various data sources. In sum, having the right data analytics tools is part of the solution; having skilled big data experts is just as important. | Data & Analytics |
KuppingerCole - Hyperautomation Changing Business | Hyperautomation integrates AI/ML in order to automate enterprise automation. In a nutshell – automate the automation. This can achieve enterprise-level scalability for automation that uses methodical processes to identify processes and tasks that could be automated, as well as increasing the capabilities and flexibility of the automation “bots” that carry out those tasks | Automation & Productivity |
TMCNet - Orca Security Survey Finds Cloud Security Tool Sprawl Increasing the Flood of False Positive Alerts, Missed Critical Issues, and Team Burnout | This combination of multi-cloud adoption and disparate tooling is overwhelming security teams with a flood of inaccurate alerts. For example, 59% of respondents receive more than 500 public cloud security alerts per day, and 38% receive more than 1,000 per day. | Cloud Security |
IndustryWired - Top 10 Use Cases of AI in Data Mining Algorithms, Explained | The data mining technique in mined data is used by artificial intelligence systems for creating solutions. Data mining serves as a foundation for artificial intelligence. AI in data mining is a part of programming codes with information and data necessary. | Artificial Intelligence |
VentureBeat - Cloud security teams are ‘overwhelmed and desensitized’ by alerts, survey shows | Among the findings of the 2022 Cloud Security Alert Fatigue Report is that 59% of respondents report that they receive more than 500 alerts about public cloud security per day. Thirty-eight percent report receiving more than 1,000 of these alerts each day. | Security |
Markets Insider - IT Talent Trends for 2022 Released by Info-Tech Research Group | What employees are looking for is changing. The biggest change from 2019, pre-pandemic, to today is an increase in the importance of culture, flexible or remote work, and work-life balance. | IT Management |
Forbes - Whirlpools And Monsters: Identifying Key Cloud Risks | "Organizations with little or no cloud cost optimization plans rush into cloud technology investments. They end up overspending on cloud services by up to 70% without deriving the expected value from it." | Cloud |
CUInsights - Robotic process automation: Why – and why now? | Remember that there was a fear, decades ago, that desktops would take away people’s jobs. Instead, desktops transformed those jobs, freeing people to do other tasks and work more intelligently. In the same way, RPA will simply change what people do and empower them to invest more in their uniquely human talents. | Automation & Productivity |
VentureBeat - Can AI transform small businesses and grow prosperity across North America? | Small businesses don’t have the same access to online advertising ecosystems, or the knowledge to leverage them effectively. Beam.city has built industry knowledge into an algorithm that simplifies the experience for small businesses and guides them in where to best allocate marketing dollars. | Artificial Intelligence |
Forbes - Transforming The Supply Chain With Data Analytics And Intelligence | In their "2021 Future of Supply Chain Survey," Gartner discovered that 43% of enterprises will continue to digitalize and integrate innovative technology into enterprise-wide systems. This means that in the coming year, the ability to augment operations and decision-making with data analytics will prove to be a transformative and highly-favored capability. | Data Analytics |
BecauseBecause - Why Is Cloud Computing Important? Key Benefits Plus Your Jobs Prospects | The global cloud computing market is expected to more than double in size by 2025. We find out why cloud computing is important and what jobs are available for MBA graduates | Cloud |
VentureBeat - How decision intelligence could put AI at the center of every business | Decision intelligence (DI) is now helping companies bridge the gap between theoretical AI and commercial AI, with Gartner predicting that more than a third of large organizations will be using DI within the next two years. | Artificial Intelligence |
SiliconANGLE - How cybersecurity leaders can reframe their roles to succeed | As a result, the role of the cybersecurity leader has become increasingly elastic because of the growing misalignment of expectations from stakeholders within their organizations. This is causing burnout among security leaders, who are overworked from practicing in “always-on” mode. | Security |
VentureBeat - Report: 25% of mobile endpoints have faced malicious apps | The report takes a look at the mobile attack surface, examining a year’s worth of mobile threat data in review, including a deeper concentration on mobile device threat and mobile application threat trends. | Security |
ZDNet - As cloud costs spiral upward, enterprises turn to a thing called FinOps | While the survey's authors do not provide a similar composite spending figure for larger enterprises, they report that many spend $12 million or more annually on selected public cloud services -- 18% of enterprises spend this on AWS, 15% spend this on Microsoft Azure, and seven percent on Google Cloud Platform. | Cloud |
Inside BigData - Cloud Database Trends Survey: Key Cloud Benefits of Database-as-a-Service (DBaaS) for Cloud Migration | In fact, 61% of respondents surveyed claimed they were either already fully migrated or working to complete their full database migration to the cloud. More than a third, 36%, were partially migrated or working on a partial migration, with the remainder still planning their migration. | Data & Analytics |
VentureBeat - Executives discuss top challenges in deploying AI — and how to solve them | Increasingly, adopting AI is leading to boosted profitability, with 27% of businesses responding to a December 2021 McKinsey survey claiming that at least 5% of their earnings before interest and taxes (EBIT) are now attributable to AI. | Artificial Intelligence |
Techstartups - What is the Metaverse? The Metaverse Explained Simply | The metaverse also has another potential including the opportunities to leverage the technology in the areas of education and learning. The metaverse could be used to connect students, educators, and learners from all around the world and empower them to interact in meaningful ways. | Metaverse |
VentureBeat - Digitization could drive manufacturing beyond Industry 4.0 | During this shift, forty-eight % of organizations invested in cloud-enabled tools and technologies and 47 % in digital collaboration tools to support their remote workforce, according to an Accenture survey. | Automation & Productivity |
VentureBeat - Edge computing will see new workloads, strong growth, IDC predicts | Edge computing looms as an important next step for AI and analytics applications that have been a target for cloud migration, but which have clogged up some of the data pipes to and from the cloud. | Edge Computing |
AiThority - Applied AI Adoption: How to Get it Right | Yet, time and again we see companies, of all shapes and sizes, blindly invest in or deploy AI without a clear understanding of what problems they are looking to solve or the value they are trying to generate. This results in huge amounts of wasted time and money. | Artificial Intelligence |
VentureBeat - 5 key levers IT management can pull to fight the talent crunch | Gartner research shows that the time to fill a role has increased by 18% since before the pandemic, and a survey of HR leaders found that 48% of organizations report significant concerns about turnover. | IT Management |
AiThority - Enter the Metaverse: Industries are Gearing up for Tech-driven Innovations | “As the metaverse is maturing quickly, this is a crucial time for digital transformation leaders to act. It can be adopted for several use cases to make business operations more personalized, improve customer engagement and increase revenues.” | Emerging Tech |
VentureBeat - Report: Cybersecurity teams need nearly 100 days to develop threat defenses | A recent analysis by Immersive Labs of 35,000 cybersecurity team members inside 400 large organizations found that it takes over three months (96 days) on average to develop the knowledge, skills and judgment to defend against breaking threats. | Security |
Blocks and Files - Flash and software-defined storage are taking over the datacenter | Server-attached SSDs are now growing in popularity. A majority of companies, 55 percent, use SATA-based SSDs in servers, with an additional 14 percent planning to within two years. A minority, 40 percent, use SAS SSDs, with another 16 percent intending to do so within two years. | Data Storage |
Computerworld - IT workers grow restless, and younger ones want respect — Gartner | “IT is a super-heated labor market, right now,” Waller said. “There’s a great talent competition going on there. Sometimes we even compare it to the competition to get top athletes — particularly in key skill areas, such as cybersecurity, data science, cloud and agile development, etc.” | Tech Jobs |
VentureBeat - What is a data lake? Definition, benefits, architecture and best practices | A number of vendors are expected to drive this growth, including Databricks, AWS, Dremio, Qubole and MongoDB. Many organizations have even started providing the so-called lakehouse offering, combining the benefits of both data lakes and warehouses through a single product. | Data & Analytics |
Datanami - Enterprise Data Storage Market Size to Grow by $1.14B, Says Technavio | Over the projection period, the enterprise data storage market in APAC will benefit from significant expenditures in smart home and smart city projects by major countries such as Japan, China, and South Korea. | Data Storage |
VentureBeat - Why and how the U.S. should increase cyber protection: A call to arms | It is incumbent upon the cybersecurity community to pursue holistic solutions for grids and networks through a “digital twin” construct that will identify, preempt, backup and recover from any emerging threats and continue to protect vital assets during periods of attack or disruption. | Security |
ZDNet - Data centres are still a tempting target for hackers: Here's how to improve your security | Measures should also be put in place so in the case of a data centre being targeted by an attack designed to disrupt it, services can be maintained. For data centre operators, risk management should be driven by senior leaders to be most effective. | Security |
eWeek - Understanding Database Virtualization: 5 Key Points | With the advent of database virtualization (DBV) – not data virtualization – a new methodology has entered the arena. DBV claims to break vendor lock-in on data warehouse technology. How applicable is it and how can IT leaders evaluate the technology? | Data & Analytics |
VentureBeat - Report: Increased cloud usage secures spots for AWS, Azure, and Google Cloud as the top 3 providers | In addition to adoption (if an organization is using a cloud provider), usage levels are an important metric as well. As organizations increase overall cloud usage, they tend to gravitate toward market leaders. Data from this year’s survey indicates Azure seems to be either closing the gap — or has slightly surpassed — AWS with some users. | Cloud |
ZDNet - A Forrester analyst's impressions from Mobile World Congress 2022 | The slow and ongoing standardization process between 3rd Generation Partnership Project (3GPP) release cycles, as well as the lack of chipsets, devices, spectrum limitations, and modules that support emerging 3GPP 5G standards, remains a drag on the speedy 5G uptake. | IoT/Mobility |
CSO - 8 takeaways for CISOs from the NSTAC zero-trust report | The report does an excellent job summarizing the history of zero trust, originating in the private sector, as well as the slew of zero-trust efforts, guidance and requirements that continue to stream from authoritative government sources. | Security |
Forbes - The Future Course Of Process Automation Will Be Driven By AI, Not Bots | Deploying an RPA bot is analogous to using a hammer. It’s great for driving nails, but when confronted with a screw or another fastener, it cannot perform as expected. A bot that tries to do its job regardless of its inputs can cause damage (digitally speaking), possibly shutting down the workflow that relies upon it. | Artificial Intelligence |
VentureBeat - With Mandiant, Google can challenge Microsoft’s security dominance | Microsoft is trying to support all of its own products and services to deliver security to customers, while “Google is a little more interested in supporting the SOC – the security operations center,” Firstbrook said. | Security |
threatpost - The Uncertain Future of IT Automation | Cloud-native technologies make connectivity with remote devices easier while staying secure without the use of VPNs. They also improve visibility into the exact, real-time status of a device. IT teams will have an easier time pushing patches automatically without worrying about VPN bandwidth restrictions. | IT Management |
VentureBeat - Pandemic pushes growth in robotic process automation | The new report from Forrester notes that the definition of the term is blurring as the general marketplace for automation grows, too. As RPA tools improve, they’re adding connections to other enterprise tools, producing what Forrester calls an “automation fabric market.” | Automation & Productivity |
eWeek - Detecting the Unknown Unknowns in Cybersecurity | Many security solutions, even today, are still trying to use various types of signatures to detect malicious files, network traffic, human behaviors, and several others. Even tools that are trying to harness the immense power of large user communities to create vast databases of tens of thousands of different signatures are only effective to some extent. Overall, this strategy is not enough to provide good protection against the known threats. | Security |
VentureBeat - IT professionals plan to adopt passwordless technology, according to ESG report | Today, an identity and access management research report created by Enterprise Strategy Group (ESG) unveiled that 85% of IT and cybersecurity professionals agree the adoption of passwordless technology is among top strategic initiatives. | Security |
Security Boulevard - Automation is the Top Cloud Security Priority | Respondents have already integrated their DevOps toolchain into cloud deployments, yet organizations are still struggling with the lack of expertise that bridges security and DevOps. | Cloud Security |
TechBullion - External Human weakness: why MFA isn’t the answer | Anything. Humans are vulnerable by nature: social engineering attacks may exploit their greed, their insecurities or simple confusion under stress. The tactics may be more or less sophisticated, and may or may not be supported by technological tricks such as deepfakes, but human vulnerability doesn’t change. | Privacy & Security |
Industry Wired - Is there Better, Alternatives to Blockchain for Businesses | For example, Amazon’s Quantum Ledger Database simplifies the process of implementing a shared database designed for applications like ledgers, providing a cryptographically verifiable audit trail without all the overhead of a distributed ledger or blockchain. | Blockchain |
VentureBeat - Email security bill of rights for a zero-trust world | And although business email compromise (BEC) attacks make up a small percentage of attacks, they cause the most damage: Our data suggest that BEC accounted for 1.3% of attacks but would have resulted in over $354 million in direct losses. | Privacy & Security |
AiThority - By 2025, Chatbot Messaging App Accesses to Reach 9.5 Billion Globally | Advanced chatbot messaging apps are becoming conversant at simulating chats using audio, video, and GIFs too. The popularity of chatbots for messaging is gaining popularity on account of the massive demand for self-service customer experiences that can be delivered in real-time 24/7. | Automation & Productivity |
VentureBeat - Why the future of the metaverse can only be decentralized | A social network based on a DAO upends this model to return value to those who generate it. Users have an ownership stake in the platform, and assuming it operates using the same ad-based revenue model, the user will receive a share of these revenues as a reward for their engagement. | Metaverse |
Techstartups - Cyber threats keep evolving, and so should your defenses | Typically, there are over a hundred thousand cyberattacks in an hour or more than 2,000 per minute. When it comes to mobile devices, an average of 24,000 malicious mobile apps are blocked daily by mobile app stores. | Security |
VentureBeat - AI-powered intelligent security makes the hybrid enterprise possible | To effectively counter this increased cyberthreat, the key for security teams is to get “very good at separating the signal from the noise,” he said. “And you can’t do that without AI and ML.” | Security |
ZDNet - Rush to cloud computing is outpacing organizations' ability to adapt | Again, many of these issues will fall to IT teams to address -- and cannot be effectively outsourced to cloud providers. The survey finds only 21% of IT executives strongly agree that their cloud vendors provide all the necessary tools and processes to manage and optimize their cloud environments, while 42% somewhat agree. | Cloud |
SiliconANGLE - Robotic process automation becomes a transformation catalyst. Here’s what’s new | Cloud migration is an accelerant to digital business. Organizations are moving to the cloud and building new capabilities on top. A digital business goes beyond cloud and software as a service and puts data, artificial intelligence and automation at the core, leveraging cloud and SaaS, but it reimagines entire workflows and customer experiences. | Automation & Productivity |
ComputerWorld - Coda and Notion turn up the heat on Microsoft Office | “These emerging 'living documents' will likely impact the competitive landscape and, for some companies, represent a viable alternative to Google’s or Microsoft’s productivity and collaboration apps.” | Automation & Productivity |
VentureBeat - Decentralized identity using blockchain | Using the identity wallet, the user (i.e., the identity owner) can present proof of their identity to any third party. The wallet helps users give and revoke access to identity information from a single source, making it easier. | Security |
Network World - NSA urges businesses to adopt zero trust for network security | Configuration tips for network admins include the use of secure, frequently changed passwords for all administrative accounts, limiting login attempts, and keeping potentially vulnerable systems patched and up-to-date. The report also describes safe configurations for SSH (secure shell), HTTP and SNMP (simple network management protocol). | Security |
VentureBeat - Report: 9% of security incidents caused by USBs and other removable media | Trusted USB devices can be infected with malware variants that search for external storage devices connected to a victim host to infect them and spread further. This risk is much greater when endpoint users can transfer USB devices from personal devices to business assets. | Security |
AIThority - Who Benefits From Democratized Data Analytics? | This is democratized data analytics in action. Everyone in the company makes smarter decisions throughout the day without ever leaving their existing workflows or having to learn entire new skill sets. | Data & Analytics |
VentureBeat - Report: 95% of IT leaders feel open source tools are key to strong infrastructure | What was surprising was that 82% of IT leaders said they’d be more likely to select a vendor who contributes to the open source community, which was driven, in part, by a desire to sustain healthy open source communities. | IT Management |
sdxCentral - VMware, Red Hat Lead 'Fierce' 5G Cloud-Native Platform Race | VMware and Red Hat are in “fierce competition” for the top 5G telco cloud-native platform, while Microsoft and Amazon Web Services (AWS) are market followers, according to ABI Research’s latest 5G telco cloud-native platforms ranking. | Cloud |
SecurityWeek - Tens of Cybersecurity Firms Found Exposing Their Assets: Study | It’s not uncommon for major companies to unwittingly expose databases and other assets, but a study conducted by Reposify over a two-week period in January showed that 35 multinational cybersecurity companies and their more than 350 subsidiaries hosted over 200,000 exposed assets. These assets included databases, remote access sites, and cloud services. | Security |
VentureBeat - Report: Majority of enterprises will still use Web2 until 2030 | Between now and the end of the decade, enterprises will dabble with Web3 for applications that benefit from new blockchain-enabled business models and new social/gaming networks. In the nearer term, Gartner expects 25% of enterprises to integrate legacy apps and services with decentralized Web3 applications by 2024. | Web3 |
Data Center Dynamics - Object storage is emerging as the storage standard for data lakes | HDFS is widely used as a data lake storage solution, especially in connection with the tools of the Hadoop ecosystem: for example, MapReduce, Spark, Hive or Hbase. While Hadoop and HDFS are widely adopted, a number of recently developed analytics tools (including Splunk, Vertica, Elastic) are now available on the market for analyzing the high volumes of data in data lakes. | Data Storage |
Network World - 7 DNS attack types and how to mitigate them | Almost half of respondents (48%) report losing more than $500,000 to a DNS attack, and nearly 10% say they lost more than $5 million on each breach. In addition, the majority of U.S. organizations say that it took more than one day to resolve a DNS attack. | Security |
SC Media - Four ways to get the most out of a threat detection program | Behavioral detections target bottlenecks in attacker tactics, techniques and procedures (TTPs), allowing just one well-crafted and tuned analytic to defend against the equivalent of thousands of IOCs and help defend against unobserved or future variations of the attack. | Security |
VentureBeat - Security doesn’t just have a talent problem – it has a spending problem too, survey shows | The survey found that 50% of security leaders believe their organization’s cybersecurity budget “fails to meet the minimum figure they need to remain on track with their security goals.” | Security |
Datanami - New Report from expert.ai Forecasts 2022 to be ‘The Year of Language’ in Artificial Intelligence | Analysis across expert.ai’s sample of articles revealed data as the single, most discussed topic in 2021 spanning 15% of total articles, followed by technology (12%), customer (8.6%) and machine learning (5%). | Data & Analytics |
eWeek - How Automation Drives Today’s IT | In practical, real-world terms, an automation efficiency in an ERP system can drive some fairly complex orchestration. Traditionally, every iota of that functionality will have been built by a developer, naturally limiting it somewhat. Today’s technology has fewer limitations, thanks to AI. | Automation & Productivity |
Forbes - How To Break Through The RPA Ceiling By Implementing An Intelligent Automation Strategy | According to Gartner analysts, by this year, some 90% of organizations were expected to have adopted RPA in some form. Yet, those that try to scale RPA across their organizations fail 97% of the time, according to the results of a study by Deloitte. | Automation & Productivity |
Analytics Insight - Top 10 Data Analytics Jobs in Big Tech Companies in March 2022 | Not only data analytics jobs are extraordinarily financially rewarding, but it provides a host of opportunities for aspirants in the tech sector to learn about multiple topics related to artificial intelligence and big data. | Data & Analytics |
SciTechDaily - Injecting Fairness Into AI: Machine-Learning Models That Produce Fair Outputs Even When Trained on Unfair Data | MIT researchers have found that machine-learning models that are popular for image recognition tasks actually encode bias when trained on unbalanced data. This bias within the model is impossible to fix later on, even with state-of-the-art fairness-boosting techniques, and even when retraining the model with a balanced dataset. | Artificial Intelligence |
VentureBeat - Report: 93% of orgs are challenged by malware analysis | Among the top malware analysis challenges are lack of automation (58%), lack of integration (56%), and lack of team experience in using tools (45%). | Security |
Network World - Virtual networks need a rethink to meet hybrid-, multi-cloud demands | Despite all the hype about the economy of scale of the cloud providers, the fact is that most enterprises achieve economies close enough to those of the cloud that the difference wouldn’t cover cloud provider profit margins. | Cloud |
Industry Wired - Citizen Data Scientist: How to Become One? | A citizen data scientist need not be a professional with a world-class degree or certification. they act as bridges between the business team and data analytics teams with the specific role of generating insights using visualization tools and point–and–click interfaces. | Data & Analytics |
Network World - Gartner: 5 ways to deal with network equipment shortages | Some vendors offer official refurbished equipment programs, including Cisco and HPE Aruba. They fully refurbish, recertify and support the hardware. It may be a few years old, but the lead time for this equipment is days or weeks. There are also independent third-party vendors of used equipment, like ITRenew. | IT Management |
ZDNet - Ransomware sneaks in with remote workers and cloud-based IT says CyberRisk Alliance survey | The top attack vectors were all from outside the organization, with 37% citing remote worker exploits as a key issue. An additional 35% said cloud infrastructure was to blame, and 32% reported security problems with cloud-based apps. | Security |
VentureBeat - The future of data science: Trends in a rapidly-growing industry | We are seeing an increase in people who went to school with a math background (or who might have started out in data engineering) wanting to make the switch to data science. This should be comforting news to anyone who got a degree in math (or a STEM-related field) and now wants to make a change in their career to be part of this rapidly growing industry | Data & Analytics |
ZDNet - Application modernization makes a dent in the technology universe | It means continuing embrace of wholesale digital transformation for the business as a whole, built upon "As-a-Service" environments that provide capabilities ranging from artificial intelligence to IoT data management. | IT Management |
SciTechDaily - A Security Technique To Fool Would-Be Cyber Attackers – Method Safeguards a Computer Program’s Secret Information | Instead, a team of MIT researchers has devised a new approach that allows memory sharing to continue while providing strong security against this type of side-channel attack. Their method is able to speed up programs by 12 percent when compared to state-of-the-art security schemes. | Security |
Government Technology - California’s Cybersecurity Chief Shares Priorities and Plans | Additionally, placing an emphasis on collaboration and transparency with the provider community will result in healthier and more efficient supply chain management. We all depend on outsourced critical services that vary along the maturity spectrum. The focus needs to be on supply chain risk management and how we use IT-enabled services to raise the bar. | IT Management |
threatpost -6 Cyber-Defense Steps to Take Now to Protect Your Company | The Ransomware Spotlight Year-End Report identified 32 new ransomware families in 2021, bringing the total to 157 and representing a 26 percent increase over the previous year. These ransomware families are exploiting a total of 288 vulnerabilities – a 29 percent increase over the previous year. | Security |
VentureBeat - Report: Two-thirds of consumers would rather use a chatbot than browse a website | Approximately 18% of consumers use chatbots to find business hours, while 17% are interested in learning more about product information, and 16% are looking to find a nearby business location; other use cases include making a customer service request (16%), requesting technical support (12%), requesting a quote (11%) and asking for personalized recommendations (9%). | Automation & Productivity |
ZDNet - 7 solid reasons to consider AIOps | "AIOps is about applying AI to enhance IT operations," Thurai explains. "Contrary to some beliefs, it is not about improving AI with IT operations, but rather is the other way around." | Automation & Productivity |
VentureBeat - Web3 holds the promise of decentralized, community-powered social networks | We spend much of our time using one or more Web2 platforms, be it for reading blogs, watching videos, or just scrolling through the internet. The platforms that we use generate billions of dollars, but the users never receive anything for their loyalty. Web3 changes this drastically by rewarding users for their participation. | Web3 |
Network World - Cisco IDs top 2022 security threats and what to do about them | Now new, less experienced combatants seek out a broader range of targets, using less surgical attacks. “This has led to more risky behavior than we’ve seen historically, without as much regard for collateral damage,” he wrote. | Security |
eWeek - Hyperautomation Trends 2022: RPA, Low-Code, AI | Hyperautomation, according to Gartner, is “a business-driven, disciplined approach that organizations use to rapidly identify, vet, and automate as many business and IT processes as possible.” | Automation & Productvity |
AiThority - Illusive Research Reveals Identity Risks on 1 in 6 Enterprise Endpoints | Exposed Identity Risks – More than 1 in 10 (13%) endpoints contain privileged account passwords that have been left exposed (e.g., cached credentials). | Security |
eWeek - The Risk of Fraud in the Metaverse | The metaverse is exceptionally trendy, financially backed, and full of opportunities for businesses to change how they operate. However, leaders need to remain diligent in focusing on risk management and keeping the general public’s interest, patience, and attention | Privacy & Security |
InfoWorld - Use the cloud to strengthen your supply chain | The rise of industry clouds may change some of this. Indeed, it won’t take long for the public cloud providers to adopt and provide these types of services. Those who wish to gain this advantage will just use the services from the public cloud providers and not have to build their own. | Cloud |
VentureBeat - Report: Ransomware groups show staying power, average lifespan is 17 months | In addition, it includes, but is not limited to, billions of data points ranging from network and endpoint detection devices that IBM monitors to X-Force Red engagements, X-Force’s threat intelligence insights and data provided by report contributors such as Intezer. | Security |
AiThority - Daily AI Roundup: Biggest Machine Learning, Robotic And Automation Updates – Feb 23 | The updates will feature state-of-the-art capabilities in artificial intelligence (AI), Machine Learning, Robotic Process Automation, Fintech, and human-system interactions. | Artificial Intelligence |
ZDNet - SockDetour backdoor used in attacks on defense contractors, says Unit 42 | SockDetour allows attackers to remain stealthily on compromised Windows servers by loading filelessly in legitimate service processes and using legitimate processes' network sockets to establish its own encrypted C2 channel. | Security |
Forbes - Do Companies Have To Adjust To AI Or Vice Versa? | One of the first adjustments to be made while attempting AI-driven transformation is moving business operations and applications from an offline environment to a digital one. Essentially, this involves making the necessary investments to acquire the tools, technological platforms, data scientists, developers, researchers, testers and others. | Artificial Intelligence |
SiliconANGLE - More cybersecurity consolidation: Cloudflare acquires Area1 and Darktrace buys Cybersprint | Area 1 was founded in 2014 and offers a product focused on eliminating targeted socially engineered cyberattacks. Pitched as providing the best cloud email security available, Area 1 claims that its service prevents 30% more phishing attacks than email gateways, cloud email suites and other defenses. | Security |
VentureBeat - What consumers think about AI – and the impact on your industry and business (VB Live) | For instance, among consumers who said they weren’t informed about AI, only 20% thought AI would have a positive impact on society. That number shoots up to 50% percent among those who feel they have a handle on the technology. | Artificial Intelligence |
TMCNET - Cloud Storage leaks grew by 150% in 2021, due to market pressures, new CybelAngel industry report reveals | "The key is visibility and speed in order to locate all exposed assets pertaining to an organization's attack surface before they are breached by malicious actors. As risks change each day, organizations need to be ready to respond through continuous monitoring." | Security |
AutomationWorld - Leading IoT Vendors Commit to OPC UA Adoption | Key drivers behind this progression are, first and foremost, the global adoption of OPC UA as the open standard of choice for secure production-system interoperability across OT and IT networks, leveraging standardized data exchange. | IoT |
Israel21c - Cyberattacks on cars increased 225% in last three years | Upstream Automotive Cybersecurity Report reveals that the top attack categories were data/privacy breach, car theft/break-ins and control systems. | Security |
Redmond - Report: 76% of Orgs Faced Ransomware Attacks in 2021 | 42 percent were user actuated, meaning they clicked on a malicious link, often from a spam email. 43 percent were due to a lack of diligence from an administrator (patches, credentials, etc.) | Security |
Geekwire - Web3 trends to watch: New apps, new consumer behavior, and a massive talent migration | First, top talent including engineers, product managers, and entrepreneurs are leaving their Web2 jobs to work at Web3 startups. Community optimism, green field tech opportunities, and allure of career momentum are attracting top talent. | Web3 |
VentureBeat - Google’s privacy changes: The war on cross-app tracking, cookies and third-party advertising | “The profiling of user behavior has long been the fuel of digital advertising. Even though Google has said they will wait two years for full implementation, that is a very short fuse for tech companies who rely on the ability to track and monetise user behavior." | Data Privacy |
Network World - Zero trust requires clear architecture plans before changing core systems | Or, enforcement might be handled at the endpoint level for systems able to run a software-defined perimeter client, and the network only required to handle policy enforcement for devices that cannot (timeclocks or sensors, for example). In either case, those high-level choices should, as much as possible, be made before the redesigns in the separate technology spaces begin. | Security |
Datanami - Five Ways to Shift to AI-First | In the ideal world, AI would be assisting with every phase of decision making fully embedded into systems and fully transparent to employees and customers. But to achieve this goal, fundamental changes need to take place including a top-down shift in mindset, as well as implementation of MLOps tools to help IT teams to overcome technical hurdles that can prevent AI from reaching its full potential. | Artificial Intelligence |
TMCNET - The Data Is In: Cloud Has Hit a Wall, and There's Only One Way to Vault Over It | These limitations are caused by too many groups across an enterprise using too many different tools and clouds, with 80% struggling to achieve comprehensive visibility into cloud usage and spend. Further complicating matters, these disparate tools and preferences are spread across islands of automation, which in turn create security vulnerabilities. | Cloud |
threatpost - Gaming, Banking Trojans Dominate Mobile Malware Scene | Last year, banking trojans learned a number of new tricks. For example, the Fakecalls banker, which targets Korean mobile users, is now “[dropping] outgoing calls to the victim’s bank and plays pre-recorded operator responses stored in the trojan’s body,” according to the report. | Privacy & Security |
Forbes - Making Sense Of The 'Unknown' With Data Intelligence And Hyperautomation | In a recent IDC webinar, analysts predicted that “By 2023, 50% of all supply chain forecasts will be automated using artificial intelligence, improving accuracy by 5 percentage points.” This 5% could be the equivalent of saving millions of dollars for manufacturing companies. | Automation & Productivity |
sdxCentral - How CIOs Reckon With Talent Upheaval | “When IT workers are asked about their intent to stay, 22% indicate they are looking for a new job within the year. Active job postings in the U.S. for IT have continued to increase over the past year, driving stiff competition in an already scarce talent pool, | Tech Jobs |
eWeek - Digital Twins Guide: Answering 3 Most Frequently Asked Questions | Leveraging data from existing systems, the digital twin allows manufacturers to extract greater value from years of investment without the need to “rip and replace.” | Digital Twins |
VentureBeat - 5 top data and analytics trends to watch in 2022 | The advancement in MLops will lead businesses to create stable machine learning models with application-level quality. In fact, Gartner predicts that by 2025, the 10% of enterprises that establish AI engineering best practices will generate at least three times more value from their AI efforts than the 90% of enterprises that do not. | Data & Analytics |
Blocks & Files - Veeam Data Protection Trends: Assume you will be breached | Veeam’s 2022 Data Protection Trends report says that users now operate in a hybrid multi-cloud world, face rabid ransomware attacks, and need more data protected – and to have that data recovered more quickly, increasingly by SaaS processes and from the cloud. | Data Protection |
Network World - Data-center network automation: Its pitfalls and how to avoid them | Network automation is notoriously difficult to implement due to the complexity of networks in general, and only 23% of the people surveyed were fully confident in their data-center network-automation strategies. | Network Management |
TechStartups - Clearview, the controversial facial-recognition AI startup that uses social media photos to build a biometric database, seeks its first big deals with federal agencies | This year, Clearview is aiming to win its first big U.S. government contracts and expand its team by a third amid a series of legal challenges to Clearview for its alleged violation of various states’ biometric information and data privacy laws. | Data Privacy |
VentureBeat - Report: 70% of orgs are spending $1M or more on AI | According to the results, more than 40% of organizations have reached high levels of maturity, from operational (AI in production, creating value) to transformational (AI is part of business DNA) status. To get there, a quarter of maturing organizations are spending $51 million or more on AI, compared to just 8% of experimenters. | Artificial Intelligence |
HelpNetSecurity - To shift to data-driven security decision making: Start with the right data | In fact, recent research by Trend Micro found that the average organization has no less than 29 security monitoring solutions in place. This translates into an unmanageable amount of data flowing into the Security Operations Center (SOC), and makes it increasingly difficult to prioritize alerts and manage cyber risk. | Security |
VentureBeat - What is intelligent document processing? Why IDP matters in the enterprise | Another IDP vendor, Zuva, focuses on contract and document review, offering trained models out of the box that can extract data points and present them in question-answer form. M-Files applies algorithms to the metadata of documents to create a structure, unifying categories and keywords used within a company | Automation & Productivity |
eWeek - 3 Emerging Trends in Streaming Data | EDA enables data to be moved in real-time event streams via an event mesh – helping link together previously unconnected processes across business running multiple siloed systems. A global study of C-Suite and IT architecture professionals has found that 85% of organizations are looking to incorporate real-time data. | Data & Analytics |
Network World - Top 7 next-generation firewall vendors | Next-generation firewalls (NGFW) offer the same capabilities of a traditional firewall with added features such as Deep Packet Inspection (DPI), Integrated Intrusion Protection (IIP), Web Filtering, Antivirus, Antispam, Anti-Malware, SSL and SSH traffic inspection, all with an eye towards the detection and isolation of threats in real-time. | Security |
Datanami - Axway Survey Finds People Are Willing to Open Up Their Data if it Leads to Better Experiences | “It indicates there is an expectation for satisfying digital experiences. Securely opening up data while building on heritage infrastructure can help craft these experiences – while allowing companies to give us the privacy and security we crave,” added Padua. | Data Privacy |
sdxCentral - Great Resignation Shines a Spotlight on Insider Threats | Surveys from security vendors like Tessian and Code42 reveal how ubiquitous the problem has become. In the U.S., 40% respondents said they had taken data with them when leaving a job, and 58% of them use the data for their new job, according to Tessian’s recent report. Plus, Code42 found 60% of surveyed employees admitted they took data from their last job to help the current role, according to Payne. | Security |
VentureBeat - Report: 63% of IT pros say cyberthreats are top obstacle to cloud adoption strategy | Approximately 63% of IT professionals named cyberthreats that are designed to target cloud services as the top obstacle to cloud adoption. Similarly, 69% of IT professionals identified the need for consistent security coverage across all cloud infrastructures as the biggest barrier to multicloud adoption. | Cloud |
SiliconANGLE - How to crack the code on data and analytics governance | Gartner predicts that through 2025, 80% of organizations seeking to scale up digital business will fail because they do not take a modern approach to D&A governance. If CDOs expect to deliver effective D&A strategies, they must crack the code on governance | Data & Analytics |
VentureBeat - Running multiple APIs side-by-side with AI paves way to hyperautomation for business | Using multiple APIs led by AI is innovating operations, processes and leading customer experience, all key to business success. This makes a solid case for AI-driven APIs to lead the way into the future of Artificial General Intelligence. | Automation & Productivity |
Forbes - The Top 10 Tech Trends In 2022 Everyone Must Be Ready For Now | Quantum computing will potentially give us computing power that is a trillion times more powerful than what we get from today’s advanced supercomputers. | Emerging Tech |
TechBullion - The Key Artificial Intelligence and Machine Learning Trends for 2022 | Another key AI trend we expect to see is the continued rollout of natural language processing systems. Indeed, natural language processing is an artificial intelligence technology that’s already received widespread acclaim and success, and the development of the GPT-3 model is further driving the potential. | Artificial Intelligence |
Analytics Insight - Top 10 Data Science + Data Analytics Programs To Take up in 2022 | Currently, data science consulting is more important than ever since it is helping companies grow and prepare for a better future. The foundation of data science is made of skilled data scientists who possess immense experience in domains like statistics, math, and computer science. | Data & Analytics |
Digital Journal - Business Consulting: Everything as a Service accompanied with an Expertise Edge | The model combines the 3 C’s (business Context, Competitive positioning, and Customer preference), in a collaborative framework (synergies that cut across verticals and business units) to create a unique value proposition for customers. | IT Management |
VentureBeat - To pay or not to pay is the question for cloud ransomware | According to Cybereason, 42% of companies that suffered an attack in 2021 recouped only a small portion of the financial damages caused by ransomware through insurance coverage. What’s more, in a survey of 1,263 companies, 46% of victims that submitted a ransom payment got their data back, but much of it was corrupted. | Security |
TechRepublic - Why multicloud environments can help improve security and redundancy | Single-cloud providers advertise redundancy by employing multiple data centers. However, data centers share a common control plane.“The control plane is what enables the cloud to function,” Gibbs said. “The cloud control plane orchestrates the network and data centers. If anything happens to the cloud control plane, that will likely turn into a single-point-of-failure outage.” | Cloud |
ZDNet - Data is going to the cloud in real-time, and so is ScyllaDB 5.0 | On the performance front, Laor emphasized ScyllaDB's new I/O scheduler, which has been in the works for about 6 years. It's built to match new hardware capabilities and works on the shard level. What ScyllaDB's people realized was that workloads with mixed read/write requests require special management, and this is what they worked on. | Data & Analytics |
Cointelegraph - JPMorgan unveils research on quantum resistant blockchain network | QKD utilizes quantum mechanics and cryptography to enable two parties to exchange secure data and detect and defend against third parties attempting to eavesdrop on the exchange. The technology is seen as a viable defense against potential blockchain hacks that could be conducted by quantum computers in the future. | Blockchain |
ZDNet - NIST outlines what IoT and software 'security labels' could look like | Allowing for a marketplace of standards, programs, and schemes to evolve would permit the market to drive how best to achieve the desired outcomes and offer the flexibility to suit a variety of stakeholders' needs. Doing so also would accommodate, and not hinder, a rapidly evolving technology landscape," writes Megas. | Emerging Tech |
VentureBeat - 5 strategies to consider with cloud deployments | Enterprises should ask themselves if they have the elasticity of resource requirements to make the financial benefit of a cloud deployment work. If they have a stable workload, meaning a 24/7/365 workload that does not have peaks and troughs of resource requirements, it will be cheaper to run it on-premises or as a co-location | Cloud |
Forbes - The Five Biggest Education And Training Technology Trends In 2022 | E-learning is an increasingly popular option for workplace training, too – a study by IBM into its own remote learning initiatives found that its learners had been able to absorb five times more content, at one-third of the cost to the company, resulting in a saving of $200 million. | EDTech |
eWeek - 3 Ways IT Can Support Your New Global Workforce | Judicious use of automation will offer extraordinary benefits, including triggering next steps in projects, communicating with customers in any time zone, and connecting employees. Automation will also increase a company’s need for rock-solid IT teams that can stay ahead of trends and keep everything running. | Automation & Productivity |
VentureBeat -Report: 54% of orgs with advanced data analytics have increased their revenue | The survey also reinforced the fact that third-party service providers are key enablers in organizations’ data and analytics journey. In all, 68% of surveyed decision-makers expect to see an increase in their organizations’ spending on data and analytics in the next 12 months, which includes engaging third-party service providers for support in data and analytics-driven initiatives | Data & Analytics |
The Hacker News - 4 Cloud Data Security Best Practices All Businesses Should Follow Today | Last but not least, it's a good idea for businesses to take steps to minimize the data they're entrusting to their cloud providers. After all, you don't need to protect data that's never uploaded in the first place. The idea is to refine business processes to collect only the data required to make them work. | Cloud Security |
Forbes - Navigating Data: Tips For Leveraging One Of Your Organizations Greatest Assets | A common conversation around the executive table is, “We need to do more with our data.” An organization then sets off on a journey to implement data visualization tools or artificial intelligence solutions that require investments in people and technology. But after many months, the organization might still not have really achieved its desired outcomes | Data & Analytics |
IndustryWired - Top 10 Emerging Technology Related to AI in The Banking Sector | With a DAO system in place, the returns will come fast. Banks that mainly rely on digital account opening have experienced 16% revenue growth year over year. from 39% to 46% plan to modify or enhance their existing DAO systems | Artificial Intelligence |
TechRepublic - New study shows enterprises are making progress with cloud-based HPC | Rescale’s software platform enables scientists and engineers to get access to massive pools of the latest chip architectures that boast the fastest interconnects and memory to run enormous workloads over and over that simulate the real world. | Emerging Tech |
Digital Information World - New Study Shows How Several Companies Collect Your Data Illegally | Twitter is another social media platform that does not obey these laws when it comes to trying to get users to consent to cookies, but it should be noted that social media platforms are not the only culprits in this regard. Airline sites such as Ryanair.com and the popular news site for the Daily Mail were both found to break data collection laws that apply in the EU as well as the UK. | Data Privacy |
Finextra - Unlocking the potential of data to transform our world | At present, there are currently up to 234,000 vacancies for data roles in the UK – finding people with the right skills is difficult. Small and medium-sized businesses are lagging in digital transformation too, and some organisations struggle to balance encouraging innovation and complying with regulation. | Data & Analy tics |
AiThority - Optiv ‘A Visual Future of Cybersecurity’ Prepares Business Leaders for the Next Era of Attacks and Innovations | In the future, machine learning (ML) and AI will be used widely by both attackers and defenders. The applications are endless, both in the positive and the negative. AI will be used to improve health care, transportation, education and agriculture, but it will also be used in cyberattacks to automate target analysis, conceal malicious code and create intelligent malware that mimics trusted system components. | Security |
The Register - Facebook is one bad Chrome extension away from another Cambridge Analytica scandal | Multiple Chrome browser extensions make use of a session token for Meta's Facebook that grants access to signed-in users' social network data in a way that violates the company's policies and leaves users open to potential privacy violations. | Data Privacy |
VentureBeat - Ransomware attacks surged 2X in 2021, SonicWall reports | The 105% spike in ransomware attacks in 2021 was also a significant acceleration from the rate of increase in the previous year, when ransomware attacks climbed 62%, year-over-year, according to SonicWall. | Security |
ComputerWorld - Why Apple spent billions to get to 5G — services | Those nations in which 5G services are delivering the fastest connection speeds are ripe for service evolution. Why work in an office when you can grab your iPad Air (soon with 5G) and work under a tree? The combination of fast mobile broadband and powerful hardware underpins a services opportunity we’ve not really begun to scratch. | 5G |
VentureBeat - Meta’s RSC supercomputer brings revolutionary power — and privacy and bias concerns | This blending of physical and digital identities brings cause for concerns. “The problem starts with the philosophy that there’s no need for privacy if you have complete transparency. And we’ve seen that ideology underline Facebook’s decision-making, and we’ve seen the consequences of that | Data Privacy |
CMS Wire - Facebook Metaverse: The Future of Digital Experience Marketing? | "As long as you can make technology seem fresh and new and cool, you can avoid regulation," Donovan noted. "And you can run defense on that for several years before the government can catch up." | Emerging Tech |
Diginomica - Frictionless Enterprise - how the XaaS Effect transforms customer engagement | XaaS is much more than simply adding a digital connection and switching to subscription billing. What matters most is how the provider uses that connection to enhance the customer experience throughout the product lifecycle. | Automation & Productivity |
eWeek - 6 Best Practices to Clear Marketing Data Roadblocks | While 45% of marketers reported having a customer data platform (CPD) that gives them a unified and a single view of customers, only 38% of the survey participants said their customer segment and persona data is available in a format they can use for decision-making. Properly formatted and unified data is the foundation of real-time marketing. | Data & Analytics |
Network World - Data-center spending is half that of cloud services | But numbers can be deceiving. Dinsdale said IBM is still growing its cloud revenues, just at a growth rate that is far below Amazon, Microsoft, and Google. So IBM is not losing ground, per se, in the revenue department, it’s just not gaining ground as fast as the others. | Cloud |
Datanami - Nucleus Research Analyzes Adoption of Modern Data Warehouse Technology in New Value Matrix | “As development of fully-managed and serverless offerings accelerates, Nucleus expects customers to significantly limit the need for IT intervention and reduce expenses related to the over-provisioning of computation resources.” | Data & Analytics |
Network World - 5 best practices for making smart-building LANs more secure | The controller model also helps with the security of the IoT links. Controller-based smart buildings use a custom IoT protocol (common ones are LoRa, LoRaWAN, Z-Wave, and Zigbee) with limited capabilities to limit how they could be exploited, so even if the device link was hacked, there’s a limit to what damage could be done. | Security |
ZDNet - LinkedIn phishing scams increase 232% since Feb 1: report | "When clicked, the phishing links send the victim to a website that harvests their LinkedIn log-in credentials. The footer features elements from LinkedIn's genuine email footer, including their global HQ address, hyperlinks to unsubscribe and to their support section, and the recipient's information." | Privacy & Security |
VentureBeat - Report: Recruiting developers will be 2022’s biggest challenge, say 53% of IT pros | The pandemic highlighted one of the most crucial challenges facing the software industry — the need for more professional software developers. Not only are there not enough developers to meet demand, but those who are available may lack the necessary software development skills for popular frameworks. | Tech Jobs |
VentureBeat - Report: Only 21% of enterprises use zero trust architecture | However, despite acknowledging its importance, only 21% have so far adopted zero trust as a foundational model across their enterprise. Additionally troublesome is that only 32% of respondents consider their enterprises to have high cybersecurity maturity. | Security |
TechTarget - The best enterprise storage arrays of 2021 | Spinning disk retains a prominent position in the enterprise, but the current darling of the data center is flash storage. Flash adoption is no longer limited to larger organizations. Flexible flash configurations and expected price declines combine to make flash compelling to more midsize organizations. | Data Storage |
AiThority - Top Augmented Analytics Trends to Watch out for in 2022 | Most of the ABI products provide extensive dashboarding capabilities that enable analysts to put a data story for end-users but for augmented analytics to become mainstream it is imperative that the products are enabling end-users to extract and explore relevant data stories. | Data & Analytics |
Blocks & Files - The new cloud infrastructure software stack | “Applications don’t live in a vacuum. Every app has a stack of technology components or layers that sits underneath … While the application stack still depends upon core infrastructure elements like compute, storage and networking, these have increasingly become commoditised.” | Cloud |
VentureBeat - How to create data management policies for unstructured data | The lion’s share of all data is unstructured — files of all types including images, log files, trace files, output files, video, and audio, and which are spreading like wildfire. Data management policies must address the efficient movement and management of unstructured data. | Data Management |
Datanami -CNCF Sees Record Kubernetes and Container Adoption in 2021 Cloud Native Survey | The survey, now in its sixth year, found that the usage of Kubernetes is continuing to grow and reached its highest level ever, with 96% of organizations using or evaluating the technology. Kubernetes has been fully embraced by large enterprises and is even growing in emerging technology hubs, like Africa, where 73% of respondents use Kubernetes in production. | Cloud |
TechHQ - Russian hackers profited the most from ransomware payments | In a report from Chainanalysis, about 74% of payments made from ransomware attacks in 2021 went towards Russia-linked hackers. According to the research report, more than US$ 400 million worth of crypto-currency payments went to groups highly likely to be affiliated with Russia. | Security |
InfoWorld - Overcoming the IoT interoperability hurdle | But this network of contributors is far from a well-oiled machine; disparate technologies deal with disparate data communication all over the world. What’s needed is a set of IoT interoperability standards across data collection, stream processing, visualization, alerting, and machine learning and AI frameworks. | IoT |
VentureBeat - Surging ransomware data leaks point to ‘weaponization of data,’ CrowdStrike says | “Antivirus is dead. The legacy antivirus products that are out there — the signature-based antivirus tools — are not effective anymore,” he said. “What is necessary are [tools] that use machine learning, in addition to signatures, to identify malicious activity.” | Security |
Digital Journal - Endpoint Detection and Response Market – Global Industry Analysis, Size, Share, Growth and Forecast 2020 – 2027 | The European region will dominate the market for Endpoint Detection and Response due to Growing demand for natural gas for generating power and heating spaces. | Security |
ZDNet - What the metaverse means for you and your customers | So journey mapping has been obsolete for a decade or so. Too many channels and incongruent behaviour killed it. And don't let a consultant or a martech vendor try to convince you otherwise, reliant as they are upon it, to sell you more of their whatever. | Metaverse |
EBN - The Great Resignation is driving data breaches and cybersecurity threats | Fifty-eight percent took information to help them in their new job, 53% believed that the documents belonged to them, 44% so they could share it with their new employer and 40% to leverage it for more money in their new position. | Privacy & Security |
VentureBeat - How we can finally evolve from Web 2.0 to Web 3.0 | For one, many self-described decentralized apps are far from being genuinely decentralized. It is not uncommon for the front end of these services to be running on cloud servers, meaning that access to them is still dependent on legacy infrastructure, and the blockchain is only occasionally tapped to send or receive data. | Web3 |
techopedia - Why ML Testing Could Be The Future of Data Science Careers | A considerable amount of time goes into testing and quality assurance activities. Experts and researchers believe 20 to 30% of the overall development time is spent testing the application; and 40 to 50% of a project's total cost is spent on testing. | Machine Learning |
InfoWorld - Think you can out-cloud the cloud? | One way that AWS, Google, Microsoft, and other hyperscalers have optimized their energy consumption is by building with energy-efficient languages such as Rust. Not content to simply build with Rust, however, these and other companies are investing in the development of Rust (and other energy-efficient software and hardware technologies). | Cloud |
eWeek - Cloud Migrations: Look Past the Mirage of Cost Savings | For CEOs, cloud adoption is not just an engine for revenue growth and efficiency. Its speed, scale, innovation, and productivity benefits are essential to the pursuit of broader digital business opportunities, now and well into the future. Yet an overly narrow view of cloud-value economics and where value exists, often keeps companies from achieving the desired outcomes.” | Cloud |
ZDNet - Cybersecurity M&A volume reaches $77.5 billion in 2021: report | There were more than 1,000 financing deals involving cybersecurity companies and 286 mergers and acquisitions. 2021 saw five cybersecurity IPOs in 2021 -- KnowBe4, DarkTrace, SentinelOne, Riskified and Forgerock -- with an average IPO raising $467 million. | Security |
VentureBeat - How the metaverse could shape cybersecurity in 2022 | For starters, there is the essential use of AR/VR devices that collect large amounts of user data and information such as biometric information, creating a potential for hack attacks. Moreover, the modern demand for user data is most likely to grow with the Metaverse, as it could provide leverage to collect more user data | Privacy & Security |
SiliconANGLE - The improbable rise of Kubernetes to become the operating system of the cloud | Kubernetes Part 1 explains the dynamics of the technology industry in the early part of last decade, the impact that AWS had on the DevOps movement, the importance of Docker, which blazed a new trail for developers, and how Google ultimately landed on the decision to open-source Kubernetes | Cloud |
VentureBeat - Interoperability must be a priority for building Web3 in 2022 | Embracing cross-chain communication means empowering developers to build on a network that best suits their needs knowing that their applications will be accessible to users across other blockchain platforms. This allows blockchain networks to continue to improve the applications they provide and their own infrastructure, instead of investing countless hours and vast sums of money into building individual bridges. | Web3 |
insideBigData - Data Scientists Reveal Roadblocks to Digital Transformation | For example, around four in 10 are dissatisfied with their company’s use of analytics and model deployment, while more than 20 barriers to effective working emerged, according to a survey of data scientists commissioned by analytics leader SAS. | Data & Analytics |
TMCNET - Survey Shows 77% of Consumers Against Facebook Owning Metaverse Data | An overwhelming 87% would prefer a metaverse on the decentralized blockchain. This sentiment was even more pronounced among Gen Z respondents who were 10% more likely to prefer a blockchain metaverse than their Millennial counterparts. | Blockchain |
VentureBeat - Report: Companies face a 37% chance of losing IP when employees quit | Additionally, 71% of cybersecurity leaders and practitioners report not knowing what and how much sensitive data departing employees are taking to new organizations. Though 96% of companies note they’re experiencing challenges protecting corporate data from insider risk, ownership of the problem is murky. | Security |
Datanami - IDC Survey Illustrates Importance of Purpose-Built Enterprise AI Infrastructure | Of the 31% with AI in production, only one third claim to have reached a mature state of adoption wherein the entire organization benefits from an enterprise-wide AI strategy. | Artificial Intelligence |
VentureBeat - Report: Cloud spending will soon outpace IT due to COVID-19 | Of note, the majority (65.9%) of spending on application software will be directed toward cloud technologies in 2025. | Cloud |
CSO - Look for attack surface management to go mainstream in 2022 | What exactly is the attack surface? In reality, it’s everything—internal assets, external corporate assets, third-party assets, people, everything. That said, the emerging attack surface management category focuses on internet-facing assets alone. Hmm, just another day in the perplexing cybersecurity realm. | Security |
Finextra - Overcoming Cloud Adoption Challenges in Lending Operations | Research shows that 30-40% of lending resources’ time gets used up on non-core tasks due to legacy systems. | Cloud |
Telecoms - What happens in metaverse stays in metaverse – or does it? | Yesterday it was reported that McDonalds filed several trademarks around the metaverse, including one that described as “a virtual restaurant featuring actual and virtual goods.” | Metaverse |
ZDNet - Nearly $700 million spent on ransomware payments in 2020 alone: report | "In fact, despite these numbers, anecdotal evidence, plus the fact that ransomware revenue in the first half of 2021 exceeded that of the first half of 2020, suggests to us that 2021 will eventually be revealed to have been an even bigger year for ransomware," Chainalysis said. | Security |
VentureBeat - Steps IT leaders can take now to get AI out of ‘pilot purgatory’ | But right now, too many AI applications are stuck in the lab at the conceptual stage, and too few reach deployments in the “field” (i.e., production environments with real workloads, users, and problems). This gap is dangerous because AI improves through operationalization, learning from real-world data how to work faster and better. | Artificial Intelligence |
Network World - Log4j hearing: 'Open source is not the problem' | “The weakness in Log4j, which can be exploited by only typing in 12 characters, is just one example of how widespread software vulnerabilities, including those found in open-source code, or code that is freely available and developed by individuals, can present a serious threat to national and economic security,” stated committee chairman Sen. Gary Peters (D-MI). | Security |
ZDNet - Linux malware attacks are on the rise, and businesses aren't ready for it | Analysis from cybersecurity researchers at VMware warns that malware targeting Linux-based systems is increasing in volume and complexity, while there's also a lack of focus on managing and detecting threats against them. This comes after an increase in the use of enterprises relying on cloud-based services because of the rise of hybrid working, with Linux the most common operating system in these environments. | Security |
Semiconductor Engineering - What Will Be The Killer App For 5G? Time To Place Your Bets | At $90.7 billion, mobile gaming now accounts for over half of gaming revenue. (By contrast, movies will rake in only $20.2 billion at the box office.) Likewise, AR seems to be making the transition from booth demo technology to something people will actually use. | 5G |
The National Law Review - Tech Transactions & Data Privacy 2022 Report: The FTC’s Expanding Role in Cybersecurity and Data Privacy Enforcement in 2022 | During the second half of 2021, the FTC took two meaningful actions that signaled the FTC’s desire to expand its role in setting and enforcing cybersecurity and data privacy standards: the FTC clarified the scope of the often ignored HBN Rule and the FTC amended the Safeguards Rule to strengthen the data security requirements for financial institutions. | Data Privacy |
VentureBeat - 3 data privacy trends to watch in 2022 and beyond | In just the first year of California’s CCPA, B2C companies received approximately 137 data subject access requests (DSARs) per million identities. At that time, California was the only state with a privacy law on the books. Virginia and Colorado added laws this year, and more states are trying to push privacy legislation forward. | Data Privacy |
ZDNet - Tech jobs are booming: Here's what employers are looking for | According to job market statistics by CompTIA, IT occupations throughout the economy increased by 178,000 last month, with tech-related hiring contributing to the national growth of 467,000 jobs. Unemployment rates within tech occupations dropped to 1.7%, down from 2% in December 2021 | Tech Jobs |
CSO - Vigilance and Planning: Experts Share Their IT and Data Security Strategies | “I’m focused on security of the DevOps/DevSecOps toolchain from man-in-the-middle and other attacks,” he says. “As the workplace becomes more hybrid, the toolchain becomes a more enticing target for threat actors raising the security stakes.” | Security |
sogetilabs - What if quantum technology could solve the world’s biggest challenges? | Business leaders are aware of the benefits that this next generation of computation can bring, but they’re also concerned by the complexity of this fast-evolving area of technology. Estimates suggest as many as 40% of large enterprises will have quantum computing initiatives underway by 2025. | Quantum Computing |
Techstartups - Here’s Why Web 3.0 Could Disrupt the Future of the Creative Industry and Data Management Systems | Simply put, Web 3.0 is a decentralized version of the web whose focus is to bring power back to the users. A trend that resonates with most people across the world given its value proposition in data privacy and security. | Data Privacy |
SiliconANGLE - What to expect in cloud computing in 2022 and beyond | HPE and Dell are interesting. They’re transitioning early private cloud businesses to GreenLake and Apex, respectively. And finally, after years of staring at their respective navels in cloud and milking legacy on-prem models, they’re building out cloudlike infrastructure, services and pricing models for their customers. | Cloud |
VentureBeat - Report: 88% of IT leaders face integration challenges that slow digital transformation | Companies’ integration challenges and a growing number of applications — on average, organizations are using 976 individual apps — are not only hindering great customer experiences and digital transformation, but also costing organizations millions of dollars. | Digital Transformation |
Cointelegraph - A quarter of people will have spent time in the metaverse by 2026: Research | The report also estimated that 30% of the organizations in the world will have products and services in the metaverse by 2026, with brands already gearing up to stake their claims in the digital world. | Metaverse |
VentureBeat - The struggle to keep cloud budgets in check | The research found that budgetary strain was the number one concern facing people directly charged with managing cloud costs. Indeed, the CIOs and CTOs surveyed said they expected cloud spending to comprise 47% of the technology budget for SMEs in 2022 — a whopping 67% increase from 2021. | Cloud |
SiliconANGLE - Seven intriguing enterprise startups for 2022 | Observability – especially based on the OpenTelemetry standard – is perhaps the most prominent theme. Machine learning is a close second. Data, however, is the common thread that pulls these innovative companies together, even though they all take a differentiated approach to their offerings. | Data & Analytics |
ZDNet - Ransomware gangs are changing their tactics. That could prove very expensive for some victims | According to analysis by Coveware, this move has increased the risk profile of being involved with ransomware attacks, and thus decreases the pool of cyber criminals, because some will decide the potential for being arrested and extradited isn't worth the risk – to the extent that some are quitting. | Security |
VentureBeat - The Great Resignation is a myth: Meet the Great Reprioritization | A recent survey by Bankrate.com found that 55% of Americans plan to seek new jobs in the coming year. And Deloitte revealed that over 50% of CEOs cite talent recruitment and retention as the most significant challenges going into 2022. | Tech Jobs |
Data Center Dynamics - Top data center and tech predictions for 2022 | The metaverse will simply not develop enough this year to have any measurable impact on the edge computing sector. Without a doubt, as the metaverse matures, it will have a massive impact on edge computing. To enhance the user experience, it will have to push content and compute closer to the user. | Tech Trends |
ComputerWeekly - Four emerging data integration trends to assess | In mapping the future of the technologies in the data integration ecosystem, Forrester identified data as a service, data mesh, knowledge graph and query accelerator as four technologies that fall into the “experiment” category. They are regarded as having low maturity and low business value. | Data & Analytics |
TMCNET - More Than Half of Ransomware Victims Paid the Amount Demanded by Hackers in 2021 | And why wouldn't they pay? Data is a valuable commodity. Sixty percent of companies have sensitive customer data (e.g. confidential information, credit card numbers, social insurance numbers, etc.) and nearly one third (28%) value their information assets (data, people, processes, recipes, etc.) at more than $1 million. | Privacy & Security |
Location Analytics Market Estimated to Exceed US$ 45.77 Billion Globally By 2027: IMARC Group | Location analytics, also called geoanalytics, refers to the tools that aid in interpreting and analyzing real-time or historical geographical data. It is usually used to predict consumer behavior or buying patterns. | Data & Analytics |
VentureBeat - Gartner’s IT spend forecast for 2022 shows CIOs ready to take risks | However, Lovelock cautions, the technology that CIOs choose to buy and implement needs to focus on more than simply ensuring that workers can access the internet and accomplish tasks remotely and securely. It should also allow venues for professional growth and self-service | IT Management |
Computerworld - Q&A: CISO sees 'enterprise' browser as easier way to monitor employee web use | As we’re getting what we’re calling sanctioned apps or approved apps, we’ll start to say, 'You know what? Salesforce, Workday, Office — you can only get to those through this browser now.' So, we’ll enforce people who are interacting with your SaaS through this browser. | IT Management |
VentureBeat - Metaverse 101: Defining the key components | To achieve a true VR or AR experience, a user must be able to interact with virtual content in natural and immersive ways. This distinguishes VR from 3D movies and 3D simulations. It also distinguishes AR from “heads-up displays” (HUDS) that present non-immersive content into a user’s line of sight, such as text, data, and flat images. | Metaverse |
eWeek - Real-Time Data Management Trends for 2022 | Organizations will need to glean insights from streaming data in real time to find new patterns and discover and act on them. Navigating data is like running whitewater, where you need to adapt instantly to a changing environment. Those that learn to run the rapids will succeed. | Data & Analytics |
Techstartups - Facebook’s Meta, Snap, Twitter, and Pinterest lost $278 billion due Apple privacy changes | The report notes Meta’s value has fallen by $169 billion since April 26, 2021. Similarly, Snap has fallen by $50 billion, Twitter by $26 billion, and Pinterest by $33 billion. For Snap, Twitter, and Pinterest, those losses represent around half of their previous market values, a staggering decline. | Data Privacy |
VentureBeat - Despite recent progress, AI-powered chatbots still have a long way to go | “Until models have deeper understanding, they will sometimes contradict themselves. Similarly, our models cannot yet fully understand what is safe or not. And while they build long-term memory, they don’t truly learn from it, meaning they don’t improve on their mistakes,” | Artificial Intelligence |
AiThority - Biggest AI and Machine Learning Trends that Will Shift Tech Investments in 2022 | In less than 5 years, AI and ML technologies are ruling every aspect of business function, including Marketing and Sales automation, SaaS development, E-commerce, blockchain DevOps, Cloud modernization, Drones and UAVs, and Space tech. | AI/ML |
VentureBeat - Microsoft: ‘Dangerous mismatch’ in security due to slow MFA adoption | New statistics released in the report show that just 22% of Azure Active Directory identities utilize “strong” authentication in the form of MFA. The remaining 78% of Azure AD identities require only a username and password to authenticate, Microsoft disclosed. | Privacy & Security |
AiThority - Metaverse Trends: Is 2022 the Year of the 3D CMS? | However, probably most tellingly, many business leader’s have realized they knew a lot less about their company and its customers than they thought. There were gaps in data collection, the skills needed to analyze and apply insights, and, critically, the flow of information across a business. | Marketing Tech |
Datanami - Alteryx Report Reveals 88 Percent of Orgs Hindered by Legacy Spreadsheets | As businesses strive to move from being data-hoarders to driving real insights by democratizing analytics, the IDC Infobrief, “Data and Analytics in a Digital-First World”, reveals how complexities, constraints, skill gaps, and a lack of analytics automation are hurting productivity. | Data & Analytics |
VentureBeat - The state of AI ethics: The principles, the tools, the regulations | “If we try to look for the broadest set of unifying principles, it necessitates that we become more and more abstract. This is useful as a point of discussion and framing conversations at the broadest level, and perhaps guiding research. When it comes to practical implementation, we need a little bit more concreteness,” he said | AI Ethics |
ZDNet - Tech salaries, developer skills, cybersecurity, and more: ZDNet's research roundup | The "widespread hunger" for technology professionals might have seen the average salary for technologists hit a record high of $104,566 in 2021, but almost half of tech workers feel they are underpaid. Dice reports that 47.8% of tech workers feel underpaid – a marginal increase of nearly 2% compared to 2020. | Tech Jobs |
VentureBeat - Report: 77% of enterprises have adopted multicloud housing | Multicloud’s promises of lowered costs and vendor lock-in elimination are impacting the CDN and cloud hosting markets in particular, with adoption of the three leading providers (Amazon Web Services, Google, and Microsoft Azure) increased by 20% in 2021. | Cloud |
ZDNet - Cloud-computing spending just hit another huge milestone | While the metaverse is still being hashed out, Canalys sees use cases for the burgeoning virtual world in gaming, social media, workplace collaboration, education, real estate, ecommerce and digital commerce. Whatever it will become, it's all good news for cloud providers. | Cloud |
VentureBeat - Report: 83% of IT leaders say a hybrid multicloud is the ideal operating model | Thirty-six percent of respondents said their clouds are fully interoperable, and a little more than half (56%) reported some level of interoperability between clouds. In addition to cloud interoperability issues, most respondents (80%) agree that moving a workload to a new cloud environment can be costly and time-consuming. | Cloud |
eWeek - Best Website Vulnerability Scanners 2022 | Vulnerability scanners and website vulnerability scanners are different. A website scanner does a remote scan of a website and often provides a graphic that can be included to show the site has been scanned. Vulnerability scanners, on the other hand, scan the IT network, endpoints, and infrastructure as they look for vulnerabilities | Security |
TMCNet - The Payment Revolution: Blockchain Changing the Game | Mordor Intelligence puts a transaction value of the global digital payments market at $5.44 trillion in 2020 and forecast it to climb 11.21% annually to reach $11.29 trillion by 2026. Blockchain technologies also can provide an affordable solution to the 1.7 billion unbanked people in the world that contribute to the roughly $500 billion transferred internationally each year through personal remittances. | Blockchain |
VentureBeat - Report: By 2025 carbon emissions of cloud services will be main factor in purchasing | An increasingly important part of said strategies is sustainable business, which is becoming a key tenant of responsible business practices. More than 90% of organizations increased their investments in sustainability programs between 2017 and 2020, according to previous Gartner surveys. | Sustainability |
yahoo!Finance - Cybersecurity Report 2021: TXOne Networks Publishes In-Depth Analysis of Vulnerabilities Affecting Industrial Control Systems | One important observation from the report is that cyber attacks on critical infrastructure can be resisted and made significantly easier to repel by applying the OT zero trust methodology, which includes device inspection, preserving critical applications and services, network segmentation, and virtual patching. | Security |
ZDNet - This tech job has just been crowned the best in the country | Glassdoor's 25 Best Jobs List for 2022 found that software developers, data scientists, IT architects and full-stack engineers dominate the top spots when measured by salary, job satisfaction and the number of job openings. | Tech Jobs |
Document Analytics Market: Meticulous Research® Reveals Why This Market is Growing at a CAGR of 48.1% to Reach $12.45 billion by 2027 | Document analysis identifies and extracts critical information from incoming paper and electronic documents without extensive user interaction. It transforms the time-consuming and error-prone task of manually processing documents across different formats into a fast, effective, and intelligent automated learning workflow. | Data & Analytics |
Geektime - The Cloud: 4 business trends from the past year and projections for the next | Cloud providers continue to offer storage and basic computing, but they're opening an entire vault of advanced technological services to businesses across the globe, including abilities that were only available to enterprises before. | Cloud |
DEVPRO Journal - Automation and Robotics: The Future of Work Made Possible with Software | Businesses tend to turn to automation to solve a specific problem, for example, moving pallets from a dock or cleaning. They see localized ROI as productivity per employee who used to perform those tasks increases dramatically. But it’s really just the start. Companies need to optimize overall process flow – if there is a bottleneck somewhere else, there is no benefit. | Automation & Productivity |
CSO - Outdated IoT healthcare devices pose major security threats | The report found that IV (intravenous) pumps make up 38% of a hospital’s typical healthcare IoT footprint, and 73% of these pumps have at least one vulnerability that could jeopardize patient safety, data confidentiality or service availability if identified by a bad actor. | Security |
TMCNet - AI-Powered Language is Fueling Customer Engagement According to Survey from Persado and Coresight Research | NLG is a key AI-driven technology in creative content generation and was cited by survey respondents as one of the top five most significant ways to leverage AI in digital marketing. Additionally, 78.3% of respondents hold AI accountable for creative development and execution-meaning that marketers can finally track the impact of words and phrases when using AI generated content. | Artificial Intelligence |
telecoms - Building the foundation for mobile network data monetisation in the 5G era | Location is one of the most valuable types of network data that is highly coveted by all. It is used by operators internally for geo marketing and commercial purposes, but it is also extremely desirable for external businesses and governmental agencies. Smart cities, for instance, rely on location information to analyse population movement patterns for planning purposes, | 5G |
Network World - Gartner: Worldwide IT spending to reach $4.5T in 2022 | The largest growth segment is enterprise software, which is projected to grow 11% to $672 billion. However, Gartner includes the cloud market in the enterprise software market, and that's where the growth is. | Cloud |
Harvard Business School - Where Can Digital Transformation Take You? Insights from 1,700 Leaders | Digital natives in particular expect customer-company interactions, even in business-to-business industries, to be as fast and intuitive as tapping out a text or playing a video game. Not only must a company offer high-quality products or services, but the way they deliver them to the customer matters much more today than in the past. | Digital Transformation |
Programming languages: Python dominates, but developers are adding new skills to stand out | While interest in C++ did see a noteworthy rise, Python and Java still dominate O'Reilly's platform usage. O'Reilly says it has seen usage of content about Mozilla-hatched Rust and Google-backed Go "growing rapidly". Both are popular for systems and infrastructure programming | DevOps |
ZDNet - One in seven ransomware extortion attempts leak key operational tech records | Mandiant collected samples from victims that leverage operational technologies (OT) for their production. After pouring through the data dumps leaked on the name-and-shame websites, the researchers found everything from network and engineering diagrams to information on partner vendors and operator panels. | Security |
eWeek - 7 Digital Transformation Trends Shaping 2022 | One aspect of digital transformation that has been accelerated by hyperautomation is the AIOps sector. AIOps solutions can centralize data and leverage algorithms to aggregate and correlate alerts. Essentially, AIOps is the evolution of ITOps and has been at the core of many digital transformations. | Digital Transformation |
VentureBeat - Drive smarter decision-making with explainable machine learning | Most importantly? Use your judgment. The great thing about explainable machine learning is that it can be, well, explained. If you don’t get it, it probably won’t drive value for your company. | Machine Learning |
ZDNet - Microsoft Teams: Here's what's new in January 2022 | The mirror my video feature can be used by educators who are using tools like a whiteboard or a virtual background with text in it. In those cases, the educator sees a text flipped. Now, they can un-mirror the text to see it correctly by going to Device Settings and toggling off Mirror my video. | Automation & Productivity |
techopedia - Smart HR: How AI is Transforming Talent Acquisition | For instance, Recruiter.com has identified hybrid or remote work as a top trend for 2022—and with that comes the need for more robust and interactive engagement tools to promote a cohesive and productive culture. A tremendous amount of funding is currently flowing to employee engagement tools for this reason. | Automation & Productivity |
Chron - Cyberattacks increasingly hobble pandemic-weary US schools | “It’s very difficult for the school districts to learn from each other, because they’re really not supposed to talk to each other about it because you might share vulnerabilities,” Elder said. | Security |
ZDNet - Ransomware: Over half of attacks are targeting these three industries | According to detections by Trellix, banking and finance was the most common target for ransomware during the reporting period, accounting for 22% of detected attacks. That's followed by 20% of attacks targeting the utilities sector and 16% of attacks targeting retailers. | Security |
VentureBeat - Report: More than half of execs see digital transformation as critical to business growth for 2022 | To deliver on the promises of digital transformation, 35% of CIOs said they will prioritize leveraging infrastructure investments to move from traditional data centers to cloud-based, or leveraging enterprise-wide data and analytics to drive strategic decision-making | Digital Transformation |
SDxCentral - AT&T: Security Top Concern as Edge Interest Surges | Early edge applications include loss prevention in retail, video-based quality inspection for manufacturing, telemedicine in health care, and surveillance and electronic voting in the public sector. | Edge Computing |
AiThority - Should AI Be Centered on Machine Learning Algorithms or Data? | Selecting the right approach is vital to ensure we are appropriately building AI. Three dimensions should be considered: label noise, actionability, and amount of data. | Artificial Intelligence |
TechStartups - How Does Artificial Intelligence Blockchain And Supply Chains Work? | Artificial intelligent blockchains can create new paradigms for global supply chains. On-chain oracles within blockchains provide real-time data for split-second decisions and actions. On-chain oracles prevent issues like trade credit contagion | AI/Blockchain |
VentureBeat - Report: 80% of execs say their orgs’ tech needs not met | Most upper management and middle management executives believe that 40% or more of requests to IT are backlogged due to conflicting priorities and constraints. Midsized companies are most likely to find themselves held back by overloaded IT teams, with most of the managers of midsized firms stating 60% or more of their department’s requests to IT remain unfulfilled | IT Management |
AiThority - SparkPost Global Survey Reveals 74% of Marketing Leaders Concerned with Impending Privacy Changes | The good news is most leaders recognise the importance of investing in aligning each marketing discipline, shoring up solid data practices, and bolstering their arsenal of branded content and communications channels. | Data Privacy |
Network World - Top 10 outages of 2021 | The biggest outages of 2021 had one thing in common: they affected major infrastructure or services providers and, as a result, affected large numbers of enterprises and end users. The lesson? Companies need to be careful about putting all their infrastructure eggs in one basket, or, if they must, to prepare for downtime if that particular service goes down. | Network Management |
Technotification - Top 5 Cybersecurity Trends for 2022 | The public’s patience has run out regarding data breaches and the seeming lack of accountability by businesses. Governments are beginning to respond with legislation that targets company directors, making them financially and legally responsible for data breaches that occur on their watch. | Privacy & Security |
The Hill - Why Congress should pass data privacy legislation in 2022 | Federal legislation is necessary to prevent the United States from becoming a patchwork of 50 different state laws, which would make enforcement more costly and impose unnecessary barriers to innovation in the digital economy, which runs on personal data. | Data Privacy |
Dice - 8 Red Flags in Tech Job Postings You Shouldn’t Ignore | While job postings are meant to provide valuable information about a position and attract culturally compatible candidates, they often contain code words, descriptors or phrases that subtly signal a potentially toxic work environment, a boss with unrealistic expectations, or biased hiring practices. | Tech Jobs |
VentureBeat - Report: 62% of orgs use voice technology to increase revenue | To fuel this innovation, 75% of respondents plan to increase their speech technology budget in 2022, and 92% believe this will drive widespread use of voice technology within five years. | Voice Tech |
SDxCentral - Cisco: Data Privacy Is Key to Customer Trust | “With 94% of organizations saying they are reporting one or more privacy-related metrics to their board, and privacy investment rising, with an average budget up 13%, there’s no doubt that privacy continues to grow in importance for organizations, regardless of their size or location | Data Privacy |
ZDNet - Scammers target us on social media now more than ever | According to the FTC, more than one in four people who lost money to fraud in 2021 said it started on social media in the form of an ad, post, or message. Findings also show that social media was more profitable to scammers last year than any other method of reaching people. | Privacy & Security |
IT Business Edge - Why Business Technologists are Becoming Indispensable | Technology has become so sophisticated and ubiquitous that it is nearly impossible for enterprises to be successful without using technology to its full potential. To bridge the gap between business and technology, an enterprise needs the expertise of a business technologist. | IT Management |
VentureBeat - The ethics of the metaverse | If we don’t have mental privacy and biological privacy, some of the new technologies could essentially read our minds, model our identity, reach fine-grained and contextually relevant conclusions, and then nudge our behaviors to the point where it undermines our intentional actions, Bye said. | Privacy |
Security Boulevard - Best Practices for Application Security in the Cloud | For applications running in public cloud service provider (CSP) environments like Amazon Web Services, Microsoft Azure, and Google Cloud, responsibility for application security starts at the operating system layer. That said, AppSec teams should still factor in the risk of compromise of lower layers of the CSPs’ multi-tenant environment. | Cloud Security |
InfoWorld - Slashing time to insight with unified data analytics | One of the greatest advantages of a unified platform is that you no longer have to manage five points of integration. In fact, you no longer even have to move your data in the first place. With unified data analytics, you bring the analytics to the data instead of the other way around. | Data & Analytics |
VentureBeat - Report: Cloud adoption grew 25% in the past year | That said, the struggle to automate security was palpable, and no matter the reason an organization moves workloads to the cloud, security remains consistently challenging. | Cloud Security |
Talk Business - State of the State 2022: State technology leaders reflect on 2021, look to 2022 | “From supply chain to bioinformatics, we are awash in reams of data. Understanding industry needs – all the way to the individual company-level – remains quite challenging,” | IT Management |
BMC - 12 Best Practices for Cloud Adoption | Here are 12 top practices you need to incorporate as you begin to use the cloud and make it part of your IT and app dev environments. The most successful organizations in their use of public cloud have all of these practices in place | Cloud |
VentureBeat - How data transformed from technical resource to strategic business asset | It’s data, not algorithms, which make Google, Meta, and Amazon the big three in digital advertising. It is also data that made Netflix and Amazon two powerful production companies | Data & Analytics |
eWeek - Humans Will Be the Story of AI in 2022: 4 Predictions | As such, automation of tasks with a high degree of variability or contextual nuance will shift toward supplementation. Examples include healthcare practitioners to paralegals to production line engineers. Less context-dependent, invariable and rote tasks will continue to be automated at pace. | Artificial Intelligence |
ZDNet - Employers are desperate for data scientists as demand booms | "The number of tasks in our testing catalogue related to Data Science and Python grew in 2021 by 158.33% and 113.33% respectively." | Data & Analytics |
Industry Week - The US Digital Skills Shortage Is Worse Than We All Thought | Moreover, almost two-thirds of new U.S. jobs created from 2010 to 2016 were ones requiring medium- to high-levels of digital skills, with those jobs also paying considerably more. In fact, U.S. occupations requiring high levels of digital skills on average pay 2.5 as much as jobs requiring only low levels of digital skills, while medium-level ones earned 1.5 as much. | Tech Jobs |
Enterprise Talk - Enterprises Should Ensure Sustainability of AI Initiatives | With so much emphasis on AI and ML technologies in shaping the future, enterprises need to come with strategies to balance the power and potential of AI. In addition, they need to identify ways to maximize the positive outcomes for customers and society at large. | Artificial Intelligence |
VentureBeat - How the metaverse will impact governance, privacy, fraud, identity, and more | But to the extent that the metaverse will be a transactional space, governmental regulation will apply whether it’s a walled garden or not, for instance on ecommerce and other internet-based transactions to some extent. You can’t totally escape government regulation. | Emerging Tech |
AiThority - ‘Majority of Marketing Departments Rely on Outdated Data and Analytics Practices’ Says Report | Of the almost two-thirds of marketers who believe their company is analytically mature, some 77% have yet to achieve a single unified view of their marketing performance while 68% still depend on spreadsheets for reporting. | Data & Analytics |
eWeek - Best Data Modeling Tools and Software for 2022 | A data modeling solution is only as good as the data it accommodates. Even the best features are useless if you cannot plug in all essential data and put it to use. | Data & Analytics |
ZDNet - Crypto industry status report: A slew of blockchains; smart contracts, DeFi and DAOs on the rise | Svanevik thinks that smart contracts are important for a number of reasons. First, they are unique in that they are autonomous -- they don't need to be invoked. Assuming there are no bugs and vulnerabilities, smart contracts are always up and running. Smart contracts also allow for composability and permissionless innovation: | Blockchain |
VentureBeat - The metaverse: Where we are and where we’re headed | It’s clear that there will be a first big wave of innovation over the next 12 to 24 months, where “mixed reality” hardware produces breakthroughs for immersive experiences. | Emerging Tech |
Virtualization & Cloud Review - What Cloud-Native Skills Are Most in Demand in 2022? | "Survey respondents are clear about their hiring priority in 2022: focus on the skills needed to enable cloud native. Many companies are setting up cloud competency centers and dedicated cloud teams as they skill up." | Tech Jobs |
Tech.co - Over 90 Hacked WordPress Add-Ons Could Give Away Your Website Access | Researchers have found a total of 93 WordPress apps — 40 themes and 53 plugins — have been compromised as part of a large backdoor attack that gives threat-actors full access to the websites those add-ons have been used for. | Security |
VentureBeat - Linux vulnerability can be ‘easily exploited’ for local privilege escalation, researchers say | In Unix-like operating systems, polkit (formerly known as PolicyKit) is used to control system-wide privileges. Polkit’s pkexec is a program that enables an authorized user to execute commands as a different user. | Security |
EdSurge - What Could Web3 Mean for Education? | Some edtech entrepreneurs are eager for Web3 to arrive and change education. They envision an ecosystem where learners buy access to courses without enrolling in colleges; where teachers profit directly from their teaching; where students track progress on ever-lengthening credential chains; and where people who invest in the right tokens gather in learning groups to explore topics of mutual interest. | EdTech |
TMCNET - Qumulo Unveils Top Unstructured Data Storage Predictions for 2022 | Over the next year, there will be a greater need for storing file data in reliable namespaces and managing it across multiple repositories - in the cloud or on-prem - with impressive scalability, performance and cost savings. | Data Storage |
Harvard Business Review - Can AI Teach Us How to Become More Emotionally Intelligent? | Many professional roles requiring strong communication skills, including leadership, public speaking, product management, virtual therapy, teaching, language learning, and bedside manner will benefit from AI that measures emotional intelligence. Indeed, by 2026, the combined market size for emotion detection and conversational AI are projected to grow to more than $55 billion. | Artificial Intelligence |
Fast Company - How Blockchain can become the financial system the world needs | Today, the blockchain user experience is confusing and intimidating, and there are a variety of pitfalls that new users can fall into. Casual users often lose their keys, expose their private keys to hackers, or end up sending tokens to scam projects | Blockchain |
AiThority - Predictions Series 2022: 2022 B2B Marketing and Sales Trends to Prepare For | Already, 30 percent of office phone lines will lead to nowhere. Another 25 percent of executives will have switched jobs during 2021, leaving us with 55 percent of our overall data being bad. | Marketing Tech |
ZDNet - Staff negligence is now a major reason for insider security incidents | Over the past two years, insider threats have increased "dramatically," the report says, with 56% of insider-related incidents caused by a negligent employee. In total, 26% of incidents were linked to criminal inside activities, whereas 18% of threats were caused by the theft of employee credentials, potentially made possible through failures to manage personal device security or weak password use. | Security |
Digital Information World - We Don't Need More Data - We Need More Contextual Data: Data Enrichment vs Fraud | Several data enrichment tools on the market today are part of a wider suite or platform rather than standalone, albeit still providing similar functionality. This makes practical sense, as data enrichment is largely based on automation and aims to both speed up processes and enable enhanced insights. By integrating it into wider automation solutions, this data is placed within an even larger framework, thus better contextualized. | Data & Analytics |
IndustryWired - Top 10 Machine Learning Startups Expected to Excel in 2022 | For example, ML can make a predictive analysis app more precise, with the passing time. ML frameworks and models require an amalgamation of data science, engineering, and development skills. This article lists the top 10 machine learning startups that would become big in 2022. | Machine Learning |
AiThority - bipp Analytics Unveils Predictions for the Business Intelligence and Data Analytics Industry | But, beyond a slick interface is a need for robust data models that act as enterprise-wide single sources of truth. If you’re not investing time to define a layer that hosts business logic to be explored by the rest of your organization, then self-service BI will do nothing except create an endless series of helpdesk tickets. | Data & Analytics |
Seminconductor Engineering - Health Care Is Gold Mine For Hackers | In another case, hackers blocked access to the University of Vermont Medical Center’s data. Employees were unable to retrieve electronic health records (EHRs) and payroll programs. Surgeries had to be rescheduled. Lost revenue was estimated at $50 million. | Privacy & Security |
Databricks' TPC-DS benchmark results and the analytics platform wars | Databricks, the champion of data lakehouse technology and its open storage format underpinnings, announced it set a world record for a data warehouse performance benchmark. Was the announcement hyperbole or legitimate vindication for the data lake and lakehouse technology models? | Data & Analytics |
inside BigData - Leveraging the Power of Data and Analytics … Yeah, Yeah. A Pragmatic Approach in 5 Steps | This requires FIs to step back and reimagine how they engage with their customers. Not only do they need to understand the rich and robust data sets they already have, and to better orchestrate and analyse the data, but match that data with other, external services and data sources to provide a more rewarding and engaging customer experience. | Data & Analytics |
MedCityNews - How payment integrity tools can help payers to tackle fraud, waste and abuse | When reports come in from providers, auditors will study certain portions of the claim (such as medical records) and capture all of the provider’s notes on the backend. From there, the machine starts learning trends in the reports and creating these new ML algorithms, which help identify outliers or mistakes in future claims. | Privacy & Security |
yahoo!Finance - Bitcoin stealers: malware that raid crypto wallets | In its latest report it said sophisticated attacks take careful planning and skill to pull off, but through other types of malware, hackers can take a cheaper “spray-and-pray” approach, spamming millions of potential victims and stealing smaller amounts. The malware families sampled received 5,974 transfers from victims in 2021, up from 5,449 in 2020. | Privacy & Security |
SiliconANGLE - Predictions 2022: Here’s what will happen in enterprise technology this year | We’re seeing supercloud evolve, especially in hyperscale ecosystems. In our view, the two biggest things that are new are: 1) The technology is evolving where you’re seeing services truly integrate cross-cloud services; and 2) Digital transformation where a new innovation curve is developing and it’s not just about making your IT better. It’s about making everything software as a service and automating your entire company workflows. | Tech Trends |
ZDNet - Tech salaries just hit record highs. But nearly half of IT staff still feel underpaid | The latest Dice Tech Salary Report found that 61% of technologists received a salary increase last year, up from 52% in 2020. Web developers saw the biggest increase in pay, shooting up by more than a fifth (21.3%) to $98,912, while the highest salaries were demanded by IT management, whose pay rose 6% to $151,983 between 2020 and 2021. | Tech Jobs |
VentureBeat - How emerging tech will influence freedom, industry, and money in the metaverse | It is not just gaming and entertainment that stands to transform and expand with the onset of the metaverse. Synchrony, a fully functioning economy, and the interoperability of digital assets, information, and consumers means industries like supply chain management, property sales, and even office workflows stand to benefit from developments related to the metaverse | Metaverse |
AiThority - 92% of Product Decision Makers Say Data & Analytics Critical to Success of Business | And for a direct tie to the bottom line, 96% note that an increase in average selling prices would be possible with personalized and customized analytics, with 46% noting they could charge 10-19% more for their products and services because of the analytics they provide | Data & Analytics |
VentureBeat - Podcast advertising could be a blueprint for cookieless advertising | In order for the data-restricted audio industry to appease both advertisers and audiences, it is crucial, as a publisher, to have a firm comprehension of the industry’s key differentiators, and furthermore, to know how to circumnavigate them as it pertains to advertising. | Marketing Tech |
eWeek - What Does 2022 Hold for Intelligent Automation? | The lines between digital process automation (DPA), iPaaS, no code, robotic process automation, and other forms of automation are blurring too. So we will most likely see a future trend toward IA platforms that provide the means to create, manage, and control operations that leverage multi-modal automation across both humans and digital robots. | Automation & Productivity |
ZDNet - Cybersecurity: 11 steps to take as threat levels increase | Triggers for heightened risk include a spike in adversary capability from new zero-day flaws in popular software, or something "more specific to a particular organisation, sector or even country, resulting from hacktivism or geopolitical tensions," says the NCSC. | Security |
SDxCentral - Will Google Debut 800G Data Center Switches in 2022? | “While the 200 and 400 Gb/s adoption at Google and Amazon mostly benefited the white box switch vendors, the accelerated 200 and 400 Gb/s deployment at Microsoft and Meta will benefit certain branded vendors such as Arista and Cisco,” | Cloud |
Forbes - Cybersecurity in 2022 – A Fresh Look at Some Very Alarming Stats | “among the findings of a new study of pentesting projects from Positive Technologies, conducted among financial organizations, fuel and energy organizations, government bodies, industrial businesses, IT companies and other sectors. In 93 percent of cases, an external attacker can breach an organization's network perimeter and gain access to local network resources.” | Security |
ZDNet - The never-ending effort to bake common business sense into artificial intelligence | Scarano poo-poos the notion that AI systems comprise anything close to a "digital workforce," noting that "it's just a way to sell more stuff. I can sell 50 digital workers rather than one system. But digital workforce is just a bunch of code that does a specific task, and that task can be repeatable, or be customized." | Artificial Intellgence |
eWeek - An Overlooked Cybersecurity Threat: 5G | Establishing the types of data being handled and where that data resides, whether within on-premise devices, cloud providers, or remote employee laptops provides a key baseline to data risk awareness. | Security |
VentureBeat - 3 ‘dark’ trends likely to power smart technology and communities by 2030 | In 2030, p2p-based distributed apps could transform public transportation, access to fresh food, healthcare, energy, elder-care, journalism, policing, and beyond. Wise leaders will recognize the value of smart communities and build into the trend | Smart Tech |
Digital Journal - Email Marketing Platforms Market May See a Big Move | Major Giants MailChimp, VerticalResponse, Emma, Constant Contact | The market report primarily will help you to realize and find out the most forbidding and upsetting driving powers of Email Marketing Platforms in marketplace with anticipating the consequences on the worldwide industry | Marketing Tech |
Dark Reading - IT Leaders Consider Security Tech a Part of Business Transformation | While the respondents list the usual suspects – big data/analytics, AI/machine learning, and cloud infrastructure – in the top 3, 19% say identity and access management has the most potential to significantly impact business operations. | IT Management |
VentureBeat - The Log4Shell vulnerability: A postmortem | Log4j2 is ubiquitous among applications and the libraries on which they depend, meaning that many applications were utilizing Log4j2 without realizing it. Even applications not written in Java often are hosted in web containers, meaning that a project can have no apparent dependency on Log4j2 and still be exposed. | Security |
Computerworld - Talent war to push CIOs toward consultancies, managed services in '22 | “In order to maximize productivity of their existing IT staff, CIOs will be outsourcing more to free up time, training existing staff in the desired skills and hiring consultants to fulfill critical skilled roles. This will last at least through 2022.” | IT Management |
Virtualization & Cloud Review - Networking/Security Convergence with SASE Marked in New Report | "Global organizations recognize [SASE] is the future, but not all are sure how to get there. Implementation timelines, the decision maker's role and the approach to SASE vary by company size and region, but all organizations share the top two concerns: complexity of management and high implementation costs," | Network Security |
TMCNET - Digital Twin Market Size is Projected To Reach USD 5545.2 Million By 2028 At A Cagr of 15.9%- Valuates Reports | The digital twin market is likely to grow as the focus on Industry 4.0 grows. Digital Twin enables a more virtual system-based design process, allowing any equipment or system to play a much more active part. | Digitial Twin |
GeekWire - FastForward 2022 – Five mega-trends that will shape the payments industry in the coming year | These as-a-service models are not only high-performing – growing 5 – 8x faster than their traditional counterparts according to Zuora’s Subscription Economy Index – but also lays the foundation for companies to pivot to ecosystem as these different as-a-service models are connected together onto a single platform | FinTech |
Forbes - Six Steps To Execute Responsible AI In The Enterprise | The EU AI Act is expected to be implemented by 2023, and it will change how businesses develop and utilize AI. Any business that offers an AI application to EU citizens or organizations will need to ensure its applications are aligned with EU Charter of Rights and other various laws, including ones in relation to discrimination and privacy. These applications will have to abide by the framework of "trustworthy AI" set forth by the act. | Artificial Intelligence |
AiThority - Anti-Fraud Analytics Booms as Cyber War Rages | “Predictive modeling is up 25%. Text mining has nearly doubled, jumping from 33% to 65% in three years. These findings prove that, even as COVID has fueled rampant fraud, insurers are agilely stretching their advanced analytics and AI capabilities to counter rapidly changing threats.” | Data & Analytics |
cointelegraph - Scaling and the Metaverse: The beginning of Web3 | The support behind the decentralized value advocated by Web3 is a decentralized technology stack, the development of which is accompanied by scalability and security issues that are becoming crucial to solve. | Web3 |
Digital Information World - High Expectations from Marketing Technologies as we hit 2022 | We went around to figure out what is the most significant thing for any company with respect to marketing. Most of the answers were about privacy, which was followed by AI, Metaverse, web3, and ESG. | Marketing Tech |
Digital Journal - Cyber Insurance Market to Witness Impressive Growth by 2026 | Lloyds, AON, XL Group | This growth is primarily driven by Increasing Stringency of Government Regulations and Growing Cyber Threats, Demand for Integrated Cyber Solutions and Rising Severity of Cyber-Crimes, The Popularity of Cloud Security, Rapid Adoption of Cloud Computing, Data Center, and Wireless Communication. | Security |
Cyber Defense Magazine - OT/IT Security – Two Sides of the Same Coin | The industry is already embracing a more integrated approach to IT/OT security, with Gartner projecting “by 2025, 75 percent of OT security solutions will be delivered via multifunction platforms interoperable with IT security solutions.” Gartner further notes that “brownfield operational technology/information technology convergence acceleration and a growing number of greenfield cyber-physical systems push OT security needs to evolve, and more IT security leaders to become involved, as threats and vulnerabilities increase.” | Security |
Martechvibe - Top Data Privacy Experts | In the cookieless world, with the General Data Privacy Regulation (GDPR) and the California Consumer Privacy Act (CCPA) holding strong, keeping up with new data privacy trends and measures will become inevitable for businesses, across industry. | Privacy |
Datanami - Sisense Releases New Study: ‘The Business Intelligence Landscape’ | And for a direct tie to the bottom line, 96% note that an increase in average selling prices would be possible with personalized and customized analytics, with 46% noting they could charge 10-19% more for their products and services because of the analytics they provide. | Data & Analytics |
VentureBeat - Zero-trust trends for 2022 | Insurance, financial services, and manufacturing CISOs told VentureBeat that creating a business case for zero trust made them realize how limited their visibility and control over endpoints are. CISOs and their teams find endpoints overcrowded with software agents, leaving them more vulnerable than before. | Security |
Computerworld - Video vs. VR: What’s missing for successful collaboration? | Being able to tell whether you are losing your audience, preloading the system so it can respond to questions, and providing a report at the end of a meeting to show engagement (and assure attendees leave satisfied) should be a higher priority than it is. Thankfully, options to do all of these are coming. | Automation & Productivity |
Harvard Business Review - Research: Why Employees Violate Cybersecurity Policies | We found that across our sample, adherence to security conventions was intermittent. During the 10 workdays we studied, 67% of the participants reported failing to fully adhere to cybersecurity policies at least once, with an average failure-to-comply rate of once out of every 20 job tasks | Privacy & Security |
Virtualization & Cloud Review - Zero Trust Study Shows Gaps Remain | Along with implementation gaps, enterprises report several challenges in building a Zero Trust strategy, starting with a lack of qualified vendors with a complete solution. | Security |
Enterprise Talk - Cloud Trends to Look Out For In 2022 | Analysts estimate only 15% of IT spend is in the cloud, but 90% of businesses have implemented cloud systems. The mismatch highlights how much room there is for growth, especially around core app modernization. | Cloud |
Forbes - Five Fraud And Security Predictions For 2022 | Credential stuffing, whereby attackers use automation to try different usernames and passwords at scale in order to break into accounts, saw massive increases in 2021. Expect that to continue. The Arkose Labs network detected a 98% increase in credential stuffing attacks over the past 12 months | Privacy & Security |
The Fast Mode - Cato Networks' Survey Finds Gaps in Different SASE Approaches | Despite SASE being touted as the solution for security and network performance, respondent scores differed little between those who have and have not deployed SASE. For example, when asked how they react to performance issues with cloud applications, 67% of SASE users and 61% of non-SASE users claimed they would add bandwidth while 19% of SASE users and 21% of non-SASE users would purchase WAN optimization appliances. | IT Management |
Data Center Dynamics - Concerns over cloud concentration risk grow | Our research shows that cloud providers have high levels of reliability, but they are not immune to failure. Complex backup regimes and availability zones, supported by load and traffic management, improve the resiliency and responsiveness of cloud providers, but they also come with their own problems. | Cloud |
Inside Bitcoins - Chainalysis exposes simple malware stealing millions in crypto | The Chainalysis report looked into different malware, including information stealers, clippers, cryptojackers and trojans. These types of malware are cheap to acquire, and they can even be deployed by “low-skilled cybercriminals. | Security |
yahoo!Finance - Time & Attendance Software Market to Reach $5.31 Bn, Globally, by 2030 at 9.4% CAGR: Allied Market Research | On the basis of component, the software segment held the major share in 2020, garnering nearly two-thirds of the global time & attendance software market. This is attributed to the factors such as need for automated system for optimizing and tracking the number of work hours of an employee, rising shift toward cloud based time and attendance software among the SMEs, and growing emphasis on workforce optimization as well as mobile applications | Automation & Productivity |
Making Central Bank Digital Currencies bulletproof with business process intelligence | Business process intelligence provides end-to-end capabilities for strategic process transformation and the reinvention of customer experiences. Essentially, when it comes to CBDCs, the implementation of BPI would allow the analysis of each of the process gaps (scalability, security, regulatory requirements) based on real-time data. | Data & Analytics |
Onapsis - The Elephant Beetle in the Room: Older, Unpatched SAP Vulnerabilities Are Still A Threat | The Onapsis Research Labs’ very own threat research found evidence of hundreds of hands-on-keyboard sessions targeting vulnerable SAP systems, including examples of threat actors living off the land, chaining multiple vulnerabilities together, and even applying patches, post-exploitation, to cover their tracks. | Security |
TechBullion - Security predictions – Will this be the year trust dies? | Between remote working and the Internet of Things, edge computing is an area in rapid development. That means edge security will need an accordingly high degree of attention in 2022 – especially given the inherent risks. IoT devices are notoriously vulnerable (thanks to providers that may not have much experience with cybersecurity, and to supply chain issues), as is the home office environment. | Security |
TMCNET - Cisco's Kenna Security Research Shows the Relative Likelihood of An Organization Being Exploited | The research conducted by Kenna Security, now part of Cisco and a market-leader in risk-based vulnerability management, and the Cyentia Institute, shows that properly prioritizing vulnerabilities to fix is more effective than increasing an organizations' capacity to patch them, but having both can achieve a 29 times reduction in an organizations' measured exploitability. | Security |
TechRepublic - Deloitte: What to expect with cloud computing, the supply chain and sustainability for 2022 | Deloitte found in the report that many industries are shifting to a service-based IT process via the cloud with some utilizing a hybrid-, multicloud focus to optimize important aspects of a business, like costs and optimizing organizational structure and compliance | Tech Trends |
RTInsights - Flexibility and Scale Foremost in Cloud SIEM | The survey found a sharp increase in those using managed services—25% of respondents as opposed to just 6% from the 2020 survey. Cloud SIEM creates a highly accessible and flexible set of services to meet clients where they are while ensuring that security operations remain at peak proficiency. | Cloud Security |
Slator - For Dataset Creation, Humans Should Evaluate Machine Text — New Research | The researchers believe their new system “brings together the generative strength of language models and the evaluative strength of humans” — perhaps in a way reminiscent of recent trends observed in MT, in which an MT model tackles the source text in a first round of translation and human linguists then refine the output via post-editing. | NLP |
Forbes - Cybersecurity Trends To Watch Out For In 2022 | As software has not adequately stopped hackers, perhaps the leading trend to watch in 2022 is a shift away from legacy applications and toward a more holistic and comprehensive security network that prioritizes hardware as the cornerstone of anticybercrime action. | Security |
Intelligent CISO - Editor’s Question: How much of a concern is protecting critical infrastructure and how should organisations go about doing this pragmatically? | “The vulnerability of critical infrastructure is well known. Its operational networks have traditionally been unreachable – or air-gapped – from IT users and the outside Internet, meaning security is not top of mind within their design. However, the proliferation of Digital Transformation and automated processes mean they can now easily be accessed by remote users and applications directly through Wi-Fi, cellular or local area networks." | Security |
SDxCentral - Op-Ed: Mid-Band 5G Meets American Incompetence | Even more frustrating is the lack of seriousness given to this matter in the years leading up to, throughout, and the year following the FCC’s auction of C-band spectrum. The FAA didn’t even start cataloging and requesting tests of the altimeters used by aircraft around the country until the C-band was supposed to be ready and clear for Verizon and AT&T to activate 5G service. | 5G |
VentureBeat - 5 ways AI and ML will improve cybersecurity in 2022 | Using AI and ML to lure attackers into simulated environments to analyze their attack strategies, components, and code needs to start at the transaction level. Transaction fraud detection is one of five core areas where AI and ML can improve cybersecurity this yea | Security |
AiThority - Cynerio Research Finds Critical Medical Device Risks Continue to Threaten Hospital Security and Patient Safety | Data shows that 53% of connected medical devices and other IoT devices in hospitals have a known critical vulnerability. Additionally, a third of bedside healthcare IoT devices – which patients most depend on for optimal health outcomes – have an identified critical risk. | Security |
Diginomica - Manage permissions to keep applications safe and secure in the cloud | Yet, when set up properly, no application environment can be made safer than that of a public cloud provider. Often, when there is a security breach such as these, the problem was improper use of credentials — an employee had more access than they needed to do their job, an overzealous engineer took advantage of their access to scrape customer data, a file was accidentally exposed publicly. | Cloud Security |
VentureBeat - Tips and guidelines for making software applications GDPR compliant | Developing GDPR-compliant software app can be a challenging task, particularly when it comes to implementing necessary data protection measures at every stage of SDLC that involves processing users’ personal data | Data Privacy |
KPMG - Predictions for 2022 — a world of change, creative criminality and cyber security community | The Digital Operational Resilience Act and Network Information Systems Directive version two will hit the streets in Europe as regulators focus on the resilience of a very different world of digital infrastructure — and the systemic risks that come with that dependency. We will also see digital infrastructure fail in surprising ways, exposing links and connections between systems we didn’t know existed. | Security |
TMCNET - To Err Is Human, and That's What Hackers Are Counting On | In just the past year, 36% of companies suffered a serious cloud security leak or breach due to cloud misconfiguration, according to The State of Cloud Security 2021 Report. Gartner expects that through 2023, at least 99% of cloud security failures will be the customer's fault, mainly in the form of cloud resource misconfiguration | Security |
ZDNet - Automation could make 12 million jobs redundant. Here's who's most at risk | The tech analyst's latest Future of Jobs Forecast estimates that as many as 12 million jobs could be lost to automation across Europe by 2040, primarily impacting workers in industries such as retail, food services, and leisure and hospitality. | Automation & Productivity |
Digital Journal - Employee Surveillance and Monitoring Software Market is Booming Worldwide | Teramind, Microsoft, Hubstaff | Further, its time tracking feature allows employers to gain insight into time spent on each project, client, or task and allocate tasks based on priority. The high growth of mobile applications for employee monitoring due to the increased adoption of mobile devices will create significant opportunities for the market. | Automation & Productivity |
American City & County - Data protection, cloud advancement and containerization: 2022 state and local priorities | However, a new focus will be on modernization, including moving systems to the cloud, utilizing containerization and understanding how to sustain technology systems for years to come. | Cloud |
VentureBeat - Report: U.S. is top target of phishing attacks worldwide | The Jan. 19 report from Outseer also found that the U.S. was the top hosting country for phishing attacks, accounting for 73% of internet service providers hosting these types of attacks. | Privacy & Security |
TechTarget - 3 areas privacy and cybersecurity teams should collaborate | Given this common focus, leaders and practitioners of cybersecurity and privacy programs have a tremendous opportunity to work together. Let's look at three different ways: building a shared data inventory, collaborating on compliance and cross-populating steering committees. | Privacy & Security |
VentureBeat - Report: 92% of IT decision-makers think process automation is ‘vital’ | However, the survey also shows the fact that organizations continue to face challenges in their efforts to leverage process automation to its full potential. Just 12% of respondents say they’ve been implementing process automation as planned this year, citing a reliance on outmoded technology, lack of knowledge of how to get started, and confusion over industry terms such as hyperautomation and robotic process automation (RPA). | Automation & Productivity |
The European Sting - The world is drowning in data. Why don’t we trade it like on a stock exchange? | The digital revolution is flooding the world with data. By 2025, an astounding 175 zettabytes – that’s 175 trillion gigabytes – of new data is expected to be generated annually, a fivefold increase on 2018. Much of that data will end up sitting idle on servers and hard drives –unused, unanalyzed, and, perhaps worst of all, unshared. | Data & Analytics |
RS21 - 3 Trends to Improve Diversity, Equity, and Inclusion in Tech | With that in mind, here’s a look at three trends, led by nonprofits, for improving tech equity: (1) closing the tech talent gap; (2) mitigating bias; and (3) building professional networks. | Tech Trends |
Industry Wired - How AI is Transforming Businesses? Top Use Of AI in Business | AI helps businesses to decide what to write about, which keywords to use, how often to publish, etc. In other words, AI can help to create high-quality and high-ranking content | Artificial Intelligence |
Tom's Guide - What is C-Band 5G and why is it so controversial? | Even now, with the launch of C-Band-based 5G imminent, AT&T and Verizon have both agreed to dial back their launches by not activating the new service on towers near select airports. Even so, it's an issue dividing wireless carriers and airlines, even pitting government agencies against one another. | 5G |
Embedded - Trends driving the future of high-performance computing (HPC) | The amount of data that will be processed next year will increase exponentially, and so will the value and sensitivity of that data. Making sure that security is an essential component (rather than an afterthought) when designing for HPC components will be one of the top design challenges that engineers will face this year and every year moving forward. | Automation & Productivity |
CSO - How to Best Protect Multi-cloud and Hybrid Environments | This inconsistency is impossible to avoid. Security controls (WAF, DDoS, bot management, API protection, etc.) are unique to each environment. So as customers attempt to reduce risk, improve performance, or gain specific features by spreading their workloads across multiple clouds, they’ll inevitably end up with multiple security solutions, increasing the likelihood of misconfiguration and mismanagement — a leading cause of compromised data | Cloud Security |
Science Daily - Edge processing research takes discovery closer to use in artificial intelligence networks | This is an important step towards using thin-film transistors as artificial intelligence hardware and moves edge computing forward, with the prospect of reducing power needs and improving efficiency, rather than relying solely on computer chips. | Artificial Intelligence |
Analytics Insight -Which Is More Appropriate For You: Data Scientist, Data Analyst or Data Engineer? | On the backend, the data engineer is always improving analytics solutions to guarantee that the data the company relies on is accurate and readily available. They’ll use a variety of technologies to guarantee that the data is managed appropriately and that the relevant information is available to anybody who needs it. A good data engineer saves the rest of the company a lot of time and effort. | Data & Analytics |
HERE360 - Is 2022 the year urban mobility takes flight? | As we entered 2022, Chinese search provider Baidu launched XiRang, an app that gives access to a "Creator City" that contains visitor attractions and buildings that can host meetings and events. Baidu's CEO Robin Li says the metaverse will kick off a “golden era of AI over the next ten years" and the start of “man-computer symbiosis." It looks like virtual meetings could become more intriguing in 2022 and beyond. | Smart Cities |
Tech Xplore - Artificial intelligence can discriminate on the basis of race and gender, and also age | AI is often assumed to be more objective than humans. In reality, however, AI algorithms make decisions based on human-annotated data, which can be biased and exclusionary. Current research on bias in AI focuses mainly on gender and race. But what about age-related bias—can AI be ageist? | Artificial Intelligence |
AiThority - Zylo’s SaaS Management Index Reveals Organizations Only Utilize 60% of SaaS Licenses, Leaving 40% Unused | Ownership of SaaS is shifting. IT teams are directly managing less of an organization’s SaaS – just 23% of the average company’s SaaS portfolio – a 35% reduction from last year – while business units are managing more. | IT Management |
Cox Business - 9 Top Technology Trends for CIOs and IT Leaders to Consider to Future-proof Their Business | Gartner forecasts that “cloud-native platforms (CNPs) will serve as the foundation for more than 95% of new digital initiatives by 2025 — up from less than 40% in 2021.” Leaders at organizations that aren’t as far in their digital efforts as others will need to complete an assessment, prioritize cloud environments, and decide where to start. | IT Management |
Developer - Why empowering ‘knowledge workers’ is critical to business success | Give in-the-field workers mobile devices, so they can access critical information without returning to a desktop computer. Move company-wide applications to the cloud so workers can access them from anywhere. Embed existing business applications with insights from data, so professionals can make smarter decisions without turning to additional dashboards and data portals. | Automation & Productivity |
SiliconANGLE - Gartner says tech spending to grow 5% to $4.5 trillion in 2022 | Through 2025, Gartner believes most companies will increase their reliance on external consultants amid greater urgency and an accelerated pace of change that widens the gap between their digital business ambitions and their internal capabilities. | IT Management |
VentureBeat - 5 considerations for saving more and wasting less on cloud services | There are close to 100,000 EC2 instance types that can be used to host your application, and for each of those there are over 36 different commitment types that can be applied to them. That’s just in EC2 alone (not to mention other hosting options like serverless). Now imagine adding other managed services from AWS, and from other cloud providers such as GCP and Azure, with their own unique options and commitment structures. | Cloud |
Bloomberg - Five Reasons Microsoft Is Making Activision Blizzard Its Biggest Deal Ever | Nadella’s corporate strategy has been coalescing around cloud, content and creators. Microsoft wants to get as much of Activision’s past and future content onto its cloud gaming service, Xbox Game Pass, which has been bolstering the software maker’s sales with a steady stream of subscription revenue. | Gaming |
The Verge - A new use for AI: summarizing scientific research for seven-year-olds | But the deployment of these AI-language systems is controversial. Time and time again, it’s been shown that these tools encode and amplify harmful language based on their training data (which is usually just vast volumes of text scraped off the internet) | Artificial Intelligence |
Manufacturing Global - Top 10 blockchain companies | Getting a blockchain headache? Here's our top 10 blockchain businesses to support your business | Blockchain |
VentureBeat - Report: How AI and ML optimize the diagnosis process in health care | For example, ML helps oncologists not only pinpoint the location of a tumor, but can also accurately determine if it’s malignant or benign in milliseconds. Although computer-based predictions aren’t error-free, new research has indicated that its accuracy of classification hovers around 88%. | AI/ML |
TechRepublic - 5 tools helping companies more effectively manage cybersecurity in 2022 | Cybercrime is on the rise, with no signs of slowing down. Recent findings show a 358% increase in malware activity. Further, each day, the AV-TEST Institute registers over 450,000 new malicious programs and potentially unwanted applications, with new malware cropping up at an alarming rate | Security |
ZDNet - The future of money: Where blockchain and cryptocurrency will take us next | The first thing to remember: Bitcoin and blockchain are not synonymous. Blockchain -- often defined as a shared, immutable ledger that securely links blocks of encrypted data transactions in a network -- is the medium for recording and storing Bitcoin transactions. Bitcoin operates on its own blockchain network. | Blockchain |
AiThority - Oosto Open Letter To The White House “Facial Biometrics Regulations Will Enable A Safe Path For Organizations To Ethically Adopt These Emerging Technologies” | The White House OSTP is seeking input on any “past deployments, proposals, pilots or trials,” as well as any “current use of biometric technologies for…identity verification, identification of individuals, and inference of attributes including individual mental and emotional states,” according to the RFI. | Facial Recognition |
DevPro Journal - Why Businesses Are Transitioning to Multicloud Strategies | The more of these services that a user consumes from a provider, the greater the lock-in to that vendor and the more difficult portability becomes. Regardless, the concept of vendor neutrality influences many multicloud strategies. | Cloud |
Datanami - New Study Reveals 78 Percent of Companies Cite AI as a Key Revenue Driver in 2022 | Three-quarters of respondents (75%) say improving access to deep learning is important for innovation within their industry. Organizations are exploring deep learning applications with natural language processing (NLP) (81%), computer vision (61%) and recommendation algorithms (55%). | Artificial Intelligence |
Inside Big Data - How AI and ML technologies are Streamlining Language Creation and Impacting the Global Economy | There are some AI and ML driven ASR platforms available that combine speech recognition and authentication capabilities (i.e., voice biometrics) to amplify the speed and effectiveness of voice-enabled services. This type of technology can understand what your users are saying as well as identify and authenticate who is speaking. | Automation & Productivity |
Bitcoin Magazine - Opinion: What The World Learned About Bitcoin in 2021 | Tech products — software — must constantly change, update and upgrade to keep up with competition. Bitcoin is not typical software. Rather, it is something new: permaware. Permaware is a set of unchanging rules, written in code. It is designed for reliability and consistency, not features. | Emerging Tech |
Blocks & Files - Spin orbits could make better MRAM | Magneto-Resistive Random Access Memory (MRAM) has so far generally failed to replace SRAM because its Spin Transfer Torque (STT-MRAM) implementation is too slow and doesn’t last long enough. A new variant — Spin Orbit Transfer MRAM (SOT-MRAM) — promises to be faster, have a longer life and use less power. | Data Storage |
The Tech Report - Security Technology: Rising to the Cyber-Challenge | Privacy-enhancing computation is a developing body of encryption, data obfuscation, and privacy technologies. It’s aimed at securing data as it’s crunched. In addition, its design allows it to deal with particularly difficult scenarios. It tackles the times such as when there is data sharing across geographic boundaries, brand lines, or corporate divisions. | Privacy & Security |
Information Age - Is AI superintelligence a threat to humanity? | “My concern, and what's the worst that could happen, is that long-term challenge about an artificial intelligence that does outstrip us; presumably at that point, overcoming the sorts of biases, but potentially creating much more catastrophic risks for the species,” he says. | Artificial Intelligence |
T_HQ - Deny-by-default stops cyber threats from the get-go | Whitelisting is when only those in the approved list are allowed access to the system, and is the ultimate version of zero trust. Any and everything not on the whitelist is automatically blocked. ThreatLocker is like a bouncer; it won’t allow entry if not on the whitelist regardless of the entity’s friend or foe status. | Security |
ComputerWorld - UK government ignites debate over privacy vs. safety | The report also explains that the UK government doesn’t seem to want to address the privacy-versus-security debate. Instead, it simply seeks to inflame reaction with an emotive campaign that raises public support for such a move while utterly ignoring the multitude of arguments against it. | Privacy & Security |
Threatpost - Organizations Face a ‘Losing Battle’ Against Vulnerabilities | Cross-site scripting (XSS), an exploit where the attacker injects code into a legitimate website that will execute when the victim loads the website, was the most commonly identified vulnerability type last year, according to the report. | Security |
VentureBeat - 4 emerging trends point to changes in the observability landscape in 2022 | According to a recent report from New Relic, 90% of IT leaders and engineers claim that observability is critical to the success of their business, with 94% stating that it’s critical to their role | Data & Analytics |
SiliconANGLE - Cybersecurity, blockchain and NFTs meet the metaverse | "Really one of the biggest things that organizations face is being able to have engineers that are qualified and technical enough to be able to support the complexity of the architecture. Deploying tools effectively is a good thing. But if it’s not tuned properly or if it’s not connected properly, that security tool can just add more attack vectors." | Emerging Tech |
SDxCentral - Nutanix Report: 64% of Orgs Will Adopt Multi-Cloud Within 3 Years | Despite more organizations moving toward multi-cloud, challenges remain in navigating the environment. Managing security, data integration, and cost across cloud borders were among the top multi-cloud challenges cited by respondents. | Cloud |
VentureBeat - New startup shows how emotion-detecting AI is intrinsically problematic | It’s not just startups that are investing in emotion AI. In 2016, Apple acquired Emotient, a San Diego firm working on AI algorithms that analyze facial expressions. Amazon’s Alexa apologizes and asks for clarification when it detects frustration in a user’s voice. | Artificial Intelligence |
Network World - Zero Trust is hard but worth it | I asked my contact how many applications an average worker could access, and the company wasn’t able to get the answer. How, then, could the company know if the worker, or someone working through the worker’s laptop, was stealing data or contaminating operations? | Security |
AiThority - Gaming Predictions Series 2022: Welcome Metaverse. NFTs Will Get Hyped in Gaming | The metaverse has not unseated Al and blockchain – rather, it’s an emerging technology that CEOs will need to pay attention to. Whereas five years ago CEOs did not necessarily know how they were going to integrate AI or blockchain into their businesses, there are now much more specific real-world examples of how they can do so. Now is the time for CEOs to be thinking about the metaverse in that same way – what applications will it have for their business in the future? | Emerging Tech |
Blocks & Files - Hyve: busy hyperscaler bees buy hardware, not software | “The way edge computing changes storage requirements is that hotswap of SSDs has come back. Hotswap — or at least easy field servicing — has come back as a definite requirement.” Shenoy thinks that “Edge computing driving different form factors of servers is a given.” | Data Storage |
ZDNet - The tech jobs boom is beginning to cool. And employers are changing their hiring tactics | This might suggest that the boom in demand for tech workers prompted by the pandemic is beginning to wane, with KPMG and REC finding that businesses are focusing their efforts on "hiring smarter, not faster". | Tech Jobs |
VentureBeat - Device42 aims to identify Log4j vulnerabilities | The Log4j vulnerability has been assessed as a critical threat, or a 10, on the Common Vulnerability Scoring System (CVSS) by the National Vulnerability Database (NVD). CVSS is an open framework for communicating the characteristics and severity of software vulnerabilities. | Security |
SiliconANGLE - What to do in ’22: six cloud trends for the year ahead | Cloud services are not commodities; your multicloud architecture must capture the unique strengths of each provider. You don’t want to end up with least-common-denominator functionality across clouds. And you can’t expect any one tool to provide seamless governance, monitoring, asset tracking and security across clouds. | Cloud |
VentureBeat - Data users demand simple actionable insights quickly | These are exciting times for us data professionals. Unfortunately, I fear we are getting caught up in the tools hype. We are continuing to push more and more numbers, charts, and tables to our users. That is precisely the problem. We are not offering directions on what to do. Per Dell’s study, “Data overload has become a significant barrier to transformation”. | Data & Analytics |
ZDNet - DHL, Microsoft, WhatsApp top phishing list of most imitated brands | The rest of the list includes LinkedIn, Amazon, FedEx, Roblox, PayPal and Apple. Omer Dembinsky, data research group manager at Check Point Software, said it is important to remember that cybercriminals are opportunists and will often take advantage of consumer trends by imitating popular brands. | Privacy & Security |
eWeek - BI Tools 2022: Best Business Intelligence Software | Today’s systems span clouds and tap on-premises data sources, and work alongside data mining tools. They also rely on APIs to extend analytics capabilities across business partners and supply chains. Some platforms are also designed to pull data from edge computing deployments, and many platforms also include open-source tools and components that make them more flexible and adaptable. | Data & Analytics |
ComputerWorld - 20 years after Gates’ call for trustworthy computing, we’re still not there | But for businesses, this month’s updates deliver a confusing and murky story. Microsoft has not exactly been a good trustworthy computing partner this month. Rather taking the past two decades to develop bullet-proof, resilient systems, we get servers going into boot loops and admins having to boot into DOS mode and run commands to uninstall updates. | Security |
Security Intelligence - Everything You Need To Know About Ransomware Attacks and Gangs In 2022 | These ransomware kits are sold on the dark web as a service, much like the Software-as-a-Service (SaaS) model. Ransomware-as-a-Service kits provide criminals the opportunity to launch ransomware attacks with minimal technical knowledge. No malware creation skills? No problem. | Security |
ComputerWorld - In IT, Boomers are out, raises are rising — and change is coming | Another trend Gartner has tracked involves CIOs and other high-level IT leaders moving out of data center-specific roles and into larger business-centric job titles as the result of digital transformation (DX) initiatives. | Tech Jobs |
Forbes - The High-Stakes Game Of Public Sector Cybersecurity | Modernizing IT platforms is a major priority for governments—cited as one of the main steps being taken to improve citizen and employee experiences (53%) and to make operations more resilient (48%), according to research from ThoughtLab, commissioned by ServiceNow. | Security |
TMCNET - Global Data Governance Market Report 2022: Market to Reach $6 Billion by 2026 - Data Governance to Play a Pivotal Role Buoyed by Machine Learning and AI | The deluge of data from various sources and the valuable insights than can be gleaned from such data is pushing businesses to opt for advanced IT systems, which is driving the demand for data governance solutions. In addition, risk management and regulatory compliance are also driving the growth of data governance solutions. | Data Governance |
yahoo!Finance - Global Artificial Intelligence (AI) in Call Centers Market to Reach US$3.5 Billion by the Year 2026 | Developed markets of North America and Europe are the leading regional markets. The dominant share of the US is mainly attributed to the widespread adoption of AI technology in several end-use industries including media, e-commerce and manufacturing. | Artificial Intelligence |
VentureBeat - Responsible AI will give you a competitive advantage | Without responsible AI practices in place, a company is exposed to serious financial, reputational, and legal risks. On the positive side, responsible AI practices are becoming prerequisites to even bidding on certain contracts, especially when governments are involved; a well-executed strategy will greatly help in winning those bids. | Artificial Intelligence |
eWeek - What Is Data Visualization? Benefits, Types & Best Practices | Datasets are growing fast. Forget data analytics – business leaders are struggling just to visualize and map out data to begin with. Data visualization works to fix this. | Data & Analytics |
World Economic Forum - Can China and Europe find common ground on AI ethics? | A shared realisation about their societal implications has raised awareness about the necessity to develop an international framework for the governance of AI, more than 160 documents aim to contribute by proposing ethical principles and guidelines. | Artificial Intelligence |
VentureBeat - What to expect for data prep and data analytics in 2022 | In fact, researchers estimate that the Data Preparation Tools Market size will grow at a CAGR of over 20% to reach a total value of $13.15 billion by 2028, with organizations having a range of accessible data analytics providers to choose from, such as Alteryx, IBM Watson Studio, TIMi Suite, and Incorta. | Data & Analytics |
TMCNET - Artificial Intelligence Platforms Market to grow by USD 17.29 bn | Evolving Opportunities with Alphabet Inc., Amazon.com Inc. & Microsoft Corp. | 17000+ Technavio Reports | The key factor driving growth in the artificial intelligence platforms market is the rise in demand for AI-based solutions. With the increasing application of robotics in repetitive and risky tasks, end-users are increasingly seeking avenues to eliminate the drawbacks of industrial automation and robotic technologies. | Artificial Intelligence |
AiThority - Adopting a Search-First Mindset for Digital Marketing Success | But according to Hubspot research, 75% of people who carry out Google searches never reach the second results page. Ensuring your website is optimized to rank at the top of search engine results is an essential step for growth and, as such, should be a prioritized endeavor for all manner of businesses. | Marketing Tech |
VentureBeat - A deep dive into the visual collaboration market | The market includes a mixture of cloud and web-based collaboration tools, from online collaboration whiteboard tools like Miro, Mural, and Stormboard to visual management systems like iObeya. | Automation & Productivity |
The Verge - Why you might want a secure file-sharing service now that you’re working from home | Instead, you should consider an enterprise-grade cloud-based file-sharing service, one that adds more layers of protection by encrypting your data, and that has fine-tuned access control. Egnyte, SecureDocs, ShareFile, and SugarSync are just a few of the more popular services | Automation & Productivity |
eWeek - 5 Steps to Leveraging Machine Learning: The Shopify Use Case | The company has been at the forefront of ML adoption for anomaly detection and forecasting. That’s particularly impressive when considering that up to 85% of machine learning projects ultimately fail to deliver on initial promises and goals. | Machine Learning |
VentureBeat - The metaverse will be buzzing in 2022 | Grossman noted that AI, VR, AR, 5G, and blockchain may converge to power the metaverse — adding that the sum will be far greater than the parts in that convergence. | Emerging Tech |
Datanami - IEEE Computer Society Unveils Its 2022 Technology Predictions | The top three tech trends that are anticipated to dominate in 2022 are datacentric AI, remote medicine, and health, safety, and wearable biomedical technologies. | Tech Trends |
SiliconANGLE - Watch live: Companies to shed new light on latest cloud-native trends during AWS Startup Showcase Jan. 26 | The latest trends in the cloud native, open-source enterprise computing space will be a central focus for Season 2 Episode 1 of the upcoming AWS Startup Showcase: Open Cloud Innovations, scheduled to air on Jan. 26 | Cloud |
CompTIA - All the Cybersecurity Statistics, Figures and Facts You Need to Know in 2022 | Check out the following cybersecurity facts and statistics to understand the threat landscape for businesses. | Security |
Datanami - New IDC Spending Guide Forecasts Double-Digit Growth for Investments in Edge Computing | IDC has identified more than 150 use cases for edge computing across various industries and domains. The two edge use cases that will see the largest investments in 2022 – content delivery networks and virtual network functions – are both foundational to service providers’ edge services offerings. | Edge Computing |
CompTIA - Top 7 challenges IT leaders will face in 2022 | “Very technically skilled workers who have experience with cloud environments, machine learning, data science, and software have always been in demand at tech companies, but now those skills are in demand at nearly every company, creating greater competition to land top-notch developers, software engineers, and data analysts,” | IT Management |
Microsoft - 4 Approaches To Comprehensive Security That Help Leaders Be Fearless | According to the report, only 31 percent of organizations that reported being ahead with their Zero Trust implementation were impacted by NOBELIUM, the perpetrators of the SolarWinds attack.2 Compare that to the 75 percent negatively affected by this devastating cyberattack that reported lagging behind in their Zero Trust implementation. | Security |
Digital Insurance - How AI, data analytics could help identify insurance fraud | AI does this by providing a fully transparent view of the customer, their claim and their network. This view then lets decision-makers automate, build and understand the timeline of events leading to a claim | Artificial Intelligence |
TMCNet - Artificial Intelligence Platforms Market to grow by USD 17.29 bn | Evolving Opportunities with Alphabet Inc., Amazon.com Inc. & Microsoft Corp. | 17000+ Technavio Reports | 68% of the growth will originate from North America for the artificial intelligence platforms market. The US is the key market for artificial intelligence platforms market in North America. The US and Canada together hold approximately 26% of all global AI-related patent applications, while IBM has the largest share of AI-related patents, followed by Microsoft and Google | Artificial Intelligence |
The Fast Mode - Telcos Are Stepping Outside of Their Comfort Zone | Already this year, observers noticed that telcos redefined themselves, pivoting from telecom companies to tech companies. Telcos are no longer just connectivity providers and have become more tech-co focused. Having put a large amount of their investment and budgets in maintaining and developing IT systems, they want to be major IT players and software developers. | Telecom |
CSO - Top cybersecurity M&A deals for 2022 | Last year saw some companies that are not primarily in the cybersecurity market buy security firms to better protect their data and customers. | Security |
Netwrix - Cybersecurity: What To Expect In 2022 | Moreover, attacks are getting more expensive, with the average ransomware payment leaping from US$312,000 in 2020 to $570,000 in 2021. By 2031, there will be a new assault every 2 seconds and ransomware costs will reach $265 billion per year. | Security |
VentureBeat - Report: Majority of malware downloads in 2021 were traced to cloud apps | The top source of credential attacks in 2020 were a few heavy hitters responsible for numerous login attempts. In 2021, however, credential attacks came from a much larger number of sources, each responsible for fewer login attempts. | Security |
AiThority - 3 Data Trends Expected to Impact Marketers in 2022 | This method can also use data to determine which keywords, ads, ad groups, and campaigns have the most impact on reaching your business goals. Data-driven attribution may help close the gaps made by third-party cookie losses and bring data to the forefront. | Data & Analytics |
Network World - IoT in 2022: IoT turns into a service | “What’s really raised its head in 2021 and I think is going to be the dominant trend is much more closed business applications,” he said. “We saw a bunch of companies roll out strategies that prohibit selling the IoT platform on its own. They now sell the application, plus IoT.” | IoT/Mobility |
SDxCentral - VMware, Nutanix Continue to Battle for HCI Market Dominance | Additionally, Huawei, Cisco, and Hewlett Packard Enterprise (HPE) made the top 5 HCI software vendor list. However, Cisco and HPE’s HCI revenue declined during the quarter. Cisco accounted for 4.4% of the HCI market, and its revenue dropped 14% year over year to $104 million. Meanwhile HPE’s revenue decreased 7.7% to $82 million in the third quarter of last year. | Data Storage |
ZDNet - The shocking reason people are quitting tech companies (No, it's not money) | You might be desperate for a more exact definition of toxicity. Well, these researchers indicated "failure to promote diversity, equity, and inclusion; workers feeling disrespected; and unethical behavior." | Tech Jobs |
VentureBeat - How Moveworks used Conversational AI to support hybrid work | A recent survey conducted by Replicant found that nearly 80% of consumers are willing to speak with conversational AI. Gartner predicts that enterprise-level chatbot implementation will see over a 100% increase in the next two to five years | Artificial Intelligence |
SDxCentral - CNCF Report: Serverless Loses Steam, Goes Off Edge | The number of developers working on serverless architectures is slipping, according to a survey of more than 19,000 software developers conducted by SlashData and released by the CNCF. The report found the number of serverless developers — reportedly four million strong — declined from 27% of all developers in 2020 to 24% in 2021. | Tech Trends |
Datanami - New Report Finds Self-Service Analytics Are Critical to Empowering Frontline Workers | A previous report by HBR found that 86% of business executives said frontline workers at their organization need better technology to make data-driven decisions, and named self-service analytics as a top technology they would adopt by 2022 to make this happen. | Data & Analytics |
ZDNet - The race towards renewable energy is creating new cybersecurity risks | There are two key security issues in SCADA systems – the first is that many of these networks are old, sometimes to the extent they can't receive security updates, which means that if they're linked to internet-facing areas of the network, they can potentially be infiltrated by cyber criminals. | Security |
Techstartups - Venture capitalists pumped over $675 billion into tech startups worldwide in 2021, doubling the previous record set in 2020 | In San Francisco alone, some 133 startups saw their valuations climb to over $1 billion, followed by 69 in New York, 21 in Greater Boston, 20 in London, 16 in Bengaluru, and 15 in Berlin | Tech Startups |
AiThority - The Rise of PPC Automation: Everything You Need to Know | In short, PPC automation is how we define the use of technology and machine learning to optimize your search engine marketing (SEM). Online search engines are being used more than ever before, and with 87% f smartphone wners using a search engine at least once a day, optimizing your SEM has never been more important. | Automation & Productivity |
TechTarget - Enterprise data storage 2021 Products of the Year finalists | Several trends stand out among the five categories of finalists this year, including protection against cyber attacks in backup products, a focus on the cloud and its integration across the board, and support for newer technologies such as containers. | Data Storage |
Digital Information World - These Trends Are Revolutionizing The Technology World | Technology is vast and varied, and there are specific kinds of tech that might be a great deal more life changing than others. We are going to discuss ten of the most prominent tech trends out there right now that are liable to change the world as we know it through their innovation. | Tech Trends |
Telus International - Forbes: Out Of The Shadows: Managing Shadow IT And Rogue RPA | These instances of unauthorized software deployed by teams outside the central IT department are known as shadow IT. This is a common issue that most companies encounter, and cases of it have grown exponentially in recent years with the adoption of cloud-based applications and services. In fact, research from McAfee previously showed that 80% of workers admit to having used SaaS applications without getting proper authorization. | IT Management |
yahoo!finance - Europe’s Spending on IT, Business Services Hits Record in 2021, Amid Signs of Slowing Demand in Q4, ISG Index™ Finds | Managed services climbed 11 percent, to US $13.9 billion—its highest level in a decade—including a record US $11.4 billion for IT outsourcing (ITO), up 5 percent, and US $2.6 billion for business process outsourcing (BPO), up 45 percent. XaaS soared 41 percent, to a record US $12.6 billion, on 44 percent growth in infrastructure-as-a-service (IaaS), to a record US $9.2 billion, and 33 percent growth in software-as-a-service (SaaS), to a record US $3.4 billion. | IT Management |
SecurityWeek - With the 'Great Resignation' Comes the 'Great Exfiltration' | It’s a double whammy for business – not only are they losing staff, but the leavers are taking corporate data with them. In the final 30 days of employment, leavers have been downloading far more data than usual. During this period, 29% of leavers downloaded more data, and 15% uploaded more data to personal cloud apps. | Security |
IndustryWired - Dell Technologies: Cloud Security, AI, Risk management will be key trends for Data Protection in 2022 | The recent Dell Technologies 2021 Global Data Protection Index highlights that 70% of respondents in India believe emerging technologies—such as cloud-native applications, Kubernetes containers, AI, and machine learning pose a risk to data protection, and the lack of data protection solutions for newer technologies is one of the top three data protection challenges for organizations. | Data Management |
American City & County - Report: Cyber threats are on the rise while public defense measures lag | At 56 percent, the report says, “the general hacking community” is behind most of the security threats faced by public sector servers, closely followed by “careless/untrained insiders” (52 percent) and “foreign governments” at 47 percent. This is the first time in five years careless insiders weren’t the top security threat. | Security |
AiThority - GSV Announces GSV EdTech 150, Top Companies In Digital Learning | North America — specifically the United States — is the most represented region accounting for 56% of the GSV EdTech 150. 11% of the GSV EdTech 150 hail from India, whose market is experiencing explosive growth with five EdTech unicorns that include BYJU’s, Eruditus, Unacademy, Upgrad, and Vedantu. | EDTech |
SC Media - Why file-borne malware has become the weapon of choice for attackers | Today, sophisticated cybercriminals research their targets and develop specialized malicious code that’s likely to do the most damage or bring in the most money. In fact, SonicWall reported more than 260,000 “never-before-seen” malware variants in 2020. Known as zero-day attacks, this type of hidden malware increased by 74% from 2019, possibly because zero-days are most likely to escape detection by traditional antivirus solutions. | Security |
VentureBeat - How managed services will evolve in 2022: The data analytics revolution | In 2022, cloud-managed service providers are not only looking to support decision-makers in configuring and maintaining cloud environments, but also providing expertise on how to manage the data they store in the cloud, as more organizations demand access to insights at the cloud level. | Data & Analytics |
Security Boulevard - Attackers More Successful at Delivering Malware Payloads | Cloud-delivered malware is now more prevalent than web-delivered malware. In 2021, malware downloads originating from cloud apps increased to 66% of all malware downloads when compared to traditional websites, up from 46% at the beginning of 2020. | Security |
ZDNet - Log4j: How hackers are using the flaw to deliver this new 'modular' backdoor | The main module of the attacker's PowerShell framework validates network connections, enumerates characteristics about a compromised system, retrieves the C&C domain from a hardcoded URL, and takes, decrypts and executes subsequent modules | Security |
Business Because - Technology Sector To Drive MBA Jobs Boom In 2022 | Increasing hiring among tech companies means greater focus on digital and data-related skills—a key area for MBAs to focus on this year. “There’s an increase in demand for candidates with skills in analytics, machine learning, and artificial intelligence (AI),” Mitchell explains | Tech Jobs |
InfoWorld - All roads lead to hyperautomation in 2022 | When it comes to automation, the natural tendency for humans is to avoid it out of fear that it will replace their jobs. This has turned out not to be the case, however; automation instead enables human workers to learn and develop new skills that are more valuable to their organizations and their own careers | Automation & Productivity |
Cyber Security Intelligence - Super Intelligent Machines - They’re Here | A leading expert on AI, Prof. Stuart Russell, of the University of California at Berkeley, is suggesting a way forward for human control over super-powerful Artificial Intelligence, advocating the abandonment of the current “standard model” of AI, proposing instead a new model based on three principles - chief among them the idea that machines should know that they don’t know what humans’ true objectives are. | Artificial Intelligence |
Network World - Latest 5G specs highlight IoT support, better spectrum efficiency | The latest 5G technical specifications from an overarching standards organization sets a roadmap for development that addresses streamlined IoT support, AI/machine learning, and more efficient use of wireless spectrum. | 5G |
The Hacker News - 2022 Cybersecurity Predictions from Lookout: Work From Anywhere Ends On-Premises Security | Whether an employee accidentally shares a document with the wrong person or a compromised account extracts information, data now moves at lightning speed. As we head into 2022, with hybrid and remote work cemented as the new norm, Lookout expects this to become an even bigger issue. | Security |
CSO - CISA sees no significant harm from Log4j flaws but worries about future attacks | “We’ve been actively monitoring for threat actors looking to exploit” the vulnerability, and “at this time we have not seen the use [of the vulnerability known as Log4Shell] in significant intrusions,” | Security |
yahoo!Finance - Virtual Private Network (VPN) Market Trends 2022 | North America, Europe, & APAC Industry Forecasts 2027: Graphical Research | The global VPN market size is estimated to showcase exponential growth during the forecast period, driven by the rising number of government initiatives and policies to encourage companies to use innovative yet reliable internet security measures. | Network Management |
SDxCentral - What Security Tech Will CISOs Buy in 2022? | Marks pointed to ESG’s report that found nearly two-thirds (62%) of respondents said their organization will increase spending on cloud application security, followed by data security (58%) and cloud infrastructure security (56%). About half said they plan to increase spending on network security (55%) and endpoint security (50%). | Security |
AiThority - SoftwareReviews Reveals The Best IT Asset Management Software | “ITAM feeds data into financial management including cloud cost optimization, compliance and legislation, project management, vendor management and enables accountability throughout all the lifecycle stages, including disposal.” | IT Management |
Network World - Latest 5G specs highlight IoT support, better spectrum efficiency | If a commercial 5G service is available where customers wants to network IoT, all the customers need to do is ensure their IoT endpoints support the service and turn it on. That’s much simpler than architecting and deploying their own networks to support the IoT initiative. | 5G |
Computerworld - IT salary expectations for 2022: How much can UK IT pros expect? | The report also notes that demand for front-end developers is rising as businesses adapt to suit the new wave of online consumer behaviour caused by the pandemic. Additionally, 24% of CIOs are prioritising further cloud-based projects and initiatives, meaning the need for cybersecurity professionals will only continue to increase. | Tech Jobs |
yahoo!Finance - Network Monitoring Market worth around $7 Bn by 2027; Global Market Insights Inc. | The growing popularity of SaaS-based network monitoring solutions is driving the market growth. SaaS-based network monitoring solutions provide comprehensive remote monitoring and can monitor all the IP devices within the IT network infrastructure | Network Management |
ZDNet - Developers are in short supply. Here are the skills and programming languages employers need | Employers are finding it especially difficult to match candidates with their specialist business needs. This year, web development, DevOps and AI/machine learning are among the technical skills most sought after by tech recruiters, the survey found. | Tech Jobs |
SCL - Digital Transformation and the New Wave of Troubled Outsourcing Projects | In this article, we set out how digital transformation can drive complexity and risk, why market norm outsourcing contracts might hinder rather than help, how fresh thinking when setting up contracts can improve the chances of success, and how parties can exercise the contract smartly to get projects back on track when problems do arise. | Digital Transformation |
ZDNet - Cybersecurity: Last year was a record year for attacks, and Log4J made it worse | "New penetration techniques and evasion methods have made it much easier for hackers to execute malicious intentions. What's most alarming is that we're seeing some pivotal societal industries surge into the most attacked list. Education, government and healthcare industries made it into the top 5 most attacked industries list worldwide." | Security |
SUSE - Dell Technologies partnership continues to shine with Joint Open Source Solutions | Containerization is the de facto mode of development for many teams these days because they can work more independently to deliver value faster. And containers have become synonymous with Kubernetes orchestration, which escalates it all with auto-scaling, security and management of containerized applications. | Open Source |
The Sun - Hackers feared to have penetrated half of UK businesses due to staff working from home | Four out of five companies had no protections against cyber-criminals, the poll by the British Chambers of Commerce and IT firm Cisco found. | Security |
Cyber Security Intelligence - Cyber Security Threats In 2022 | Innovative cyber security vendor Darktrace has identified a growing trend of hackers targeting for backup servers in an attempt to deliberately disable or corrupt backup files by deleting a single index file that would render all backups inaccessible. | Security |
Datanami - Preparing for the Next Disruption: 10 Analytics Trends to Watch in 2022 | “Curiosity helps businesses address critical challenges – from improving job satisfaction to creating more innovative workplaces. Curiosity will be the most sought-after job skill in 2022 because curious employees help improve overall retention, even during the Great Resignation.” | Data & Analytics |
SDxCentral - Zero Trust Is More Important Than Ever, Security Practitioners Warn | Service providers might list zero-trust network access (ZTNA), software-defined perimeters (SDP), or identity-defined perimeters (IDP) products as silver bullets of a zero-trust architecture without pursuing a zero-trust strategy for the whole enterprise, so “we need to strategically remove implicit trust from IT systems and constantly validate every digital interaction in the process, | Security |
CSO - 5 top hybrid cloud security challenges | “A hybrid environment naturally introduces more complexity; there are just so many more ‘windows and doors’ to lock, and more security maintenance—patching, etc.—to perform," | Cloud Security |
VentureBeat - How to build a data science and machine learning roadmap in 2022 | Gartner notes that organizations undertaking DSML initiatives rely on low-cost, open-source, and public cloud service provider offerings to build their knowledge, expertise, and test use cases. The challenge remains of how best to productize models to be deployed and managed at scale. | Data & Analytics |
Diginomica - Someone’s talking Blockchain, but don’t run and hide - this is about proof of value | This is a use case where Blockchain and its capabilities with transaction security and provenance could offer significant advantages, except for that one major deficiency, typified by the Bitcoin example: a TPS ranging between three and seven, and a transaction confirmation cycle time of around 10 minutes. In short, Blockchain can’t hack the business need or get remotely close…or can it? | Blockchain |
Cyber Security Intelligence - What To Expect From Data Science In 2022 | An emerging trend in data science is that it has started to converge with other disciplines such as AI, business intelligence, and digital marketing as well as technologies like IoT, cloud technology and 5G in order to provide even faster and improved results. | Data & Analytics |
SC Media - Three takeaways from Google Cloud’s acquisition of Siemplify | In reality, very few security issues have end-to-end predictability with binary outcomes. This was a leading driver in SOAR failing to live up to the hype – further undermining the stand-alone market and leading to bifurcation of SOAR functionality. | Security |
The Fast Mode - The Future of Network Security: Three Predictions for 2022 | In a survey of global CISOs by Cybersecurity Insiders for the CISO Cloud/SaaS Security Report, an overwhelming 94% reported being moderately to extremely concerned about security risks associated with the increased use of public clouds. | Cloud Security |
Datanami - The Upcoming Year in Big Data: A 2022 Preview | “In 2022, organizations will create a data fabric to drive enterprise-wide data and analytics and to automate many of the data exploration, ingestion, integration, and preparation tasks," | Data & Analytics |
Datanami - Successful Edge Computing Depends on a Symbiotic Edge and Core to Workload Relationship, According to IDC | IDC has identified four workloads from its Worldwide Enterprise Infrastructure Workloads Taxonomy that have a significant influence among edge use cases: business intelligence/data analytics; content delivery; text and image analytics; and networking & security. | Edge Computing |
Georgia Tech - Responsibility Key to Broader Understanding and Acceptance of AI in 2022 | As the year unfolds, experts expect to see responsibility “increasing in relevance and importance with wide-scale acknowledgment that ethics are crucial to prevent issues related to bias and discrimination in AI,” | Artificial Intelligence |
Network World - The cloud comes down to earth | The enterprise data center is also veering toward the virtualized, containerized, ultra-scalable cloud model. For example, Dell, HPE, and Lenovo now offer on-prem clouds in the form of cloud infrastructure software running on pay-per-use hardware, overprovisioned to give you the headroom to increase capacity on the fly. | Cloud |
AiThority - Tech Hiring Accelerates as National Employment Growth Slows | Eight metropolitan areas saw the number of tech job postings increase by more than 1,000 in December over November, from Dallas (15,959 total job postings) and Houston (6,331) in the Southwest, to Los Angeles (14,229) and Seattle (8,091) on the West Coast, to Atlanta (11,808) and Tampa (4,925) in the Southeast. | Tech Jobs |
SiliconANGLE - Analyst predictions 2022: The future of data management | "I believe that data governance is now not only going to be mainstream, it’s going to be table stakes. And all the things that you mentioned, the data, ocean, data lake, lake houses, data fabric, meshes, the common glue is metadata. If we don’t understand what data we have and we are governing it, there is no way we can manage it." | Data Management |
ZDNet - New year, new job: The tech resignations are coming, so get ready | Employers will need to put just as much effort into making sure they retain existing tech staff, who already have extensive knowledge of the organization's technology and who understand the needs of the business and its customers. | Tech Jobs |
VentureBeat - The ambient intelligence decade | The metaverse is not the only idea that is being supercharged by recent technical advances. Through smartphones and IoT devices, computing increasingly surrounds us becoming everywhere a part of the human environment. This represents a nexus of long-term trends, such as ubiquitous or pervasive computing and the mobile internet | Emerging Tech |
Network World - How to buy enterprise firewalls | Most firewalls will perform well when traffic loads are light. It’s important to see how a firewall responds at scale, particularly when encryption is turned on. Roughly 80% of traffic is encrypted today, and the ability to maintain performance levels with high volumes of encrypted traffic is critical. | Network Management |
ZDNet - Cloud computing, Log4j flaw, IT spending, and more: Tech research roundup | On December 18, Google released a security report where Open Source Insights Team members James Wetter and Nicky Ringland said they found that 35,863 of the available Java artifacts from the Maven Central repository depend on the affected Log4j code. | Security |
Network World - Hybrid cloud demands new tools for performance monitoring | “Only 36% of network operations professionals believe that their network management tools are as good at managing cloud networks as they are at managing on-prem networks,” | Cloud |
ZDNet - Never been a better time to aspire to be a chief technology officer, study shows | Top CTO responsibilities cited in the survey include C-suite and board advisory (88%), software development lifecycle (72%), cybersecurity (69%), innovation strategy (61%), and business continuity (59%). CTOs also add data to their list of central responsibilities | IT Management |
Yahoo!Finance - Seven years later, Web 3 is setting a standard for the decentralised economy | Web 3.0, on the other hand, leverages machine learning, artificial intelligence and blockchain to achieve real-world human communication in a new decentralised world with blockchain as its chief cornerstone. With many great offerings, Web 3.0 brings freedom from centralised regulation and gives it back to its users. | Emerging Tech |
ZDNet - Is LiDAR on its way out? The business case for saying goodbye | "LiDAR is well suited for outdoor applications where there are a lot of unknowns and inconsistencies in terrain. That's why it's the best technology for self-driving cars. In indoor environments, machine vision makes the better technological case. As light photons are bouncing off objects within a warehouse, robots can easily get confused under the direction of LiDAR." | Automation & Productivity |
VentureBeat - The positive side of ransomware for data transformation | The new architecture should be more responsive and interface with enterprise data via a smart API that can automate the processes by which data is fetched, merged, transformed, secured, and delivered, all without users having to put in a request to the data team. | Data Management |
eWeek - 5 Tech Trends for 2022: Digital Transformation, Cloud and Talent Wars | The upskilling this will force into enterprise IT shops will be a key issue for them, as it will require changes to talent recruitment and retention well beyond what most companies have in place for what has traditionally been viewed as a low-impact cost center. | Tech Trends |
The Verge - Matter was a major star at CES 2022, but can it maintain its shine? | “We can’t leave devices behind, or this whole program won’t work. The idea that everyone has to throw everything out and start again is just not going to work.” It remains imperative that Matter doesn’t leave existing smart homes in the dark. | Smart Tech |
Yakima Herald - Commentary: Quantum technology could revolutionize business via data encryption, drug discovery and more | In pharmaceuticals, quantum computing could improve the precision and speed of drug development; in automotive, it could cut the time and cost of manufacturing; in chemicals, it could realize significant energy savings; and in finance, it could optimize risk management and free up capital. | Quantum Computing |
Cnet - Privacy myths busted: Protecting your mobile privacy is even harder than you think | Dozens of settings in your phone's operating system and within your apps would need to be changed before you could say you'd completed the first two steps. That's why the final step -- installing privacy-focused apps like a VPN, Signal Messenger, Brave Browser, DuckDuckGo and the BitWarden password manager -- is crucial | Privacy & Security |
eWeek - Secure Access Service Edge: Big Benefits, Big Challenges | The more difficult part of realizing SASE is the need for a security architecture that can be fully integrated and managed, much like software-defined networks are. But the majority of enterprises currently have a hodge-podge of security products in place that are nearly always stand-alone. | Security |
VentureBeat - AI is quietly eating up the world’s workforce with job automation | For example, the popular AI copywriting app, Rytr, boasts over 600,000 users, and it’s growing at a brisk pace. In other words, over half a million people are using Rytr alone to fully or partially automate their writing. It’s estimated that there are just over 1 million freelance writers around the world, who are increasingly competing with robots that don’t tire, don’t require payment, and can generate an unlimited amount of content. | Artificial Intelligence |
Forbes - In The Digital 2020s, Jobs Are More Than Just Jobs | Master of edge computing: “Define the IoT roadmap, carefully evaluate the technical requirements and assess the feasibility for establishing the edge processing unit and measure the return on investment. | Tech Jobs |
VentureBeat - 7 ways the technology sector could support global society in 2022 | It might benefit us more to see technology companies as one among many contributors to the future of human potential — alongside a myriad of expert philosophers, engineers, humanitarian workers, particle physicists — while recognizing that chasing goals that benefit their corporate structures more than they benefit society might be a significant distraction from the task at hand. | Sustainability |
TMCnet - Biggest Cyber Threats That Small Businesses Face | ''The absolute biggest mistake companies make about cybersecurity insurance and cybersecurity, in general, is that they don't need it and that they are not a target. And even worse, they think they are already protected'', | Security |
VentureBeat - CES 2022: Eyeing an enterprise metaverse | The MCity metaverse-as-a-service concept allows companies to register a DNS-like .metaverse domain for a “campus” of 3D structures where they can hold events on a regular basis. The 3D rendering environment is based on Epic’s Unreal Engine, powered by Nvidia GPUs running in the Microsoft Azure cloud. | Metaverse |
threatpost - EoL Systems Stonewalling Log4j Fixes for Fed Agencies | Between technology issues and travel restrictions/shipping delays involved in replacing these systems, Keller predicts that agencies are months away from being able to address Log4j. | Security |
SDxCentral - NetFoundry CEO: SASE Isn't Enough, Zero Trust Must Go Deeper | “All the major 2021 attacks, they’ve not been between the user and the app, they’ve been what I would call below the waterline of the iceberg, server to server, webserver to database, every single one of them,” | Security |
CircleID - The Future of Data Storage | A single data center uses more electricity than a small town. We’re consuming electric generation resources and spinning off huge amounts of carbon dioxide to be able to save the 45 pictures taken at the birthday party you attended last night. | Data Storage |
DarkReading - CISOs Plan What to Buy With Funds From the Infrastructure Bill | "I would spend the money to stitch together governance risk and compliance platforms, SIEM [security information and event management] and SOAR [security orchestration automation and response] technology, so that I can get more predictive analytics based on our risk posture," | Security |
VentureBeat - 4 healthcare cloud security recommendations for 2022 | There’s no secret as to why: McKinsey has estimated that migrating to the cloud could generate up to $140 billion in additional value for healthcare companies by 2030 in terms of cost reduction, new product development and overall growth. | Cloud |
Android Headlines - Cyber Attack Trends And Warnings By Cyber Expert Tal Dilian | He explains some ideas relating to GDPR, ransomware attacks, cloud security issues, and business data breaches that people and entities should keep in mind when protecting their information online. | Security |
Dark Reading - Rethinking Cybersecurity Jobs as a Vocation Instead of a Profession | Within the cybersecurity industry, the prevailing mindset is that security practitioners are professionals. Thus, a direct consequence of this mindset is that a college degree is required for many cybersecurity jobs. A recent (ISC2) report indicates that 86% of the current cybersecurity workforce has a bachelor's degree or higher. Furthermore, a quick search on Indeed.com shows about 46,000 cybersecurity jobs, of which 33,000 (>70%) require a degree. | Security Jobs |
Health IT Security - Top Healthcare Cybersecurity Predictions For Next Year | With data exfiltration, threat actors are less likely to get caught. These attacks have a higher success rate and are lower risk than encryption-based ransomware attacks. In addition, cybercriminals are almost as likely to get the ransom paid. | Security |
VentureBeat - Evaluating technology to empower digital transformation success | A recent IDG MarketPulse survey found that less than a quarter of line of business (LOB) employees are automating their daily routines or modernizing existing workflows. And it’s not all due to a lack of skill or desire — almost 1 in 5 of the respondents to that survey outside of IT who are capable of contributing to digital transformation efforts are not doing so. | Automation & Productivity |
ComputerWorld - No end in sight for the Great Resignation; workers keep quitting for better pay, benefits | The hospitality and healthcare industries took the biggest hits as workers left to find better wages and benefits. The transportation, warehousing, and utilities industries also saw employee flight in significant numbers. | Tech Jobs |
SDxCentral - Is Home SD-WAN, Security the Future of Remote Work? | “I think where you start to see some differences and where the real value of these appliances come in, is the ability for the appliances to be able to optimize and prioritize application traffic or provide direct connections to cloud-based platforms.” | Network Management |
AiThority - 70% Of US Broadband Households Own At Least One Streaming Video Product Connected To The Internet | Ownership of smart TVs and streaming media players continues to rise, and gaming console ownership has held steady after several years of losses. Consumers have fully embraced streaming services, with more than 80% of broadband households having at least one service and 49% having four or more services. | Streaming |
Blocks & Files - Samsung shipped over half of world’s enterprise SSDs in Q3, say analysts | Intel and Samsung each accounted for about 35 per cent of enterprise SSD capacity shipped in 2019’s third quarter – but now Samsung has a market-dominating 53.6 per cent share while Intel’s has dropped to 15.2 per cent. | Data Storage |
World Economic Forum - Emerging Economies More Optimistic About Artificial Intelligence, Survey Finds | 60% of respondents believe that products and services using AI will make their life easier, but four in ten admitted that the use of AI makes them nervous. | Artificial Intelligence |
ZDNet - Remote working jobs: These are the highest paying tech and management roles | The most recent Ladders Quarterly Remote Work Report, which is based on data on remote working opportunities from 50,000 companies, found that 18% of all professional jobs are now remote, including nearly 156,000 roles paying $100,000 or more. | Tech Jobs |
Rapid7 - 2022 Cybersecurity Predictions: The Experts Clear Off The Crystal Ball | "My third eye tells me that ransomware will become state-sponsored. Governments will notice the successful actors in their countries, and rather than shut them down, they'll seek to co-opt their activities. In other words, pirates will be coopted into privateers." | Security |
Dark Reading - Hybrid Multicloud Strategies Are Keeping the Public Sector at the Forefront of Threat Mitigation | To effectively adopt a defensive secure posture in a hybrid multicloud environment, development teams must ensure that security controls and features are built in at all levels of the environment, including at the data and application levels. | Cloud |
ZDNet - Most enterprise execs already want to adopt quantum computing, survey says | The study queried 300 CIOs, CTOs, and "other VP-level and above executives" at global enterprises with annual revenues over $250 million. It found that the vast majority have already begun looking into quantum computing, with a larger 74% noting that companies will "fall behind" if they fail to tap into it. | Quantum Computing |
Forbes - How To Adopt A Best Practice Approach To Cloud Migrations | For example, when an enterprise migrates an application to a public cloud, the entire database must either travel with the application or remain accessible after the migration is finished. Without complete mapping for both local and external resources, the application and data may not function as intended. Not surprisingly, security risks also increase. | Cloud |
The Next Platform - THE YEAR AHEAD IN DATACENTER COMPUTE | It would be great if the rumored Microsoft/Marvell partnership yielded another homegrown Arm server chip, and it would further be great if late in 2022 AWS put out a kicker Graviton4 chip just to keep everyone on their toes. | Automation & Productivity |
CSO Magazine - Top 8 cybersecurity predictions for 2022 | Remote work, virtual meetings, hybrid cloud networks, and SaaS adoption have all brought about complex IT infrastructures that are opening up new threat avenues. Meanwhile, CSOs also must help ensure their organizations are in compliance with new regulations. | Security |
Digionomica - The last mile in AI deployment - answering the top questions | The "AI last mile" may represent the most significant risk to the enterprise. There is complexity in putting AI into production. Perhaps, IT principals are mesmerized by the terms "AI" and "AIOps," presuming it's just another case of project management and governance. AI may not only disrupt integration into existing business processes, but it can also do so in mysterious ways, and may escape scrutiny. | Artificial Intelligence |
Network World - 3 types of edge-gateway vendors | As it stands, the edge-gateway market is immature and fractured. A range of infrastructure incumbents, providers of data-center gear, and startups have launched new edge-gateway products in the last couple of years, offering a variety of approaches to taming the edge. | Edge Computing |
Finextra - Blockchain may have a significant role in 2022 | Blockchain-based services are being developed by a number of multinational organizations, including Spotify to manage copyrights and IBM to offer monitoring systems for shipping and retail chains. | Blockchain |
SDxCentral - Top 5 Data Center Tech to Watch in 2022 | Intel is expected to be first on the scene, due in part to a last-minute delay to its upcoming Sapphire Rapids Xeon Scalable Processors. The new Xeons are slated for release early this year and boast a number of tantalizing new features, including an all-new, multi-die architecture, Intel’s most advanced 10-nanometer manufacturing process, and on-die high-bandwidth memory. | Data & Analytics |
VentureBeat - 2 big CES trends: PCs closing Apple’s silicon advantage and mutant laptops | AMD, Intel, and Nvidia are all competing with one another, and the added pressure of Apple’s own silicon is bringing out the best in all of them. | Tech Trends |
Blocks & Files - Hitachi Vantara rated as best primary storage for large enterprises by GigaOm | The small business Radar diagram places DataCore, DDN, HPE, IBM, iXsystems and StorOne in the Challengers’ area with iXsystems the most mature and DataCore, DDN and StorOne scoring highest on innovation | Data Storage |
TechBullion - Blockchain Will Rule 2022: 5 Upcoming Trends That Prove This | Owing to its impressive data storage techniques, experts anticipate the below-mentioned blockchain trends will serve as a trustworthy source of future record-keeping and financial transactions in 2022. | Blockchain |
Intelligent CISO - How ransomware is destabilising cyber insurance – and what to do about it | But as the industry’s loss ratio rose for the third straight year in 2020, climbing more than 25 percentage points year over year to 72.8%, and ransomware events jumped 93% in the first half of 2021, something clearly has to change. Ransomware is neither unlikely or novel any longer, but rather has become a commoditised threat. | Security |
Security Intelligence - The 5 Most Hotly Contested Security Trends and Questions | The worst thing that organizations can do is take a hard stance with their cybersecurity efforts. The digital threat landscape is constantly evolving. If organizations settle into a viewpoint, they could elevate one source of risk into something unrealistic—all while missing other digital threats. | Security |
Forbes - Why Words Matter In Cybersecurity | Calling all malicious cyber activity an attack fails to address questions about motive, impact and security. You don't know if victims have performed their due diligence from a security perspective. For example, was it the network secure or was it rife with unpatched vulnerabilities? You can't tell. | Security |
Enterprisers Project - Digital transformation: Your 6 key teams in 2022 | Based on my own experience in the enterprise IT domain, I can assert that digital transformation is here for the long haul. It will require enterprises to draw up tightly woven strategies and provide a handsome payoff for those that start planning early. | Digital Transformation |
VentureBeat - CES 2022: AI is driving innovation in ‘smart’ tech | In particular, consumer device makers tend to want to take advantage of the cloud for software and data updates without being dependent on the cloud — with the smarts of the smart device resident on the device itself. So they’re worth studying as pioneers in edge computing. | Artificial Intelligence |
Dark Reading - Putting Ransomware Gangs Out of Business With AI | Organizations need to take matters into their own hands with a new approach. By using AI that learns what normal business operations look like, anomalous behavior that inevitably arises from a ransomware attack can be identified at every stage, even when it’s using never-before-seen attack methods. | AI/Security |
Forbes - The 10 Tech Trends That Will Transform Our World | The takeaway for businesses is that, as our interactions with machines become increasingly intelligent, customers will expect all manner of products and services to feature some sort of AI capability. | Tech Trends |
The National Law Review - Life and Death of Technology: 2022 | The Washington Post suggests that both Apple and Google may offer their own metaverse access portals this year. It will be interesting if these companies try to isolate their own technology in to separate sandboxes, or if they make a play for interoperability that will allow small companies to create content that can be played on every device. | Tech Trends |
McKinsey & Company - The unsolved opportunities for cybersecurity providers | The elements that enterprises must secure (data, devices, people, networks, machines, and applications), how they must secure them (prevention, detection, response, and remediation), and why it’s important to secure them (to mitigate loss of lives and livelihoods) continue to evolve, and cybersecurity providers have yet to solve several crucial customer challenges. | Security |
IT Business Edge - What’s Next for Ethical AI? | They are concerned about how AI advancements will affect our productivity and the exercise of free will; in short, what it means to be “human.” The fight for ethical AI is nothing but fighting for a future in which technology can be used not to oppress but to uplift humans. | Artificial Intelligence |
Compare the Cloud - Forget Forms, Conversation is King | Conversational assistants are not just the next trend. They are the next stage in our digital evolution. Just like how CDs have been replaced by online streaming platforms in the music industry, chatbots will replace their webform predecessors. | Automation & Productivity |
VentureBeat - Report: 43% of consumers feel transparency is key for positive AI innovations | The survey, which was designed to capture consumers’ understanding of AI, their overall perception and utilization, and any apprehensions related to data privacy and regulation, found that nearly half of consumers (45%) believe AI supports employees by making complex tasks easier. | Automation & Productivity |
ZDNet - Google's 2021 Year in Review lays out hopes for practical quantum computing this decade | The company would like to accomplish all of these things before the calendar rolls around to 2030. Should it attain its goals, Google believes quantum computers could revolutionize multiple areas of technological development | Quantum Computing |
Dice - What Tech Jobs Demand A.I. and Machine Learning Skills in 2022? | According to Emsi Burning Glass, which collects and analyzes millions of job postings from across the country, the number of job postings requesting A.I. skills will increase 297 percent over the next two years | Artificial Intelligence |
The Record - State-of-the-art EDRs are not perfect, fail to detect common attacks | The research team tested these attacks against EDR software from Bitdefender, Carbon Black, Check Point, Cisco, Comodo, CrowdStrike, Elastic, ESET, F-Secure, Fortinet, Kaspersky, McAfee, Microsoft, Panda Security, Sentinel One, Sophos, Symantec, and Trend Micro. T | Security |
ZDNet - Data 2022 outlook, part two: Reality bytes the data mesh | According to Google Trends, "data mesh" was one of the topics that broke the internet in 2021 -- even more so than "data lakehouse." However, it's a topic that addresses a point of pain: We dump all sorts of data into data lakes or other silos, then we lose track of them or don't adequately utilize and govern them. | Data & Analytics |
eWeek - Data Management in 2022: DataOps, Talent Shortages, Storage Overload | Instead of focusing on the detailed technical configurations of provisioning storage and resolving issues, the storage admin job will morph into a proactive role requiring a broader understanding of the full hybrid cloud infrastructure, including compute, AI and automation, DevOps, and containers. | Data Management |
Constellation Research - Five trends shaping the cloud security conversation | Local encryption key generation and storage, and integrated transaction signing are now standard in mobile devices, and IoT device capability is heading the same way. Managing fleets of connected automobiles, smart electricity meters, and medical devices -- to cite some popular examples -- takes a dynamic mix of processing and storage at the edge and in the cloud. | Cloud Security |
Finextra - 5 Digital, Crypto and Blockchain predictions for 2022 | Digital asset interoperability and time to market remain a challenge, with traditional and multiple types of blockchain-enabled digital asset infrastructure being severely fragmented. | Blockchain |
Insider Intelligence - Health systems will turbocharge their AI strategies in 2022—but it won’t come without challenges | In fact, nearly 72% of healthcare execs say they’d trust AI to support nonclinical, admin processes that take away time providers could be spending with patients, per Optum. | Artificial Intelligence |
Data Center Dynamics - There's no ecommerce without web scraping and Big Data | Business competition is a game (in the sense of mathematical theory), where participants have partial information about possible decisions. They then make those decisipms based on the available information. | Data & Analytics |
AiThority - Top Tech Innovation Companies Exhibiting at the CES 2022 That We Are Most Excited About | Samsung will also unveil four exciting projects from C-Lab Inside, its in-house venture program, and nine startups supported by C-Lab Outside, the company’s startup acceleration program, to the public. | Emerging Tech |
Network World - When quantum computers forget: Overcoming decoherence | Overall, though, quantum computing will be a huge net plus for businesses, scientists, researchers and anyone who has to quicky perform what Harvard Business Review calls “combinatorics calculations.” | Quantum Computing |
SDxCentral - AT&T’s SASE Strategy Champions Pragmatism | By consolidating secure web gateway, zero-trust network access, cloud access security broker, and cloud-based firewalls under a single vendor, enterprises can not only better support remote workers and contractors, but do so in a way that cuts down on the number of products required and allows for consistent policy enforcement across all channels | IT Management |
VentureBeat - 30 startups that show how open source ate the world in 2021 | But in among all the usual excitement that permeates the open source world, countless open source startups launched new products, attracted venture capitalist’s (VC) money, and generally reminded us of the role that open source plays in today’s technological landscape — including the data sovereignty and digital autonomy it promises companies of all sizes. | Open Source |
TMCnet - 5 Ways to Keep Your Data Safe From The Inside Out | A security policy not only governs how your employees use company resources but also includes rules about what they should and shouldn't be doing. | Security |
EnterpriseAI - As the Energy Industry Transforms, AI Automation is Its Next Opportunity | One forecast predicts an increase in power system costs by six to 13 percent in 2040. AI can help better balance and orchestrate the network by using AI-enabled decisions in optimizing system build-out, while improving battery optimization and energy management. | Artificial Intelligence |
VentureBeat - How combining human expertise and AI can stop cyberattacks | CISOs tell VentureBeat they’re capturing more telemetry (i.e., remote) data than ever, yet are short-staffed when it comes to deciphering it, which means they’re often in react mode. | Security |
ZDNet - Nearly half of Latin companies set to adopt AI by 2023 | Companies in the region will also be seeking governance services relating to areas such as data management and security, according to the study that was carried out with 5,000 large Latin American businesses. | Artificial Intelligence |
MarketingDive - The language of innovation: How AI is improving the translation experience for marketers | In a recent Industry Dive survey of 172 marketing executives, more than half noted that while AI was a critical component for language services, when having content translated or localized for their markets, simplicity was still very much a pain point. | Marketing Tech |
Forbes - How Cybersecurity Can Keep Up With Waves Of Innovation | Unfortunately, each time this cycle has occurred, security innovation has lagged behind the new technology’s development and growth. As a general rule, it takes years for organizations to figure out how to secure a new platform. | Security |
TotalRetail - Email Acquisition is the New Directive in the Post-Cookie Era | As governmental regulation and industry mandates have pushed the envelope towards the phaseout of third-party cookies as identifiers for unknown audiences across the internet, email addresses are becoming more important than ever, taking up the mantle as the currency of the entire online advertising ecosystem | Marketing Tech |
VentureBeat - Top 5 trends for endpoint security In 2022 | While 82% of CISOs have reevaluated their security policies in response to the support needed for work-from-home (WFH) and virtual teams, endpoints often lack needed patches to stay secure or are overloaded with conflicting software agents. | Security |
ZDNet - How will Zuckerberg's Meta plans impact its dominance over social media in 2022? | Even though seven in ten respondents to a recent survey reported that they are not interested in Meta's virtual reality project, companies are developing platforms that enable users to engage. | Emerging Tech |
Datanami - NewVantage Partners Releases 2022 Data And AI Executive Survey | Investment in Data and AI initiatives continue to grow – the 2022 survey indicates that 97.0% of participating organizations are investing in Data initiatives and that 91.0% are investing in AI activities. This year, 92.1% of organizations report that they are realizing measurable business benefits, up from just 48.4% in 2017 and 70.3% in 2020. | Data & AI |
Datamation - Top Network Security Trends | Many of the worst and latest network security breaches have happened because of user errors related to a lack of cybersecurity knowledge and best practices. | Security |
Enterprise Storage Forum - Storage Tiering Market: Features, Benefits, and Providers | While SSDs are popular, hard disk drives (HDD) and tape continue to be relevant as part of the larger data storage hierarchy as different tiers to meet expanding data growth. Despite the wishes and prognostications by some, no one storage media or medium today, or at least for the next several years, will be able to support all data storage needs in a cost-effective manner. | Data Storage |
AiThority - Augmented Reality In Healthcare Market Detailed In Latest Research Report By 2021-2028 | Zugara, Vuzix Corporation | The global augmented reality in healthcare market standpoint is set to run on a comparable plan of action as that of the IT industry in the 1980s. Numerous new players are anticipated to emerge on the scene. In any case, only a few would have the option to merge their positions around the world. | Augmented Reality |
VentureBeat - Big data analytics expected to grow to $100B in value by 2027 | We can see that big data analytics has not been recognized as an essential facet in the sales and marketing departments of the pharmaceutical industry — more so than in any other sector. In fact, big data is almost twice as prevalent across this area of the industry as artificial intelligence. | Data & Analytics |
ZDNet - Data 2022 Outlook Part I: Will data clouds get easier and streaming get off its own island? | The next step for cloud providers is to tap the diversity of their portfolios, identify the synergies, and start bundling solutions that at least lift part of the burden of integration off the customer's shoulders | Cloud |
ComputerWorld - 3 big workplace changes to expect in ‘22 | Business interest in “bossware” style software that provides detailed analytics on employee actions has grown during the COVID-19 pandemic, drawing criticism from worker rights groups as overly intrusive. | Automation & Productivity |
VentureBeat - Report: 60% of U.S. infosec professionals believe ransomware is as serious as terrorism | The survey explores how infosec leadership is responding to rapidly growing ransomware threats. Their responses are critical considering two-thirds (67%) of respondents from organizations with 500+ employees reported a ransomware attack last year — a number that rises to 80% for respondents from organizations with 3,000-4,999 employees. | Security |
Tech.Co - Experts’ Predictions for the Future of Tech in 2022 | Companies navigating the inclusion of remote workers must prioritize speed and security at scale, but will need greater flexibility as well. Traditional data center architectures and public cloud solutions won't be enough — expect large new expenditures in hybrid work cloud adoption. | Tech Trends |
Chemical Engineering - IF DATA IS THE NEW GOLD, WHERE TO START DIGGING? | Among this mixture of promising potential and data overload, companies are struggling to define where and how to start. This article shines a bit of light on how an organization can make progress in its quest to transform its vast volume of process data into a decision-making asset. | Data & Analytics |
PC Magazine - Security Predictions Point to 2022 as the Year of the Breach | The security company Lookout has issued some predictions as we head into 2022. It used that ITRC report and others, plus a survey of 2,000 people conducted in November, to extrapolate what's going to happen. Most of it isn't looking good. | Security |
NextGov - US Still Lacks Federal Cyber Strategy After Decades of Attempts | Marinos noted the emergence this year of the Office of the National Cyber Director as a positive development toward fixing that. And in October, National Cyber Director Chris Inglis released a statement of “strategic intent.” But Marinos said the administration is still missing essential elements for executing an effective plan: goals and outcomes. | Security |