Teckedin - 2022 Curated Analysis, Surveys, Trends and Reports
  • 30 Dec 2022
  • 410 Minutes to read
  • Dark
    Light

Teckedin - 2022 Curated Analysis, Surveys, Trends and Reports

  • Dark
    Light

Article Summary

Thank you to our sponsor. All columns are sortable.



Title/LinkDescriptionCategory
VentureBeat - Report: Nearly 50% of phishing attacks in 2021 aimed at government employees were attempted credential theft
One in eight government employees were exposed to phishing threats. With more than two million federal government employees alone, this represents a significant potential attack surface as it only takes one successful phishing attempt to compromise an entire agency.
Privacy & Security
AiThority - Snap Researchers Introduce NeROIC for Object Capture and Rendering Applications
NeROIC stands for Neural Rendering of Objects from Online Image Collection. This machine learning-trained model acquires and analyzes object representations in 2D and 3D frames to enable various types of object-centric rendering applications. Let’s examine NeROIC and how its application can simplify the image acquisition and rendition processes.
Automation & Productivity
VentureBeat - How leading endpoint security providers compare on enterprise performance
A skilled attacker can scan and find unprotected endpoints on an enterprise network in seconds, taking just one hour and 24 minutes to move from the initial point of compromise to other systems. That’s 14 minutes faster than last year, based on Falcon OverWatch’s findings in the 2022 CrowdStrike Global Threat Report.
Security
Computerworld - Low-code development platforms to grow 25% in 2023
Along with LCAP, hyperautomation technologies such as business process automation, robotic process automation and citizen automation and development platforms (CAPD), are expected to reach almost $32 billion in 2024; that's up from $18.5 billion in 2021.
Automation & Productivity
VentureBeat - 3 KPMG cybersecurity predictions for 2023 
Predictions include big tech firms emphasizing digital trust to keep up with cyber regulation, the incident response window decreasing as threat actors leverage automation, and approaches to zero trust moving from idle evangelism to active implementation.
Security
The Verge - The LastPass disclosure of leaked password vaults is being torn apart by security experts
While the company insists that your login information is still secure, some cybersecurity experts are heavily criticizing its post, saying that it could make people feel more secure than they actually are and pointing out that this is just the latest in a series of incidents that make it hard to trust the password manager.
Privacy & Security
VentureBeat - The hottest IT skills for 2023 – even in a recession
Projections about the need for cybersecurity talent are bullish. Between April 2021 and April 2022, employers posted almost three quarters of a million cybersecurity openings. Government data projects a 35% surge in cybersecurity jobs between 2021 and 2031 — more than double the expected rise in demand for general IT jobs.
Tech Jobs
FedScoop - Software bills of material face long road to adoption


VentureBeat - Report: Data silos cause employees to lose 12 hours a week chasing data
Airtable and Forrester’s Crisis of a Fractured Organization survey reveals that large organizations today use 367 software apps and systems on average to manage their various workflows. These varying tools create data silos that hide critical data, encourage multiple sources of truth, and make it harder for teams to find the information they need.
Data Management
eWeek - Cloud Predictions 2023: The Innovation Question
I think it’s good news that AMG aren’t launching fantastic new services left and right anymore. Because that means, as Brian pointed out, that the core capabilities of cloud computing are now in place and stable. In turn, that is great news for users.
Cloud
VentureBeat - Google AdWords scam epidemic shows social engineering is evolving
As part of these scams, dubbed “MasquerAds,” fraudsters produce fake advertisements designed to rank on search engines and direct targeted users toward malicious phishing sites. These sites are designed to direct users to download malicious payloads hidden with file sharing or code hosting servers like GitHub or Dropbox.
Privacy & Security
VentureBeat - AI-as-a-service makes artificial intelligence and data analytics more accessible and cost effective 
Enterprises are looking to implement a broad spectrum of AI applications, from text analysis software to more complex predictive analytics tools. But building an in-house AI solution makes sense only for some businesses, as it’s a long and complex process.
Artificial Intelligence
sdxCentral - Google Cloud Bets on Curated Open Source Software
Open source curation exists on a smaller scale today via packages tied to a supported version of Linux or paid versions of open source systems like Apache Spark. But right now “most of the packages we depend on are not curated,” Brewer wrote. “Given the widespread risk, this will have to change.”
Cloud
SiliconANGLE - How the industrial metaverse will transform manufacturing 
But there’s another potential set of uses that may actually spread faster, in industries that train workers, manufacture products or operate infrastructure. This is what is known as the industrial metaverse, and it uses virtual and augmented reality to blend the physical and digital worlds to transform how businesses design, manufacture and interact with objects.
Automation & Productivity
AiThority - How AI is Playing Catalyst in Strengthening the Hybrid Working Environment
Zoom uses a Deep Learning algorithm to improve audio quality during meetings. With the help of toolkits such as Keras, Tensorflow, or PyTorch, the system applies a host of learning models such as Voice Activity Detection, Speaker Recognition, Speech Enhancement, and Music Detection.
Automation & Productivity
Network World - Looking ahead to the network technologies of 2023
In the cloud, in branch locations, and in the data center, the mission of connectivity will shift from the “physical network” to the virtual. Companies’ “networks” will be an overlay on multiple, diverse, physical networks. Applications will connect to virtual networks, and it’s virtual networks that will provide us security and that we’ll manage to assure information access and content delivery.
Network Management
AiThority - 6 Types of Data Analysis That Data Scientists Are Talking About
EDA determines whether the statistical technique you have considered is appropriate or not. Scientists rely on this method to look at the data before making any kind of assumptions. Common data science tools such as Python and R are used to create an EDA.
Data & Analytics
ZDNet - Machines that think like humans: Everything to know about AGI and AI Debate 3 
Famed linguist and activist Noam Chomsky said today's impressive language models such as ChatGPT "are telling us nothing about language and thought, about cognition generally, or about what it is to be human." A different kind of AI is needed, he said, to answer the question of the Delphic Oracle, "What kind of creatures are we?"
Artificial Intelligence
sdxCentral - Deloitte Debriefs Cloud Sustainability in 2023
What’s changing regarding sustainability goals is the increased emphasis on observability, monitoring, and sustainability scores with things like checks on software code, optimizing existing IT, and making applications easier and more power-consumption friendly
Sustainability
Blocks & Files - Coldago supplier rankings for cloud, enterprise and high-performance file storage
The Enterprise file storage supplier ranking places Microsoft at the top followed by NetApp and Pure Storage. IBM, Dell and VAST Data complete the Leaders’ area list. There are no Niche or Specialist suppliers at all in this file storage map, and five Challengers: iXsystems, SUSE, Qumulo and Veritas.
Data Storage
AiThority - How Artificial Intelligence Will Help Facilitate the Hybrid Working Environment
In this article, we’ll explore how AI can be used to make hybrid working environments a reality for companies of all sizes. We will also define what exactly constitutes a “hybrid working environment” so as to better understand its implications for both employers and employees alike, and how it may impact HR trends.
Automation & Productivity
Blocks & Files - Ahana: Lakehouses need community-governed SQL
Enterprises can now choose among different fit-for-purpose analytics engines for these components. However, working with various engines requires higher levels of technical expertise and mastery of different query and programming languages. Most organizations have few experts qualified to run sophisticated analytics; therefore, the whole process can become error-prone, slow, and confusing.
Data & Analytics
sdxCentral - Gartner Crowns Fortinet, Palo Alto Networks, Check Point Network Firewalls Leaders
The firm noted network firewalls are evolving into hybrid-mesh firewalls with the emergence of cloud firewalls and firewall-as-a-service (FWaaS) offerings. It expects more than 60% of organizations will have multiple firewall deployments by 2026, while new deployments of FWaaS distributed branch-office firewalls will increase from 10% this year to 30% by 2026.
Network Management
Techstartups - Okta source code stolen as a result of GitHub repositories hack. Was remediation possible?
Okta’s source code has been stolen by malicious actors earlier this month. Security experts from GitProtect.io, a GitHub backup vendor advise stopping underestimating attacks on cloud environments, and DevOps or SaaS tools. The end of the year is the perfect time for an examination of conscience on cybersecurity.
Security
AiThority - Oracle Scores Highest in All Use Cases in 2022 Gartner Critical Capabilities for Cloud Database Management Systems for Operational Use Cases
As the industry’s first and only self-driving database, Oracle Autonomous Database runs natively on Oracle Cloud Infrastructure (OCI), and can automatically secure highly available databases, configure and optimize for specific workloads, and scale resources when needed.
Data Management
Network World - What is Zero Trust Network Architecture (ZTNA)?
To allow employees to access network resources, a Zero Trust architecture requires a combination of technologies, including identity management, asset management, application authentication, access control, network segmentation, and threat intelligence.
Security
Computerworld - Why enterprises should embrace remote work in 2023
The lesson is that even in traditional in office workplaces, management needs to lean toward goal-based management, not observation-driven response.
Automation & Productivity
AiThority - Conduent Customer Experience Management Data Analysis: Technology Consumers Remain in Chat Channel
According to analysis from Conduent Incorporated, a global technology-led business process solutions company, customer service via chat grew from 14% of all interactions in January 2020 to 30% in January 2022 and remained at around that level through October 2022.
Automation & Productivity
Blocks & Files - Having an efficiency standard like SNIA’s is good. But what about public cloud?
Comment: The Emerald energy initiative from the SNIA holds great promise to better measure storage efficiency and lower carbon emissions, but it’s missing a public cloud storage element, and that can only come with the cooperation of the big three hyperscalers.
Data Storage
AiThority - 5G Network: Challenges (& Solutions) for Emerging Businesses in 2023
The 5G technology is an improved version of the 4G LTE technology. 5G promises fast speed, bandwidth, and low latency, but it has more to give that could bring revolutionary changes, and every sector is anxious to deploy this unrivaled technology to reap considerable benefits and gain a competitive advantage.
5G
Computerworld - Why it makes sense for Apple to join the ‘Fediverse’
Of course, those companies that are prepared to make investments in content moderation can offer customers the chance to join them there while also shouldering some of the costs of this kind of decentralized network — a customer-focused decision that would probably deliver more bang per buck than the ads budget on soc-med.
Social Media
AiThority - cnvrg.io ML Insider 2022 Survey Reveals AI Investment will Increase Despite Economic Recession
Organizations are increasingly confident in the value of AI, with 89% of organizations benefitting from their AI solutions. However, AI maturity still remains low. Over 57% of respondents are running less than 5 machine learning models in their product and 14% do not have AI implemented in their organization at all.
Artificial Intelligence
Network World - More work for admins: When labor-saving management tools don't ease workloads
For example, with the new platform in place, management may require network staff to enter more information related to a ticket’s context and resolution into a knowledge bank, or to layer on additional customer-centric tasks akin to “Would you like fries with that?” and not directly related to the tickets per se, or even the kinds of work originally targeted for automation and labor-savings.
Automation & Productivity
sdxCemtral - SASE Posts Another Healthy Quarter Headed Into the New Year
“SASE deployed,” or what some call unified SASE – refers to the actual deployment of a full suite of SASE-related products and services by a single vendor – or the extent to which customers are using a single vendor to provide all of the SASE-related products and services they need rather than piecing together a solution from multiple vendors.
Security
AiThority - Seerist Releases White Paper on Turning Infinite Data Into Insightful Risk and Threat Strategies
This white paper was written to demonstrate how leaders can better leverage global data to make more informed, strategic decisions by combining the power of machine learning, human analysis, and natural language capabilities.
Data & Analytics
sdxCentral - Forrester Wave Shows 'Intense' Cloud Competition in Data, Analytics
The market research firm’s Q4 2022 report on public cloud development and infrastructure platforms concluded hyperscalers’ “sheer breadth of offering might best align with the needs of large enterprises and big government agencies,” however, “other cloud providers can succeed with more discrete approaches to the market around data, analytics, development, and integration,” Sustar wrote.
Cloud
The Hacker News - Cybercrime (and Security) Predictions for 2023
With the rapid modernization and digitization of supply chains come new security risks. Gartner predicts that by 2025, 45% of organizations worldwide will have experienced attacks on their software supply chains—this is a three-fold increase from 2021. Previously, these types of attacks weren't even likely to happen because supply chains weren't connected to the internet. But now that they are, supply chains need to be secured properly.
Security
Network World - Data center networking trends to watch for 2023
Hybrid and multicloud initiatives will continue to shape enterprise IT in 2023, and the impact on data-center networking will be felt across key areas including security, management, and operations. Network teams are investing in technologies such as SD-WAN and SASE, expanding automation initiatives, and focusing on skills development as more workloads and applications span cloud environments.
Tech Trends
Datanami - Ahana Cofounders Make 2023 Data Predictions
End user experience becomes a top priority: As deep integrations of data platforms become standard, the reduced complexity will usher a focus on end user experience. The data platform will become abstracted even further to end users. Instead of worrying about the underlying engines and data structures, end users will be able to easily and seamlessly leverage powerful underlying engines for interactive, batch, real-time, streaming and ML workloads.
Data & Analytics
sdxCentral - MEF Reveals Standard Framework to Counter SASE Confusion
“The SASE vendor ecosystem is fragmented with a lack of common terminology,” Hubbard wrote. “Organizations are challenged to compare SASE feature sets and solutions resulting in confusion that can lead to incomplete service offerings that don’t meet needs and expectations.”
Security
Network World - How to reduce 2023 network costs: The cloud 
 It used to be that they believed cost reductions could be achieved with new technologies like hosted router software or white-box devices, but this year they reported concerns that integration costs and risks were too high.
IT Management
AiThority - New Research Looks at the Future of ChatGPT and Generative AI in the Enterprise
“Whether ChatGPT thinks it’s a gimmick or not is irrelevant if there are no concrete use cases for the tool,” says Roberts. “Fortunately for OpenAI and others operating in this space, many generative AI use cases exist, including enterprise support, customer interactions, and even new product development.”
Artificial Intelligence
Grading our 2022 enterprise technology predictions 
We’re closely watching the vendor consolidation trend in 2023. According to a recent Palo Alto Networks survey of 1,300 SecOps pros, on average, organizations have more than 30 tools to manage, and reducing those is a logical way to optimize costs.
Tech Trends
Computerworld - GPT: High-tech parlor trick or the first real AI for everyday use?
As James Kobielus has written for our sister site InfoWorld, Microsoft has its DeepSpeed and Google its Switch Transformer, both of which can process 1 trillion or more parameters (making GPT-3 look primitive by comparison).
Automation & Productivity
AiThority - Tips for Bringing Cloud Costs Down to Earth
According to analysts at IDC, cloud costs and spending will drop a full two points this year. KPMG research has found nearly 70% of US tech leaders say they’ve yet to see a significant return on cloud costs or investments. In a McKinsey survey, 75% of respondents said they had exceeded budget on their cloud migration process, with roughly 40% admitting they were also behind schedule.
Cloud
Network World - Ransomware: It’s coming for your backup servers
The attackers might try to directly access your backup data over the network via NFS or SMB, and if they can—and it's unencrypted—their job is done.  If they can’t, they go directly at the operating system of the backup server using a system exploit or compromised credentials to gain Administrator/root access.
Security
AiThority - Socure Named a Leader in Inaugural Identity Verification Solutions Report by Independent Research Firm
Socure has built the industry’s most comprehensive and accurate identity-verification graph. To deliver the highest-assurance assessments of consumers in the market, Socure analyzes and correlates every facet of a digital identity while utilizing over 17,000 features, 8 billion rows of data, and a continuous feedback loop of decision outcomes from 1,400+ customers.
Security
Datanami - Elastic Recognized as a Leader in Security Analytics by Independent Research Firm
Far and away, Elastic’s data visualizations steal the show. Graphs are infused throughout the offering and can be made on the fly in many areas of the product, including while querying and case notes.
Data & Analytics
Blocks & Files - Why hybrid data storage needs a single managed console
This situation also leaves key datasets largely locked into the infrastructure where they were generated and/or first stored. Moving all data into one, cohesive data repository, so it can be analysed to inform business decisions, becomes clunky.
Data Storage
Datanami - Tamr Announces Research Findings on Enterprise Data Initiatives for 2023
Becoming data-driven is an imperative for any modern business that desires digital transformation. While more organizations are becoming data-driven, many still face enormous challenges in mastering their core data because it is incorrect, incomplete, out-of-date, duplicative or siloed, which makes it unreliable and difficult to use.
Data Management
sdxCentral - Evaluating the Edge Computing Vendor Landscape
The current vendor landscape includes providers of data center services, content delivery network (CDN) edge services, edge analytics and machine learning (ML), edge communications infrastructure, edge management and orchestration, vertical industry edge solutions, edge data management, edge computing server solutions, and IoT platforms.
Edge Computing
Digital Information World - New Research Raises Alarm Against Advertising Tool That Exposes Users’ Data To Twitter
The news comes through a new study by researchers that have uncovered the ordeal which might be exposing the likes of various firms, governments, and even users to so many security risks linked to the digital social network.
Data Privacy
AiThority - AI Adoption Requires Strong Governance Through Ethical and Risk Management Frameworks, Says Info-Tech Research Group
There is no one-size-fits-all AI governance structure. As such, Info-Tech encourages organizations to identify roles and responsibilities at strategic, tactical, and operational levels; establish an AI governance council; and identify all groups supporting AI initiatives.
Artificial Intelligence
SiliconANGLE - How Palo Alto Networks became the gold standard of cybersecurity – and what it has to do to stay on top 
The company’s architectural approach was to do the heavy lifting in the cloud. This eliminates the need for customers to deploy sensors or proxies on-premises. Same with sandboxes on-prem, which can be vulnerable to overwhelming attacks. Think about it: If your sandbox is on-prem, it’s not getting updated every day — no way. Or even every week.
Security
Network World - Gartner: Top trends to know for infrastructure and operations in 2023
“SASE allows users to connect to applications in a secure fashion and improves the efficiency of management. I&O teams implementing SASE should prioritize single-vendor solutions and an integrated approach.”
Tech Trends
The Hacker News - Researchers Detail New Attack Method to Bypass Popular Web Application Firewalls
The generic bypass "involves appending JSON syntax to SQL injection payloads that a WAF is unable to parse," Claroty researcher Noam Moshe said. "Most WAFs will easily detect SQLi attacks, but prepending JSON to SQL syntax left the WAF blind to these attacks."
Security
Computerworld - Tech layoffs in 2022: A timeline 
While enterprise IT spending is still forecast to grow over the next year as companies use tech to battle expected recession, bright spots offered by enterprise spending on cloud infrastructure and SaaS applications hasn't been enough to completely lighten the overall picture for tech industry giants.
Tech Jobs
Blocks & Files - Resilience? We’ve heard of it. Forrester data durability study shows Big 3 are ahead
It defines data resilience as the capability to back up and secure data in hybrid on-premises/public cloud environments supporting SaaS and container environments. Products or services should secure the backup infrastructure from cyberthreats, recover from failure, navigate shared-responsibility models for hosted services, and address data privacy and sovereignty concerns.
Data Management
AiThority - 67% of Companies Admit They Have Lost Deals Because of Low Confidence in Their Security Strategy, According to Research from LogRhythm
Respondents overwhelmingly indicated that customers and partners are demanding higher standards, highlighting that security has evolved beyond internal consideration. Ninety-one percent reported that their company’s security strategy and practices must now align to customers’ security policies and standards. Partners also exert a new level of due diligence with 85% of respondents stating their company must provide proof of meeting partners’ security requirements.
Security
sdxCentral - Networking Vendors Misuse Language, Mislead End Users, Gartner Says
Lerner highlighted five key areas of network innovation from Gartner’s point of view: universal zero-trust network access (ZTNA), NetDevOps, multi-cloud networking software, network-as-a-service (NaaS), and secure access service edge (SASE).
Network Management
Datanami - Privitar: Majority of Data Leaders Unable to Use More than 40% of Data Due to Security and Privacy Concerns
While the data that is available to those surveyed is readily accessible (84% can receive data in less than a week), this represents only a fraction of the data they need to access to drive innovation. In reaction, more than two-thirds (70%) of respondents currently have or plan to invest in a data privacy solution within the next year.
Data & Analytics
ZDNet - What is ChatGPT and why does it matter? Here's what you need to know 
The language model can answer questions, assist you with tasks such as composing emails, essays and code. Usage is currently open to public free of charge because ChatGPT is in its research and feedback-collection phase.
Automation & Productivity
sdxCentral - Blockchain in Telecom Market Set to Soar Through 2028
An earlier research from GlobalData’s suggested global executives discerned blockchain as hype – if they understood it at all. But telecom’s enterprise adoption has gained significant traction throughout the year with carriers like Verizon adopting it for dispute management and newly public XNET looking to establish itself as a multi-service blockchain mobile network operator (MNO).
Blockchain
Datanami - Lack of Data Capabilities Impedes Organizations’ Success, Global Survey Finds
"We must move from ‘cloud first’ to ‘data first’ as the North Star of digital transformation – meaning that organizations align their strategic, organizational and technological choices with the overarching goal of leveraging data as a strategic asset.”
Data & Analytics
sdxCentral - Addressable SASE Market Worth 'Tens of Billions,' Futuriom Reports
SASE is part of a larger movement toward consolidating tools and integrating them with cloud architectures,  Futuriom said, as the framework provides an opportunity for “integration of many security functions, to provide more secure cloud and remote access, and replace traditional virtual private networks (VPNs).”
Security
SiliconANGLE - Deloitte identifies trust as a common theme in its 2023 Tech Trends
Deloitte’s 2023 trends can be split into two subsets, the first of which is enduring realities. These pioneering and innovative trends are being driven by advancements in interaction, information and computation, Deloitte says, and are focused on how trust influences enterprise risk, human-computer interaction and the integrity of data.
Tech Trends
Blocks & Files - Atempo foresees structured data explosion
He said he ”sees the structured and unstructured worlds converging with a need for unified storage.” That means a single piece of storage software will be able to handle blocks, files and objects, as Ceph does today.
Data Storage
Datanami - Scality Announces Its Data Storage Predictions for 2023
Scality’s forecast considers how big data storage solutions will evolve to meet these challenges, including how data security will remain a key storage industry driver, and how the Three I’s — intelligent features, innovation, and integration — present new hope for data center efficiency and effectiveness.
Data Storage
AiThority - UJET Research Reveals Chatbots Increase Frustration for 80% of Consumers
78% of consumers were forced to connect with a human after failing to resolve their needs through an automated service channel.
Automation & Productivity
SiliconANGLE - The new reality: Cybersecurity firms revert to the mean
In this Breaking Analysis, we explain how cybersecurity trends are reverting to the mean and tracking more closely with other technology investments. We’ll make a couple of valuation comparisons to show the magnitude of the challenge and which cyber firms are feeling the heat, and which aren’t as much.
Security
Computerworld - How many jobs are available in technology in the US?
In November, US tech companies added 14,400 workers, and tech jobs in all industry sectors grew by 137,000 positions, according to a new report from CompTIA.
Tech Jobs
sdxCentral - Palo Alto Networks on Managed SASE Requirements
Ronco said the first requirement for a managed SASE service is “single screen, cloud-based management.” Enterprises can choose to build their own integrations for these management portals, but regardless, “management needs to be extremely flexible and needs to enable fully managed and co-managed services.”
IT Management
Computerworld - JumpCloud hits AWS marketplace as Apple's enterprise market grows
“When it comes to matters of IT, companies want to make it easier to manage all their assets in one place, and that means focusing on identity first,” said Tom Bridge, JumpCloud’s Principal Product Manager, Apple. "In the past, this meant looking at Windows machines. But that model is not applicable anymore."
IT Management
SiliconANGLE - Five top takeaways from AWS re:Invent 2022 
I believe this process of taking internal apps and launching them as SaaS services will become standard practice for AWS. Future apps could include procurement, HR, expense management or anywhere else AWS feels it has an advantage.
Automation & Productivity
Blocks & Files - Forrester’s translytical neologism and rankings – with Oracle on top
The characteristics of such software products include optimization for both reads and writes, distributed in-memory architecture, multi-model, advanced workload management, AI/ML, and cloud architectures to support modern workloads. Example workloads are real-time integrated insights, scalable microservices, machine learning (ML), streaming analytics, and extreme transaction processing.
Data & Analytics
Blocks & Files - Web3 storage is not ready for enterprise backup
"There are many downsides and upsides for each network architecture, however, the biggest benefit of decentralized systems is – from my point of view – censorship resistance. Due to the lack of a central authority that controls everything, decentralized networks cannot censor or de-platform anyone due to their race, sex, age, etc."
Network Management
sdxCentral - AT&T Security AVP on Zero-Day Exploitation, Log4Shell, SBOM
As the first anniversary of the discovery of Log4Shell (Log4j) vulnerabilities approaches, AT&T AVP of Security Jennifer Morovitz discussed the broad impact of this zero-day threat and how it brought more attention to software bill of materials (SBOM) in an interview with SDxCentral.
Security
ZDNet - We are still failing to learn the most important lesson in cybersecurity. That needs to change, fast 
The alert came after an investigation into a cyberattack against what CISA and the FBI describe as a 'federal civilian executive branch' organization. If a government body can't plug the security holes correctly, then what chances do other organizations have?
Security
sdxCentral - What Problem Is the Metaverse Solving?
The metaverse has been oscillating between hype and happening in recent months. While it was deemed a major disruptive technology during a Gartner IT Symposium 2022 keynote, opposing concerns about network demands, from 5G to fiber, as well as its social impact keep its future clouded in opacity.
Metaverse
AiThority - Prestige Ransomware Attack Highlights Need to Update Cyber Security
The author then cites increasingly sophisticated methods, and a focus on healthcare and infrastructure, among other patterns that have emerged. He continues by urging best practices for credentials, including least privilege and zero trust policies. He concludes the article by encouraging the proper configuration of security tools.
Security
TechStartups - ChatGPT: Here’s why everyone is talking about OpenAI’s new chatbot that does almost everything—from writing codes, and telling stories to engaging in conversations
For now, the ChatGPT is currently free to use with an OpenAI account during a testing phase. Unlike the GPT-3 model found in OpenAI’s Playground and API, ChatGPT provides a user-friendly conversational interface and is designed to strongly limit potentially harmful output.
Artificial Intelligence
Blocks & Files - Cirrus Data and the next frontier: Moving SAN blocks to the cloud
With software like Pure’s Cloud Block Store the cloud destination can have a familiar on-prem SAN array interface. Vendors like Dell, with Project Alpine, and HPE are moving their block array software to the cloud. That provides a familiar SAN environment across the on-prem and cloud worlds for many of the installed SANs.
Cloud
CSO - Researchers found security pitfalls in IBM’s cloud infrastructure
Developed by researchers from security firm Wiz, the attack combined a privilege escalation vulnerability in the IBM Cloud Databases for PostgreSQL service with plaintext credentials scattered around the environment and overly permissive internal network access controls that allowed for lateral movement inside the infrastructure.
Security
The Hacker News - What the CISA Reporting Rule Means for Your IT Security Protocol
CISA's rule will enforce fast reporting, which will probably move organizations to speed up investigation and response, so initial reports are timely while showing mitigating actions. The rule will likely result in frequent reporting as the broader list of incidents includes scans and attempted incidents, not just successful intrusions.
Security
sdxCentral - Versa Networks Bests Cisco in New Cloud Firewall Evaluation
Non-profit CyberRatings.org completed an independent test of eight security vendors in its first cloud network firewall comparative evaluation. Forcepoint, Fortinet, Juniper, and Versa Networks’ achieved the highest ‘AAA’ rating, while Cisco fell short with a ‘CC’.
Cloud Security
Network World - Is SASE right for your organization? 5 key questions to ask
The leading SASE vendors are a mix of networking incumbents and well-funded startups. These include Cato Networks, Cisco, Fortinet, HPE, Palo Alto Networks, Perimeter 81, Versa, VMware, and Zscaler.
Security
sdxCentral - Op-Ed: Security Companies Cannot Escape Economic Downturn
Dell’Oro Group Research Director Mauricio Sanchez echoed Winckless in that even though large security companies have deep pockets, they don’t necessarily pivot faster than some of the pure players that focus on specific facets of the environment. “There’s still a lot of runway for startups to continue to innovate and at least execute [ahead of] the larger ones,” he said.
Security
CSO - Software projects face supply chain security risk due to insecure artifact downloads via GitHub Actions
To attack a vulnerable project’s CI/CD pipeline that downloads and uses artifacts generated by other workflows, attackers only need to fork the repositories containing those workflows, modify them in their local copies so they produce rogue artifacts and then make pull requests back to the original repositories without those requests having to be accepted.
Security
Blocks & Files - Web3 storage needs to ditch cryptocurrency
Second, the need for blockchain processing is another thing that will hold Web3 storage back. This distributed ledger idea is computationally intensive and time-consuming. Traditional storage does not bear this computational burden.
Web3
AiThority - 9 out of 10 Security Leaders State That Control Failures are the Primary Reason for Data Breaches
Incidents that should have been stopped by an expected control followed closely, with 68% exasperated by this inability to stop preventable breaches. Respondents also pointed to issues with data and tooling as a bigger driver for security team resignations than demands for higher salary and greater seniority.
IT Management
Blocks & Files - Coldago finds no leaders among unstructured data suppliers
We consider for this report only unstructured data for open systems for enterprises around various solutions capabilities such as analytics, data movement, security, governance and compliance, product architecture and management, media, systems and devices support.
Data Management
Network World - 5 DNS services to provide a layer of internet security 
Because there are so many DNS services available, only those that provide some type of automatic or preconfigured content filtering are discussed here with a description of what the user sees sent when the filter kicks in, which can range from a boring ,"This site can’t be reached," page to  customizable block page.
Network Management
Datanami - BigDATAwire (Formerly Datanami) Reveals Winners of 2022 Readers’ and Editors’ Choice Awards
“Navigating the world of big data isn’t easy these days, as the number of players has skyrocketed,” said BigDATAwire Managing Editor Alex Woodie. “That’s why the Readers’ Choice Award is so valuable, as it signals which products have met the ultimate test: Adoption by real-world users. Congratulations to all the winners of the 2022 Readers’ Choice Awards!”
Data Management
Network World - Data-center requirements should drive network architecture
The data center is now a lot more dynamic than it used to be, which means the data-center network has gotten a lot more agile, more elastic. We have “horizontal” traffic between application components and “vertical” traffic between applications, cloud front-end GUIs, the internet, and users. We have a dynamic fabric.
Network Management
ZDNet - Tech in 2023: 6 new priorities for your shortlist 
"I remember when cloud came and everybody was asking: 'What's cloud?' We can't take as long as it took to get things going with the cloud. With the metaverse, we have to get our act together. We have to understand it and start to test and see how that technology might make a difference to us."
Tech Trends
Blocks & Files - Analyst reports major NAND market contraction
The NAND market shrank by almost a quarter in the third quarter, according to TrendForce, hit by plummeting demand as consumers bought fewer PCs and phones with server sales declining as well.
Tech Trends
sdxCentral - Zero-Trust Management a Big Corp Challenge, Perimeter 81 Finds
It found that 14% of the respondents from larger companies (more than 1,000 employees) selected zero-trust policy implementation as the top five security challenges for 2021, while 8% of those from organizations with 50 to 499 employees made the same choice.
Security
AiThority - Expert Web Developers Weigh In On The Pros & Cons Of A Single-Page Website
There are now 4.32 billion mobile internet users as of 2021, which is over 90% of the global internet population, as per Statista. The average mobile-only user, BrightLocal reported, views only 1.88 pages per session. Single-page websites have been an emerging trend in web development, coinciding with the continued increase in mobile usage.
Tech Trends
SiliconANGLE - Cloud marketplaces transform how business software is bought and sold 
Cloud marketplaces, which are listings of complementary products and services that buyers can purchase from companies they do business with – grew at more than seven times the rate of total business-to-business e-commerce sales in 2021, according to Vertical Web Media LLC.
IT Management
sdxCentral - Telecom May Land Top Engineering Talent Amid Tech Layoffs
Additionally, Karat’s insight found that the hiring close rates for large enterprises within sub-sectors such as telecom and banking are surpassing those from hyper-growth and start-up companies for the first time in several years.
Tech Jobs
AiThority - The Electronic Medical Records Market Sees A Rising Adoption Of The Natural Language Processing Techniques By The Business Research Company
NLP techniques are used in EHRs to capture unstructured data, analyze the grammatical structure, determine the meaning and summarize the data. As a result, NLP approaches can cut costs, while thoroughly extracting large amounts of data analytics information.
Data & Analytics
Gartner Debunks Cloud Strategy Confusion
Even though data centers are the physical locations that make up what’s known as the cloud, Gartner warns against confusing a data center strategy with a cloud strategy. Organizations need to keep these separate while ensuring they’re aligned together “because that affects the role that cloud computing will play in their organization,
Cloud
Network World - 10 most powerful network management companies
A single platform that does it all probably doesn’t exist. But we’ve identified 10 leading vendors that are working hard to get there. This subjective list is weighted heavily in favor of vendors with broad platforms, rather than point products, and with vendors that have demonstrated an intention to aggressively expand their portfolio of capabilities rather than stand pat in a particular niche.
Network Management
ZDNet - Three tech trends on the verge of a breakthrough in 2023
Finding ways to make cloud usage more efficient and cost effective are likely to be key considerations next year – although IT budgets will be rising, that doesn't mean there is room for waste. Indeed, it's heartening to see that sustainability is again rising up the agenda for many tech organisations, something that we're likely to see more of in 2023 and beyond.
Tech Trends
sdxCentral - Verizon’s ‘Critical Components’ to Getting SASE Right
The SASE architecture combines network edge capabilities like SD-WAN and a set of security capabilities Gartner dubbed the security services edge (SSE) – a cloud-delivered suite that includes zero-trust network access (ZTNA), cloud-access security broker (CASB), secure web gateway (SWG), and firewall-as-a-service (FWaaS).
Security
AiThority - Predictions Series 2022: AiThority Interview with CXOs at Aryaka, a Leader in SASE Solutions
As zero trust grows in importance and delivers tangible value in keeping enterprise networks secure, it will lead to a better understanding of zero trust as a model among decision makers. This shared understanding will lead to further, more meaningful implementation through multiple layers of enterprise networks.
Tech Trends
ZDNet - Remote work is here to stay. So why is everyone still getting it so wrong? 
Much more successful was a "hybrid-flexible" setup, offering leaders and employees the opportunity to choose where they work from.
Automation & Productivity
ZDNet - Tech in 2023: Here's what is going to really matter 
A digital immune system (DIS) uses a variety of techniques – including AI-augmented testing and software supply chain security – to improve the quality and resilience of business-critical systems.
Tech Trends
SiliconANGLE - Organizations pay increasing amounts each year to address cybersecurity incidents 
Topping the findings is that organizations are paying a “hefty” $1,197 per employee each year to address successful cyber incidents across email services, cloud collaboration apps, services and web browsers. On average, that means a 500-employee company is spending an average of $600,000 annually.
Security
sdxCentral - Gartner Identifies Major Cloud Strategy Mistakes
The analyst firm defines cloud strategy as a single, concise perspective on cloud computing‘s role in an organization. A solid cloud strategy should be a short, consumable, 10- to 20-page document or slide deck, and it should be driven by the broader business strategy.
Cloud
Datanami - Almost Two-Thirds of Organizations Suffer from ‘Data Drift’, Mindtech Survey Reveals
When it comes to attitudes towards synthetic data, 85% of organizations are already making use of synthetic data to train computer vision systems, and feel that quality (65%), simplicity (61%), scalability (58%), faster training times (55%), and cost (52%) are the main strengths of adopting synthetic data.
Data Management
Blocks & Files - MinIO boss: Times are going to get very tough for appliance vendors
The early evidence is powerful – both Snowflake and Microsoft will GA external tables functionality in late 2023. Now companies will be able to leverage object storage for any database without ever needing to move those objects directly into the database; they can query in place.
Data Storage
sdxCentral - How Cloud Transformation Can Impact Zero-Trust Deployment
The reason why we say it’s an opportunity is the cloud is set up to be able to enforce zero-trust controls at scale across the smallest level of detail if you automate it and put it in place, but if you don’t, then it creates all these holes in your environment that you can’t rely on your traditional perimete
IT Management
SiliconANGLE - Why a recession is great for companies with high cloud computing bills 
Cloud workloads change constantly. Those that were once mission-critical may no longer be. Or, you may have invested in certain types of workload configuration – such as mirroring workloads across multiple cloud regions in order to increase reliability – that are no longer necessary because the requirements of the workloads have changed.
Cloud
ComputerWeekly - C-suite mystified by cyber security jargon
Although the C-suite are now keenly aware of the threats to their organisation, and how often they are attacked, many struggle to understand the terminology that cyber security professionals would consider everyday language, but to them sounds more like jargon. As a result, many are struggling to prioritise appropriate action on cyber issues, a new Kaspersky report has found.
IT Management
sdxCentral - IDC Study Puts DIY SD-WAN Difficulties on Display
Respondents in the GTT-sponsored study cited difficulties related to hiring and retaining a skilled in-house workforce, keeping up with technology developments, and the ability to “negotiate favorable terms with technology vendors” as challenges they faced when taking a do-it-yourself (DIY) approach to SD-WAN.
Network Management
ZDNet - Cybersecurity, cloud and coding: Why these three skills will lead demand in 2023 
According to Hepburn, even with the threat of a recession weighing heavy on business leaders' minds, skilled IT security staff are something employers can't effort to skimp on in 2023. "Leaving an organisation vulnerable to cyber-attacks also leaves it open to operational dysfunction, loss of earnings and significant reputational damage,
Tech Jobs
Computerworld - What Amazon, Twitter, Meta, and others got wrong with layoffs
The flury of high-profile tech layoffs in recent months belies the fact that the unemployment rate for tech workers is around 2.3%. What those companies got wrong — their hiring strategy.
Tech Jobs
TechRepublic - Google Cloud looks forward to confidential computing but eyes hardware changes
“Confidential computing is really the method by which a cloud vendor or a host environment can tie its own hands,” said Brent Hollingsworth, director of the Epyc software ecosystem at AMD. “They can prevent themselves from being able to see data at a fundamental level in a way they were not previously able to do.”
Cloud
SiliconANGLE - Luna Moth ransomware group invests in call centers to target individual victims
Luna Moth, however, has evolved in that it has done away with the malware portion of the attack, instead using legitimate and trusted system management tools to interact directly with a victim’s computer to exfiltrate data to be used for extortion manually. By using legitimate tools, Luna Moth can ensure the activity isn’t detected as malicious and hence unlikely to be flagged by traditional security products.
Security
sdxCentral - Forrester: The Metaverse Doesn't Exist — Yet
While the Metaverse Standards Forum established this year is attempting to orchestrate this interoperability, relying on over 1,500 members to submit standards for adoption, “Unfortunately, without consistency — and with a notable lack of Apple in the Forum (expected to release its XR device in 2023) — things will continue to rely more on de facto standards like the Unity and Unreal engines,”
Metaverse
Computerworld - The future of security: smarter devices that protect themselves
Jamf already has a security solution for Macs that shows this direction of travel, called Jamf Protect. It can detect threats, monitor compliance, and automatically respond to some security incidents. When it was introduced in 2019, it showed a future for security protection.
Security
ZDNet - Microsoft: Hackers are using this 'concerning' tactic to dodge multi-factor authentication 
In these attacks, the attacker compromises a token issued to someone who's already completed MFA and replays that token to gain access from a different device. Tokens are central to OAuth 2.0 identity platforms, including Azure Active Directory (AD), which aim to make authentication simpler and faster for users, but in a way that's still resilient to password attacks.
Security
Computerworld - Offboarding processes pose security risks as job turnover increases: Report
Research from YouGov finds that poor offboarding practices across industries including healthcare and tech are putting companies at risk, including for loss of end-user devices and unauthorized SaaS application use.
Security
Network World - Cisco study: Network teams look to SDN, automation to manage multicloud operations
“For the first time, agility and business performance have overtaken cost and network management as the key concerns for IT teams, with 42% of respondents citing a more agile development environment as their top reason for moving to multiple clouds,”
Network Management
Computerworld - How intelligent automation will change the way we work
Incorporating cognitive technologies with business process automation can bring significant gains in efficiency, revenue, and customer satisfaction — if it’s done right. Here’s how companies should approach automation and how workers can keep up.
Automation & Productivity
Datanami - Infosys Report: Over $460B Incremental Profits Possible with Better Data and AI Practices
According to new research from the Infosys Knowledge Institute, the thought leadership and research arm of Infosys, companies can generate over $460 billion in incremental profit if they do three things: improve data practices, trust in advanced AI, and integrate AI with business operations. However, despite high expectations for data and artificial intelligence (AI), most companies fail to act on these areas to convert data science to business value.
Data Management
ZDNet - Technology spending will rise next year. And this old favourite is still a top priority 
White suggests the explanation for this growth is that digital transformation projects during the past two years have stimulated executives' interests in technology.
IT Management
Datanami - IDC FutureScape: Top 10 Predictions for the Future of Digital Innovation
The rate of innovation in organizations with excellent enterprise intelligence was on average 2.5x faster than organizations with poor enterprise intelligence, according to IDC’s August 2021 Future of Intelligence Survey. Getting the data and analytics equation right, however, will require partnerships, rigor, efficiency, and ethics – all areas that are addressed in IDC’s Future of Digital Innovation predictions.
Digital Transformation
TechRepublic - Top cybersecurity threats for 2023
Going into 2023, cybersecurity is still topping the list of CIO concerns. This comes as no surprise. In the first half of 2022, there were 2.8 billion worldwide malware attacks and 236.1 ransomware attacks. By year end 2022, it is expected that six billion phishing attacks will have been launched.
Security
sdxCentral - Gartner Reports Disruption-Proof Sustainability Investment On the Rise
As organizations migrate their workloads to multi-cloud environments and adopt cloud-native architectures like microservices and containers, they’re promised and often realize sustainability savings in areas like energy or water usage.
Sustainability
AiThority - New Report from Common Sense Media Evaluates the Privacy Policies of the Most Popular Virtual Reality Headsets on the Market
The report, “Privacy of Virtual Reality: Our Future in the Metaverse and Beyond,” examines the privacy trends and practices of seven of the top VR devices and found that none of them meet the minimum privacy and security requirements recommended to keep kids safe.
Privacy & Security
sdxCentral - IonQ CTO Compares Cloud-Based vs. On-Premise Quantum Computing
The platform uses Dell EMC PowerEdge R750xa servers paired with IonQ’s simulation engine, quantum processing unit (QPU), Aria software, and its cloud-based quantum computing capabilities.
Quantum Computing
ZDNet - Hiring or firing? Why job cuts at big tech don't always show the full picture
CompTIA's analysis, which is based on data from the US Bureau of Labor Statistics, found that overall employment in tech has grown by 193,900 workers in 2022 so far – a healthy 28% higher than this time last year.
Tech Jobs
Network World - World’s fastest supercomputer is still Frontier, 2.5X faster than #2
Without any increase in its speed—1.102EFLOP/s—Frontier still managed to score 2.5 times faster that the number two finisher, Fugaku, which also came in second in the June rankings. An exascale computer is one that can perform 1018 (one quintillion) floating point operations per second (1 exaFLOP/s).
Automation & Productivity
sdxCentral - Microsoft Gets Technical on Cloud Sustainability Guidance
Customers have made it clear that environmental sustainability is a business imperative by asking Microsoft how to achieve and prepare for the evolving cast of sustainability requirements, incentives, and regulations, Taylor explained. And in terms of sustainable cloud infrastructure, the most common concerns center around lowering energy usage and costs, but carbon emissions as well.
Sustainability
Computerworld - Q&A: RPI president says CHIPs Act will spur quantum computing, next-gen tech
Intel, Samsung, TSMC, and others have been executing plans for new domestic computer chip development and manufacturing plants, but those efforts are running into a new headwind: there aren't enough high-tech workers.
Quantum Computing
ZDNet - Employers want tech skills, but you don't have to be a developer to get a better job
Demand for data scientists and data analysts are growing rapidly because of the unique skillsets these individuals possess, but even learning how to use basic reporting software to generate insight can impress managers and increase a candidate's hireability.
Tech Jobs
Ermetic - IBM Cost of a Data Breach 2022 – Highlights for Cloud Security Professionals
By understanding how much the cost of a data breach can impact one's organizational budget, it's easier -- and more productive -- to engage in conversations about the impact of breaches and actions to take to avoid them. It will also help security teams show they are a business enabler and how implementing security controls can save money that can be applied to the business productively.
Security
ComputerWorld - Jamf Q3 data confirms rapid Mac adoption across the enterprise
Macs accounted for 13% of all PCs sold, “the highest Mac share on record,” he said. His company continues to believe the Mac will become the dominant enterprise endpoint by 2030.
Tech Trends
sdxCentral - Forrester: The Shift to Cloud Drives Zero-Trust Edge Adoption
The components for zero-trust edge include secure web gateway (SWG), SD-WAN, cloud access security broker (CASB), and zero-trust network access (ZTNA). Mullins noted some vendors in the market already offer “full-service” solutions that have all those elements.
Security
AiThority - InRule Technology Enhances Bias Detection, Empowering Greater Explainability and Lower Risk for Enterprise Machine Learning
This report provides unparalleled explainability and empowers users to swiftly assess models for harmful bias to prevent undesirable performance for individuals with protected characteristics, such as age, race, religion, etc.
Machine Learning
sdxCentral - IBM GM on Optimizing Enterprise Network Management
The move came as NTT released its 2022 Global Network Report which found ubiquitous dissatisfaction with current network capabilities among enterprise leaders – with cybersecurity and private 5G as central factors driving the move to modernize.
Network Management
CSO Magazine - Researchers show techniques for malware persistence on F5 and Citrix load balancers
From an attacker's perspective, this limitation makes compromising networking devices in a persistent way much harder, which is why mass attacks against home routers, for example, involve automated botnets that periodically rescan and reinfect routers that have been restarted.
Security
sdxCentral - Dell'Oro Says Demand for 400G Routers Rising Rapidly
According to Peev, 400 Gb/s technology will lead the “next phase of internet backbone expansion” because the internet backbone includes traffic from both cloud and telco service providers, and transports traffic from mobile and broadband service networks and cloud infrastructure.
Network Management
VentureBeat - Tim Berners-Lee shares his vision of a collaborative web
Now Berners-Lee is working on a new data-sharing standard called Solid that could help deliver on the initial vision, and a company, Inrupt, to help commercialize this vision. He cautions that this new Web 3.0 vision for giving back control of our data differs wildly from current Web3 efforts built on less efficient blockchains.
Web3
SiliconANGLE - Cloud repatriation is a hot topic for CIOs. Don’t do it. 
But, no, you shouldn’t do it. For every 37signals that moves a workload back on-premises, there are tens of thousands more enterprises going the other way, and for good reason. In an uncertain economy, the last thing you want is to lock yourself into very inelastic hardware purchases and software licenses.
Cloud
Network World - Should security systems be the network?
Recently during a research interview with a small but fast-growing business, for the first time I encountered an organization with a “no-network-vendor” network. That is, instead of using Cisco or Dell or even a white-box solution for switching and routing, the company deployed only Fortinet equipment for its entire network. That is, every network component is part of the security infrastructure for them.
Security
sdxCentral - Edge Data Center Server Segment to Surge
“A new class of latency-sensitive applications in the form of [MEC], and virtualization of the baseband functions in the radio access networks in the form of open RAN, will pave the way for the explosive growth of a new class of servers located at the network edge,”
Network Management
ZDNet Cybersecurity leaders want to quit. Here's what is pushing them to leave 
It found that many IT security leaders are struggling to keep up with evolving threats and new cybersecurity practices, while also reporting issues around recruitment, retention and work-life balance that are prompting many to turn away from the industry.
Tech Jobs
Network World - Researchers show techniques for malware persistence on F5 and Citrix load balancers
However, in a targeted attack scenario against enterprise networks, attackers would prefer to remain stealthy and not attack the same device multiple times so they don’t trigger any detections that might be put in place after a vulnerability becomes public. They would also prefer to have long-term access to such devices and use them as bridges into the internal networks, as well as pivot points from where they could perform lateral movement and expand their access to other non-public devices.
Security
AiThority - 5G is Innovating Towards Next Generation Wireless Networks
As we move towards the future of the connected world, our industry must first understand areas that 5G is not addressing to create a 6G vision and establish future standards. Companies, governments, standards organizations, and academia are just now beginning to consider the possibilities of the next wave of wireless technology for 2030 and beyond.”
5G
sdxCentral - Gartner Assures EMEA Cloud Spending Will Rise Next Year
In the context of projected budget increases, Lovelock explained it’ll be a balancing act for enterprise CIOs in 2023. They’ll need to use digital technologies like cloud-native applications and artificial intelligence (AI) to help other departments optimize the efficiency of their operations and save on costs, while at the same time deploying tech that builds upon the company’s value proposition, revenue, and client support.
Cloud
TechRepublic - Amazon Web Services vs Microsoft Azure: Compare top cloud migration tools
Amazon Web Services and Microsoft Azure are leaders in cloud computing, each providing features and capabilities to simplify the migration processes for organizations. While they offer similar features, each solution takes a unique approach to help users with cloud migration.
Cloud
AiThority - DCPL Speeds Businesses’ Transition to a Decoupled Technology Architecture
According to the minds behind DCPL, the decoupled accelerator, (pronounced decouple) a revolution among businesses of all sizes is definitely underway. Today’s developers are ditching legacy tools and techniques and in favor of best-of-breed components easily available via the cloud and APIs. This switch has led to explosive growth with composable infrastructure, a $4 billion market, projected to exceed $23 billion by 2030.
Automation & Productivity
Datanami - New Veritas Research Shows 94% of Enterprises Are Significantly Overspending on Public Cloud
For example, nearly all (99%) respondents believed that the CSP would be responsible for protecting some of their assets in the cloud. This is rarely the case as most CSPs make it very clear that, while they are on the line to ensure the resiliency of the cloud, their customers shoulder the responsibility for the data and applications in the cloud.
Cloud
AiThority - Anomaly Detection: Its Real-Life Uses and the Latest Advances
Various machine learning models such as Artificial Neural Networks (ANN), Support Vector Machines (SVM), Autoencoders, and K-Nearest Neighbors have been used for anomaly detection.  They each have their strengths and weaknesses.  One key criterion for model selection is the time and effort needed to prepare the data for that particular model.
Machine Learning
TechRepublic - How industrial IoT is forcing IT to rethink networks
IIoT is redefining the types of data that enterprises use, and how networks process this data. For example, an IIoT network primarily transmits and processes unstructured data, not fixed record transactional data.
Network Management
sdxCentral - Quantum Computing Market Projected to Reach $1.7B by 2026
The research looked into various segments in the quantum computing market and found that machine learning is expected to witness the highest growth rate in the coming years. This segment includes the integration of quantum algorithms within machine learning programs.
Quantum Computing
TechRepublic - 5 tips to improve data quality for unstructured data
Proper data quality management is based upon the principles of assessment, remediation, enrichment and maintenance, whereby data is continually analyzed. Irrelevant, outdated, unnecessary and/or incorrect elements are weeded out or corrected throughout the data quality management process.
Data Management
AiThority - Developers Drive the Remote Work Future, Jamstack Community Survey Report by Netlify Shows
“The findings will not only help developers learn from their peers but also help business leaders better understand how developers can be change makers within their organizations. They can learn about what tools and processes they need to be most impactful.”
Automation & Productivity
Network World - 3 ways to reach the cloud and keep loss and latency low 
Every service or microservice call across the network is another opportunity for loss and latency to hurt performance. Values that might be acceptable when back-and-forths are few can become unbearable when there are ten or a hundred times as many thanks to modern application architectures.
Network Management
sdxCentral LightCounting: Optical Components Market to Rebound by 2027
While optics demand is strong across all market segments, “continuing bottlenecks in the global supply chain negatively impacted sales of 400G DR4 and 100G DR1+ transceivers to Amazon in the first 9 month[s] of 2022,”
Tech Trends
AiThority - Technology Advancement Unfolds Unprecedented Opportunities for the Audio Streaming Services Market
The integration of evolving technologies, such as machine learning (ML) and artificial intelligence (AI), is improving the discovery experience of audio streaming platforms by offering users music, podcasts, and audiobooks based on their preferences. Furthermore, the accelerated adoption of smart devices is fueling the demand for these services and ensuring a seamless customer experience, driving growth in the audio-streaming industry.
Tech Trends
Datanami - IDC: Structured Data Management Drives Most Spending on Compute and Enterprise Storage Systems in H1 2022
Unstructured Databases and AI Lifecycle were two workloads experiencing the highest growth in hardware infrastructure demand with spending growing at 52.9% and 40.2% respectively from 1H21. Unstructured Databases are still one of the smallest consumers of compute and storage infrastructure at $2.3 billion, while AI Lifecycle workload, which includes platforms mostly related to AI training tasks, accounted for $4.4 billion.
Data Management
ZDnet - Password-hacking attacks are on the rise. Here's how to stop your accounts from being stolen 
According to Microsoft, the volume of password-based attacks has risen to an estimated 921 attacks every second – representing a 74% increase in just one year for what's the primary method through which accounts are compromised.
Security
AiThority - Global Web 3.0 Market Size Expected to Reach $81 Billion by 2030 as Branding & Marketing Needs Increase
Why? Web 3.0’s first iterations are about how people acquire and share content as a social signal, join virtual communities, and ultimately co-create valuable customer experiences. In marketing, Web 3.0 may bring immersive participation and intelligent peer-to-peer transactions to the customer experience approach. It represents a potential power shift in allowing consumers to control their personal data.
Web3
The Verge - Never pay the ransom — a cybersecurity CEO explains why
Steve told me there’s so much personal information in a hospital system that a single patient’s record can sell for a huge premium over entire datasets from other kinds of companies. And, if the cryptocurrency explosion has accomplished anything, it’s making ransomware attacks easier and more lucrative for bad guys.
Security
Computerworld - How many jobs are available in technology in the US?
Tech job postings reflect the total of “help wanted” ads companies listed last month. There were 317,000 such postings in October, according to CompTIA. It was the first time since April 2022 that the number of job postings increased over the prior month.
Tech Jobs
TechRepublic - 6 ways to reduce your IoT attack surface
Many people have long associated IoT attacks with lower-level threats like distributed denial of service and crypto-mining botnets. But in reality, there are a growing number of ransomware, espionage and data theft attacks that use IoT as the initial access point into the larger IT network, including the cloud.
Security
SiliconANGLE - Cloudflare’s supercloud: This is what multicloud should have been 
Its disruptive DNA is increasingly attracting novel startups and established global firms looking for a reliable, secure, high-performance, low-latency and more cost-effective alternative to Amazon Web Services Inc. and legacy infrastructure solutions.
Cloud
The Hacker News - Your OT Is No Longer Isolated: Act Fast to Protect It
For example, if at all practical, consider segmenting the networks used by OT and apply application whitelisting to ensure that only authorized OT applications can send and receive data over that network. Keep a close eye on network traffic and analyze logs so you can catch attackers in the act – before it's too late.
Security
Datanami - What Does Data and Analytics Need for 2023? Forrester Shares Predictions
Forrester today released its 2023 predictions for data and analytics (D&A), and the prognostication isn’t pretty. Frighteningly little progress has been made toward becoming data-driven in a meaningful way among a large swath of organizations sampled by the analyst group.
Data & Analytics
TechRepublic - The six types of virtualization in cloud computing
Storage management is one area of cloud computing that has been improved in recent years through virtualization. Storage virtualization involves collecting and merging several physical storage units and rendering them as one storage cluster over a network.
Cloud
Datanami - AWS Report Explores the Priorities of Today’s CDO
The exact parameters of the job are in question for some, with 19% of respondents reporting having an unclear job definition and 16% revealing their job definition is overly broad. Additionally, 62% of respondents stated they feel the CDO role is less understood than other C-level roles.
Data Management
The Hacker News - Researchers Find Links b/w Black Basta Ransomware and FIN7 Hackers
Attack chains involving Black Basta are known to leverage QBot (aka Qakbot), which, in turn, is delivered by means of phishing emails containing macro-based Microsoft Office documents, with newer infections taking advantage of ISO images and LNK droppers to get around Microsoft's decision to block macros in files downloaded from the web by default.
Security
Venturebeat - 5 ways your business can practice safe data to avoid security threats
Network security has traditionally been thought of as outside versus inside: bad actors outside, good actors inside. But with the rise of cloud and with access to networks by mobile phones, desktops, laptops and any number of other devices, it’s no longer feasible or responsible to have such a neat separation.
Security
TechRepublic - Sustainability and IoT ‘bricks’ top list of Forrester’s 2023 edge computing predictions
Zero-trust edge and multicloud networking are two emerging markets Forrester points out as good ways to set up that handshake in the modern era. ZTE services automatically apply zero trust across the application traffic entering and exiting a remote site. Companies like Aviatrix and F5 Volterra provide multicloud networking to gather disparate offerings into a single multicloud network platform.
Edge Computing
ZDNet - Meet the companies that will shape the metaverse 
There's a growing sense that we're at a pivot point in this technology's history, where it will either explode into the "next big thing," or fizzle into the background, the way VR tech has several times before
Metaverse
Blocks & Files - Cohesity: Don’t rely on ransomware guarantees
Our understanding is that if you download software in your environment thinking it’s a harmless application and it turns out it hides ransomware, you are not covered. Additionally, these companies don’t pay the ransom – they pay recovery costs.
Security
The Hacker News - Why Identity & Access Management Governance is a Core Part of Your SaaS Security
Gartner has recently named a new security discipline called Identity Threat Detection and Response (ITDR) that incorporates detection mechanisms that investigate suspicious posture changes and activities, and responds to attacks to restore the integrity of the identity infrastructure.
IT Management
Datanami - Survey of 600 Data Leaders Highlights State of Data Policy Management Practices
The survey also found that data policy management is likely to continue evolving as data security and privacy concerns remain at the forefront for consumers and businesses alike. Looking ahead, customer trust and engagement are expected to become the top incentives for data policy management orchestration, according to the research.
Data Management
VentureBeat - Compliance is one of today’s biggest competitive differentiators — here’s why
“There’s a lot of emphasis right now on ensuring you’re operating in a capacity that has both operational and technical security in mind, so that you can scale your organization and prove to potential partners, or anybody who is going to be using your product or service, that you’re taking risks seriously,
Compliance
ZDNet - OpenSSL dodges a security bullet 
At first, it looked like the OpenSSL 3.x security bug was going to be truly awful. While it was feared to be a critical error that could lead to remote code execution (RCE), upon a closer examination it turned out to be not so horrid after all.
Security
TechRepublic - How to identify and avoid common data migration mistakes
Another mistake related to testing is leaving all of the testing to developers. Developers can and should certainly be involved in the testing process as technology professionals, but people from all other areas of the business should join them by actively participating in testing.
Data Management
Datanami - Report: 60% of Employees Using AI Regard It as a Coworker, Not a Job Threat
Furthermore, organizations with employees who derive value from AI are 5.9 times as likely to see significant financial benefits from it than organizations where employees do not get value from AI, according to a report from MIT Sloan Management Review (MIT SMR) and Boston Consulting Group (BCG) being released today.
Automation & Productivity
TechRepublic - What is a private cloud?
One of the biggest challenges with private clouds is increased complexity. Private clouds require significant investment in hardware and software, as well as careful planning and management. As a result, they can be considerably more expensive to set up and maintain than public clouds.
Cloud
AiThority - Predictions Series 2022: Redefining AI in a Human Context
But in a Human-in-the-Loop approach, transparency enables a better, more balanced result through human + machine outcomes. Transparent AI is the only real route to delivering ethical AI, which in turn is the only way that the technology can be sustainable.
Artificial Intelligence
SiliconANGLE - Even the cloud is not immune to the seesaw economy 
But our research suggests that customers are reallocating and optimizing that committed spend. For example, they’re shifting data to lower-cost storage tiers or increasingly taking advantage of better price-performance processors such as AWS’ Graviton. As well, we see smaller companies that were paying by the drink (strictly on demand) moving to reserved instances to lower their cloud bills.
Cloud
AiThority - Unveiling the Key to Data Democratization with Embedded Analytics
There’s change taking shape in the embedded analytics landscape. Numerous firms are touting the importance of analytics for building products and competing in the marketplace. In fact, according to a recent Dresner Advisory Services market study, 89% of organizations say embedded analytics is critical to their BI strategies.
Data & Analytics
TechRepublic - An overview of hierarchical storage management
HSM systems typically consist of three key components: A data migration policy, algorithms for managing data, and a mechanism for tiering or caching data. The data migration policy defines how data should be moved between different storage devices based on factors such as frequency of use or importance
Data Storage
Blocks & Files - How simple, stateful storage and Kubernetes streamlines developer productivity
CSI provides a thin shim between the container orchestrator and the backend storage systems that is unique for each vendor. Now that it is mature and widely recognized by developers, customers can pop to the CSI documentation and see all the drivers for various storage interfaces.
Data Storage
Nextgov - Agencies Shouldn’t 'Just Trust' Software Vendors' Security Assurances, IG Warns
The executive order detailed a set of security practices—such as “establishing multi-factor, risk-based authentication and conditional access across the enterprise”—that it said should be included in guidelines for the development of software, which NIST would issue. And it instructed the director of OMB to “take appropriate steps to require that agencies comply with such guidelines” in their procurement and use of software.
Security
VentureBeat - Inside Microsoft’s security threat landscape (and how you can protect your company)
In 2021, major agencies like the National Security Agency (NSA), FBI, CISA and CIA detailed the 15 most common vulnerabilities and exposures (CVEs) exploited by hackers. Of those, 60% (nine) were due to deficiencies in Microsoft’s designed, operated and owned systems, including seven CVEs within Microsoft’s Exchange Server.
Security
TechRepublic - What is data migration?
While there are many reasons for an organization to perform data migration, one of the primary objectives is to improve the performance and efficiency of the system. Read on as we explain how data migration works and some of the pros and cons that come with moving data to new environments and platforms.
Data Management
Business Insider - What is iCloud Private Relay? How the Apple service can help protect your online privacy
If you are concerned about your privacy, you can enable Apple's iCloud Private Relay, which hides data like your IP address and DNS records so no one (not even Apple) can see your identity, location, or search history.
Data Privacy
TechRepublic - 2022 cyber threat report details growing trends
Some changes in regional data have also been reported. Attacks on North America increased by 2%, which is much lower than the global average. Yet, Europe has shown a 29% increase in cyberattacks, and attacks in Asia grew by 32%.
Security
HelpNetSecurity - Your CCTV devices can be hacked and weaponized
Plus, many cameras are also equipped with facial recognition technology, hacking into a server that stores and analyzes footage and data can give cybercriminals unfettered access to someone’s identity and any other information stored.
Security
Computerworld - As videoconferencing needs change, it's time to plan for what comes next
I’ve been covering videoconferencing and collaboration since the late 1980s. There's been a recurring cycle: companies get excited about a technology, invest in it, then lose interest to a degree that vendors exit the market, leaving customers exposed.
Automation & Productivity
TechRepublic - Why Apple would gain from RCS adoption and how WhatsApp currently benefits
RCS is a massive improvement over SMS, and its host of features make messaging an engaging option for Android users, as the service is currently only available for Android phones. Imagine sending high resolution photos and videos, or emoji reactions with end-to-end encryption — things that made you depend on WhatsApp, but can now be done within the built-in message app.
Automation & Productivity
SiliconANGLE - Symantec researchers find new hacking tools used in stealthy ‘Cranefly’ campaign 
Standing out from typical attack groups, Cranefly has a particularly long dwell time, often spending at least 18 months on a victim’s network while staying under the radar. Avoidance techniques include installing backdoors on appliances that don’t support security tools, such as SANS arrays, load balancers and wireless access point controllers.
Security
Datanami - New Pecan AI Survey Finds Data Science is Not Benefiting Marketers
While companies tout the criticality of consumer data on a variety of fronts, from predicting future purchases to customer churn, the reality is that more than 4 out of 5 marketing executives report difficulty in making data-driven decisions despite all of the consumer data at their disposal,
Marketing Tech
AiThority - Demystifying Data Integration for a Clear Business Win
On average, enterprises have approximately 254 applications, 40-60 tools per team and more than half (56%) of SaaS applications are not owned or managed by a company IT department. As app sprawl increases, data from each app gets siloed and becomes inaccessible to other parts of the organizations, teams and apps.
Data Management
VentureBeat - Overcoming the Challenges of Working with Small Data
It’s important to understand the concept of small data first. Small data, as opposed to big data, is data that comes in small volumes that are often comprehensible to humans. Small data can also sometimes be a subset of a larger dataset that describes a particular group.
Data & Analytics
TechRepublic - Forrester sees AWS under pressure in 2023 cloud computing predictions
The report points out that companies will pay more attention to cloud spending due to inflation. This move would benefit third-party cloud cost management and optimization providers, offering a clear-eyed, vendor-neutral approach. Although this development would rattle the big players or hyperscalers in the cloud market, they will adapt by luring customers with services that are more efficient, easier to adopt and offer sovereign capabilities alongside stronger security.
Cloud
AiThority - Follow the “Four Vs” to Achieve Artificial Intelligence Maturity
AI needs a continuous stream of feedback to build its intelligence. In legal industry terms, that means continuously feeding invoices, client information, law firm information, case results, and all other relevant data into the system. The greater the volume of information, the stronger and more mature the AI.
Artificial Intelligence
SiliconANGLE - Madrona releases its IA40 2022 list of intelligent application startups 
Many of the startups in the IA40 2022’s list Early Stage category provide AI-focused tools for engineers. Credo AI makes software that facilitates responsible machine learning development, while LinearB Inc. and Tabnine Inc. offer tools designed to help engineers write code faster.
Artificial Intelligence
TechRepublic - Data quality trends to watch
The 2022 State of Data Quality report from Ataccama reveals that automation and modernization efforts have still not been universally adopted. While seven in ten enterprises surveyed (69%) have begun their DQM journeys, they still have not achieved high maturity levels. The technology is there, but companies are struggling to use it and are only scratching the surface of DQM’s potential.
Automation & Productivity
VentureBeat - Gartner report: 70% of organizations will implement structured automation by 2025
The survey found that with just 43% of I&O teams currently automating monitoring and analytics, 83% find such automation efforts to be valuable. Similarly, only 36% of I&O teams are automating incident and problem resolution, but it’s considered valuable by more than three-quarters of those respondents.
Automation & Productivity
SiliconANGLE - ‘A hardware nerd-fest of the top minds’: TheCUBE analysts preview upcoming Supercomputing show 
The importance of hardware was eclipsed by the rise of cloud computing. But, of course, hardware never went away. Instead, it evolved and gained new relevance as the basis on which cloud is built. Although it remains invisible to most, high-performance computing and those ubiquitous black boxes, touch all use cases of new technology, from smartwatches to robotics to genome sequencing.
Tech Trends
Datanami - ESG Report Finds Datadobi’s StorageMAP Combats Unstructured Data Challenges
According to the report, the challenges associated with data growth and multiplication are creating a huge data deluge, inundating IT infrastructure with more complexity and cost. ESG research reveals that, as a result, over half of the organizations (55%) surveyed report that unstructured data makes up at least half of the data they have under management in total.
Data & Analytics
Computerworld - Is performance tracking about to go mobile?
That means IT could soon be involved in selecting, implementing, and supporting productivity and performance monitoring solutions that keep tabs on workers wherever they are — even if they’re not sitting in front of a computer.
Automation & Productivity
SiliconANGLE - Three insights you might have missed from IFS Unleashed 
Increased reliance by consumers on technology to purchase dinner, airline tickets, and even a car with a few clicks on a smartphone is leading to expectations that enterprise systems will deliver the same friction-free experience. Enterprise tech announcements now often include signs of this through the use of descriptors such as “streamlined,” “standardized” and “quicker.”
Automation & Productivity
Computerworld - Why more than half of IT leaders may be looking for new jobs
Two new surveys indicate that more than half of IT decision makers and leaders are job hunting because they lack of voice in the C-suite, see few training and advancement opportunities and feel pressures from a lack of IT staffers to meet growing tech needs.
Tech Jobs
Tech Startups - Will Crypto Payments Ever Compete with Platforms Like Venmo and Paypal?
For people who want to send money to friends or family quickly and cheaply, crypto payments are an attractive option. Several service providers facilitate such transactions to ensure money arrives quickly. One such market player is Zonda Pay, a way to accept cryptocurrency payments and convert them to EUR on the fly.
FinTech
ZDNet - Cybersecurity teams are reaching their breaking point. We should all be worried 
Mimecast said cybersecurity teams face "a pressure cooker of ongoing attacks, disruption, and burnout" that is making it even more difficult to attract and retain much-needed cybersecurity professionals to keep businesses secure.
Tech Jobs
VentureBeat - Report: 97% of C-level executives worry about videoconference security
Sixty-nine percent believe cyberattackers could breach their videoconferencing platforms, and 84% stated that if they were breached, they believed attackers could steal intellectual property, sensitive company data and trade secrets.
Security
The Hacker News - Download eBook: Top virtual CISOs share 7 tips for vCISO service providers
In a new eBook, titled 'Top virtual CISOs share: 7 tips on how vCISO service providers can maximize services, increase revenues, and improve margins" (Download here), vCISO platform provider Cynomi interviewed some of America's top vCISO service providers (MSSPs, MSPs, consulting firms and solo vCISO practitioners), to get the most insightful tips that can help other vCISOs provide a better and more profitable service.
Security
SiliconANGLE - Survey says! Takeaways from the latest CIO spending data 
Today we’re going to review the macro spending data, convey where chief information officers think their cloud spend is headed, look at the actions organizations are taking to manage uncertainty, and then review some of the technology companies that have the most positive and negative outlooks in the ETR data set.
IT Management
Computerworld - The best states in the US for tech jobs
The top five states in September include California (with 35,947 tech job openings); Texas (27,284 openings); New York (16,142); Virginia (15,280); and Florida (14,015). Illinois was a close sixth, with 13,714 tech job postings.
Tech Jobs
Blocks & Files - Cohesity, VAST arrive in Gartner’s object MQ
There were 15 suppliers in the 2021 report, when Pure Storage was promoted to ‘Leaders’ box status, and both Nutanix and Weka entered for the first time. Now we have 17 suppliers with Cohesity and VAST making their first appearance.
Data Storage
Computerworld - Sustainable IT: An environmental and social approach to business tech
“Sustainable IT is an umbrella term that describes an environment-focused approach to the design, use, and disposal of computer hardware and software applications and the design of accompanying business processes,"
Sustainability
Blocks & Files - HPE looks to disaster recovery for storage growth
There are four of these: Data Center Switching, Data Protection and Lifecycle Management, Hybrid Cloud Management, and AI at Scale Infrastructure.
Data Storage
VentureBeat - Deloitte State of AI Report 2022 calls out underachievers
Most notably, the Deloitte report found that while AI continues to move tantalizingly closer to the core of the enterprise – 94% of business leaders agree that AI is critical to success over the next five years – for some, outcomes seem to be lagging.
Artificial Intelligence
SiliconANGLE - How to drive innovation and growth with cloud technology 
If you plan to use a different hypervisor as the VM host – vSphere to Amazon Web Services’ EC2 – there will be more considerations, since the behavior of the hypervisor will differ from one to another (CPU co-scheduling, transparent memory sharing and DMA are all significant considerations). For cloud-native approaches, serverless options use 12-factor methods that support concurrency through quick instantiation of functions using policy-coordinated provisioning.
Cloud
VentureBeat - How embracing automation could change the future of work
Yet, there are still leaders who are paralyzed by indecision or simply do not know how to evolve. By making small changes to the way their organizations work, they will be able to shape brighter, more fulfilling futures for employees.
Automation & Productivity
ZDNet - Selling an emotion and a feeling: How these companies see VR as the future of business
The global VR and AR market is expected to reach $97.76 billion by 2028—a considerable jump from its 2020 value of $4.16 billion.
AR/VR
SiliconANGLE - Five ways to tell whether Kubernetes is a good fit for your app – or not
Even if your application runs as microservices using containers, Kubernetes isn’t necessarily the best way to deploy it. There are other, simpler solutions – like Amazon ECS or Lambda – for running containers. And if your application isn’t a set of microservices at all, Kubernetes is hands-down not a good way to run it.
Cloud
ZDNet - The metaverse is coming, and the security threats have already arrived 
"This is tricky, because in the metaverse you might never hear someone's real voice. You might never see someone's real face. You could interact with a scam artist for days, for months, potentially for years and develop a trust relationship that has nothing to do with actual reality," she explains
Metaverse
Datanami - Hakkoda Survey: More than 75% of Financial Services Leaders Want to Stop Using Excel
Key failure points listed by the survey respondents include its inability to handle big data or complex calculations, support remote collaboration, provide data visualization, and deliver real-time insights. When asked if they would rather be stuck in an elevator for three hours or do another internal rate of return (IRR) report in Excel, 42% of respondents chose the elevator.
Data & Analytics
SiliconANGLE - Analyzing nuggets from Microsoft Ignite and Google Cloud Next 
The content at these events had many overlapping themes, including modern cloud infrastructure at global scale, applying advanced machine intelligence, end-to-end data platforms, the future of work, automation and a taste of the metaverse and Web 3.0.Tech Trends
VentureBeat - Which cybersecurity metrics matter most to CISOs today?
What differentiates fast-track directors, VPs, and C-level executives progressing in their careers in cybersecurity is how they connect what they’re doing to deliver business value. They’re not relying on the hundreds of canned metrics that security tools can produce at the click of a mouse.
Security
The Hacker News - How To Build a Career as a Freelance Cybersecurity Analyst — From Scratch
With each passing year, the cybersecurity threat landscape continues to worsen. That reality makes cybersecurity analysts some of the most sought-after technology professionals in the world. And there are nowhere near enough of them to meet the demand. At last count, there were over 3.5 million unfilled cybersecurity jobs worldwide — and that number is still growing.
Tech Jobs
VentureBeat - Top AI investors reveal State of AI in 2022
 In 2021, diffusion AI models were overtaking GANs, the previously dominant AI models for image generation, on a few benchmarks. Today, diffusion AI models are used to power the likes of DALL-E 2, Imagen, Midjourney and Stable Diffusion, spreading to text-to-video, text generation, audio, molecular design and more.
Artificial Intelligence
Computerworld - Google Smart Lock: The complete guide
Google Smart Lock is an unlocking feature for Android devices and Chromebooks. In Android, the system allows you to keep your phone unlocked in certain preapproved, known-to-be-safe circumstances.
Automation & Productivity
Blocks & Files - GRAID’s killer RAID competitive comparison
GRAID’s marketeers have run up a comparison between the SR-1000, a Broadcom MegaRAID hardware card; one of the MegaRAID 9560 series, and Intel’s VROC software RAID, and it’s pretty compelling.
Data Storage
ZDNet - Meet the companies that will shape the metaverse 
As we head into one of the most crucial months in the ongoing development of the metaverse and the VR hardware that powers it, we take a look at the companies shaping these early days with their hardware, software, and services.
Metaverse
Blocks & Files - Filecoin: The Airbnb of archival storage
Filecoin, by Protocol Labs, is a multi-faceted storage infrastructure for archival data, operating inside a framework of the cryptoeconomy. It’s designed to make a network of storage providers operate like an enterprise-class setup.
Data Storage
VentureBeat - How cloud PAM can transform the enterprise
The faster enterprises migrate workloads to the cloud, the greater the risk of potential breaches. Relying on legacy on-premises PAM systems to protect new cloud infrastructure is like buying a new car and insisting on having traditional key locks instead of Bluetooth-enabled key fobs.
Cloud
VentureBeat - Who controls the metaverse? Spoiler alert: It’s not policymakers
Rizvi says policymakers could eventually have an impact by creating standards to help increase access by requiring that interoperability be built into every major platform, which would likely reduce costs for consumers.
Metaverse
Blocks & Files - Something’s missing from global file systems
Rarely does a CIO say their business has a global file data access problem and they need a supercloud-type global file system to solve it. Yet, arguably, they do and, in principle, a global file system operating across a hybrid and multi-cloud environment is exactly what they need to fix it.
IT Management
AiThority - Top 5 Technology Trends for 2023
AI is still the top trend, only with a different focus. Metaverse is a new entry this year and is seen playing an important role in making businesses more sustainable. Embedded data and analytics held the number 4 position for a second-straight year.
Tech Trends
Blocks & Files - Disk drive market to plunge due to inflation, war and hyperscalers’ already high inventories
TrendFocus is expecting around 39 million disk drives to be shipped in calendar Q3, down 42 percent on the same period a year ago and 14 percent lower than the prior quarter.
Data Storage
SiliconANGLE - IDC: Personal computer shipments declined 15% in the third quarter 
PC makers shipped 74.25 million computers in the third quarter, down 15% from 87.31 million computers a year ago, according to IDC. The sales drop follows a similar 15.3% year-over-year decline in the previous quarter. IDC today attributed the weakening sales primarily to a combination of “cooling demand and uneven supply” in the PC market.
Tech Trends
Datanami - SnapLogic Study Reveals a Third of IT Leaders Have Been Forced to Deprioritize or Cancel Tech Projects
The survey, conducted in the UK and US, found the top three biggest demands on tech teams’ time included integrating new applications / platforms (48%), dealing with problems caused by ‘shadow IT’ (47%), and managing legacy systems (40%).
IT Management
Blocks & Files - Pavilion Data – last NVMe over Fabrics flash array startup – has died
Apeiron, E8, Excelero, Mangstor (later Exten), Vexata (bought by StorCentric) and now Pavilion have all crashed, burned, been acquired or otherwise lost their independence.
Data Storage
SiliconANGLE - Latest CIO survey shows steady deceleration in tech spending
This growth still represents 200 to 300 basis points above historical norms. And looking ahead to next year, CIOs are expecting accelerated growth, edging back toward the 6% level. As noted, visibility is less clear than in pre-COVID years. But the bottom line is digital transformations are continuing to push IT spending above historical levels.
IT Management
VentureBeat - Report: Security remains key driver of service mesh adoption
The KubeCon EU respondents — practitioners in devops, development and IT architecture — revealed that end-to-end encryption was the biggest driver of service mesh adoption, cited by 65% of respondents. Observability was the second most important driver, cited by 41%.
Security
AiThority - The Uncertainty Bias in AI and How to Tackle it
It’s been well established that AI systems will replicate and often exacerbate the bias inherent in its training dataset. However, even when measures are taken to level the playing field, a subtle but equally undesirable result may occur because of prediction uncertainty.
Artificial Intelligence
VentureBeat - Report: 81% of IT teams directed to reduce or halt cloud spending by C-suite
Rising inflation and interest rates, along with fears of a potential recession have put increasing financial and operational strain on organizations. As a result, many companies are reevaluating their digital ambitions as cloud spending is brought under the microscope.
Cloud
Blocks & Files - Storage and the Supercloud
The Supercloud “comprises a set of services abstracted from the underlying primitives of hyperscale clouds (e.g. compute, storage, networking, security, and other native resources) to create a global system spanning more than one cloud.”
Cloud Storage
Datanami - Precisely Releases Future of Data Architecture Study
Furthermore, 52% of business users agree that existing data is not suitable for necessary business analysis, compared to only 36% of central data and analytics teams. The results show a clear disconnect between data and analytics teams and their key stakeholders – with business users unable to rely on trusted data for confident decision-making.
Data & Analytics
ZDNet - Ransomware: This is how half of attacks begin, and this is how you can stop them
These applications and services could be internet-facing because organisations need them to enable employees to work remotely – or organisations might not even be aware that these applications are exposed to the internet at all.
Security
Computerworld - Online privacy: Best browsers, settings, and tips
For example, the incognito or private browsing mode that turns off browser history on your local computer doesn’t stop Google, your IT department, or your internet service provider from knowing what sites you visited; it just keeps someone else with access to your computer from looking at that history on your browser
Data Privacy
AiThority - AIThority Primer: Building Analytics and Top Players in the Market
IT companies are realigning their spend on network infrastructure and building to embrace a more environmental-friendly and sustainable operation with building data analytics or BDA. In this AIThority.com primer series, we have picked the best examples of analytics for building units with examples from the leading innovation companies and solution providers.
Data & Analytics
Blocks & Files - Seagate DNA lab chip technology explored
“We’re basically looking at ways to leverage chemistry to improve the write speeds, shortening the length of time it takes to put DNA pieces together, because right now it’s very slow … Over the write speeds today, we need several orders of magnitude improvement.”
Data Storage
SiliconANGLE - Data privacy imperative will drive adoption of warehouse-native applications
To deliver competitive customer data analytics, innovators are centering their data strategies around the governance pillars of permission, ownership, and control with respect to customer data. Operationally, organizations are doubling down on a raft of policies to support governance at large scale.
Data & Analytics
Blocks & Files - Gartner: Flash array revenue to overtake HDD
Gartner estimated the external storage compound annual revenue growth rate to 2026 to be 1.5 percent. Within that, SSAs were growing 4.6 percent and HDD/hybrid arrays declining 1.6 percent. The analyst group cut the numbers another way, saying primary storage revenues would grow 0.2 percent while secondary storage revenues would rise 7.1 percent.
Data Storage
SiliconANGLE - Report finds insiders are a bigger data exposure risk than most executives think 
Unsurprisingly, the prime time for data exfiltration is between the time employees give notice and their last day on the job. Cyberhaven measured a nearly 38% increase in incidents during that period and an 83% jump in the two weeks before an employee resigned. Incidents jumped 109% on the day employees were fired.
Security
VentureBeat - Blockchain could repair our broken global supply chain
Businesses can use blockchain technology to track cargo, much as orders and shipments are tracked by the end customers of a retailer like Amazon. Blockchain’s value lies in the ability it gives parties to share data quickly and securely in a way that’s also decentralized.
Blockchain
Geekwire - U.S. cybersecurity agency leader Jen Easterly on partnerships, workforce, making tech accountable
“One of the things I talk a lot to our technology teammates about is the increasing need to create technology that is secure by design. … It is unfortunate that we’ve now accepted this cultural norm that software just comes with a ton of vulnerabilities."
Security
VentureBeat - Ignorance isn’t bliss: How tech users lack fundamental cybersecurity knowledge
43% of respondents had never heard of multifactor authentication (MFA).
Security
sdxCentral - Closing Digital Divide Needs 'Inclusive Set of Solutions'
Whether it’s addressing the homework gap or delivering internet connections to U.S. Indian reservations, the panel focused on the notion that infrastructural fault lines run through multiple communities – in rural, suburban, and even densely urban areas – and that means it isn’t a one-solution-fits-all scenario.
Network Management
Computerworld - Mozilla: Apple, Google, and Microsoft lock you into their browsers
Apple, Mozilla noted, requires all developers deploying iOS browsers to use Apple’s own Safari WebKit engine. When security issues arise on WebKit, all iOS browser users are equally vulnerable until Apple finds, fixes, and publishes patches. “This is just one reason why a range of browsers, using different browser engines, is desirable,” Mozilla said
Automation & Productivity
VentureBeat - What the zero-trust security market looks like beyond 2022
Ericom’s Zero-Trust Market Dynamics Survey found that 80% of organizations plan to implement zero-trust security, and 83% agree that zero trust is strategically necessary for their ongoing business. Additionally, 96% of security decision-makers say zero trust is critical to their organization’s success.
Security
AiThority - Survey Reveals 95% of Consumers Demand that Brands Protect their Data and Privacy to Build Trusted, Sustainable Relationships
“This is an existential moment for brands; while the U.S. government looks to enforce online privacy, the survey is a clarion call for companies who are waiting for a new regulatory framework and the looming cookieless future in 2024.”
Data Privacy
ZDNet - Walls between technology pros and customers are coming down at mainstream companies 
 "That final user experience is critical to us," he explains. "We encourage our technology professionals to get out of the office and onto our construction job sites to gain a better understanding of what the trade and field workers do on a regular basis, and identify possible opportunities for technology to help them in their day-to-day activities."
Automation & Productivity
AiThority - How the Delayed Adoption of Conversational Commerce is Actually a Good Thing
With 86% of customers willing to pay more for better customer experiences, brands are ripe with the opportunity to fully lean into Conversational Commerce today.  Among the different forms of customer support, live chat has the highest satisfaction level at 75% followed by email (61%) and phone (44%). The D2C ecosystem and consumer behavior have evolved far enough to support cCommerce.
Automation & Productivity
ZDNet - Hackers are making DDoS attacks sneakier and harder to protect against 
In the first new type of attack, a wide range of services and/or devices are targeted with smaller portions of traffic compared to a regular DDoS incident. The idea is that multiple different pipelines of the target are overwhelmed, without triggering the thresholds that would initiate protection against unusually high levels of traffic.
Security
Network World - Software vulnerabilities pose a risk to network infrastructure
In this era of software-defined networks, an ever-increasing number of network appliances are just proprietary software running on generic switching hardware or even a plain vanilla x86 server with extra network cards. That shift in emphasis from the hard to the soft has made the software stacks running the network a new source of risk and worry for cybersecurity.
Security
ZDNet - Open Source Initiative expands its role to AI and machine learning 
The key difference, then and now, between the two is that free software is about the ethics of sharing code, while open source is focused on the practical benefits of sharing code.
Automation & Productivity
VentureBeat - Report: 13% fewer companies expect technology budgets to stay level or increase in 2023 vs. 2022
According to Bain, more than 75% of the largest venture capital investments in recent years went to IT infrastructure and industry-focused enterprise software companies, illustrating the potential for innovation.
IT Management
The Hacker News - 5 Network Security Threats And How To Protect Yourself
Attackers use automated tools to identify and exploit vulnerabilities and access unsecured systems, networks or data - however big or small your organisation. Finding and exploiting vulnerabilities with automated tools is simple: the attacks listed above are cheap, easy to perform and often indiscriminate, so every organisation is at risk.
Security
SiliconANGLE - UiPath is a rocket ship resetting its course 
The point is ML/AI and RPA appear to be more discretionary than certain sectors, including cloud. Containers most likely continue to benefit from the fact that much of the activity is spending on internal resources – i.e. developers — as much of the action in containers is free and open source. Security is not shown, but as we’ve previously reported, it’s somewhat less discretionary than other sectors.
Tech Trends
sdxCentral - Data Center Industry Weighs Revenue, Sustainability Goals
“Whether self-regulated through something like the iMasons Climate Accord or more strictly regulated through the [Securities and Exchange Commission] in the U.S. and the Corporate Sustainability Reporting Directive in the [European Union], the industry will soon have much more robust need for sustainability assessment, accounting, reporting, and monitoring,"
Sustainability
ZDNet - Bosses spying on you? Here's the most disastrous truth about surveillance software
It described the varying levels of privacy offered by varying types of software. It explained that Microsoft is one of the companies that doesn't believe simple activity translates into material productivity.
Automation & Productivity
VentureBeat - Report: 90% of orgs believe cybersecurity risk isn’t being addressed
According to Foundry’s 2022 Security Priorities Study, an overwhelming majority (90%) of security leaders believe their organization is falling short in addressing cybersecurity risk. Those surveyed experienced these pitfalls from different issues, such as convincing the severity of risk to all or parts of their organization (27%), and believing their organization isn’t investing enough resources to address risks (26%).
Security
Network World - IoT technology is hitting an inflection point for businesses
Part of the reason for this acceleration, according to the research, is that enterprises now believe they can expect relatively fast ROI from their expenditure on IoT. This ROI can take a huge range of different forms—from savings on maintenance thanks to more in-depth monitoring in a manufacturing setting, to more effective in-store marketing in retail—but the consensus appears to be growing that quick ROIs are now achievable.
IoT
sdxCentral - Cisco Talos Tracks Insider Attack Surge
The Cisco Talos intelligence group over the past year saw an increase in incidents involving insider threats such as malicious insiders and unwitting assets, and is recommending organization’s add social engineering to their policies, procedures, and education programs.
Security
ZDNet - Programming languages: It's time to stop using C and C++ for new projects, says Microsoft Azure CTO 
Microsoft drove home this point in 2019 after revealing 70% of its patches in the past 12 years were fixes for memory safety bugs due largely to Windows being written mostly in C and C++. Google's Chrome team weighed in with its own findings in 2020, revealing that 70% of all serious security bugs in the Chrome codebase were memory management and safety bugs. It's written mostly in C++.
Security
sdxCentral - Forrester Warns Against Procrastinating Cloud Native
Cloud-native technologies like serverless computing, for example, are usually in developers’ toolkits as soon as they see what’s available and how it can impact them. But with governance questions, especially around the shared responsibility model, “it can get very complicated very quickly,” he said.
Cloud
VentureBeat - The Apple security landscape: Moving into the world of enterprise risk
Likewise, this year alone, there have been 8 publicly disclosed zero-day vulnerabilities used in attacks on iPhone and Mac devices. The most recent, CVE-2022-32917, enables an attacker to run malicious code on a user’s device with kernel privileges.
Security
ZDNet - Remote workers insist they're very productive at home. 'Paranoid' bosses don't agree
Microsoft depicts productivity paranoia as a vicious circle. Businesses using employee-tracking technology undermine employee trust, which in turn can lead to "productivity theater", where workers knowingly join pointless video meetings and respond to emails at times that look good.
Automation & Productivity
ZDNet - Why MFA matters: These attackers cracked admin accounts then used Exchange to send spam 
The point of the elaborate attack was to make mass spam – promoting a fake sweepstake – look like it originated from the compromised Exchange domain rather than the actual origins, which were either their own IP address or third-party email marketing services, according to Microsoft.
Security
sdxCentral - Forrester’s ‘Keys to Cloud Success’
For IT decision-makers to use the cloud successfully, the analyst firm suggests they “put every cloud decision up against their business strategy,” regardless of their organization’s maturity level. This includes analyzing how much business value can be derived from building a private cloud platform versus leveraging one from a public cloud vendor or from operating cloud-native applications on-premises instead of migrating them.
Cloud
Blocks & Files - Cirrus Data: Migration for blockheads
Block-level data migrations can involve complexities such as installing drivers at the hosts, changing FC zones, and LUN masking, with SAN downtime required to sort them out. Cirrus has its own patented Transparent Datapath Intercept (TDI) software technology to fix these problems.
Data Management
sdxCentral - Okta Finds MFA Attack Surge as Bad Actors Target Weak Authenticators
If the target uses weak secondary factors, “attackers can try to bypass MFA using techniques that either downgrade MFA to single-factor authentication, intercept the second factor, or disable/weaken an organization’s ability to enforce MFA policies such as modifying trusted IP configurations or session reuse, for instance,”
Security
VentureBeat - Third-party risk: What it is and how CISOs can address it
According to Gartner, organizations that hesitate to expand their ecosystem for fear of the risks it can create will likely be overtaken by organizations that boldly decide to seize the value of third-party relationships, confident in their ability to identify and manage the accompanying risks effectively. Therefore, it’s critical to handle third-party security risks efficiently and effectively.
Security
Datanami - Pluralsight Study Finds Only 8% of Global Tech Workers Have Significant Cloud-Related Skills
While the study found that 75% of tech leaders say they’re building all new products and features in the cloud moving forward, only 8% of technologists have significant cloud-related skills and experience. Additionally, 64% of respondents say that they are new to cloud learning and are looking to build basic cloud fluency.
Tech Jobs
sdxCentral - SSE, SD-WAN Convergence Difficult, NTT Notes
“MPLS is horribly expensive. The telcos have been riding that wave and making phenomenal margins for years,” Hinderyckx added. But he said people have come to realize the internet is “strong enough and solid enough to actually run all of your traffic, including the mission critical traffic across.”
Network Management
Datanami - NSF Releases Open Knowledge Network Roadmap Report
As an essential component of a national artificial intelligence and data science infrastructure, an open knowledge network is envisioned to provide an open, inclusive, community-driven platform to support new applications and frontiers in AI and data science research, such as ensuring fairness, diversity, equity and inclusion.
Data & Analytics
SiliconANGLE - KubeCon preview: As Kubernetes goes mainstream, scalability becomes vital 
“Now that Kubernetes is part of your day-to-day, I think starting this year, it’s going to be at the next level. Gone are the times of just running your Prometheus at individual cluster level. Now you need a solution that operates at this massive scale across different distributions and your edge locations.”
Cloud
Blocks & Files - Evaluating global file systems and NAS cloud filers
A second global file system design is one used by the public cloud services themselves; think AWS EFS and FSx, Microsoft Azure Files, and Google Cloud Filestore. They have no on-premises component at all. The Evaluator Group sets them aside and has analyzed on-premises NAS+cloud component systems and cloud-based global file systems with edge caching systems only.
Data Management
VentureBeat - Unified endpoint management (UEM) tools: What’s new in Gartner’s Magic Quadrant
Consolidation and its effects on leading UEM vendors’ strategies is a core theme that resonates through Gartner’s latest Magic Quadrant for Unified Endpoint Management Tools. IBM, Ivanti, ManageEngine, Matrix42, Microsoft and VMware have made product, service and selling moves in response to how focused CISOs are on consolidation.
Security
ZDNet - When digital transformation goes wrong: Five ways to get back on track 
"Digital and analytics transformations are often deployed across organizations, involving many departments and third parties. Soft factors like skills, mindsets, and ways of working, as well as hard factors like technology, infrastructure, and data flow, are all being changed at once during such a transformation,"
Digital Transformation
sdxCentral - Turing Shares Top Global Developer Hiring Trends
Global hiring platform Turing pulled from company data – which includes over two million developers and engineers working through the platform – to present the top 15 requested developer skills and the top five industries currently hiring the most.
Tech Jobs
ZDNet - What is ambient computing? Everything you need to know about the rise of invisible tech 
Instead of having to directly interact with different computing devices to get desired results – for example, using your phone to make a phone call and your remote to turn on a TV–  ambient computing allows all of your devices to work together seamlessly to fulfill your needs.
Automation & Productivity
VentureBeat - Report: Ransomware attack frequency and amount demanded down in H1 2022
According to a new report from Coalition, ransomware attack frequency and cost are down. From H2 2021 to H1 2022, ransomware payment demands decreased from $1.37 million to $896,000. Of the incidents that resulted in a payment, Coalition policyholders paid an average of roughly 20% the initial amount demanded.
Security
AiThority - Could Instances of NLP Bias Derail AI?
The black-box nature of ML models can make it difficult to explain the decisions made by the models. Furthermore, models can overfit datasets or become overconfident and do not generalize well to unseen examples. However, in most cases, the dataset used for training and evaluation is the culprit for introducing bias.

Artificial Intelligence
VentureBeat - Microsoft Teams vulnerability shows danger of collaboration apps
For example, according to research released by Vectra yesterday, versions of Teams for Windows, Mac and Linux are storing authentication tokens in plain text on the underlying device. This is significant because it means if an attacker hacks a system where Teams is installed they can gain access to authentication tokens along with other information.
Security
SiliconANGLE - Stolen SSO credentials from top companies found for sale on the dark web 
The BitSight researchers dug into listings on the dark web and found that 25% of the S&P 500 and half of the top 20 most valuable public U.S. companies have SSO credentials listed for sale. More than 1,500 new SSO credentials were also found to become available in June and July alone.
Security
ZDNet - Highly skilled tech workers are becoming a rarity, and companies have tough decisions to make 
The onboarding process for remote employees is especially tricky, as companies have to figure out how to make their company culture a memorable experience for remote employees. A days-long process filled with hours-long, information-packed Zoom meetings yields poor job performance, according to a survey by Perceptyx.  
Tech Jobs
VentureBeat - Vulnerability management: Most orgs have a backlog of 100K vulnerabilities
Each of these vulnerabilities presents a potential entry point for attackers to exploit and gain access to sensitive information. However, many organizations lack the internal expertise or resources to patch these vulnerabilities at the pace required to keep their environments secure.
Security
Network World - 5 Ways to Mitigate Your New Insider Threats in the Great Resignation
Implementing a successful security awareness program is more challenging than ever for your security team—the new blood coming in causes cultural dissonance. Every new employee brings their own security habits, behavior, and ways of work. Changing habits is slow. Yet, companies don't have the luxury of time. They must get ahead of hackers to prevent attacks from new insider threats.
Security
sdxCentral - Forrester Deems Hybrid Cloud the Norm
Enterprise efforts to push migration forward resulted in a lot of spending that played a significant role in propelling innovation, according to Sustar. “The sheer shift in emphasis towards cloud and away from data center forced innovation, forced the pace of new development, forced the move into containerized applications, into production.
Cloud
Datanami - New Relic Releases 2022 Observability Forecast Report
Nearly three-quarters of respondents said C-suite executives in their organization are advocates of observability, and more than three-quarters of respondents (78%) saw observability as a key enabler for achieving core business goals, which implies that observability has become a board-level imperative.
IT Management
ZDNet - Highly skilled tech workers are becoming a rarity, and companies have tough decisions to make
The notion that tech executives are open to hiring workers without degrees points to a shift in hiring requirements. Three-quarters (67%) of those surveyed felt that the traditional hiring and onboarding process is too long, too pricey, and needs re-imagining.
Tech Jobs
Datanami - Anaconda Releases 2022 State of Data Science Report
90% of professional respondents indicated that their organizations are concerned about the potential impact of a talent shortage, with 64% saying they were most concerned about their organization’s ability to recruit and retain technical talent. 56% feel that insufficient talent or headcount in the data science area is one of the biggest barriers to the successful enterprise adoption of data science.
Data & Analytics
ZDNet - The future of the web will need a different sort of software developer 
What is certain is that while there is a lot of noise about the hottest programming languages and the evolution of Web3, blockchain and the metaverse, none of this will matter if the industry doesn't have highly skilled software developers to build them.
Emerging Tech
Datanami - Verta Releases 2022 State of Machine Learning Operations Study
In fact, 45% of the survey respondents reported that their company reported having a data or AI/ML platform team in place to support getting models into production, and just 46% have an MLOps platform in place to facilitate collaboration across stakeholders in the ML lifecycle, suggesting that the majority of companies are unprepared to handle the anticipated increase in real-time use cases.
Machine Learning
The Hacker News - How to Do Malware Analysis?
According to the 2022 Malwarebytes Threat review, 40M Windows business computers' threats were detected in 2021. And malware analysis is necessary to combat and avoid this kind of attack. In this article, we will break down the goal of malicious programs' investigation and how to do malware analysis with a sandbox.
Security
VentureBeat - Is confidential computing the future of cybersecurity? Edgeless Systems is counting on it
“People will want and expect it for most workloads, just like they expect antivirus and firewalls to be present,” he said. “CISOs will soon need to explain to their CEOs why they’re not using confidential computing.”
Security
Network World - Software-defined perimeter: What it is and how it works
An SDP is specifically designed to prevent infrastructure elements from being viewed externally. Hardware, such as routers, servers, printers, and virtually anything else connected to the enterprise network that are also linked to the internet are hidden from all unauthenticated and unauthorized users, regardless of whether the infrastructure is in the cloud or on-premises.
Security
VentureBeat - How Zesty aims to meet cloud infrastructure management challenges
“Zesty is breaking the inefficient cycle with dynamic cloud infrastructure. This new way of working with infra enables customers to automatically scale cloud resources to optimally match application demand at any given time and adjust immediately to any changes as they occur,"
Cloud
ZDNet - The Future of the Web: The good, the bad and the very weird 
But big tech companies also see the emergence of these metaverse technologies as another opportunity to build their next, and perhaps the final walled garden. Whoever wins out in this new virtual world could find themselves with a permanently defensible near-monopoly on access to this digital universe, where they are making the decisions about what we see and do, and collecting all the money.
Metaverse
VentureBeat - Analytics spending is on the rise: Here’s how to make the most of it
Essentially, the survey found that 90% of the organizations witnessing improved customer metrics were either good or great at utilizing all data sources, while a significant 84% looked at all data types. This aspect ties directly to well-defined data accessibility and governance policies.
Data & Analytics
Datanami - IDC: AI Spending Grew 20.7% Worldwide in 2021
“The reality is, AI offers solutions to everything we are facing at the moment. AI can be a source for fast-tracking digital transformation journeys, enable cost savings in times of staggering inflation rates and support automation efforts in times of labor shortages.”
Artificial Intelligence
Computerworld - As telehealth use plummets, the healthcare industry faces a crossroads
The road toward adoption of telehealth — the use of electronic communications to provide care and other services — has been long. Before the COVID-19 pandemic took hold in 2020, the adoption rate in the US, nearly 60 years after telehealth technology was first introduced, was just 0.9% of outpatient visits.
Healthcare Tech
VentureBeat - Why the explainable AI market is growing rapidly
There’s no dearth of startups in the AI and MLops space, with a long list of startups developing MLops solutions including Comet, Iterative.ai, ZenML, Landing AI, Domino Data Lab, Weights and Biases and others. Qwak is another startup in the space that focuses on automating MLops processes and allows companies to manage models the moment they are integrated with their products.
Artificial Intelligence
Datanami - New Research Shows Analytics Outpaces Other Software Spending in Next 12-18 Months
Further, even fewer are maximizing advanced analytics, as less than 30 percent of decisions are informed by artificial intelligence and machine learning for most organizations. To help businesses maximize their analytics investments, the global IDC survey uncovered the impacts of people, data, and analytics automation on return on investment (ROI).
Data & Analytics
VentureBeat - Digital twins, unprecedented collaboration: What the metaverse means for developers
Today, there isn’t one single metaverse, although various platforms and companies would like you to believe otherwise. Instead, multiple platforms could be considered metaverses (or “verses” for short) in their own right, including HyperVerse, Decentraland, The Sandbox and even the mostly-for-kids platform Roblox.
Metaverse
SiliconANGLE - How IT leaders can embrace responsible AI 
Responsible AI is an umbrella term for aspects of making appropriate business and ethical choices when adopting AI. It encompasses decisions around business and societal value, risk, trust, transparency, fairness, bias, mitigation, explainability, accountability, safety, privacy, regulatory compliance and more.
Artificial Intelligence
The Hacker News - Why Vulnerability Scanning is Critical for SOC 2
It's both a technical audit and a requirement that comprehensive information security policies and procedures are documented and followed. As with all the best compliance certifications and accreditation, it is not just about joining the dots. It involves a complex set of requirements that must be documented, reviewed, addressed and monitored.
Security
VentureBeat - Deepfakes aren’t going away: Future-proofing digital identity
Everyone, ranging from everyday consumers with little technical knowledge to state-sponsored actors, has easy access to phone applications and computer software that can generate fraudulent content. Furthermore, it’s becoming increasingly difficult for humans and fraud detection software to distinguish between real video or audio and deepfakes, making the technology a particularly malicious fraud vector.
Security
Computerworld - Extended reality — where we are, what’s missing, and the problems ahead
VR/MR is what we think of when we talk immersion. Both require the entire image be rendered with the difference between VR and MR being how much is imaginary and how much is real. With VR, the entire scene exists only in software, nothing is real, and cameras (if there are cameras) are mostly used to keep you from running into things.Emerging Tech
ZDNet - Big changes ahead for the cloud business model, top CTO predicts 
Enterprise blockchain may still be in experimental mode, but it may soon change the way applications and systems are designed, moving from an architecture maintained by individual organizations to architectures in which applications and data are shared and secured across multiple entities -- in essence, a truly decentralized form of computing.
Blockchain
Computerworld - Collaboration tech evolves for the post-COVID future
“Your company may not want your personal phone to be your education system because it’s not very secure,” Bersin said. “But there are [secure] applications now, such as WorkJam, that are designed for end-to-end communications with people who don’t have computers. And the big vendors are trying to figure out how to build [out those applications] as well."
Automation & Productivity
Information Week - How to Make Vendor Technology Bakeoffs Work
Because each solution is actually being road tested in a simulated production environment and pitted against at least one other solution, being awarded a contract by a buyer goes far beyond just having the highest RFP ranking. It's even better than succeeding in a small proof of concept.
IT Management
The Hacker News - Shopify Fails to Prevent Known Breached Passwords
According to Hive Systems' infographic, a five-character password can be cracked instantaneously, regardless of complexity. Given the ease with which shorter passwords can be cracked using brute force, organizations should ideally require complex passwords that are at least 12 characters in length.
Security
sdxCentral - Gartner Gives CIOs the Key to Drive Digital Transformation
First, CIO’s should adopt “neophilia” – or a tendency to like anything new. The firm suggested effective digital CIOs embrace the tendency to ask “what do we want to achieve?” rather than “what have we got?” in order to reject current assumptions and pursue innovation.
IT Management
Information Week - Crash Course on E-Discovery for CIOs and CDOs
Here are nine things you need to know about e-discovery – from what it looks like (and it’s not just about saving email) legal preparations, how to cut costs, how to preserve evidence, and when or why to get advice from legal pros – in case your organization finds itself in a legal trouble.
Records Management
The Hacker News - 6 Top API Security Risks! Favored Targets for Attackers If Left Unmanaged
Shadow, hidden, or deprecated APIs which fall out of your security team's visibility create more opportunities for successful cyberattacks on unknown APIs, API parameters, and business logic. Traditional tools like API gateway lack the ability to offer a complete inventory of all APIs.
Security
sdxCentral - Gartner Names Akamai, Cloudflare, Imperva Cloud WAAP Leaders
Gartner evaluated 11 cloud WAAP vendors. Amazon Web Services (AWS) and Fastly made it into the “challengers” quadrant; Radware was the only vendor in the “visionaries” square; and Gartner labeled Microsoft, F5, Fortinet, Barracuda, and ThreatX “niche players.”
Cloud
VentureBeat - Level up your first-party data strategy: How to make your data work for you
Although nearly 90% of marketers recognize the importance of first-party data, more than one-third report difficulty maintaining its quality and accuracy.
Data & Analytics
SiliconANGLE - What private emerging tech companies don’t tell you about their business 
What we’re seeing here are some very high evaluation rates in the green. H2O, we mentioned. SecurityScorecard jumped up again. Chargebee, Snyk, Salt Security, Armis. A lot of security names are up here, Aqua, Netskope, which has been around forever. I still can’t believe it’s in an Emerging Technology Survey, but so many of these names fall in data and security again, which is why we decided to pick those out.
Emerging Tech
VentureBeat - RPA market sees explosive growth as firms look to automate more tasks
Helping to drive RPA growth is the fact that is has become “industry agnostic, and truly horizontal across many verticals,” Ray told VentureBeat. “Although we have seen huge adoptions around finance, banking, insurance, contact centers, manufacturing and healthcare.”
Automation & Productivity
SiliconANGLE - Supercloud enables holistic management of entire IT infrastructure 
“So instead of building all these various things that we have to do individually in each of the cloud providers, we’re trying to do so within a cross-cloud service layer, which removes us from dealing with the complexity of the underlying multicloud services and makes it manageable.”
Cloud
VentureBeat - Report: Data access hurdles affect AI adoption for 71% of enterprises
Even as decision-makers and CXOs remain bullish on AI’s potential, enterprises are struggling to make the most of it at the ground level. Case in point: a new report from data integration giant Fivetran that says 71% of companies find it difficult to access all the data needed to run AI programs, workloads and models.
Artificial Intelligence
sdxCentral - Ransomware Attack Emulation Unveils Effectiveness of Zero-Trust Segmentation
What Bishop Fox did to protect against bias was to differentiate the red and blue team roles, and make sure the red team, aka the attackers, do not change their tactics and follow the same script with the same amounts of delays no matter what they learned from previous tests. Additionally, the team built a complex enterprise network entirely in the cloud and heavily used automation for consistency.
Security
Computerworld - How many jobs are available in technology?
Overall employer job postings for tech positions eased in August to just under 320,000 from 372,000 in July, with 31% of jobs posted last month for positions in emerging technologies, such as artificial intelligence, machine learning and IoT, or in roles that require emerging tech skills, such as data analytics and automation software.
Tech Jobs
SiliconANGLE - Major security bugs are a long-term threat: Here’s why and what’s next
Of greater concern has been the difficulty for enterprises to apply a fix. A July report from CyCognito Inc. found that 70% of firms in a subset of companies examined that had previously addressed Log4j were struggling to patch vulnerable assets and prevent a recurrence. Twenty-one percent of organizations in the report experienced triple-digit percentage growth in the number of exposed vulnerable assets.
Security
VentureBeat - Report: Cybersecurity awareness increased to 97% in the last year
The study found that properly implemented awareness training programs move the needle of enterprise risk where technology alone cannot. As many as 87% of study participants stated that effective IT security is not possible without employee training.
Security
Blocks & Files - LTO tape to keep rolling for 5 more generations
The LTO Program Technology Provider Companies – HPE, IBM, and Quantum – said the new roadmap will see the LTO Ultrium standard double capacity with each new generation.
Data Storage
VentureBeat - What is reinforcement learning? How AI trains itself
Reinforcement learning is part of the training process that often happens after deployment when the model is working. The new data captured from the environment is used to tweak and adjust the model for the current world.
Artificial Intelligence
Techstartups - Rethinking Data Privacy With ParallelChain’s Unique Blockchain Architecture
The ParallelChain Private blockchain is a Layer 1 network, similar in some ways to blockchains like Ethereum, Avalanche, and Binance Chain. However, it’s also very different from these networks in that it provides not one, but two interconnected blockchains. One is public, just like most blockchains, while the other uses some innovative tricks to stay private.
Blockchain
VentureBeat - How data can reveal weaknesses in your customer onboarding process
Acquiring a new customer costs five times more than it does to retain an existing customer. It’s a good idea, then, to emphasize retention. While we look at best practices and data used by a company’s post-onboarding functions, we find that the onboarding function itself doesn’t have retention through value delivery as a goal.
Automation & Productivity
sdxCentral - Cybersecurity Insurance Revenue Projected to Surge
“Regarding cybersecurity, European nations like Germany are portraying themselves as technologically independent nations equal to China and the United States,” with funding support from governments, Straits Research noted.
Security
SiliconANGLE - Three-quarters of mobile applications found to contain valid AWS access tokens 
Of the apps with AWS credentials, 77% contained AWS access tokens allowing access to private AWS cloud services. Nearly half of those apps had valid AWS tokens giving access to millions of private files on Amazon S3.
Security
VentureBeat - Report: SaaS app spending up, but security lags behind
So it’s not surprising that a recent study by Axonius found 66% of organizations are currently spending more on SaaS compared to a year ago. And there’s no sign that this trend is slowing down, as a large majority (74%) claims that more than half of their apps are now SaaS-based, while only a third (34%) said they were concerned about the costs associated with this rising usage.
Security
ITProToday - Let’s Stop Gatekeeping in Cybersecurity
Acronyms like SIEM, XDR, NDR, EDR, SOAR – or even the more obscure HDR or ROAR – shroud the cybersecurity industry in secrecy and complexity, making it inaccessible for the average consumer. Even more baffling is that analysts, practitioners, and vendors have different definitions of each acronym, which makes it nearly impossible to understand what products you need.
IT Management
AiThority - Emotional AI: How Cultural Factors Influence Gen Z Attitude Toward Technology
Today, we have developed AI-driven augmentative machine intelligence tool to understand and analyze human emotions using non-verbal cues in the most effective manner. However, the unregulated nature, increasing risk of biases and a lack of re-calibration for cultural differences makes it important to understand its acceptability among Generation Z, the demographic most vulnerable to it.
Artificial Intelligence
ITProToday - Tech Job Market Robust, Unemployment Rate at Historic Low
An analysis from CompTIA of data from the U.S. Bureau of Labor Statistics found tech occupations across all industry sectors increased by nearly 240,000 positions in July, and IT industry employment has jumped by 143,700 jobs this year, an increase of 55% year-over-year. The analysis also found that the tech jobs unemployment rate fell to 1.7%.
Tech Jobs
VentureBeat - Twitter and TikTok’s data privacy controversies show the dangers of third-party apps
Out of all the revelations emerging about big tech’s management of users’ personal data, TikTok’s suspected use of keystroke tracking or keylogging is perhaps the most shocking.
Data Privacy
ITProToday - Digital Transformation, Cybersecurity, IT Staffing Top C-Suite Concerns
Meanwhile, 58% of corporate leaders said they would benefit most from enhanced reporting around cybersecurity and technology, and nearly half of survey respondents plan to increase their investments in IT security and privacy.
IT Management
VentureBeat - Data privacy truly matters to your customers. It’s time to make it a core business value
Regulatory compliance isn’t enough to win over consumers. In fact, consumers have little interest in the regulatory fine print: According to the survey, over three-quarters of people have never heard of the General Data Protection Regulation (GDPR), while 9 out of 10 people haven’t the foggiest idea what the Virginia Consumer Data Protection Act (VCDPA) is.
Data Privacy
ITProToday - Ransomware Security for IT Pros: 2022 Report
This Tech Insights report features articles on developing ransomware security programs, detecting attacks when they are underway, and how to deal with infections when they happen.
Security
VentureBeat - Are virtual collaboration tools a necessary evil for enterprises? How to mitigate the risk
But with their advent and explosion in growth, it’s been made abundantly clear that these tools pose significant security risk. Organizations face a conundrum in preventing data exposure and misuse while also diligently tracking communication and, in regulated industries, ensuring compliance.
Automation & Productivity
AiThority - Google Revises its SEO-first Algorithm to Filter out “Bad Quality” Content
Google announced the launch of “helpful content update” to update Search with fine quality content. This would associate with quality and informative content and not necessarily evaluate content based on its traditional SEO-centric algorithms. Which means content writers and marketers can no longer push SEO-driven content to rank higher on the Search and gain malicious advantage on SERPs
Automation & Productivity
VentureBeat - Report: 65% of IT leaders are investing in unstructured data analytics
Enterprises are storing more data than ever. How much? According to the Komprise 2022 Unstructured Data Management report, more than half are managing 5 petabytes or more of data compared to less than 40% in 2021. Most (68%) are spending more than 30% of their IT budget on data storage, backups and disaster recovery.
Data & Analytics
AiThority - Emotional AI: How Cultural Factors Influence Gen Z Attitude Toward Technology
New models are developed for machine learning, human-computer interface, creative arts/ web 3.0, human health, mobile gaming, perceptual information retrieval, text analytics, document processing automation, and wearable computers or connected devices/ the Internet of Things (IoT).
Artificial Intelligence
VentureBeat - Skyrocketing AEC data pushes need for data governance best practices
“While this is in line with other industry reports, the fact that, on average, our customers have nearly quadrupled their data storage – from 0.9 TB in 2017 to 3.5 TB in 2021 – is a rather striking indication of how AEC firms have become data companies.”
Data Management
VentureBeat - Grow up: 5 reasons why many businesses are still in ‘AI adolescence’
While the “AI adults” (dubbed Achievers in the research) are only a small group — representing 12% of companies — they are reaping big rewards: By outperforming their peers on AI, they are increasing their revenue growth by 50% on average.
Artificial Intelligence
Computerworld - Android, ChromeOS, and the future of app discovery
To wit: Chromebooks today offer a full-fledged desktop-caliber web browsing environment. They let you install progressive web apps, Android apps, Linux apps, and even Windows apps, if you really want to get wild.
Automation & Productivity
VentureBeat - APIs and zero trust named as top priorities for CISOs in 2023
Consolidating their organization’s tech stacks, defending budgets and reducing risk are three of the top challenges facing CISOs going into 2023. Identifying which security technologies deliver the most value and defining spending guardrails is imperative.
Security
Threatpost - Ransomware Attacks are on the Rise
Hiveleaks and BlackBasta are the result of that restructuring. Both groups are “associated with Conti,” the authors noted, Hiveleaks as an affiliate and BlackBasta as a replacement strain. “As such, it appears that it has not taken long for Conti’s presence to filter back into the threat landscape, albeit under a new identity.”
Security
VentureBeat - Solve the problem of unstructured data with machine learning
Advancements in ML technology now enable organizations to efficiently process unstructured data and improve quality assurance efforts. With a data revolution happening all around us, where does your company fall? Are you saddled with valuable, yet unmanageable datasets — or are you using data to propel your business into the future?
Data & Analytics
eWeek - Leading Enterprise IT Vendors 2022
Tableau’s natural language processing capabilities received a huge boost thanks to the firm’s 2021 acquisition of Narrative Science. Narrative Science’s technology automatically analyzes, builds, and communicates data insights in a narrative format, which can make the data easier to understand for many users.
Automation & Productivity
VentureBeat - McKinsey report: Two AI trends top 2022 outlook
Applied AI, considered by McKinsey as based on proven and mature technologies, scored highest of all 14 trends on quantitative measures of innovation, interest and investment, with viable applications in more industries and closer to a state of mainstream adoption than other trends.
Tech Trends
SiliconANGLE - Twilio and Cloudflare hackers have now breached 130 organizations
According to Group-IB, the attacker’s initial objective was to obtain Okta identity credentials and two-factor authentication codes from users of the targeted organizations. With this information, the attackers could gain unauthorized access to any enterprise resources the victims had access to.
Security
VentureBeat - Deep Dive: Why 3D reconstruction may be the next tech disruptor
Data-driven 3D modeling, or 3D reconstruction, is a growing computer vision domain increasingly in demand from industries including augmented reality (AR) and virtual reality (VR). Rapid advances in implicit neural representation are also opening up exciting new possibilities for virtual reality experiences.
Emerging Tech
The Hacker News - Cybercrime Groups Increasingly Adopting Sliver Command-and-Control Framework
"Given Cobalt Strike's popularity as an attack tool, defenses against it have also improved over time," Microsoft security experts said. "Sliver thus presents an attractive alternative for actors looking for a lesser-known toolset with a low barrier for entry."
Security
sdxCentral - Gartner Guides Cisco to ‘Responsible’ AI Governance
Almost all (96%) of respondents expect AI will help reduce risk and increase quality within their organizations, and business functions such as networking/cloud, IT infrastructure, and supply chain will benefit most from AI implementation.
Artificial Intelligence
VentureBeat - 3 ways cloud architects can boost their impact
It’s a basic rule of economics that any company, or individual, strives to get the most done with the least effort. So, start with what you have and build on it. There’s no need to reinvent the wheel. Use the wheels you have and start driving today. You’ll be able to get moving faster.
Cloud
Network World - Network availability: Are you your own worst enemy?
The biggest source of network complexity isn’t the proliferation of networks or devices. Enterprises connect about the same number of sites they did a decade ago, and the only place where the number of network devices has increased significantly in that period is the data center. The problem is layers of technology.  
Network Management
The Hacker News - The Rise of Data Exfiltration and Why It Is a Greater Risk Than Ransomware
Either way – public exposure of information can be a threat greater than ransomware because ransomware demand can be resolved by paying up (or by retrieving backups). Leaked information – well – that's something that may be unfixable. It's easy to see why threat actors can find extortion based on information leakage to be an even more attractive target than mere ransomware
Security
sdxCentral - IDC Pushes Consumption Models for IT Sustainability
In the like-minded vendor selection process, IT organizations are looking for vendors that have sustainability initiatives built into their own operations, and they want to truly understand that vendor’s sustainability journey to see what others have been through and if they’re really on the same path.
Sustainability
VentureBeat - Can NIST move ‘trustworthy AI’ forward with new draft of AI risk management framework?
“Security leaders can also leverage the six characteristics of trustworthy AI to evaluate purchases and build them into Request for Proposal (RFP) templates,” Holland said, adding that the model could “help defenders better understand what has historically been a ‘black box‘ approach.”
Artificial Intelligence
sdxCentral - Blockchain Use in Health Care to Generate $16.3B by 2031
Furthermore, the report found that pharmaceutical and medical device companies dominated market growth last year with $241.85 million owed to the “replacement of [a] traditional system with blockchain.” The health care payers’ segment also saw its highest CAGR [41.4%] during the “blockchain in health care market forecast period.”
Blockchain
Network World - What are data centers? How they work and how they are changing in size and scope
Experts have been predicting that the on-premises data center will be replaced by cloud-based alternatives, but many organizations have concluded that they will always have applications that need to live on-premises. Rather than dying, the data center is evolving.
Data Management
VentureBeat - Why Apple products are more vulnerable than ever to security threats
Last week, on August 17, Apple announced that it had discovered two zero-day vulnerabilities for iOS 15.6.1 and iPadOS 15.6.1. The first would enable an application to execute arbitrary code with kernel privileges, the second would mean that processing maliciously crafted web content may lead to arbitrary code execution.
Security
Datanami - KX: U.S. Businesses Could Gain $2.3T in Total Revenue with Real-time Analytics
 The manufacturing industry alone could benefit from nearly $1 trillion after implementing real-time data, and revenues within the finance and insurance sector could increase by nearly $637 million.
Data & Analytics
VentureBeat - The emergence of the chief automation officer
The CAO will be responsible for implementing business process and IT operations decisions across the enterprise to determine when and what type of automation strategy is best suited for each business imperative while working with a wide range of leaders across all business pillars
Automation & Productivity
sdxCentral - GitLab Survey Shows Dev-Sec Tensions Amid Shift-Left Push
GitLab found 57% of security team members claim their organization has already shifted left or plans to this year, and one-third of security teams are planning a shift left more than two years from now. In addition, the survey found security is the top investment area for 2022, with cloud computing in second place.
Security
Network World - What is CXL, and why should you care?
If you purchase a server in the next few months featuring Intel’s Sapphire Rapids generation of Xeon Scalable processor or AMD’s Genoa generation of Epyc processors, they will come with a notable new function called Compute Express Link (CXL)—an open interconnect standard you may find useful, especially in future iterations.
Automation & Productivity
VentureBeat - How cybersecurity vendors are misrepresenting zero trust
The zero-trust vision that cybersecurity vendors are selling isn’t the reality enterprises are experiencing. The disconnect begins during initial sales cycles, where the promises of ease of use, streamlined API integration and responsive service lead to enterprises buying solutions that don’t work. Unfortunately, enterprises are getting more challenges than the vision vendors sold.
Security
sdxCentral - Lookout CTO: Single-Vendor SASE Will Take Years
“Instead of moving all these point security products to the cloud one at a time, people are looking for platforms that can solve vendor consolidation, improve the bottom line, and deliver the whole security as a service,” he told SDxCentral.
Security
Datanami - Accenture Releases Life Sciences Technology Vision 2022 Report
According to the report, life sciences leaders (91% of medical technology executives and 85% biopharma executives) expect the metaverse to have a positive impact on their organizations and nearly half of the biopharma executives surveyed believe the metaverse will have a breakthrough or transformational impact on their organizations.
Metaverse
VentureBeat - The shift to the cloud could be costing businesses more than it’s saving
The market is down, companies are looking to cut costs, and many are reassessing their cloud spending. But cloud reliance is so vital to business continuity today that many organizations are reluctant to touch their often-bloated cloud budgets, even if they know there is fat to trim.
Cloud
VentureBeat - Report: 78% of data management pros struggle to identify cloud data
More than eight in 10 data management decision-makers (82%) cite forecasting and controlling costs as a data ecosystem challenge. Usage-based pricing models that coincide with cloud computing introduce month-to-month cost variability. What was once meticulously planned and budgeted on-premises, is now unpredictable.
Data Management
Computerworld - Collaboration application spending grows in the face of economic uncertainty
The growth extends across all the collaboration markets and submarkets identified by IDC. These include team collaboration applications, like Slack and Microsoft Teams; conferencing applications, such as Zoom, Webex, and the conferencing portions of Google and Microsoft Teams; enterprise application platforms, such as Khoros and Salesforce; virtual events, such as Cvent and On24; and email.
Automation & Productivity
VentureBeat - Conversational AI chatbots: 3 myths, busted
“I think it’s partly because there’s still an awful lot of salespeople and people in the media who portray conversational AI as if it’s magic,” she said. “As if just by designing a conversational bot, all your dreams will come true.”
Artificial Intelligence
Blocks & Files - Bocada says automated BackupOps is coming
The report says that while just over half of backup operations take place on-premises today, backup professionals expect over 60 percent of these operations to move to the cloud within the next three years. As organizations transition to cloud-only or hybrid-cloud environments, there is an acknowledgement that backup oversight must transition there as well.
Data Management
VentureBeat - Privacy, personalization and advantages of first-party data
When it comes to understanding and relating to these customers the opportunity for natural, intuitive voice AI as a channel is enormous. But the stakes are high, and responsibility for personalization and privacy should not be left to another business.
Data Privacy
sdxCentral - Daily Roundup: Ransomware Variants Double in 1H 2022
As threats continue to evolve, there is evidence that the spread of wiper malware as part of adversary toolkits is increasing. Wiper malware trends are more destructive and sophisticated attacks that destroy data by wiping it clean.
Security
VentureBeat - Cloud security: Increased concern about risks from partners, suppliers
Also troubling, 43% of respondents said that protecting customer data was their primary cloud and web security objective for 2022 — yet just 36% had dedicated DLP solutions in place.
Cloud Security
Blocks & Files - Mainframers are keeping tape as they add cloud backup, archive storage
Also the data stored in the clouds is in tape image format, even though some of the users do not have tape on premises: “Interviews indicated that even though some are not using tape, they are still using tape images stored on disk-based systems such as an IBM TS7700 system. The commentary about moving away from operational practices around tape or tape images was that it would be very difficult to change.”Data Storage
GeekWire - How Microsoft’s AI convinced me to switch to Edge, and where the browser still falls short
Significant improvement in voice quality: But the grabber for me is the increasing authenticity of some of the Microsoft voices: the inflections, the pauses, the lack of the tell-tale robotic vocal fry.
Automation & Productivity
VentureBeat - Report: Cloud-adoption success depends on IT’s relationship with business
Of those who ranked themselves as equal partners to the business, a majority (68%) said they experienced the most increased speed-to-market from cloud adoption. On the other side of the spectrum, IT firefighters were most likely to cite budgets and funding (41%) and executive buy-in (31%) as challenges in their cloud adoption journey.
Cloud
Datanami - DataStax Releases ‘State of Data Race 2022’ Report
The report revealed that the data race is not only heating up, but rapidly shifting toward real-time data—the data that powers in-the-moment use cases such as recommendations and personalization, or always-up-to-date inventory and logistics.
Data & Analytics
VentureBeat - Report: 94% of CDOs believe data privacy technology increases revenues
Every day we generate 2.5 quintillion bytes of data; it’s up to chief data officers to determine its value and opportunities for strategic growth. If a business can manage its data, as well as collaborate with other businesses in a secure and compliant way, the opportunity for improved outcomes is immense.
Data & Analytics
Network World - 7 ways to fight network tool sprawl
Tool sprawl occurs when organizations acquire licenses (or not, in the case of open source) for multiple tools that tackle related, but not completely overlapping, issues. Layered security is the most obvious example of this, but the problem bedevils networking, DevOps, cloud teams, etc.
Network Management
Datanami - Mezmo Reports DevSecOps Brings Significant Results Despite Low Adoption
According to the study, only 22% of respondent organizations have developed a formal DevSecOps strategy integrating security into software development lifecycle (SDLC) processes, but an overwhelming percentage of those report a positive impact on accelerating incident detection (95%) and response (96%) efforts.DevOps
Network World - Cloud environments challenge network visibility 
EMA defines a network-visibility architecture as an overlay of traffic mirroring, aggregation, and distribution tools that delivers network traffic data to other systems. It captures packet data from the cloud and on-premises networks and feeds it to security tools and performance analysis systems, such as intrusion detection or application performance-management software.
Cloud
VentureBeat - Nearly half of enterprises operate with only a ‘limited’ product data strategy
 In the last 12 months, only 33% of the lot saw faster time-to-market as against 52% of advanced companies. The levels of innovation (51% vs. 63%), employee productivity (50% vs. 62%), and manufacturing efficiency (41% vs. 58%) were also lower.
Data & Analytics
Network World - Enterprise adoption of smartNICs faces challenges
The Ethernet controller and adapter market will grow from $3.2 billion in 2021 to $5 billion in 2026, with smartNICs contributing significantly to the growth, according to Dell’Oro Group. In addition, server network connectivity will transition to higher speeds, according to the research firm, which predicts 100 Gbps and higher-speed ports will account for 44% of the shipments in five years.
Network Management
VentureBeat - Black Hat 2022 reveals enterprise security trends
Infrastructure, devops, and enterprise software vulnerabilities discovered by researchers made the enterprise-specific sessions worth attending. In addition, improving identity access management (IAM) and privileged access management (PAM), stopping ransomware attacks, reducing Azure Active Directory (AD) and SAP HTTP server attacks, and making software supply chains more secure dominated the enterprise sessions.
Security
sdxCentral - Mendix, Microsoft, Outsystems Among Low-Code Market Drivers
As enterprises seek agility and adaptability, many are pairing centralized application investment with owning their own app development and data analytics tools. And low-code platforms are an obvious answer to this “business appetite for technology self-service,”

Tech Trends
VentureBeat - Report: Hacking is the top cause of data breaches
Insider risk is a perennial topic of discussion. Is the insider threat fact or fiction? The answer is not a simple yes or no. Of the breaches with a confirmed origin, only 23% of incidents originated from within the victim organization and of that figure, the majority, 61%, were attributable to data handling mistakes.
Security
AiThority - XDR Momentum Grows as Industry Calls for Solution to Common Security Challenges
CISOs look to XDR, especially advanced threat detection, to improve security efficacy. They also want XDR to streamline SecOps and bolster staff productivity to alleviate staff shortages.
Security
VentureBeat - 10 blockchain startups to watch
Gartner predicts the business value generated by blockchain will increase, reaching $176 billion by 2025 and $3.1 trillion by 2030. In addition, Grand View Research estimates the global blockchain technology market will grow at a rate of 85.9% between 2022 and 2030.
Blockchain
ZDNet - Hackers are finding ways around multi-factor authentication. Here's what to watch for 
Another method cyber criminals can exploit to bypass MFA is by using malware which actively steals codes. For example, the hackers could gain access to an account by using trojan malware to watch a user gain access to their account, then use the access they have from the infected device to go about their business.  
Security
VentureBeat - Fears of AI sentience are a distraction
The artificial intelligence (AI) and machine learning (ML) programs that underpin chatbots are capable of extraordinary achievements, of which we have only seen the very tip of the iceberg. But putting themselves in the shoes of human beings — and feeling their feelings — is not among their current, or likely future, achievements.
Artificial Intelligence
VentureBeat - The problem with our cybersecurity problem
We need a new approach, and lessons from a generation ago can point us in the right direction. Back then, cybersecurity professionals created disaster recovery and business continuity plans, calculating downtime and its disruptive effects to justify investment in a holistic approach. We can do that again, but it will require less focus on tools and more clarity of purpose.
Security
eWeek - Citrix vs. VMware: VDI/DaaS Comparison 2022
DaaS provides virtual desktop services as well as applications that are aimed at enabling a seamless remote workforce, allowing organizations to raise productivity and efficiency and heighten security, and to remove many of the complexities involved in VDI. Instead of managing the underlying hardware in the data center, those functions can be pushed into the cloud and handed off to an external provider.Automation & Productivity
VentureBeat - Why edge is eating the world
An architecture pattern that lends itself nicely to these constraints is Serverless. Instead of hosting a machine yourself, you just write a function, which then gets executed by an intelligent system when needed. You don’t need to worry about the abstraction of an individual server anymore: you just write functions that run and basically scale infinitely.
Edge Computing
sdxCentral - Splunk: Zero Trust 'Critical' in a Permissionless World
Evolving the way companies think about their networks, Shelton continued, comes down to categorization for zero-trust access (ZTA) – pillars of identity, devices, network, applications, and data. Businesses can mature these pillars independently as their security controls grow to develop sophisticated amounts of visibility, analytics, automation, and governance.
Security
InformationWeek - 10 Creative Ways to Slice IT Costs
“Define product-centric IT and cloud budgets, including business and IT4IT products, and align all business processes, applications, infrastructure, people, and technologies to these products. This way, you can invest in the areas that enable higher business value while implementing mechanisms to control costs in other areas through automations and DevSecOps,” says Kulkarni.
IT Management
VentureBeat - Report: Data engineers spend 2 days per week firefighting bad data quality
Respondents reported that on average, 40% of their time is spent evaluating or checking data quality. Additionally, more than half of respondents ranked building or fixing pipelines as taking the most amount of their time throughout the day.
Data & Analytics
Network World - How many jobs are available in technology?
Tech industry employment saw a net gain of 12,700 workers, the 20th consecutive month of growth. So far this year, the tech sector has gained 143,700 jobs, an increase of 55% year-over-year, according to CompTIA.
Tech Jobs
VentureBeat - How cross-operational teams can improve security posture
In a new research study commissioned by data management company Cohesity, 81% of respondent IT and security operations (SecOps) decision makers agreed that, at the very least, IT and SecOps should share the responsibility of their organization’s data security strategy.
Security
SiliconANGLE - Top takeaways and analyst insights from the Supercloud 22 event 
Another hotly debated topic was if there will be one supercloud to rule them all or many different superclouds created to meet the unique needs of an organization or industry. Open-source and proprietary models are facing off, as Snowflake Inc. and Databricks Inc. demonstrate two very different approaches to creating a supercloud.
Cloud
VentureBeat - Twilio and Cisco breaches highlight the dangers of social engineering attacks
During the attack, hackers created an SMS phishing scam (or smishing attempt), which impersonated Twilio’s IT department and warned employees that their passwords had expired or needed to be changed.
Security
sdxCentral - Don't Use Bug Bounties as ‘Botox’ to Cover Internal Security Flaws
“Because what you will find is that at about the 18-month or two-year mark of running a bug bounty program internally you will lose key people and the program will collapse under its own weight,” Moussouris said.
Security
AiThority - Online RL-based DayDreamer can Train a Robot without New Machine Learning Algorithms and Simulation
The pace at which the Dreamer learns so quickly and outperforms other models can be attributed to its simple pipeline for Online RL, its immaculately designed robot hardware without simulators and enhanced interaction between its supervised learning-based world model and neural networking policy
Automation & Productivity
Network World - Cisco embraces multi-cloud networking software
“MCNS products address traffic routing, secure ingress/egress and integrate with available public cloud services," Gartner wrote. "These products are delivered as software, which can be self-managed and/or delivered as a service, and are accessible via application programming interfaces (APIs) and user interfaces (UIs).
Network Management
AiThority - New AI Facial Recognition and Emotion Detection Solution Powered by Intetics
Emotion AI products and solutions are incorporated into many industries to help deliver an emotionally rich experience. It can aid in the diagnosis of mental and neurological disorders in healthcare. Help educators engage students more in the lessons they are teaching. Assist talent acquisition specialists in locating the best prospects for hiring.
Artificial Intelligence
VentureBeat - Rising cloud spending may not signal the end of traditional infrastructure
In a survey of respondents using mainframe technology, 80% of IT professionals said mainframe technology remains critical to business operations. Enterprise organizations have layer upon layer of technology that has accumulated over time, in an intricate web of applications and processes that support their business.
Cloud
sdxCentral - Chris Krebs: Cybersecurity Will be ‘Near-Term Bearish, Long-Term Bullish’
Technological innovations will collect and generate more data, along with the cloud migration, which makes cyberspace become an “unthinkable complexity.” At the same time, ransomware has gone professionalized and the number of threat actors is exploding.
Security
VentureBeat - 9 common data governance mistakes and how to avoid them
Simply put, a strong data governance program has clear rules and guidelines for how data should be created or gathered, stored, protected, accessed, used and shared. It’s as much about human activity as it is about technology processes.
Data Management
AiThority - Sisense Research Reveals Critical Barriers Preventing Data Analytics Adoption Across APAC
According to the Future of Data Analytics Report 2022 – Asia Pacific Edition, almost two-thirds (61%) of respondents are concerned about data transmission. Respondents also shared effective analysis of data (58%) and inadequate systems in place to manage risk (58%) are a concern.
Data & Analytics
VentureBeat - Why managed detection and response (MDR) adoption is growing among small businesses
As a result, Forrester research found that 64% of SMBs running an SOC internally or in a hybrid internal/external model have ten or fewer employees operating their SOC, with 32% running one with five or fewer employees. In addition, while 81% of SMBs surveyed are monitored by an internal security operations center (SOC), more than half (57%) do not operate 24 hours a day, seven days a week.
Security
SiliconANGLE - Gartner to enterprises: Keep tabs on these 25 emerging tech trends 
These new technologies are mostly centered on innovations that stem from blockchain and cryptocurrency, and include the metaverse, nonfungible tokens, super apps, Web3, decentralized identity, digital humans, digital twins of customers and internal talent marketplaces.
Emerging Tech
VentureBeat - 10 top artificial intelligence (AI) solutions in 2022
The AI software market includes not just technologies with built-in AI processes, but also the platforms that allow developers to build AI systems from scratch. This could range from chatbots to deep and machine learning software and other platforms with cognitive computing capabilities.
Artificial Intelligence
Datanami - Monte Carlo Survey: Data Engineers Spend Two Days Per Week on Bad Data
Worse, 58% said the total number of incidents has increased somewhat or greatly over the past year, often as a result of more complex pipelines, bigger data teams, greater volumes of data, and other factors.
Data & Analytics
VentureBeat - Network misconfigurations cost organizations 9% of annual revenue 
The report also found that organizations were failing to effectively address misconfigurations due to inconsistent auditing activity. In fact, most organizations are only auditing their devices annually, with switches and routers checked for misconfigurations in 96% of cases, an approach best described as risk assessment by sampling.
Network Management
SiliconANGLE - Supercloud may be the eventual solution to multicloud problems, say industry analysts 
So, while most companies may have multiclouds, each cloud operates in a silo, with separate development and operating environments, different APIs and primitives and so on. This means companies can’t benefit from cross-cloud functionality but do suffer from higher costs, security risks and friction in sharing data.
Cloud
Datanami - Appen Releases Annual State of AI and Machine Learning Report
According to the report’s findings, 51% of participants agree that data accuracy is critical to their AI use case. To successfully build AI models, organizations need accurate and high-quality data. Unfortunately, business leaders and technologists report a significant gap in ideal vs reality in achieving data accuracy.
Data Management
VentureBeat - Ransomware gangs move away from exploiting Microsoft Office macros 
Expel’s Quarterly Threat Report found that a macro-enabled Microsoft Word document (VBA macro) or Excel 4.0 macro was the initial attack vector in 55% of pre-ransomware incidents in Q1 of this year, but in Q2 that figure fell to 9%, a decrease of 46% after Microsoft’s decision to block macros by default.
Security
Network World - Just-in-time IT infrastructure: How to attain it for strategic advantage
Another key component of flexibility is portability. Environments that require three-months to migrate an application from one server to another just don’t cut it in the modern data center. The infrastructure should have enough abstraction built in that migrating a workload from one data center to another, or even temporarily to the cloud, is a simple matter of triggering the migration with a script or an import wizard.
IT Management
ZDNet - This company didn't spot the flaw in their network. But three ransomware gangs did 
According to analysis of the incidents, the first sign of suspicious activity occurred on December 2nd 2021, with an unknown attacker, possibly an initial access broker – a malicious hacker who breaches networks and sells access to other cyber criminals – establishing a remote desktop protocol (RDP) session on the organisation's domain controller for almost an hour.
Security
VentureBeat - Introduction to observability: What it is and why it’s important
If you were asked which of your microservices are experiencing the most errors, what the worst-performing part of your system is, or what the most common frontend error your customers are experiencing, would you be able to answer those questions?
IT Management
sdxCentral - Decentralization Haunts Security, Cloud Transitions
“Half the malware downloads we see originate from cloud apps, and attackers do that to bypass block lists to exploit trust,” Canzanese said. “Once they’re on the endpoints, we see them also using their own infrastructure, using cloud apps like Twitter, GitHub, Slack for command and control traffic as well.”
Security
Network World - Report: Cloud services can be made more resilient but at a premium
Enterprises have options for making cloud services more resilient but at a price premium of up to 111% over the base price of services that offer no protection, according to a study by Uptime Institute.
Cloud
VentureBeat - Artificial intelligence (AI) vs. machine learning (ML): Key comparisons
Within the last decade, the terms artificial intelligence (AI) and machine learning (ML) have become buzzwords that are often used interchangeably. While AI and ML are inextricably linked and share similar characteristics, they are not the same thing. Rather, ML is a major subset of AI.
AI/ML
SiliconANGLE - Complicated rivalry between Snowflake and Databricks spotlights key trends in enterprise computing 
The attention surrounding this burgeoning competition between the two data storage and analytics firms highlights the growing influence of superclouds, exemplified by companies like Snowflake and Databricks that provide an abstraction layer above and across hyperscale infrastructure. It is a rivalry that foreshadows a new wave of technology influencers as the two firms compete for control of the enterprise’s most important asset – data itself.
Data & Analytics
VentureBeat - Why the lack of metaverse integration in today’s VR ecosystem needs to be addressed
In short, these projects are designed to devise an unprecedented, new virtual world that is on a level equivalent to that of world-class gaming titles — all while mixing in key aspects of blockchain and crypto tech such as non-fungible tokens (NFTs), native cryptocurrencies, and a decentralized asset market.
Metaverse
AiThority - Hashed Emails – Not the Solution for the Post-cookie World
Some corners of the industry have turned to transacting directly on hashed emails as an alternative to cookies and device IDs. While this can be a shortcut to getting publishers and marketers started matching their datasets, the technique is lacking for a number of mission-critical reasons – it only works on direct deals, it is not security safe, it doesn’t give the publisher full control, and it’s not person-based
Marketing Tech
VentureBeat - Zeroing in on zero party data: Embracing privacy and personalization
The challenge is that many organizations have not previously depended on discovering and utilizing their own data sources, meaning they must develop new response strategies. These include allocating more resources to contextual marketing tactics, building zero and first-party data assets, and forming compliant second-party relationships.
Data & Analytics
VentureBeat - How digital twins are transforming network infrastructure: Future state (part 2)
The market for digital twins is expected to grow at a whopping 35% CAGR (compound annual growth rate) between 2022 and 2027, from a valuation of $10.3 billion to $61.5 billion. Internet of things (IoT) devices are driving a large percentage of that growth, and campus networks represent a critical aspect of infrastructure required to support the widespread rollout of the growing number of IoT devices.
Network Management
VentureBeat - How digital twins are transforming network infrastructure, part 1
Today, we’ll look at the current state of networking and how digital twins are helping to automate the process, as well as the shortcomings that are currently being seen with the technology.
Network Management
sdxCentral - Shift-Left Security Fails to Protect APIs, Salt Security Finds
While more than half (53%) of the surveyed professionals already prioritized identifying and remediating API security gaps during development and 59% of them look for API issues in testing, a large majority (94%) of them reported API security incidents, which indicate a need for increased runtime protection, the report pointed out.
Security
VentureBeat - Gartner research: 2 types of emerging AI near hype cycle peak
Frank says it is part of a larger trend called “influence AI” that “seeks to automate elements of digital experience that guide user choices at scale by learning and applying techniques of behavioral science.”
Artificial Intelligence
Network World - 802.11x: Wi-Fi standards and speeds explained
The following is an explanation of Wi-Fi standards broken into four sections: popular core standards, future standards that are still under development, standards that are designed for niche applications and historical standards that might not be in use anymore.
Network Management
VentureBeat - GraphQL is a big deal: Why isn’t it the industry standard for database querying?
Not only do apps send data to backends, but apps need data from the backend. For example, recommendations, the status of a delivery, account balances. And that’s what GraphQL is for: Getting data to and from the backend. It is a more modern API that connects apps to backends.
Data & Analytics
AiThority - Accessing the Full Power of Text Data as Part of Your Insights Framework
Most companies have huge amounts of text data and, for the most part, it is giving them little to no information. Free, or unstructured, text data is rampant across business ecosystems, containing vital insights from things like social media chatter, product reviews and customer feedback.
Data & Analytics
VentureBeat - What is data-warehouse-as-a-service (DWaaS)? Definition, key functions and solution providers
With the volume of enterprise data growing at a breathtaking pace (e.g., IDC projects a 23% CAGR to 175 zettabytes by 2025), the adoption of modern data infrastructure has become inevitable. Companies of all sizes and sectors are inevitably adopting more effective data solutions.
Data & Analytics
AiThority - Wipers and IoT Botnets Dominate the Threat Landscape
Since Russia began its invasion of Ukraine in February 2022, Nozomi Networks Labs researchers saw activity from several types of threat actors, including hacktivists, nation-state APTs, and cyber criminals. They also observed the robust usage of wiper malware, and witnessed the emergence of an Industroyer variant, dubbed Industroyer2, developed to misuse the IEC-104 protocol, which is commonly used in industrial environments.
Security
GeekWire - New report details cybersecurity challenges and strategies in the middle market
Even with the decline in reported attacks, companies recognize the risks in the current dynamic threat environment, with 72% of executives anticipating that unauthorized users will attempt to access data or systems in 2022, a sharp rise from 64% last year and the highest number since RSM began tracking data in 2015.
Security
AiThority - Public Cloud 5G Workloads to Grow at 88 percent CAGR, $4.6 Billion over Five Years, According to Dell’Oro Group
“Most of the HCP press releases are about HCPs adding network solutions for Enterprises that desire 5G device connectivity via a Hybrid Cloud at the edge location. Our projections are for Public Cloud revenues, not Hybrid Clouds at the edge of the networks.
Cloud
Blocks & Files - Gartner Backup and Recovery Magic Quadrant says hello to newbie
Commvault leads the rankings, closely followed by Veeam and Rubrik with Veritas in hot pursuit, followed by Cohesity also in close pursuit, and then Dell a little way behind. We note that Rubrik has been ranked as having the most Completeness of Vision and Veeam has  the highest Ability to Execute, while Commvault has the strongest balance between these two measures.
Data Management
VentureBeat - How automation is transforming security and compliance
It takes a combo of security — or the ongoing practices and policies that you put in place to care for your customers’ data and protect the integrity of your business — and compliance. That, and the associated standards, is what demonstrates your great security posture, especially as more standards emerge.
Automation & Productivity
Datanami - Tricentis Survey Reveals Majority of Organizations Recognize Value in AI-Augmented DevOps
The survey found that testing is where organizations are expecting the greatest value from AI-augmented DevOps, with nearly 70% of respondents rating the potential of AI-augmented testing as extremely or very valuable.
DevOps
threatpost - Securing Your Move to the Hybrid Cloud
The question then becomes: How can an organization maintain consistent governance, policy enforcement and controls across different clouds? And how can it ensure that it maintains its security posture when moving between them?
Security
Datanami - Gigamon: Deep Observability Forecasted to Grow From $278M to $2B by 2026
“Deep observability as an emerging, fast-growing market presents a significant opportunity for IT leaders to re-evaluate how they gain value from their digital tools."
Tech Trends
VentureBeat - Software is finally eating the physical world, and that may save us
As we create digital copies of our physical selves and our planet, we can begin building potential solutions to problems faster while testing them on our digital twins first. This will have profound implications in the quality of our lives – far beyond the changes wrought by software eating the digital world and giving us social media, “likes,” simpler travel and easier banking.
Emerging Tech
Network World - 3 places edge-computing challenges can lurk
Often, though, the model creates new redundancies that drive up costs—for instance storage. Instead of one central copy of each file, the edge network may keep a separate copy at each edge node. If your edge network is small, a few extra copies may be great for adding redundancy. But when you’ve got 200 or more edge nodes, your storage costs could be 200 times greater.
Edge Computing
VentureBeat - Insider risk: Employees are your biggest cyberthreat (and they may not even know it)
Today’s workforce is data-dependent and widely distributed. The use of cloud collaboration technology is sprawling. Data is highly portable, users are often remote and off the network, and file-sharing technology is widespread. It’s no wonder, then, that insider risk is of greater concern than ever.
Security
AiThority - Global Study Reveals Search-Powered Technologies are Driving the Future of Digital Business
The research illustrates how search-powered technologies—the tools that enable the search of data across multiple sources—fuel business-critical initiatives, including cloud migration and utilization, cybersecurity, and customer experience.
Automation & Productivity
Network World - Top IT vendors report good financials, onging supply woes
Gartner has reported that pre-pandemic, product lead times of four to six weeks were common. “Now, 200-300 days is common, and we’ve seen 430-plus days quoted in writing to customers. We expect lead times to remain high through early 2023, followed by slow incremental improvement over the course of months,” Gartner stated in a recent report.
IT Management
threapost - Universities Put Email Users at Cyber Risk
Ninety-seven percent of the top 10 universities in the United States, the United Kingdom and Australia are subjecting students, staff and administration to higher risks of email-based impersonation and other attacks because their systems lack basic security, according to new research from Proofpoint revealed Tuesday
Security
VentureBeat - IBM report shows healthcare has a growing cybersecurity gap
This year, 2022, is on pace to be a record-breaking year for enterprise breaches globally, with the average cost of a data breach reaching $4.35 million. That’s 12.7% higher than the average cost of a data breach in 2020, which was $3.86 million. It also found a record 83% of enterprises reporting more than one breach and that the average time to identify a breach is 277 days
Security
VentureBeat - Understanding the evolution of the metaverse for business
The metaverse is the next (not final) iteration of the internet where human interactions will be a combination of virtual, real-time, three-dimensional, and physical experiences. Our ways of working, creating, buying and consuming are already radically changing. The impact of the change will be deeper than the impact of the smartphone.
Metaverse
ZDNet - Reported ransomware attacks are just the tip of the iceberg. That's a problem for everyone 
According to ENISA, it wasn't possible to confirm whether a ransom was paid in 94.2% of all the incidents they analysed, something that the agency says "limits our understanding and thus our ability to perform a proper analysis and mitigate the threat of ransomware".
Security
VentureBeat - Bam! AI exits the Batcave to confront the jobs market
But it’s possible that AI could have the opposite effect and drive demand for skilled workers in new jobs. In this scenario, rote administrative work might indeed give way to algorithmic processes, but new opportunities are created for workers in data-intensive businesses.
Automation & Productivity
sdxCentral - Fiber Fuels Broadband Spend Boom, Dell’Oro Finds
“For over a decade now, broadband spending has been pretty predictable and relatively flat at a macro level,” he said. But now, “it’s as if the entire industry woke up and said, yes, now is the time to retrofit my broadband networks for the next 10 to 15 years.”
Network Management
VentureBeat - 3 things that need to happen for Web3 to (really) take off
 There is an ever-expanding list of Web3 startups, be it DeFi protocols, NFTs, decentralized autonomous organizations (DAOs), play-to-earn (P2E) games, data storage and social media services.
Web3
Network World - What is a WAN? Wide-area network definition and examples
Your office network, home Wi-Fi, cellphone, smartwatch, doorbell camera and vehicle-based Internet connection are just endpoints on a vast global WAN that is constantly evolving to carry more traffic, and to carrt that traffic faster as the demands for near-instantaneous access to resources increase.
Network Management
VentureBeat - What is supervised machine learning?
It is also an essential part of solving problems where there is no readily available training data that contains all the details that must be learned. Many supervised ML problems begin with gathering a team of people who will label or score the data elements with the desired answer.
Machine Learning
sdxCentral - Illumio: How Does Your Zero-Trust Score Stack Up?
“Zero Trust Segmentation pioneers are 2.7x more likely to have highly effective attack response processes in place, are 2.1x more likely to have avoided a critical outage during an attack over the last 24 months, and save (on average) $20.1 million annually in downtime costs.”
Security
VentureBeat - Afraid to delete data? Think again
Another issue with storing large amounts of obsolete data is that it clutters file servers, draining productivity. A 2021 survey by Wakefield Research found that 54% of U.S. office professionals agreed that they spend more time searching for documents and files than responding to emails and messages.
Automation & Productivity
SiliconANGLE - How the cloud is changing security defenses in the 2020s 
In this Breaking Analysis, we share our puts and takes from the recent AWS re:Inforce conference with an update on the latest hyperscale infrastructure-as-a-service market shares and insights from ETR survey data. We’ll also dig deeper into some technical aspects of Amazon Web Services Inc.’s Nitro, a system we believe is one of AWS’ secret weapons, with a focus on confidential computing and what it means for the future of systems architecture.
Security
Network World - Network security depends on two foundations you probably don’t have Before adding more layers to network security, con
The concept of a “role” is very useful in limiting the number of explicit connection permission policies an enterprise needs. However, it depends on two things. First, the role’s rights must be strictly set to ensure that nobody has access to things their job doesn’t justify. Having a hierarchy of roles can help by eliminating redundant policy statements. Second, the validation of user identity has to be strong, so that they’re assigned the correct role and so that someone with no role is given no access.
Network Management
Geekwire - New filing: Microsoft added record 40,000 employees in past year, up 22%, before job cuts
One notable effect of the growth is that Microsoft now employs more people in operations, about 85,000 employees as of June 30, than in product research and development, about 73,000 employees, according to its latest filing. The two job categories were of similar size inside the company until about two years ago.
Tech Jobs
VentureBeat - SBOMs: What they are and why organizations need them
According to the U.S. Department of Commerce, SBOMs should offer a complete, formally structured, machine-readable list of these components, as well as libraries and modules required to build the software, the supply chain relationships between them, and their given vulnerabilities.
Security
Datanami - Timescale Releases Third State of PostgreSQL Report
“By organizing and delivering the State of PostgreSQL report, we help developers and developer-centric companies and communities better understand what is happening with Postgres today: the different types of Postgres users, the kinds of use cases they are tackling, the places they go to share and learn, how that is all changing, and the opportunities for improvement in the Postgres community overall,”
Data & Analytics
VentureBeat - 5 top trends driving data infrastructure strategies, according to Gartner
“The cloud will be the top trend that underpins everything else. We’re seeing a shift in the market right now,” Ronthal said. He noted that last year was almost the tipping point away from on-premises, which is when 50% of revenue for the database management systems market goes to cloud providers. He expects 2022 to be the tipping point toward the cloud.
Cloud
SiliconANGLE - What recession? Tech spending stays robust as digital transformation plans forge ahead 
“This is the first post-‘as-a-service’ recession,” said Philip Carter, a group vice president at International Data Corp. “IT has moved from being capital to an operating expense. The [traditional spending] lumpiness isn’t completely removed but it’s much less of a factor.”
IT Management
AiThority - Blockchain Trends Disrupting IT and DevOps Industry
InterPlanetary File System (IPFS) is a project that combines storage and communication. IPFS is a fairly mature application with a developed ecosystem. It was one of the early applications that looked at blockchain in a new light.
Blockchain
sdxCentral - MEF Panel: SASE Standardization Is Critical for Convergence
But despite the chaos around what SASE and SSE parameters are exactly, the panel was in agreement that the convergence of networking and security is now critical.
Security
Threatpost - Phishing Attacks Skyrocket with Microsoft and Facebook as Most Abused Brands
According to the report by researchers at Vade, phishing attacks abusing the Microsoft brand increased 266 percent in the first quarter of 2022, compared to the year prior. Fake Facebook messages are up 177 percent in the second quarter of 2022 within the same timeframe.
Privacy & Security
VentureBeat - Who owns your data? Re-imagining data management for Web3
The lack of available user data harms small businesses, which rely on social media mammoths for information and algorithms to conduct effective advertising campaigns. Google seems to recognize this issue and appears willing to work with Meta to allow marketing data to be shared as it implements privacy changes.
Data Privacy
Network World - Edge data center market to double in next 5 years, researchers say
Edge data centers, which the report defined as “small data centers located close to the edge of a network”—that is, closer to the end-user than the public cloud—are currently a $9.3 billion global market, the researchers said, which they predict will nearly double in size in the next half-decade.
Network Management
VentureBeat - How edge computing is accelerating innovation across hardware, software and service provider domains
According to a report from AT&T Cybersecurity, 75% of security leaders are either planning, in the process of deploying, or have fully deployed an edge use case. This is largely attributed to the technology’s capacity to conserve bandwidth, speed up response times and enable data processing with fewer restrictions.
Edge Computing
Threatpost -Threat Actors Pivot Around Microsoft’s Macro-Blocking in Office
The use of macros-enabled attachments by threat actors decreased about 66 percent between October 2021 and June 2022, according to new data by Proofpoint revealed in a blog post Thursday. The beginning of the decrease coincided with Microsoft’s plan to start blocking XL4 macros by default for Excel users, followed up with the blocking of VBA macros by default across the Office suite this year
Security
sdxCentral - Personal Cloud Apps Drive Data Sprawl, Netskope Finds
Netskope released its latest Cloud Threat Report on data sprawl, examining how organizations use cloud apps to create, upload, share, and store data. The report found the number of cloud apps organizations use continues to climb – up 35% in the first five months of 2022.
Cloud
VentureBeat - What identity threat detection and response (ITDR) means in a zero-trust world
Identities are one of the most attacked perimeters an enterprise has, and the trend continues to accelerate. Cyberattacks aimed at bypassing identity access management (IAM) are succeeding, with cyberattackers moving laterally across enterprise networks undetected.
Security
SiliconANGLE - IBM Security report finds data breaches are costlier than ever before
Whether companies are exclusively to blame for lax cybersecurity is arguable, but many were found lacking in adopting cutting-edge and more modern security practices. Eighty percent of critical infrastructure organizations studied were found to have not adopted zero-trust strategies, seeing average breach costs rise to $5.4 million – a $1.17 million increase compared with those that do.
Security
VentureBeat - 75% of IT security professionals say they don’t get the support they need
Going further, 63% said that their company’s board still doesn’t fully understand identity security and the role it plays in enabling better business operations.
IT Management
ZDNet - Cloud computing use is growing, but so is regulation 
European firms are reaching a new scale of public cloud usage, with 92% of companies in the UK, France and Germany saying they have adopted cloud computing, with 78% reporting they use a hybrid cloud, and 75% using multiple public clouds mostly on US-made technology, according to research by analyst firm Forrester.
Cloud
VentureBeat - Report shows a third of employees don’t understand importance of cybersecurity
Research from Tessian released today found that while 99% of IT and security leaders agreed a strong security culture is important in maintaining a strong security posture, 30% of employees do not think they personally play a role in maintaining their company’s cybersecurity posture.
Security
Network World - Enterprise SSD prices are in for a drop
The cause is an oversupply combined with the threat of a recession, according to Taiwanese market research firm TrendForce. The firm said a combination of slowing demand across all segments of the NAND memory business, along with a reluctance to invest in additional capacity, has led to the glut.
Data Storage
VentureBeat - How to gain an unfair advantage over cyberattackers: “Mission control” cybersecurity
Most organizations cannot afford to employ full-time security operations center (SOC) analysts to handle the alerts generated by the myriad of products in their environment. As a result, infosec’s day-to-day work becomes an endless struggle of filtering through and responding to alerts, which distracts the team from focusing on implementing security processes, policies and controls to improve overall security posture and maturity.
Security
ZDNet - Your biggest cyber-crime threat has almost nothing to do with technology 
What makes BEC such a rich opportunity for scammers is there's rarely a need to be a highly skilled hacker. All someone really needs is a laptop, an internet connection, a bit of patience – and some nefarious intent.
Privacy & Security
VentureBeat - Data sovereignty: The hidden economic trade-offs
Thus, data sovereignty laws may compel organizations to store data locally even though it may cost more to do so. Storing many pockets of data in different countries may not only be more expensive, but it could significantly complicate data analysis and normal business processes.
Data Management
ZDNet - Digital presenteeism is creating a future of work that nobody wants 
According to a report by software companies Qatalog and GitLab, inequalities in workplace hierarchies and an abundance of remote-working tools are creating a "pervasive culture of digital presenteeism" that is damaging productivity and leading staff to work longer hours.
Automation & Productivity
VentureBeat - Designing the metaverse: Challenges and questions
As in the early days of Web2 with crowded websites and ads everywhere, there is the potential that disguised ads among other dark patterns can be mine traps in the metaverse, working to break the trust bond between the platform and the user. Even if we are able to avoid the dark patterns, the metaverse may still have elements continually pop into view, making it difficult to concentrate on a single action.
Metaverse
ZDNet - Regrets, they have a lot. Companies feel sorrow over big IT purchases 
What are the salespeople at tech companies thinking? Are they straining their every sinew to help companies buy the right technology for their actual needs? Or might many know a mark when they see one and be motivated only by the glorious maximality of the potential sale?
IT Management
sdxCentral - Trellix: U.S. Business Services Are Major Ransomware Targets
Telecom led the top 10 global customer sectors with 53% ransomware detection, followed by business services, media and communications, finance, and transportation and shipping.
Security
SiliconANGLE - Analysts see rise of the supercloud as creating a new chapter in enterprise IT 
A prime example of the supercloud principle in action can be seen in the growth of Snowflake Inc. The Data Cloud provider built its business on top of the AWS platform, and it has emerged as a powerhouse that now spans multiple clouds and supports distributed data at scale.
Cloud
VentureBeat - 3 reasons the centralized cloud is failing your data-driven business
Edge native, in comparison to cloud native, is built for decentralization. It is designed to ingest, process, and analyze data closer to where it’s generated. For business use cases requiring real-time insight, edge computing helps businesses get the insight they need from their data without the prohibitive write costs of centralizing data.
Cloud
Forbes - Why And How CIOs And CISOs Should Incorporate Storage Into Their Cybersecurity Strategies
"I’ve seen cybercriminals targeting primary storage and secondary, backup or disaster recovery storage with greater sophistication. Cybercriminals can take advantage of the company’s enterprise storage systems and do it in deceptive and sneaky ways."
Security
Datanami - AtScale Research Demonstrates Benefits of Using a Semantic Layer for BI & AI Initiatives
A semantic layer maps complex enterprise data into well-defined business metrics, creating a single, consistent, structured, integrated data product (dataset) ready for analysts and data scientists to consume. A semantic layer enables centralized governance while supporting distributed data product creation across teams.
Data & Analytics
eWeek - The Future of Artificial Intelligence
AI has become a prevalent piece of modern life. When you search something on Google, you’ll be dealing with its Multitask Unified Model (MUM) AI algorithm, the latest in a series of AI at the core of Google’s search engine. If you own Amazon’s Alexa or a similar home virtual assistant, you’ve brought an AI into your home.
Artificial Intelligence
sdxCentral - Broadcom Survey Shows Security Clash With User Experience
The survey found more than half of respondents prioritize security over the end-user experience, often doing so “at the expense of productivity and customer satisfaction.” Underscoring conflict between the two, 46% of respondents said they have bypassed security to improve user experience.
Security
VentureBeat - How simple data analytics can put your data to work before you are ‘ML Ready’
“I think a lot of CEOs, chief operating officers and CFOs with companies that have collected large volumes of data run into this issue, where everyone uses the same name for metrics, but the value is different depending on which data source they got it from. And that should almost never be the case,” he noted.
Data & Analytics
Network World - Network automation, SASE, 5G rank among enterprise priorities
“There are lots of applications consuming SaaS, public cloud workloads, private cloud workloads, off-prem workloads, and organizations have to figure out how they’re going to connect users to those workloads. You can't backhaul any more to your private data center, and then go out through your nice tidy DMZ to the internet. That is just a terrible experience for most people,” Anderson said
Network Management
VentureBeat - Forrester’s best practices for zero-trust microsegmentation
Of 14 microsegmentation vendors referenced in the report who tried to secure their private networks with limited segmentation, or by adopting a network access control (NAC) solution, 11 failed.
Security
Network World - The emergence of multi-cloud networking software
Multi-cloud networking software (MCNS), which is available from industry stalwarts like Cisco and VMware, as well as a slew of startups, is designed to address the challenge of how to safely and efficiently connect networks and applications across multiple public cloud environments.
Cloud
VentureBeat - Ransomware attacks drop 34% in Q2 but experts warn of potential ‘uptick’
While this is a welcome reprieve for security teams, the report suggested that the reason for the decrease is the reorganization of the Conti cyber gang and Lockbit’s release of its 3.0 ransomware-as-a-service (RaaS) offering.
Security
ZDNet - Banks have opportunity to plug digital identity gap in metaverse
Birch noted the lack of a global digital identity that was recognised regardless of where the individual was. Pointing to banks as potential players that could lead in this space, he said these financial services institutions already were experienced in Know Your Customer (KYC) processes.
Privacy & Security
VentureBeat - Report: 47% of orgs experienced a voice phishing attack last year
The majority of enterprises are unaware of the volume of unwanted voice traffic (phone calls) that traverses their voice network, or the significance of threats lurking in unwanted traffic — robocalls, spoof calls, scam calls, spam calls, spam storms, vishing, smishing and social engineering.
Security
sdxCentral - Is Twitter Underestimating Bot Activity?
Musk recently estimated that at least 20% of Twitter’s accounts are spam bots and admitted 20% is likely a low-ball percentage. And based on Woods’ research and industry experience, he estimates that more than 80% of Twitter accounts are actually bots.
Privacy & Security
VentureBeat - The current state of zero-trust cloud security
“Clearly what’s showing up time and again is that traditional legacy security tools are not working,” said Jawahar Sivasankaran, president and chief operating officer of Appgate, which today released the findings of a study examining pain points around securing cloud environments and the benefits of ZTNA.
Security
VentureBeat - Why more orgs are moving away from the big 3 public cloud vendors 
This was highlighted clearly in a new study released by Techstrong Research and Linode yesterday, which showed that while 93% of organizations use the top three cloud providers: Amazon Web Services, Microsoft Azure, and Google Cloud Compute, almost two-thirds are considering or are ready to buy from a trusted alternative cloud vendor.
Cloud
sdxCentral - SSE, SASE Revenues Snowball, Dell’Oro Finds
The Dell’Oro report also found firewall-as-a-service (FWaaS) and zero-trust network access (ZTNA) revenues cumulatively more than doubled. However, Sanchez attributed slower growth of secure web gateway (SWG) and cloud access security broker (CASB) revenues, which cumulatively grew just under 30%, to the already large share of the market the two technologies have occupied for years.
Security
Network World - 5 mistakes to avoid when implementing zero-trust
Cybersecurity vendors, sensing a big opportunity, have rushed to market an array of products labeled as zero-trust technologies. An informal survey that analyst firm IT-Harvest conducted of websites belonging to some 2,800 vendors showed 238 of them featuring zero-trust prominently.
Security
VentureBeat - Data quality now outranks security in new governance initiatives
A key takeaway is that the pursuit of high-quality data has overtaken data security as the most important motivator for data governance initiatives. Forty-one percent of IT leaders agreed that their business decision-making relies fundamentally on trustworthy, high-quality data.
Data Management
Network World - What is Wi-Fi 7, and will it replace wired Ethernet?
Wi-Fi 7 or 802.11be is the next Wi-Fi standard being worked on by the Institute of Electrical and Electronics Engineers that promises speeds of a whopping 46Gbps, nearly five times faster than Wi-Fi 6, as well as reduced latency.
Network Management
SiliconANGLE - Beyond the edge: Why SASE means improved security for your entire network 
SASE solutions offer a single place for managing policies, configuration and monitoring across the network. Creating a single-pane-of-glass visibility across the entire client-workload transaction simplifies management and allows teams to respond to threats with greater agility and effectiveness.
Security
sdxCentral - Palo Alto Networks, Cisco, Fortinet Top WAN Security Vendors, TeleGeography Finds
The research also found that almost all of the respondents who claimed they adopted zero-trust security had multi-factor authentication (MFA) in place. Other widely adopted features include single sign-on (SSO), remote user and device access policies, privileged access management, and user behavior analytics.
Security
SiliconANGLE - Answering the top 10 questions about supercloud 
It was a new architecture that integrates infrastructure, unique platform attributes and software to solve new problems that the cloud vendors in our view weren’t addressing by themselves. It seemed to us that the ecosystem was pursuing opportunities across clouds that went beyond conventional implementations of multi-cloud.
Cloud
VentureBeat - Digital accessibility: What to do when the data says you don’t exist
Incomplete data is almost inevitable given the analytical tools at our disposal. Typical tools track by traditional methods, including clicks and page views. Again this means that people who can’t access a product already won’t show up in the data.
Data & Analytics
ZDNet - As hiring freezes and layoffs hit, is the bubble about to burst for tech workers? 
As business leaders brace for surging inflation and higher costs, hiring and salary freezes are likely to follow – leaving emboldened tech workers feeling markedly less buoyant, and perhaps with less options in job negotiations than they have recently become accustomed to.
Tech Jobs
VentureBeat - How emerging tech can protect your customers’ data privacy
I believe the key to winning and maintaining confidence in your data protection capabilities includes your ability to secure both data and the applications that process it from the rest of your IT infrastructure. That way, even when your network is compromised, your data is not.
Data Privacy
Datanami - Equinix Global Tech Trends Survey Finds IT Leaders Planning for Growth Despite Recession Fears
In the US, the top five threats to business growth included security breaches and data leaks (73%), cyberattacks (68%), changing regulatory requirements around data privacy (67%), an explosion of data from adopting new technologies (67%), and downtime caused by infrastructure issues (65%).
IT Management
ZDNet - Data scientist: Industry reaches 'point of maturity' as specializations grow
In fact, Glassdoor had more than 10,000 data scientist job postings as of publication. The site also said data scientist is third on its list of 50 best jobs in America for 2022. Enterprise architect and full-stack engineer were in first and second place.
Tech Jobs
VentureBeat - What is the difference between a customer data platform (CDP) and a data management platform (DMP)? Definitions, collection methods and analysis best practices
While to the uninitiated they might sound like the same thing, there are important differences between the two and significant benefits of both. The main differentiators are their use, the types of data they collect, how personalized that data is and how long they retain that data.
Data & Analytics
Computerworld - How many jobs are available in technology?
“In our interviews, we have found that Wall Street has stopped hiring, and a number of job offers for recent IT college graduates have had offers that were extended pulled back,"
Tech Jobs
VentureBeat - 2022 cybersecurity forecasts predict growth, emphasizing resilience
AI adoption and sales within cybersecurity platforms are projected to grow from $10.5 billion in 2020 to $46.3 billion in 2026, attaining a 28% CAGR in the forecast period.  
Security
ZDNet - Endless cyber-threat pressure could leave security staff burnt out. Here's what you need to change 
The NCSC warns that organisations might find it difficult to maintain a strengthened cybersecurity posture for a long period of time, particularly because increased workloads for cybersecurity staff can "can harm their wellbeing and lead to lower productivity", which could result in a rise in "unsafe behaviours or errors"
Security
9 cloud jobs with the biggest salaries
From a survey of 778 cloud professionals, the study discovered that on average, salaries in cloud roles increased last year by 4.3%, and those who had participated in 40 or more hours of training in the past year received higher salary increases.
Tech Jobs
VentureBeat - Cybersecurity degrees: types, comparisons and best practices for selection
Anyone completing a cybersecurity course at a college can look forward to a rewarding and well-paid career. The median base salary for cybersecurity professionals in the U.S. is now more than $100,000 per year. That can rise in excess of $150,000 based on factors such as experience, possessing a master’s degree or promotions to executive or manager level.
Tech Jobs
SiliconANGLE - Gartner estimates PC sales to drop by almost 10% this year
As to why this is happening, Gartner blamed a range of factors, including the global uncertainty caused by conflicts around the world, rising prices from inflation and supply problems, lockdowns in China and also the fact that some products simply won’t be available.
Tech Trends
Network World - NaaS: Is it right for you, and how do you pick a vendor?
Enterprises have become comfortable switching from the purchase-and-refresh cycle for servers, storage and applications to a cloud-based as-a-service approach. So, why not take the same tack when it comes to the network?
Network Management
VentureBeat - Cyber threat analyst: Key job skills and expected salary
Cyber threat analysts are professional intelligence experts. They use scientific and technical skills to analyze and address cyber threats for defensive and remedial purposes. This article discusses the role of a cyber threat analyst, the expected salary and scales and some essential skills for a successful cyber threat analyst career.
Tech Jobs
Network World - IDC: Enterprises still moving workloads back from the cloud
A survey found that 71% of respondents expect to move all or some of their workloads currently running in public clouds back to private IT environments over the next two years. Only 13% expect to run all their workloads in the cloud, according to the survey sponsored by Supermicro.
Cloud
VentureBeat - Vulnerability management: All you need to know
Vulnerability management is an important part of cybersecurity strategy. It involves proactive assessment, prioritization and treatment, as well as a comprehensive report of vulnerabilities within IT systems.
IT Management
sdxCentral - SASE Exceeds Expectations, Study Finds
Secure access service edge (SASE) deployments are surpassing client expectations, especially in the areas of remote work connectivity, security performance, cost savings, visibility into the IT environment, and user experience.
IT Management
VentureBeat - 4 AI research trends everyone is (or will be) talking about
Their research discusses what they refer to as emergent abilities of large language models (LLMs). An ability is considered to be emergent if it is not present in smaller models but is present in larger models. The thesis is that existence of such emergence implies that additional scaling could further expand the range of capabilities of language models.
Artificial Intelligence
sdxCentral - ESG Service Spend Set to Surge, IDC Says
Many organizations have voluntarily reported their climate-related performance, such as scope-1 and 2 emissions and carbon intensity. In fact, Hewlett Packard Enterprise (HPE) fast-tracked its plans to be a zero-carbon company, chopping a decade off its original timeline.
ESG
VentureBeat - Zero-trust market shows signs of maturity at RSA 2022
CrowdStrike taking on the challenge of providing real-time telemetry data and long-term data archiving with Humio for Falcon and their launch of Asset Graph, which shows the vendors understand zero trust is about architectures and frameworks first. Real-time telemetry data is invaluable in building a zero-trust architecture.
Security
ZDNet - Ransomware attacks are the biggest global cyber threat and still evolving, warns cybersecurity chief 
Working alongside other law enforcement agencies, Cameron said that the NCSC is working to understand the criminal system that helps drive ransomware attacks – and how the nature of ransomware gangs and the techniques they're using to facilitate ransomware campaigns continue to evolve
Security
VentureBeat - Report: 63% of IT leaders say their orgs lack support for cloud resources
This is particularly burdensome for organizations that operate in multicloud or hybrid cloud environments. Fifty-eight percent stated that their organization experienced greater risk and incurred additional expenses and unnecessary costs due to the infrastructure capabilities, consequently limiting the ability to drive innovation.
Cloud
sdxCentral - Here's Why Mega Security Vendors Are Pushing the Platform Approach
As security teams are struggling with burnout and talent shortages, some of them are pivoting to work with fewer vendors in order to avoid overwhelming numbers of security alerts, tools, and management consoles. This is one of the major reasons why mega security vendors are touting their platform approach.
IT Management
Network World - How to reduce cloud costs
The good news is that there are many tools and services designed to help organizations manage and optimize cloud costs.  Tracy Woo of Forrester Research recently updated her report on this market segment. And Gartner has this list of 20 vendors under its “Cloud Management and Tooling” category.
Cloud
sdxCentral - Juniper: Enterprise AI Adoptions Surge, Enhancing Security Is Key
Almost all (96%) of respondents expect AI will help reduce risk and increase quality within their organizations, and business functions such as networking/cloud (25%), IT infrastructure (21%), and supply chain (15%) will benefit most from AI implementation.
Artificial Intelligence
VentureBeat - The psychology of phishing attacks
In addition, employees were more prone to error when fatigued, which threat actors regularly exploit. Tessian reported in 2021 that most phishing attacks are sent between 2 and 6 p.m., the post-lunch slump when employees are most likely to be tired or distracted.
Security
eWeek - 4 Challenges of the SOC: How Decision Intelligence Can Help
The report also revealed that 62% of respondents believe there aren’t enough staff on their cybersecurity teams, and 20% say it takes over six months to locate qualified individuals for vacant positions. There is now a 2.7 million-person cybersecurity skills gap in the world.
Security
VentureBeat - 3 reasons to consider adopting AI cybersecurity tools
While it’s not a silver bullet, AI is instrumental in detecting, preventing and responding to cyberattacks when paired with cybersecurity best practices — and it enables faster and more accurate security decision-making.
Security
SiliconANGLE - Tech spending intentions hold steady despite macroeconomic concerns 
Part of the reason for the spending levels are holding up is inflation. Stuff costs more so spending levels are higher, forcing IT managers to prioritize. Security remains the No. 1 priority and is less susceptible to cuts. Cloud migration, productivity initiatives and data projects remain top priorities.
IT Management
VentureBeat - Protecting the modern workforce requires a new approach to third-party security
In many cases, outsourcing to temporary workers or external partners makes good business sense. Sometimes, given the constraints of the talent pool, there’s simply no other option for a company. Either way, organizations should be aware of the security risks that third parties bring — and the steps they can take to minimize the chances of a breach occurring.
Security
AiThority - Startups Want Chatbots, but 80% Lack the Knowledge about Conversational AI
The survey says that 100% of startups think that chatbot’s integration is one of the most efficient ways to make their business more seamless. At the same time, the majority (almost 80%) mention that they are struggling with the development of chatbots and they are not well aware of how to implement chatbots, the survey says.
Automation & Productivity
VentureBeat - Malware and best practices for malware removal
Today, malware attacks are everywhere you turn, from web pages to emails to software downloads on computer systems to mobile devices. According to PurpleSec’s recent report, in a single week, more than 18 million websites are malware-infested.
Security
Network World - Private 5G promising for enterprises, but growth stymied by pandemic, lack of hardware
Price is also an issue. Since the hardware is new, the economies of scale haven't kicked in yet. And if a 5G project uses licensed spectrum, then there are the connectivity costs. "Do you want to be charged for every light or thermostat and pay for that connection?" Kindness says.
5G
AiThority - Could Instances of NLP Bias Derail AI?
The black-box nature of ML models can make it difficult to explain the decisions made by the models. Furthermore, models can overfit datasets or become overconfident and do not generalize well to unseen examples. However, in most cases, the dataset used for training and evaluation is the culprit for introducing bias.
Artificial Intelligence
Blocks & Files - Odaseva points out API bottlenecks in SaaS backup 
In the 2021 Evolution of Data Protection Cloud Strategies report from analyst firm ESG, 64 percent of IT decision-makers surveyed said that they are partially or fully responsible for backing up the data they have in SaaS applications. Of course, that leaves more than one-third (35 percent) who say they depend solely on their SaaS vendor to protect their organization’s data, which is far too high.
Data Management
Datanami - Expert.ai Recognized as a Strong Performer in Text Analytics Platforms Evaluations
The document-oriented Forrester report states that “…text analytics – technologies that mine data from enterprise documents – has become a critical enterprise capability….”
Data & Analytics
sdxCentral - Amazon, Microsoft, Google Drive Public Cloud Surge
The report found that those three players powered robust 36% growth in the infrastructure-as-a-service (IaaS) and platform-as-a-service (PaaS) public cloud segments, which hit $44 billion in revenues during the quarter.
Cloud
eWeek - Splunk vs. ELK: Log Management and Analysis Comparison 2022
Splunk and ELK are both excellent tools designed to solve a great many challenges related to security and performance monitoring. You can’t go too far wrong with either one. Both are strong in log management. Both offer fine analytics tools. Users rate both highly. In truth there is little to choose between them. Splunk gets the nod from Gartner, but that is understandable with ELK being open source.
Data & Analy tics
Blocks & Files - DNA data storage wants to standardize
This transformed data is encoded into short DNA fragments and packed inside some kind of container, such as a glass bead, for preservation. One gram of DNA can theoretically store almost a zettabyte of digital data – one trillion gigabytes. Such fragments can be read in a DNA sequencing operation. They are tiny and can theoretically last for thousands of years or more.
Data Storage
VentureBeat - How AI is quietly revolutionizing the back office
Not all back office processes are the same, however, and some will take to this new paradigm more quickly than others. The task at hand, then, is to determine which functions aren’t just the easiest to automate but will contribute most directly to the bottom line.
Automation & Productivity
SiliconANGLE - Wikibon: Enterprises must embrace real-time analytics 
“Real-time analytics is a prerequisite for transactional analytics, where the transaction applications issue real-time analytic queries. Wikibon believes that transactional analytics will profoundly simplify and automate business processes and dramatically improve costs, quality and customer satisfaction,” stated Floyer, who observed that “the author has yet to meet a senior executive who is happy with their traditional data warehouse.”
Data & Analytics
VentureBeat - Report: 84% of orgs experienced an identity-related breach last year
The IDSA found that identity security investments have emerged as a focal point with cloud, zero trust and digital transformation initiatives leading the way. However, basics such as MFA, de-provisioning, and privileged access reviews are still lacking.
Security
SiliconANGLE - Conquering ‘shadow IT’: How enterprises are trying to tame the cloud software beast 
It was eye-opening to see the number of active licenses attached to ex-employees or users who had never used the software at all, Wood said. “We’ve only had Zluri for a couple of months but I’d say we’ve saved $150,000 by eliminating shadow IT, pulling back on some services and not overbuying,” she said.
IT Management
ZDNet - Tech jobs: These are the 10 most in-demand developer, cybersecurity and cloud roles 
Information security engineers require good knowledge of Linux, UNIX, and Java systems, as well as knowledge of software writing, SSL, SSH, and SIEM systems. According to Glassdoor, the average salary for this role is $119,000.
Tech Jobs
VentureBeat - What Gartner’s top cybersecurity predictions for 2022-23 reveal
Implied in the predictions is advice to focus not just on ransomware or any other currently trending type of cyberattack, but to prioritize cybersecurity investments as core to managing risks and see them as investments in the business.
Security
ZDNet - 80% of organizations will have hyperautomation on their technology roadmap by 2024
The highest demand for automation came from research and development (39%), administrative/operations (38%), customer service (33%), and marketing (26%) teams.
Automation & Productivity
VentureBeat - Report: Orgs with zero-trust segmentation avoid 5 major cyberattacks annually
Most surprisingly, the report found that 47% of security leaders do not believe they will be breached — despite increasingly sophisticated and frequent attacks and rising zero-trust adoption rates (even though “assume breach” is a core principle of zero trust).
Security
Network World - Data archiving: It doesn’t have to be on tape
For most organizations that reach a certain size, standardized linear tape open (LTO) magnetic tape is the best choice. But for those that cannot justify the cost or believe tape is a thing of the past, there are three viable alternatives: object storage in the cloud, on-premises disk storage, and optical media.
Data Storage
VentureBeat - Why businesses take a month or more to deploy ML models and what you can do
But what many companies often don’t realize early on is that the initial stage must then be followed by another, arguably more challenging phase – deployment. This second stage involves moving the ready model to production, testing and fine-tuning it, and then scaling up accordingly.
Machine Learning
eWeek - It’s Time to Rethink Breach Management
 For example, it isn’t unusual for an organization to have data scattered across dozens of cloud services and SaaS applications. This might include AWS RedShift, Athena and DynamoDB; Azure Blobs and Azure SQL Database; and Google Cloud Storage and BigQuery. Elements might also extend into Oracle platforms, SaaS tools such as Salesforce, Slack and Workday, and various self-managed tools, apps and data warehouses.
Security
ZDNet - Metaverse: Momentum is building, but companies are still staying cautious 
"I do believe that one day business will commonly be conducted in a fully immersive 3D visual metaverse. But it will not happen in the 2020s. It probably won't happen in the 2030s."
Metaverse
Blocks & Files - Boffins design NAND and persistent memory in single SSD reference architecture
RDMA transfers are utilised by modern databases to accomplish this logging as fast as possible. The eight authors of a paper published in SIGMOD ’22, “X-SSD: A storage system with native support for database logging and replication”, think the current method is not portable, has a complex data path and low interoperability.
Data Storage
sdxCentral - Forrester: Gilded Age of Security Unicorns Has Ended
First, businesses should hire talent that the cyber unicorns are letting go of. More so, talent should not be ignored if they lack experience on a corporate cybersecurity team. The staffing and skills gap in the industry is large, and businesses should open their doors to hires from different organizations that most likely will have diverse backgrounds with ample experience from other regions, verticals, and people.
Tech Jobs
eWeek - Best Machine Learning Platforms 2022
Although ML is closely related to statistical analysis and data mining—and there are often overlaps across these disciplines—what sets ML apart is the ability to spot patterns, trends and properties that would otherwise go unnoticed or remain out of reach.
Machine Learning
VentureBeat - Creating a powerful data department with data science
Today, speak to any business leader and nearly all will say that data science is a critical focus for their organization. Yet the reality is they’re struggling — recent research shows many firms are unfit for data, for a myriad of reasons including organizational capability, lack of talent, poor quality data and collection processes, to name a few.
Data & Analytics
Blocks & Files - Veritas takes autonomous data management moonshot
Veritas’s strategy comprises developing autonomy features, adding virtual air-gapped protection in the cloud, and AI-based ransomware resilience. It wants to deliver protection, availability, and compliance within and across hybrid, private, and public clouds with subscription and as-a-service business models
Data Management
Datanami - GigaOm Benchmark Study Names SingleStore Best Database
The study revealed that SingleStoreDB delivers a 50% lower TCO against the combination of MySQL and Snowflake and a 60% lower TCO compared to the combination of PostgreSQL and Redshift, leading OLTP and OLAP database combinations that customers stitch together in an attempt to power SaaS, APIs and data-intensive applications.
Data & Analytics
VentureBeat - The truth about AI and ROI: Can artificial intelligence really deliver?
According to the 2022 IBM Global AI Adoption Index, 35% of companies report using AI today in their business, while an additional 42% say they are exploring AI. Meanwhile, a McKinsey survey found that 56% of respondents reported they had adopted AI in at least one function in 2021, up from 50% in 2020.
Artificial Intelligence
ZDNet - Information technology jobs and top careers
In May 2021, tech professionals earned a median salary of $97,430 per year, according to the U.S. Bureau of Labor Statistics (BLS). The BLS projects 13% job growth in computer and information technology occupations from 2020-30.
Tech Jobs
sdxCentral - Amazon, Microsoft, Google See Surging Serverless Interest
Datadog noted that Amazon Web Services’ (AWS) Lambda remains the benchmark for serverless usage, which is not surprising as Lambda was the genesis of the current serverless movement. Jumping off of Lambda, the report found that more than 20% of Lambda aficionados were using AWS’ Elastic Container Service (ECS) Fargate platform to “launch containers without managing and provisioning EC2 instances.”
IT Management
VentureBeat - ISC2 highlights how hiring practices can fix the cyberskills gap 
The report comes as cybersecurity professionals are demanding greater career development potential in their roles, with Pluralsight data showing that 48% of tech workers have considered getting a new job because they believe they did not receive enough upskilling opportunities.
Tech Jobs
VentureBeat - The intelligent way to detect fraud
More than 90% of executives surveyed recently cited fraud prevention as a key driver in the adoption of AI-enabled risk detection in the past year. Perhaps the primary advantage that AI brings to fraud detection is its ability to learn as it operates.
Artificial Intelligence
ZDNet - Cloud computing rush means big opportunities and big threats ahead
Then it's perhaps no surprise that cloud security is the fastest growing segment of the security market, with spending jumping from $595 million in the US in 2020 to $841 million last year, largely because companies are discovering that it's a more complicated topic than they realised.
Security
SiliconANGLE - As tech world weighs options for software supply chain security, a call for urgency
In early April, the FDA released draft cybersecurity guidance with a total product lifecycle approach for medical device manufacturers. Schwartz stated her belief that it was critical for device companies to provide a shared inventory of third-party components and has made it clear that the latest guidance will force medical equipment suppliers to address software supply chain security.
Security
Network World - 8 certifications to prepare for hybrid and multi-cloud 
Vendors target the certifications to the organizations they sell to. “For example, an infrastructure provider would target engineers and technicians in an infrastructure and operations organization, whereas a software development platform provider would target architects and developers in development organizations,” Lowery says.
Cloud
VentureBeat - Report: Over 1B Google Play downloads for financial apps targeted by malware
Researchers identified Teabot as the trojan malware targeting the largest number of mobile financial applications (410), followed by ExobotCompact.D/Octo (324). The most targeted banking application is “BBVA Spain | Online Banking,” which has been downloaded over 10 million times, and is targeted by six of the 10 reported banking trojans.
Security
sdxCentral - AWS, IBM, Cisco Lead Surging Cybersecurity Market
Oracle and Sophos slid one level lower than the big three, though still occupying the “established leaders” quadrant in the Juniper Research square. Micro Focus rode the border between that top level and a busy “leading challenges” grouping, which included a fistful of established players like Fortinet, Palo Alto Networks, and Splunk.
Security
VentureBeat - The attacker’s toolkit: Ransomware-as-a-service
The RaaS model allows the developers of a ransomware variant to recruit affiliates that exclusively use their ransomware in targeted attacks on organizations. Any ransom payments extorted out of the victims are then divided up between the ransomware developers and affiliate who conducted the attack.
Security
ZDNet - The data science and AI market may be out for a recalibration 
At the beginning of 2022, the first sign that something may be changing became apparent. As an IEEE Spectrum analysis of data released by online recruitment firm Dice showed, in 2021, AI and machine learning salaries dropped, even though, on average, U.S. tech salaries climbed nearly 7%.
Tech Jobs
VentureBeat - AI-powered legal ediscovery helps dig through data at scale
MarketsandMarkets estimates the global ediscovery market size to grow from $9.3 billion in 2020 to $12.9 billion by 2025. Driving that growth is a focus on proactive governance with data analytics; the emergence of new content sources; an increase in the amount of litigation across the globe; and an increase in electronically stored and social media penetration.
Data & Analytics
sdxCentral - Randori Acquisition is part of IBM’s Commitment to Security
In the past year alone, 69% of businesses have been compromised by unknown, unmanaged, or poorly managed internet-facing assets, he added.
Security
Datanami - Accenture: More Than 60% of Companies Are Only Experimenting with AI
 According to the research, AI maturity is the degree to which organizations outperform their peers in a combination of AI-related foundational and differentiating capabilities. These capabilities include the technology — data, AI, cloud — as well as organizational strategy, Responsible AI, C-suite sponsorship, talent and culture.
Artificial Intelligence
SiliconANGLE - New Zscaler report finds ransomware continues to run amok
The biggest threats identified in the report during that time period were double-extortion, supply chain attacks, ransomware rebranding, geopolitical incited ransomware attacks and ransomware-as-a-service.
Security
VentureBeat - 8 reasons ERP is back and on the rise
Throughout the years, the ERP companies have been folding in the best improvements to build something that is modern, service-oriented and completely integrated with every company’s stack.
Automation & Productivity
Datanami - Denodo’s Cloud Survey Finds Organizations Concerned About Managing New Cloud Systems
While organizations of all sizes and vertical markets are turning to the cloud to ensure flexibility and resilience in the face of these challenges, small to medium sized businesses have driven investment in cloud infrastructure services to support workload migration, data storage services, and cloud-native application development.
Cloud
VentureBeat - Report: 85% of digital builders would leave their job due to poor tech
Additionally, nearly two-thirds (65%) of respondents also said that the software and tools their company gave them to work with was a direct reflection of how they value them as an employee. Another two-thirds (66%) of digital builders also indicated that the software they use impacts their job satisfaction “a lot.”
Automation & Productivity
sdxCentral - Zero Trust Segmentation Saves Users $20M Annually, Illumio Found
90% of the respondents stated advancing zero-trust strategies is among their top three security priorities this year, and 39% of organizations’ annual budgets for security controls are aimed at advancing zero-trust initiatives, the report found.
Security
VentureBeat - For the metaverse to grow, mobile digital identities are necessary
I believe that the metaverse isn’t just a destination we reach through technological devices, but rather a digital identity we carry across platforms and experiences. It seems that regardless of how we define this concept, the role of digital identity remains a constant across all visions of the metaverse.
Metaverse
AiThority - Top Hardcore Skills Needed To Become a Blockchain Engineer
A blockchain engineer is a one-stop shop capable of designing, developing, analyzing, implementing, and supporting a distributed blockchain network. According to reports, blockchain jobs have increased by nearly 271% since 2020 and are expected to quadruple by the end of 2022.
Tech Jobs
Threatpost - Old Hacks Die Hard: Ransomware, Social Engineering Top Verizon DBIR Threats – Again
In general, the results of DBIR merely confirm well-established trends, such as the growing threats of ransomware – up 13% this year – and the inescapability of the “human element”, which was tied to 82% of all breaches.
Security
VentureBeat - How the privacy and data storage features of Web3 can empower society
From Web1 to Web2, we’ve made great strides in decentralizing data, empowering users to create content and share it via websites. That’s where the buck stops, as users do not own and control their data. Moreover, since big tech companies run Web2 for the most part, users do not know what genuine privacy and ownership feel like.
Web3
SiliconANGLE - Small is beautiful: Tech’s focus on enterprise customers is hurting innovatio
Even more urgently, only 11% of these business leaders believe their current business models will be economically viable through 2023, with 63% claiming their companies need to “build new digital businesses to help them get there.”
Automation & Productivity
eWeek - How to Guard Against the Biggest Cloud Security Threats
In a recent report, McAfee connected the rise of cloud breaches and the state of multi-cloud adoption. Their report found that, in recent years, nearly 70 percent of exposed records—5.4 billion total—were caused by unintentional Internet exposure due to misconfigured cloud services.
Security
Techstartups - Humans now only make up 38.5% of internet traffic – The other 61.5% is non-human (bots, hacking tools, others)
The Barracuda report reveals that automated traffic including bots and hacking tools takes up 64% of internet traffic. Of the 64%, 39% of all traffic was from bad bots while just 25% of automated traffic was made up of good bots, such as search engine crawlers and social network bots. Humans represent 36% of all internet traffic.
Automation & Productivity
Network World - Who is selling Zero Trust Network Access (ZTNA) and what do you get?
Gartner analyst John Watts says many organizations currently are implementing Zero Trust tactically as a VPN replacement approach. The primary use cases for these organizations are to enable secure access to internal apps for remote workers; to provide remote access for the extended workforce; and to provide secure access to users of privileged accounts
Security
sdxCentral - Gartner Crowns Amazon No. 1 Public Cloud As Microsoft, Google Gain Ground
Amazon Web Services (AWS) maintained its domination of the global public cloud services market in terms of market share and revenue growth in 2021. But rivals Google (No. 4) and Microsoft (No. 2) grew at a much faster rate than the longstanding cloud giant, according to Gartner, Inc.
Cloud
VentureBeat - CISOs say ransomware is the least concerning threat to enterprises
Fifty-one percent of the respondents in Proofpoint’s survey revealed an increase in attacks in the last 12 months and pointed to compromised insider attacks as the probable cause. The survey showed that 67% of respondents considered negligent insiders and compromised insiders to be the major causes of data loss in their organizations.
Security
Blocks & Files - The four storage horsemen of the epochalypse
We have compared the storage growth rates for Dell, HPE, NetApp, and Pure Storage and spotted standout differences with HPE declining, Dell starting an upswing, NetApp rising on the back of 8 consecutive growth quarters, and Pure starting its eighth year of growth, albeit with a two-quarter hiccup in 2021.
Data Storage
VentureBeat - 45% of cybersecurity professionals have considered quitting the industry
Thirty-eight percent of respondents to Deep Instinct’s report admitted to paying a ransom, 46% claimed their data was still exposed by the hackers, and 44% said they couldn’t restore their data.
Security
SiliconANGLE - CIOs welcome users’ bid for more IT budget control – mostly
Ameritas’ democratized approach to ownership of IT projects is an example of good intentions creating unintended consequences. Business leaders who take control of their own IT need often lack the knowledge or discipline to manage applications as they grow, not to mention integrate them with other parts of the IT portfolio.
IT Management
VentureBeat - Before automating your business processes, improve them
And, since automation continues to be the “holy grail” of accelerating digital transformation, companies are learning that just because they can automate a process doesn’t mean they should. Choosing the wrong processes for automation can dismantle an entire business initiative and ruin ROI expectations.
Automation & Productivity
eWeek - Agent vs. Agentless in Cloud Security: Why Both are Needed
However, there’s a set of control plane data that’s only available from outside of those services and containers. Not to mention the cloud services that don’t have the ability to run an agent. These managed services are a valuable piece of your cloud solutions, and you need visibility into their actions as well, but they can only be accessed through an agentless approach.
Cloud Security
sdxCentral - Ciena, Fujitsu, Infinera, Cisco Drive Optical Network Growth
“Long-term secular demand is very strong, driven by the acceleration of cloud adoption and traffic growth and the desire to get higher capacity and more bandwidth closer to the end user,”
Network Management
Network World - Network Service Mesh: Linking multicloud workloads 
Called Network Service Mesh, the project would enable cloud-based Kubernetes workloads to communicate securely regardless of where they are located in disparate clouds and is under the auspices of the Cloud Native Computing Foundation, which is part of the Linux Foundation.
Network Management
VentureBeat - Turning AI failure into AI success stories
Rather than simply unleashing the technology first on one goal and then another in a linear fashion, which is the habit for most traditional technology initiatives, a more effective approach is to direct it at three critical capabilities: business transformation, enhanced decision-making and systems and process modernization.
Artificial Intelligence
AiThority - Top Skills Needed to Become an AI Engineer
AI can incorporate massive data sets. AI engineers must be well-versed in the tools and processes for managing these large data sets. A background in Apache Spark architecture, Hadoop, Cassandra, and MongoDB will help.
Tech Jobs
eWeek - Security and Backup Alignment Critical to Ransomware Recovery
A whopping 24% of organizations were not able to get their data back, even when the ransom was paid. When paying ransom, most (72 percent) organizations used some form of insurance. Fifty-seven percent of respondents said they have cyber insurance that includes ransomware coverage, 30 percent have cyber insurance without ransomware coverage, and 13 percent don’t have cyber insurance.
Security
VentureBeat - Everyone has moved their data to the cloud — now what?
A recent TDWI Research study of 244 companies using a cloud data warehouse/lake revealed that an astounding 76% experienced most or all of the same on-premises challenges.
Cloud
Network World - SASE or SSE? Don’t let hype distract from enterprise needs
Gartner itself has been instrumental in a roll-back from the idea of SASE to the less-broad secure service edge (SSE) bundle, which includes CASB, SWG, and ZTNA. Gartner introduced the SSE bundling option in its 2021 Strategic Roadmap for SASE Convergence.
Network Management
sdxCentral - Will You Hire a Virtual CISO?
“Most companies under 1,000 people really just need a fractional CISO, they don’t need a full-time CISO, nor can they afford one,” Gray said, adding that “The virtual CISO fits, I’d say, all the way up to maybe 2,500 employees.”
Tech Jobs
VentureBeat - 3 most common — and dangerous — holes in companies’ cyber defenses
At some companies, an administrator credentialed for one part of a network is automatically granted access to another. It’s a recipe for disaster. If there’s no pressing need for them to be there, it only adds another gateway to attack.
Security
Threatpost - Verizon Report: Ransomware, Human Error Among Top Security Risks
Indeed, “supply chain was responsible for 62 percent of system-intrusion incidents this year,” researchers reported.  Moreover, unlike a financially motivated threat actor, perpetrators of these crimes are often state-sponsored actors who prefer to “skip the breach and keep the access,” maintaining persistence on organization’s networks for some time, researchers said.
Security
VentureBeat - Emerging digital twins standards promote interoperability
“Historically, these [standards] all used to be with respect to things like processes and properties and characteristics of physical things. And they continue to be so, but in addition, they are now about the data as well.”
Data & Analytics
SiliconANGLE - The nirvana of cloud storage: Google Cloud’s secret weapon 
That has created the perception that Google lags behind. But the company has a secret weapon in its cloud arsenal: Its cloud-based consumer services are already deployed at a larger scale than a Fortune 10 company needs.
Cloud
AiThority - 92% of HR Leaders Will Increase Use of Artificial Intelligence as Solution for Rising Talent Challenges
“Talent intelligence has the power to reshape how leaders face today’s greatest challenges. By infusing data and insights into decision making, they can take a comprehensive approach to manage all talent and architect a future-ready workforce.”
Artificial Intelligence
Analytics Insight - WILL EDGEML PUT AN END TO THE FLOURISHING CLOUD COMPUTING MARKET SOON?
The EdgeML library provides a suite of efficient machine learning algorithms designed to work off the grid in severely resource-constrained scenarios. The library allows the training, evaluation, and deployment of these algorithms onto various target devices and platforms.
Cloud
Blocks & Files - Will tape play a ‘critical role’ in the zettabyte era as its supporters hope?
Tape’s inherent physical air gap is a good point but the virtual air gaps marketed by backup storage, unstructured data storage, cloud storage, and cybersecurity companies are generally acknowledged to be effective and so its superiority here is lessened.
Data Storage
CSO - IDaaS explained: How it compares to IAM
While there are some exceptions, IDaaS is typically delivered via the cloud and can be offered as a multitenant offering or dedicated delivery model depending on the organizational requirements and the capabilities of the provider in question.
Security
SiliconANGLE - Broadcom will tame the VMware beast
Unified Endpoint Management looks more than respectable, but that business is a rock fight with Microsoft Corp. VMware Cloud includes things such as VCF and VMware’s cross-cloud offerings. NSX came from the Nicira acquisition. Tanzu is not yet pervasive and one wonders if VMware is making any money there.
Tech Trends
Datanami - Three Ways Companies Can Cope with the AI and Analytics Talent Crunch
Microsoft for example is doubling its budget for employee salary increases, according to an article in Bloomberg. With the starting salary for a new engineer estimated to be around $160,000 per year, that is no small chunk of change for the second largest American company by market capitalization
Tech Jobs
HelpNetSecurity - How confident are CISOs about their security posture?
While the world’s CISOs spent 2021 coming to terms with new ways of working, many now feel much more in control of their environment: 48% feel that their organization is at risk of suffering a material cyber attack in the next 12 months, down from 64% last year.
Security
Digital Journal - Information Security Forum Predicts Cyber Threats That Will Disrupt Businesses by 2024
“That’s why organizations in a bid to remain agile and competitive are increasingly turning to trust as a substitute for control. However, by 2024 we believe this trust will disintegrate, exposing organizations to an ever-expanding array of threats.”
Security
Network World - Cisco: Enterprises grapple with hybrid-cloud security, operational complexity
“While hybrid cloud provides a range of opportunities and benefits for organizations, many are acutely aware of the challenges in operating these environments. Cloud-native architectures and emerging technologies compete for the attention of staff and for budgets, while security and networking challenges remain top of mind,"
Cloud Security
VentureBeat - Report: Average time to detect and contain a breach is 287 days
For organizations without a solid understanding of their exposed attack surface, moving to a cloud environment only highlighted that knowledge gap.
Security
SiliconANGLE - Supercloud is becoming a thing 
We used the term supercloud to describe an abstraction layer that resides above and across hyperscale infrastructure, connects on-premises workloads and eventually stretches to the edge. Our premise is that supercloud goes beyond running services in native mode on each individual cloud.
Cloud
VentureBeat - Report: 92% of HR leaders plan on using AI to acquire talent
In fact, 92% are planning on increasing their use of AI in at least one area of HR, including areas such as talent acquisition and management processes, onboarding new employees, and payroll processing.
Automation & Productivity
eWeek - Heroku vs. AWS: 2022 Cloud Platform Comparison
It’s best to think of AWS as a general-purpose platform for the cloud – although it has many tools and capabilities that are appealing to developers and data scientists. Heroku’s focus is on harnessing and monetizing Salesforce data – although the cloud platform is suited for numerous other development purposes.
Cloud
VentureBeat - Career paths in cybersecurity: Key skills, salary expectations and job description
The following information about cybersecurity careers and salaries will help you know what to expect and which skills are most beneficial for people in the industry. It will also give you a rundown of potential roles and responsibilities.
Tech Jobs
GeekWire - Economic uncertainty starts to hit tech job market with reports of hiring slowdowns, rescinded offers
However, recruiters and tech leaders say the impact is not yet widespread, and depends highly on the sector in which a company is operating and the types of positions it’s filling. Engineers, for example, remain in high demand.
Tech Jobs
Becker's Health IT - Information security analyst pay by state
Information security analysts, who ensure security controls are in place, make an average of $113,270 annually, according to the latest data released March 31 by the U.S. Bureau of Labor Statistics.
Tech Jobs
VentureBeat - The creation of the metaverse: The market
But regardless of who gets credit, the metaverse is now as much a part of popular tech culture as things like blockchain, AR/VR, AI and quantum computing. All of which, by the way, are now combining to drive what the metaverse will eventually be. And that’s exactly what makes it so exciting.
Metaverse
ZDNet - Skills and security continue to cloud the promise of cloud-native platforms
The survey finds 83% are using either hybrid or multi-cloud, but nearly 50% say lack of in-house skills and limited talent stand in the way of migrating to or using Kubernetes and containers.  
Cloud
HotHardware - Cybersecurity Report Calls Out CEOs For Using Shockingly Weak Passwords
NordPass recently worked with independent cybersecurity researchers to assemble a list of passwords used by CEOs, C-level executives, business owners, and managerial-level team members. The resulting list was topped by an assortment of pitiful passwords used in large numbers.
Security
Network World - What is Nmap and why do you need it on your network?
Nmap, short for Network Mapper, is a free and open source tool used for vulnerability checking, port scanning and, of course, network mapping. Despite being created back in 1997, Nmap remains the gold standard against which all other similar tools, either commercial or open source, are judged.
Network Management
VentureBeat - What the U.S. government’s security testing protections mean for enterprises
The new policy offers protection for entities conducting “good-faith testing,” which is the investigation or correction of security flaws or vulnerabilities carried out in a way that’s designed to avoid any harm to individuals or the public
Security
Cyber Defense Magazine - True Cybersecurity Requires a Shift to A Data-Centric Philosophy
Literally every API represents a potential vulnerability. Akami’s 2020 State of Internet Security Report, in fact, found that 75% of all financial services industry cyber attacks targeted APIs. The result is a system of countless data silos, each with a discrete surface ripe for attack.
Security
eWeek - Late to the Enterprise AI Party? 3 Ways to Get Started
The good news is, thanks to advances in hardware and software, virtually any company can get started with an AI project. And they’d be in good company — the global AI market is expected to grow from $93.5 billion in 2021 to $641.3 billion in 2028.
Artificial Intelligence
VentureBeat - Report: Frequency of cyberattacks in 2022 has increased by almost 3M
In 2022, the number of Trojan-PSW (Password Stealing Ware) detections increased globally by almost a quarter compared to the same period in 2021 一 4,003,323 to 3,029,903. Trojan-PSW is a malware that steals passwords, along with other account information, which then allows attackers to gain access to the company network and steal sensitive information.
Security
sdxCentral - RAN Market Walks Into 2022
Dell’Oro Group noted in a recent report that overall RAN equipment sales during the first quarter increased at their slowest pace in more than two years. Those numbers include hardware, software, and firmware.
Network Management
VentureBeat - Report: Credential access is top risk for ransomware attacks
The report found credential access was the top area of risk for respondents (at 40%), followed by defense evasion (31%), execution (31%), initial access (29%) and privilege escalation (27%).
Security
TechHQ - Web3 storage witnessing exponential growth with more personal, enterprise uptake
In the world of Web3, there will be no digital gatekeepers to set the rules or take the lion’s share of the profits. In fact, it’s the users that will be in control. There is however more to that, like Web3 storage, a decentralized storage service, which is expected to grow exponentially in the coming years.
Web3
SC Media - Few IT pros say they have ‘mastered’ security in cloud-native environments
Recent research by Canonical showed that 38% of respondents believe that security remains the most important consideration whether operating Kubernetes, building container images or defining an edge strategy.
Security
VentureBeat - Report: Devs say the current model of data observability is broken
One of the most interesting, yet troubling, findings of the research is that 64% of respondents report over an hour mean time to recovery (MTTR), compared to 47% reported in last year’s report. What’s more, 53.4% of people surveyed last year claimed to have resolved production issues within an hour on average – this year, that number dropped to 35.94%.
Data & Analytics
Threatpost - Closing the Gap Between Application Security and Observability
Application security and observability capabilities can be used to set up Log4Shell-specific attack monitoring and incident detection. This quickly identifies Log4Shell log patterns, and with the help of platform log analytics and alerting capabilities, teams can configure alerting mechanisms for attacks on their environments.
Security
Yahoo!Finance - The Worldwide Container Security Industry is Expected to Reach $3.9 Billion by 2027
Development and operational teams save time and money by delivering software without having to continuously reconfigure infrastructure. Because containers do not need hypervisors, a significant portion of this savings comes from lower hypervisor licence costs.
Security
Health IT Security - Ransomware Groups Continue to Leverage Old Vulnerabilities
Notably, 11 of the 22 newly added vulnerabilities linked to ransomware were first disclosed in 2019, “indicating that ransomware groups are on the hunt for vulnerabilities with pre-existing means of exploitation,” the report noted.
Security
InfoSecurity Magazine - The New Era of Cyber-Attacks - Who is Most at Risk This Year?
With our critical national infrastructure increasingly connected, 2022 will see threat actors weaponize operational technology environments more successfully than ever before. Targeting systems that, once offline, will have a significant impact on our day-to-day lives.
Security
VentureBeat - Report: 60% of orgs have experienced data loss due to employee mistakes
Intentionally stealing data also causes strain on IT teams as the data revealed it takes up to three days for security and risk management teams to detect and remediate a data loss incident caused by a malicious insider on email.  
Security
The Journal - CoSN Survey of IT Leaders Shows Ransomware Underestimated, Cybersecurity Still Woefully Understaffed
The survey results also showed that school districts’ IT departments remain understaffed, particularly in providing remote support for students and staff and in managing cybersecurity risks, the report said, with just 21% of districts reporting they have a dedicated full-time employee overseeing cybersecurity.
Security
BetaNews - Three out of five organizations lose data due to email errors
User-created data (sensitive email content, text files, M&A documents), regulated data (credit card data, Social Security numbers, national ID numbers, employee data), and intellectual property are seen as hardest to protect.
Security
Apple Gazette - What Are the Most Common Email Security Threats
Unfortunately, many companies do not take the step of deleting old email accounts. If you do not delete unnecessary accounts, you simply have an extra portal of entry to your company. Do not let this happen. Make sure you get rid of your old accounts and remove this unnecessary risk.
Security
Forbes - How And Why Businesses Should Strengthen Their Cybersecurity
To me, the most concerning part of the assessment is a finding that some bad actors had shifted their focus away from so-called “big-game” targets. Instead, they turned their attention to midsized companies to avoid scrutiny.
Security
The Hacker News - Web Trackers Caught Intercepting Online Forms Even Before Users Hit Submit
The study involved crawling 2.8 million pages from the top 100 websites, and found that as many as 1,844 websites allowed trackers to capture email addresses before form submission in the European Union, a number that jumped to 2,950 when the same set of websites were visited from the U.S.
Security
Threatpost - APTs Overwhelmingly Share Known Vulnerabilities Rather Than Attack O-Days
Most advanced persistent threat groups (APTs) use known vulnerabilities in their attacks against organizations, suggesting the need to prioritize faster patching rather than chasing zero-day flaws as a more effective security strategy, new research has found.
Security
TechHQ - Web3 storage witnessing exponential growth with more personal, enterprise uptake
Even storage demands from the NFT industry and the Metaverse is setting the stage for massive capital investments and growth in the burgeoning Web3 storage industry.
Data Storage
VentureBeat - Report: 80% of cyberattack techniques evade detection by SIEMs
Rather than rely on subjective survey-based data, CardinalOps analyzed configuration data from real-world production SIEM instances to gain visibility into the current state of threat detection coverage in modern Security Operations Centers (SOCs).
Security
ZDNet - Developers think these five technologies will be the next big thing
According to its survey of 20,000+ coders, blockchain applications, cryptocurrencies, and NFTs have the highest share of developers learning about them.
Emerging Tech
VentureBeat - Report: 88% of business leaders would pay the ransom if hit by a cyberattack
Companies hit in the past were more inclined to pay as soon as possible to get immediate access to their data (33%, compared to 15% of companies that have never been victimized), or to pay after only a couple of days of unsuccessful decrypting attempts (30% vs. 19%).
Security
Redmond Magazine - IT Pros Describe Azure Virtual Desktop Practices and Gripes in New Study
The AVD deployments covered in the survey weren't large, with 73 percent of respondents indicating they had less than 1,000 users. The study's authors surmised that "AVD is probably appealing and accessible to organizations which traditionally are considered too small to adopt on-premises Citrix/VMware VDI."
Automation & Productivity
TMCNet - Data Shows Enterprise SIEMs Detect Fewer Than 5 of the Top 14 MITRE ATT&CK Adversary Techniques Used in the Wild
The company's second annual report analyzed aggregated and anonymized data from production SIEM instances to understand SOC preparedness to detect the latest adversary techniques in MITRE ATT&CK, the industry-standard catalog of common adversary behaviors based on real-world observations.
Security
AP - Ransomware Attacks are a ‘Clear and Present Danger’ for UK AEC Firms, According to New Benchmark Survey From Egnyte
Almost half (44 percent) of firms had experienced a ransomware attack in the past 24 months. Of these, 25 percent had experienced between two to four attacks and 5 percent had endured five attacks or more, with 28 percent of firms taking over a week to recover.
Security
CSO - The US federal cybersecurity bureaucracy: A guide
A high-level look at the national offices and organizations involved in protecting the US from cyber threats.
Security
Forbes - Regulating The Metaverse: Can We Govern The Ungovernable?
The sci-fi buff in me is drawn to the idea of visiting a futuristic virtual world, where we can experience a new type of reality. But the metaverse is no longer science fiction – and the responsible adult in me can’t help but consider the threats it could pose, both to individual consumers and businesses.
Metaverse
VentureBeat - Scalability and elasticity: What you need to take your business to the cloud
Both scalability and elasticity are related to the number of requests that can be made concurrently in a cloud system — they are not mutually exclusive; both may have to be supported separately.
Cloud
Computerworld - How many jobs are available in technology?
The April monthly tech jobs report released by the CompTIA industry association showed the tech industry added 12,300 jobs from February to March, 2022. Software developers (3,613) and systems engineers/architects (3,126) led the pack in terms of new positions available.
Tech Jobs
VentureBeat - The missing link in the cybersecurity market
The market’s hyper-segmentation forces security teams to involuntarily become system integrators, investing vast amounts of time and energy into carrying out market analysis, product validation, cross-product integration and product maintenance automation to create a coherent, effective organizational cybersecurity fabric.
Security
Datanami - Report: Almost Half of CMOs Claim Data Hinders Creativity
At the same time, the need for a dedicated marketing ops role to manage martech stacks has accelerated dramatically. 73% of CMOs are committed to introducing this role to their team: 45% already have someone in place, and a further 28% are currently hiring. Only 12% of CMOs have had one in place for more than a year.
Data & Analytics
Blocks & Files - GigaOm assesses unstructured data management market
The leaders are IBM (Spectrum Discover), Hitachi Vantara, Varonis (Data Security Platform), and NetApp (Cloud Data Sense). Future leaders are Cohesity, Data Dynamics, and Druva.
Data & Analytics
VentureBeat - Report: 5 key trends for AI’s future
Edge AI will enable digital moments by harnessing AI for real-time analytics closer to data sources. Gartner predicts that by 2025, more than 50% of all data analysis by deep neural networks will occur at the edge, up from less than 10% in 2021.
Artificial Intelligence
SiliconANGLE - Participate in your own rescue: ‘Dual ransomware’ attack highlights security hygiene urgency 
The healthcare provider did not even realize it was being extorted twice because the ransom note of the first attack had been concealed by the second. Two ransomware groups, two different attacks, one target environment, only a week apart.
Security
AiThority - The Security Oracle, Experts in the Security and Artificial Intelligence Space
“TSO’s disruptive robotic solution, (RCADS), is the enabling AI technology that makes it possible for Robots in the Sky and TSO’s family of robotic appliances to empower organizations to dynamically reconfigure access control and emergency communications systems to adapt to new security threats in sub-second response time,
Security
Threatpost - You Can’t Eliminate Cyberattacks, So Focus on Reducing the Blast Radius
The answer is network segmentation. This divides devices and workloads into logical segments with policies providing access controls between them. Just as the watertight bulkheads in a ship prevent a breach in the hull from sinking the vessel, segmentation prevents the lateral movement of malware across your network, preventing it from accessing critical assets.
Security
sdxCentral - CTOs Shouldn't Do Their Jobs Alone, Gartner Says
However, Gartner data shows only 52% of CTOs regularly engage with their organization’s CISO, and only 29% regularly engage with their CDO. “There’s a clear call to action. If you’re going to be involved in investing in cybersecurity and data analytics technologies, you need to be engaging with these kinds of dialogues,” she said.
IT Management
Markets Insider - Lumen mitigated DDoS attacks that targeted a single company more than 1,300 times

Of the 500 largest attacks in Q1, 97% targeted the Telecommunications, Gaming, Software and Technology, Hosting, and Government verticals.

Security
Network World - What is a private cloud?
Here's a clear definition of private cloud that should help lift some of misconceptions about what private cloud is and is not, and reaffirm that private cloud is definitely not dead.
Cloud
VentureBeat - Report: 44% decrease in average amount paid after ransomware attacks
 It showed that SMBs are primarily concerned with external threats — attack vectors including ransomware and phishing — and only 8% of the smallest businesses (<50 employees) have a dedicated cybersecurity budget.
Security
ZDNet - Just in time? Bosses are finally waking up to the cybersecurity threat
Senior figures from American, British and Australian cybersecurity agencies have said that business execs are now more aware of cyber threats and are actively engaging with their chief information security officer (CISO) and information security teams.
Security
VentureBeat - How to build a cloud security strategy that sells
Seek opportunities to embrace a DevSecOps mindset. For example, cloud forward businesses are using more non-human accounts than ever to develop products faster. In turn, attacks on non-human identities are rising significantly.
Cloud Security
Fivetran: Over 80 Percent of Companies Rely on Stale Data for Decision-Making
While ubiquitous for enterprises today, very few companies are able to correctly leverage the data of these systems for decision-making. According to the study, nearly 9 out of 10 companies report that they are unable to pull real-time insights from their legacy ERP systems to make smart business decisions.
Data & Analytics
VentureBeat - How Web3 and Cloud3 will power collaborative problem-solving and a stronger workforce
Now, Web3’s lesser-known but important counterpart, Cloud3, is also beginning to gain traction. Executives like Salesforce CEO Marc Bennioff are already mapping how their companies will adopt the new iteration of cloud computing — the core of which is built around working from anywhere — further supporting the workforce shift.
Automation & Productivity
Network World - 6 top network security threats and how to beat them
These "service-providers" face minimal risk, since they themselves aren't launching any attacks. "It’s a pretty sweet deal for them," he says. Additionally, the payment comes in the form of cryptocurrency, so they are difficult to track.
Security
VentureBeat - Why glTF is the JPEG for the metaverse and digital twins
The JPEG file format played a crucial role in transitioning the web from a world of text to a visual experience through an open, efficient container for sharing images. Now, the graphics language transmission format (glTF) promises to do the same thing for 3D objects in the metaverse and digital twins.
Emerging Tech
sdxCentral - Fortinet CEO: Cybersecurity Will Outgrow the Networking Market
“The bigger picture convergence is happening today and maybe a few trends have been keeping going this way, probably within the next 10, 20 years, security will overtake the network space and become the biggest one in the enterprise network,”
Network Management
TMCNet - IT Service Management Named a Top Choice for Managing Identity in the Enterprise, but Email and Spreadsheets are Close Behind, New Research Finds
For example, email (50%) was cited as the most popular option for controlling permissions and entitlements among all respondents. Comparatively, respondents from large companies (55%) and those who held IT roles (54%) favored more sophisticated methods, such as IT Service Management (ITSM) or workforce management platforms.
IT Management
CSO - 7 top software supply chain security tools
A modern application is mostly made up of third-party code. According to Forrester, the percentage of open-source code that makes up an average application’s code base rose from 36% in 2015 to 75% in 2020.
Security
Threatpost - FBI: Rise in Business Email-based Attacks is a $43B Headache
The FBI is also warning that another popular variations of the scam include collecting Personal Identifiable Information (PII) in order to perpetrate additional fraud such as tax-related scams and breaching cryptocurrency wallets.
Security
Blocks & Files - Project Alpine: native Dell storage services in the public cloud and CloudOps
Dell’s Project Alpine could open the door to the big cloud service providers adopting hybrid multi-cloud as a reality and porting their software to each other’s environments.
Cloud
ZDNet - IBM CEO: AI is near a key tipping point, but generalized AI is still decades out
It shows that currently, 35% of companies are using AI in their business, up to four points from 2021. Additionally, 30% say employees at their organization are already saving time with new AI and automation software and tools.
Artificial Intelligence
VentureBeat - Researchers discover hackers using SEO to rank malicious PDFs on search engines
Today, researchers at security service edge provider, Netskope, published the Netskope Cloud and Threat Report: Global Cloud and Malware Trends, which found that phishing downloads rose 450% over the past 12 months, and highlighted that attackers are using search engine optimization (SEO) to rank malicious PDF files on search engines.
Security
ZDNet - Cloud computing security: New guidance aims to keep your data safe from cyberattacks and breaches
Some of the key advice includes highlighting how cloud applications can be secure by default, which includes enforcing the use of multi-factor authentication to help secure accounts, even if the usernames and passwords are leaked or stolen.
Cloud Security
Datanami - KX Report: 80 Percent of Businesses See Revenue Increases Thanks to Real-time Data
Drawing on a combination of both quantitative and qualitative research and economic modeling, the report clearly demonstrates the measurable commercial and operational value that real-time data management and analytics technologies can deliver across major industry sectors. 98% of respondents reported increased customer satisfaction while 60% are seeing major efficiency and productivity gains.
Data & Analytics
VentureBeat - What is cybersecurity? Definition, importance, threats and best practices
Viruses, trojans, spyware and ransomware are all types of malware. These can be as insignificant as placing unwanted pop-ups on a computer or as dangerous as stealing sensitive files and sending them somewhere else.
Security
SiliconANGLE - The top trends driving technology providers in 2022 
Instead, a co-innovation ecosystem is an emerging approach that accelerates the development of solutions to industry problems, spreads risk and cost across the participants, and drives adoption of the end solution.
Tech Trends
VentureBeat - 5 ways AI can help solve the privacy dilemma
Data shows that 86% of people care about privacy for themselves and others — with 79% willing to act on it by spending time and money to protect their data. And to those cynics who say people moan about privacy and do nothing, the same study found that 47% have taken action because of a company’s data policies.  
Data Privacy
ZDNet - Data scientist vs data engineer: How demand for these roles is changing
Research suggests many companies can't find the talent they need, as they struggle to deal with turning their vast supplies of data into usable information.
Data & Analytics
VentureBeat - The Colonial Pipeline ransomware attack a year on: 5 lessons for security teams
“With encryption-in use data protection, should adversaries break through perimeter security infrastructure and access measures, structured as well as unstructured data can [and] will [be] undecipherable and unusable to bad actors – making digital blackmail significantly more difficult, if not impossible,” Raman said.
Security
eWeek - Unlocking Value with Unstructured Data Tagging
Tagging is the process of adding labels to categorize unstructured data, so users can easily search and find the data they need when they need it. Put simply, it’s adding and enriching the metadata on your data.
Data & Analytics
VentureBeat - The future of on-prem and the cloud
If you’re planning on using a hybrid infrastructure for an extended period of time, my advice is this: don’t. While it’s impossible to avoid a hybrid setup during a transition period, most organizations are best served by committing to cloud IaaS completely (or as much as possible) and following a plan that can get you there incrementally over the course of two to three years.
Cloud
ComputerWorld - Enterprise mobility 2022: UEM adds user experience, AI, automation 
Essentially combining enterprise mobility management (EMM) tools with PC management tools, UEM platforms help companies manage and protect a range of devices including smartphones, tablets, laptops, and desktop computers across multiple operating systems — all from a unified interface.
IT Management
VentureBeat - Report: 36% of security pros have adopted hardware-assisted cybersecurity
The report reveals that the top areas of focus for security innovation within organizations today are automation (41%), security at the silicon level (40%), cloud migration (40%) and education and training (38%).
Security
eWeek - Cloud Customer Beware: 3 Challenges with Cloud Migrations
For all of cloud computing’s potential, business leaders need to keep their feet firmly on the ground and recognize the sheer complexity of cloud migration. Research indicates that one in three cloud migrations fail and only 25% of businesses meet their migration deadlines.
Cloud
VentureBeat - Data mesh vs. data fabric: Eliminate humans or use them more intelligently
Data scientists and analysts are pushed to use pre-approved, pre-staged data found in centralized repositories, such as data warehouses, instead of being encouraged to use a broader array of datasets in their analysis.
Data & Analytics
ComputerWorld - 6 virtual collaboration solutions for remote teams
Every survey suggests workers are more willing to find a new job than return to the bad old days of presence-based micro-management. Arguments that returning to the workplace boost collaboration may have some weight, but  much of this relies on old-fashioned email and virtual meetings held from the office, rather than the home.
Automation & Productivity
VentureBeat - Why you need both consumer data and data management platforms
On the open web, an average publisher can only authenticate ~20% of its audience, meaning that ~80% of a publisher’s audience is blind to the CDP, which limits its scalability. There is no built-in mechanism to augment authenticated data with anonymous data, therefore a DMP is a crucial value-add.
Data & Analytics
VentureBeat - Report: 61% of data leaders say that manual processes slow down their projects
This slowdown has a big impact across organizations who are faced with hard-to-reconcile priorities — 85% see securing access to sensitive data viewed as critical for business, and as the way to minimize the risk of data breach or exposure to unauthorized parties, while one in three point to meeting data security, privacy or compliance requirements from their customers, while 27% are addressing the sensitive data access for compliance with consumer privacy regulations such as GDPR and CCPA
Data & Analytics
eWeek - 5 Cybersecurity Threats That Aren’t Going Away
As CIOs, CISOs, CTOs, and IT managers think about boosting cybersecurity strategies, they should consider what happened in the year prior and what might potentially get worse. Below are some of the cybersecurity threats that remain stubbornly consistent – and must be guarded against at all times.
Security
VentureBeat - Report: 80% of global datasphere will be unstructured by 2025
According to a new report by nRoad, analysts predict the global datasphere will grow to 163 zettabytes by 2025, and about 80% of that will be unstructured. In regulated industries, such as financial services, the challenges posed by unstructured data are exponentially higher.
Data & Analytics
eWeek - Artificial Intelligence Enables Next-Gen Data Loss Prevention
While the cloud has enabled businesses to not skip a beat during and post pandemic, this shift is creating the new IT challenge of managing fully distributed data, which is no longer on-prem. Data is everywhere. The traditional hub and spoke security model is not sufficient for securing data in the cloud. Every organization should be thinking about implementing modern data loss prevention (DLP) practices.
Data & Analytics
VentureBeat - As data privacy laws expand, businesses must employ protection methods
Another area where the laws differ is how each defines sensitive data. The CPRA’s definition is extensive and includes a subset called sensitive personal information. The VCDPA and CPA are more similar and have fewer sensitive data categories. However, their approaches to sensitive data are not identical.
Data Privacy
ZDNet - How cloud is redirecting technology career paths
IT tasks are elevating, as "many tedious and time-consuming manual tasks like data entry, system and application monitoring and some app development efforts will be taken over by technology solutions,
Cloud
VentureBeat - Report: 36% of security pros have adopted hardware-assisted cybersecurity
The report reveals that the top areas of focus for security innovation within organizations today are automation (41%), security at the silicon level (40%), cloud migration (40%) and education and training (38%).
Security
AiThority - How Startups are Leveraging the Cloud to Scale
The cloud offers maximum flexibility for growth in capacity and resources, so scalability is never an issue. As the business grows, entrepreneurs can access more resources on-demand and pay for them only when needed, saving money in the process.
Cloud
ZDNet - The 9 best cloud storage services: Cost, free storage, and features compared
Unlike many other cloud backup services, iDrive doesn't lock you down to a single computer. You can use one account to backup your Windows and macOS desktops, your Android smartphone and iPhones and tablets, and your network drives. There's also a Linux backup option, but it's meant for Linux servers.
Cloud Storage
VentureBeat - The challenge of making data science zero-trust
There are three fundamental tenets that can help to realign the emerging requirements of zero trust to the needs of data science: minimization, distributed data, and high observability.
Data & Analytics
Network World - 4 networking best practices learned from the Atlassian network outage
The document is frank, factual, and full of important revelations and should be required reading for any engineering and network manager. It should be used as a template for any business that depends on software to locate and fix similar mistakes that you might have made, and also serve as a discussion framework to honestly assess your own disaster recovery playbooks.
Security
ZDNet - Ethernet creator Metcalfe: Web3 will have all kinds of 'network effects'
"For the first time, I am trying to say exactly what kinds of value are created by networks," Metcalfe told ZDNet at the Williamsburg event. "What I have learned today is that knowledge graphs can go a lot farther if they are decentralized," said Metcalfe. "The key is the connectivity."
Web3
Threatpost - CANs Reinvent LANs for an All-Local World
This is exactly the conceptual leap behind a new type of network, known as a Cloud Area NetworkTM (CAN). CANs replace the old hub-and-spoke model with an overlay network mesh concept that enables any-to-any communication between users, devices, data centers, and web apps.
Network Management
AiThority - Understanding the Role of AI, Machine Learning and Natural Language Processing in RegTech Development
RegTech enhances timely regulatory compliance and mitigates risks in a transparent and auditable manner. It automates lengthy, time-consuming processes, reducing room for error and the need for manual work and costly resources.
Automation & Productivity
Diginomica - Digital transformation projects are not enough - we need continuous transformation
While digital transformation is undoubtedly a crucial means of modernising, expediting decision-making, and using innovation and creativity to enhance both experiences and financial performance, if the transformation simply ends following go live of the underpinning technology, the benefits will inevitably diminish over time.
Digital Transformation
Forbes - What You Need To Know Before You Start Working With Artificial Intelligence
I firmly believe that the true value of AI – estimated to be worth $13 trillion to the global economy by 2030 – will be realized due to it being accessible to businesses of all shapes and sizes, not just multinational corporations. A vast and eclectic ecosystem of cloud-based, “as-a-service” platforms reduces the need for expensive infrastructure investments and also means that niche solutions exist to help automate solutions in every industry.
Artificial Intelligence
Yahoo!Finance - 65% of Fraud Prevention Decision Makers Say Customer Authentication Fraud is a Major Concern
To protect themselves and their customers, 60% of respondents currently use OTPs as part of their customer authentication strategy. This is in large part due to the positive reputation it has with consumers: 72% of respondents say customers perceive OTP authentication as secure and 71% of respondents say that OTP authentication is user friendly.
Security
ZDNet - Open-source security: It's too easy to upload 'devastating' malicious packages, warns Google
The Package Analysis Project is one of the software supply chain initiatives from the the Linux Foundation's Open Source Security Foundation (OpenSSF) that should help automate the process of identifying malicious packages distributed on popular package repositories, such as npm for JavaScript and PyPl for Python.
Security
Forbes - Using Digital Twins And Preparing For The Metaverse
The metaverse is no different, and while it may be difficult to wrap your head around, taking the time to learn about digital twins and how they fit into virtual reality can be very beneficial.
Emerging Tech
CSO - Firms struggling with non-person identities in the cloud
To address their cloud identity woes, more than half the decision-makers (55%) say their organizations are investing in cloud identity governance (CIG) and cloud infrastructure entitlements management (CIEM) solutions and by 2023, 82% will be following suit.
Cloud Security
sdxCentral - Fortinet: 80% of Breaches Attributed to Cybersecurity Skills Gap 
While 87% of respondents have implemented a training program for cybersecurity awareness, 52% of them still believe their employees lack the necessary knowledge. Fortinet says this statistic raises questions around how effective the training programs are.
Security
VentureBeat - What it will take to implement Web3
Take Ethereum, for example; despite its popularity, the network is struggling with some severe limitations. For one, current levels of throughput, around 15 transactions per second, simply aren’t enough to support the type of traffic that worldwide adoption would bring about.
Web3
ZDNet - Mozilla finds mental health apps fail 'spectacularly' at user security, data policies
According to Mozilla's latest *Privacy Not Included guide, despite the deeply personal information these apps manage, they "routinely share data, allow weak passwords, target vulnerable users with personalized ads, and feature vague and poorly written privacy policies."
Data Privacy
SiliconANGLE - The ever-expanding cloud continues to storm the IT universe 
We’re seeing the largest enterprise tech companies focus on solving for hybrid and every public cloud company now has a strategy to bring their environments closer to where customers’ workloads live – in data centers and the edge.
Cloud
VentureBeat - Report: 95% of IT leaders say Log4shell was ‘major wake-up call’ for cloud security
The research found that 87% feel less confident about their cloud security now than they did prior to the incident. The research also found that even 3 months after the incident, 77% of IT leaders are still dealing with Log4J patching with 83% stating that Log4Shell has impacted their ability to address business needs.
Cloud Security
AiThority - Businesses Need to Consider AI Algorithms and Spatial Intelligence to Increase Success
Behavioral science has been around a long time and is a classic discipline charting and analyzing actions between people to predict patterns. But what if a business could get enough information about the behavior of its customers — in any number of physical locations pivotal to that organization’s success — without having to wait for a lengthy analysis?  This is where the difference between basic analytics and spatial analytics comes into play.
Artificial Intelligence
SiliconANGLE - Experience as the new uptime: Why automation is the silver bullet to get us there 
Network operators are just scratching the surface with network automation, and as technologies and networks continue to evolve and mature, automation will be a critical component in that process to ensure optimized user experiences. Without this automation, network operators will be forever fighting a losing battle against increasing complexity.
Automation & Productivity
AiThority - Latest Report: “A Cookieless World: The Shifting MarTech Landscape”
Data includes how both B2C and B2B companies are reallocating budgets and employing new technology solutions to circumvent reliance on cookies, as well as the speed of adoption and success rates of specific approaches.
Marketing Tech
TMCNet - Research: Log4Shell a Wake Up Call For Cloud Security With Patching Efforts and Business Impacts Continuing Into 2022
The research also found that even 3 months after the incident, 77% of IT leaders are still dealing with Log4J patching with 83% stating that Log4Shell has impacted their ability to address business needs.
Security
Infosecurity - Five Eyes Agencies List Top 15 Most Exploited Bugs of 2021
In addition to the top 15 list, the security agencies provided an extra list of bugs to patch, including noteworthy systems such as the Accellion File Transfer Appliance (FTA) which was targeted en masse by a cybercrime group with links to FIN11 and Clop ransomware.
Security
VentureBeat - Report: Only 18% of data leaders receive ‘necessary’ amount of funding
This new research reveals that while data leaders feel the pressure to remain competitive, the C-suite is dangerously behind in making needed investments in data and analytics.
Data & Analytics
eWeek - The Business Case for an Edge Deployment
Among other factors, responsiveness is a function of latency, or how long it takes for data to transfer from one point on a network to another. According to a recent survey by Quadrant Strategies, 86% of C-suite executives and senior IT decision makers agree that low-latency applications help differentiate their organizations from the competition.
Edge Computing
VentureBeat - The super malicious insider and the rise of insider threats
Forty-two percent of actionable incidents were related to IP and data theft, including the theft of trade secrets, source code and active collusion with a foreign nexus.
Security
Network World - 5 reasons restores can take longer than backups
The effect of the write penalty on performance can be minor or it can be major depending on the RAID level and/or the settings used in erasure coding. But all such arrays will have some write penalty, and you need to find out what yours is.
Data Storage
eWeek - Collaboration Platforms Are Critical To Successful Hybrid Work
Collaboration tools were initially considered important, but it is really advanced collaboration tools that have become critical to business success. Advanced collaboration tools feature centralized security and administration, and they provide flexibility for line-of-business workers to configure their own apps/workflows.
Automation & Productivity
VentureBeat - The real cost of cloud computing
Finding the balance between sending the data to the cloud and bringing computing close to data is a trillion-dollar question. The answer is not clear for now, but it’s clear that every technology provider and the consumer should start exploring cutting the cloud dependency.
Cloud
ZDNet - Inside a ransomware incident: How a single mistake left a door open for attackers
While BlackCat has a reputation for running a sophisticated ransomware operation, it was a simple technique that allowed malicious cyber criminals to gain initial access to the network – exploiting an SQL injection vulnerability in an internet-exposed SonicWall SRA 4600 firewall.
Security
AiThority - Domo’s Low-Code Data App Platform Helps Customers Develop Analytic Content 50 to 75 Percent Faster According to New Independent Study by Nucleus Research
With Domo, one customer who integrated 15 different siloed systems centralized analytics, eliminated multiple hours per week that previously were spent manually combining and cleaning data.
Data & Analytics
VentureBeat - Report: Orgs spend 3,850 hours annually cleaning up email-based cyberattacks
The study confirms that, despite investments in secure email gateways and user security awareness training, bad actors continue to use social engineering emails to breach organizations’ defenses. The resulting attack remediation requires 175 hours to resolve each breach, and the most common breach type is compromised Office 365 login credentials (account takeover).
Security
Network World - What is a SAN and how does it differ from NAS?
SAN is associated with structured workloads such as databases, while NAS is generally associated with unstructured data such as video and medical images. “Most organizations have both NAS and SAN deployed in some capacity, and often the decision is based on the workload or application,”
Network Management
VentureBeat - Top 5 data quality & accuracy challenges and how to overcome them
Statistically, poor data quality leads to increased complexity of data ecosystems and poor decision-making over the long term. In fact, roughly $12.9 million is lost every year due to poor data quality.
Data & Analytics
sdxCentral - Government Agencies Prioritize Secure Multi-Cloud Adoption
The study reached 500 agency leaders and IT decision makers at federal, state, and local governments in the United States and Canada. It found 74% of respondents choose cloud providers by prioritizing security. And 57% of agencies are concerned about data security as they increase cloud adoption.
Cloud
VentureBeat - Report: Karakurt attacks linked to Conti and Diavol ransomware groups
Additionally, researchers found examples of cryptocurrency moving between Karakurt and Conti wallets; some Karakurt victim payment addresses are actually co-hosted in the same wallets as Conti victim payment addresses.
Security
AiThority - Blockchain Development Seen as Transformative to the Technology Sector: Rapid Innovation Survey
Several of the top technology firms are exploring everything from launching their own native tokens, to changing their company names to something more metaverse related. Large software firms have created entire enterprise divisions dedicated to enabling data exchange and workflow automation with distributed ledger technology and blockchains
Blockchain
VentureBeat - Data orchestration and best practices: Everything you need to know
Using data orchestration tools will help to clean, sort, arrange and publish your data into a data store. The aim of this technique is for authoring, scheduling and monitoring data pipelines by accepting data from numerous storage places.
Data Management
VentureBeat - Report: 88% increase in OT vulnerabilities last year
The report provides a deeper look at how quickly cybercriminals capitalize on new security weaknesses –shrinking the window that organizations have to remediate vulnerabilities ahead of an attack.
Security
ZDNet - Phishing emails targeting LinkedIn accounts are on the rise. Here's what to watch out for
The phishing emails are designed to look like they come from LinkedIn, but if the recipient clicks the link, they're sent to a login page designed to look like LinkedIn, and if they enter their email address and password, they'll be handing them to the attacker, who can use that information to log in to the victim's LinkedIn account.
Privacy & Security
The Next Web - These are the 5 most in-demand cloud computing jobs in 2022
By 2030, the report predicts that the sector will make an annual revenue of $1.6 trillion. Interestingly, more than half of the market will consist of banking, financial services and insurance, IT and telecom services, and retail and consumer goods.
Tech Jobs
sdxCentral - Public Cloud Spending to Near $500B in 2022
Spending increases are projected to occur in every layer of public clouds with infrastructure-as-a-service (IaaS) and desktop-as-a-service leading the way with 30.6% and 26.6% year-over-year jumps, respectively.
Cloud
ZDNet - Ransomware: This gang is getting a lot quicker at encrypting networks
The group also targets organisations that make high revenues, potentially a tactic that is also deployed because the attackers believe they have the best chance of making large amounts of money from ransoms.
Security
VentureBeat - New DataGrail research finds companies could spend upwards of $400K/year complying with data privacy laws, doubling the 2020 cost
Businesses are being asked to process nearly double the number of privacy rights they processed in 2020. Total data privacy requests — access, modify, and delete requests —  jumped from 137 to 266 requests per 1 million identities
Data Privacy
VentureBeat - Ransomware targeting virtualization platforms is on the rise, Mandiant says
While a traditional ransomware attack requires deploying the malicious payload across multiple hosts in a victim’s environment, an attack on virtualization infrastructure can potentially infect hundreds of virtual machines at once. With this variety of attack, “hitting one machine is much more effective,
Security
Viritualization & Cloud Review - Cloud Computing Survey Shows Cost Control Struggles
As we have repeatedly reported, the continuing skills gap is often the top challenge listed by respondents -- along with security concerns, which are always top-of-mind. In the new Foundry report, however, challenges with cost control are right up there with those two perennial concerns, even eclipsing them.
Cloud
Datanami - Fighting Harmful Bias in AI/ML with a Lifelong Approach to Ethics Training
We already see the effects in recruitment algorithms that favor men and code-generating models that propagate stereotypes. Fortunately, executives know that they need to act, with a recent poll finding that over 50% of executives report “major” or “extreme” concerns about the ethical and reputational risks of their organization’s use of AI.
Artificial Intelligence
VentureBeat - Report: 95% of organizations are now practicing open innovation
Those pillars include implementing a dedicated team to support open innovation initiatives, senior leadership positions (with titles like “Manager of Open Innovation”), standardized innovation procedures and metrics, open source technology adoption and related licensing/IP management systems
Automation & Productivity
eWeek - Machine Identities Are Dangerously Vulnerable
Identity security is in the spotlight these days, and it’s easy to see why. The most recent Verizon Data Breach Investigations Report found that 61% of all breaches involve credential data.
Privacy & Security
VentureBeat - Surprising cybersecurity weak points business owners should look out for
From increasingly ingenious phishing schemes to breakthroughs in offensive AI, digital threats expose the weakness in our IT frameworks and data systems. Identifying these weaknesses is crucial, as 85% of IT professionals pivot toward passwordless technology.
Security
sdxCentral - Netskope: Unified SASE Is at Least a Decade From Practicality
The real value of SSE isn’t that it’s Cloud based or that because it’s cloud-native it’s more scalable — though these factors do help, he said. It’s that “you’ve created one brain” for security intelligence.
Security
Network World - What is DRaaS and how it can save your business from disaster
The DRaaS market is a sprawling, complicated one, with hundreds of providers offering a wide range of different approaches that replicate everything from data and virtual machines (VMs) to on-premises servers and mainframes.
Security
VentureBeat - Waiting for the metaverse? The revolution is already here
Meanwhile, tools are allowing regular users to create and explore 3D content, with the secret weapon being the modern smartphone, which is now a gateway for 3D content creation — the building block of any metaverse. Now anyone can scan a real-world scene or object in 3D, which has led to its own new medium of user-generated content.
Metaverse
eWeek - Key Advice for Improving Your Company’s Cybersecurity
In cases where third-party hardware or software is not scrutinized, vulnerabilities can be harder to discover but also more broadly distributed, which can make them harder to remediate. For example, the Equifax breach in 2017 was reported to be the result of a vulnerability in open-source software. And more recently, the world reacted to another open-source vulnerability in Log4j.
Security
Network World - Edge computing moves toward full autonomy
"Self-organizing and self-healing wireless mesh communications protocols, such as Zigbee, Z-Wave, ISA100.11a, or WirelessHART can create networks where devices can be deployed ad hoc and self-configure."
Edge Computing
sdxCentral - Palo Alto Networks' Unit 42 Claims Cloud Identities Too Permissive
In analyzing more than 680,000 identities across 18,000 cloud accounts from more than 200 different organizations as part of its latest Cloud Threat Report, researchers found that nearly 99% of IAM policies are overly permissive.
Security
SiliconANGLE - 3 insights you might have missed from the ‘Cisco: Simplifying Hybrid Cloud’ event 
Full-stack observability has become more of a priority for business as organizations build on app monitoring tools, from customer-facing software to operational solutions on the back end. Recent data provided to SiliconANGLE by Enterprise Technology Research showed that market opportunities in the observability space are wide open.
Cloud
VentureBeat - 10 things CISOs need to know about zero trust
Over the last eighteen months, the exponential rise in cyberattacks shows that patching perimeter-based network security isn’t working. Cyberattackers can still access networks by exploiting unsecured endpoints, capturing and abusing privileged access credentials and capitalizing on systems that are months behind on security patches.
Security
AiThority - New Research Finds Data Automation Adoption to Climb From 3.5% to 88.5% Over the Next 12 Months
Nearly all data teams (93%) anticipate the number of data pipelines in their organization to increase between now and the end of the year—with 57% projecting an increase of 50% or greater. Amid the rising number of data pipelines across their organization, nearly three in four respondents (72%) indicated that the need for data products is growing faster than their team size.
Data & Analytics
FedScoop - National AI Research Resource must balance the value of its data with privacy
“Yes, the task force is certainly discussing how privacy-enabling technologies could help enhance the privacy aspects of NAIRR usage,” Parashar told FedScoop. “However, the task force has also discussed how privacy requires more than just technical solutions, and we expect a full range of considerations when contemplating privacy, civil rights and civil liberties.”
Data Privacy
VentureBeat - StormForge seeks to simplify Kubernetes automation
68% of respondents to a recent survey conducted by the Cloud Native Computing Foundation (CNCF) said that their cloud and Kubernetes-related bills have increased. Of those, half saw costs jump more than 20% over the past year.
Cloud
Cyber Defense Magazine - The Risks and Costs of The Public Sector’s Device Sanitization and Destruction Practices
In some instances, government agencies mandate physical destruction of devices — for example, if equipment is used to store classified or secret data. However, for unclassified data-bearing assets, physical destruction is unnecessary. This missed opportunity to give old technology a new life increases IT operations and materials costs for already fiscally-constrained public sector organizations.
IT Management
SiliconANGLE - This is what cloud-native looks like for the Department of Defense
“We have Kubernetes running across embedded systems at the edge on clouds, on classified clouds and air-gapped environments. It’s really the enabler for us not to get locked into a single tech stack.”
Cloud
ZDNet - The best remote desktop software: Work from anywhere
Based on an exhaustive, in-depth study of today's leading software, these are the best remote desktop software for 2022.
Automation & Productivity
VentureBeat - Report: 94% of women in tech say they’re held to a higher standard than men
Navisite’s recent survey of women in tech found that not only are women being held to a higher standard than their male colleagues, but they’re being asked to perform the bulk of administrative tasks. In fact, 75% say that they or their female colleagues are consistently asked to handle more administrative tasks compared to their male counterparts, including being asked to send meeting invites, reserve meeting rooms or prepare refreshments
Tech Jobs
SiliconANGLE - As data drives reinvention, AWS leverages machine learning and serverless to meet enterprise needs
“Within analytics, everything that we offer has a serverless option. We announced serverless Redshift, serverless EMR, serverless Kinesis and Kafka. The goal here is to take away the need to manage infrastructure for customers so they can focus on driving differentiated business value.”
Data & Analytics
VentureBeat - Bad data: A $3T-per-year problem with a solution
A few years ago, IBM reported that businesses lost $3 trillion dollars per year due to bad data. Today, Gartner estimates $12.9 million to be the yearly cost of poor-quality data. Funds get wasted in digitizing sources as well as organizing and hunting for information — an issue that, if anything, has increased now that the world has shifted to more digitized and remote environments
Data & Analytics
Enterprise Talk - Responsibility for AI Ethics is Shifting from Tech Roles to the Business Executives, says IBM Study
The IBM study, “AI ethics in action: An enterprise guide to progressing trustworthy AI”, also shows that despite a growing requirement for developing trustworthy AI, including an improved performance in sustainability, social responsibility, diversity and inclusion, a gap remains between intentions and actions.
Artificial Intelligence
VentureBeat - What Stanford’s recent AI conference reveals about the state of AI accountability
Specifically, regarding accountable AI, panelists discussed advances and challenges related to algorithmic recourse, building a responsible data economy, computing the wording and conception of privacy and regulatory frameworks, as well as tackling overarching issues of bias.
Artificial Intelligence
Datanami - Ascend.io Survey Finds Data Automation to Surge Over Next 12 Months
Findings from more than 500 U.S.-based data scientists, data engineers, data analysts, enterprise architects, and—new this year—chief data officers (CDOs) reveal that despite 81% of respondents indicating that their team’s overall productivity has improved in the last 12 months, 95% of teams are still at or over capacity—just a 1% decrease from the 2021 study.
Data & Analy tics
sdxCentral - 5 Ways to Conquer Cloud Security
The technology enabler for the aforementioned strategy is policy as code. By aligning all teams under “the same source of truth regarding security,” enterprises can build a scalable technological foundation for cloud security.
Cloud Security
Datanami - Can We Trust AI — and Is That Even the Right Question?
“I think a lot of the time the way we think about it in relation to AI is, ‘what types of AI should we create?’ or ‘how should society perceive AI systems?’” Canca said. “But I think perhaps the more interesting thing to think about is: how does the AI eventually see us?”
Artificial Intelligence
ZDNet - Terrible cloud security is leaving the door open for hackers. Here's what you're doing wrong
According to the research, 99% of cloud users, services and resources provide excessive permissions. In most cases, these permissions and administrator privileges aren't needed by regular users, but there's the risk that, if cloud accounts are compromised, cyber attackers could take advantage of excess permissions to modify, create or delete cloud environment resources, as well as moving around networks to help expand the scope of attacks.
Cloud Security
VentureBeat - Improved optics could help the metaverse become as big as the internet
It’s important to note that the metaverse can only be realized through the technology that enables it. Augmented Reality (AR) and Virtual Reality (VR) offer the primary link to entering this alternate universe.
Metaverse
ComputerWorld - As employees return to the office, connectivity remains a concern
Flexible hybrid work arrangements such as hotdesking and the use of informal meeting areas could require better Wi-Fi connectivity, in particular.  “A lot of businesses…, their Wi-Fi doesn't stand up to that level of usage,"
Automation & Productivity
VentureBeat - Report: 55% of MSPs say IT infrastructure monitoring is their most valuable tech
For example, survey respondents said that faster root cause analysis was both the top IT monitoring challenge they face (cited by 46% of respondents) as well as the top AIOps capability critical to winning deals (48% of respondents).
IT Management
Network World - Who’s selling SASE and what do you get?
As an approach, SASE combines networking and security into a scalable cloud service that fits with the remote and hybrid work models companies use today. Potential benefits include easier network and security management, flexibility to scale up or down as business needs require, and lower costs.
Security
SiliconANGLE - Ripple effects from the Okta security breach are worse than you think 
Participating were some of the top CISOs in the community. The first one is really concerning: “We heard about this in the media.” The next one summarizes the overall sentiment: “Not a huge hit but loss of trust.” And this next one underscores the lock-in factor: “We can’t just shut Okta off like SolarWinds.”
Security
ZDNet - Turning point for artificial intelligence, which may or may not be dominated by the large cloud providers
"This integration is going to be hybrid, even more important than the cloud itself. Let's be very clear, it's not about operation, it's a lot of algorithms, it's a lot of different data, that integration piece, that will require system integration, architecture and design. That means that different types of firms will be involved in that work."
Artificial Intelligence
AiThority - Microsoft Industry Cloud Could Be a Worthwhile Consideration, According to Info-Tech Research Group
“The industry cloud market represents one of the largest vertical growth opportunities for technology suppliers,” says Ted Walker, a Principal Research Director at Info-Tech. “More than five hundred industry clouds have already been created globally, and revenue in this space is expected to exceed $20 billion by 2023.”
Cloud
VentureBeat - Data fabric versus data mesh: What’s the difference?
But underlining the challenges in analytics, more than 37% of respondents said that they weren’t confident in their ability to access “timely, relevant data for decision-making,” whether because of disparate storage sources or problems with developing data pipelines.
Data & Analytics
SiliconANGLE - Observability trends evolve as market must tackle cybersecurity with automation 
Being able to have observability across infrastructure — data storage, compute, network, containers and database — and through the CI/CD pipeline to client-side code and applications, even the code on which the company’s websites are built, is “the holy grail” of modern APM solutions.
Automation & Productivity
VentureBeat - ‘Denonia’ research points to new potential cloud cyberthreat, experts say
“The software relies entirely on fraudulently obtained account credentials,” AWS said — adding that “Denonia” does not really constitute malware “because it lacks the ability to gain unauthorized access to any system by itself.”
Security
eWeek - Cognos vs. Tableau: 2022 Software Comparison
IBM boasts a massive sales and services team, and global reach into large enterprise markets. Cognos, then, is likely to do well against Tableau within the existing IBM customer base. And right now, it appears to lead slightly in the cloud. But Tableau is ahead on overall features and is graded higher by Gartner.
Data & Analytics
VentureBeat - Report: Global IT spending expected to hit $4.4T
In fact, CIOs are accelerating IT investments in categories such as security, customer experience, analytics and cloud as they recognize the importance of remaining flexible and agile in responding to such factors.
IT Management
eWeek - The Dangers of Obsolete and Redundant Data
Businesses believe that retaining all their data will help mitigate potential risks, but the opposite is true. The more unaccounted-for data a company has, the higher the risk of falling victim to a cyberattack. When you are in the dark about your data, you don’t know what has gone missing.
Data Management
Forbes - Three Keys To Understanding The Cybersecurity Skills Gap (And Dealing With It)
Many firms that did not have a cybersecurity practice 10 years ago now have one or are building one. This is creating an escalating demand for cyber talents at all levels, including chief information security officers, developers, architects, trainers, auditors and pen testers.
Tech Jobs
Network World - 7 emerging network jobs that could boost your career
Traditional roles such as network administrator, network manager, and network architect are still relevant and in demand, says Jeff Weber, executive director in the technology practice at talent solutions provider Robert Half. But newer positions in areas such as cloud administration, cloud architecture and site-reliability engineering are hot, he says.
Tech Jobs
VentureBeat - Report: 35% of educational institutions have a SQLi vulnerability
According to a new study by Invicti Security, 35% of educational institutions and 32% of government organizations were found to be vulnerable to SQL injection (SQLi) in 2021. SQLi, a type of web vulnerability that allows malicious actors to modify or replace queries an application sends to its database, is especially threatening to these sectors because it has the potential to expose deeply personal information that attackers can use to assume identities.
Security
Datanami - Study Finds Businesses Can Realize 315 Percent ROI with KX Insights Data Analytics Platform
According to the study, a composite organization (see methodology) implementing KX could experience benefits of $5.72M over three years versus costs of $1.38M, adding up to a net present value (NPV) of $4.34M and a 315% Return on Investment.
Data & Analytics
VentureBeat - AI’s growing enterprise gaps explain why AWS SageMaker is growing
O’Reilly’s annual survey of enterprise AI adoption found that just 26% of organizations have AI projects in production, the same percentage as last year. In addition, 31% of enterprises report not using AI in their business today, a figure that is up from 13% last year.
Artificial Intelligence
TechSpot- Google-commissioned survey claims Microsoft tech makes governments less secure
Besides a majority of these government employees showing concern for future cyberattacks, and being unsatisfied with Microsoft's workplace offerings, Google said that governments' reliance on Microsoft tech made them more vulnerable to hacking.
Security
VentureBeat - The metaverse will fuel massive innovation (and Facebook isn’t the metaverse)
The truth is, the metaverse is a decentralized system that has a lot in common with peer-to-peer services like Napster, Skype, and BitTorrent. Oh, and Facebook and Meta do not.
Metaverse
SiliconANGLE - Three ways to build cost resilience into your cloud 
Many Gartner clients find out the hard way that cloud costs can spiral out of control more quickly and unexpectedly than traditional information technology costs. Because cloud usage is metered and billed in a “pay as you go” model, costs are highly sensitive to usage patterns.
Cloud
VentureBeat - Sustainability and the metaverse: 5 considerations for preparing for the next big tech paradigm shift
As enterprises prepare for Web 3.0 and consider how to do business at the convergence of emerging technologies, they may end up with massive online footprints that will generate an incredible need for data storage, which could lead to more products and more waste if not done thoughtfully.
Sustainability
VentureBeat - Data remediation: What it is and why it matters
This post provides an overview of the remediation process, its numerous benefits, and its different stages. Read on to discover how companies use this procedure to improve their workflow by reducing data overload.
Automation & Productivity
VentureBeat - How we can avoid the mistakes of Web2 when innovating around Web3
Web2 is driven by the entities that have the most data and can easily monetize the information they hold. Facebook might have been built as a social networking tool, but today Meta is essentially the top global data powerhouse. Web2 firms are trying to hang on to this business model.
Web3
StateScoop - Local cyber is finally getting its moment, city CISOs say
“Local government is right in the middle of everything that’s going on right now, and at the same time we’re seeing more effort in the federal government in actually helping to step up our game in cybersecurity.”
Security
VentureBeat - The difference between web and mobile search
“Do” transactional queries typically include an actionable verb, such as, “buy a red dress”, “record live video”, or “buy a concert ticket”. Users expect to find results that enable them to perform their desired action, and they expect the results to be relevant to their needs associated with that action.
Automation & Productivity
VentureBeat - AI governance adoption is leveling off – what it means for enterprises
Among respondents with AI products in production, the number of those whose organizations had a governance plan in place to oversee how projects are created, measured and observed was roughly the same as those that didn’t (49% yes, 51% no). Among respondents who were evaluating AI, relatively few (22%) had a governance plan.
Artificial Intelligence
Network World - SD-WAN may be getting cheaper
SD-WAN costs are apparently becoming more accessible, particularly at the lower-capacity end of the market, according to TeleGeography’s research, which said that median non-recurring charges for SD-WAN implementations—meaning charges for the SD-WAN appliances themselves, not for additional managed services—have decreased by about 15% compounded annually since 2018.
Tech Trends
VentureBeat - Gartner lists seven cybersecurity trends for 2022
Taken together from the standpoint of enterprises focused on new digital initiatives, the seven trends show clearly that cybersecurity needs to be a business enabler first. The two trending proof points of cybersecurity’s business value are decentralized decision-making and faster response times to business challenges.
Security
SiliconANGLE - As danger looms, the C-suite taps the brakes on tech spending
That represents a 700-basis point drop in three months — in a market where you can’t hire enough people. The percentage of companies hiring has gone from 10% during the pandemic to 50% today, according to ETR data. And we know there’s still an acute skills shortage. So you would expect more IT outsourcing, but it’s down.
Tech Trends
VentureBeat - Running legacy systems in the cloud: 3 strategies for success
No one gains a competitive advantage from worrying about infrastructure these days; they win with a laser focus on transforming their applications and their business. That’s a big part of cloud’s appeal – it allows companies to do just that because it effectively takes traditional infrastructure concerns off their plates.
Cloud
Network World - Aruba exec: Centralized policies, NaaS, segmentation are big
“Another idea is that instead of putting different policies in all these different places around the enterprise—like a policy for the user on VPN, then another a policy for the user in the branch and another for headquarters—if we instead said, centrally define this class of traffic going to these cloud destinations, we’re going to have company-wide policy of sending that to this particular cloud-hosted security vendor like Zscaler,”
Network Management
VentureBeat - Report: Majority of execs believe data is vital to sustain the metaverse
This business investment in the platform also highlights new questions – such as security in the metaverse or how the enterprise can best use this digital ecosystem – and data is the common thread. Eighty-nine percent of respondents considered metaverse data important to their business operations in the next 5 years.
Data & Analytics
eWeek - 5 Digital Transformation Strategies for Mid-Market CIOs
However, most small and mid-sized businesses, or SMBs, will have no choice in the matter. If they fail to offer a teleworker solution, mid-tier competitors will steal their employees away, and they could even find themselves unable to compete anymore.
Digital Transformation
VentureBeat - Google Cloud security survey is ‘aggressive’ move vs. Microsoft
This line of argument — that Microsoft is a fundamental part of the cybersecurity problem, rather than the solution — has been made in the past by Microsoft security rivals such as CrowdStrike. But the survey appears to be the most outspoken critique of this kind against Microsoft by Google Cloud so far.
Cloud Security
SiliconANGLE - Database competition heats up as AWS, Oracle and Snowflake reshape the landscape 
In addition to its enhancements for HeatWave, Oracle has published a set of benchmarks for the offering. The company published benchmark performance results against competing databases and has challenged other firms to run comparisons.
Data & Analytics
Enterprise Talk - Four Key ‘Human’ Pitfalls to Keep an Eye on in Digital Transformation
Some digital transformation initiatives are started because someone is infatuated with a new technology or tool and just wants to use it. Businesses must ensure that they thoroughly understand the ramifications of a new venture before committing to it, as well as whether it will deliver a good return and meet a reasonable business need.
Automation & Productivity
VentureBeat - Report: Employees spend 3.6 hours each day searching for info, increasing burnout
Unfortunately, Coveo found that the average employee spends 3.6 hours daily searching for information — an increase of one hour more from last year’s report. IT employees spend half their day (4.2 hours) looking for relevant information.
Automation & Productivity
Network World - Opinion Zero trust requires network visibility
This translates to logging information from network infrastructure at every level, from the core switches all the way “out” to the edge switches in the branch networks and all the way “in” to the virtual switches in the data center
Security
eWeek - California Privacy Rights Act and Enterprise Data Management: Key Updates
The new law broadens the existing CCPA definition of an individual’s sensitive data to include any information reasonably capable of being associated with a person. The new law also makes it easier for consumers to regulate the processing of sensitive information.
Data Privacy
VentureBeat - Everyone’s joining the metaverse, but the real business opportunity is building your own
While the rational entry plan for organizations to join the metaverse is diving headfirst into Decentraland, Sandbox, or other developed spaces, the real business opportunity lies in the creation of individual, unique metaverses for each company — offering consumers an immersive, end-to-end experience that is truly irreplicable and can evolve without boundaries.
Metaverse
sdxCentral - Should CISOs Face Criminal Charges for Negligence, Failure?
It depends on how the security enforces best practices and strategies across the whole organization, and also the technologists, developers, and others who are responsible for deploying those practices, he said. “If you take the approach of just blaming the security team, you’re blaming the one group that is absolutely concerned about security all day long.”
Security
Datanami - Comet Releases New Survey Highlighting AI’s Latest Challenges
Issues include the fact that many experiments are abandoned because some part of the data science lifecycle was mismanaged. This is due in large part to the manual tracking processes that organizations often put in place, which hinder effective team collaboration, and are not adaptable, scalable, or reliable.
Data & Analytics
ZDNet - State-backed hacking attacks are a big worry, but most firms don't know what to watch out for
According to analysis by cybersecurity company Trellix, half of all organisations think they've been the target of a nation-state cyberattack within the past 18 months, while a further 42% think they'll be subject to one in the future. Fewer than one in 10 businesses believe that they're not a target for nation-state hackers at all.
Security
VentureBeat - Computing’s new logic: The distributed data cloud
The distributed data cloud is not a single tool or platform, but an ecosystem pattern that gets data to the right place and the right person at the right time in a secure, governed, and trusted way. It includes a federated collection of data management and analytics services spanning public clouds, private clouds, and the network edge.
Data Management
ZDNet - Farewell ZDNet: Data remains the lifeblood of innovation
As we've noted, looking ahead is the great reckoning on how to deal with all of the data that is landing in our data lakes, or being generated by all sorts of polyglot sources, inside and outside the firewall. The connectivity promised by 5G promises to bring the edge closer than ever.
Data & Analytics
Network World - Use zero trust to fight network technical debt
In addition, the ZT network does not assume that a trust relationship is permanent or context free: Once it is on the network, a node must be authenticated and authorized for every network operation it attempts.
Network Management
VentureBeat - 4 key areas of opportunity for automation
To avoid disaster, take the steps out of the siloes and understand each one. Then you can think about which steps can still work using a low human touch without sacrificing quality or customer experience — and which components need more human intervention or interaction.
Automation & Productivity
SiliconANGLE - Cloud sales lift data center hardware and software spending to new heights 
Over the last 12 months, they have spent billions of dollars to kit out new data centers with servers, storage, networking and software. Indeed, the cloud infrastructure providers now account for almost half of all data center spending in the world, according to a report released today by Synergy Research Group.
Cloud
The Tech Report - Cybersecurity Priorities – Trends of the Future
Business leaders are expecting that more than $77 billion will be spent on security services outsourcing in 2022. This makes it the most expensive category of cybersecurity spending. According to recent research, 62 percent of companies already have a plan to outsource in the next 12 months.
Security
VentureBeat - Report: 70% of U.S. consumers want to use AI for their jobs
The majority would like AI to help with tasks such as mistake reduction (58%), problem-solving (57%), information discovery and process simplification (both 56%).
Automation & Productivity
eWeek - Data Security: 3 Things Most Organizations Overlook
Those three security challenges are untrusted computation programs, unvalidated input, and unauthorized data movement.
Data Management
sdxCentral - MITRE, Fortinet Map Cyberattack Flows to Identify ‘Choke Point’
The project is “a pictorial showing of what the adversary did at each step, and that’s such a valuable thing to show up to executives,” Skoog said. “It’s a means to communicate across different technical expertise with what’s happening.”
Security
Network World - Best backup for 7 major databases
There are many backup options for databases, but here are recommendations for Cassandra, DB2, DynamoDB, MongoDB, MySQL, Oracle, and PostgreSQL.
Data & Analytics
sdxCentral - Cloud Security Alert Fatigue Causing Chaos
The cloud security vendor surveyed more than 800 IT professionals across five countries and 10 industries for its 2022 Cloud Security Alert Fatigue Report. It found that 59% of respondents were pinged at least 500 times per day regarding potential security issues. And that 57% of respondents use five or more cloud service providers.
Cloud Security
VentureBeat - Why USD could be the HTML for the metaverse, digital twins and more
USD is in the same position today. It isnt great at everything, but it does the best job among dozens of alternatives for sharing 3D assets across tools, services and platforms in an open and extensible way. USD is already helping companies like Ubisoft and Ikea simplify some 3D workflows and seeing traction with rendering engines like Unity and Unreal.
Automation & Productivity
Cyber Defense Magazine - How to Fix Mid-Market Security Using Intelligent Automation and AI
In Coro’s recent report analyzing mid-market cyber security, we found that while 50% of medium-sized companies had email malware protection in place in 2021, 88% of them had misconfigured their protection settings. Meanwhile, only 16% of mid-sized companies had email phishing protection in place, and 71% of them had misconfigured settings.
Security
AiThority - The Importance of Data Literacy: Why It Is Important to Achieve Data Literacy
The open approach borrows conceptually from Bertelsmann University’s “Data Curriculum” which provides all employees with a universal training program in the field of Data. It focuses on six data “roles”  ranging from data scientist to business partner. These roles all tend to be found within most B2B businesses.
Data & Analytics
VentureBeat - Report: 81% of companies experienced a certificate-related outage in the past two years
Along with the rise of machine identities, the report showed that enterprises struggle with a lack of complete certificate visibility. This year’s survey revealed that the number of internally trusted certificates grew nearly 16% since last year, with the average business issuing 267,620 internally trusted certificates across its organization.
IT Management
Forbes - Chasing The Myth: Why Achieving Artificial General Intelligence May Be A Pipe Dream
Artificial General Intelligence, a concept that has not yet been brought to life, will, for all purposes, think and carry out complex tasks such as corporate restructuring and HR management using characteristic human qualities such as logical reasoning, empathy and human-centeredness while retaining the expected computational speed, accuracy and big data analytics associated with standard AI applications
Artificial Intelligence
ZDNet - Tech hiring is broken. Software developers could be the key to fixing it
According to a 2021 report by developer hiring marketplace Terminal, 56% of software engineers feel less enthusiastic about a job role after going through a poorly managed interview. Likewise, 49% of developers say they are more likely to pass on a job after being interviewed by someone who doesn't seem to understand the job, or the underlying technology requirements.
Tech Jobs
Forbes - Digital Signage: The Top Five Trends You Need To Know About In 2022
Since quality user experience is vital, retailers might be further integrating APIs. That's because they help with tasks such as user login and registration, file access and storage, database modification, client-to-client messaging and more.
Digital Signage
TMCNet - Global Survey Validates the Emergence of a New Practice Area in Enterprise IT Valued at $30 Billion
The global survey results of over 800 corporate finance executives validate the emergence of a new practice area in Enterprise IT that includes risk management, payments, real-time connectivity, treasury management and working capital finance.
IT Management
TechBullion - Metaverse is taking off, Adobe / Meta / WIMI leads a new trend
The application of underlying technologies, such as bitcoin, blockchain, VR, AR, artificial intelligence, big data, 5G communication, and wearable devices, is directly mature, and has gradually become an indispensable infrastructure for metaverse. Metaverse provides a larger increment and may have trillions of market sizes in the next decade.
Metaverse
TMCNet - More than Half Of Technology Leaders Believe Data Will Be Vital For Sustaining The Metaverse - Bright Data Research
To support their Metaverse strategy, more than three-quarters of leaders (84%) across the IT, telecom, and technology sectors say they are planning to look at procure data intelligence solutions to be deployed inside virtual worlds in the next two years.
Data & Analytics
VentureBeat - Report: Only 48% of orgs say they have implemented a formal ransomware strategy
Additionally, less than half of respondents (48%) have implemented a formal ransomware plan. Healthcare was the most prepared at 57% with a formal ransomware plan, and energy was the least at 44%, despite both sectors experiencing significant breaches over the past twelve months.
Security
Datanami - Qlik Report: Data Literacy to be Most In-Demand Skill by 2030 as AI Transforms Global Workplaces
As organizations shift from passive data consumption toward a state of Active Intelligence, where continuous data becomes integrated into working practices to trigger immediate actions, the report predicts how this will impact skills requirements and professional opportunities.
Data & Analytics
VentureBeat - Report: Cloud automation is key to future-proofing cybersecurity
Eighty-six percent of respondents are exploring ways to automate access controls, especially for privileged access. But even with 68% of respondents seeing increases in budgets and staff, they continue to face mounting threats from an expanding threatscape that’s challenging to address.
Security
TMCNet - State of the Cybersecurity Workforce: New ISACA Research Shows Highest Retention Difficulties in Years
Sixty-three percent of respondents indicate they have unfilled cybersecurity positions, up eight percentage points from 2021. Sixty-two percent report that their cybersecurity teams are understaffed. One in five say it takes more than six months to find qualified cybersecurity candidates for open positions.
Tech Jobs
Network World - Surprise! The metaverse could be great news for the enterprise edge
The problem is latency—the delay between when we initiate something in the metaverse and when our avatars mirror that action.  Significant loss of synchrony with the real world is an ugly problem for metaversing, and we can expect Meta and others to work to correct it by controlling latency.  If that happens, there’s hope for those enterprise edge/IoT applications.
Edge Computing
ZDNet - Social engineering attacks to dominate Web3, the metaverse
As some of us speculate on the potential future value of ENS domains and register them -- such as 'businessname.eth' -- these addresses could be used as leverage in phishing attacks, especially as ENS domains are recorded on the blockchain and cannot be removed through trademark disputes easily.  
Web3
VentureBeat - Report: 89% of enterprises have been attacked by Kubernetes ransomware
The situation in the U.S. is slightly better, with 42% reporting they have data protection in place for their Kubernetes environments. However, 55% of U.S. respondents at organizations that have deployed Kubernetes say they have already experienced a ransomware attack on their containerized environments, versus 48% globally.Security
ZDNet - APAC firms see need to train staff in digital skills, but few actually do so
Specifically, the ability to use cloud-based tools such as accounting and CRM (customer relationship management) software-as-a-service (SaaS) applications emerged as the top-most needed digital skill by 2025, according to a study commissioned by Amazon Web Services (AWS).
Digital Transformation
Network World - NaaS adoption will thrive despite migration challenges
By replacing conventional hardware-centric VPNs, firewall appliances, load balancers, and MPLS connections, NaaS technology promises adopters the ability to rapidly scale up and down in lockstep with demand while eliminating hardware costs and bolstering network security and service levels.
Network Management
sdxCentral - As Vendors Ditch SASE For SSE, What’s Actually Changed?
But for the most part, these SSE products aren’t so much new as they’re rebranded and repackaged SASE services that’ve been stripped of their SD-WAN capabilities, if they ever had them in the first place.
Security
VentureBeat - The risk of undermanaged open source software
In fact, according to Red Hat’s 2022 The State of Enterprise Open Source report, 89% of respondents believe that enterprise open source software is as secure or more secure than proprietary software.
Security
Network World - What is IPv6, and why is adoption taking so long?
Adoption of IPv6 has been delayed in part due to network address translation (NAT), which takes private IP addresses and turns them into public IP addresses. That way a corporate machine with a private IP address can send and receive packets from machines located outside the private network that have public IP addresses.
Network Management
SciTechDaily - New Quantum Technology To Make Charging Electric Cars As Fast as Pumping Gas
Researchers say that consequences can be far-reaching and that the implications of quantum charging can go well beyond electric cars and consumer electronics. For example, it may find key uses in future fusion power plants, which require large amounts of energy to be charged and discharged in an instant.
Quantum Computing
VentureBeat - XR pioneer calls for metaverse regulation
Furthermore, building a hyper-accurate user profile over time should be banned — biometric data like eye movements should not be stored indefinitely. Having less data makes AI-based targeted advertisements a little less potent. Ideally, most data streams should be kept strictly real time.
Metaverse
SiliconANGLE - Cisco: Complexity and number of cyberattacks jumped in 2021 
Ransomware was identified as the top security concern for 2022 by 38% of the respondents, followed by zero-day or heretofore undiscovered vulnerabilities (29%), exploitation of internet-facing apps (16%), phishing attacks (14%) and unauthorized access to stolen credentials (4%).
Security
eWeek - Top 20 Kubernetes Best Practices
A survey from the Cloud Native Computing Foundation (CNCF) revealed that 91% of respondents use Kubernetes, 83% of them in production. That’s up from 78% the previous year.
Cloud
VentureBeat - Report: 80% of employees say they’ll stay at a company offering data training
A new survey by Tableau and Forrester Research shows that data skills are increasingly vital, yet training lags. Eighty-two percent of decision-makers surveyed expect basic data literacy from employees in every department — including product, IT, HR and operations. And expectations are only increasing. By 2025, close to 70% of employees are expected to use data heavily in their job, up from 40% in 2018.
Data & Analytics
Datanami - Spending on AI Solutions Will Double in the US by 2025, Says IDC
Retail will remain the largest U.S. industry for AI spending throughout the forecast while Banking will be the second largest industry. Together, these two industries will represent nearly 28% of all AI spending in the United States in 2025 and will account for nearly $20 billion of the amount added to the U.S. total over the forecast.
Artifical Intelligence
VentureBeat - What you need to know about the state of the metaverse today
The major difference with Brave is its aggressive anti-ad approach that strips online ads from websites. Users will navigate social networks not with Facebook but with applications like Steemit, a blockchain based social network that gives users control over their personal information, protects their content, and provides an ownership stake in the platform based on their content contributions.
Emerging Tech
Cyber Defense Magazine - Directed Analytics – The Future of Data Management
Directed data analytics offers the next generation of data reporting, providing a multitude of data in a short period, displayed in a customized way that is fit for the user and company, and compiling the data into a broader industry context in order to visualize long-term trends and patterns
Data & Analytics
VentureBeat - AI critical to business success in post-pandemic world, study finds
Digital transformation continues to be a top priority for a third of business decision-makers, while boosting productivity is a priority for 28%. Interestingly, 26% of organizations are investing in ESG, which has become more of a priority than developing new products and services (24%) or accelerating financial growth (21%).
Automation & Productivity
Forbes - Building A Data-Driven Culture Within State Governments
Analytics can be complicated to the general business user and leveraging the capabilities of AI to break down those complications providing actionable insights from our data.
Data & Analytics
GTSC - There’s More to AI Bias Than Biased Data, NIST Report Highlights
“But these approaches do not adequately capture the societal impact of AI systems. The expansion of AI into many aspects of public life requires extending our view to consider AI within the larger social system in which it operates.”
Artificial Intelligence
Pew Research Center - AI and Human Enhancement: Americans’ Openness Is Tempered by a Range of Concerns
This survey looks at a broad arc of scientific and technological developments – some in use now, some still emerging. It concentrates on public views about six developments that are widely discussed among futurists, ethicists and policy advocates.
Artificial Intelligence
VentureBeat - Report: Bots cost businesses millions of their online revenue
If businesses cannot determine the difference between real customers and bots, this can make marketing analytics data useless. Businesses have burned through marketing budgets and made poor decisions based on bad marketing data.
Data & Analytics
Network World - What is a digital twin and why it's important to IoT
In essence, a digital twin is a computer program that takes real-world data about a physical object or system as inputs and produces as outputs predictions or simulations of how that physical object or system will be affected by those inputs.
Data & Analytics
ZDNet - Franchises, partnerships emerge in Ransomware-as-a-Service operations
In total, 65% of the leak sites monitored last year were managed by new players on the scene. The majority of targets are based in developed nations, including the US, Canada, Germany, Australia, Japan, and France.  
Security
Forbes - The Biggest Cyber Security Risks In 2022
Aside from the potential for breach of privacy, loss of money, and disruption to infrastructure from cyber-attacks, there's another genuine and pressing problem that's often overlooked: A loss in the trust in tech and data.
Security
VentureBeat - AI critical to business success in post-pandemic world, study finds
The study found a significant shift in attitudes towards AI, ML and data analytics: Over three-quarters (77%) of knowledge workers said that all three could benefit their company in the next 36 months.
Automation & Productivity
TMCNet - Universal Data Governance Framework Ensures Data Protection, Promotes Data Accessibility and Interoperability for New Data Types Beyond PII
 A good example is the United States. There is no common consensus to handle PII among the different states and industry actors. Navigating through all these regulatory requirements across different jurisdictions is very time-consuming and exhausting. In addition, the classification of new PII, such as audio recordings and IP addresses, remains unclear.
Data Governance
Insurance Newsnet - Insurance Fraud Report 2022: Real Time Data, A Crucial Asset In Fraud Fighting
Survey respondents have differing views on the challenges and benefits of fraud detection software solutions. The common theme however is the data challenge; from underwriting to claims to special investigations.
Data & Analytics
Network World - DDR5 memory is coming soon. Here’s why it matters.
DDR5 memory also features a minor power reduction. DDR5’s operating voltage is 1.1 volts, down from DDR4’s 1.2 volts. That may not seem like much, but multiply that over hundreds or even thousands of DIMMs in a data center, and you start to add up to some real power savings.
Automation & Productvity
sdxCentral - Private Network Complexities, Opportunities Abound
It also expects 4G LTE radio access network (RAN) infrastructure to remain the dominant technology for wireless networks through the five-year period, however 5G radios should see stronger adoption in the latter years.
5G
threatpost - Misconfigured Firebase Databases Exposing Data in Mobile Apps
Mobile apps that researchers found were left vulnerable by cloud misconfigurations were popular apps for dating, fitness, bookkeeping, logo design, e-commerce and more, some with more than 10 million downloads, according to the post.
Security
VentureBeat - Report: Edge technologies will drive emerging tech investments in 2022
Looking back to 2021, 5G drew the highest average investment in 2021, with survey respondents reporting an average of $465,000 invested in the technology. This was followed by IoT at $417,000 and edge technologies (i.e., edge AI and edge computing) at $262,000.
Edge Computing
ZDNet - These four types of ransomware make up nearly three-quarters of reported incidents
"The most prevalent ransomware strain in the fourth quarter of 2021 was LockBit 2.0, which was responsible for 29.7% of all reported incidents, followed by Conti at 19%, PYSA at 10.5% and Hive at 10.1%," said the researchers.
Security
Datanami - Cloudera Study Reveals 26 Percent of Businesses Are Reshaping Priorities Around ESG
New research from Cloudera, the enterprise data cloud company, reveals more than one quarter (26%) of business decision makers are now putting increasing investment in environmental, social and corporate governance (ESG) ahead of developing new products/services (24%) or accelerating financial growth (21%).
ESG
NetworkWorld - 5 SD-WAN gotchas to avoid
“Many folks supplemented their WANs with [Internet connectivity], and then left MPLS in.” In many regions, business-class Internet “is not a ton cheaper,” he says. In addition, as organizations go to Internet connectivity versus MPLS, they often increase bandwidth, so cost per megabit might go down, but total cost rarely does, he says.
Network Management
VentureBeat - Accenture lists top 5 tech trends for 2022
Blockchain is the backbone of Web3, an all-encompassing term for a decentralized internet, where no single entity can control the flow of information online. This means that instead of storing data on central servers, each member of a network will have access to the same data in the form of a distributed ledger.
Emerging Tech
IndustryWired - Top Applications of Decision Intelligence and AI in Businesses
Decision Intelligence eliminates the need for long conversations. With a DI platform, you have a nexus of truth that everyone on your team can refer to and trust. You know that the collected insights generated are unbiased, accurate, and reliable. This allows you to act faster and reduces conflict within your team.
Data & Analytics
VentureBeat - Report: Hardware still accounts for biggest portion of IT spending
Driven by the shift to remote work which places a premium on portable computing devices, companies plan to spend significantly more on laptops than on desktops — 19% of hardware budgets vs. 14%, respectively.
IT Management
eWeek - Top Data Analytics Tools & Software 2022
Some companies hire data analysts and business intelligence professionals; other have a team of data scientists helping them decode various data sources. In sum, having the right data analytics tools is part of the solution; having skilled big data experts is just as important.
Data & Analytics
KuppingerCole - Hyperautomation Changing Business
Hyperautomation integrates AI/ML in order to automate enterprise automation. In a nutshell – automate the automation. This can achieve enterprise-level scalability for automation that uses methodical processes to identify processes and tasks that could be automated, as well as increasing the capabilities and flexibility of the automation “bots” that carry out those tasks
Automation & Productivity
TMCNet - Orca Security Survey Finds Cloud Security Tool Sprawl Increasing the Flood of False Positive Alerts, Missed Critical Issues, and Team Burnout
This combination of multi-cloud adoption and disparate tooling is overwhelming security teams with a flood of inaccurate alerts. For example, 59% of respondents receive more than 500 public cloud security alerts per day, and 38% receive more than 1,000 per day.
Cloud Security
IndustryWired - Top 10 Use Cases of AI in Data Mining Algorithms, Explained
The data mining technique in mined data is used by artificial intelligence systems for creating solutions. Data mining serves as a foundation for artificial intelligence. AI in data mining is a part of programming codes with information and data necessary.
Artificial Intelligence
VentureBeat - Cloud security teams are ‘overwhelmed and desensitized’ by alerts, survey shows
Among the findings of the 2022 Cloud Security Alert Fatigue Report is that 59% of respondents report that they receive more than 500 alerts about public cloud security per day. Thirty-eight percent report receiving more than 1,000 of these alerts each day.
Security
Markets Insider - IT Talent Trends for 2022 Released by Info-Tech Research Group
What employees are looking for is changing. The biggest change from 2019, pre-pandemic, to today is an increase in the importance of culture, flexible or remote work, and work-life balance.
IT Management
Forbes - Whirlpools And Monsters: Identifying Key Cloud Risks
"Organizations with little or no cloud cost optimization plans rush into cloud technology investments. They end up overspending on cloud services by up to 70% without deriving the expected value from it."
Cloud
CUInsights - Robotic process automation: Why – and why now?
Remember that there was a fear, decades ago, that desktops would take away people’s jobs. Instead, desktops transformed those jobs, freeing people to do other tasks and work more intelligently. In the same way, RPA will simply change what people do and empower them to invest more in their uniquely human talents.
Automation & Productivity
VentureBeat - Can AI transform small businesses and grow prosperity across North America?
Small businesses don’t have the same access to online advertising ecosystems, or the knowledge to leverage them effectively. Beam.city has built industry knowledge into an algorithm that simplifies the experience for small businesses and guides them in where to best allocate marketing dollars.
Artificial Intelligence
Forbes - Transforming The Supply Chain With Data Analytics And Intelligence
In their "2021 Future of Supply Chain Survey," Gartner discovered that 43% of enterprises will continue to digitalize and integrate innovative technology into enterprise-wide systems. This means that in the coming year, the ability to augment operations and decision-making with data analytics will prove to be a transformative and highly-favored capability.
Data Analytics
BecauseBecause - Why Is Cloud Computing Important? Key Benefits Plus Your Jobs Prospects
The global cloud computing market is expected to more than double in size by 2025. We find out why cloud computing is important and what jobs are available for MBA graduates
Cloud
VentureBeat - How decision intelligence could put AI at the center of every business
Decision intelligence (DI) is now helping companies bridge the gap between theoretical AI and commercial AI, with Gartner predicting that more than a third of large organizations will be using DI within the next two years.
Artificial Intelligence
SiliconANGLE - How cybersecurity leaders can reframe their roles to succeed
As a result, the role of the cybersecurity leader has become increasingly elastic because of the growing misalignment of expectations from stakeholders within their organizations. This is causing burnout among security leaders, who are overworked from practicing in “always-on” mode.
Security
VentureBeat - Report: 25% of mobile endpoints have faced malicious apps
The report takes a look at the mobile attack surface, examining a year’s worth of mobile threat data in review, including a deeper concentration on mobile device threat and mobile application threat trends.
Security
ZDNet - As cloud costs spiral upward, enterprises turn to a thing called FinOps
While the survey's authors do not provide a similar composite spending figure for larger enterprises, they report that many spend $12 million or more annually on selected public cloud services -- 18% of enterprises spend this on AWS, 15% spend this on Microsoft Azure, and seven percent on Google Cloud Platform.
Cloud
Inside BigData - Cloud Database Trends Survey: Key Cloud Benefits of Database-as-a-Service (DBaaS) for Cloud Migration
In fact, 61% of respondents surveyed claimed they were either already fully migrated or working to complete their full database migration to the cloud. More than a third, 36%, were partially migrated or working on a partial migration, with the remainder still planning their migration.
Data & Analytics
VentureBeat - Executives discuss top challenges in deploying AI — and how to solve them
 Increasingly, adopting AI is leading to boosted profitability, with 27% of businesses responding to a December 2021 McKinsey survey claiming that at least 5% of their earnings before interest and taxes (EBIT) are now attributable to AI.
Artificial Intelligence
Techstartups - What is the Metaverse? The Metaverse Explained Simply
The metaverse also has another potential including the opportunities to leverage the technology in the areas of education and learning. The metaverse could be used to connect students, educators, and learners from all around the world and empower them to interact in meaningful ways.
Metaverse
VentureBeat - Digitization could drive manufacturing beyond Industry 4.0
During this shift, forty-eight % of organizations invested in cloud-enabled tools and technologies and 47 % in digital collaboration tools to support their remote workforce, according to an Accenture survey.
Automation & Productivity
VentureBeat - Edge computing will see new workloads, strong growth, IDC predicts
Edge computing looms as an important next step for AI and analytics applications that have been a target for cloud migration, but which have clogged up some of the data pipes to and from the cloud.
Edge Computing
AiThority - Applied AI Adoption: How to Get it Right
Yet, time and again we see companies, of all shapes and sizes, blindly invest in or deploy AI without a clear understanding of what problems they are looking to solve or the value they are trying to generate. This results in huge amounts of wasted time and money.
Artificial Intelligence
VentureBeat - 5 key levers IT management can pull to fight the talent crunch
Gartner research shows that the time to fill a role has increased by 18% since before the pandemic,  and a survey of HR leaders found that 48% of organizations report significant concerns about turnover.
IT Management
AiThority - Enter the Metaverse: Industries are Gearing up for Tech-driven Innovations
“As the metaverse is maturing quickly, this is a crucial time for digital transformation leaders to act. It can be adopted for several use cases to make business operations more personalized, improve customer engagement and increase revenues.”
Emerging Tech
VentureBeat - Report: Cybersecurity teams need nearly 100 days to develop threat defenses
A recent analysis by Immersive Labs of 35,000 cybersecurity team members inside 400 large organizations found that it takes over three months (96 days) on average to develop the knowledge, skills and judgment to defend against breaking threats.
Security
Blocks and Files - Flash and software-defined storage are taking over the datacenter
Server-attached SSDs are now growing in popularity. A majority of companies, 55 percent, use SATA-based SSDs in servers, with an additional 14 percent planning to within two years. A minority, 40 percent, use SAS SSDs, with another 16 percent intending to do so within two years.
Data Storage
Computerworld - IT workers grow restless, and younger ones want respect — Gartner
“IT is a super-heated labor market, right now,” Waller said. “There’s a great talent competition going on there. Sometimes we even compare it to the competition to get top athletes — particularly in key skill areas, such as cybersecurity, data science, cloud and agile development, etc.”
Tech Jobs
VentureBeat - What is a data lake? Definition, benefits, architecture and best practices
A number of vendors are expected to drive this growth, including Databricks, AWS, Dremio, Qubole and MongoDB. Many organizations have even started providing the so-called lakehouse offering, combining the benefits of both data lakes and warehouses through a single product.
Data & Analytics
Datanami - Enterprise Data Storage Market Size to Grow by $1.14B, Says Technavio
Over the projection period, the enterprise data storage market in APAC will benefit from significant expenditures in smart home and smart city projects by major countries such as Japan, China, and South Korea.
Data Storage
VentureBeat - Why and how the U.S. should increase cyber protection: A call to arms
It is incumbent upon the cybersecurity community to pursue holistic solutions for grids and networks through a “digital twin” construct that will identify, preempt, backup and recover from any emerging threats and continue to protect vital assets during periods of attack or disruption.
Security
ZDNet - Data centres are still a tempting target for hackers: Here's how to improve your security
Measures should also be put in place so in the case of a data centre being targeted by an attack designed to disrupt it, services can be maintained. For data centre operators, risk management should be driven by senior leaders to be most effective.
Security
eWeek - Understanding Database Virtualization: 5 Key Points
With the advent of database virtualization (DBV) – not data virtualization – a new methodology has entered the arena. DBV claims to break vendor lock-in on data warehouse technology. How applicable is it and how can IT leaders evaluate the technology?
Data & Analytics
VentureBeat - Report: Increased cloud usage secures spots for AWS, Azure, and Google Cloud as the top 3 providers
In addition to adoption (if an organization is using a cloud provider), usage levels are an important metric as well. As organizations increase overall cloud usage, they tend to gravitate toward market leaders. Data from this year’s survey indicates Azure seems to be either closing the gap — or has slightly surpassed — AWS with some users.
Cloud
ZDNet - A Forrester analyst's impressions from Mobile World Congress 2022
The slow and ongoing standardization process between 3rd Generation Partnership Project (3GPP) release cycles, as well as the lack of chipsets, devices, spectrum limitations, and modules that support emerging 3GPP 5G standards, remains a drag on the speedy 5G uptake.
IoT/Mobility
CSO - 8 takeaways for CISOs from the NSTAC zero-trust report
The report does an excellent job summarizing the history of zero trust, originating in the private sector, as well as the slew of zero-trust efforts, guidance and requirements that continue to stream from authoritative government sources.
Security
Forbes - The Future Course Of Process Automation Will Be Driven By AI, Not Bots
Deploying an RPA bot is analogous to using a hammer. It’s great for driving nails, but when confronted with a screw or another fastener, it cannot perform as expected. A bot that tries to do its job regardless of its inputs can cause damage (digitally speaking), possibly shutting down the workflow that relies upon it.
Artificial Intelligence
VentureBeat - With Mandiant, Google can challenge Microsoft’s security dominance
Microsoft is trying to support all of its own products and services to deliver security to customers, while “Google is a little more interested in supporting the SOC – the security operations center,” Firstbrook said.
Security
threatpost - The Uncertain Future of IT Automation
Cloud-native technologies make connectivity with remote devices easier while staying secure without the use of VPNs. They also improve visibility into the exact, real-time status of a device. IT teams will have an easier time pushing patches automatically without worrying about VPN bandwidth restrictions.
IT Management
VentureBeat - Pandemic pushes growth in robotic process automation
The new report from Forrester notes that the definition of the term is blurring as the general marketplace for automation grows, too. As RPA tools improve, they’re adding connections to other enterprise tools, producing what Forrester calls an “automation fabric market.”
Automation & Productivity
eWeek - Detecting the Unknown Unknowns in Cybersecurity
Many security solutions, even today, are still trying to use various types of signatures to detect malicious files, network traffic, human behaviors, and several others. Even tools that are trying to harness the immense power of large user communities to create vast databases of tens of thousands of different signatures are only effective to some extent. Overall, this strategy is not enough to provide good protection against the known threats.
Security
VentureBeat - IT professionals plan to adopt passwordless technology, according to ESG report
Today, an identity and access management research report created by Enterprise Strategy Group (ESG) unveiled that 85% of IT and cybersecurity professionals agree the adoption of passwordless technology is among top strategic initiatives.
Security
Security Boulevard - Automation is the Top Cloud Security Priority
Respondents have already integrated their DevOps toolchain into cloud deployments, yet organizations are still struggling with the lack of expertise that bridges security and DevOps.
Cloud Security
TechBullion - External Human weakness: why MFA isn’t the answer
Anything. Humans are vulnerable by nature: social engineering attacks may exploit their greed, their insecurities or simple confusion under stress. The tactics may be more or less sophisticated, and may or may not be supported by technological tricks such as deepfakes, but human vulnerability doesn’t change.
Privacy & Security
Industry Wired - Is there Better, Alternatives to Blockchain for Businesses
For example, Amazon’s Quantum Ledger Database simplifies the process of implementing a shared database designed for applications like ledgers, providing a cryptographically verifiable audit trail without all the overhead of a distributed ledger or blockchain.
Blockchain
VentureBeat - Email security bill of rights for a zero-trust world
And although business email compromise (BEC) attacks make up a small percentage of attacks, they cause the most damage: Our data suggest that BEC accounted for 1.3% of attacks but would have resulted in over $354 million in direct losses.
Privacy & Security
AiThority - By 2025, Chatbot Messaging App Accesses to Reach 9.5 Billion Globally
Advanced chatbot messaging apps are becoming conversant at simulating chats using audio, video, and GIFs too. The popularity of chatbots for messaging is gaining popularity on account of the massive demand for self-service customer experiences that can be delivered in real-time 24/7.
Automation & Productivity
VentureBeat - Why the future of the metaverse can only be decentralized
A social network based on a DAO upends this model to return value to those who generate it. Users have an ownership stake in the platform, and assuming it operates using the same ad-based revenue model, the user will receive a share of these revenues as a reward for their engagement.
Metaverse
Techstartups - Cyber threats keep evolving, and so should your defenses
Typically, there are over a hundred thousand cyberattacks in an hour or more than 2,000 per minute. When it comes to mobile devices, an average of 24,000 malicious mobile apps are blocked daily by mobile app stores.
Security
VentureBeat - AI-powered intelligent security makes the hybrid enterprise possible
To effectively counter this increased cyberthreat, the key for security teams is to get “very good at separating the signal from the noise,” he said. “And you can’t do that without AI and ML.”
Security
ZDNet - Rush to cloud computing is outpacing organizations' ability to adapt
Again, many of these issues will fall to IT teams to address -- and cannot be effectively outsourced to cloud providers. The survey finds only 21% of IT executives strongly agree that their cloud vendors provide all the necessary tools and processes to manage and optimize their cloud environments, while 42% somewhat agree.
Cloud
SiliconANGLE - Robotic process automation becomes a transformation catalyst. Here’s what’s new 
Cloud migration is an accelerant to digital business. Organizations are moving to the cloud and building new capabilities on top. A digital business goes beyond cloud and software as a service and puts data, artificial intelligence and automation at the core, leveraging cloud and SaaS, but it reimagines entire workflows and customer experiences.
Automation & Productivity
ComputerWorld - Coda and Notion turn up the heat on Microsoft Office
“These emerging 'living documents' will likely impact the competitive landscape and, for some companies, represent a viable alternative to Google’s or Microsoft’s productivity and collaboration apps.”
Automation & Productivity
VentureBeat - Decentralized identity using blockchain
Using the identity wallet, the user (i.e., the identity owner) can present proof of their identity to any third party. The wallet helps users give and revoke access to identity information from a single source, making it easier.
Security
Network World - NSA urges businesses to adopt zero trust for network security
Configuration tips for network admins include the use of secure, frequently changed passwords for all administrative accounts, limiting login attempts, and keeping potentially vulnerable systems patched and up-to-date. The report also describes safe configurations for SSH (secure shell), HTTP and SNMP (simple network management protocol).
Security
VentureBeat - Report: 9% of security incidents caused by USBs and other removable media
Trusted USB devices can be infected with malware variants that search for external storage devices connected to a victim host to infect them and spread further. This risk is much greater when endpoint users can transfer USB devices from personal devices to business assets.
Security
AIThority - Who Benefits From Democratized Data Analytics?
This is democratized data analytics in action. Everyone in the company makes smarter decisions throughout the day without ever leaving their existing workflows or having to learn entire new skill sets.
Data & Analytics
VentureBeat - Report: 95% of IT leaders feel open source tools are key to strong infrastructure
What was surprising was that 82% of IT leaders said they’d be more likely to select a vendor who contributes to the open source community, which was driven, in part, by a desire to sustain healthy open source communities.
IT Management
sdxCentral - VMware, Red Hat Lead 'Fierce' 5G Cloud-Native Platform Race
VMware and Red Hat are in “fierce competition” for the top 5G telco cloud-native platform, while Microsoft and Amazon Web Services (AWS) are market followers, according to ABI Research’s latest 5G telco cloud-native platforms ranking.
Cloud
SecurityWeek - Tens of Cybersecurity Firms Found Exposing Their Assets: Study
It’s not uncommon for major companies to unwittingly expose databases and other assets, but a study conducted by Reposify over a two-week period in January showed that 35 multinational cybersecurity companies and their more than 350 subsidiaries hosted over 200,000 exposed assets. These assets included databases, remote access sites, and cloud services.
Security
VentureBeat - Report: Majority of enterprises will still use Web2 until 2030
Between now and the end of the decade, enterprises will dabble with Web3 for applications that benefit from new blockchain-enabled business models and new social/gaming networks. In the nearer term, Gartner expects 25% of enterprises to integrate legacy apps and services with decentralized Web3 applications by 2024.
Web3
Data Center Dynamics - Object storage is emerging as the storage standard for data lakes
HDFS is widely used as a data lake storage solution, especially in connection with the tools of the Hadoop ecosystem: for example, MapReduce, Spark, Hive or Hbase. While Hadoop and HDFS are widely adopted, a number of recently developed analytics tools (including Splunk, Vertica, Elastic) are now available on the market for analyzing the high volumes of data in data lakes.
Data Storage
Network World - 7 DNS attack types and how to mitigate them
Almost half of respondents (48%) report losing more than $500,000 to a DNS attack, and nearly 10% say they lost more than $5 million on each breach. In addition, the majority of U.S. organizations say that it took more than one day to resolve a DNS attack.
Security
SC Media - Four ways to get the most out of a threat detection program
Behavioral detections target bottlenecks in attacker tactics, techniques and procedures (TTPs), allowing just one well-crafted and tuned analytic to defend against the equivalent of thousands of IOCs and help defend against unobserved or future variations of the attack.
Security
VentureBeat - Security doesn’t just have a talent problem – it has a spending problem too, survey shows
The survey found that 50% of security leaders believe their organization’s cybersecurity budget “fails to meet the minimum figure they need to remain on track with their security goals.”
Security
Datanami - New Report from expert.ai Forecasts 2022 to be ‘The Year of Language’ in Artificial Intelligence
Analysis across expert.ai’s sample of articles revealed data as the single, most discussed topic in 2021 spanning 15% of total articles, followed by technology (12%), customer (8.6%) and machine learning (5%).
Data & Analytics
eWeek - How Automation Drives Today’s IT
In practical, real-world terms, an automation efficiency in an ERP system can drive some fairly complex orchestration. Traditionally, every iota of that functionality will have been built by a developer, naturally limiting it somewhat. Today’s technology has fewer limitations, thanks to AI.
Automation & Productivity
Forbes - How To Break Through The RPA Ceiling By Implementing An Intelligent Automation Strategy
According to Gartner analysts, by this year, some 90% of organizations were expected to have adopted RPA in some form. Yet, those that try to scale RPA across their organizations fail 97% of the time, according to the results of a study by Deloitte.
Automation & Productivity
Analytics Insight - Top 10 Data Analytics Jobs in Big Tech Companies in March 2022
Not only data analytics jobs are extraordinarily financially rewarding, but it provides a host of opportunities for aspirants in the tech sector to learn about multiple topics related to artificial intelligence and big data.
Data & Analytics
SciTechDaily - Injecting Fairness Into AI: Machine-Learning Models That Produce Fair Outputs Even When Trained on Unfair Data
MIT researchers have found that machine-learning models that are popular for image recognition tasks actually encode bias when trained on unbalanced data. This bias within the model is impossible to fix later on, even with state-of-the-art fairness-boosting techniques, and even when retraining the model with a balanced dataset.
Artificial Intelligence
VentureBeat - Report: 93% of orgs are challenged by malware analysis
Among the top malware analysis challenges are lack of automation (58%), lack of integration (56%), and lack of team experience in using tools (45%).
Security
Network World - Virtual networks need a rethink to meet hybrid-, multi-cloud demands
Despite all the hype about the economy of scale of the cloud providers, the fact is that most enterprises achieve economies close enough to those of the cloud that the difference wouldn’t cover cloud provider profit margins.
Cloud
Industry Wired - Citizen Data Scientist: How to Become One?
A citizen data scientist need not be a professional with a world-class degree or certification. they act as bridges between the business team and data analytics teams with the specific role of generating insights using visualization tools and point–and–click interfaces.
Data & Analytics
Network World - Gartner: 5 ways to deal with network equipment shortages
Some vendors offer official refurbished equipment programs, including Cisco and HPE Aruba. They fully refurbish, recertify and support the hardware. It may be a few years old, but the lead time for this equipment is days or weeks. There are also independent third-party vendors of used equipment, like ITRenew.
IT Management
ZDNet - Ransomware sneaks in with remote workers and cloud-based IT says CyberRisk Alliance survey
The top attack vectors were all from outside the organization, with 37% citing remote worker exploits as a key issue. An additional 35% said cloud infrastructure was to blame, and 32% reported security problems with cloud-based apps.
Security
VentureBeat - The future of data science: Trends in a rapidly-growing industry
We are seeing an increase in people who went to school with a math background (or who might have started out in data engineering) wanting to make the switch to data science. This should be comforting news to anyone who got a degree in math (or a STEM-related field) and now wants to make a change in their career to be part of this rapidly growing industry
Data & Analytics
ZDNet - Application modernization makes a dent in the technology universe
It means continuing embrace of wholesale digital transformation for the business as a whole, built upon "As-a-Service" environments that provide capabilities ranging from artificial intelligence to IoT data management.  
IT Management
SciTechDaily - A Security Technique To Fool Would-Be Cyber Attackers – Method Safeguards a Computer Program’s Secret Information
Instead, a team of MIT researchers has devised a new approach that allows memory sharing to continue while providing strong security against this type of side-channel attack. Their method is able to speed up programs by 12 percent when compared to state-of-the-art security schemes.
Security
Government Technology - California’s Cybersecurity Chief Shares Priorities and Plans
Additionally, placing an emphasis on collaboration and transparency with the provider community will result in healthier and more efficient supply chain management. We all depend on outsourced critical services that vary along the maturity spectrum. The focus needs to be on supply chain risk management and how we use IT-enabled services to raise the bar.
IT Management
threatpost -6 Cyber-Defense Steps to Take Now to Protect Your Company
The Ransomware Spotlight Year-End Report identified 32 new ransomware families in 2021, bringing the total to 157 and representing a 26 percent increase over the previous year. These ransomware families are exploiting a total of 288 vulnerabilities – a 29 percent increase over the previous year.
Security
VentureBeat - Report: Two-thirds of consumers would rather use a chatbot than browse a website
Approximately 18% of consumers use chatbots to find business hours, while 17% are interested in learning more about product information, and 16% are looking to find a nearby business location; other use cases include making a customer service request (16%), requesting technical support (12%), requesting a quote (11%) and asking for personalized recommendations (9%).
Automation & Productivity
ZDNet - 7 solid reasons to consider AIOps
"AIOps is about applying AI to enhance IT operations," Thurai explains. "Contrary to some beliefs, it is not about improving AI with IT operations, but rather is the other way around."
Automation & Productivity
VentureBeat - Web3 holds the promise of decentralized, community-powered social networks
We spend much of our time using one or more Web2 platforms, be it for reading blogs, watching videos, or just scrolling through the internet. The platforms that we use generate billions of dollars, but the users never receive anything for their loyalty. Web3 changes this drastically by rewarding users for their participation.
Web3
Network World - Cisco IDs top 2022 security threats and what to do about them
Now new, less experienced combatants seek out a broader range of targets, using less surgical attacks. “This has led to more risky behavior than we’ve seen historically, without as much regard for collateral damage,” he wrote.
Security
eWeek - Hyperautomation Trends 2022: RPA, Low-Code, AI
Hyperautomation, according to Gartner, is “a business-driven, disciplined approach that organizations use to rapidly identify, vet, and automate as many business and IT processes as possible.”
Automation & Productvity
AiThority - Illusive Research Reveals Identity Risks on 1 in 6 Enterprise Endpoints
Exposed Identity Risks – More than 1 in 10 (13%) endpoints contain privileged account passwords that have been left exposed (e.g., cached credentials).
Security
eWeek - The Risk of Fraud in the Metaverse
The metaverse is exceptionally trendy, financially backed, and full of opportunities for businesses to change how they operate. However, leaders need to remain diligent in focusing on risk management and keeping the general public’s interest, patience, and attention
Privacy  & Security
InfoWorld - Use the cloud to strengthen your supply chain
The rise of industry clouds may change some of this. Indeed, it won’t take long for the public cloud providers to adopt and provide these types of services. Those who wish to gain this advantage will just use the services from the public cloud providers and not have to build their own.
Cloud
VentureBeat - Report: Ransomware groups show staying power, average lifespan is 17 months
In addition, it includes, but is not limited to, billions of data points ranging from network and endpoint detection devices that IBM monitors to X-Force Red engagements, X-Force’s threat intelligence insights and data provided by report contributors such as Intezer.
Security
AiThority - Daily AI Roundup: Biggest Machine Learning, Robotic And Automation Updates – Feb 23
The updates will feature state-of-the-art capabilities in artificial intelligence (AI), Machine Learning, Robotic Process Automation, Fintech, and human-system interactions.
Artificial Intelligence
ZDNet - SockDetour backdoor used in attacks on defense contractors, says Unit 42
SockDetour allows attackers to remain stealthily on compromised Windows servers by loading filelessly in legitimate service processes and using legitimate processes' network sockets to establish its own encrypted C2 channel.
Security
Forbes - Do Companies Have To Adjust To AI Or Vice Versa?
One of the first adjustments to be made while attempting AI-driven transformation is moving business operations and applications from an offline environment to a digital one. Essentially, this involves making the necessary investments to acquire the tools, technological platforms, data scientists, developers, researchers, testers and others.
Artificial Intelligence
SiliconANGLE - More cybersecurity consolidation: Cloudflare acquires Area1 and Darktrace buys Cybersprint
Area 1 was founded in 2014 and offers a product focused on eliminating targeted socially engineered cyberattacks. Pitched as providing the best cloud email security available, Area 1 claims that its service prevents 30% more phishing attacks than email gateways, cloud email suites and other defenses.
Security
VentureBeat - What consumers think about AI – and the impact on your industry and business (VB Live)
For instance, among consumers who said they weren’t informed about AI, only 20% thought AI would have a positive impact on society. That number shoots up to 50% percent among those who feel they have a handle on the technology.
Artificial Intelligence
TMCNET - Cloud Storage leaks grew by 150% in 2021, due to market pressures, new CybelAngel industry report reveals
"The key is visibility and speed in order to locate all exposed assets pertaining to an organization's attack surface before they are breached by malicious actors. As risks change each day, organizations need to be ready to respond through continuous monitoring."
Security
AutomationWorld - Leading IoT Vendors Commit to OPC UA Adoption
Key drivers behind this progression are, first and foremost, the global adoption of OPC UA as the open standard of choice for secure production-system interoperability across OT and IT networks, leveraging standardized data exchange.
IoT
Israel21c - Cyberattacks on cars increased 225% in last three years
Upstream Automotive Cybersecurity Report reveals that the top attack categories were data/privacy breach, car theft/break-ins and control systems.
Security
Redmond - Report: 76% of Orgs Faced Ransomware Attacks in 2021
42 percent were user actuated, meaning they clicked on a malicious link, often from a spam email. 43 percent were due to a lack of diligence from an administrator (patches, credentials, etc.)
Security
Geekwire - Web3 trends to watch: New apps, new consumer behavior, and a massive talent migration
First, top talent including engineers, product managers, and entrepreneurs are leaving their Web2 jobs to work at Web3 startups. Community optimism, green field tech opportunities, and allure of career momentum are attracting top talent.
Web3
VentureBeat - Google’s privacy changes: The war on cross-app tracking, cookies and third-party advertising
“The profiling of user behavior has long been the fuel of digital advertising. Even though Google has said they will wait two years for full implementation, that is a very short fuse for tech companies who rely on the ability to track and monetise user behavior."
Data Privacy
Network World - Zero trust requires clear architecture plans before changing core systems
Or, enforcement might be handled at the endpoint level for systems able to run a software-defined perimeter client, and the network only required to handle policy enforcement for devices that cannot (timeclocks or sensors, for example). In either case, those high-level choices should, as much as possible, be made before the redesigns in the separate technology spaces begin.
Security
Datanami - Five Ways to Shift to AI-First
In the ideal world, AI would be assisting with every phase of decision making fully embedded into systems and fully transparent to employees and customers.  But to achieve this goal, fundamental changes need to take place including a top-down shift in mindset, as well as implementation of MLOps tools to help IT teams to overcome technical hurdles that can prevent AI from reaching its full potential.
Artificial Intelligence
TMCNET - The Data Is In: Cloud Has Hit a Wall, and There's Only One Way to Vault Over It
These limitations are caused by too many groups across an enterprise using too many different tools and clouds, with 80% struggling to achieve comprehensive visibility into cloud usage and spend. Further complicating matters, these disparate tools and preferences are spread across islands of automation, which in turn create security vulnerabilities.
Cloud
threatpost - Gaming, Banking Trojans Dominate Mobile Malware Scene
Last year, banking trojans learned a number of new tricks. For example, the Fakecalls banker, which targets Korean mobile users, is now “[dropping] outgoing calls to the victim’s bank and plays pre-recorded operator responses stored in the trojan’s body,” according to the report.
Privacy & Security
Forbes - Making Sense Of The 'Unknown' With Data Intelligence And Hyperautomation
In a recent IDC webinar, analysts predicted that “By 2023, 50% of all supply chain forecasts will be automated using artificial intelligence, improving accuracy by 5 percentage points.” This 5% could be the equivalent of saving millions of dollars for manufacturing companies.
Automation & Productivity
sdxCentral - How CIOs Reckon With Talent Upheaval
“When IT workers are asked about their intent to stay, 22% indicate they are looking for a new job within the year. Active job postings in the U.S. for IT have continued to increase over the past year, driving stiff competition in an already scarce talent pool,
Tech Jobs
eWeek - Digital Twins Guide: Answering 3 Most Frequently Asked Questions
Leveraging data from existing systems, the digital twin allows manufacturers to extract greater value from years of investment without the need to “rip and replace.”
Digital Twins
VentureBeat - 5 top data and analytics trends to watch in 2022
The advancement in MLops will lead businesses to create stable machine learning models with application-level quality. In fact, Gartner predicts that by 2025, the 10% of enterprises that establish AI engineering best practices will generate at least three times more value from their AI efforts than the 90% of enterprises that do not.
Data & Analytics
Blocks & Files - Veeam Data Protection Trends: Assume you will be breached
Veeam’s 2022 Data Protection Trends report says that users now operate in a hybrid multi-cloud world, face rabid ransomware attacks, and need more data protected – and to have that data recovered more quickly, increasingly by SaaS processes and from the cloud.
Data Protection
Network World - Data-center network automation: Its pitfalls and how to avoid them
Network automation is notoriously difficult to implement due to the complexity of networks in general, and only 23% of the people surveyed were fully confident in their data-center network-automation strategies.
Network Management
TechStartups - Clearview, the controversial facial-recognition AI startup that uses social media photos to build a biometric database, seeks its first big deals with federal agencies
This year, Clearview is aiming to win its first big U.S. government contracts and expand its team by a third amid a series of legal challenges to Clearview for its alleged violation of various states’ biometric information and data privacy laws.
Data Privacy
VentureBeat - Report: 70% of orgs are spending $1M or more on AI
According to the results, more than 40% of organizations have reached high levels of maturity, from operational (AI in production, creating value) to transformational (AI is part of business DNA) status. To get there, a quarter of maturing organizations are spending $51 million or more on AI, compared to just 8% of experimenters.
Artificial Intelligence
HelpNetSecurity - To shift to data-driven security decision making: Start with the right data
In fact, recent research by Trend Micro found that the average organization has no less than 29 security monitoring solutions in place. This translates into an unmanageable amount of data flowing into the Security Operations Center (SOC), and makes it increasingly difficult to prioritize alerts and manage cyber risk.
Security
VentureBeat - What is intelligent document processing? Why IDP matters in the enterprise
Another IDP vendor, Zuva, focuses on contract and document review, offering trained models out of the box that can extract data points and present them in question-answer form. M-Files applies algorithms to the metadata of documents to create a structure, unifying categories and keywords used within a company
Automation & Productivity
eWeek - 3 Emerging Trends in Streaming Data
EDA enables data to be moved in real-time event streams via an event mesh – helping link together previously unconnected processes across business running multiple siloed systems. A global study of C-Suite and IT architecture professionals has found that 85% of organizations are looking to incorporate real-time data.
Data & Analytics
Network World - Top 7 next-generation firewall vendors 
Next-generation firewalls (NGFW) offer the same capabilities of a traditional firewall with added features such as Deep Packet Inspection (DPI), Integrated Intrusion Protection (IIP), Web Filtering, Antivirus, Antispam, Anti-Malware, SSL and SSH traffic inspection, all with an eye towards the detection and isolation of threats in real-time.
Security
Datanami - Axway Survey Finds People Are Willing to Open Up Their Data if it Leads to Better Experiences
 “It indicates there is an expectation for satisfying digital experiences. Securely opening up data while building on heritage infrastructure can help craft these experiences – while allowing companies to give us the privacy and security we crave,” added Padua.
Data Privacy
sdxCentral - Great Resignation Shines a Spotlight on Insider Threats
Surveys from security vendors like Tessian and Code42 reveal how ubiquitous the problem has become. In the U.S., 40% respondents said they had taken data with them when leaving a job, and 58% of them use the data for their new job, according to Tessian’s recent report. Plus, Code42 found 60% of surveyed employees admitted they took data from their last job to help the current role, according to Payne.
Security
VentureBeat - Report: 63% of IT pros say cyberthreats are top obstacle to cloud adoption strategy
Approximately 63% of IT professionals named cyberthreats that are designed to target cloud services as the top obstacle to cloud adoption. Similarly, 69% of IT professionals identified the need for consistent security coverage across all cloud infrastructures as the biggest barrier to multicloud adoption.
Cloud
SiliconANGLE - How to crack the code on data and analytics governance
Gartner predicts that through 2025, 80% of organizations seeking to scale up digital business will fail because they do not take a modern approach to D&A governance. If CDOs expect to deliver effective D&A strategies, they must crack the code on governance
Data & Analytics
VentureBeat - Running multiple APIs side-by-side with AI paves way to hyperautomation for business
Using multiple APIs led by AI is innovating operations, processes and leading customer experience, all key to business success. This makes a solid case for AI-driven APIs to lead the way into the future of Artificial General Intelligence.
Automation & Productivity
Forbes - The Top 10 Tech Trends In 2022 Everyone Must Be Ready For Now
Quantum computing will potentially give us computing power that is a trillion times more powerful than what we get from today’s advanced supercomputers.
Emerging Tech
TechBullion - The Key Artificial Intelligence and Machine Learning Trends for 2022
Another key AI trend we expect to see is the continued rollout of natural language processing systems. Indeed, natural language processing is an artificial intelligence technology that’s already received widespread acclaim and success, and the development of the GPT-3 model is further driving the potential.
Artificial Intelligence
Analytics Insight - Top 10 Data Science + Data Analytics Programs To Take up in 2022
Currently, data science consulting is more important than ever since it is helping companies grow and prepare for a better future. The foundation of data science is made of skilled data scientists who possess immense experience in domains like statistics, math, and computer science.
Data & Analytics
Digital Journal - Business Consulting: Everything as a Service accompanied with an Expertise Edge
The model combines the 3 C’s (business Context, Competitive positioning, and Customer preference), in a collaborative framework (synergies that cut across verticals and business units) to create a unique value proposition for customers.
IT Management
VentureBeat - To pay or not to pay is the question for cloud ransomware
According to Cybereason, 42% of companies that suffered an attack in 2021 recouped only a small portion of the financial damages caused by ransomware through insurance coverage. What’s more, in a survey of 1,263 companies, 46% of victims that submitted a ransom payment got their data back, but much of it was corrupted.  
Security
TechRepublic - Why multicloud environments can help improve security and redundancy
Single-cloud providers advertise redundancy by employing multiple data centers. However, data centers share a common control plane.“The control plane is what enables the cloud to function,” Gibbs said. “The cloud control plane orchestrates the network and data centers. If anything happens to the cloud control plane, that will likely turn into a single-point-of-failure outage.”
Cloud
ZDNet - Data is going to the cloud in real-time, and so is ScyllaDB 5.0
On the performance front, Laor emphasized ScyllaDB's new I/O scheduler, which has been in the works for about 6 years. It's built to match new hardware capabilities and works on the shard level. What ScyllaDB's people realized was that workloads with mixed read/write requests require special management, and this is what they worked on.
Data & Analytics
Cointelegraph - JPMorgan unveils research on quantum resistant blockchain network
QKD utilizes quantum mechanics and cryptography to enable two parties to exchange secure data and detect and defend against third parties attempting to eavesdrop on the exchange. The technology is seen as a viable defense against potential blockchain hacks that could be conducted by quantum computers in the future.
Blockchain
ZDNet - NIST outlines what IoT and software 'security labels' could look like
Allowing for a marketplace of standards, programs, and schemes to evolve would permit the market to drive how best to achieve the desired outcomes and offer the flexibility to suit a variety of stakeholders' needs. Doing so also would accommodate, and not hinder, a rapidly evolving technology landscape," writes Megas.
Emerging Tech
VentureBeat - 5 strategies to consider with cloud deployments
Enterprises should ask themselves if they have the elasticity of resource requirements to make the financial benefit of a cloud deployment work. If they have a stable workload, meaning a 24/7/365 workload that does not have peaks and troughs of resource requirements, it will be cheaper to run it on-premises or as a co-location
Cloud
Forbes - The Five Biggest Education And Training Technology Trends In 2022
E-learning is an increasingly popular option for workplace training, too – a study by IBM into its own remote learning initiatives found that its learners had been able to absorb five times more content, at one-third of the cost to the company, resulting in a saving of $200 million.
EDTech
eWeek - 3 Ways IT Can Support Your New Global Workforce
Judicious use of automation will offer extraordinary benefits, including triggering next steps in projects, communicating with customers in any time zone, and connecting employees. Automation will also increase a company’s need for rock-solid IT teams that can stay ahead of trends and keep everything running.
Automation & Productivity
VentureBeat -Report: 54% of orgs with advanced data analytics have increased their revenue
The survey also reinforced the fact that third-party service providers are key enablers in organizations’ data and analytics journey. In all, 68% of surveyed decision-makers expect to see an increase in their organizations’ spending on data and analytics in the next 12 months, which includes engaging third-party service providers for support in data and analytics-driven initiatives
Data & Analytics
The Hacker News - 4 Cloud Data Security Best Practices All Businesses Should Follow Today
Last but not least, it's a good idea for businesses to take steps to minimize the data they're entrusting to their cloud providers. After all, you don't need to protect data that's never uploaded in the first place. The idea is to refine business processes to collect only the data required to make them work.
Cloud Security
Forbes - Navigating Data: Tips For Leveraging One Of Your Organizations Greatest Assets
A common conversation around the executive table is, “We need to do more with our data.” An organization then sets off on a journey to implement data visualization tools or artificial intelligence solutions that require investments in people and technology. But after many months, the organization might still not have really achieved its desired outcomes
Data & Analytics
IndustryWired - Top 10 Emerging Technology Related to AI in The Banking Sector
With a DAO system in place, the returns will come fast. Banks that mainly rely on digital account opening have experienced 16% revenue growth year over year. from 39% to 46% plan to modify or enhance their existing DAO systems
Artificial Intelligence
TechRepublic - New study shows enterprises are making progress with cloud-based HPC
Rescale’s software platform enables scientists and engineers to get access to massive pools of the latest chip architectures that boast the fastest interconnects and memory to run enormous workloads over and over that simulate the real world.
Emerging Tech
Digital Information World - New Study Shows How Several Companies Collect Your Data Illegally
Twitter is another social media platform that does not obey these laws when it comes to trying to get users to consent to cookies, but it should be noted that social media platforms are not the only culprits in this regard. Airline sites such as Ryanair.com and the popular news site for the Daily Mail were both found to break data collection laws that apply in the EU as well as the UK.
Data Privacy
Finextra - Unlocking the potential of data to transform our world
 At present, there are currently up to 234,000 vacancies for data roles in the UK – finding people with the right skills is difficult. Small and medium-sized businesses are lagging in digital transformation too, and some organisations struggle to balance encouraging innovation and complying with regulation.
Data & Analy tics
AiThority - Optiv ‘A Visual Future of Cybersecurity’ Prepares Business Leaders for the Next Era of Attacks and Innovations
In the future, machine learning (ML) and AI will be used widely by both attackers and defenders. The applications are endless, both in the positive and the negative. AI will be used to improve health care, transportation, education and agriculture, but it will also be used in cyberattacks to automate target analysis, conceal malicious code and create intelligent malware that mimics trusted system components.
Security
The Register - Facebook is one bad Chrome extension away from another Cambridge Analytica scandal
Multiple Chrome browser extensions make use of a session token for Meta's Facebook that grants access to signed-in users' social network data in a way that violates the company's policies and leaves users open to potential privacy violations.
Data Privacy
VentureBeat - Ransomware attacks surged 2X in 2021, SonicWall reports
The 105% spike in ransomware attacks in 2021 was also a significant acceleration from the rate of increase in the previous year, when ransomware attacks climbed 62%, year-over-year, according to SonicWall.
Security
ComputerWorld - Why Apple spent billions to get to 5G — services
Those nations in which 5G services are delivering the fastest connection speeds are ripe for service evolution. Why work in an office when you can grab your iPad Air (soon with 5G) and work under a tree? The combination of fast mobile broadband and powerful hardware underpins a services opportunity we’ve not really begun to scratch.
5G
VentureBeat - Meta’s RSC supercomputer brings revolutionary power — and privacy and bias concerns
This blending of physical and digital identities brings cause for concerns. “The problem starts with the philosophy that there’s no need for privacy if you have complete transparency. And we’ve seen that ideology underline Facebook’s decision-making, and we’ve seen the consequences of that
Data Privacy
CMS Wire - Facebook Metaverse: The Future of Digital Experience Marketing?
"As long as you can make technology seem fresh and new and cool, you can avoid regulation," Donovan noted. "And you can run defense on that for several years before the government can catch up."
Emerging Tech
Diginomica - Frictionless Enterprise - how the XaaS Effect transforms customer engagement
XaaS is much more than simply adding a digital connection and switching to subscription billing. What matters most is how the provider uses that connection to enhance the customer experience throughout the product lifecycle.
Automation & Productivity
eWeek - 6 Best Practices to Clear Marketing Data Roadblocks
While 45% of marketers reported having a customer data platform (CPD) that gives them a unified and a single view of customers, only 38% of the survey participants said their customer segment and persona data is available in a format they can use for decision-making. Properly formatted and unified data is the foundation of real-time marketing.
Data & Analytics
Network World - Data-center spending is half that of cloud services
But numbers can be deceiving. Dinsdale said IBM is still growing its cloud revenues, just at a growth rate that is far below Amazon, Microsoft, and Google. So IBM is not losing ground, per se, in the revenue department, it’s just not gaining ground as fast as the others.
Cloud
Datanami - Nucleus Research Analyzes Adoption of Modern Data Warehouse Technology in New Value Matrix
“As development of fully-managed and serverless offerings accelerates, Nucleus expects customers to significantly limit the need for IT intervention and reduce expenses related to the over-provisioning of computation resources.”
Data & Analytics
Network World - 5 best practices for making smart-building LANs more secure
The controller model also helps with the security of the IoT links. Controller-based smart buildings use a custom IoT protocol (common ones are LoRa, LoRaWAN, Z-Wave, and Zigbee) with limited capabilities to limit how they could be exploited, so even if the device link was hacked, there’s a limit to what damage could be done.
Security
ZDNet - LinkedIn phishing scams increase 232% since Feb 1: report
"When clicked, the phishing links send the victim to a website that harvests their LinkedIn log-in credentials. The footer features elements from LinkedIn's genuine email footer, including their global HQ address, hyperlinks to unsubscribe and to their support section, and the recipient's information."
Privacy & Security
VentureBeat - Report: Recruiting developers will be 2022’s biggest challenge, say 53% of IT pros
The pandemic highlighted one of the most crucial challenges facing the software industry — the need for more professional software developers. Not only are there not enough developers to meet demand, but those who are available may lack the necessary software development skills for popular frameworks.
Tech Jobs
VentureBeat - Report: Only 21% of enterprises use zero trust architecture
However, despite acknowledging its importance, only 21% have so far adopted zero trust as a foundational model across their enterprise. Additionally troublesome is that only 32% of respondents consider their enterprises to have high cybersecurity maturity.
Security
TechTarget - The best enterprise storage arrays of 2021
Spinning disk retains a prominent position in the enterprise, but the current darling of the data center is flash storage. Flash adoption is no longer limited to larger organizations. Flexible flash configurations and expected price declines combine to make flash compelling to more midsize organizations.
Data Storage
AiThority - Top Augmented Analytics Trends to Watch out for in 2022
Most of the ABI products provide extensive dashboarding capabilities that enable analysts to put a data story for end-users but for augmented analytics to become mainstream it is imperative that the products are enabling end-users to extract and explore relevant data stories.
Data & Analytics
Blocks & Files - The new cloud infrastructure software stack
“Applications don’t live in a vacuum. Every app has a stack of technology components or layers that sits underneath … While the application stack still depends upon core infrastructure elements like compute, storage and networking, these have increasingly become commoditised.”
Cloud
VentureBeat - How to create data management policies for unstructured data
The lion’s share of all data is unstructured — files of all types including images, log files, trace files, output files, video, and audio, and which are spreading like wildfire. Data management policies must address the efficient movement and management of unstructured data.
Data Management
Datanami -CNCF Sees Record Kubernetes and Container Adoption in 2021 Cloud Native Survey
The survey, now in its sixth year, found that the usage of Kubernetes is continuing to grow and reached its highest level ever, with 96% of organizations using or evaluating the technology. Kubernetes has been fully embraced by large enterprises and is even growing in emerging technology hubs, like Africa, where 73% of respondents use Kubernetes in production.
Cloud
TechHQ - Russian hackers profited the most from ransomware payments
In a report from Chainanalysis, about 74% of payments made from ransomware attacks in 2021 went towards Russia-linked hackers. According to the research report, more than US$ 400 million worth of crypto-currency payments went to groups highly likely to be affiliated with Russia.
Security
InfoWorld - Overcoming the IoT interoperability hurdle
But this network of contributors is far from a well-oiled machine; disparate technologies deal with disparate data communication all over the world.
What’s needed is a set of IoT interoperability standards across data collection, stream processing, visualization, alerting, and machine learning and AI frameworks.
IoT
VentureBeat - Surging ransomware data leaks point to ‘weaponization of data,’ CrowdStrike says
“Antivirus is dead. The legacy antivirus products that are out there — the signature-based antivirus tools — are not effective anymore,” he said. “What is necessary are [tools] that use machine learning, in addition to signatures, to identify malicious activity.”
Security
Digital Journal - Endpoint Detection and Response Market – Global Industry Analysis, Size, Share, Growth and Forecast 2020 – 2027
The European region will dominate the market for Endpoint Detection and Response due to Growing demand for natural gas for generating power and heating spaces.
Security
ZDNet - What the metaverse means for you and your customers
So journey mapping has been obsolete for a decade or so. Too many channels and incongruent behaviour killed it. And don't let a consultant or a martech vendor try to convince you otherwise, reliant as they are upon it, to sell you more of their whatever.
Metaverse
EBN - The Great Resignation is driving data breaches and cybersecurity threats
Fifty-eight percent took information to help them in their new job, 53% believed that the documents belonged to them, 44% so they could share it with their new employer and 40% to leverage it for more money in their new position.
Privacy & Security
VentureBeat - How we can finally evolve from Web 2.0 to Web 3.0
For one, many self-described decentralized apps are far from being genuinely decentralized. It is not uncommon for the front end of these services to be running on cloud servers, meaning that access to them is still dependent on legacy infrastructure, and the blockchain is only occasionally tapped to send or receive data.
Web3
techopedia - Why ML Testing Could Be The Future of Data Science Careers
A considerable amount of time goes into testing and quality assurance activities. Experts and researchers believe 20 to 30% of the overall development time is spent testing the application; and 40 to 50% of a project's total cost is spent on testing.
Machine Learning
InfoWorld - Think you can out-cloud the cloud?
One way that AWS, Google, Microsoft, and other hyperscalers have optimized their energy consumption is by building with energy-efficient languages such as Rust. Not content to simply build with Rust, however, these and other companies are investing in the development of Rust (and other energy-efficient software and hardware technologies).
Cloud
eWeek - Cloud Migrations: Look Past the Mirage of Cost Savings
 For CEOs, cloud adoption is not just an engine for revenue growth and efficiency. Its speed, scale, innovation, and productivity benefits are essential to the pursuit of broader digital business opportunities, now and well into the future. Yet an overly narrow view of cloud-value economics and where value exists, often keeps companies from achieving the desired outcomes.”
Cloud
ZDNet - Cybersecurity M&A volume reaches $77.5 billion in 2021: report
There were more than 1,000 financing deals involving cybersecurity companies and 286 mergers and acquisitions. 2021 saw five cybersecurity IPOs in 2021 -- KnowBe4, DarkTrace, SentinelOne, Riskified and Forgerock -- with an average IPO raising $467 million.
Security
VentureBeat - How the metaverse could shape cybersecurity in 2022
For starters, there is the essential use of AR/VR devices that collect large amounts of user data and information such as biometric information, creating a potential for hack attacks. Moreover, the modern demand for user data is most likely to grow with the Metaverse, as it could provide leverage to collect more user data
Privacy & Security
SiliconANGLE - The improbable rise of Kubernetes to become the operating system of the cloud 
Kubernetes Part 1 explains the dynamics of the technology industry in the early part of last decade, the impact that AWS had on the DevOps movement, the importance of Docker, which blazed a new trail for developers, and how Google ultimately landed on the decision to open-source Kubernetes
Cloud
VentureBeat - Interoperability must be a priority for building Web3 in 2022
Embracing cross-chain communication means empowering developers to build on a network that best suits their needs knowing that their applications will be accessible to users across other blockchain platforms. This allows blockchain networks to continue to improve the applications they provide and their own infrastructure, instead of investing countless hours and vast sums of money into building individual bridges.
Web3
insideBigData - Data Scientists Reveal Roadblocks to Digital Transformation
For example, around four in 10 are dissatisfied with their company’s use of analytics and model deployment, while more than 20 barriers to effective working emerged, according to a survey of data scientists commissioned by analytics leader SAS.
Data & Analytics
TMCNET - Survey Shows 77% of Consumers Against Facebook Owning Metaverse Data
An overwhelming 87% would prefer a metaverse on the decentralized blockchain. This sentiment was even more pronounced among Gen Z respondents who were 10% more likely to prefer a blockchain metaverse than their Millennial counterparts.
Blockchain
VentureBeat - Report: Companies face a 37% chance of losing IP when employees quit
Additionally, 71% of cybersecurity leaders and practitioners report not knowing what and how much sensitive data departing employees are taking to new organizations. Though 96% of companies note they’re experiencing challenges protecting corporate data from insider risk, ownership of the problem is murky.
Security
Datanami - IDC Survey Illustrates Importance of Purpose-Built Enterprise AI Infrastructure
Of the 31% with AI in production, only one third claim to have reached a mature state of adoption wherein the entire organization benefits from an enterprise-wide AI strategy.
Artificial Intelligence
VentureBeat - Report: Cloud spending will soon outpace IT due to COVID-19
Of note, the majority (65.9%) of spending on application software will be directed toward cloud technologies in 2025.
Cloud
CSO - Look for attack surface management to go mainstream in 2022
What exactly is the attack surface?  In reality, it’s everything—internal assets, external corporate assets, third-party assets, people, everything.  That said, the emerging attack surface management category focuses on internet-facing assets alone.  Hmm, just another day in the perplexing cybersecurity realm.
Security
Finextra - Overcoming Cloud Adoption Challenges in Lending Operations
Research shows that 30-40% of lending resources’ time gets used up on non-core tasks due to legacy systems.
Cloud
Telecoms - What happens in metaverse stays in metaverse – or does it?
Yesterday it was reported that McDonalds filed several trademarks around the metaverse, including one that described as “a virtual restaurant featuring actual and virtual goods.”
Metaverse
ZDNet - Nearly $700 million spent on ransomware payments in 2020 alone: report
"In fact, despite these numbers, anecdotal evidence, plus the fact that ransomware revenue in the first half of 2021 exceeded that of the first half of 2020, suggests to us that 2021 will eventually be revealed to have been an even bigger year for ransomware," Chainalysis said.
Security
VentureBeat - Steps IT leaders can take now to get AI out of ‘pilot purgatory’
But right now, too many AI applications are stuck in the lab at the conceptual stage, and too few reach deployments in the “field” (i.e., production environments with real workloads, users, and problems). This gap is dangerous because AI improves through operationalization, learning from real-world data how to work faster and better.
Artificial Intelligence
Network World - Log4j hearing: 'Open source is not the problem'
“The weakness in Log4j, which can be exploited by only typing in 12 characters, is just one example of how widespread software vulnerabilities, including those found in open-source code, or code that is freely available and developed by individuals, can present a serious threat to national and economic security,” stated committee chairman Sen. Gary Peters (D-MI).
Security
ZDNet - Linux malware attacks are on the rise, and businesses aren't ready for it
Analysis from cybersecurity researchers at VMware warns that malware targeting Linux-based systems is increasing in volume and complexity, while there's also a lack of focus on managing and detecting threats against them. This comes after an increase in the use of enterprises relying on cloud-based services because of the rise of hybrid working, with Linux the most common operating system in these environments.
Security
Semiconductor Engineering - What Will Be The Killer App For 5G? Time To Place Your Bets
At $90.7 billion, mobile gaming now accounts for over half of gaming revenue. (By contrast, movies will rake in only $20.2 billion at the box office.) Likewise, AR seems to be making the transition from booth demo technology to something people will actually use.
5G
The National Law Review - Tech Transactions & Data Privacy 2022 Report: The FTC’s Expanding Role in Cybersecurity and Data Privacy Enforcement in 2022
During the second half of 2021, the FTC took two meaningful actions that signaled the FTC’s desire to expand its role in setting and enforcing cybersecurity and data privacy standards: the FTC clarified the scope of the often ignored HBN Rule and the FTC amended the Safeguards Rule to strengthen the data security requirements for financial institutions.
Data Privacy
VentureBeat - 3 data privacy trends to watch in 2022 and beyond
In just the first year of California’s CCPA, B2C companies received approximately 137 data subject access requests (DSARs) per million identities. At that time, California was the only state with a privacy law on the books. Virginia and Colorado added laws this year, and more states are trying to push privacy legislation forward.
Data Privacy
ZDNet - Tech jobs are booming: Here's what employers are looking for
According to job market statistics by CompTIA, IT occupations throughout the economy increased by 178,000 last month, with tech-related hiring contributing to the national growth of 467,000 jobs. Unemployment rates within tech occupations dropped to 1.7%, down from 2% in December 2021
Tech Jobs
CSO - Vigilance and Planning: Experts Share Their IT and Data Security Strategies 
“I’m focused on security of the DevOps/DevSecOps toolchain from man-in-the-middle and other attacks,” he says. “As the workplace becomes more hybrid, the toolchain becomes a more enticing target for threat actors raising the security stakes.”
Security
sogetilabs - What if quantum technology could solve the world’s biggest challenges?
Business leaders are aware of the benefits that this next generation of computation can bring, but they’re also concerned by the complexity of this fast-evolving area of technology. Estimates suggest as many as 40% of large enterprises will have quantum computing initiatives underway by 2025.
Quantum Computing
Techstartups - Here’s Why Web 3.0 Could Disrupt the Future of the Creative Industry and Data Management Systems
Simply put, Web 3.0 is a decentralized version of the web whose focus is to bring power back to the users. A trend that resonates with most people across the world given its value proposition in data privacy and security.
Data Privacy
SiliconANGLE - What to expect in cloud computing in 2022 and beyond 
HPE and Dell are interesting. They’re transitioning early private cloud businesses to GreenLake and Apex, respectively. And finally, after years of staring at their respective navels in cloud and milking legacy on-prem models, they’re building out cloudlike infrastructure, services and pricing models for their customers.
Cloud
VentureBeat - Report: 88% of IT leaders face integration challenges that slow digital transformation
Companies’ integration challenges and a growing number of applications — on average, organizations are using 976 individual apps — are not only hindering great customer experiences and digital transformation, but also costing organizations millions of dollars.
Digital Transformation
Cointelegraph - A quarter of people will have spent time in the metaverse by 2026: Research
The report also estimated that 30% of the organizations in the world will have products and services in the metaverse by 2026, with brands already gearing up to stake their claims in the digital world.
Metaverse
VentureBeat - The struggle to keep cloud budgets in check
The research found that budgetary strain was the number one concern facing people directly charged with managing cloud costs. Indeed, the CIOs and CTOs surveyed said they expected cloud spending to comprise 47% of the technology budget for SMEs in 2022 — a whopping 67% increase from 2021.
Cloud
SiliconANGLE - Seven intriguing enterprise startups for 2022 
Observability – especially based on the OpenTelemetry standard – is perhaps the most prominent theme. Machine learning is a close second. Data, however, is the common thread that pulls these innovative companies together, even though they all take a differentiated approach to their offerings.
Data & Analytics
ZDNet - Ransomware gangs are changing their tactics. That could prove very expensive for some victims
According to analysis by Coveware, this move has increased the risk profile of being involved with ransomware attacks, and thus decreases the pool of cyber criminals, because some will decide the potential for being arrested and extradited isn't worth the risk – to the extent that some are quitting.  
Security
VentureBeat - The Great Resignation is a myth: Meet the Great Reprioritization
A recent survey by Bankrate.com found that 55% of Americans plan to seek new jobs in the coming year. And Deloitte revealed that over 50% of CEOs cite talent recruitment and retention as the most significant challenges going into 2022.
Tech Jobs
Data Center Dynamics - Top data center and tech predictions for 2022
The metaverse will simply not develop enough this year to have any measurable impact on the edge computing sector. Without a doubt, as the metaverse matures, it will have a massive impact on edge computing. To enhance the user experience, it will have to push content and compute closer to the user.
Tech Trends
ComputerWeekly - Four emerging data integration trends to assess
In mapping the future of the technologies in the data integration ecosystem, Forrester identified data as a service, data mesh, knowledge graph and query accelerator as four technologies that fall into the “experiment” category. They are regarded as having low maturity and low business value.
Data & Analytics
TMCNET - More Than Half of Ransomware Victims Paid the Amount Demanded by Hackers in 2021
And why wouldn't they pay? Data is a valuable commodity. Sixty percent of companies have sensitive customer data (e.g. confidential information, credit card numbers, social insurance numbers, etc.) and nearly one third (28%) value their information assets (data, people, processes, recipes, etc.) at more than $1 million.
Privacy & Security
Location Analytics Market Estimated to Exceed US$ 45.77 Billion Globally By 2027: IMARC Group
Location analytics, also called geoanalytics, refers to the tools that aid in interpreting and analyzing real-time or historical geographical data. It is usually used to predict consumer behavior or buying patterns.
Data & Analytics
VentureBeat - Gartner’s IT spend forecast for 2022 shows CIOs ready to take risks
However, Lovelock cautions, the technology that CIOs choose to buy and implement needs to focus on more than simply ensuring that workers can access the internet and accomplish tasks remotely and securely. It should also allow venues for professional growth and self-service
IT Management
Computerworld - Q&A: CISO sees 'enterprise' browser as easier way to monitor employee web use
As we’re getting what we’re calling sanctioned apps or approved apps, we’ll start to say, 'You know what? Salesforce, Workday, Office — you can only get to those through this browser now.' So, we’ll enforce people who are interacting with your SaaS through this browser.
IT Management
VentureBeat - Metaverse 101: Defining the key components
To achieve a true VR or AR experience, a user must be able to interact with virtual content in natural and immersive ways. This distinguishes VR from 3D movies and 3D simulations. It also distinguishes AR from “heads-up displays” (HUDS) that present non-immersive content into a user’s line of sight, such as text, data, and flat images.
Metaverse
eWeek - Real-Time Data Management Trends for 2022
Organizations will need to glean insights from streaming data in real time to find new patterns and discover and act on them. Navigating data is like running whitewater, where you need to adapt instantly to a changing environment. Those that learn to run the rapids will succeed.
Data & Analytics
Techstartups - Facebook’s Meta, Snap, Twitter, and Pinterest lost $278 billion due Apple privacy changes
The report notes Meta’s value has fallen by $169 billion since April 26, 2021. Similarly, Snap has fallen by $50 billion, Twitter by $26 billion, and Pinterest by $33 billion. For Snap, Twitter, and Pinterest, those losses represent around half of their previous market values, a staggering decline.
Data Privacy
VentureBeat - Despite recent progress, AI-powered chatbots still have a long way to go
“Until models have deeper understanding, they will sometimes contradict themselves. Similarly, our models cannot yet fully understand what is safe or not. And while they build long-term memory, they don’t truly learn from it, meaning they don’t improve on their mistakes,”
Artificial Intelligence
AiThority - Biggest AI and Machine Learning Trends that Will Shift Tech Investments in 2022
In less than 5 years, AI and ML technologies are ruling every aspect of business function, including Marketing and Sales automation, SaaS development, E-commerce, blockchain DevOps, Cloud modernization, Drones and UAVs, and Space tech.
AI/ML
VentureBeat - Microsoft: ‘Dangerous mismatch’ in security due to slow MFA adoption
New statistics released in the report show that just 22% of Azure Active Directory identities utilize “strong” authentication in the form of MFA. The remaining 78% of Azure AD identities require only a username and password to authenticate, Microsoft disclosed.
Privacy & Security
AiThority - Metaverse Trends: Is 2022 the Year of the 3D CMS?
However, probably most tellingly, many business leader’s have realized they knew a lot less about their company and its customers than they thought. There were gaps in data collection, the skills needed to analyze and apply insights, and, critically, the flow of information across a business.
Marketing Tech
Datanami - Alteryx Report Reveals 88 Percent of Orgs Hindered by Legacy Spreadsheets
As businesses strive to move from being data-hoarders to driving real insights by democratizing analytics, the IDC Infobrief, “Data and Analytics in a Digital-First World”, reveals how complexities, constraints, skill gaps, and a lack of analytics automation are hurting productivity.
Data & Analytics
VentureBeat - The state of AI ethics: The principles, the tools, the regulations
“If we try to look for the broadest set of unifying principles, it necessitates that we become more and more abstract. This is useful as a point of discussion and framing conversations at the broadest level, and perhaps guiding research. When it comes to practical implementation, we need a little bit more concreteness,” he said
AI Ethics
ZDNet - Tech salaries, developer skills, cybersecurity, and more: ZDNet's research roundup
The "widespread hunger" for technology professionals might have seen the average salary for technologists hit a record high of $104,566 in 2021, but almost half of tech workers feel they are underpaid. Dice reports that 47.8% of tech workers feel underpaid – a marginal increase of nearly 2% compared to 2020.
Tech Jobs
VentureBeat - Report: 77% of enterprises have adopted multicloud housing
Multicloud’s promises of lowered costs and vendor lock-in elimination are impacting the CDN and cloud hosting markets in particular, with adoption of the three leading providers (Amazon Web Services, Google, and Microsoft Azure) increased by 20% in 2021.
Cloud
ZDNet - Cloud-computing spending just hit another huge milestone
While the metaverse is still being hashed out, Canalys sees use cases for the burgeoning virtual world in gaming, social media, workplace collaboration, education, real estate, ecommerce and digital commerce. Whatever it will become, it's all good news for cloud providers.
Cloud
VentureBeat - Report: 83% of IT leaders say a hybrid multicloud is the ideal operating model
Thirty-six percent of respondents said their clouds are fully interoperable, and a little more than half (56%) reported some level of interoperability between clouds. In addition to cloud interoperability issues, most respondents (80%) agree that moving a workload to a new cloud environment can be costly and time-consuming.
Cloud
eWeek - Best Website Vulnerability Scanners 2022
Vulnerability scanners and website vulnerability scanners are different. A website scanner does a remote scan of a website and often provides a graphic that can be included to show the site has been scanned. Vulnerability scanners, on the other hand, scan the IT network, endpoints, and infrastructure as they look for vulnerabilities
Security
TMCNet - The Payment Revolution: Blockchain Changing the Game
Mordor Intelligence puts a transaction value of the global digital payments market at $5.44 trillion in 2020 and forecast it to climb 11.21% annually to reach $11.29 trillion by 2026. Blockchain technologies also can provide an affordable solution to the 1.7 billion unbanked people in the world that contribute to the roughly $500 billion transferred internationally each year through personal remittances.
Blockchain
VentureBeat - Report: By 2025 carbon emissions of cloud services will be main factor in purchasing
An increasingly important part of said strategies is sustainable business, which is becoming a key tenant of responsible business practices. More than 90% of organizations increased their investments in sustainability programs between 2017 and 2020, according to previous Gartner surveys.
Sustainability
yahoo!Finance - Cybersecurity Report 2021: TXOne Networks Publishes In-Depth Analysis of Vulnerabilities Affecting Industrial Control Systems
 One important observation from the report is that cyber attacks on critical infrastructure can be resisted and made significantly easier to repel by applying the OT zero trust methodology, which includes device inspection, preserving critical applications and services, network segmentation, and virtual patching.
Security
ZDNet - This tech job has just been crowned the best in the country
Glassdoor's 25 Best Jobs List for 2022 found that software developers, data scientists, IT architects and full-stack engineers dominate the top spots when measured by salary, job satisfaction and the number of job openings.
Tech Jobs
Document Analytics Market: Meticulous Research® Reveals Why This Market is Growing at a CAGR of 48.1% to Reach $12.45 billion by 2027
Document analysis identifies and extracts critical information from incoming paper and electronic documents without extensive user interaction. It transforms the time-consuming and error-prone task of manually processing documents across different formats into a fast, effective, and intelligent automated learning workflow.
Data & Analytics
Geektime - The Cloud: 4 business trends from the past year and projections for the next
Cloud providers continue to offer storage and basic computing, but they're opening an entire vault of advanced technological services to businesses across the globe, including abilities that were only available to enterprises before.
Cloud
DEVPRO Journal - Automation and Robotics: The Future of Work Made Possible with Software
Businesses tend to turn to automation to solve a specific problem, for example, moving pallets from a dock or cleaning. They see localized ROI as productivity per employee who used to perform those tasks increases dramatically. But it’s really just the start. Companies need to optimize overall process flow – if there is a bottleneck somewhere else, there is no benefit.
Automation & Productivity
CSO - Outdated IoT healthcare devices pose major security threats 
The report found that IV (intravenous) pumps make up 38% of a hospital’s typical healthcare IoT footprint, and 73% of these pumps have at least one vulnerability that could jeopardize patient safety, data confidentiality or service availability if identified by a bad actor.
Security
TMCNet - AI-Powered Language is Fueling Customer Engagement According to Survey from Persado and Coresight Research
NLG is a key AI-driven technology in creative content generation and was cited by survey respondents as one of the top five most significant ways to leverage AI in digital marketing. Additionally, 78.3% of respondents hold AI accountable for creative development and execution-meaning that marketers can finally track the impact of words and phrases when using AI generated content.
Artificial Intelligence
telecoms - Building the foundation for mobile network data monetisation in the 5G era
Location is one of the most valuable types of network data that is highly coveted by all. It is used by operators internally for geo marketing and commercial purposes, but it is also extremely desirable for external businesses and governmental agencies. Smart cities, for instance, rely on location information to analyse population movement patterns for planning purposes,
5G
Network World - Gartner: Worldwide IT spending to reach $4.5T in 2022
The largest growth segment is enterprise software, which is projected to grow 11% to $672 billion. However, Gartner includes the cloud market in the enterprise software market, and that's where the growth is.
Cloud
Harvard Business School - Where Can Digital Transformation Take You? Insights from 1,700 Leaders
Digital natives in particular expect customer-company interactions, even in business-to-business industries, to be as fast and intuitive as tapping out a text or playing a video game. Not only must a company offer high-quality products or services, but the way they deliver them to the customer matters much more today than in the past.
Digital Transformation
Programming languages: Python dominates, but developers are adding new skills to stand out
While interest in C++ did see a noteworthy rise, Python and Java still dominate O'Reilly's platform usage. O'Reilly says it has seen usage of content about Mozilla-hatched Rust and Google-backed Go "growing rapidly". Both are popular for systems and infrastructure programming
DevOps
ZDNet - One in seven ransomware extortion attempts leak key operational tech records
Mandiant collected samples from victims that leverage operational technologies (OT) for their production. After pouring through the data dumps leaked on the name-and-shame websites, the researchers found everything from network and engineering diagrams to information on partner vendors and operator panels.
Security
eWeek - 7 Digital Transformation Trends Shaping 2022
One aspect of digital transformation that has been accelerated by hyperautomation is the AIOps sector. AIOps solutions can centralize data and leverage algorithms to aggregate and correlate alerts. Essentially, AIOps is the evolution of ITOps and has been at the core of many digital transformations.
Digital Transformation
VentureBeat - Drive smarter decision-making with explainable machine learning
Most importantly? Use your judgment. The great thing about explainable machine learning is that it can be, well, explained. If you don’t get it, it probably won’t drive value for your company.
Machine Learning
ZDNet - Microsoft Teams: Here's what's new in January 2022
The mirror my video feature can be used by educators who are using tools like a whiteboard or a virtual background with text in it. In those cases, the educator sees a text flipped. Now, they can un-mirror the text to see it correctly by going to Device Settings and toggling off Mirror my video.
Automation & Productivity
techopedia - Smart HR: How AI is Transforming Talent Acquisition
For instance, Recruiter.com has identified hybrid or remote work as a top trend for 2022—and with that comes the need for more robust and interactive engagement tools to promote a cohesive and productive culture. A tremendous amount of funding is currently flowing to employee engagement tools for this reason.
Automation & Productivity
Chron - Cyberattacks increasingly hobble pandemic-weary US schools
“It’s very difficult for the school districts to learn from each other, because they’re really not supposed to talk to each other about it because you might share vulnerabilities,” Elder said.
Security
ZDNet - Ransomware: Over half of attacks are targeting these three industries
According to detections by Trellix, banking and finance was the most common target for ransomware during the reporting period, accounting for 22% of detected attacks. That's followed by 20% of attacks targeting the utilities sector and 16% of attacks targeting retailers.
Security
VentureBeat - Report: More than half of execs see digital transformation as critical to business growth for 2022
To deliver on the promises of digital transformation, 35% of CIOs said they will prioritize leveraging infrastructure investments to move from traditional data centers to cloud-based, or leveraging enterprise-wide data and analytics to drive strategic decision-making
Digital Transformation
SDxCentral - AT&T: Security Top Concern as Edge Interest Surges
Early edge applications include loss prevention in retail, video-based quality inspection for manufacturing, telemedicine in health care, and surveillance and electronic voting in the public sector.
Edge Computing
AiThority - Should AI Be Centered on Machine Learning Algorithms or Data?
Selecting the right approach is vital to ensure we are appropriately building AI. Three dimensions should be considered: label noise, actionability, and amount of data.
Artificial Intelligence
TechStartups - How Does Artificial Intelligence Blockchain And Supply Chains Work?
Artificial intelligent blockchains can create new paradigms for global supply chains. On-chain oracles within blockchains provide real-time data for split-second decisions and actions. On-chain oracles prevent issues like trade credit contagion
AI/Blockchain
VentureBeat - Report: 80% of execs say their orgs’ tech needs not met
Most upper management and middle management executives believe that 40% or more of requests to IT are backlogged due to conflicting priorities and constraints. Midsized companies are most likely to find themselves held back by overloaded IT teams, with most of the managers of midsized firms stating 60% or more of their department’s requests to IT remain unfulfilled
IT Management
AiThority - SparkPost Global Survey Reveals 74% of Marketing Leaders Concerned with Impending Privacy Changes
The good news is most leaders recognise the importance of investing in aligning each marketing discipline, shoring up solid data practices, and bolstering their arsenal of branded content and communications channels.
Data Privacy
Network World - Top 10 outages of 2021
The biggest outages of 2021 had one thing in common: they affected major infrastructure or services providers and, as a result, affected large numbers of enterprises and end users. The lesson? Companies need to be careful about putting all their infrastructure eggs in one basket, or, if they must, to prepare for downtime if that particular service goes down.
Network Management
Technotification - Top 5 Cybersecurity Trends for 2022
The public’s patience has run out regarding data breaches and the seeming lack of accountability by businesses. Governments are beginning to respond with legislation that targets company directors, making them financially and legally responsible for data breaches that occur on their watch.
Privacy & Security
The Hill - Why Congress should pass data privacy legislation in 2022
Federal legislation is necessary to prevent the United States from becoming a patchwork of 50 different state laws, which would make enforcement more costly and impose unnecessary barriers to innovation in the digital economy, which runs on personal data.
Data Privacy
Dice - 8 Red Flags in Tech Job Postings You Shouldn’t Ignore
While job postings are meant to provide valuable information about a position and attract culturally compatible candidates, they often contain code words, descriptors or phrases that subtly signal a potentially toxic work environment, a boss with unrealistic expectations, or biased hiring practices.
Tech Jobs
VentureBeat - Report: 62% of orgs use voice technology to increase revenue
To fuel this innovation, 75% of respondents plan to increase their speech technology budget in 2022, and 92% believe this will drive widespread use of voice technology within five years.
Voice Tech
SDxCentral - Cisco: Data Privacy Is Key to Customer Trust
“With 94% of organizations saying they are reporting one or more privacy-related metrics to their board, and privacy investment rising, with an average budget up 13%, there’s no doubt that privacy continues to grow in importance for organizations, regardless of their size or location
Data Privacy
ZDNet - Scammers target us on social media now more than ever
According to the FTC, more than one in four people who lost money to fraud in 2021 said it started on social media in the form of an ad, post, or message. Findings also show that social media was more profitable to scammers last year than any other method of reaching people.
Privacy & Security
IT Business Edge - Why Business Technologists are Becoming Indispensable
Technology has become so sophisticated and ubiquitous that it is nearly impossible for enterprises to be successful without using technology to its full potential. To bridge the gap between business and technology, an enterprise needs the expertise of a business technologist.
IT Management
VentureBeat - The ethics of the metaverse
If we don’t have mental privacy and biological privacy, some of the new technologies could essentially read our minds, model our identity, reach fine-grained and contextually relevant conclusions, and then nudge our behaviors to the point where it undermines our intentional actions, Bye said.
Privacy
Security Boulevard - Best Practices for Application Security in the Cloud
For applications running in public cloud service provider (CSP) environments like Amazon Web Services, Microsoft Azure, and Google Cloud, responsibility for application security starts at the operating system layer. That said, AppSec teams should still factor in the risk of compromise of lower layers of the CSPs’ multi-tenant environment.
Cloud Security
InfoWorld - Slashing time to insight with unified data analytics
One of the greatest advantages of a unified platform is that you no longer have to manage five points of integration. In fact, you no longer even have to move your data in the first place. With unified data analytics, you bring the analytics to the data instead of the other way around.
Data & Analytics
VentureBeat - Report: Cloud adoption grew 25% in the past year
That said, the struggle to automate security was palpable, and no matter the reason an organization moves workloads to the cloud, security remains consistently challenging.
Cloud Security
Talk Business - State of the State 2022: State technology leaders reflect on 2021, look to 2022
“From supply chain to bioinformatics, we are awash in reams of data. Understanding industry needs – all the way to the individual company-level – remains quite challenging,”
IT Management
BMC - 12 Best Practices for Cloud Adoption
Here are 12 top practices you need to incorporate as you begin to use the cloud and make it part of your IT and app dev environments. The most successful organizations in their use of public cloud have all of these practices in place
Cloud
VentureBeat - How data transformed from technical resource to strategic business asset
It’s data, not algorithms, which make Google, Meta, and Amazon the big three in digital advertising. It is also data that made Netflix and Amazon two powerful production companies
Data & Analytics
eWeek - Humans Will Be the Story of AI in 2022: 4 Predictions
As such, automation of tasks with a high degree of variability or contextual nuance will shift toward supplementation. Examples include healthcare practitioners to paralegals to production line engineers. Less context-dependent, invariable and rote tasks will continue to be automated at pace.
Artificial Intelligence
ZDNet - Employers are desperate for data scientists as demand booms
"The number of tasks in our testing catalogue related to Data Science and Python grew in 2021 by 158.33% and 113.33% respectively."
Data & Analytics
Industry Week - The US Digital Skills Shortage Is Worse Than We All Thought
Moreover, almost two-thirds of new U.S. jobs created from 2010 to 2016 were ones requiring medium- to high-levels of digital skills, with those jobs also paying considerably more. In fact, U.S. occupations requiring high levels of digital skills on average pay 2.5 as much as jobs requiring only low levels of digital skills, while medium-level ones earned 1.5 as much.
Tech Jobs
Enterprise Talk - Enterprises Should Ensure Sustainability of AI Initiatives
With so much emphasis on AI and ML technologies in shaping the future, enterprises need to come with strategies to balance the power and potential of AI. In addition, they need to identify ways to maximize the positive outcomes for customers and society at large.
Artificial Intelligence
VentureBeat - How the metaverse will impact governance, privacy, fraud, identity, and more
But to the extent that the metaverse will be a transactional space, governmental regulation will apply whether it’s a walled garden or not, for instance on ecommerce and other internet-based transactions to some extent. You can’t totally escape government regulation.
Emerging Tech
AiThority - ‘Majority of Marketing Departments Rely on Outdated Data and Analytics Practices’ Says Report
Of the almost two-thirds of marketers who believe their company is analytically mature, some 77% have yet to achieve a single unified view of their marketing performance while 68% still depend on spreadsheets for reporting.
Data & Analytics
eWeek - Best Data Modeling Tools and Software for 2022
A data modeling solution is only as good as the data it accommodates. Even the best features are useless if you cannot plug in all essential data and put it to use.
Data & Analytics
ZDNet - Crypto industry status report: A slew of blockchains; smart contracts, DeFi and DAOs on the rise
Svanevik thinks that smart contracts are important for a number of reasons. First, they are unique in that they are autonomous -- they don't need to be invoked. Assuming there are no bugs and vulnerabilities, smart contracts are always up and running. Smart contracts also allow for composability and permissionless innovation:
Blockchain
VentureBeat - The metaverse: Where we are and where we’re headed
It’s clear that there will be a first big wave of innovation over the next 12 to 24 months, where “mixed reality” hardware produces breakthroughs for immersive experiences.
Emerging Tech
Virtualization & Cloud Review - What Cloud-Native Skills Are Most in Demand in 2022?
"Survey respondents are clear about their hiring priority in 2022: focus on the skills needed to enable cloud native. Many companies are setting up cloud competency centers and dedicated cloud teams as they skill up."
Tech Jobs
Tech.co - Over 90 Hacked WordPress Add-Ons Could Give Away Your Website Access
Researchers have found a total of 93 WordPress apps — 40 themes and 53 plugins — have been compromised as part of a large backdoor attack that gives threat-actors full access to the websites those add-ons have been used for.
Security
VentureBeat - Linux vulnerability can be ‘easily exploited’ for local privilege escalation, researchers say
In Unix-like operating systems, polkit (formerly known as PolicyKit) is used to control system-wide privileges. Polkit’s pkexec is a program that enables an authorized user to execute commands as a different user.
Security
EdSurge - What Could Web3 Mean for Education?
Some edtech entrepreneurs are eager for Web3 to arrive and change education. They envision an ecosystem where learners buy access to courses without enrolling in colleges; where teachers profit directly from their teaching; where students track progress on ever-lengthening credential chains; and where people who invest in the right tokens gather in learning groups to explore topics of mutual interest.
EdTech
TMCNET - Qumulo Unveils Top Unstructured Data Storage Predictions for 2022
Over the next year, there will be a greater need for storing file data in reliable namespaces and managing it across multiple repositories - in the cloud or on-prem - with impressive scalability, performance and cost savings.
Data Storage
Harvard Business Review - Can AI Teach Us How to Become More Emotionally Intelligent?
Many professional roles requiring strong communication skills, including leadership, public speaking, product management, virtual therapy, teaching, language learning, and bedside manner will benefit from AI that measures emotional intelligence. Indeed, by 2026, the combined market size for emotion detection and conversational AI are projected to grow to more than $55 billion.
Artificial Intelligence
Fast Company - How Blockchain can become the financial system the world needs
Today, the blockchain user experience is confusing and intimidating, and there are a variety of pitfalls that new users can fall into. Casual users often lose their keys, expose their private keys to hackers, or end up sending tokens to scam projects
Blockchain
AiThority - Predictions Series 2022: 2022 B2B Marketing and Sales Trends to Prepare For
Already, 30 percent of office phone lines will lead to nowhere. Another 25 percent of executives will have switched jobs during 2021, leaving us with 55 percent of our overall data being bad.
Marketing Tech
ZDNet - Staff negligence is now a major reason for insider security incidents
Over the past two years, insider threats have increased "dramatically," the report says, with 56% of insider-related incidents caused by a negligent employee. In total, 26% of incidents were linked to criminal inside activities, whereas 18% of threats were caused by the theft of employee credentials, potentially made possible through failures to manage personal device security or weak password use.  
Security
Digital Information World - We Don't Need More Data - We Need More Contextual Data: Data Enrichment vs Fraud
Several data enrichment tools on the market today are part of a wider suite or platform rather than standalone, albeit still providing similar functionality. This makes practical sense, as data enrichment is largely based on automation and aims to both speed up processes and enable enhanced insights. By integrating it into wider automation solutions, this data is placed within an even larger framework, thus better contextualized.
Data & Analytics
IndustryWired - Top 10 Machine Learning Startups Expected to Excel in 2022
For example, ML can make a predictive analysis app more precise, with the passing time. ML frameworks and models require an amalgamation of data science, engineering, and development skills. This article lists the top 10 machine learning startups that would become big in 2022.
Machine Learning
AiThority - bipp Analytics Unveils Predictions for the Business Intelligence and Data Analytics Industry
But, beyond a slick interface is a need for robust data models that act as enterprise-wide single sources of truth. If you’re not investing time to define a layer that hosts business logic to be explored by the rest of your organization, then self-service BI will do nothing except create an endless series of helpdesk tickets.
Data & Analytics
Seminconductor Engineering - Health Care Is Gold Mine For Hackers
In another case, hackers blocked access to the University of Vermont Medical Center’s data. Employees were unable to retrieve electronic health records (EHRs) and payroll programs. Surgeries had to be rescheduled. Lost revenue was estimated at $50 million.
Privacy & Security
Databricks' TPC-DS benchmark results and the analytics platform wars
Databricks, the champion of data lakehouse technology and its open storage format underpinnings, announced it set a world record for a data warehouse performance benchmark. Was the announcement hyperbole or legitimate vindication for the data lake and lakehouse technology models?
Data & Analytics
inside BigData - Leveraging the Power of Data and Analytics … Yeah, Yeah. A Pragmatic Approach in 5 Steps
This requires FIs to step back and reimagine how they engage with their customers. Not only do they need to understand the rich and robust data sets they already have, and to better orchestrate and analyse the data, but match that data with other, external services and data sources to provide a more rewarding and engaging customer experience.
Data & Analytics
MedCityNews - How payment integrity tools can help payers to tackle fraud, waste and abuse
When reports come in from providers, auditors will study certain portions of the claim (such as medical records) and capture all of the provider’s notes on the backend. From there, the machine starts learning trends in the reports and creating these new ML algorithms, which help identify outliers or mistakes in future claims.
Privacy & Security
yahoo!Finance - Bitcoin stealers: malware that raid crypto wallets
In its latest report it said sophisticated attacks take careful planning and skill to pull off, but through other types of malware, hackers can take a cheaper “spray-and-pray” approach, spamming millions of potential victims and stealing smaller amounts. The malware families sampled received 5,974 transfers from victims in 2021, up from 5,449 in 2020.
Privacy & Security
SiliconANGLE - Predictions 2022: Here’s what will happen in enterprise technology this year 
We’re seeing supercloud evolve, especially in hyperscale ecosystems. In our view, the two biggest things that are new are: 1) The technology is evolving where you’re seeing services truly integrate cross-cloud services; and 2) Digital transformation where a new innovation curve is developing and it’s not just about making your IT better. It’s about making everything software as a service and automating your entire company workflows.
Tech Trends
ZDNet - Tech salaries just hit record highs. But nearly half of IT staff still feel underpaid
The latest Dice Tech Salary Report found that 61% of technologists received a salary increase last year, up from 52% in 2020. Web developers saw the biggest increase in pay, shooting up by more than a fifth (21.3%) to $98,912, while the highest salaries were demanded by IT management, whose pay rose 6% to $151,983 between 2020 and 2021.
Tech Jobs
VentureBeat - How emerging tech will influence freedom, industry, and money in the metaverse
It is not just gaming and entertainment that stands to transform and expand with the onset of the metaverse. Synchrony, a fully functioning economy, and the interoperability of digital assets, information, and consumers means industries like supply chain management, property sales, and even office workflows stand to benefit from developments related to the metaverse
Metaverse
AiThority - 92% of Product Decision Makers Say Data & Analytics Critical to Success of Business
And for a direct tie to the bottom line, 96% note that an increase in average selling prices would be possible with personalized and customized analytics, with 46% noting they could charge 10-19% more for their products and services because of the analytics they provide
Data & Analytics
VentureBeat - Podcast advertising could be a blueprint for cookieless advertising
In order for the data-restricted audio industry to appease both advertisers and audiences, it is crucial, as a publisher, to have a firm comprehension of the industry’s key differentiators, and furthermore, to know how to circumnavigate them as it pertains to advertising.
Marketing Tech
eWeek - What Does 2022 Hold for Intelligent Automation?
The lines between digital process automation (DPA), iPaaS, no code, robotic process automation, and other forms of automation are blurring too. So we will most likely see a future trend toward IA platforms that provide the means to create, manage, and control operations that leverage multi-modal automation across both humans and digital robots.
Automation & Productivity
ZDNet - Cybersecurity: 11 steps to take as threat levels increase
Triggers for heightened risk include a spike in adversary capability from new zero-day flaws in popular software, or something "more specific to a particular organisation, sector or even country, resulting from hacktivism or geopolitical tensions," says the NCSC.
Security
SDxCentral - Will Google Debut 800G Data Center Switches in 2022?
“While the 200 and 400 Gb/s adoption at Google and Amazon mostly benefited the white box switch vendors, the accelerated 200 and 400 Gb/s deployment at Microsoft and Meta will benefit certain branded vendors such as Arista and Cisco,”
Cloud
Forbes - Cybersecurity in 2022 – A Fresh Look at Some Very Alarming Stats
“among the findings of a new study of pentesting projects from Positive Technologies, conducted among financial organizations, fuel and energy organizations, government bodies, industrial businesses, IT companies and other sectors. In 93 percent of cases, an external attacker can breach an organization's network perimeter and gain access to local network resources.”
Security
ZDNet - The never-ending effort to bake common business sense into artificial intelligence
Scarano poo-poos the notion that AI systems comprise anything close to a "digital workforce," noting that "it's just a way to sell more stuff. I can sell 50 digital workers rather than one system. But digital workforce is just a bunch of code that does a specific task, and that task can be repeatable, or be customized."
Artificial Intellgence
eWeek - An Overlooked Cybersecurity Threat: 5G
Establishing the types of data being handled and where that data resides, whether within on-premise devices, cloud providers, or remote employee laptops provides a key baseline to data risk awareness.
Security
VentureBeat - 3 ‘dark’ trends likely to power smart technology and communities by 2030
In 2030, p2p-based distributed apps could transform public transportation, access to fresh food, healthcare, energy, elder-care, journalism, policing, and beyond. Wise leaders will recognize the value of smart communities and build into the trend
Smart Tech
Digital Journal - Email Marketing Platforms Market May See a Big Move | Major Giants MailChimp, VerticalResponse, Emma, Constant Contact 
The market report primarily will help you to realize and find out the most forbidding and upsetting driving powers of Email Marketing Platforms in marketplace with anticipating the consequences on the worldwide industry
Marketing Tech
Dark Reading - IT Leaders Consider Security Tech a Part of Business Transformation
While the respondents list the usual suspects – big data/analytics, AI/machine learning, and cloud infrastructure – in the top 3, 19% say identity and access management has the most potential to significantly impact business operations.
IT Management
VentureBeat - The Log4Shell vulnerability: A postmortem
Log4j2 is ubiquitous among applications and the libraries on which they depend, meaning that many applications were utilizing Log4j2 without realizing it. Even applications not written in Java often are hosted in web containers, meaning that a project can have no apparent dependency on Log4j2 and still be exposed.
Security
Computerworld - Talent war to push CIOs toward consultancies, managed services in '22
“In order to maximize productivity of their existing IT staff, CIOs will be outsourcing more to free up time, training existing staff in the desired skills and hiring consultants to fulfill critical skilled roles. This will last at least through 2022.”
IT Management
Virtualization & Cloud Review - Networking/Security Convergence with SASE Marked in New Report
"Global organizations recognize [SASE] is the future, but not all are sure how to get there. Implementation timelines, the decision maker's role and the approach to SASE vary by company size and region, but all organizations share the top two concerns: complexity of management and high implementation costs,"
Network Security
TMCNET - Digital Twin Market Size is Projected To Reach USD 5545.2 Million By 2028 At A Cagr of 15.9%- Valuates Reports
The digital twin market is likely to grow as the focus on Industry 4.0 grows. Digital Twin enables a more virtual system-based design process, allowing any equipment or system to play a much more active part.
Digitial Twin
GeekWire - FastForward 2022 – Five mega-trends that will shape the payments industry in the coming year
These as-a-service models are not only high-performing – growing 5 – 8x faster than their traditional counterparts according to Zuora’s Subscription Economy Index – but also lays the foundation for companies to pivot to ecosystem as these different as-a-service models are connected together onto a single platform
FinTech
Forbes - Six Steps To Execute Responsible AI In The Enterprise
The EU AI Act is expected to be implemented by 2023, and it will change how businesses develop and utilize AI. Any business that offers an AI application to EU citizens or organizations will need to ensure its applications are aligned with EU Charter of Rights and other various laws, including ones in relation to discrimination and privacy. These applications will have to abide by the framework of "trustworthy AI" set forth by the act.
Artificial Intelligence
AiThority - Anti-Fraud Analytics Booms as Cyber War Rages
“Predictive modeling is up 25%. Text mining has nearly doubled, jumping from 33% to 65% in three years. These findings prove that, even as COVID has fueled rampant fraud, insurers are agilely stretching their advanced analytics and AI capabilities to counter rapidly changing threats.”
Data & Analytics
cointelegraph - Scaling and the Metaverse: The beginning of Web3
The support behind the decentralized value advocated by Web3 is a decentralized technology stack, the development of which is accompanied by scalability and security issues that are becoming crucial to solve.
Web3
Digital Information World - High Expectations from Marketing Technologies as we hit 2022
We went around to figure out what is the most significant thing for any company with respect to marketing. Most of the answers were about privacy, which was followed by AI, Metaverse, web3, and ESG.
Marketing Tech
Digital Journal - Cyber Insurance Market to Witness Impressive Growth by 2026 | Lloyds, AON, XL Group
This growth is primarily driven by Increasing Stringency of Government Regulations and Growing Cyber Threats, Demand for Integrated Cyber Solutions and Rising Severity of Cyber-Crimes, The Popularity of Cloud Security, Rapid Adoption of Cloud Computing, Data Center, and Wireless Communication.Security
Cyber Defense Magazine - OT/IT Security – Two Sides of the Same Coin
The industry is already embracing a more integrated approach to IT/OT security, with Gartner projecting “by 2025, 75 percent of OT security solutions will be delivered via multifunction platforms interoperable with IT security solutions.” Gartner further notes that “brownfield operational technology/information technology convergence acceleration and a growing number of greenfield cyber-physical systems push OT security needs to evolve, and more IT security leaders to become involved, as threats and vulnerabilities increase.”
Security
Martechvibe - Top Data Privacy Experts
In the cookieless world, with the General Data Privacy Regulation (GDPR) and the California Consumer Privacy Act (CCPA) holding strong, keeping up with new data privacy trends and measures will become inevitable for businesses, across industry.
Privacy
Datanami - Sisense Releases New Study: ‘The Business Intelligence Landscape’
And for a direct tie to the bottom line, 96% note that an increase in average selling prices would be possible with personalized and customized analytics, with 46% noting they could charge 10-19% more for their products and services because of the analytics they provide.
Data & Analytics
VentureBeat - Zero-trust trends for 2022
Insurance, financial services, and manufacturing CISOs told VentureBeat that creating a business case for zero trust made them realize how limited their visibility and control over endpoints are. CISOs and their teams find endpoints overcrowded with software agents, leaving them more vulnerable than before.
Security
Computerworld - Video vs. VR: What’s missing for successful collaboration? 
Being able to tell whether you are losing your audience, preloading the system so it can respond to questions, and providing a report at the end of a meeting to show engagement (and assure attendees leave satisfied) should be a higher priority than it is. Thankfully, options to do all of these are coming.
Automation & Productivity
Harvard Business Review - Research: Why Employees Violate Cybersecurity Policies
We found that across our sample, adherence to security conventions was intermittent. During the 10 workdays we studied, 67% of the participants reported failing to fully adhere to cybersecurity policies at least once, with an average failure-to-comply rate of once out of every 20 job tasks
Privacy & Security
Virtualization & Cloud Review - Zero Trust Study Shows Gaps Remain
Along with implementation gaps, enterprises report several challenges in building a Zero Trust strategy, starting with a lack of qualified vendors with a complete solution.
Security
Enterprise Talk - Cloud Trends to Look Out For In 2022
Analysts estimate only 15% of IT spend is in the cloud, but 90% of businesses have implemented cloud systems. The mismatch highlights how much room there is for growth, especially around core app modernization.
Cloud
Forbes - Five Fraud And Security Predictions For 2022
Credential stuffing, whereby attackers use automation to try different usernames and passwords at scale in order to break into accounts, saw massive increases in 2021. Expect that to continue. The Arkose Labs network detected a 98% increase in credential stuffing attacks over the past 12 months
Privacy & Security
The Fast Mode - Cato Networks' Survey Finds Gaps in Different SASE Approaches
Despite SASE being touted as the solution for security and network performance, respondent scores differed little between those who have and have not deployed SASE. For example, when asked how they react to performance issues with cloud applications, 67% of SASE users and 61% of non-SASE users claimed they would add bandwidth while 19% of SASE users and 21% of non-SASE users would purchase WAN optimization appliances.
IT Management
Data Center Dynamics - Concerns over cloud concentration risk grow
Our research shows that cloud providers have high levels of reliability, but they are not immune to failure. Complex backup regimes and availability zones, supported by load and traffic management, improve the resiliency and responsiveness of cloud providers, but they also come with their own problems.
Cloud
Inside Bitcoins - Chainalysis exposes simple malware stealing millions in crypto
The Chainalysis report looked into different malware, including information stealers, clippers, cryptojackers and trojans. These types of malware are cheap to acquire, and they can even be deployed by “low-skilled cybercriminals.
Security
yahoo!Finance - Time & Attendance Software Market to Reach $5.31 Bn, Globally, by 2030 at 9.4% CAGR: Allied Market Research
On the basis of component, the software segment held the major share in 2020, garnering nearly two-thirds of the global time & attendance software market. This is attributed to the factors such as need for automated system for optimizing and tracking the number of work hours of an employee, rising shift toward cloud based time and attendance software among the SMEs, and growing emphasis on workforce optimization as well as mobile applications
Automation & Productivity
Making Central Bank Digital Currencies bulletproof with business process intelligence
Business process intelligence provides end-to-end capabilities for strategic process transformation and the reinvention of customer experiences. Essentially, when it comes to CBDCs, the implementation of BPI would allow the analysis of each of the process gaps (scalability, security, regulatory requirements) based on real-time data.
Data & Analytics
Onapsis - The Elephant Beetle in the Room: Older, Unpatched SAP Vulnerabilities Are Still A Threat
The Onapsis Research Labs’ very own threat research found evidence of hundreds of hands-on-keyboard sessions targeting vulnerable SAP systems, including examples of threat actors living off the land, chaining multiple vulnerabilities together, and even applying patches, post-exploitation, to cover their tracks.
Security
TechBullion - Security predictions – Will this be the year trust dies?
Between remote working and the Internet of Things, edge computing is an area in rapid development. That means edge security will need an accordingly high degree of attention in 2022 – especially given the inherent risks. IoT devices are notoriously vulnerable (thanks to providers that may not have much experience with cybersecurity, and to supply chain issues), as is the home office environment.
Security
TMCNET - Cisco's Kenna Security Research Shows the Relative Likelihood of An Organization Being Exploited
The research conducted by Kenna Security, now part of Cisco and a market-leader in risk-based vulnerability management, and the Cyentia Institute, shows that properly prioritizing vulnerabilities to fix is more effective than increasing an organizations' capacity to patch them, but having both can achieve a 29 times reduction in an organizations' measured exploitability.
Security
TechRepublic - Deloitte: What to expect with cloud computing, the supply chain and sustainability for 2022
Deloitte found in the report that many industries are shifting to a service-based IT process via the cloud with some utilizing a hybrid-, multicloud focus to optimize important aspects of a business, like costs and optimizing organizational structure and compliance
Tech Trends
RTInsights - Flexibility and Scale Foremost in Cloud SIEM
The survey found a sharp increase in those using managed services—25% of respondents as opposed to just 6% from the 2020 survey. Cloud SIEM creates a highly accessible and flexible set of services to meet clients where they are while ensuring that security operations remain at peak proficiency.
Cloud Security
Slator - For Dataset Creation, Humans Should Evaluate Machine Text — New Research
The researchers believe their new system “brings together the generative strength of language models and the evaluative strength of humans” — perhaps in a way reminiscent of recent trends observed in MT, in which an MT model tackles the source text in a first round of translation and human linguists then refine the output via post-editing.
NLP
Forbes - Cybersecurity Trends To Watch Out For In 2022
As software has not adequately stopped hackers, perhaps the leading trend to watch in 2022 is a shift away from legacy applications and toward a more holistic and comprehensive security network that prioritizes hardware as the cornerstone of anticybercrime action.
Security
Intelligent CISO - Editor’s Question: How much of a concern is protecting critical infrastructure and how should organisations go about doing this pragmatically?
“The vulnerability of critical infrastructure is well known. Its operational networks have traditionally been unreachable – or air-gapped – from IT users and the outside Internet, meaning security is not top of mind within their design. However, the proliferation of Digital Transformation and automated processes mean they can now easily be accessed by remote users and applications directly through Wi-Fi, cellular or local area networks."
Security
SDxCentral - Op-Ed: Mid-Band 5G Meets American Incompetence
Even more frustrating is the lack of seriousness given to this matter in the years leading up to, throughout, and the year following the FCC’s auction of C-band spectrum. The FAA didn’t even start cataloging and requesting tests of the altimeters used by aircraft around the country until the C-band was supposed to be ready and clear for Verizon and AT&T to activate 5G service.
5G
VentureBeat - 5 ways AI and ML will improve cybersecurity in 2022
Using AI and ML to lure attackers into simulated environments to analyze their attack strategies, components, and code needs to start at the transaction level. Transaction fraud detection is one of five core areas where AI and ML can improve cybersecurity this yea
Security
AiThority - Cynerio Research Finds Critical Medical Device Risks Continue to Threaten Hospital Security and Patient Safety
Data shows that 53% of connected medical devices and other IoT devices in hospitals have a known critical vulnerability. Additionally, a third of bedside healthcare IoT devices – which patients most depend on for optimal health outcomes – have an identified critical risk.
Security
Diginomica - Manage permissions to keep applications safe and secure in the cloud
Yet, when set up properly, no application environment can be made safer than that of a public cloud provider. Often, when there is a security breach such as these, the problem was improper use of credentials — an employee had more access than they needed to do their job, an overzealous engineer took advantage of their access to scrape customer data, a file was accidentally exposed publicly.
Cloud Security
VentureBeat - Tips and guidelines for making software applications GDPR compliant
Developing GDPR-compliant software app can be a challenging task, particularly when it comes to implementing necessary data protection measures at every stage of SDLC that involves processing users’ personal data
Data Privacy
KPMG - Predictions for 2022 — a world of change, creative criminality and cyber security community
The Digital Operational Resilience Act and Network Information Systems Directive version two will hit the streets in Europe as regulators focus on the resilience of a very different world of digital infrastructure — and the systemic risks that come with that dependency. We will also see digital infrastructure fail in surprising ways, exposing links and connections between systems we didn’t know existed.
Security
TMCNET - To Err Is Human, and That's What Hackers Are Counting On
In just the past year, 36% of companies suffered a serious cloud security leak or breach due to cloud misconfiguration, according to The State of Cloud Security 2021 Report. Gartner expects that through 2023, at least 99% of cloud security failures will be the customer's fault, mainly in the form of cloud resource misconfiguration
Security
ZDNet - Automation could make 12 million jobs redundant. Here's who's most at risk
The tech analyst's latest Future of Jobs Forecast estimates that as many as 12 million jobs could be lost to automation across Europe by 2040, primarily impacting workers in industries such as retail, food services, and leisure and hospitality.
Automation & Productivity
Digital Journal - Employee Surveillance and Monitoring Software Market is Booming Worldwide | Teramind, Microsoft, Hubstaff
Further, its time tracking feature allows employers to gain insight into time spent on each project, client, or task and allocate tasks based on priority. The high growth of mobile applications for employee monitoring due to the increased adoption of mobile devices will create significant opportunities for the market.
Automation & Productivity
American City & County - Data protection, cloud advancement and containerization: 2022 state and local priorities
However, a new focus will be on modernization, including moving systems to the cloud, utilizing containerization and understanding how to sustain technology systems for years to come.
Cloud
VentureBeat - Report: U.S. is top target of phishing attacks worldwide
The Jan. 19 report from Outseer also found that the U.S. was the top hosting country for phishing attacks, accounting for 73% of internet service providers hosting these types of attacks.
Privacy & Security
TechTarget - 3 areas privacy and cybersecurity teams should collaborate
Given this common focus, leaders and practitioners of cybersecurity and privacy programs have a tremendous opportunity to work together. Let's look at three different ways: building a shared data inventory, collaborating on compliance and cross-populating steering committees.
Privacy & Security
VentureBeat - Report: 92% of IT decision-makers think process automation is ‘vital’
However, the survey also shows the fact that organizations continue to face challenges in their efforts to leverage process automation to its full potential. Just 12% of respondents say they’ve been implementing process automation as planned this year, citing a reliance on outmoded technology, lack of knowledge of how to get started, and confusion over industry terms such as hyperautomation and robotic process automation (RPA).
Automation & Productivity
The European Sting - The world is drowning in data. Why don’t we trade it like on a stock exchange?
The digital revolution is flooding the world with data. By 2025, an astounding 175 zettabytes – that’s 175 trillion gigabytes – of new data is expected to be generated annually, a fivefold increase on 2018. Much of that data will end up sitting idle on servers and hard drives –unused, unanalyzed, and, perhaps worst of all, unshared.
Data & Analytics
RS21 - 3 Trends to Improve Diversity, Equity, and Inclusion in Tech
With that in mind, here’s a look at three trends, led by nonprofits, for improving tech equity: (1) closing the tech talent gap; (2) mitigating bias; and (3) building professional networks.
Tech Trends
Industry Wired - How AI is Transforming Businesses? Top Use Of AI in Business
AI helps businesses to decide what to write about, which keywords to use, how often to publish, etc. In other words, AI can help to create high-quality and high-ranking content
Artificial Intelligence
Tom's Guide - What is C-Band 5G and why is it so controversial?
Even now, with the launch of C-Band-based 5G imminent, AT&T and Verizon have both agreed to dial back their launches by not activating the new service on towers near select airports. Even so, it's an issue dividing wireless carriers and airlines, even pitting government agencies against one another.
5G
Embedded - Trends driving the future of high-performance computing (HPC)
The amount of data that will be processed next year will increase exponentially, and so will the value and sensitivity of that data. Making sure that security is an essential component (rather than an afterthought) when designing for HPC components will be one of the top design challenges that engineers will face this year and every year moving forward.
Automation & Productivity
CSO - How to Best Protect Multi-cloud and Hybrid Environments
This inconsistency is impossible to avoid. Security controls (WAF, DDoS, bot management, API protection, etc.) are unique to each environment. So as customers attempt to reduce risk, improve performance, or gain specific features by spreading their workloads across multiple clouds, they’ll inevitably end up with multiple security solutions, increasing the likelihood of misconfiguration and mismanagement — a leading cause of compromised data
Cloud Security
Science Daily - Edge processing research takes discovery closer to use in artificial intelligence networks
This is an important step towards using thin-film transistors as artificial intelligence hardware and moves edge computing forward, with the prospect of reducing power needs and improving efficiency, rather than relying solely on computer chips.
Artificial Intelligence
Analytics Insight -Which Is More Appropriate For You: Data Scientist, Data Analyst or Data Engineer?
On the backend, the data engineer is always improving analytics solutions to guarantee that the data the company relies on is accurate and readily available. They’ll use a variety of technologies to guarantee that the data is managed appropriately and that the relevant information is available to anybody who needs it. A good data engineer saves the rest of the company a lot of time and effort.
Data & Analytics
HERE360 - Is 2022 the year urban mobility takes flight?
As we entered 2022, Chinese search provider Baidu launched XiRang, an app that gives access to a "Creator City" that contains visitor attractions and buildings that can host meetings and events. Baidu's CEO Robin Li says the metaverse will kick off a “golden era of AI over the next ten years" and the start of “man-computer symbiosis." It looks like virtual meetings could become more intriguing in 2022 and beyond.Smart Cities
Tech Xplore - Artificial intelligence can discriminate on the basis of race and gender, and also age
AI is often assumed to be more objective than humans. In reality, however, AI algorithms make decisions based on human-annotated data, which can be biased and exclusionary. Current research on bias in AI focuses mainly on gender and race. But what about age-related bias—can AI be ageist?
Artificial Intelligence
AiThority - Zylo’s SaaS Management Index Reveals Organizations Only Utilize 60% of SaaS Licenses, Leaving 40% Unused
Ownership of SaaS is shifting. IT teams are directly managing less of an organization’s SaaS – just 23% of the average company’s SaaS portfolio – a 35% reduction from last year – while business units are managing more.
IT Management
Cox Business - 9 Top Technology Trends for CIOs and IT Leaders to Consider to Future-proof Their Business
Gartner forecasts that “cloud-native platforms (CNPs) will serve as the foundation for more than 95% of new digital initiatives by 2025 — up from less than 40% in 2021.” Leaders at organizations that aren’t as far in their digital efforts as others will need to complete an assessment, prioritize cloud environments, and decide where to start.IT Management
Developer - Why empowering ‘knowledge workers’ is critical to business success
Give in-the-field workers mobile devices, so they can access critical information without returning to a desktop computer. Move company-wide applications to the cloud so workers can access them from anywhere. Embed existing business applications with insights from data, so professionals can make smarter decisions without turning to additional dashboards and data portals.
Automation & Productivity
SiliconANGLE - Gartner says tech spending to grow 5% to $4.5 trillion in 2022 
Through 2025, Gartner believes most companies will increase their reliance on external consultants amid greater urgency and an accelerated pace of change that widens the gap between their digital business ambitions and their internal capabilities.
IT Management
VentureBeat - 5 considerations for saving more and wasting less on cloud services
There are close to 100,000 EC2 instance types that can be used to host your application, and for each of those there are over 36 different commitment types that can be applied to them. That’s just in EC2 alone (not to mention other hosting options like serverless). Now imagine adding other managed services from AWS, and from other cloud providers such as GCP and Azure, with their own unique options and commitment structures.
Cloud
Bloomberg - Five Reasons Microsoft Is Making Activision Blizzard Its Biggest Deal Ever
Nadella’s corporate strategy has been coalescing around cloud, content and creators. Microsoft wants to get as much of Activision’s past and future content onto its cloud gaming service, Xbox Game Pass, which has been bolstering the software maker’s sales with a steady stream of subscription revenue.
Gaming
The Verge - A new use for AI: summarizing scientific research for seven-year-olds
But the deployment of these AI-language systems is controversial. Time and time again, it’s been shown that these tools encode and amplify harmful language based on their training data (which is usually just vast volumes of text scraped off the internet)
Artificial Intelligence
Manufacturing Global - Top 10 blockchain companies
Getting a blockchain headache? Here's our top 10 blockchain businesses to support your business
Blockchain
VentureBeat - Report: How AI and ML optimize the diagnosis process in health care
For example, ML helps oncologists not only pinpoint the location of a tumor, but can also accurately determine if it’s malignant or benign in milliseconds. Although computer-based predictions aren’t error-free, new research has indicated that its accuracy of classification hovers around 88%.
AI/ML
TechRepublic - 5 tools helping companies more effectively manage cybersecurity in 2022
Cybercrime is on the rise, with no signs of slowing down. Recent findings show a 358% increase in malware activity. Further, each day, the AV-TEST Institute registers over 450,000 new malicious programs and potentially unwanted applications, with new malware cropping up at an alarming rate
Security
ZDNet - The future of money: Where blockchain and cryptocurrency will take us next
The first thing to remember: Bitcoin and blockchain are not synonymous. Blockchain -- often defined as a shared, immutable ledger that securely links blocks of encrypted data transactions in a network -- is the medium for recording and storing Bitcoin transactions. Bitcoin operates on its own blockchain network.
Blockchain
AiThority - Oosto Open Letter To The White House “Facial Biometrics Regulations Will Enable A Safe Path For Organizations To Ethically Adopt These Emerging Technologies”
The White House OSTP is seeking input on any “past deployments, proposals, pilots or trials,” as well as any “current use of biometric technologies for…identity verification, identification of individuals, and inference of attributes including individual mental and emotional states,” according to the RFI.
Facial Recognition
DevPro Journal - Why Businesses Are Transitioning to Multicloud Strategies
The more of these services that a user consumes from a provider, the greater the lock-in to that vendor and the more difficult portability becomes. Regardless, the concept of vendor neutrality influences many multicloud strategies.
Cloud
Datanami - New Study Reveals 78 Percent of Companies Cite AI as a Key Revenue Driver in 2022
Three-quarters of respondents (75%) say improving access to deep learning is important for innovation within their industry. Organizations are exploring deep learning applications with natural language processing (NLP) (81%), computer vision (61%) and recommendation algorithms (55%).
Artificial Intelligence
Inside Big Data - How AI and ML technologies are Streamlining Language Creation and Impacting the Global Economy
There are some AI and ML driven ASR platforms available that combine speech recognition and authentication capabilities (i.e., voice biometrics) to amplify the speed and effectiveness of voice-enabled services. This type of technology can understand what your users are saying as well as identify and authenticate who is speaking.
Automation & Productivity
Bitcoin Magazine - Opinion: What The World Learned About Bitcoin in 2021
Tech products — software — must constantly change, update and upgrade to keep up with competition. Bitcoin is not typical software. Rather, it is something new: permaware. Permaware is a set of unchanging rules, written in code. It is designed for reliability and consistency, not features.
Emerging Tech
Blocks & Files - Spin orbits could make better MRAM
Magneto-Resistive Random Access Memory (MRAM) has so far generally failed to replace SRAM because its Spin Transfer Torque (STT-MRAM) implementation is too slow and doesn’t last long enough. A new variant — Spin Orbit Transfer MRAM (SOT-MRAM) — promises to be faster, have a longer life and use less power.
Data Storage
The Tech Report - Security Technology: Rising to the Cyber-Challenge
Privacy-enhancing computation is a developing body of encryption, data obfuscation, and privacy technologies. It’s aimed at securing data as it’s crunched. In addition, its design allows it to deal with particularly difficult scenarios. It tackles the times such as when there is data sharing across geographic boundaries, brand lines, or corporate divisions.
Privacy & Security
Information Age - Is AI superintelligence a threat to humanity?
“My concern, and what's the worst that could happen, is that long-term challenge about an artificial intelligence that does outstrip us; presumably at that point, overcoming the sorts of biases, but potentially creating much more catastrophic risks for the species,” he says.
Artificial Intelligence
T_HQ - Deny-by-default stops cyber threats from the get-go
Whitelisting is when only those in the approved list are allowed access to the system, and is the ultimate version of zero trust. Any and everything not on the whitelist is automatically blocked. ThreatLocker is like a bouncer; it won’t allow entry if not on the whitelist regardless of the entity’s friend or foe status.
Security
ComputerWorld - UK government ignites debate over privacy vs. safety
The report also explains that the UK government doesn’t seem to want to address the privacy-versus-security debate. Instead, it simply seeks to inflame reaction with an emotive campaign that raises public support for such a move while utterly ignoring the multitude of arguments against it.
Privacy & Security
Threatpost - Organizations Face a ‘Losing Battle’ Against Vulnerabilities
Cross-site scripting (XSS), an exploit where the attacker injects code into a legitimate website that will execute when the victim loads the website, was the most commonly identified vulnerability type last year, according to the report.
Security
VentureBeat - 4 emerging trends point to changes in the observability landscape in 2022
According to a recent report from New Relic, 90% of IT leaders and engineers claim that observability is critical to the success of their business, with 94% stating that it’s critical to their role
Data & Analytics
SiliconANGLE - Cybersecurity, blockchain and NFTs meet the metaverse
"Really one of the biggest things that organizations face is being able to have engineers that are qualified and technical enough to be able to support the complexity of the architecture. Deploying tools effectively is a good thing. But if it’s not tuned properly or if it’s not connected properly, that security tool can just add more attack vectors."
Emerging Tech
SDxCentral - Nutanix Report: 64% of Orgs Will Adopt Multi-Cloud Within 3 Years
Despite more organizations moving toward multi-cloud, challenges remain in navigating the environment. Managing security, data integration, and cost across cloud borders were among the top multi-cloud challenges cited by respondents.
Cloud
VentureBeat - New startup shows how emotion-detecting AI is intrinsically problematic
It’s not just startups that are investing in emotion AI. In 2016, Apple acquired Emotient, a San Diego firm working on AI algorithms that analyze facial expressions. Amazon’s Alexa apologizes and asks for clarification when it detects frustration in a user’s voice.
Artificial Intelligence
Network World - Zero Trust is hard but worth it
I asked my contact how many applications an average worker could access, and the company wasn’t able to get the answer. How, then, could the company know if the worker, or someone working through the worker’s laptop, was stealing data or contaminating operations?
Security
AiThority - Gaming Predictions Series 2022: Welcome Metaverse. NFTs Will Get Hyped in Gaming
The metaverse has not unseated Al and blockchain – rather, it’s an emerging technology that CEOs will need to pay attention to. Whereas five years ago CEOs did not necessarily know how they were going to integrate AI or blockchain into their businesses, there are now much more specific real-world examples of how they can do so. Now is the time for CEOs to be thinking about the metaverse in that same way – what applications will it have for their business in the future?
Emerging Tech
Blocks & Files - Hyve: busy hyperscaler bees buy hardware, not software
“The way edge computing changes storage requirements is that hotswap of SSDs has come back. Hotswap — or at least easy field servicing — has come back as a definite requirement.” Shenoy thinks that “Edge computing driving different form factors of servers is a given.”
Data Storage
ZDNet - The tech jobs boom is beginning to cool. And employers are changing their hiring tactics
This might suggest that the boom in demand for tech workers prompted by the pandemic is beginning to wane, with KPMG and REC finding that businesses are focusing their efforts on "hiring smarter, not faster".
Tech Jobs
VentureBeat - Device42 aims to identify Log4j vulnerabilities
The Log4j vulnerability has been assessed as a critical threat, or a 10, on the Common Vulnerability Scoring System (CVSS) by the National Vulnerability Database (NVD). CVSS is an open framework for communicating the characteristics and severity of software vulnerabilities.
Security
SiliconANGLE - What to do in ’22: six cloud trends for the year ahead 
Cloud services are not commodities; your multicloud architecture must capture the unique strengths of each provider. You don’t want to end up with least-common-denominator functionality across clouds. And you can’t expect any one tool to provide seamless governance, monitoring, asset tracking and security across clouds.
Cloud
VentureBeat - Data users demand simple actionable insights quickly 
These are exciting times for us data professionals. Unfortunately, I fear we are getting caught up in the tools hype. We are continuing to push more and more numbers, charts, and tables to our users. That is precisely the problem. We are not offering directions on what to do. Per Dell’s study, “Data overload has become a significant barrier to transformation”.
Data & Analytics
ZDNet - DHL, Microsoft, WhatsApp top phishing list of most imitated brands
The rest of the list includes LinkedIn, Amazon, FedEx, Roblox, PayPal and Apple. Omer Dembinsky, data research group manager at Check Point Software, said it is important to remember that cybercriminals are opportunists and will often take advantage of consumer trends by imitating popular brands.
Privacy & Security
eWeek - BI Tools 2022: Best Business Intelligence Software
Today’s systems span clouds and tap on-premises data sources, and work alongside data mining tools. They also rely on APIs to extend analytics capabilities across business partners and supply chains. Some platforms are also designed to pull data from edge computing deployments, and many platforms also include open-source tools and components that make them more flexible and adaptable.
Data & Analytics
ComputerWorld - 20 years after Gates’ call for trustworthy computing, we’re still not there
But for businesses, this month’s updates deliver a confusing and murky story. Microsoft has not exactly been a good trustworthy computing partner this month. Rather taking the past two decades to develop  bullet-proof, resilient systems, we get servers going into boot loops and admins having to boot into DOS  mode and run commands to uninstall updates.
Security
Security Intelligence - Everything You Need To Know About Ransomware Attacks and Gangs In 2022
These ransomware kits are sold on the dark web as a service, much like the Software-as-a-Service (SaaS) model. Ransomware-as-a-Service kits provide criminals the opportunity to launch ransomware attacks with minimal technical knowledge. No malware creation skills? No problem.
Security
ComputerWorld - In IT, Boomers are out, raises are rising — and change is coming
Another trend Gartner has tracked involves CIOs and other high-level IT leaders moving out of data center-specific roles and into larger business-centric job titles as the result of digital transformation (DX) initiatives.
Tech Jobs
Forbes - The High-Stakes Game Of Public Sector Cybersecurity
Modernizing IT platforms is a major priority for governments—cited as one of the main steps being taken to improve citizen and employee experiences (53%) and to make operations more resilient (48%), according to research from ThoughtLab, commissioned by ServiceNow.
Security
TMCNET - Global Data Governance Market Report 2022: Market to Reach $6 Billion by 2026 - Data Governance to Play a Pivotal Role Buoyed by Machine Learning and AI
The deluge of data from various sources and the valuable insights than can be gleaned from such data is pushing businesses to opt for advanced IT systems, which is driving the demand for data governance solutions. In addition, risk management and regulatory compliance are also driving the growth of data governance solutions.
Data Governance
yahoo!Finance - Global Artificial Intelligence (AI) in Call Centers Market to Reach US$3.5 Billion by the Year 2026
Developed markets of North America and Europe are the leading regional markets. The dominant share of the US is mainly attributed to the widespread adoption of AI technology in several end-use industries including media, e-commerce and manufacturing.
Artificial Intelligence
VentureBeat - Responsible AI will give you a competitive advantage
Without responsible AI practices in place, a company is exposed to serious financial, reputational, and  legal risks. On the positive side, responsible AI practices are becoming prerequisites to even bidding on certain contracts, especially when governments are involved; a well-executed strategy will greatly help in winning those bids.
Artificial Intelligence
eWeek - What Is Data Visualization? Benefits, Types & Best Practices
Datasets are growing fast. Forget data analytics – business leaders are struggling just to visualize and map out data to begin with. Data visualization works to fix this.
Data & Analytics
World Economic Forum - Can China and Europe find common ground on AI ethics?
 A shared realisation about their societal implications has raised awareness about the necessity to develop an international framework for the governance of AI, more than 160 documents aim to contribute by proposing ethical principles and guidelines.
Artificial Intelligence
VentureBeat - What to expect for data prep and data analytics in 2022 
In fact, researchers estimate that the Data Preparation Tools Market size will grow at a CAGR of over 20% to reach a total value of $13.15 billion by 2028, with organizations having a range of accessible data analytics providers to choose from, such as Alteryx, IBM Watson Studio, TIMi Suite, and Incorta.
Data & Analytics
TMCNET - Artificial Intelligence Platforms Market to grow by USD 17.29 bn | Evolving Opportunities with Alphabet Inc., Amazon.com Inc. & Microsoft Corp. | 17000+ Technavio Reports
The key factor driving growth in the artificial intelligence platforms market is the rise in demand for AI-based solutions. With the increasing application of robotics in repetitive and risky tasks, end-users are increasingly seeking avenues to eliminate the drawbacks of industrial automation and robotic technologies.
Artificial Intelligence
AiThority - Adopting a Search-First Mindset for Digital Marketing Success
But according to Hubspot research, 75% of people who carry out Google searches never reach the second results page. Ensuring your website is optimized to rank at the top of search engine results is an essential step for growth and, as such, should be a prioritized endeavor for all manner of businesses. 
Marketing Tech
VentureBeat - A deep dive into the visual collaboration market
The market includes a mixture of cloud and web-based collaboration tools, from online collaboration whiteboard tools like Miro, Mural, and Stormboard to visual management systems like iObeya.
Automation & Productivity
The Verge - Why you might want a secure file-sharing service now that you’re working from home
Instead, you should consider an enterprise-grade cloud-based file-sharing service, one that adds more layers of protection by encrypting your data, and that has fine-tuned access control. Egnyte, SecureDocs, ShareFile, and SugarSync are just a few of the more popular services
Automation & Productivity
eWeek - 5 Steps to Leveraging Machine Learning: The Shopify Use Case
The company has been at the forefront of ML adoption for anomaly detection and forecasting. That’s particularly impressive when considering that up to 85% of machine learning projects ultimately fail to deliver on initial promises and goals.
Machine Learning
VentureBeat - The metaverse will be buzzing in 2022
Grossman noted that AI, VR, AR, 5G, and blockchain may converge to power the metaverse — adding that the sum will be far greater than the parts in that convergence.
Emerging Tech
Datanami - IEEE Computer Society Unveils Its 2022 Technology Predictions
The top three tech trends that are anticipated to dominate in 2022 are datacentric AI, remote medicine, and health, safety, and wearable biomedical technologies.
Tech Trends
SiliconANGLE - Watch live: Companies to shed new light on latest cloud-native trends during AWS Startup Showcase Jan. 26 
The latest trends in the cloud native, open-source enterprise computing space will be a central focus for Season 2 Episode 1 of the upcoming AWS Startup Showcase: Open Cloud Innovations, scheduled to air on Jan. 26
Cloud
CompTIA - All the Cybersecurity Statistics, Figures and Facts You Need to Know in 2022 
Check out the following cybersecurity facts and statistics to understand the threat landscape for businesses.
Security
Datanami - New IDC Spending Guide Forecasts Double-Digit Growth for Investments in Edge Computing
IDC has identified more than 150 use cases for edge computing across various industries and domains. The two edge use cases that will see the largest investments in 2022 – content delivery networks and virtual network functions – are both foundational to service providers’ edge services offerings.
Edge Computing
CompTIA - Top 7 challenges IT leaders will face in 2022
“Very technically skilled workers who have experience with cloud environments, machine learning, data science, and software have always been in demand at tech companies, but now those skills are in demand at nearly every company, creating greater competition to land top-notch developers, software engineers, and data analysts,”
IT Management
Microsoft - 4 Approaches To Comprehensive Security That Help Leaders Be Fearless
According to the report, only 31 percent of organizations that reported being ahead with their Zero Trust implementation were impacted by NOBELIUM, the perpetrators of the SolarWinds attack.2 Compare that to the 75 percent negatively affected by this devastating cyberattack that reported lagging behind in their Zero Trust implementation.
Security
Digital Insurance - How AI, data analytics could help identify insurance fraud
AI does this by providing a fully transparent view of the customer, their claim and their network. This view then lets decision-makers automate, build and understand the timeline of events leading to a claim
Artificial Intelligence
TMCNet - Artificial Intelligence Platforms Market to grow by USD 17.29 bn | Evolving Opportunities with Alphabet Inc., Amazon.com Inc. & Microsoft Corp. | 17000+ Technavio Reports
68% of the growth will originate from North America for the artificial intelligence platforms market. The US is the key market for artificial intelligence platforms market in North America. The US and Canada together hold approximately 26% of all global AI-related patent applications, while IBM has the largest share of AI-related patents, followed by Microsoft and Google
Artificial Intelligence
The Fast Mode - Telcos Are Stepping Outside of Their Comfort Zone
Already this year, observers noticed that telcos redefined themselves, pivoting from telecom companies to tech companies. Telcos are no longer just connectivity providers and have become more tech-co focused. Having put a large amount of their investment and budgets in maintaining and developing IT systems, they want to be major IT players and software developers.
Telecom
CSO - Top cybersecurity M&A deals for 2022
Last year saw some companies that are not primarily in the cybersecurity market buy security firms to better protect their data and customers.
Security
Netwrix - Cybersecurity: What To Expect In 2022
Moreover, attacks are getting more expensive, with the average ransomware payment leaping from US$312,000 in 2020 to $570,000 in 2021. By 2031, there will be a new assault every 2 seconds and ransomware costs will reach $265 billion per year.
Security
VentureBeat - Report: Majority of malware downloads in 2021 were traced to cloud apps
The top source of credential attacks in 2020 were a few heavy hitters responsible for numerous login attempts. In 2021, however, credential attacks came from a much larger number of sources, each responsible for fewer login attempts.
Security
AiThority - 3 Data Trends Expected to Impact Marketers in 2022
This method can also use data to determine which keywords, ads, ad groups, and campaigns have the most impact on reaching your business goals. Data-driven attribution may help close the gaps made by third-party cookie losses and bring data to the forefront.
Data & Analytics
Network World - IoT in 2022: IoT turns into a service
“What’s really raised its head in 2021 and I think is going to be the dominant trend is much more closed business applications,” he said. “We saw a bunch of companies roll out strategies that prohibit selling the IoT platform on its own. They now sell the application, plus IoT.”
IoT/Mobility
SDxCentral - VMware, Nutanix Continue to Battle for HCI Market Dominance
Additionally, Huawei, Cisco, and Hewlett Packard Enterprise (HPE) made the top 5 HCI software vendor list. However, Cisco and HPE’s HCI revenue declined during the quarter. Cisco accounted for 4.4% of the HCI market, and its revenue dropped 14% year over year to $104 million. Meanwhile HPE’s revenue decreased 7.7% to $82 million in the third quarter of last year.
Data Storage
ZDNet - The shocking reason people are quitting tech companies (No, it's not money)
You might be desperate for a more exact definition of toxicity. Well, these researchers indicated "failure to promote diversity, equity, and inclusion; workers feeling disrespected; and unethical behavior."
Tech Jobs
VentureBeat - How Moveworks used Conversational AI to support hybrid work
A recent survey conducted by Replicant found that nearly 80% of consumers are willing to speak with conversational AI. Gartner predicts that enterprise-level chatbot implementation will see over a 100% increase in the next two to five years
Artificial Intelligence
SDxCentral - CNCF Report: Serverless Loses Steam, Goes Off Edge
The number of developers working on serverless architectures is slipping, according to a survey of more than 19,000 software developers conducted by SlashData and released by the CNCF. The report found the number of serverless developers — reportedly four million strong — declined from 27% of all developers in 2020 to 24% in 2021.
Tech Trends
Datanami - New Report Finds Self-Service Analytics Are Critical to Empowering Frontline Workers
A previous report by HBR found that 86% of business executives said frontline workers at their organization need better technology to make data-driven decisions, and named self-service analytics as a top technology they would adopt by 2022 to make this happen.
Data & Analytics
ZDNet - The race towards renewable energy is creating new cybersecurity risks
There are two key security issues in SCADA systems – the first is that many of these networks are old, sometimes to the extent they can't receive security updates, which means that if they're linked to internet-facing areas of the network, they can potentially be infiltrated by cyber criminals.
Security
Techstartups - Venture capitalists pumped over $675 billion into tech startups worldwide in 2021, doubling the previous record set in 2020
In San Francisco alone, some 133 startups saw their valuations climb to over $1 billion, followed by 69 in New York, 21 in Greater Boston, 20 in London, 16 in Bengaluru, and 15 in Berlin
Tech Startups
AiThority - The Rise of PPC Automation: Everything You Need to Know

In short, PPC automation is how we define the use of technology and machine learning to optimize your search engine marketing (SEM). Online search engines are being used more than ever before, and with 87% f smartphone wners using a search engine at least once a day, optimizing your SEM has never been more important. 

Automation & Productivity
TechTarget - Enterprise data storage 2021 Products of the Year finalists
Several trends stand out among the five categories of finalists this year, including protection against cyber attacks in backup products, a focus on the cloud and its integration across the board, and support for newer technologies such as containers.
Data Storage
Digital Information World - These Trends Are Revolutionizing The Technology World
Technology is vast and varied, and there are specific kinds of tech that might be a great deal more life changing than others. We are going to discuss ten of the most prominent tech trends out there right now that are liable to change the world as we know it through their innovation.
Tech Trends
Telus International - Forbes: Out Of The Shadows: Managing Shadow IT And Rogue RPA
These instances of unauthorized software deployed by teams outside the central IT department are known as shadow IT. This is a common issue that most companies encounter, and cases of it have grown exponentially in recent years with the adoption of cloud-based applications and services. In fact, research from McAfee previously showed that 80% of workers admit to having used SaaS applications without getting proper authorization.
IT Management
yahoo!finance - Europe’s Spending on IT, Business Services Hits Record in 2021, Amid Signs of Slowing Demand in Q4, ISG Index™ Finds
Managed services climbed 11 percent, to US $13.9 billion—its highest level in a decade—including a record US $11.4 billion for IT outsourcing (ITO), up 5 percent, and US $2.6 billion for business process outsourcing (BPO), up 45 percent. XaaS soared 41 percent, to a record US $12.6 billion, on 44 percent growth in infrastructure-as-a-service (IaaS), to a record US $9.2 billion, and 33 percent growth in software-as-a-service (SaaS), to a record US $3.4 billion.
IT Management
SecurityWeek - With the 'Great Resignation' Comes the 'Great Exfiltration'
It’s a double whammy for business – not only are they losing staff, but the leavers are taking corporate data with them. In the final 30 days of employment, leavers have been downloading far more data than usual. During this period, 29% of leavers downloaded more data, and 15% uploaded more data to personal cloud apps.
Security
IndustryWired - Dell Technologies: Cloud Security, AI, Risk management will be key trends for Data Protection in 2022
The recent Dell Technologies 2021 Global Data Protection Index highlights that 70% of respondents in India believe emerging technologies—such as cloud-native applications, Kubernetes containers, AI, and machine learning pose a risk to data protection, and the lack of data protection solutions for newer technologies is one of the top three data protection challenges for organizations.
Data Management
American City & County - Report: Cyber threats are on the rise while public defense measures lag
At 56 percent, the report says, “the general hacking community” is behind most of the security threats faced by public sector servers, closely followed by “careless/untrained insiders” (52 percent) and “foreign governments” at 47 percent. This is the first time in five years careless insiders weren’t the top security threat.
Security
AiThority - GSV Announces GSV EdTech 150, Top Companies In Digital Learning
North America — specifically the United States — is the most represented region accounting for 56% of the GSV EdTech 150. 11% of the GSV EdTech 150 hail from India, whose market is experiencing explosive growth with five EdTech unicorns that include BYJU’s, Eruditus, Unacademy, Upgrad, and Vedantu.
EDTech
SC Media - Why file-borne malware has become the weapon of choice for attackers
Today, sophisticated cybercriminals research their targets and develop specialized malicious code that’s likely to do the most damage or bring in the most money. In fact, SonicWall reported more than 260,000 “never-before-seen” malware variants in 2020. Known as zero-day attacks, this type of hidden malware increased by 74% from 2019, possibly because zero-days are most likely to escape detection by traditional antivirus solutions.Security
VentureBeat - How managed services will evolve in 2022: The data analytics revolution
In 2022, cloud-managed service providers are not only looking to support decision-makers in configuring and maintaining cloud environments, but also providing expertise on how to manage the data they store in the cloud, as more organizations demand access to insights at the cloud level.
Data & Analytics
Security Boulevard - Attackers More Successful at Delivering Malware Payloads
Cloud-delivered malware is now more prevalent than web-delivered malware. In 2021, malware downloads originating from cloud apps increased to 66% of all malware downloads when compared to traditional websites, up from 46% at the beginning of 2020.
Security
ZDNet - Log4j: How hackers are using the flaw to deliver this new 'modular' backdoor
The main module of the attacker's PowerShell framework validates network connections, enumerates characteristics about a compromised system, retrieves the C&C domain from a hardcoded URL, and takes, decrypts and executes subsequent modules
Security
Business Because - Technology Sector To Drive MBA Jobs Boom In 2022
Increasing hiring among tech companies means greater focus on digital and data-related skills—a key area for MBAs to focus on this year. “There’s an increase in demand for candidates with skills in analytics, machine learning, and artificial intelligence (AI),” Mitchell explains
Tech Jobs
InfoWorld - All roads lead to hyperautomation in 2022
When it comes to automation, the natural tendency for humans is to avoid it out of fear that it will replace their jobs. This has turned out not to be the case, however; automation instead enables human workers to learn and develop new skills that are more valuable to their organizations and their own careers
Automation & Productivity
Cyber Security Intelligence - Super Intelligent Machines - They’re Here
A leading expert on AI, Prof. Stuart Russell, of the University of California at Berkeley, is suggesting  a way forward for human control over super-powerful Artificial Intelligence, advocating the abandonment of the current “standard model” of AI, proposing instead a new model based on three principles - chief among them the idea that machines should know that they don’t know what humans’ true objectives are.
Artificial Intelligence
Network World - Latest 5G specs highlight IoT support, better spectrum efficiency
The latest 5G technical specifications from an overarching standards organization sets a roadmap for development that addresses streamlined IoT support, AI/machine learning, and more efficient use of wireless spectrum.
5G
The Hacker News - 2022 Cybersecurity Predictions from Lookout: Work From Anywhere Ends On-Premises Security
Whether an employee accidentally shares a document with the wrong person or a compromised account extracts information, data now moves at lightning speed. As we head into 2022, with hybrid and remote work cemented as the new norm, Lookout expects this to become an even bigger issue.
Security
CSO - CISA sees no significant harm from Log4j flaws but worries about future attacks
“We’ve been actively monitoring for threat actors looking to exploit” the vulnerability, and “at this time we have not seen the use [of the vulnerability known as Log4Shell] in significant intrusions,”
Security
yahoo!Finance - Virtual Private Network (VPN) Market Trends 2022 | North America, Europe, & APAC Industry Forecasts 2027: Graphical Research
The global VPN market size is estimated to showcase exponential growth during the forecast period, driven by the rising number of government initiatives and policies to encourage companies to use innovative yet reliable internet security measures.
Network Management
SDxCentral - What Security Tech Will CISOs Buy in 2022?
Marks pointed to ESG’s report that found nearly two-thirds (62%) of respondents said their organization will increase spending on cloud application security, followed by data security (58%) and cloud infrastructure security (56%). About half said they plan to increase spending on network security (55%) and endpoint security (50%).
Security
AiThority - SoftwareReviews Reveals The Best IT Asset Management Software
“ITAM feeds data into financial management including cloud cost optimization, compliance and legislation, project management, vendor management and enables accountability throughout all the lifecycle stages, including disposal.”
IT Management
Network World - Latest 5G specs highlight IoT support, better spectrum efficiency
If a commercial 5G service is available where customers wants to network IoT, all the customers need to do is ensure their IoT endpoints support the service and turn it on. That’s much simpler than architecting and deploying their own networks to support the IoT initiative.
5G
Computerworld - IT salary expectations for 2022: How much can UK IT pros expect?
The report also notes that demand for front-end developers is rising as businesses adapt to suit the new wave of online consumer behaviour caused by the pandemic. Additionally, 24% of CIOs are prioritising further cloud-based projects and initiatives, meaning the need for cybersecurity professionals will only continue to increase.
Tech Jobs
yahoo!Finance - Network Monitoring Market worth around $7 Bn by 2027; Global Market Insights Inc.
The growing popularity of SaaS-based network monitoring solutions is driving the market growth. SaaS-based network monitoring solutions provide comprehensive remote monitoring and can monitor all the IP devices within the IT network infrastructure
Network Management
ZDNet - Developers are in short supply. Here are the skills and programming languages employers need
Employers are finding it especially difficult to match candidates with their specialist business needs. This year, web development, DevOps and AI/machine learning are among the technical skills most sought after by tech recruiters, the survey found.
Tech Jobs
SCL - Digital Transformation and the New Wave of Troubled Outsourcing Projects
In this article, we set out how digital transformation can drive complexity and risk, why market norm outsourcing contracts might hinder rather than help, how fresh thinking when setting up contracts can improve the chances of success, and how parties can exercise the contract smartly to get projects back on track when problems do arise.
Digital Transformation
ZDNet - Cybersecurity: Last year was a record year for attacks, and Log4J made it worse
"New penetration techniques and evasion methods have made it much easier for hackers to execute malicious intentions. What's most alarming is that we're seeing some pivotal societal industries surge into the most attacked list. Education, government and healthcare industries made it into the top 5 most attacked industries list worldwide."
Security
SUSE - Dell Technologies partnership continues to shine with Joint Open Source Solutions
Containerization is the de facto mode of development for many teams these days because they can work more independently to deliver value faster. And containers have become synonymous with Kubernetes orchestration, which escalates it all with auto-scaling, security and management of containerized applications.
Open Source
The Sun - Hackers feared to have penetrated half of UK businesses due to staff working from home
Four out of five companies had no protections against cyber-criminals, the poll by the British Chambers of Commerce and IT firm Cisco found.
Security
Cyber Security Intelligence - Cyber Security Threats In 2022
Innovative cyber security vendor Darktrace has identified a growing trend of hackers targeting  for backup servers in an attempt to deliberately disable or corrupt backup files by deleting a single index file that would render all backups inaccessible.
Security
Datanami - Preparing for the Next Disruption: 10 Analytics Trends to Watch in 2022
“Curiosity helps businesses address critical challenges – from improving job satisfaction to creating more innovative workplaces. Curiosity will be the most sought-after job skill in 2022 because curious employees help improve overall retention, even during the Great Resignation.”
Data & Analytics
SDxCentral - Zero Trust Is More Important Than Ever, Security Practitioners Warn
Service providers might list zero-trust network access (ZTNA), software-defined perimeters (SDP), or identity-defined perimeters (IDP) products as silver bullets of a zero-trust architecture without pursuing a zero-trust strategy for the whole enterprise, so “we need to strategically remove implicit trust from IT systems and constantly validate every digital interaction in the process,
Security
CSO - 5 top hybrid cloud security challenges
“A hybrid environment naturally introduces more complexity; there are just so many more ‘windows and doors’ to lock, and more security maintenance—patching, etc.—to perform,"
Cloud Security
VentureBeat - How to build a data science and machine learning roadmap in 2022
Gartner notes that organizations undertaking DSML initiatives rely on low-cost, open-source, and public cloud service provider offerings to build their knowledge, expertise, and test use cases. The challenge remains of how best to productize models to be deployed and managed at scale.
Data & Analytics
Diginomica - Someone’s talking Blockchain, but don’t run and hide - this is about proof of value
This is a use case where Blockchain and its capabilities with transaction security and provenance could offer significant advantages, except for that one major deficiency, typified by the Bitcoin example: a TPS ranging between three and seven, and a transaction confirmation cycle time of around 10 minutes. In short, Blockchain can’t hack the business need or get remotely close…or can it?
Blockchain
Cyber Security Intelligence - What To Expect From Data Science In 2022
An emerging trend in data science is that it has started to converge with other disciplines such as AI, business intelligence, and digital marketing as well as technologies like IoT, cloud technology and 5G in order to provide even faster and improved results.
Data & Analytics
SC Media - Three takeaways from Google Cloud’s acquisition of Siemplify
 In reality, very few security issues have end-to-end predictability with binary outcomes. This was a leading driver in SOAR failing to live up to the hype – further undermining the stand-alone market and leading to bifurcation of SOAR functionality.
Security
The Fast Mode - The Future of Network Security: Three Predictions for 2022
In a survey of global CISOs by Cybersecurity Insiders for the CISO Cloud/SaaS Security Report, an overwhelming 94% reported being moderately to extremely concerned about security risks associated with the increased use of public clouds.
Cloud Security
Datanami - The Upcoming Year in Big Data: A 2022 Preview
 “In 2022, organizations will create a data fabric to drive enterprise-wide data and analytics and to automate many of the data exploration, ingestion, integration, and preparation tasks,"
Data & Analytics
Datanami - Successful Edge Computing Depends on a Symbiotic Edge and Core to Workload Relationship, According to IDC
IDC has identified four workloads from its Worldwide Enterprise Infrastructure Workloads Taxonomy that have a significant influence among edge use cases: business intelligence/data analytics; content delivery; text and image analytics; and networking & security.
Edge Computing
Georgia Tech - Responsibility Key to Broader Understanding and Acceptance of AI in 2022
As the year unfolds, experts expect to see responsibility “increasing in relevance and importance with wide-scale acknowledgment that ethics are crucial to prevent issues related to bias and discrimination in AI,”
Artificial Intelligence
Network World - The cloud comes down to earth
The enterprise data center is also veering toward the virtualized, containerized, ultra-scalable cloud model. For example, Dell, HPE, and Lenovo now offer on-prem clouds in the form of cloud infrastructure software running on pay-per-use hardware, overprovisioned to give you the headroom to increase capacity on the fly.
Cloud
AiThority - Tech Hiring Accelerates as National Employment Growth Slows
Eight metropolitan areas saw the number of tech job postings increase by more than 1,000 in December over November, from Dallas (15,959 total job postings) and Houston (6,331) in the Southwest, to Los Angeles (14,229) and Seattle (8,091) on the West Coast, to Atlanta (11,808) and Tampa (4,925) in the Southeast.
Tech Jobs
SiliconANGLE - Analyst predictions 2022: The future of data management 
"I believe that data governance is now not only going to be mainstream, it’s going to be table stakes. And all the things that you mentioned, the data, ocean, data lake, lake houses, data fabric, meshes, the common glue is metadata. If we don’t understand what data we have and we are governing it, there is no way we can manage it."
Data Management
ZDNet - New year, new job: The tech resignations are coming, so get ready
Employers will need to put just as much effort into making sure they retain existing tech staff, who already have extensive knowledge of the organization's technology and who understand the needs of the business and its customers.
Tech Jobs
VentureBeat - The ambient intelligence decade
The metaverse is not the only idea that is being supercharged by recent technical advances. Through smartphones and IoT devices, computing increasingly surrounds us becoming everywhere a part of the human environment. This represents a nexus of long-term trends, such as ubiquitous or pervasive computing and the mobile internet
Emerging Tech
Network World - How to buy enterprise firewalls
Most firewalls will perform well when traffic loads are light. It’s important to see how a firewall responds at scale, particularly when encryption is turned on. Roughly 80% of traffic is encrypted today, and the ability to maintain performance levels with high volumes of encrypted traffic is critical.
Network Management
ZDNet - Cloud computing, Log4j flaw, IT spending, and more: Tech research roundup 
On December 18, Google released a security report where Open Source Insights Team members James Wetter and Nicky Ringland said they found that 35,863 of the available Java artifacts from the Maven Central repository depend on the affected Log4j code.
Security
Network World - Hybrid cloud demands new tools for performance monitoring
“Only 36% of network operations professionals believe that their network management tools are as good at managing cloud networks as they are at managing on-prem networks,”
Cloud
ZDNet - Never been a better time to aspire to be a chief technology officer, study shows
Top CTO responsibilities cited in the survey include C-suite and board advisory (88%), software development lifecycle (72%), cybersecurity (69%), innovation strategy (61%), and business continuity (59%). CTOs also add data to their list of central responsibilities
IT Management
Yahoo!Finance - Seven years later, Web 3 is setting a standard for the decentralised economy
Web 3.0, on the other hand, leverages machine learning, artificial intelligence and blockchain to achieve real-world human communication in a new decentralised world with blockchain as its chief cornerstone. With many great offerings, Web 3.0 brings freedom from centralised regulation and gives it back to its users.
Emerging Tech
ZDNet - Is LiDAR on its way out? The business case for saying goodbye
"LiDAR is well suited for outdoor applications where there are a lot of unknowns and inconsistencies in terrain. That's why it's the best technology for self-driving cars. In indoor environments, machine vision makes the better technological case. As light photons are bouncing off objects within a warehouse, robots can easily get confused under the direction of LiDAR."
Automation & Productivity
VentureBeat - The positive side of ransomware for data transformation
The new architecture should be more responsive and interface with enterprise data via a smart API that can automate the processes by which data is fetched, merged, transformed, secured, and delivered, all without users having to put in a request to the data team.
Data Management
eWeek - 5 Tech Trends for 2022: Digital Transformation, Cloud and Talent Wars
The upskilling this will force into enterprise IT shops will be a key issue for them, as it will require changes to talent recruitment and retention well beyond what most companies have in place for what has traditionally been viewed as a low-impact cost center.
Tech Trends
The Verge - Matter was a major star at CES 2022, but can it maintain its shine?
“We can’t leave devices behind, or this whole program won’t work. The idea that everyone has to throw everything out and start again is just not going to work.” It remains imperative that Matter doesn’t leave existing smart homes in the dark.
Smart Tech
Yakima Herald - Commentary: Quantum technology could revolutionize business via data encryption, drug discovery and more
In pharmaceuticals, quantum computing could improve the precision and speed of drug development; in automotive, it could cut the time and cost of manufacturing; in chemicals, it could realize significant energy savings; and in finance, it could optimize risk management and free up capital.
Quantum Computing
Cnet - Privacy myths busted: Protecting your mobile privacy is even harder than you think
Dozens of settings in your phone's operating system and within your apps would need to be changed before you could say you'd completed the first two steps. That's why the final step -- installing privacy-focused apps like a VPN, Signal Messenger, Brave Browser, DuckDuckGo and the BitWarden password manager -- is crucial
Privacy & Security
eWeek - Secure Access Service Edge: Big Benefits, Big Challenges
The more difficult part of realizing SASE is the need for a security architecture that can be fully integrated and managed, much like software-defined networks are. But the majority of enterprises currently have a hodge-podge of security products in place that are nearly always stand-alone.
Security
VentureBeat - AI is quietly eating up the world’s workforce with job automation
For example, the popular AI copywriting app, Rytr, boasts over 600,000 users, and it’s growing at a brisk pace. In other words, over half a million people are using Rytr alone to fully or partially automate their writing.  It’s estimated that there are just over 1 million freelance writers around the world, who are increasingly competing with robots that don’t tire, don’t require payment, and can generate an unlimited amount of content.
Artificial Intelligence
Forbes - In The Digital 2020s, Jobs Are More Than Just Jobs
Master of edge computing: “Define the IoT roadmap, carefully evaluate the technical requirements and assess the feasibility for establishing the edge processing unit and measure the return on investment.
Tech Jobs
VentureBeat - 7 ways the technology sector could support global society in 2022 
It might benefit us more to see technology companies as one among many contributors to the future of human potential — alongside a myriad of expert philosophers, engineers, humanitarian workers, particle physicists — while recognizing that chasing goals that benefit their corporate structures more than they benefit society might be a significant distraction from the task at hand.
Sustainability
TMCnet - Biggest Cyber Threats That Small Businesses Face
''The absolute biggest mistake companies make about cybersecurity insurance and cybersecurity, in general, is that they don't need it and that they are not a target. And even worse, they think they are already protected'',
Security
VentureBeat - CES 2022: Eyeing an enterprise metaverse
The MCity metaverse-as-a-service concept allows companies to register a DNS-like .metaverse domain for a “campus” of 3D structures where they can hold events on a regular basis. The 3D rendering environment is based on Epic’s Unreal Engine, powered by Nvidia GPUs running in the Microsoft Azure cloud.  
Metaverse
threatpost - EoL Systems Stonewalling Log4j Fixes for Fed Agencies
Between technology issues and travel restrictions/shipping delays involved in replacing these systems, Keller predicts that agencies are months away from being able to address Log4j.
Security
SDxCentral - NetFoundry CEO: SASE Isn't Enough, Zero Trust Must Go Deeper
“All the major 2021 attacks, they’ve not been between the user and the app, they’ve been what I would call below the waterline of the iceberg, server to server, webserver to database, every single one of them,”
Security
CircleID - The Future of Data Storage
A single data center uses more electricity than a small town. We’re consuming electric generation resources and spinning off huge amounts of carbon dioxide to be able to save the 45 pictures taken at the birthday party you attended last night.
Data Storage
DarkReading - CISOs Plan What to Buy With Funds From the Infrastructure Bill
"I would spend the money to stitch together governance risk and compliance platforms, SIEM [security information and event management] and SOAR [security orchestration automation and response] technology, so that I can get more predictive analytics based on our risk posture,"
Security
VentureBeat - 4 healthcare cloud security recommendations for 2022
There’s no secret as to why: McKinsey has estimated that migrating to the cloud could generate up to $140 billion in additional value for healthcare companies by 2030 in terms of cost reduction, new product development and overall growth.
Cloud
Android Headlines - Cyber Attack Trends And Warnings By Cyber Expert Tal Dilian
He explains some ideas relating to GDPR, ransomware attacks, cloud security issues, and business data breaches that people and entities should keep in mind when protecting their information online.
Security
Dark Reading - Rethinking Cybersecurity Jobs as a Vocation Instead of a Profession
Within the cybersecurity industry, the prevailing mindset is that security practitioners are professionals. Thus, a direct consequence of this mindset is that a college degree is required for many cybersecurity jobs. A recent (ISC2) report indicates that 86% of the current cybersecurity workforce has a bachelor's degree or higher. Furthermore, a quick search on Indeed.com shows about 46,000 cybersecurity jobs, of which 33,000 (>70%) require a degree.
Security Jobs
Health IT Security - Top Healthcare Cybersecurity Predictions For Next Year
With data exfiltration, threat actors are less likely to get caught. These attacks have a higher success rate and are lower risk than encryption-based ransomware attacks. In addition, cybercriminals are almost as likely to get the ransom paid.
Security
VentureBeat - Evaluating technology to empower digital transformation success
A recent IDG MarketPulse survey found that less than a quarter of line of business (LOB) employees are automating their daily routines or modernizing existing workflows. And it’s not all due to a lack of skill or desire — almost 1 in 5 of the respondents to that survey outside of IT who are capable of contributing to digital transformation efforts are not doing so.
Automation & Productivity
ComputerWorld - No end in sight for the Great Resignation; workers keep quitting for better pay, benefits
The hospitality and healthcare industries took the biggest hits as workers left to find better wages and benefits. The transportation, warehousing, and utilities industries also saw employee flight in significant numbers.
Tech Jobs
SDxCentral - Is Home SD-WAN, Security the Future of Remote Work?
“I think where you start to see some differences and where the real value of these appliances come in, is the ability for the appliances to be able to optimize and prioritize application traffic or provide direct connections to cloud-based platforms.”
Network Management
AiThority - 70% Of US Broadband Households Own At Least One Streaming Video Product Connected To The Internet
Ownership of smart TVs and streaming media players continues to rise, and gaming console ownership has held steady after several years of losses. Consumers have fully embraced streaming services, with more than 80% of broadband households having at least one service and 49% having four or more services.
Streaming
Blocks & Files - Samsung shipped over half of world’s enterprise SSDs in Q3, say analysts
Intel and Samsung each accounted for about 35 per cent of enterprise SSD capacity shipped in 2019’s third quarter – but now Samsung has a market-dominating 53.6 per cent share while Intel’s has dropped to 15.2 per cent.
Data Storage
World Economic Forum - Emerging Economies More Optimistic About Artificial Intelligence, Survey Finds
60% of respondents believe that products and services using AI will make their life easier, but four in ten admitted that the use of AI makes them nervous.
Artificial Intelligence
ZDNet - Remote working jobs: These are the highest paying tech and management roles
The most recent Ladders Quarterly Remote Work Report, which is based on data on remote working opportunities from 50,000 companies, found that 18% of all professional jobs are now remote, including nearly 156,000 roles paying $100,000 or more.
Tech Jobs
Rapid7 - 2022 Cybersecurity Predictions: The Experts Clear Off The Crystal Ball
"My third eye tells me that ransomware will become state-sponsored. Governments will notice the successful actors in their countries, and rather than shut them down, they'll seek to co-opt their activities. In other words, pirates will be coopted into privateers."
Security
Dark Reading - Hybrid Multicloud Strategies Are Keeping the Public Sector at the Forefront of Threat Mitigation
To effectively adopt a defensive secure posture in a hybrid multicloud environment, development teams must ensure that security controls and features are built in at all levels of the environment, including at the data and application levels.
Cloud
ZDNet - Most enterprise execs already want to adopt quantum computing, survey says
The study queried 300 CIOs, CTOs, and "other VP-level and above executives" at global enterprises with annual revenues over $250 million. It found that the vast majority have already begun looking into quantum computing, with a larger 74% noting that companies will "fall behind" if they fail to tap into it.Quantum Computing
Forbes - How To Adopt A Best Practice Approach To Cloud Migrations
For example, when an enterprise migrates an application to a public cloud, the entire database must either travel with the application or remain accessible after the migration is finished. Without complete mapping for both local and external resources, the application and data may not function as intended. Not surprisingly, security risks also increase.
Cloud
The Next Platform - THE YEAR AHEAD IN DATACENTER COMPUTE
It would be great if the rumored Microsoft/Marvell partnership yielded another homegrown Arm server chip, and it would further be great if late in 2022 AWS put out a kicker Graviton4 chip just to keep everyone on their toes.
Automation & Productivity
CSO Magazine - Top 8 cybersecurity predictions for 2022
Remote work, virtual meetings, hybrid cloud networks, and SaaS adoption have all brought about complex IT infrastructures that are opening up new threat avenues. Meanwhile, CSOs also must help ensure their organizations are in compliance with new regulations.
Security
Digionomica - The last mile in AI deployment - answering the top questions
The "AI last mile" may represent the most significant risk to the enterprise. There is complexity in putting AI into production. Perhaps, IT principals are mesmerized by the terms "AI" and "AIOps," presuming it's just another case of project management and governance. AI may not only disrupt integration into existing business processes, but it can also do so in mysterious ways, and may escape scrutiny.
Artificial Intelligence
Network World - 3 types of edge-gateway vendors
As it stands, the edge-gateway market is immature and fractured. A range of infrastructure incumbents, providers of data-center gear, and startups have launched new edge-gateway products in the last couple of years, offering a variety of approaches to taming the edge.Edge Computing
Finextra - Blockchain may have a significant role in 2022
Blockchain-based services are being developed by a number of multinational organizations, including Spotify to manage copyrights and IBM to offer monitoring systems for shipping and retail chains.
Blockchain
SDxCentral - Top 5 Data Center Tech to Watch in 2022
Intel is expected to be first on the scene, due in part to a last-minute delay to its upcoming Sapphire Rapids Xeon Scalable Processors. The new Xeons are slated for release early this year and boast a number of tantalizing new features, including an all-new, multi-die architecture, Intel’s most advanced 10-nanometer manufacturing process, and on-die high-bandwidth memory.
Data & Analytics
VentureBeat - 2 big CES trends: PCs closing Apple’s silicon advantage and mutant laptops
AMD, Intel, and Nvidia are all competing with one another, and the added pressure of Apple’s own silicon is bringing out the best in all of them.
Tech Trends
Blocks & Files - Hitachi Vantara rated as best primary storage for large enterprises by GigaOm
The small business Radar diagram places DataCore, DDN, HPE, IBM, iXsystems and StorOne in the Challengers’ area with iXsystems the most mature and DataCore, DDN and StorOne scoring highest on innovation
Data Storage
TechBullion - Blockchain Will Rule 2022: 5 Upcoming Trends That Prove This
Owing to its impressive data storage techniques, experts anticipate the below-mentioned blockchain trends will serve as a trustworthy source of future record-keeping and financial transactions in 2022.
Blockchain
Intelligent CISO - How ransomware is destabilising cyber insurance – and what to do about it
But as the industry’s loss ratio rose for the third straight year in 2020, climbing more than 25 percentage points year over year to 72.8%, and ransomware events jumped 93% in the first half of 2021, something clearly has to change. Ransomware is neither unlikely or novel any longer, but rather has become a commoditised threat.Security
Security Intelligence - The 5 Most Hotly Contested Security Trends and Questions
The worst thing that organizations can do is take a hard stance with their cybersecurity efforts. The digital threat landscape is constantly evolving. If organizations settle into a viewpoint, they could elevate one source of risk into something unrealistic—all while missing other digital threats.
Security
Forbes - Why Words Matter In Cybersecurity
Calling all malicious cyber activity an attack fails to address questions about motive, impact and security. You don't know if victims have performed their due diligence from a security perspective. For example, was it the network secure or was it rife with unpatched vulnerabilities? You can't tell.
Security
Enterprisers Project - Digital transformation: Your 6 key teams in 2022
Based on my own experience in the enterprise IT domain, I can assert that digital transformation is here for the long haul. It will require enterprises to draw up tightly woven strategies and provide a handsome payoff for those that start planning early.
Digital Transformation
VentureBeat - CES 2022: AI is driving innovation in ‘smart’ tech
In particular, consumer device makers tend to want to take advantage of the cloud for software and data updates without being dependent on the cloud — with the smarts of the smart device resident on the device itself. So they’re worth studying as pioneers in edge computing.
Artificial Intelligence
Dark Reading - Putting Ransomware Gangs Out of Business With AI
Organizations need to take matters into their own hands with a new approach. By using AI that learns what normal business operations look like, anomalous behavior that inevitably arises from a ransomware attack can be identified at every stage, even when it’s using never-before-seen attack methods.
AI/Security
Forbes - The 10 Tech Trends That Will Transform Our WorldThe takeaway for businesses is that, as our interactions with machines become increasingly intelligent, customers will expect all manner of products and services to feature some sort of AI capability.
Tech Trends
The National Law Review - Life and Death of Technology: 2022
The Washington Post suggests that both Apple and Google may offer their own metaverse access portals this year. It will be interesting if these companies try to isolate their own technology in to separate sandboxes, or if they make a play for interoperability that will allow small companies to create content that can be played on every device.
Tech Trends
McKinsey & Company - The unsolved opportunities for cybersecurity providers
The elements that enterprises must secure (data, devices, people, networks, machines, and applications), how they must secure them (prevention, detection, response, and remediation), and why it’s important to secure them (to mitigate loss of lives and livelihoods) continue to evolve, and cybersecurity providers have yet to solve several crucial customer challenges.
Security
IT Business Edge - What’s Next for Ethical AI?
They are concerned about how AI advancements will affect our productivity and the exercise of free will; in short, what it means to be “human.” The fight for ethical AI is nothing but fighting for a future in which technology can be used not to oppress but to uplift humans.
Artificial Intelligence
Compare the Cloud - Forget Forms, Conversation is King
Conversational assistants are not just the next trend. They are the next stage in our digital evolution. Just like how CDs have been replaced by online streaming platforms in the music industry, chatbots will replace their webform predecessors.
Automation & Productivity
VentureBeat - Report: 43% of consumers feel transparency is key for positive AI innovations
The survey, which was designed to capture consumers’ understanding of AI, their overall perception and utilization, and any apprehensions related to data privacy and regulation, found that nearly half of consumers (45%) believe AI supports employees by making complex tasks easier.
Automation & Productivity
ZDNet - Google's 2021 Year in Review lays out hopes for practical quantum computing this decade
The company would like to accomplish all of these things before the calendar rolls around to 2030. Should it attain its goals, Google believes quantum computers could revolutionize multiple areas of technological development
Quantum Computing
Dice - What Tech Jobs Demand A.I. and Machine Learning Skills in 2022?
According to Emsi Burning Glass, which collects and analyzes millions of job postings from across the country, the number of job postings requesting A.I. skills will increase 297 percent over the next two years
Artificial Intelligence
The Record - State-of-the-art EDRs are not perfect, fail to detect common attacks
The research team tested these attacks against EDR software from Bitdefender, Carbon Black, Check Point, Cisco, Comodo, CrowdStrike, Elastic, ESET, F-Secure, Fortinet, Kaspersky, McAfee, Microsoft, Panda Security, Sentinel One, Sophos, Symantec, and Trend Micro. T
Security
ZDNet - Data 2022 outlook, part two: Reality bytes the data mesh
According to Google Trends, "data mesh" was one of the topics that  broke the internet in 2021 -- even more so than "data lakehouse." However, it's a topic that addresses a point of pain: We dump all sorts of data into data lakes or other silos, then we lose track of them or don't adequately utilize and govern them.
Data & Analytics
eWeek - Data Management in 2022: DataOps, Talent Shortages, Storage Overload
Instead of focusing on the detailed technical configurations of provisioning storage and resolving issues, the storage admin job will morph into a proactive role requiring a broader understanding of the full hybrid cloud infrastructure, including compute, AI and automation, DevOps, and containers.
Data Management
Constellation Research - Five trends shaping the cloud security conversation
Local encryption key generation and storage, and integrated transaction signing are now standard in mobile devices, and IoT device capability is heading the same way. Managing fleets of connected automobiles, smart electricity meters, and medical devices -- to cite some popular examples -- takes a dynamic mix of processing and storage at the edge and in the cloud.
Cloud Security
Finextra - 5 Digital, Crypto and Blockchain predictions for 2022
Digital asset interoperability and time to market remain a challenge, with traditional and multiple types of blockchain-enabled digital asset infrastructure being severely fragmented.
Blockchain
Insider Intelligence - Health systems will turbocharge their AI strategies in 2022—but it won’t come without challenges
In fact, nearly 72% of healthcare execs say they’d trust AI to support nonclinical, admin processes that take away time providers could be spending with patients, per Optum.
Artificial Intelligence
Data Center Dynamics - There's no ecommerce without web scraping and Big Data
Business competition is a game (in the sense of mathematical theory), where participants have partial information about possible decisions. They then make those decisipms based on the available information.
Data & Analytics
AiThority - Top Tech Innovation Companies Exhibiting at the CES 2022 That We Are Most Excited About
Samsung will also unveil four exciting projects from C-Lab Inside, its in-house venture program, and nine startups supported by C-Lab Outside, the company’s startup acceleration program, to the public.
Emerging Tech
Network World - When quantum computers forget: Overcoming decoherence
Overall, though, quantum computing will be a huge net plus for businesses, scientists, researchers and anyone who has to quicky perform what Harvard Business Review calls “combinatorics calculations.”
Quantum Computing
SDxCentral - AT&T’s SASE Strategy Champions Pragmatism
By consolidating secure web gateway, zero-trust network access, cloud access security broker, and cloud-based firewalls under a single vendor, enterprises can not only better support remote workers and contractors, but do so in a way that cuts down on the number of products required and allows for consistent policy enforcement across all channels
IT Management
VentureBeat - 30 startups that show how open source ate the world in 2021
But in among all the usual excitement that permeates the open source world, countless open source startups launched new products, attracted venture capitalist’s (VC) money, and generally reminded us of the role that open source plays in today’s technological landscape — including the data sovereignty and digital autonomy it promises companies of all sizes.
Open Source
TMCnet - 5 Ways to Keep Your Data Safe From The Inside Out
A security policy not only governs how your employees use company resources but also includes rules about what they should and shouldn't be doing.
Security
EnterpriseAI - As the Energy Industry Transforms, AI Automation is Its Next Opportunity
One forecast predicts an increase in power system costs by six to 13 percent in 2040. AI can help better balance and orchestrate the network by using AI-enabled decisions in optimizing system build-out, while improving battery optimization and energy management.
Artificial Intelligence
VentureBeat - How combining human expertise and AI can stop cyberattacks
CISOs tell VentureBeat they’re capturing more telemetry (i.e., remote) data than ever, yet are short-staffed when it comes to deciphering it, which means they’re often in react mode.
Security
ZDNet - Nearly half of Latin companies set to adopt AI by 2023
Companies in the region will also be seeking governance services relating to areas such as data management and security, according to the study that was carried out with 5,000 large Latin American businesses.
Artificial Intelligence
MarketingDive - The language of innovation: How AI is improving the translation experience for marketers
In a recent Industry Dive survey of 172 marketing executives, more than half noted that while AI was a critical component for language services, when having content translated or localized for their markets, simplicity was still very much a pain point.
Marketing Tech
Forbes - How Cybersecurity Can Keep Up With Waves Of Innovation
Unfortunately, each time this cycle has occurred, security innovation has lagged behind the new technology’s development and growth. As a general rule, it takes years for organizations to figure out how to secure a new platform.
Security
TotalRetail - Email Acquisition is the New Directive in the Post-Cookie Era
As governmental regulation and industry mandates have pushed the envelope towards the phaseout of third-party cookies as identifiers for unknown audiences across the internet, email addresses are becoming more important than ever, taking up the mantle as the currency of the entire online advertising ecosystem
Marketing Tech
VentureBeat - Top 5 trends for endpoint security In 2022
While 82% of CISOs have reevaluated their security policies in response to the support needed for work-from-home (WFH) and virtual teams, endpoints often lack needed patches to stay secure or are overloaded with conflicting software agents.
Security
ZDNet - How will Zuckerberg's Meta plans impact its dominance over social media in 2022?
Even though seven in ten respondents to a recent survey reported that they are not interested in Meta's virtual reality project, companies are developing platforms that enable users to engage.  
Emerging Tech
Datanami - NewVantage Partners Releases 2022 Data And AI Executive Survey
Investment in Data and AI initiatives continue to grow – the 2022 survey indicates that 97.0% of participating organizations are investing in Data initiatives and that 91.0% are investing in AI activities. This year, 92.1% of organizations report that they are realizing measurable business benefits, up from just 48.4% in 2017 and 70.3% in 2020.
Data & AI
Datamation - Top Network Security Trends
Many of the worst and latest network security breaches have happened because of user errors related to a lack of cybersecurity knowledge and best practices.
Security
Enterprise Storage Forum - Storage Tiering Market: Features, Benefits, and Providers
While SSDs are popular, hard disk drives (HDD) and tape continue to be relevant as part of the larger data storage hierarchy as different tiers to meet expanding data growth. Despite the wishes and prognostications by some, no one storage media or medium today, or at least for the next several years, will be able to support all data storage needs in a cost-effective manner.
Data Storage
AiThority - Augmented Reality In Healthcare Market Detailed In Latest Research Report By 2021-2028 | Zugara, Vuzix Corporation
The global augmented reality in healthcare market standpoint is set to run on a comparable plan of action as that of the IT industry in the 1980s. Numerous new players are anticipated to emerge on the scene. In any case, only a few would have the option to merge their positions around the world.
Augmented Reality
VentureBeat - Big data analytics expected to grow to $100B in value by 2027
We can see that big data analytics has not been recognized as an essential facet in the sales and marketing departments of the pharmaceutical industry — more so than in any other sector. In fact, big data is almost twice as prevalent across this area of the industry as artificial intelligence.
Data & Analytics
ZDNet - Data 2022 Outlook Part I: Will data clouds get easier and streaming get off its own island?
The next step for cloud providers is to tap the diversity of their portfolios, identify the synergies, and start bundling solutions that at least lift part of the burden of integration off the customer's shoulders
Cloud
ComputerWorld - 3 big workplace changes to expect in ‘22
Business interest in “bossware” style software that provides detailed analytics on employee actions has grown during the COVID-19 pandemic, drawing criticism from worker rights groups as overly intrusive.
Automation & Productivity
VentureBeat - Report: 60% of U.S. infosec professionals believe ransomware is as serious as terrorism
The survey explores how infosec leadership is responding to rapidly growing ransomware threats. Their responses are critical considering two-thirds (67%) of respondents from organizations with 500+ employees reported a ransomware attack last year — a number that rises to 80% for respondents from organizations with 3,000-4,999 employees.
Security
Tech.Co - Experts’ Predictions for the Future of Tech in 2022
Companies navigating the inclusion of remote workers must prioritize speed and security at scale, but will need greater flexibility as well. Traditional data center architectures and public cloud solutions won't be enough — expect large new expenditures in hybrid work cloud adoption.
Tech Trends
Chemical Engineering - IF DATA IS THE NEW GOLD, WHERE TO START DIGGING?
Among this mixture of promising potential and data overload, companies are struggling to define where and how to start. This article shines a bit of light on how an organization can make progress in its quest to transform its vast volume of process data into a decision-making asset.
Data & Analytics
PC Magazine - Security Predictions Point to 2022 as the Year of the Breach
The security company Lookout has issued some predictions as we head into 2022. It used that ITRC report and others, plus a survey of 2,000 people conducted in November, to extrapolate what's going to happen. Most of it isn't looking good.
Security
NextGov - US Still Lacks Federal Cyber Strategy After Decades of Attempts
Marinos noted the emergence this year of the Office of the National Cyber Director as a positive development toward fixing that. And in October, National Cyber Director Chris Inglis released a statement of “strategic intent.” But Marinos said the administration is still missing essential elements for executing an effective plan: goals and outcomes.  
Security

Was this article helpful?