2024 - IT Management - Analysis, Surveys, Trends and Opinions
  • 01 Mar 2024
  • 190 Minutes to read
  • Dark
    Light

2024 - IT Management - Analysis, Surveys, Trends and Opinions

  • Dark
    Light

Article Summary

Weekly and Monthly sponsorships are available.

This curation starts in September 2023. To see our previous curation, click here.

Title/Link

Description

Category

Information Week - Defining AI's Role in Network Management

More importantly, the emergence of software-defined WANs (SD-WANs) is opening the way for network managers to integrate AI technology into network operations and management. "For the industry to deliver on the promise of a self-healing or self-correcting WAN, AI tools can help automate routine network operation tasks, set policies, measure network performance against set targets, and respond to and rectify the networks as needed," Herren explains.

Network Management

ITPro Today - Is Passkey Authentication More Secure Than Traditional Passwords?

Passkeys are not entirely foolproof, however. Cybercriminals have evolved their strategies, with session hijacking emerging as a common method for account takeover. “Instead of trying to access a user’s login credentials, cybercriminals now use malware-exfiltrated session cookies to launch session hijacking attacks – bypassing passkeys entirely,” said Trevor Hilligoss, vice president of SpyCloud Labs.

Security

sdxCentral - Cybersecurity pay from analysts to leaders revealed: Understanding impacting factors

They found that experience and level of education contribute favorably to compensation levels as expected. Cybersecurity professionals with at least 12 years of relevant experience can have an annual cash compensation as much as 22% above the baseline. On the flip side, those with fewer than three years of relevant experience earn packages of up to 40% below the baseline. Meanwhile, the impact of advanced degrees on cash compensation is a positive 12%.

Security

sdxCentral - Google Cloud optimizes databases, data analytics for genAI

The hyperscaler shared the general availability of AlloyDB AI, which is designed to simplify the process of building enterprise-grade genAI applications. The AI database platform can run on-premises or in any public cloud environment and is ideal for transactional, analytical and vector workloads.

AI/Data

Information Week - Rubrik CIO on GenAI’s Looming Technical Debt

Technical debt is hardly a new concept and not exclusive to artificial intelligence. A 2023 CompTIA survey found 74% of organizations said technical debt posed challenges. And 42% of those surveyed said the technical debt would cause “substantial hindrance.” Technical debt is often an invisible foe that can creep up on IT leaders as companies push to grab a competitive advantage with emerging technologies.

GenAI

Network Computing - A Perfect Cyber Storm is Leading to Burnout

Cybersecurity is about, among other things, attention to detail, careful planning, and precision execution during incident response times. Distracted, stressed-out, and understaffed teams are a recipe for disaster. A perfect storm of factors is contributing to this scary reality, but there are also strategies we can implement as technology and business leaders to navigate these challenging waters.

IT Management

Data Science Central - What are the benefits of using Natural Language Processing (NLP) in Business?

NLP is transforming business practices, data analysis, and customer engagement by empowering machines to comprehend, interpret, and even produce human language effectively. This article delves into the extensive advantages of incorporating NLP within business operations, demonstrating that this technology is indispensable for maintaining a competitive edge in today’s dynamic business environment.

NLP

CIO Influence - Driving Business Agility with Cloud Ops Architecture, Management, and Compliance

Cloud Operations Engineers collaborate with staff to plan and implement secure, cost-effective cloud-based services that support business initiatives. Ideal candidates for managing cloud operations possess the expertise of Alibaba, Microsoft Azure, Google Cloud Platform (GCP), and Amazon Web Services (AWS).

Cloud

Forbes - Saving Telco From Itself: Overcoming The Top 5 Challenges In 2024

A common theme that is creating challenges across all of these industries is the rise of software, silicon and the edge as critical enablers—whether it’s the via disruption of AI, the re-working of operations around software development, deployment and support or the deconstruction of proprietary tech stacks into “open” hardware, software and services combinations.

Tech Trends

Datanami - Reducing Cloud Waste a Top Priority in 2024, FinOps Foundation Says

The biggest FinOps spending is targeting compute instances, the survey shows, with more than 50% having already spent heavily to optimize compute. That leaves plenty of room for optimizing other aspects of cloud computing, the FinOps Foundation says, including data and storage, database, containers, backup and retention, data transfer and networking, and more.

Cloud

Computerworld - Enterprise mobility 2024: Welcome, genAI

“This has been the main topic of interest in the last year. We see generative AI having impacts in multiple areas, such as script creation, knowledge-based article creation, NLP [natural language processing]-based querying of endpoint data, and help desk chatbots. All of these are considerations for inclusion within the UEM stack.”

Tech Trends

Forbes - Three Ways Your Organization Could Be Susceptible To Ransomware Attacks

Breached credentials and “stealer logs” are some of the most frequent ways hackers gain access to systems and initiate ransomware attacks. Because nearly all organizations have had stolen credentials on the internet at some point, it can make them susceptible to later attacks—especially if the exposure happened within 90 days and the information is current.

Security

CIO Influence - Revolutionizing Business Reporting with Cloud Reporting Tools

A cloud reporting tool is a software solution that facilitates report generation and analysis through cloud-based technology. Diverging from conventional reporting approaches, these tools furnish real-time data updates, automate processes, and seamlessly integrate with various business applications. They serve as a centralized data collection, analysis, and visualization hub, empowering businesses to effortlessly make informed decisions based on data insights.

Cloud

SiliconANGLE - CAST AI report unveils major underuse of cloud resources in Kubernetes environments

That’s resulting in substantial inefficiencies and opportunities for cost optimization in cloud computing. The second annual CAST AI Kubernetes Cost Benchmark Report, based on the analysis of 4,000 clusters running on Amazon Web Services, Google Cloud Platform and Microsoft Azure, found that for clusters containing 50 to 1,000 CPUs, organizations only use 13% of provisioned CPUs and 20% of memory, on average.

Cloud

ZDNet - Beyond programming: AI spawns a new generation of job roles

While prompt-engineering skills are in demand now, Lee says the future might look different: "It's a new way to interface with a computer that requires different skills. But as the interface becomes more conversational and more human-like, it remains to be seen if this is a new career path or just a point-in-time opportunity."

Tech Jobs

Network Computing - The Increasing Trend of Consolidation in the IT and Cybersecurity World

Within organizations, CIOs play a critical role in ensuring data security and managing IT infrastructure. However, as technology ecosystems continue to expand and diversify, CIOs face the daunting task of navigating a labyrinth of software solutions. This has started to lead many CIOs to seek consolidation of products and services. The primary aim is to simplify operations, streamline workflows, and ultimately enhance overall efficiency.

IT Management

CIO Influence - AI Security Imperatives for 2024: Collaboration Between Tech and Governments

Cisco’s recent findings from the Cybersecurity Readiness Index underscore a concerning reality: only a mere 15% of organizations demonstrate mature readiness to withstand cybersecurity threats, with a mere 22% adequately prepared to safeguard data. Concurrently, the 2023 Cisco AI Readiness Index reveals a stark truth: a staggering 86% of global organizations lack comprehensive readiness to integrate AI into their operations seamlessly.

AI/Security

Information Week - Is Self-Promotion a Viable Path to CIO?

I’ve talked to many women CIOs, and this isn’t an uncommon story, but it goes for males, too. I know a few CIOs who ascended to the CIO position because they were willing to wait for their bosses to retire -- but most had to self-promote themselves by seeking career advancement outside of their companies, and they saw self-promotion by seeking new employment as a viable path to CIO.

Tech Jobs

CIO Influence - Essential Skills for Future CIOs in 2024 and Beyond

CIOs must discern between valuable data and irrelevant information to optimize resources effectively. Strategic evaluation of data usage ensures alignment with business objectives, minimizing wastage of resources and time.

IT Management

Blocks & Files - Developing AI workloads is complex. Deciding where to run them might be easier

But connectivity is not simply an external concern. “Within the four walls of the data centre we’re seeing six times the cable requirements [as] customers are connecting their GPUs, the CPUs, the network nodes. …. so, where we had one cable tray for fibre runs, now we have six times those cable trays, just to enable that.”

AI

Information Week - How to Cope with AI Disappointment

“It’s important to have the right human intelligence upfront to manage the AI and to build it into the process. “Enterprises want to implement AI to make programs faster, but must first understand the intended result, the true result, as well as the problems that haven’t been addressed.”

Automation & Productivity

CIO Influence - Latest Trends in Networking Cloud Services

However, alongside the benefits, there has been a notable rise in cyberattacks targeting cloud environments, as highlighted by a 40% increase reported by McAfee in their 2023 report. Despite the advantages, the digital landscape presents distinctive challenges for networking cloud services. In this context, it is essential to delve into the critical aspects of the digital era and examine the hurdles that necessitate innovative solutions in cloud networking.

Cloud

Information Week - How to Develop an Effective Governance Risk and Compliance Strategy

“Compliance has for too long lived in a niche corner of business strategy, but with the AI boom bringing new outsized challenges to the GRC world, every department in an organization needs to understand and be aware of the day-to-day work involved in risk and compliance,”

Risk Management

Network Computing - 5G is Moving Downstream to Enterprises—And Everyone Stands to Gain from It

The same survey showed that almost two-thirds of MNOs consider private wireless networks as an important part of their enterprise strategy. While not discounting considerable consumer interest in 5G-driven services for things like gaming on the go, B2B enterprise is clearly the strongest 5G opportunity for MNOs in 2024, driving 5G indoors through on-premises public and private 5G networks.

5G

Information Week - How Leadership Missteps Can Derail Your Cloud Strategy

But there's another layer: the iceberg beneath the surface. Focusing merely on the initial outlay while overlooking ongoing operational costs is like ignoring the currents below, both can unexpectedly steer your budget -- and your company -- off course. Acknowledging and managing operational expenses is vital for a thorough and financially stable cloud computing strategy.

Cloud

sdxCentral - Enterprise networking in flux: Why readers flock to disruptors like Aviz, Cato, Nile and Versa

Our data shows that these outdated technologies and architectures have burdened network infrastructure consumers with significant technical debt, requiring substantial resources to maintain. Consequently, CIOs, Chief information security officer (CISO), CTOs and network operations teams find themselves unable to prioritize innovation, despite the demands from their CEOs and line-of-business executives.

Network Management

Information Week - How to Ready Your Company for The Cloud Revolution in 2024

By the end of the year, the world's first zero-touch call centers will likely be unveiled -- a testament to the strides made in GenAI. These centers will be equipped to perform tasks that surpass the abilities of traditional chatbots, such as handling customer histories, inventory management and sensitive communication tasks, all enhanced by advanced natural language processing.

Cloud

Forbes - Lessons From The Insurance Industry: Six Keys To Developing An Effective Data Strategy

Any path toward an effective data strategy begins with knowing where your data originates and the types of data you’re collecting. Consider whether you can combine data sources or if it’s time to retire others. Your initial understanding sets the stage for a more far-reaching and well-informed approach to the data’s ultimate deployment.

Data Management

Network Computing - Why Businesses Should Watch Wi-Fi-7 Closely

Wi-Fi 7 products offer significantly more performance for enterprise users and can support more users in denser environments compared to Wi-Fi 6. It is pitched as a match for streaming applications and is able to handle more users per Access Point (AP), which translates into fewer devices to manage and maintain in deployments.

Network Management

Forbes - Five Predictions For How SaaS Will Be Managed By IT, Software Asset Management And Procurement Teams In 2024

SaaS management is often referred to as a team sport. When it’s done right, it’s the joining of forces of the IT and finance organizations. This partnership makes sense, as these teams have a common goal of efficiency. While CFOs approach efficiency from a purchasing and cash flow perspective, CIOs are focused on maximizing investments and software utility.

IT Management

Network World - The tech world’s best kept secret: carrier-grade connectivity

“They are dependent on the network so why not go direct to the owner of world’s largest internet backbone that covers 350 points-of-presence (PoPs), which serve customers across 125 countries? By cutting out the middlemen, they gain access to capacity, performance and the best customer service.

Network Management

SiliconANGLE - Generative AI, IAM, culture-based programs will shape cybersecurity in 2024, Gartner says

To support organizations in their move to this model, Garter has developed PIPE (practices, influences, platforms, enablers), a framework guiding practices not traditionally used in security awareness programs — such as organizational change management, human-centric design practices, marketing and PR and security coaching.

AI/Security

sdxCentral - 3 ways new CIOs can build credibility with the C-suite

Tech talent and skills shortages are a major concern for boards for directors, That concern is well-founded as it can hinder enterprise growth. CIOs can address this challenge by adopting what Gartner describes as “a franchising digital delivery mindset.” This involves breaking down IT department walls and empowering other business areas to contribute to technology production.

IT Management

SiliconANGLE - Organizations need a business-driven AI strategy, not a CAIO

Given the speed of AI updates and changes, it is imperative that organizations operate in a dynamic, iterative, risk-adjusted, repeatable approach to better focus on the value that AI can bring to their organization. The key is a synergistic multidisciplinary approach to measurement, AI-ready data strategy, security, risk governance and talent shifts.

AI Management

Government Executive - OPM announces survey to analyze AI in government jobs

Last July, OPM completed the first step of its work, identifying 43 general and 14 technical competencies required for work with AI. And in a memo last week, Veronica Hinton, OPM’s associate director for workforce policy and innovation, announced the HR agency’s next task: surveying current federal employees who are already working with AI to confirm OPM’s initial list of skills.

Tech Jobs

CIO Influence - RAG Strategies for CIO Success: Harnessing Data Retrieval Potential

Enter retrieval augmented generation (RAG) is a sophisticated natural language processing (NLP) technique among the strengths of return- and generative-based AI models. RAG AI capitalizes on existing knowledge while possessing the ability to synthesize and contextualize information, thereby generating bespoke, contextually-aware responses, instructions, or explanations in human-like language. Unlike generative AI, RAG operates as a superset, incorporating the strengths of both generative and retrieval AI mechanisms

AI/Data

Computerworld - The highest-paid IT skills — and why you need them on your resume

The top 10 highest paid skills in tech can help workers earn up to 47% more — and the top skill among them is generative artificial intelligence (genAI), according to a new report from employment website Indeed and other sources.

Tech Jobs

Blocks & Files - Keepit has a unique approach to SaaS data protection

The backup software is an object store that prohibits the deletion of any data object or backup set. Every backed-up item is an object like a file or email. That means customers can restore files at the same speed whether they are a minute, a week, a month, a year or older. All objects are immediately addressable. There is no separate archive section for older data. Customers sign up for retention periods, with many having 99-year retention deals.

Data Management

CIO Influence - Top 5 Data Center Management Software for CIOs

Asset management within an enterprise data center is inherently intricate. It encompasses hardware and software sourced from various vendors alongside numerous applications and tools. Additionally, data center environments often interface with private cloud platforms from multiple providers. Each component, whether hardware, software, or cloud-based, carries its contractual terms, warranty agreements, user interfaces, and licensing requirements.

Data Management

CIO Influence - Multi Cloud Governance Strategies for CIO Leadership

Identity security poses a substantial threat, as most cloud services require user authentication. Cyber-attacks like phishing target cloud credentials, making user access control more challenging in multi-cloud environments. A robust cloud governance framework is essential to enforce security policies across all cloud systems and monitor credential compromises effectively.

Cloud

sdxCentral - GenAI, boardroom communications gaps top Gartner’s list of cybersecurity trends

Gartner noted that security behavior and culture programs (SBCPs) have gained traction to reduce human risks, as security leaders shift focuses from increasing awareness to fostering behavioral change. The firm expected half of large enterprise chief information security officer (CISO) will adopt human-centric security design practices to minimize cybersecurity-induced friction and maximize control adoption by 2027.

Security

CIO Influence - CIO Influence Interview with Chris Parker, Director Government Strategy at Fortinet

Active security in a modern IT infrastructure is seeing a convergence of security and networking. Whereas these often used to sit in separate teams, as two separate entities, now they’re the same system. At Fortinet, we are leading very strongly in the emergence of Secure Access Service Edge (SASE), a cloud architecture model that combines network and security-as-a-service and that also allows us to move data remotely and securely from point to point.

Security

appleinsider - Apple users are increasingly falling victim to malware, phishing, and viruses

FileVault, for instance, a "basic feature that provides critical protection of user data by encrypting it" was reportedly "found disabled on 36% of devices" surveyed. Then across 2023, "3% of [iPhones] devices had lock screen disabled and 25% of organizations had at least one user with lock screen disabled."

Privacy & Security

Forbes - Three Priorities That Enterprise CIOs Must Address In 2024

As such, it has remained at the periphery of the enterprise. However, as more legal and compliance work has been done to understand the ramifications of generative AI, in 2024, we can expect to see its use extend beyond marketing and engineering into areas like design, planning and strategy.

Tech Trends

Information Week - How to Build a Strong IT Risk Mitigation Strategy

“In order for the resulting risk score to be usable, the exposure data analysis needs to be highly automated, which generally involves setting up a data warehouse for key metrics,” he explains. “The impact analysis also needs to take into account system categorization, driven by confidentiality, integrity, and availability assessments.”

Risk Management

Network World - SASE, multicloud spur greater collaboration between network and security teams

SASE converges network and security solutions into an integrated architecture, so it makes sense that these groups would come together to implement and operationalize it. Multicloud adds significant complexity to networking and security at a time when both these groups are fighting to regain influence and control over cloud strategy. EMA believes that strong collaboration between the two groups can help both gain more credibility in the cloud

Network Management

Information Week - The Psychology of Cybersecurity Burnout

Employees who are not focused on cybersecurity often feel that safeguarding procedures represent an undue impediment to completing their assigned tasks. And cybersecurity professionals must contend with an ever-growing panoply of alerts and crises -- in the midst of a massive shortage of both workers and skillsets. Sixty-eight percent of respondents to a 2022 IBM survey of cybersecurity responders said they were often assigned to more than one incident at a time.

Security

Network World - IBM X-Force: Stolen credentials a top risk to network infrastructure

In terms of network infrastructure, nearly 85% of attacks on this sector were caused by exploiting public-facing applications, phishing emails, and the use of valid accounts. In 2023, X-Force saw attackers increasingly invest in operations to obtain users’ identities; there was a 266% uptick in infostealing malware, designed to steal personal identifiable information like emails, social media and messaging app credentials, banking details, crypto wallet data and more, the report found.

Security

CIO Influence - Top Healthcare Data Management Software and Tools Every CIO Must-know

Establishing a centralized repository, often referred to as the “source of truth,” is paramount for maintaining master data integrity. This repository encompasses essential identity information such as patient and provider identifiers, alongside reference details like standardized vocabularies used in daily operations. Implementing robust processes aligned with industry standards ensures smooth operations, aided by Healthcare Business Intelligence tools aimed at enhancing overall outcomes.

Data Management

Information Week - Solving the Non-Invasive Data Governance Puzzle

Employee non-adherence (or in some cases, lack of knowledge) to security and governance policies is one reason why more companies are using social engineering audits to review practices in user departments. Another reason for lapses in governance is employee stress, which in 2023, according to Gallup, was at 44% of all employees.

Data Management

CIO Influence - Streamlining NIS2 Compliance: The Microsoft Security Solutions Approach

One of the notable features of the directive is the introduction of heightened accountability measures. Through reinforced reporting requirements and increased penalties, organizations are urged to prioritize the enhancement of their security protocols. The deadline for compliance with NIS2 is set for October 17, 2024, after which adherence to the directive becomes legally mandatory.

Security

Information Week - Changing Role of the CIO

From tech strategy to artificial intelligence, talent, and transformation to value creation -- the CIO needs to have a tech-led answer for every question from the C-suite. The job is mercurial, the responsibilities expansive and the demands relentless. So how do you cope? With leadership: CIOs need to move beyond cost-cutting to expand their role and embrace the fact that they can be the chief insights officer in a business.

IT Management

Information Week - Talent Management: The Missing CIO Management Strategy

Then, in 2023, eight out of 10 technology leaders surveyed said that they were having to prioritize the upskilling of their employees. Now, in 2024, LinkedIn has reported a demand for IT skills in AI, cloud computing, cyber security, data science and other IT areas.

IT Management

SiliconANGLE - Metadata is the glue: federated data silos, metadata and governance

We believe that no single data platform will conquer them all. And that organizations will look to continue to break apart the compute or execution layer from the data storage layer in their composable data platform. In the research, we see organizations looking at ways to address their major challenges: costs of compute and storage, number of systems to manage, how to understand what data they have, and how to govern the use of that data. This research note digs into the last two issues around knowing what data you have and who can use it.

Data Management

CIO Influence - Balancing Act: Ethics and Privacy in the Age of Big Data Analytics

The significance of big data collection and analytics is increasing at a rapid pace. According to IBM, a staggering 90% of the world’s data has been generated in the past two years alone. This exponential growth in data holds profound implications across various industries, underlining the need for data analysis. Organizations leverage big data to drive informed decision-making, innovate products and services, and address complex challenges.

Data & Analytics

Information Week - Streamline Your IT Workforce by Consolidating Roles, Not Workers

“The third way to achieve these goals is by leveraging opportunities for employees to work on other teams or pods to support different parts of the product and technology,” Walters says. “This encourages knowledge sharing and helps retain talent by offering them additional learning opportunities.”

IT Management

SiliconANGLE - New report warns of ongoing rise of malicious emails bypassing secure email gateways

The Cofense 2024 Annual State of Email Security Report, based on 35 million employee accounts tracked by Cofense, identified more than 1.5 million malicious emails bypassing customer secure email gateways, or SEGs, last year, up 37% from 2022 and 310% from 2021. In context, the report notes that Cofense detected at least one malicious email bypassing their customer’s SEGs every 57 seconds.

Security

CIO Influence - What It Means To Be An ‘IT Pro’ In The Age Of Generative AI

With a simple prompt, an IT pro can fix long-standing business problems more quickly and easily than ever, whether that means pulling data for a board meeting where critical decisions will be made or instantly or knitting applications together to enable the delivery of new products and services. If being a data-oriented problem solver was a skill before, AI has made it a superpower.

Automation & Productivity

Information Week - Solving the Non-Invasive Data Governance Puzzle

Employee non-adherence (or in some cases, lack of knowledge) to security and governance policies is one reason why more companies are using social engineering audits to review practices in user departments. Another reason for lapses in governance is employee stress, which in 2023, according to Gallup, was at 44% of all employees.

Data Management

sdxCentral - Tech companies ditch degree requirements, focus on skills

The practice is gaining ground on the governmental level, too: Massachusetts Governor Maura Healey recently instituted skills-based hiring practices for state jobs, noting that “too many job applicants are being held back by unnecessary degree requirements.”

Tech Jobs

ZDNet - Does your business need a chief AI officer?

The rapid pace of development means it would be tough for anyone, let alone a CIO who's already responsible for managing day-to-day IT operations, to oversee the rollout of AI.

IT Management

sdxCentral - Dragos warns of rising ransomware, inaccurate vulnerability advisories

Dragos argues OT vulnerabilities should be addressed and mitigated differently from IT ones based on the strict operational requirements of OT systems, such as system uptime and vendor qualification processes.

Security

Strategies to Solve the IT Skills Gap in Enterprise Storage for Fortune 500 Companies

One effective strategy is to deploy autonomous automation into your storage infrastructure, so it reduces the level of complexity, thereby decreasing the dependence on specialized IT skills that are becoming harder to find. With the power of autonomous automation, an admin can manage PBs and PBs of storage easily and cost effectively. For example, a global Fortune 500 customer in Europe went from 15 people managing >75PBs of storage to only four people managing with the switch to Infinidat.

IT Management

sdxCentral - Cloud budgets are climbing, but execs leery of hidden costs

Unexpected cloud costs are the main factor driving the frequency of cost assessments. More than two-thirds of respondents reported negative impacts from unanticipated cloud costs in the last six months to a year. In 2022, 53% of respondents experienced surprise cloud costs.

Cloud

CIO Influence - Leveraging Big Data Analytics for Strategic Decision-Making: A Guide for CIOs

Chief Information Officers (CIOs) serve as linchpins in fostering data-driven decision-making within organizations, tasked with overseeing IT infrastructure and data management strategies. CIOs establish a coherent data strategy outlining data collection, storage, management, and analysis procedures, carefully considering factors such as data governance, security, and access control.

Data & Analytics

Network World - HPE and Juniper: Why?

The second of the two views is the most popular. A good M&A is based on the idea that there’s a lot of staff redundancy in the combination of two companies, and you can save a boatload of costs by merging and laying off employees. No revolutionary change in strategy, or in product plans. Economy of scale is the game. But consolidation is usually a response to commoditization, which means that at best, you’re circling the drain in a more favorable position (if that’s possible). Weak.

Network Management

CIO Influence - HP Reveals Security Threat Trends: Adversaries Target Endpoints

In Q4, a significant portion of intrusion attempts, with 84% involving spreadsheets and 73% involving Word documents, targeted vulnerabilities in Office applications, marking a departure from macro-enabled attacks. However, macro-enabled attacks remain prevalent, especially in instances utilizing low-cost malware like Agent Tesla and XWorm.

Security

VentureBeat - How AI is redefining data-based roles

AI will replace few if any data-related roles. Instead, AI-powered software will enhance their capabilities — and encourage ambitious data professionals to jump on acquiring whatever new AI-related skills may be demanded. Here’s a quick rundown of the impact AI will have on data roles across the organization.

AI/Data

CIO Influence - Next Gen Cloud Computing Platforms for CIOs in 2024

Directly transferring an application to the cloud might not be the most efficient approach. Use a cloud migration to reassess your IT architecture for better efficiencies. Consider breaking applications into microservices for leveraging the service-based approach of Infrastructure as a Service (IaaS). Alternatively, explore Platform as a Service (PaaS) or Software as a Service (SaaS) options to streamline operations and reduce complexity.

Cloud

The Hacker News - How Businesses Can Safeguard Their Communication Channels Against Hackers

As for the review of permissions, the more people have access to a system, the more likely it is that someone will make a mistake that could result in a breach. Make sure that only those people who really need it have access to sensitive information.

Security

sdxCentral - Tech leaders can’t play it safe in 2024

While 60 percent of workers use genAI tools internally is impressive, more eye-catching is the fact that 50 percent will use AI to offer custom-facing tools, according to Forrester’s research. Guarani said Forrester is an example of this shift to custom-facing AI that lets its clients can now use genAI to search its entire library of research.

Automation & Productivity

Computerworld - Tech spending shifts to meet AI demand, forces a 'reshuffling of skills' for workers

The adoption of AI has the potential to reshape the workforce, though many employees could be looking at reskilling instead of separation. According to a 2023 survey of 1,684 C-suite executives by McKinsey Global Institute, about four in 10 respondents reporting AI adoption expect more than 20% of their companies’ workforces will be reskilled in the next three years; and 8% expect the size of their workforces to decrease by more than 20%.

Automation & Productivity

SiliconANGLE - Cloud optimization wanes as AI slowly lifts off

The other key takeaway from the data is AI has gained notable momentum on both dimensions since the announcement of ChatGPT. Survey data indicates that approximately 40% of new AI projects are being funded by taking funds from other budgets. Most sectors have seen contracting Net Scores on the vertical axis over the past several quarters and AI is the clear exception.

Cloud

Federal News Network - DoD wants to ‘popularize’ data patterns to leverage AI

“So if somebody has a data product, the value is realized because there’s a customer. Our goal is to enable each CTO and CIO across the department with the skills and the tools to be a product manager so that they can provide their customer with what they promised.”

AI/Data

Information Week - Keys to Maximizing Data Value

Jain believes that the most effective way to maximize data value is by ensuring that the data is well-connected and not isolated within silos. “When data elements are interconnected and form a unified fabric, they can collectively tell a more comprehensive story,” she says. “It’s about establishing a single source of truth within your organization where every piece of data contributes to a larger, interconnected narrative.”

Data Management

ITPro Today - Generative AI Adoption and Productivity: Finding Benefits Proves Challenging

Approximately 20% of employees who haven't experienced increased productivity with GenAI attribute that to corporate guidelines and subpar AI tool output, which results in additional review and editing time.

Automation & Productivity

Network Computing - How to Choose the Right Form of LTE Connectivity for IoT

LTE 450 is an alternative that operates on the 450MHz frequency band and is an energy-efficient and long-range option that provides a better solution than 3G. This option is suitable for less data-intensive applications commonly associated with LPWA technologies and perfect for smart meter connectivity.

IoT

CIO Influence - Effective Ways to Create a Culture of Security Awareness for CIOs

Establishing a Security Development Lifecycle (SDL) guides security practices in software and system development while designating security champions enhances peer education and awareness. Recognizing and rewarding individuals excelling in security practices through incentives contributes to a positive and motivated security culture within the organization.

Security

Information Week - How to Build an Effective IT Training Program

Education and training are necessary to keep your IT staff competitive, Craig advises. “Having your technology teams stay current on the latest information, tools and methods is crucial.” He believes that teams need to “understand emerging technologies and best practices so they can deliver maximum value back to the organization through an effective training program.”

Training & Certs

Network World - 5 Wi-Fi vulnerabilities you need to know about

A major vulnerability of the WPA/WPA2-Personal security protocol, particularly on business networks, is that a user with the Wi-Fi passphrase could snoop on another user’s network traffic and perform attacks. The enterprise mode of WPA/WPA2 provides protection against user-to-user snooping. But that requires a RADIUS server or cloud service to deploy, and requires more of the user or client device in order to connect. Thus, many enterprise environments still broadcast signals with the simpler WPA/WPA2-Personal security.

Security

Network Computing - Maui Teaches Us Why We Need to Change Our Data Protection Strategies

"If backups are so great, why then has every company that has paid ransom had backups?" This is because backups are not the most effective disaster recovery strategy. We now need to prioritize disaster recovery, and we need to find an affordable way to create DR for unstructured data that is separate from backups. We can no longer simply rely on backups as our primary means of data protection.

Data Management

CIO Influence - Top 10 Endpoint Management Software Picks for CIOs

Key factors contributing to its significance include centralized patch management for software updates, automation for IT efficiency, cost savings through reduced downtime, crucial support for remote work, robust data protection features, efficient asset management, proactive performance optimization, disaster recovery assistance, and seamless scalability to adapt to organizational growth and IT changes.

Security

SiliconANGLE - New report finds sensitive information at risk in 55% of generative AI inputs

In the last thirty days, more than half of data loss prevention or DLP events detected by Menlo Security included attempts to input personally identifiable information. The next most common data type that triggered DLP detections included confidential documents, representing 40% of input attempts.

AI/Security

CIO Influence - Top 20 Enterprise Data Storage Providers to Look Up in 2024

Modern storage solutions also enable seamless collaboration and file sharing across teams and devices, boosting productivity and accelerating decision-making. Integration with data analytics tools allows businesses to unlock valuable insights from their data, empowering data-driven decision-making and enhancing customer experiences.

Data Storage

InfoWorld - 5 things to consider before you deploy an LLM

Most enterprise LLM systems will be custom-trained in specific data sets. A disadvantage to the neural networks on which LLMs rely is that they are notoriously difficult to debug. As the technology progresses, LLMs may develop the ability to revise, erase, or “unlearn” something false that it has learned. But for now, unlearning can be quite difficult. What is your process or procedure for regularly updating the LLM, and eliminating bad responses?

AI/LLMs

Business Insider - Amazon, Microsoft, and Google say cloud cost-cutting is waning. Customers say cost controls are still a major barrier.

Companies often don't understand exactly what they're spending on in the cloud, the survey found. 65% said they were unsure of all their company's cloud instances. 35% reported cloud cost overruns in the last 12 months, nearly half of which were over $100,000 or $500,000.

Cloud

Information Week - Pressure to implement AI raises IT tensions

“To accommodate AI’s increased power and computing demands, more than three-quarters of companies will require further data center graphics processing units (GPUs) to support current and future AI workloads. In addition, 30% say the latency and throughput of their network is not optimal or sub-optimal, and 48% agree that they need further improvements on this front to cater to future needs.”

AI

CIO Influence - CIO’s Guide to Preventing Ransomware Attacks in B2B Enterprises

Endpoint detection and response solutions function by aggregating security events and indicators of compromise (IoC) from endpoint devices. Although IoCs alone may not identify attacks, they provide critical insights for security teams to detect ongoing threats. EDR tools excel in recognizing subtle activities, such as burrowing, where attackers quietly amass compromised privileges and accounts.

Security

Computerworld - Tech spending shifts to meet AI demand, forces a 'reshuffling of skills' for workers

CompTIA pegs the IT unemployment rate in the US at 2.3%, more than a full percentage point below the national unemployment average of 3.7%. Janco Associates, however, puts IT unemployment at 5.5%, more than a full point above the national average. And Janco’s data paint a far grimmer picture for 156,000 unemployed IT pros.

Tech Jobs

AiThority - JumpCould Finds Organizations Embracing AI Despite Security Concerns

With a strong majority of respondents both planning or actively implementing within the next year and advocating for AI investment, IT leaders clearly see potential benefits from deploying AI in their workplaces. But IT admins report notable concerns around their organizations’ current ability to secure against related threats—and personal concerns about AI’s impact on their career.

AI/Security

CIO Influence - Pervasive OT & IoT Anomalies Raise Critical Infrastructure Threats

“Network scans” topped the list of Network Anomalies and Attacks alerts, followed closely by “TCP flood” attacks which involve sending large amounts of traffic to systems aiming to cause damage by bringing those systems down or making them inaccessible.

Security

VentureBeat - How AI is strengthening XDR to consolidate tech stacks

XDR is riding a strong wave of support due to its ability to consolidate functions while limiting data movement, two high priorities for CISOs today. Those benefits are especially important in an era of security budgets being scrutinized more closely than before. Add to that the ability to bring in more telemetry data, including sources that are behaviorally based that can be used to identify anomalous behavior, including insider threats, and AI’s potential impact to improve XDRs continually is clear.

AI/Security

Network Computing - How Cisco Sees Silicon One Easing Network Convergence and Helping with AI

Recently, Cisco held a Tech Talk focused on Cisco’s Silicon One and how the company believes you can converge a network without compromising security, performance, and manageability. The discussion also shed light on how Cisco is dealing with the rise of AI and the role of the network.

AI/Networking

Information Week - How to Get Your Failing Data Governance Initiatives Back on Track

Despite leadership often recognizing the importance of data governance, it is in a relatively immature state at many enterprises. At large enterprises, data ecosystems are increasingly complex and often siloed, making governance no easy feat. Smaller enterprises may not even see the value of investing time and resources in data governance.

Data Management

SiliconANGLE - The role of data loss prevention tools in protecting against AI data exfiltration

One of the cybersecurity challenges associated with generative AI is the potential for attackers to utilize it for multivector social engineering attacks and creating clean malware code. Attackers are using gen AI to create language models that can launch targeted voice, email and text attacks, making it difficult to protect against because they appear legitimate. Additionally, generative AI is being used to create clean malware code, making it challenging to identify the actor behind the attack

Data Management

Government Technology - Vermont IT Modernization Takes a Relationship-First Focus

First, she wants to ensure tech decisions are made with end users’ experience in mind. Second and third, she aims to enhance standards and drive predictability, ensuring partners know what to expect in terms of financial costs and service capabilities. Finally, Reilly-Hughes has sights set on “simplifying and reducing complexities.”

IT Management

Computerworld - The AI data-poisoning cat-and-mouse game — this time, IT will win

One, it tries to target a specific company by making educated guesses about the kind of sites and material they would want to train their LLMs with. The attackers then target, not that specific company, but the many places where it is likely to go for training. If the target is, let’s say Nike or Adidas, the attackers might try and poison the databases at various university sports departments with high-profile sports teams. If the target were Citi or Chase, the bad guys might target databases at key Federal Reserve sites.

AI Ethics

Forbes - 18 Best Practices For Designing Seamless, Flexible And Efficient APIs

“An API’s design must hide the complexity of the underlying computations, no matter how intensive, convoluted and advanced the solution is at a lower level. Good interfaces are those that abstract complexity and provide universally intuitive access to data and functionalities that make sense for the average user.”

DevOps

eWeek - Generative AI and Cybersecurity: Ultimate Guide

In this guide, you’ll learn about generative AI’s pros and cons for cybersecurity, how major companies are currently using this technology to bolster their cybersecurity tools, and how you can use generative AI in ways that balance efficacy with cybersecurity and ethical best practices.

GenAI

Information Week - Growing Your Cloud Engineering Capabilities

Do you have all the cloud engineers you need? Companies are moving tech to the cloud, which means that the development of IT infrastructure skills in Linux, applications and containers, app deployment, security, data management, and cloud toolsets also must grow.

Cloud

sdxCentral - 5 hot data center jobs for 2024

Data center IT operations manager - As artificial intelligence (AI) and machine learning (ML) remain high business priorities in 2024, companies like Microsoft, Amazon Data Services and Google are hiring data center IT operations managers in Q1 2024.

Tech Jobs

Network World - AI-powered 6G wireless promises big changes

6G (sixth-generation cellular) will deliver significant improvements in security, resilience, reliability, latency, connection density, traffic capacity, spectrum efficiency, and user data rates, compared to 5G. It is expected to be 50 times faster than 5G, with a top-end, theoretical speed of 1Tbps, compared to 20Gbps for 5G. It can also handle 10 million devices per square kilometer, compared with 1 million for 5G, according to Keysight Technologies.

Network Management

Information Week - Investing In a Multi-Cloud Strategy to Maximize Efficiency

While the first significant wave of cloud adoption was driven mainly by the opportunity for cost savings, more recent moves to multi-cloud architectures are often caused by a desire for greater innovation. Many organizations are shifting their IT focus from cost savings and operational streamlining to generating revenue and innovation.

Cloud

ZDNet - This botched migration shows why you need to deal with legacy tech

Underestimating the importance of user buy-in will more likely lead to a resistance to change and is a key reason why businesses end up having to retain legacy systems. That retention results in higher operational costs, which adds strain on existing resources and creates a wider surface area that needs to be secured.

IT Management

CIO Influence - Gemini Advanced: All You Need to Know About Google’s Powerful AI Suite

The Gemini Advanced version, accessible through a Google One AI Premium subscription, unlocks the full potential of Ultra 1.0. This enhanced experience excels in reasoning, following instructions, coding, and creative collaboration. Imagine a personal tutor tailored to your learning style or a creative partner assisting with content strategy or business plans.

AI

Data Science Central - 10 Prominent Data Science Predictions 2024- Know What the Industry Experts Say?

Real-time data shall become the standard for businesses to power generative experiences with artificial intelligence. Data layers should support both transactional and real-time analytics. He further goes on to say that, the world of data science should expect a paradigm shift from model-centric to data-centric Artificial intelligence. Multimodal LLMs and databases will enable a new frontier of AI applications across industries.

Data & Analytics

Network Computing - Mike Twumasi Reveals DDI Use Cases

We’ll learn how DDI enhances security, simplifies management, and optimizes mobile device integration, contributing to increased productivity and secure mobility. We will also see how DDI empowers organizations to seamlessly incorporate and manage IoT devices, unlocking the opportunity for innovation and operational efficiency. Then, we will learn about the strategic role of DDI and bridging the gap between IT and operational technology.

Network Management

CIO Influence - CIO Influence Interview with Steve Stone, Head of Rubrik Zero Lab

In 2024, organizations will face a stiffer challenge in securing data across a rapidly expanding and changing surface area. One way they can address it is to have the same visibility into SaaS and cloud data as they have in their on-premises environments–in particular with existing capabilities. And that will be a major cybersecurity focus for many organizations next year. More will recognize that the entire security construct has shifted – it’s no longer about protecting individual castles but rather an interconnected caravan.

Data Security

Network Computing - Navigating Single Cloud, Multi-Cloud, and Hybrid Cloud Environments

On the other hand, single cloud deployments present their own set of challenges. These types of deployments can lead to vendor lock-in, meaning that it can be both expensive and challenging to transition workloads to another cloud platform in the future. It also limits the optionality that comes with multi-cloud and hybrid cloud deployments. Each cloud provider has its own set of strengths and weaknesses, so by locking yourself into one cloud provider, you must accept those attributes as they are.

Cloud

sdxCentral - Verizon’s 70 billion network data points highlight genAI potential (and challenges)

“AI and analytics engines are only as good as the data you put into them,” Silliman said. “We have an enormous body of data across Verizon, but it sits in 29,000 different data sources, which in many ways are fragmented, we don’t have common taxonomy. So the journey we’re on right now is bringing all of our data together into common platforms and common governance and taxonomy structures.”

GenAI

SiliconANGLE - Advancing data architecture for generative AI

The traditional solutions that technical professionals have previously used might not handle the velocity, variety and volume of data generated by modern application and analytical workloads. Because of gen AI, they must adopt new and recent approaches to data storage and delivery. These approaches can influence a wide variety of data ecosystems, including data lakes, warehouses and hubs.

AI/Data

The Hacker News - Unified Identity – look for the meaning behind the hype!

After these benefits, let's talk a downside: vendor lock-in. Unified identity sounds wonderful but betting the house on a single vendor is a high ask. And what if you already have some solutions in place that you're happy with? It's important to remember that not all unified identity vendors are the same; Some vendors offer modular identity platforms which allow you to keep what you want and unify what you need.

Security

Computerworld - The do-it-yourself approach to MDM

Open-source software has long been a part of every enterprise toolbox — and that includes managing mobile devices. Whether IT wants to go all in on open-source tools or integrate those tools with commercial offerings, it’s possible to develop a do-it-yourself approach to mobile device management (MDM).

IT Management

AiThority - Threat Intelligence Report Exposes the Impact of GenAI on Remote Identity Verification

Face swaps are created using generative AI tools and present a huge challenge to identity verification systems due to their ability to manipulate key traits of the image or videos. A face swap can easily be generated by off-the-shelf video face-swapping software and is harnessed by feeding the manipulated or synthetic output to a virtual camera. Unlike the human eye, advanced biometric systems can be made resilient to this type of attack.

AI/Security

Forbes - The Cyber Threats Every C-Level Exec Should Care About In 2024

Small to medium-sized businesses (SMBs) find themselves in the crosshairs of escalating ransomware attacks. Operating within the constraints of aging network infrastructures and grappling with insufficient cybersecurity budgets or enterprise-level cyberdefense tech stacks, these organizations are perceived as easy targets by cyber adversaries.

Security

CIO Influence - Understanding Alpha Ransomware and its Operational Framework

Based on the panel and various indicators like the ransom demand, it appears that the group exhibits talent but also demonstrates a certain level of amateurism within this realm. It is anticipated that in the coming days, an increase in victims may occur, leading to heightened visibility for the group, potentially resulting in widespread attention as they gather additional digital footprints.

Security

Information Week - Dealing With Deepfakes

“Five years ago, deepfakes were things that were complicated to build. You needed to be quite expert,” Newell recalls. “They were expensive. And to be honest, they didn't look very good. Now, they are extremely easy to make. There are tools that are essentially free. The level of expertise [required] is very, very low.”

Privacy & Security

ZDNet - Business sustainability ambitions are hindered by these four big obstacles

Despite the stated importance of sustainability to commercial success, only 37% of respondents believe sustainability is "very integrated" into the core of their business. Low integration of sustainability into key functions, such as finance and technology, means there is less opportunity for people on the sustainability team to understand the commercial opportunities for the business.

Sustainability

Information Week - Expect the Unexpected: How to Reduce Zero-Day Risk

A number of zero-day bugs in browsers, for instance, have emerged in the first month of 2024. A zero-day (CVE-2024-0519) in Google Chrome, allows for code injection. Attackers actively exploited the vulnerability, which Google has patched by this point. A zero-day bug (CVE-2024-23222) in Apple’s WebKit browser engine for Safari has also been exploited and patched. Attackers could leverage that vulnerability to execute code on impacted systems.

Security

sdxCentral - Comparing HPE’s and Juniper Networks’ networking portfolios – where’s the overlap?

Looking across at least 44 different switch product families from both HPE and Juniper Networks, the mid-tier level of HPE Aruba Networking and Juniper EX switches do appear to have similar use cases and target deployments. Certainly the management tier for each is different, the network firmware and service level agreements have varying degrees of differences, even when the basic networking specifications appear similar.

Network Management

Information Week - IT Security Hiring Must Adapt to Skills Shortages

Organizations must continue to expand their recruiting pool, account for the bias that currently exist in cyber-recruiting, and provide in-depth training through apprenticeships, internships and on-the-job training, to help create the next generation of cyber-talent.

Tech Jobs

Dice - Tech Jobs with the Biggest Increases in Postings

If you’re currently on the job hunt, it’s also worth considering which jobs pay the most. Dice’s latest edition of the Tech Salary Report breaks down which types of engineers, managers, and other specialists have the highest earning potential; while managers (especially high-ranking ones such as CTOs and CIOs) can pull down huge paychecks, developers and engineers in “hot” arenas such as cloud and DevOps also earn high average pay:

Tech Jobs

GovTech - The Group Giving Arizona Local Government a Hand With AI

During a recent workshop event held by the group, “AI for Local Government Leaders,” speakers presented on several topics, including laying the groundwork for AI and cybersecurity and data privacy in AI. Through lecture-based information sharing and hands-on demonstrations, the workshop provided a space for government and industry members to better understand the risk and potential of the technology.

AI

Information Week - How to Build a Team of Talented Citizen Developers

The idea sounds great in concept -- allowing non-technical employees to create applications for use by themselves or others using pre-approved tools. Yet, in practice, building a citizen developer team requires comprehensive training, strong support, and close oversight.

Automation & Productivity

VentureBeat - Eight emerging areas of opportunity for AI in security

Vendor risk management and compliance automation. Cybersecurity now involves securing the entire third-party application stack as companies communicate, collaborate, and integrate with third-party vendors and customers, according to Menlo Venture’s prediction of how risk management will evolve.

AI/Security

Network Computing - Organizations Left Grappling for Solutions Amid Alarming Cloud Security Gaps

While 98 percent of the 1,600 IT security decision-makers polled said their organizations store and manage sensitive data in the cloud, over half believe their cloud security postures are weak. This fear stems from their reliance on traditional security tools designed to protect on-premises IT systems that have proven ineffective at securing cloud-based resources.

Cloud Security

Data Science Central - How to Enhance Data Quality in Your Data Pipeline

Data quality within a data pipeline is a multifaceted concept beyond mere accuracy. It involves ensuring that data is complete, consistent, reliable, and timely as it moves through various collection, processing, and analysis stages. Quality is crucial in a data pipeline because it directly impacts the validity of business insights derived from the data. Poor data quality can cause wrong decisions, slow work, and missed chances

Data Management

TechRepublic - Topic — Cloud Security Top 7 Cyber Threat Hunting Tools for 2024

Cyber threat hunting is a proactive security measure taken to detect and neutralize potential threats on a network before they cause significant damage. To seek out this type of threat, security professionals use cyber threat-hunting tools. These are software solutions driven by advanced analytics, machine learning and artificial intelligence to detect abnormal patterns in a system’s network and endpoints. They use techniques like behavioral analytics, pattern matching, statistical analysis and AI/ML modeling.

Security

Data Science Central - 5 trends & advances that are set to define cloud security in 2024

So, there you have it, folks—the cloud security landscape of 2024 is shaping up to be quite the spectacle. From AI-enhanced defenses to uncrackable encryption and everything in between, it’s clear that the future of cloud security is all about being smarter, more integrated, and more proactive.

Cloud Security

ComputerWeekly - CIO interview: Stuart Birrell, chief data and information officer, EasyJet

The three years since have been focused on improvements in two major areas. First, modernising the key commercial systems – that is, the front-end EasyJet website, the booking engine behind it, and the airline inventory supporting it. Second, was to move completely away from in-house datacentres to the cloud.

Data Management

CIO Influence - CIO Strategies for an AI-Driven Future- Insights from Canva’s CIO Report

In response to this technological influx, Canva collaborated with Harris Poll to delve into how CIOs are grappling with “app sprawl,” the proliferation of applications in the workplace. This research sheds light on the strategies employed by CIOs to navigate the AI-driven landscape and make informed decisions about the selection of workplace tools that yield optimal outcomes.

AI

SC Media - Stop chasing shadow IT: Tackle the root causes of cloud breaches

For example, it’s common for industry analysts to label ransomware or data exfiltration a top cloud threat. Unfortunately, data exfiltration isn’t a threat, but an outcome of a threat. Similarly, ransomware isn’t the real threat, but a symptom. If we want to stop ransomware, we’ve got to stop ransomware from infiltrating our networks.

Security

Network World - Choosing a disaster recovery site

Not only that, but since the DR site is a full-scale replica, any time you add or change hardware in production, you need to do the same in the DR environment. And if you think about it, maintaining a DR site is like having a pool no one swims in: You still have to constantly clean and treat the water, trim the bushes, etc. It’s work that keeps ops resources busy but provides little tangible day-to-day value.

IT Management

CIO Influence - Top 10 Application Security Trends for CIOs in E-commerce

Unlike physical stores, online retail platforms face heightened vulnerability to fraudulent activities, owing to the lower risk of detection for fraudsters. Moreover, the convenience and accessibility inherent in e-commerce operations also render them appealing targets for cyber attackers, who can exploit factors like round-the-clock accessibility and remote access.

Security

Network Computing - IT Teams Are Not Prepared for 90-Day Digital Certifications

90-day digital certificates are a fast-approaching reality. While they will bring security benefits for businesses and help ensure digital trust across the web, they will also be a burden for unprepared IT managers.

Security

SiliconANGLE - Stop using servers to do things they’re not good at: How DPUs can change the data game

Servers are effective at many things but were never designed for the rigors of software-defined networking, storage and security. Servers excel in processing massive amounts of data, but they should not be performing functions such as network address translation, telemetry, firewall, storage-related services and, down the road, artificial intelligence functions such as AllReduce.

IT Management

Data Science Central - Your AI Journey: Start Small AND Strategic – Part 1

AI projects require significant data, technology, people skills, and culture investments to succeed. That means you will need the senior management support and fortitude to support those investments and stay the course as your organization learns to apply AI to derive and drive new customer, product, service, and operational value sources.

AI

Information Week - How Many C-Levels Does It Take to Securely Manage Regulated Data?

“I’ve seen a notable shift in the last few years to more C-suite and board leaders becoming active participants in cybersecurity conversations,” says Brent Johnson, CISO at Bluefin. “This was accelerated by the rapid transition to remote and hybrid work along with daily headlines, and coupled with mounting pressure to maintain regulatory compliance, securely managing data is no longer a concern just for CISOs.”

Security

VentureBeat - How to detect poisoned data in machine learning datasets

As AI adoption expands, data poisoning becomes more common. Model hallucinations, inappropriate responses and misclassifications caused by intentional manipulation have increased in frequency. Public trust is already degrading — only 34% of people strongly believe they can trust technology companies with AI governance.

AI Ethics

CIO Influence - IT Leaders Share their Insights on Data Privacy and Digital Transformation

As IT leaders strive to redefine new guidelines for privacy and security, they could shift budgets and strategies toward AI-led identity management and privacy-first campaigns. We spoke to the top IT leaders from data-driven organizations to understand how this year’s Data Privacy Day is a roadmap for building a reliable consumer data protection strategy in 2024.

IT Management

ZDNet - 4 ways to help your organization overcome AI inertia

"What's the smallest part of that purpose that you can start making a difference on? When you go down this path, and as soon as you mention things like AI, everybody goes for 'bigger is better.' It's like, 'What's the biggest problem? Can we solve world peace?' Instead, focus on the smallest problem where you can make a difference and use that as your model going forward."

Automation & Productivity

CIO Influence - Comprehensive Guide to Security Operations Center for CIOs

Gartner Predicts that by 2027, 50% of large enterprise CISOs will have adopted human-centric security design practices to minimize cybersecurity-induced friction and maximize control adoption.

Security

Network Computing - 5 Things You Can't Automate In Your Data Center

Theoretically, robots can automate much of the work of server deployment inside data centers. However, to do this work cost-effectively using robots, you'd need to operate on a massive scale. You'd also need server deployments that are sufficiently consistent and predictable to automate without the assistance of humans. Today, most server deployments just don't meet this criterion.

Data Management

CIO Influence - Navigating Business Outcomes in 2024: The Strategic Integration of Cloud Models

By leveraging the expertise of skilled professionals, embracing cutting-edge technologies, crafting a well-defined strategy, and streamlining operational processes, businesses can position themselves at the forefront of the cloud revolution, ready to embrace the opportunities that lie ahead.

Cloud

SiliconANGLE - Six cloud security trends we’re watching in 2024

Cybersecurity mesh architecture (CSMA) is a cyber defense strategy that is rapidly gaining ground, independently securing devices with their own perimeters (firewalls/network protection tools). CMSA helps provide a multi-layered defense against cyber threats, making it more difficult for attackers to penetrate an organization’s network successfully.

Security

VentureBeat - Why AI and behavioral analytics are stealth strengths of Gartner’s MQ on endpoints

Gartner writes in this year’s magic quadrant (MQ) for endpoint protection platforms, “the endpoint protection platform (EPP) market is no longer limited by vendors only offering EPP and endpoint detection and response (EDR) capabilities, and buyers are increasingly looking for fewer vendors to deliver a wider array of capabilities.” The report continues, “email security, identity threat detection and response and extended detection and response (XDR) are increasingly part of the purchasing decision.”

Security

CIO Influence - Advanced Endpoint Protection Strategies for 2024

The adoption of cutting-edge defense technologies is imperative in the evolving technological industry. A professional Advanced Endpoint Protection solution stands as the cornerstone, providing access to the ultimate security tools essential for safeguarding organizational assets. The undeniable trajectory towards the future involves the integration of AI and machine learning technologies into cyber defense strategies

Security

sdxCentral - Palo Alto Networks, CrowdStrike lead Forrester cloud workload security wave

The analyst firm noted the cloud workload security market has been witnessing a notable consolidation, as major players are expanding their functionalities to include cloud infrastructure entitlement management (CIEM) and data protection for prominent cloud infrastructure platforms such as Amazon Web Services (AWS), Microsoft Azure and Google Cloud Platform (GCP). There’s also increasing productized support for Oracle Cloud Infrastructure and Alibaba cloud platforms, especially in cloud security posture management (CSPM) functionalities.

Cloud Security

Network Computing - Evaluating the 2024 Cybersecurity Landscape

In 2024, expect to see the continued maturation of the cybersecurity business and platform vendors embrace the idea of delivering on cybersecurity-as-a-service. The tooling companies of yesterday want to be the business partner of today. There is far more value in the relationship of being a business partner vs. being a provider of a commodity technology solution. Platforms are critical to a business while tools are tactical to help at a given point in time.

Security

CIO Influence - Empower Your Cybersecurity: The OSINT Advantage

Fast-forward to the present day and the principles of OSINT find application in the domain of cybersecurity. Organizations, irrespective of their size, manage vast, public-facing infrastructures across diverse networks, technologies, and hosting services. Information, crucial for security, can be dispersed across employee desktops, legacy on-prem servers, cloud storage, embedded devices like webcams, and even concealed within the source code of active applications.

Security

Information Week - What Security Leaders Need to Know About the ‘Mother of All Breaches’

SecurityDiscovery regularly analyzes data from search engines. “We pay special attention to the misconfigured noSQL databases and Elasticsearch instances,” Diachenko tells InformationWeek. “We analyze them based on the size, based on the keywords, and other data that might lead us to uncovering some sensitive data that should not be exposed.”

Security

Information Week - 4 Top Data Management Challenges (And How to Conquer Them)

The biggest obstacle to overcoming data siloes is finding the right solution for storing large amounts of data while allowing easy access and use, Mahon says. He notes that making data readily available to the people who need it requires ample storage resources that are accessible to different team members in a form that supports collaboration, visualization and knowledge sharing.

Data Management

CIO Influence - AI’s Strategic Role in Shaping IT Security

However, the landscape isn’t solely marked by threats; there’s a beacon of hope in strategic investments. Organizations that extensively leverage security AI and automation demonstrate an average savings of USD 1.76 million compared to those that don’t embrace these technologies. This serves as a testament to the effectiveness of AI but also emphasizes the financial advantages of a proactive security stance.

Security

VentureBeat - Why AI and behavioral analytics are stealth strengths of Gartner’s MQ on endpoints

Gartner writes in this year’s magic quadrant (MQ) for endpoint protection platforms, “the endpoint protection platform (EPP) market is no longer limited by vendors only offering EPP and endpoint detection and response (EDR) capabilities, and buyers are increasingly looking for fewer vendors to deliver a wider array of capabilities.” The report continues, “email security, identity threat detection and response and extended detection and response (XDR) are increasingly part of the purchasing decision.”

Security

Information Week - Taking Plunge With Synthetic Data

Synthetic data shines when real data is scarce, sensitive, or too risky to use. “In scenarios where gathering ample and diverse data is impossible, challenging, or unethical, synthetic data steps in as a reliable alternative,” Zhu says. “It allows organizations to model complex situations without compromising privacy or safety.”

Data Management

Computerworld - It’s not just hype; genAI is already live at many companies

One of the more surprising aspects of the recent rise of genAI, according to the Workato study authors, is that many of the use cases are not coming from IT or the more technical parts of the workplace. Instead, researchers see a “democratization” of the technology, as line of business teams take advantage of it to automate their work or handle processes with particularly complex tool stacks.

GenAI

ITPro Today - Revealed: The Top Reasons Tech Professionals Quit

Tech professionals want clear pathways and career tracks to give them more incentive to stay with a business in the longer term. This needs to include clarity around new responsibilities and initiatives at each stage in order to avoid any sensation of the work becoming too stale or employees feeling like they're being underutilized.

IT Management

Blocks & Files - Two cloud file data services suppliers going gangbusters

Such services have a cloud-based object storage vault storing files, which are served to accessing customers’ distributed datacenters, remote sites and end-points – typically with local caching to speed access. The central cloud repository synchronizes any file state changes. Startups CTERA and Nasuni are two such suppliers, with Egnyte and Panzura also active.

Cloud

CIO Dive - Companies struggle to connect data to customer experience

“The importance of enterprise-wide data hygiene to inform CX efforts can’t be overstated,” Greene said. “CX leaders must be part of the effort to develop the capabilities now to leverage generative AI in the future.”

AI/Data

Datanami - Salesforce Report Highlights Struggles with Digital Transformation: 98% of IT Organizations Face Challenges

IT teams are often responsible for automation adoption, but remain cautious to allow business stakeholders to self-serve — only 22% of IT leaders report that their strategy to help non-technical business users integrate apps and data sources via APIs is up to date. Simultaneously, a skills gap within IT teams poses a hurdle. Closing this gap through strategic collaboration and upskilling is essential for organizations to best use automation for both innovation and efficiency.

Automation & Productivity

CSO - Assessing and quantifying AI risk: A challenge for enterprises

To counter the risks, organizations can thoroughly evaluate their exposure to AI, assess the risks, and set guiderails and mitigation strategies in place to deal with the most business-critical issues. The assessment strategies differ based on the kind of AI that’s involved, which generally falls into three categories: internal AI projects, third-party AI, and AI used maliciously by attackers.

AI/Security

InfoWorld - Most cloud-based genAI performance stinks

Performance is often an afterthought with generative AI development and deployment. Most deploying generative AI systems on the cloud, and even not the cloud, have yet to learn what the performance of their generative AI systems should be, take no steps to determine performance, and end up complaining about the performance after deployment. Or, more often, the users complain, and then generative AI designers and developers complain to me.

GenAI

VentureBeat - 10 reasons why securing software supply chains needs to start with containers

The Cloud Native Computing Foundations’ recent Kubernetes report found that 28% of organizations have more than 90% of workloads running in insecure Kubernetes configurations. The majority of workloads, more than 71%, are running with root access, increasing the probability of system compromises and sensitive data being exposed. Many DevOps organizations overlook setting readOnlyRootFilesystem to true, which leaves their containers vulnerable to attack and unauthorized executables being written.

Security

CIO Influence - Quantum Computing and IT Security: What Leaders Need to Know

Quantum computing, a relatively unfamiliar innovation, is poised to reshape business strategies. Unlike classical computers, quantum computing leverages the principles of quantum mechanics to tackle intricate problems beyond the reach of current technology. Despite not being fully mature, with McKinsey estimating 5,000 operational quantum computers by 2030, comprehensive capabilities for complex problem-solving may not emerge until 2035 or later.

Quantum Computing

Information Week - CEOs Deploy CIOs for Digital Leadership

Progressive CIOs are positioning their CxOs as co-leaders in digital delivery and turning technology decisions into shared leadership initiatives -- a recent Gartner survey of more than 2,400 CIOs found 45% of CIOs are driving the shift to co-ownership of digital leadership.

IT Management

Network World - Will 2024 be Wi-Fi 7’s breakthrough year?

With Wi-Fi 7, channel width expands from 160MHz to 320MHz, effectively doubling throughput, Dion observes. “For short distances, the modulation goes from 1024QAM to 4096QAM, which can improve throughput an additional 20 percent.” Additionally, flexible channel utilization (FCU) enables wider channel use, even in areas experiencing high levels of interference.

Network Management

Network Computing - Understanding SASE Architecture

By converging security and networking functions into a single platform, SASE provides a unified security posture. Solutions encrypt data in transit, leverage the cloud to identify and block threats, and offer several features, such as zero-trust network access and threat detection based on analytics.

Network Management

VentureBeat - How data engineers should prepare for an AI world

Inserting AI into data pipelines can greatly accelerate a data engineer’s ability to extract value and insights. For example, imagine a company has a database of customer service transcripts or other text documents. With a few lines of SQL, an engineer can plug an AI model into a pipeline and instruct it to surface the rich insights from those text files. Doing so manually can take many hours, and some of the most valuable insights may only be discoverable by AI.

AI/Data

Datanami - Cisco’s 2024 Data Privacy Benchmark Study Spotlights Growing Concerns and Trust Issues in Generative AI

Most organizations are aware of these risks and are putting in place controls to limit exposure: 63% have established limitations on what data can be entered, 61% have limits on which GenAI tools can be used by employees, and 27% said their organization had banned GenAI applications altogether for the time being. Nonetheless, many individuals have entered information that could be problematic, including employee information (45%) or non-public information about the company (48%).

Gen AI

VentureBeat - How enterprises are using open source LLMs: 16 examples

But it’s also true that people may have underestimated how much experimentation would happen with open-source models. Open-source developers have created thousands of derivatives of models like Llama, including increasingly, mixing models – and they are steadily achieving parity with, or even superiority over closed models on certain metrics (see examples like FinGPT, BioBert, Defog SQLCoder, and Phind).

AI/LLMs

Information Week - 8 Priorities for Cloud Security in 2024

“We’re seeing just so many problems coming out of the cloud because the rush to [adopt] the cloud moved faster than the trailing effort to secure the cloud,” John Kindervag, Illumio’s chief evangelist and creator of zero trust, tells InformationWeek.

Cloud Security

CIO Influence - Understanding the Complex Implications of AI for Cyber Security

“Organizations should not view AI as a silver bullet, however. Security teams that rely too much on AI can fall into a false sense of security and reduce human vigilance. But AI systems do make mistakes and sometimes fail in unexpected ways.”

Security

Information Week - Top 5 Skills Gaps Every Cloud Practitioner Needs to Close

The most prominent security factors in cloud data breaches, according to CrowdStrike, include unrestricted outbound access, neglected cloud infrastructure, and disabled logging -- roadblocks that can be alleviated with heavier cybersecurity training.

Cloud

VentureBeat - Study finds AI ‘revolution’ moving at a crawl in enterprises

“The survey suggests organizations may be hesitant to adopt GenAI due to the barriers they face when implementing LLMs,” said Markus Flierl, corporate VP for the developer cloud at Intel. “With greater access to cost-effective infrastructure and services, such as those provided by cnvrg.io and the Intel Developer Cloud, we expect greater adoption in the next year as it will be easier to fine-tune, customize and deploy existing LLMs without requiring AI talent to manage the complexity.”

GenAI

Network Computing - AI Drives the Ethernet and InfiniBand Switch Market

While most of the growth in the past in the switch market has come from front-end networks, Sameh Boujelbene of the Dell'Oro Group said in a release: “This rapid growth [of AI] necessitates the deployment of thousands or even hundreds of thousands of accelerated nodes. Connecting these accelerated nodes in large clusters requires a data center-scale fabric, known as the AI back-end network, which differs from the traditional front-end network used mostly to connect general-purpose servers.”

Network Management

CIO Influence - Top Cybersecurity Trends in Healthcare for CIOs in 2024

Data will undergo widespread sharing, collection, and analysis in the evolving healthcare landscape. Healthcare organizations will harness this untapped information to drive operational efficiencies and enhance consumer engagement. As this transformative journey unfolds, there is a growing need for organizations to prioritize data privacy and modernize data protection standards.

Security

Dark Reading - CISO Corner: Deep Dive Into SecOps, Insurance, & CISOs' Evolving Role

An IANS survey found that a full 75% of CISOs are looking for a job change, as expectations for the CISO role have changed dramatically at public and private sector organizations because of new regulations and growing demands for accountability for security breaches.

Security

Information Week - Why a Chief Cyber Resilience Officer is Essential in 2024

Therefore, there is a growing need for efficient and effective responses to these threats that align risk management processes and business goals. Businesses need visionaries with a collaborative mindset and a holistic approach. However, cyber resilience hasn’t traditionally been the exclusive role of either the chief information security officer (CISO), chief information officer (CIO), nor others in the C-suite.

Security

sdxCentral - Decoding the true cost of cyberattacks and the financial forces driving cybercriminals

The report also found that ransomware attacks continue to plague organizations globally, with 71% of surveyed respondents experiencing such cyberattacks last year. Alarmingly, 61% ended up paying the ransom, with the highest average payment reaching $1.38 million. In addition to ransomware, phishing remains a significant threat, with 92% of organizations reporting an average of six credential compromises over the past year. The consequences of these attacks were primarily the loss or theft of sensitive information or a lawsuit.

Security

ZDNet - 90% of IT leaders say it's tough to integrate AI with other systems

IT leaders acknowledge that data silos and systems fragility are holding their companies back. Almost universal, 98% of IT leaders report facing challenges regarding digital transformation. Key drivers are the persistence of data silos at 81% and the fragility of tightly coupled and highly dependent systems at 72%.

AI

Network Computing - Which Cybersecurity Practices Matter Most? The Cyber Insurance Industry Offers Data-Driven Insight

One of the most basic findings of the research is also the most illuminating: About half of cybersecurity insurance providers require regular security assessments of their clients. In other words, they expect their customers to be able to prove, on a routine and recurring basis, that they conform to a variety of security best practices.

Security

Information Week - 3 Key Privacy Trends for 2024

Privacy’s importance can be seen in three trends that will emerge in 2024 at the intersection of privacy and human resources. First, we will see increasing regulation, both in the US and globally. Second, we will see an increasing demand and expectation for transparency around data collection and usage, particularly where AI acts on personal data. Third, we will see increasing adoption of AI in the employment context.

Data Privacy

CIO Dive - CIOs for hire shift focus as clients tackle cyber, AI rollouts

In 2022, Business Talent Group reported an 83% increase in demand for interim CTOs, CIOs, and CISOs between 2020 and 2021. By contrast, the company’s 2023 report, which was based on 2022 data, suggests a mere 9% increase in requests for those technology C-suite interim roles.

IT Management

CIO Influence - Key Takeaways from the 2023 Global Trends AI Report

Notably, the symbiotic relationship between AI/ML and edge computing emerges as a catalyst, unlocking next-gen data-intensive AI use cases. Successful scaling hinges on optimized infrastructure, with AI pioneers prioritizing high-performance computing (HPC) as a critical requirement for AI/ML applications. Enterprises with modern data architectures showcase efficient AI/ML data life cycle management across multiple venues, positioning them for effective AI project scaling.

AI Trends

sdxCentral - How to deal with security risks of end-of-life networking products

NRC noted in the paper that addressing the challenges with end-of-life network products requires understanding the perspectives of both vendors and users: Vendors face technical and financial challenges in providing post-purchase support. Identifying and particularly fixing product flaws after release demands significant time and resources. Supporting a product indefinitely is economically infeasible and some products become too out-of-date to even update it.

Network Management

CIO Influence - Critical Infrastructure Protection: A Primer for IT Leaders

Critical infrastructure encompasses physical and digital assets, core systems, and strategic networks. Recognizing 16 sectors of utmost significance, the Cybersecurity and Infrastructure Security Agency acknowledges that any disruption within these sectors can have profound socio-economic implications. Security teams, therefore, must carefully deliberate on key factors like the evolving threat landscape, system vulnerabilities, diverse threat actors, information sharing, and compliance with regulations to ensure effective critical infrastructure (CI) protection.

Security

The Hacker News - Cyber Threat Landscape: 7 Key Findings and Upcoming Trends for 2024

One example is the fake videos promoting cryptocurrency scams using celebrities such as billionaire Elon Musk and Ethereum creator Vitalik Buterin. The videos use images of these executives at events, but the original lines are replaced by an AI-synthesized voice. The images are only altered to ensure lip sync, which is another function of this type of AI.

Security

Information Week - Quick Study: IT Budgets and Cost Management

Chief information officers and other key stakeholders first need to identify the bleeding tech causing the bloat, then create a roadmap on what aspects of the tech bloat can be reduced.

IT Management

AiThority - AI Reshaping Business Leadership Practices and Workplace Dynamics within the Technology Sector

It highlights the necessity of emotional intelligence in building employee trust and the imperative to address employee burnout. Emboldify’s ‘Top Trends for Tech Leaders’ report identifies the evolution of management practices suitable for the modern workforce and the importance of adaptability and innovation in leadership, as AI continues to revolutionize employee, customer, and user experiences.

Automation & Productivity

Computerworld - 7 ways to leverage genAI for a better career

How much more are AI skills worth (beyond basic job security)? A recent survey by Access Partnership and Amazon Web Services (AWS) found that employers are willing to pay an average of 47% more to IT pros with genAI skills. And those salary premiums don't stop with IT. Companies are also willing to pay 43% more to AI-skilled sales and marketing workers; 42% more to finance, legal, and regulatory employees; 37% more to compliance workers; and 35% more to HR pros.

AI/Jobs

CIO Influence - Offensive Security Significance for Proactive Defense

Offensive Security: Involves a proactive approach to identify vulnerabilities and weaknesses within an organization’s systems. Ethical hackers, or “white hat” hackers, use penetration testing, vulnerability assessments, and other methods to simulate cyberattacks and discover vulnerabilities before malicious actors exploit them.

Security

Network Computing - APIs: The Key to Generative AI Success and Security

Our research shows both LLMs and the apps built to take advantage of them—whether advisors, agents, or assistants—will be deployed both on-premises and in the public cloud. While there appears to be a preference for public cloud, both locations are likely for all components that make up what is emerging as "AI Apps."

AI/API

Data Science Central - How (and when?) to hire a data scientist

Is this person focusing most of the time on understanding the business, identifying additional use cases, and mapping those use cases and business problems to analytical approaches? It matters whether that person is actually sitting down and working with the dirty data to create it in a better shape—which is closer to data engineering. Or maybe they are focusing only on machine learning models and optimizing them, or taking those models and integrating them into other business applications.

Data & Analytics

Information Week - Data Modernization: Turning an Ugly Duckling into a Swan

On corporate boards and in executive suites, there is verbal acknowledgement that without data quality, security, and integration (i.e., data modernization), there can be no artificial intelligence, which all companies want. Unfortunately, modernizing data is unglamorous, painstaking and often difficult to justify for budget funding.

Data Management

CIO Influence - Role of Encryption in Modern IT Security

An encryption system comprises three key components: the data, the encryption engine, and the key management. However, in application architectures, these components are typically distributed to mitigate the risk of compromising the entire system in case of a single component breach.

Security

Network World - AI, 5G and IoT spur edge data centers

Shifting from a centralized to a distributed data center strategy runs counter to the trend among hyperscalers, who are building massive data centers that can house 10,000+ racks and have a capacity of more than 80 megawatts (MW). By comparison, edge data centers are tiny, with a capacity between 500 kW to 2 MW. What they lack in size, they make up for with versatility. They can be deployed practically anywhere: on rooftops, in extreme locations, and in rural, underserved areas.

Data Management

Network Computing - Juniper Acquisition by HPE - What Might it Mean for Enterprise Customers?

From a switching standpoint, HPE may opt to designate Juniper switching hardware and software for the cloud service provider (CSP) segment. Juniper has a stronghold in this space and is a leader in designing and manufacturing custom ASICs. When it comes to the enterprise, however, decisions will need to be made as to whether Aruba will focus on campus edge and smaller data centers. This would include campus switching, Wi-Fi, and SD-WAN technologies.

Network Management

The Hacker News - 52% of Serious Vulnerabilities We Find are Related to Windows 10

The high average numbers of 'Critical' and 'High' findings are largely influenced by assets running Microsoft Windows or Microsoft Windows Server operating systems. Assets running operating systems other than Microsoft, such as Linux-based OS, are present, but these are reported proportionally far less.

Security

CIO Dive - How CIOs can respond to AI vendor red flags

There’s a certain amount of risk that comes with most generative AI solutions. Inaccurate outputs represent one common concern for executives. But CIOs can respond by upskilling employees in fact-checking and encouraging them to deploy a level of skepticism when assessing generated outputs. Other risks, though, aren’t as easily resolved.

Gen AI

CIO Influence - Identity & Access Management: Securing Your Cyber Gates

The statistics underscore the critical need for IAM. A staggering 80% of cyberattacks employ identity-based attack methods, emphasizing the urgency for robust IAM implementation, according to Crowdstrike’s report. Additionally, 3 out of 4 Chief Information Security Officers (CISOs) acknowledge the vulnerability of collaboration tools, with 94% expressing dissatisfaction with the security tools inherent in Microsoft 365, as per the Mimecast report. In this context, IAM emerges as a proactive defense and an essential strategy to navigate the evolving threat landscape.

Security

sdxCentral - Will Ethernet or InfiniBand be the star of data center AI networking?

Some large AI applications are handling trillions of parameters today, and that count will increase tenfold each year. “This rapid growth necessitates the deployment of thousands or even hundreds of thousands of accelerated nodes. Connecting these accelerated nodes in large clusters requires a data center-scale fabric, known as the AI backend network, which differs from the traditional frontend network used mostly to connect general purpose servers,” Boujelbene said.

Network Management

SiliconANGLE - 2024 IT spending outlook shows cautious start with optimistic finish

In addition, methods to reduce cost are shifting. No longer are consolidating redundant vendors and cloud optimization two of the more prominent techniques. Rather, staff reductions, project delays and limiting outside consulting spend are taking over the top spots — perhaps the first being a function of AI deployments.

IT Management

sdxCentral - IT spending to reach $5 trillion in 2024, despite CIO fatigue

Gartner forecasts that IT services will continue to see an increase in growth in 2024, becoming the largest segment of IT spending for the first time, overtaking communications services. Spending on IT services — which in Gartner’s forecast includes consulting, application implementation and managed services, infrastructure implementation and managed services, infrastructure as a service (IaaS) and hardware support — is expected to grow 8.7% in 2024, reaching $1.5 trillion due to enterprises spending on organizational efficiency and optimization projects, according to the research firm.

IT Management

Information Week - 7 Steps to Get Your Data Consolidation Project Off the Ground

It’s important to outline the consolidation project’s goals, Rudy says. Is consolidation an effort to improve data quality, create a new way to leverage data across systems, improve analytics, offload data for cost savings, meet regulatory requirements, or any other specific reason or reasons? “If you want stakeholders to come along on the journey, you’ll need to have clear objectives that make business sense and justify the effort of the consolidation project,” she explains.

Data Management

Information Week - MFA and Misinformation: What to Know About SEC’s X Account Hack

“There's a tendency to view social media accounts as not as important as an administrator account for your IT infrastructure, for example,” says Ropek. “But especially for organizations that do have a large public-facing component … I think there's an argument that says the risk of takeover of these social media accounts is significant and should be taken seriously.”

Security

CIO Influence - Building a Fortified Digital Perimeter with Network Security

Divide and secure your network by implementing Virtual LANs (VLANs) and subnets. VLANs offer segmentation without additional hardware, allowing tailored management for different departments. Subnets, operating at the IP level, enable communication between segmented networks. This strategy becomes crucial with the rise of IoT devices, as proper segmentation mitigates potential threats from these entry points.

Network Security

Network Computing - When the Cloud is the Problem, Not the Answer

If an application uses a lot of resources because it processes big data or renders images – or generates a huge number of metadata operations – it may result in higher cloud billing. Refactoring - making changes to existing applications to optimize them for the cloud, as opposed to taking a "lift and shift" approach - requires the most time and resources upfront, but it also has the potential to lower cloud storage costs. Refactoring balances resource use with demand and eliminates wasteful data bloat. This yields a better and longer-lasting ROI compared to applications that aren't cloud-native.

Cloud

Data Science Central - The future of cloud computing in business operations

Artificial Intelligence (AI) and Machine Learning (ML) are becoming increasingly integral to cloud computing. This integration is revolutionizing how cloud services are delivered and utilized. AI algorithms are enhancing the efficiency of cloud platforms, offering smarter data analytics, automating routine tasks, and providing more personalized user experiences. For instance, cloud-based AI services can analyze vast amounts of data to predict market trends, customer behavior, or potential system failures, offering invaluable insights for businesses.

Cloud

Network World - Who will enterprises trust to guide network transformation?

Over the years, one thing has remained constant, and that is the fact that enterprise IT pros who can’t find a trusted partner will hunker down on the status quo. They’ll reject new technologies, new players, new anything. Does that sound like what you’re hearing, and maybe doing, this year? When you’re asking how to transform networks in a low-trust environment, the answer you hear is likely “You don’t,” and that sounds familiar to many network professionals, too.

Network Management

CIO Influence - Cloud Security Essentials: Safeguarding Your Data in the Cloud

“When it comes to primary ways to protect your organizations against ransomware, the first one is really the most important one. And that’s just good, regular backups of data. And verifying that they work and doing that on a regular basis. Storing backups off site is number two because we find that a lot of backups that are in the cloud are still being hit. So to the extent that you can air gap or isolate your backups completely, that is highly recommended and makes it much much more difficult for the attackers to gain access there.”

Cloud Security

Network World - Dell data-protection report adds genAI to threat mix

Multicloud is still the preferred strategy for organizations for many reasons, not the least of which is avoiding vendor lock in. But data protection in such environments continues to be a major concern, with 79% of IT decision-makers saying they are not very confident that their organization can protect all the data across their public clouds.

Security

Information Week - Why Your Business Should Consider Using Intelligent Applications

When implementing intelligent applications, begin with a solid foundation using cloud-native tools and ensure that strong data hygiene is practiced. “Organizations should federate a company-wide, single source of data and create a set of data governance rules for ingesting and storing information in a way that eliminates duplicative sets,” Christian advises. From there, adopters should consider their business challenges, objectives, and opportunities, then focus on a small set of initial use cases.

AI/Data

Network World - 6 hot networking and data center skills for 2024

“We remain in a skills crisis,” says Paul Delory, research vice president at Gartner. “We’ve been in one for several years, and it has not abated. Lack of skills remains the biggest barrier to infrastructure modernization initiatives.” He adds that organizations struggling to hire outside talent to fill these skills gaps should prioritize efforts to train internal staffers to take on these roles.

IT Management

Network Computing - Tangoe State of IT Spending: A Look Back and Ahead

The large amount of cloud assets being wasted supports my point above regarding the need for clarity around the economics of moving to the cloud. Pay-per-use makes cloud expenses harder to track. Adding to that is the ease of provisioning for IT pros or even line-of-business people to provision new services or turn features on. What might start as a few pennies a day can grow quickly if left unmonitored.

IT Management

SiliconANGLE - Five network security predictions for 2024

Research from a recent Cloud Security Alliance (CSA) report shows a significant rise in investment in SaaS and SaaS Security resources. CSA data indicates a massive 66% of organizations report they have upped their spending on apps, while 71% have increased their investment in security tools for SaaS.

Network Management

sdxCentral - What’s Next: Chris Wright, Red Hat CTO and SVP, talks cloud native and open source

The places where I think people have been really successful … is going back even from the earlier days of cloud net new applications. So something is literally cloud native. It’s built in the cloud with cloud-native principles. Those are the areas. So whether you think that is net new applications or new interfaces to existing applications that might introduce new capabilities to a business. Maybe it’s a new way to engage with your customer base. Those are areas that are that are showing real success.

Cloud

SiliconANGLE - Gartner sees healthy 6.8% growth in 2024 IT spending

In a statement, Gartner Distinguished Analyst John-David Lovelock said consumer spending on devices and communication services plateaued over a decade ago, but “enterprises continue to find more uses for technology. IT has moved out of the back office, through the front office and is now revenue producing,” he said. “Until there is a plateau for how and where technology can be used in an enterprise, there cannot be a plateau in enterprise IT spending.”

IT Management

CIO Influence - CAASM Uncovered: Protecting Your Digital Assets

Gartner defines Cyber asset attack surface management (CAASM) as focused on enabling IT and security teams to overcome asset visibility and exposure challenges. It enables organizations to see all assets (internal and external), primarily through API integrations with existing tools and query consolidated data.

IT Security

Information Week - Quick Study: Optimizing Cloud Spending

The average organization has at least four cloud services, but their cloud spending includes an average of 35% waste. How many of those cloud services are delivering value? Or wasting money?

Cloud

Computerworld - How to create an AI team and train your other workers

“The one thing they’re not increasing at the same level is the investment in training and upskilling their own teams,” Villars said. “That’s about the IT teams and the subject-matter experts. But it’s also just training their employees on better AI behavior and practices so they can protect their information.”

AI

Network Computing - Leveraging Network Support with Non-IT Personnel

Moving more IT to the edge and then adding IoT devices complicates security and makes it easier for bad actors to gain access to networks and cause damage. This risk increases if you have uninformed or under-trained personnel in remote edge sites trying to maintain network health and security.

Network Management

ZDNet - Data is the missing piece of the AI puzzle. Here's how to fill the gap

Among the companies already deploying AI, the key barriers are often related to data, with some organizations taking steps toward trustworthy AI, such as tracking data provenance (37%) and reducing bias (27%). Around a quarter (242%) of companies are seeking to develop their business analytics or intelligence capabilities, which depends on consistent, high-quality data.

AI/Data

VentureBeat - New Deloitte gen AI report: Business leaders concerned about societal impact, tech talent

More than half of business and tech leaders are particularly concerned that the widespread use of gen AI will centralize global economic power and increase economic inequality. In addition, technical talent is seen as the number one barrier to AI adoption, followed by regulatory compliance and governance issues.

Gen AI

CIO Influence - Understanding Data Management in IT Security

Transferring large data requires high-bandwidth networks, posing yet another challenge. Organizations are responding by upgrading to fiber optic cables and adopting technologies like network function virtualization (NFV) to enhance network performance. IT security is a paramount concern in the era of big data, with the volume and variety of data introducing new challenges

Network Management

VentureBeat - How enterprises are using gen AI to protect against ChatGPT leaks

Given how urgent the issue is to solve and how it all pivots on guiding user behavior, many organizations are looking to generative AI-based approaches to solve the security challenge. That’s why there’s growing interest in generative AI Isolation and comparable technologies to keep confidential data out of ChatGPT, Bard and other gen AI sites. Every business wants to balance the competitive efficiency, speed, and process improvement gains ChatGPT provides with a solid strategy for reducing risk

AI/Security

CIO Influence - 5 CIO Leadership Excellence Examples for Every Organization

It is imperative to overcome employee apprehension toward new technology or address a lack of understanding regarding its functionality. Employees may also feel overwhelmed by the myriad of options, making initiating changes challenging.

IT Management

sdxCentral - Google Cloud waives exit fees, will AWS and Microsoft follow suit?

From limiting what vendors customers can work with and increasing prices by five-fold if customers use competing clouds, to limiting interoperability of necessary software with competing cloud infrastructure and treating the multicloud operating model as taboo, customers are experiencing nearly 300% cost increases as a result of anticompetitive practices.

Cloud

Information Week - Merck's Cyberattack Settlement: What Does it Mean for Cyber Insurance Coverage?

The NotPetya malware damaged more than 40,000 of the pharmaceutical company’s computers, leading to major operational disruption, according to Cybersecurity Dive. Its insurers denied coverage on the basis of hostile/warlike action exclusions in their policies. A state appellate court ruled that the exclusion did not apply, and Merck was entitled to approximately $700 million, according to the Bloomberg Law report.

Security

Network Computing - Navigating 2024: Transformative Trends Shaping the Tech Landscape

Network-as-a-Service (NaaS) adoption reaches an inflection point in 2024 as enterprise demand for agile, cloud-like network services explodes. ABI Research predicts that by 2030 more than 90% of enterprises will adopt NaaS for at least 25% of their network services.

Tech Trends

sdxCentral - 7 cloud trends that will define 2024

For that reason, large companies will start to explore how they can simplify their network infrastructure to eliminate wasteful resources while maintaining high-speed performance and connectivity. This is clearly fueling the growth in software-defined cloud interconnects (SDCI) and network-as-a-service (NaaS) which can monitor and maintain a safe and private network on their behalf, making it easier for businesses to operate multi-cloud services through a single management portal.

Cloud

Network World - Marrying network, security operations saves money, bolsters enterprise defenses

Specifically, 43% of those polled pointed to reduced security risk as a benefit, and 40% said operational efficiency is a positive result of the increased collaboration. Some 40% reported the benefit of accelerated mean time to repair (MTTR) of network trouble, and 39% said faster detection/resolution of security issues is a sign of network and security collaboration success.

IT Management

sdxCentral - The hidden cloud fees businesses should watch out for in 2024

Businesses can reduce egress charges through various methods such as optimizing data transfer and analyzing data usage to assess and estimate how much they might be charged. Although, this can become quite technical and time-consuming because the fees are not typically fixed.

Cloud

VentureBeat - Job hunter’s guide to the top cybersecurity companies hiring in 2024

“Another aspect challenging the optimism for job seekers is the decline in resignations to pre-pandemic levels, resulting in a decrease in new hires. This trend signals reduced desperation among employers to fill vacancies, requiring job seekers to intensify their search for promising opportunities. This challenge is exacerbated in high-tech or cybersecurity fields, marked by significant industry consolidation and workforce reductions.”

Tech Jobs

CIO Influence - Enterprise Employee Use of Generative AI Apps Increases by 400 Percent, According to Netskope Threat Labs

While Netskope expects the total number of users accessing AI apps in the enterprise to continue rising moderately next year, there is an emerging population of power users who are steadily growing their use of generative AI apps. With use currently growing exponentially, the top 25% of users can be expected to increase generative AI activity significantly in 2024 as this group finds new ways to integrate the technology into their daily lives.

AI

Network Computing - Wi-Fi Alliance Wi-Fi Certified 7 Program to Drive Deployment

Performance improvements make Wi-Fi 7 ideal for streaming applications and for reducing congestion in crowded environments. As we reported in September, more users can run more bandwidth-intensive and latency-dependent applications without incurring performance problems. An enterprise can support more users with fewer APs, which translates into lower management costs.

Network Management

CIO Influence - Top 10 Digital Transformation Trends for Cloud-Driven Organizations

Organizations in the digital and tech industries encounter the challenge of managing hybrid clouds, multi-cloud architectures, and microservices within a dynamic landscape. Aligning with digital transformation trends, CIOs rapidly adopt new applications, resulting in a backlog of legacy systems requiring retirement. As these technologies become increasingly vital to their mission, businesses expect IT Ops to meet high service-level goals and achieve greater automation.

Digital Transformation

The Hacker News - Getting off the Attack Surface Hamster Wheel: Identity Can Help

This issue doesn't stem from a lack of tools. With each generation of attacks and the emergence of new attack surfaces, a plethora of specialized startups pop up, offering new tools to combat these challenges. Whether it's addressing business email compromise or other threats, there's always a new tool tailored just for the job. It's exhausting, it's expensive and it's just not sustainable.

Security

CIO Dive - How CIOs can overcome ‘AI-washing’ while vetting vendors

The FTC banned Rite Aid from using AI-based facial recognition technology for surveillance for five years as part of a court case settlement announced in December. The agency’s lengthy complaint raised Rite Aid’s obligation to ensure third-party service providers had appropriate safeguards, noting the company failed to obtain adequate documentation of vendor claims.

AI

Network World - IT job growth flattens as economic concerns persist

“Based on our analysis, the IT job market and opportunities for IT professionals are poor at best. In the past 12 months, telecommunications lost 26,400 jobs, content providers lost 9,300 jobs, and other information services lost 10,300 jobs,” said M. Victor Janulaitis, CEO at Janco, in a statement. “Gainers in the same period were computer system designers gaining 32,300 jobs and hosting providers gaining 14,000.”

Tech Jobs

Information Week - Customer Experience Is King, but CIOs Could Do More to Help

The end goal for most IT projects addressing the customer experience is to get these projects out the door on time. Success is measured by the timely completion of tasks. And it is left to the user -- whether it be sales, customer service, a standalone retail business unit, or a call center -- to figure out how the customer experience should present itself to the customer, and to define the business goals.

IT Management

Computerworld - Will super chips disrupt the 'everything to the cloud' IT mentality?

Apple has begun talking about efforts to add higher-end compute capabilities to its chip, following similar efforts from Intel and NVIDIA. Although those new capabilities are aimed at enabling more large language model (LLM) capabilities on-device, anything that can deliver that level of data-crunching and analytics can also handle almost every other enterprise IT task.

Cloud

CIO Influence - CIOs Approach to AI and Automation Adoption

In an industry driven by Artificial Intelligence and automation, CIOs face a critical juncture—an immense challenge and an unparalleled opportunity. Embracing these technologies empowers organizations with efficiency, agility, and a competitive edge. Hesitation risks operational inefficiencies and sluggish responses to market demands.

AI/Automation & Productivity

sdxCentral - Dell reveals data protection risks amid the rise of genAI and multicloud

The report sheds light on another concerning trend that more than half (60%) of the respondents lack confidence in their organizations meeting backup and recovery service level objectives, and 65% doubt their ability to fully recover systems or data in the event of a data loss incident.

Data Management

sdxCentral - 2024 quantum predictions in computing, AI and cybersecurity

Forrester’s 2024 predictions report for tech infrastructure: At least 10% of enterprises will publish post-quantum security plans. Even the most optimistic quantum computing scientists say that practical quantum computing is 10 years away. In 2021, IBM crossed the 100-qubit-per-processor barrier with Eagle; project Condor is targeting 1,121 qubits by the end of 2023, followed by Kookaburra with more than 4,158 by 2025

Tech Trends

Network Computing - Top 10 Reasons to Consider Replacing Your Existing SD-WAN

Even the best-intentioned acquirers still need to “rationalize” and reduce R&D costs, customer support, and channel programs to justify their acquisitions. These changes can disrupt the spirit of the company that built the products, and many teams lose their best people. Plus, as acquirers skimp on R&D or consolidate customer support, the focus on tech advancements, timely product updates, and skilled technical support diminishes.

Network Management

Information Week - The Rise of Dual Ransomware Attacks

These dual attacks can compound the consequences for victims: data encryption and exfiltration and financial losses. The FBI also noted that ransomware groups have been upping the pressure on victims since early 2022, leveraging malware, wiper tools, and custom data theft as negotiation tactics.

Security

CIO Influence - CIOs Budget in Cybersecurity: Essentials and Insights

Data Privacy and Cloud Security: Expected to grow by over 24% year-over-year in 2024, reflecting heightened organizational concerns, especially in response to emerging regulations impacting personal data and AI usage. Predictions indicate coverage for 75% of the global population by modern privacy regulations by 2025.

Security

Network Computing - Ethernet Holds Its Own in Demanding AI Compute Environments

Even with such a major vendor offering solutions in the AI space, many enterprises still want to use Ethernet. Many found that InfiniBand costs more, brings complexity not found with Ethernet, often has interoperability problems working with existing infrastructure, and is only offered by a limited number of vendors. In many cases, enterprises do not have the staff and expertise to use and manage the technology

Network Management

Information Week - What the NYT Case Against OpenAI, Microsoft Could Mean for AI and Its Users

CIOs and other leaders have to consider their enterprises’ use cases for AI and the potential risks. Is there a process in place, or are employees using AI tools on their own initiative? Is an AI model spitting out content that violates copyright law? “If AI-generated content is put into otherwise protected content like a blog post … it threatens potentially the entire blog post,” Campbell explains. “It's high-risk in the sense that you may not be able to gain protection for whatever the output is.”

AI Ethics

Network Computing - The Future of IT Infrastructure: Embracing the Multi-cloud Revolution 

Increasingly, we're seeing customers demanding more customization to get the right results for their projects, and this often means mixing cloud service providers so they can tick off all the requirements they need. For example, some platforms will be better at handling big data, while others could have outstanding AI and machine learning capabilities, so having the option to deploy both together is hugely beneficial.

Cloud

InfoWorld - Why cloud architects are paid well

The trend driving this rise in salaries is the increased premium placed on IT architecture or on those who not only know how to configure a cloud solution but most of what IT is responsible for. Architecture needs to span all systems, and those who are knowledgeable only about cloud systems, sometimes just a single brand, provide a diminished benefit.

Tech Jobs

Forbes - The Role Of People In Cybersecurity: Balancing Best Practices And Trust

In the first half of 2023, it was found that compromised credentials were the root cause in 50% of attacks, which makes it clear that organizations need to go beyond the implementation of cybersecurity solutions and go a step further to keep their data safe.

Security

CIO Influence - Crucial Role of CIOs in Data Management

CIOs are pivotal in defining a data strategy, a blueprint aligning an organization’s business goals with its data assets. Positioned between the overarching business strategy and data governance, this plan leverages data for maximal business impact.

Data Management

Information Week - Align IT With the Business

IT must still overcome its back-office reputation. Although digitalization is on every CEO’s mind, IT still has a decades-old reputation as a back-office cost center to contend with. This makes it difficult for CIOs to reposition IT as a strategic, forward-looking function that can produce revenue and strategic results.

IT Management

Network World - Should AI initiatives change network planning?

If enterprises are looking for a kind of lightweight large-language-model approach to AI, that would mean that the number of specialized AI servers in their data center would be limited. Think in terms of a single AI cluster of GPU servers, and you have what enterprises are seeing. The dominant strategy for AI networking inside that cluster is InfiniBand, a superfast, low-latency, technology that's strongly supported by NVIDIA but not particularly popular (or even known) at the enterprise level.

AI/Network Management

sdxCentral - Why successful SASE implementations rely on consultants and professional services

Mackay said that after the market evaluation, organizations will then typically go down one of two routes: Either they will approach the vendors directly (with some form of RFI / RFP process) or they will turn to a consulting firm to give them direct advice. Mackay noted that what is common in all of these different ways of looking at the market landscape is that they will want to run a  detailed proof of concept process with a shortlist of vendors, primarily to prove that the marketing hype is matched by the technology reality.

Security

Network Computing - Encrypted Traffic: The Elephant in the Room for a Successful NDR Strategy

There has been ongoing dialogue among IT decision-makers on the increasing need for network-based visibility. However, with more than 95% of all Internet-based traffic being encrypted, there is a need for real-time decryption as a requirement for a successful Network Detection and Response (NDR) strategy, which is somewhat of the elephant in the room among IT professionals.

Network Management

VentureBeat - Forrester identifies biggest barriers to generative AI success

The leaders also emphasized that they already have use cases in the pipeline. More than half of the respondents said they have identified multiple potential applications of the technology, including enhancing customer experiences (64%), product development (59%), self-service data analytics (58%) and knowledge management (56%).

Artificial Intelligence

CIO Influence - Applying Cost Consciousness to AI Innovation

Companies without strong cloud data cost governance will continue to see their cloud data costs skyrocket, while the data leaders who are proactively thinking about (and addressing) governance of their cloud data costs will be the cloud data cost “winners.” This means implementing the proper guardrails to identify and correct bad code, configuration issues, data layout problems, and oversized resources in the development stage—before going into production.

AI/Cloud

VentureBeat - Microsoft Copilot app is a stealthy AI launch that you should pay attention to

But under the hood, Copilot is powered by some of the most advanced AI around — we’re talking GPT-3.5 and even the new beefed up GPT-4 in certain modes. This isn’t your grandpa’s chatbot. Copilot can understand context, follow complex conversations, and generate hyper-realistic text and images using tools like DALL-E 3.

Artificial Intelligence

The Hacker News - 5 Ways to Reduce SaaS Security Risks

As technology adoption has shifted to be employee-led, just in time, and from any location or device, IT and security teams have found themselves contending with an ever-sprawling SaaS attack surface, much of which is often unknown or unmanaged. This greatly increases the risk of identity-based threats, and according to a recent report from CrowdStrike, 80% of breaches today use compromised identities, including cloud and SaaS credentials.

Security

VentureBeat - Cybersecurity New Year’s resolutions every enterprise leader (and user) should make

Still, it’s just important to integrate MFA in a way that presents the least amount of friction, experts advise. For instance, implement it only when extra authentication will help protect sensitive data and critical systems. The use of pass-through authentication and single sign-on (SSO) tools will also reduce password fatigue.

Security

AiThority - Experts Discuss HR & Future Of Work Predictions For 2024

“Currently, companies deliver standardized training across their workforce or employee segments in like-roles because it’s not scalable to tailor it to individuals. Often, we see the same training applies to senior, long-tenured people-leaders as it does junior-level staffers who are still early in their careers. Generative AI capabilities will vastly reshape how organizations build training personalized to each employee. It will also help organizations automate coaching, making it more efficient to deliver individualized support based on the precise needs of each employee.

Automation & Productivity

Information Week - 10 IT Trends to Watch for This Year

“2024 won’t just be about integrating AI into business operations. On the contrary, it’ll be a race to build an IT-first workforce that can capture the most value from AI tools,” says Charles Chow, Head of Marketing at Lumen Technologies Asia Pacific.

Tech Trends

Network World - Is it time to change your backup system?

I can't tell you how many times I've fixed "slow backup software" with better configurations - cleaned up snapshots, reduced unneeded redundancy or scope, tweaked multiplexing or network settings. If you think shiny new products inherently perform faster, you might be surprised. External issues such as bad disk layouts, cluttered repositories, and overtaxed hardware will tank speed no matter what software you run.

Data Management

InfoWorld - Using generative AI to overhaul data integration? Start here

Whether or not IT departments are involved in activating every tool, they often end up supporting them in one way or another. Not to mention the work it takes to integrate all these systems together to standardize operations and reporting from a source of “data truth.” In fact, according to a survey report on how the economy has affected the typical IT workload, respondents indicated that 48% of their time is spent integrating new applications and platforms.

IT Management

InfoWorld - 4 key devsecops skills for the generative AI era

“Developers, testers, and business analysts should learn how to write prompts [and learn] where generative AI does well and where it falls down,” says David Brooks, SVP and lead evangelist at Copado. “Adopt a ‘trust but verify’ mentality where you actually read all of the generated content to determine if it makes sense.”

AI/DevOps

CIO Influence - How Security Culture Will Define Success in the Era of AI

Some cybercriminals are also seizing the chance to weaponize AI to develop more insidious scams and create AI-manipulated content, such as voice cloning. If organizations don’t have the proper guardrails and defenses in place, they’ll be left vulnerable and potentially allow bad actors to gain access to sensitive information. Furthermore, if left untrained, employees may unintentionally misuse the technology and fuel bias or insider risk.

AI/Security

InfoWorld - How to unlock C-suite support for application modernization initiatives

A recent independent study by EvolveWare on the State of Application Modernization found that 40% of IT team respondents said that boosting productivity is a top priority for modernization, alongside retiring mainframe infrastructure (37%), and reducing the dependency on legacy code (36%).

IT Management

SC Media - Four ways companies can respond and more effectively comply with the SEC’s new cybersecurity rules

CISOs are at an important crossroads. Because of the existing scope and scale of ransomware and the growth of cybercrime, this is no time to stop paying attention to incident detection and response (IDR). CISOs must examine IDR processes and adopt aggressive target metrics such as zero dwell time while they shift their mindset and approach from one of adversary-oriented to risk management and business-oriented.

Security

VentureBeat - The password identity crisis: Evolving authentication methods in 2024 and beyond

While the concept has been talked about for some time, it has yet to be fully realized because it is complex to incorporate, particularly when it comes to legacy systems that already have numerous security controls in place. But with the increased growth of AI built-from-scratch ‘greenfield’ systems, experts say that 2024 will be the year zero trust becomes real.

Security

ITPro Today - Gartner Breaks Down GenAI: Is It Overhyped or a Game-Changer?

Within IT, there are three key business functions for which GenAI is being adopted, according to Chandrasekaran. "The first and foremost is in software engineering, where GenAI models are helping developers write code faster and even complete code within their environments," he said.

Artificial Intelligence

CIO Influence - Comcast Study Emphasizes Cybersecurity’s Significance in Remote Work Longevity

Nearly all surveyed companies (99%) foresee a heightened need for managed cybersecurity services. These services provide a security overlay to extend data protection, with disaster recovery and business continuity being the top-rated services (43%). Guidance from experts (40%) and managed detection and response (36%) are also high on the priority list as organizations seek comprehensive security solutions in their expanded remote work capacity.

Security

VentureBeat - Why attackers love to target misconfigured clouds and phones

“Novel exploits (zero-days) or even new uses of existing exploits are expensive to research and discover. Why burn an expensive zero-day when you don’t need to? Most bad actors can find a way in through the “front door”– that is, using legitimate credentials (in unauthorized ways).”

Security

Network Computing - Why Secure SD-WAN is a Pillar of Enterprise Cybersecurity

Modern enterprises often use various cloud providers for different infrastructure and application needs. This multi-cloud approach lets them select the best offering for different areas of their business, lock in the best prices, and improve user experience. Despite the benefits, this type of environment is complex to manage and challenging to secure. SD-WAN has emerged as the solution of choice for multi-cloud organizations because it provides an application-aware network infrastructure with uniform policies while simplifying management and reducing costs.

Network Security

sdxCentral - How a global telecom company relies on AI and ML for network management

Human analysis is critical to the process, because “you can have a poorly performing circuit that’s consistent,” he said, and machine-based anomaly detection won’t necessarily pick up on that because it doesn’t have reasoning skills.

Network Management

SiliconANGLE - Here are the major security threats and trends for 2024 – and how to deal with them 

Over the past year, there were many things written about gen AI, ranging from Chicken Little to miracle cancer cures. One noteworthy comment comes from Check Point Software Inc.’s blog: “Hackers will see cloud-based AI resources as a lucrative opportunity. They will focus their efforts on establishing GPU farms in the cloud to fund their own AI activities.”

Security

VentureBeat - 11 data predictions for AI-centric enterprise growth in 2024

SQL is a database language that lacks a standardized approach to procedural logic which, for most applications, is embedded within an application server connected to a SQL database using a stateful, persistent session. This design approach for SQL made sense 50 years ago, but it is a painful legacy for modern, connectionless cloud services

AI/Data Management

Information Week - CIOs Battle Growing IT Costs with Tools, Leadership

She adds CIOs can optimize IT spend by implementing more rigorous, strategy-aligned software approval processes aimed at avoiding duplicative spend and ensuring contracts are rightsized for the business needs.  

IT Management

DarkReading - Why CISOs Need to Make Cyber Insurers Their Partners

To mitigate the losses driven by macro-view-based policies, insurance applications have become significantly more complex and require detailed conversations, interviews, and site visits, with the goal of creating a tailored policy. Organizations often are required to meet specific threshold conditions, such as utilizing multifactor authentication and endpoint detection and response capabilities, and must pass an “outside-in” scan of their environment, which is done by a neutral third party.

Security

VentureBeat - 16 Cybersecurity leaders predict how gen AI will improve cybersecurity in 2024

“It could improve by the ability to pick up patterns (like attack patterns or an emerging CVE or just certain behaviors that indicate an attempted breach or even predicting that the L3 DDoS attack is a distraction for the credential stuffing they are missing). I also think that AI will make it more difficult, too. Detectors can’t tell the difference between a human-generated and AI-generated phishing attack, so they’ll get much better,” Silva said.

AI/Security

sdxCentral - 6 steps to help CIOs keep their IT team happy (spoiler alert: think SASE)

IT professionals are often caught in a cycle of mundane activities, leaving them feeling unchallenged. Instead of having IT teams fill the time with endless maintenance and monitoring, CIOs can focus their IT teams on work that achieves larger business objectives. SASE automates repetitive tasks, which frees up IT to focus on strategic business objectives. In addition, the repetitive tasks become less prone to manual errors.

IT Management

VentureBeat - AI moves from theory to practice, zero trust gets real, and other 2024 predictions from Dell CTO

Dell, for instance, has roughly 380 AI-related ideas in the pipeline, he noted. But even as a large enterprise, the company probably only can handle just a handful of those. As he put it, enterprises might rush to do the first four projects on their lists — ultimately outpricing the fifth, which could have been the truly transformative one.

Tech Trends

CIO Influence - CIO Influence Predictions Series: Importance of AI and Anticipated Increased Use Of Visual Technology

With AI, in 2024, we will be able to process these documents in real time and also get good intelligence from this dataset without having to code custom models. Until now, a software engineer was needed to write code to parse these documents, then write more code to extract out the keywords or the values, and then put it into a database and query to generate actionable insights. The cost savings to enterprises will be huge because thanks to real-time AI, companies won’t have to employ a lot of staff to get competitive value out of data.

AI/Data & Analytics

Computerworld - USB-C explained: How to get the most from it (and why it keeps on getting better)

In other words, the older rectangular USB Type-A plugs we are so used to are slowly going the way of the dinosaur. This evolution is happening faster in some arenas than others. For example, the latest Mac Pro desktop has no fewer than eight USB-C ports for anything from sending video to a display to charging a phone.

Automation & Productivity

SiliconANGLE - The rise of observability and why it matters to your business

Full-stack observability is the capability to discover the real-time status of each technology stack component in a distributed IT environment. It involves holistically viewing cloud-hosted applications, services, infrastructure, on-premises IT, K8s (there’s your O11Y hint) infrastructure and more. O11Y uses telemetry data such as metrics, logs, traces and other information from the entire IT environment to provide complete end-to-end visibility to understand the connection and dependencies among IT components.

IT Management

Information Week - 5 Things You Can Do Today to Prepare for 2024’s Security Threats

There are not many things in IT that are entirely predictable, yet it’s a sure bet that network attackers will continue their nefarious activities throughout 2024. Fortunately, by being proactive, it’s possible to fortify your organization against cyberattacks. Here are six key insights, collected via email interviews, of the actions you can take right now to gain an upper hand on cybercriminals.

Security

Network Computing - 10 SD-WAN Providers & Solutions to Consider in 2024: An Overview

A software-defined wide-area network (SD-WAN) is a virtual WAN architecture that's service provider-agnostic. This allows enterprises to leverage any assortment of transport services to securely link to desired applications. The list of transport services includes broadband Internet, Multiprotocol Label Switching, and Long-Term Evolution (wireless).

Network Management

sdxCentral - Network management changes as observability spans multicloud

Security-related enhancements and cloud migrations lie behind much of the product activity in the area. Overall, the industry segment continues to address issues of cost, complexity and information volume that go hand in hand with log management’s wider use in the multicloud dominion.

Network Management

The Hacker News - Cost of a Data Breach Report 2023: Insights, Mitigators and Best Practices

According to Etay Maor, Senior Director of Security Strategy at Cato Networks, "We tend to talk a lot about security issues and solutions. This report puts a number behind threats and solutions and provides a lot of information to support claims of how a threat actor, a solution or a process impacts you financially."

Security

TechRepublic - Top 7 Cybersecurity Threats for 2024

Additionally, fileless attacks, where attackers use stolen credentials purchased on the Dark Web to gain access to systems without leaving behind traditional malware traces, are one of the biggest trends to look out for. And zero-day brokers — cybercrime groups selling zero-day exploits on the Dark Web to multiple buyers — are becoming increasingly prevalent.

Security

Network Computing - The Dawn of Universal Zero Trust Network Access

Universal ZTNA is a new concept. Given where the industry is going and the growing need to merge networking and security, with the emergence of the hybrid workforce, the idea will evolve and become a must-have technology soon. If you are on the frontline, a network leader, or an enterprise architect, now is the time to start researching and planning

Network Management

Information Week - Hot Jobs in AI/Data Science for 2024

“In 2024, we’ll also see the war for cyber and software development talent grow more contentious as a result of major privacy concerns and savings-driven budget reallocations born from the generative AI boom,” Hodjat says.

Tech Jobs

sdxCentral - How SASE tackles multicloud implementations, complexity

SASE is going to provide the “on-ramp into the different clouds a company might be using,” McGillicuddy said. As such, it can provide safe access to global points of presence (POPs), route traffic via SD-WANs, and apply services such as secure web gateways, cloud application security brokers,  firewall services and some things that you may not see on today’s hype cycles.

Cloud Security

CIO Influence - Understanding ISMS: A Comprehensive Overview

The crux of the ISMS framework centers on the meticulous evaluation and administration of risks. It operates as a structured methodology, delineating a balanced equilibrium between mitigating risks and the associated costs. Industries entrenched in rigorous regulatory landscapes like healthcare or finance often demand expansive security measures and robust strategies for mitigating risks. This necessitates a comprehensive scope of security activities within their ISMS framework.

Security

Network World - Cisco 2024: AI adoption will drive network modernization, data-center evolution

"GenAI will also be leveraged in B2B interactions with users demanding more contextualized, personalized, and integrated solutions," Centoni stated. "GenAI will offer APIs, interfaces, and services to access, analyze, and visualize data and insights, becoming pervasive across areas such as project management, software quality and testing, compliance assessments, and recruitment efforts. As a result, observability for AI will grow."

AI/Network Management

Government Executive - AI is a rising priority for federal chief data officers

“Advanced analytics, master data management, data integration, API strategies — all are going to help position those building blocks for really leveraging and driving ethical and explainable AI,” King said.

AI/Data Management

Computerworld - What leading Apple-in-the-enterprise execs expect in '24

"We first noticed the trend with mobile devices as frontline workers in industries like healthcare, aviation, and retail transitioned to iPhones and iPads as the primary computing device for some customer-facing roles. And on the Mac, we saw tremendous growth in the use of cloud identity services, indicating that the Mac is increasingly being used to access critical online services and data.

Automation & Productivity

Computerworld - Choosing a genAI partner: Trust, but verify

Logic and common sense have not always been the strengths of senior management when on a mission. That means the IT question will rarely be, “Should we do GenAI? Does it make sense for us?” It will be: “We have been ordered to do it. What is the most cost-effective and secure way to proceed?”

Artificial Intelligence

Network Computing - Signs That a Network Technology Has Outlived Its Usefulness

Frequent failures or incompatibility with newer systems are also key warning signs, he adds. "Most network managers are adept at spotting obsolete technologies, but challenges arise in balancing legacy systems with the need for innovation, often constrained by budgetary and operational considerations."

Network Management

SiliconANGLE - New report warns of a rise in AI-generated email fraud and phishing attacks

The report discusses several instances of AI-generated attacks detected by Abnormal, such as malware delivery attempts posing as insurance companies, Netflix impersonation for credential phishing, and invoice fraud by impersonating a cosmetics brand. The attacks use sophisticated language and lack the usual signs of phishing, such as grammatical errors, making them more convincing to potential victims.

Security

ITPro Today - Why FinOps Is a Pivotal Cloud Trend in 2023

Instead, it's cloud FinOps — a strategy that emphasizes cloud cost optimization. As of 2023, FinOps is exerting major influence on the way many organizations approach cloud computing. It has arguably become more important to cloud strategies than concepts like multicloud or hybrid cloud, key trends from years past.

Cloud

Forbes - Navigating The Cybersecurity Landscape In 2024: Anticipating Challenges And Opportunities

Artificial intelligence (AI) and machine learning (ML) will play an increasingly prominent role in cyberattacks in 2024. Expect cybercriminals to leverage AI and ML to automate and enhance their capabilities, making attacks more sophisticated and adaptive. Cybersecurity professionals must harness the power of AI themselves to stay one step ahead of these evolving threats.

Security

CIO Influence - Three Reasons an Organization’s CISO Should be Independent of its CIO

A key motivator for organizations to separate the CISO from the CIO is to provide that CISO with greater management responsibility and control over the cybersecurity program. This removes potential friction with the CIO over things such as budgetary constraints or security strategies. Further, an independent CISO ensures that cybersecurity remains an organization-wide priority, and security strategies align with broader business objectives – not just broader IT initiatives

Security

VentureBeat - How to protect unmanaged devices in today’s zero-trust world

When a contractor is onboarded, they often get access to shared productivity apps. As many organizations don’t have a process to delete a contractor’s access by cloud app or resource, credentials can live on for years – even decades – and lead to intrusion and breach attempts.  

Security

Information Week - How to Select the Right Industry Cloud for Your Business

“Strive to preserve flexibility and the ability to innovate,” he advises. The market is rapidly evolving, and monolithic implementations are giving way to user-friendly building blocks that are continuously improved. “These are proving to provide the greatest advantage,” Campbell observes.

Cloud

Network Computing - The Network’s Growing Strategic Role

“In our experience, companies that invest time and energy to understand their networks and collaborative relationships greatly improve their chances of making successful organizational changes,” said McKinsey. “Sophisticated approaches can map networks and identify the key points of connectivity where value is created or destroyed.”

Network Management

sdxCentral - Trellix CEO outlines how to educate employees on genAI risks

“I think the best way to do it is to have a policy and a regulated standard and then have some standardization,” Palma said. For instance, companies should procure enterprise licenses for approved genAI tools and allow IT teams to assess and ensure their security. This strategy is preferable than blocking these tools, as employees might seek unapproved alternatives, he added.

Artificial Intelligence

AiThority - Sonata AI & Cloud Rule 2024 IT Investments: Rackspace Survey

The survey also underscores the continued adoption of the cloud. When asked about the makeup of their organization’s IT infrastructure and how it will evolve over the next 12 months, edge computing, private cloud, and public cloud increased as a percentage of workloads, while data centers, colocation facilities, and mainframes declined.

IT Management

VentureBeat - The CISO risk calculus: Navigating the thin line between paranoia and vigilance

As the late Kevin Mitnick wrote, “as developers invent continually better security technologies, making it increasingly difficult to exploit technical vulnerabilities, attackers will turn more and more to exploiting the human element. Cracking the human firewall is often easy.”

Security

The Hacker News - Unmasking the Dark Side of Low-Code/No-Code Applications

While low-code/no-code (LCNC) apps and robotic process automations (RPA) drive efficiency and agility, their dark security side demands scrutiny. LCNC application security emerges as a relatively new frontier, and even seasoned security practitioners and security teams grapple with the dynamic nature and sheer volume of citizen-developed applications.

Security

Information Week - Clock Starts on SEC Cyberattack Rules: What CISOs Should Know

“Cybercriminals have shown that if they are willing to control the timeline, they are able to prompt people into action,” Pierson says. “If you tell people that we will expose your data within seven days unless you pay us -- that creates a time clock and a scenario where the power goes to the cybercriminal.”

Security

TechBullion - Big Data Analytics 101: Understanding the Basics and Benefits

It is the process of examining and uncovering patterns, trends, and insights from large and diverse datasets. Unlike traditional data analysis methods, Big Data Analytics deals with datasets that are too complex or massive to be processed by conventional data processing applications. This field leverages advanced analytics techniques, including machine learning, statistical analysis, and predictive modeling, to extract valuable information from vast pools of data.

Data & Analytics

CIO Influence - AI for Network Management Strategies in 2024

Customer patience is wearing thin and businesses are doing all they can to keep up with demands, most notably implementing AI more prominently in their workflows. In the networking space, AIOps, which is the use of AI to automate and streamline IT operations tasks, will be the biggest use case for AI in 2024.

AI/Network Management

Information Week - Data Leaders Say ‘AI Paralysis’ Stifling Adoption: Study

“I do think there’s a disconnect between the CIO and CDO and the chief executive. We should not, in the data and technology space, expect people to understand the layer of complexity that we have to deal with. What we should be doing is taking that complexity and creating a story and a narrative, so it makes sense to the other people in our organization and businesses we work with.”

AI/Data Management

sdxCentral - What is AI networking? Use cases, benefits and challenges

AI networking seeks to transform traditional IT operations and make networks more intelligent, self-adaptive, efficient and reliable. The technology uses machine learning (ML), deep learning, natural language processing (NLP), generative AI (genAI) and other methods to monitor, troubleshoot and secure networks.

AI/Network Management

Network World - How to lock down backup infrastructure

It’s the worst nightmare for those of us advocating backups as a ransomware recovery tool. If the last line of defense is taken out of the game, it defeats the whole reason we built the system in the first place. If hackers are able to delete or encrypt backups, or the backup server operating system itself, you will find yourself in an unenviable position.

Security

sdxCentral - Deloitte on Tech: Top cloud computing trends to expect in 2024

Much needs to be done to support this rise, though, including sizing systems for genAI. This means typically supporting training data with more database storage and keeping the storage of both structured and unstructured data. In many instances, enterprises will look to combine that data before it becomes training data, and that will likely work in the public clouds, given the ease of provisioning and scaling of cloud-based platforms.

Cloud

ITPro Today - State of Web Development Report Details Composable Architecture Benefits

Biilmann noted that developers are wary of a wide breadth of risks when it comes to AI implementation. Seventy percent are concerned about erroneous outcomes, and over half believe that leveraging AI can lead to new security issues and confidential data leaks. Fortunately, developers are already discovering best practices to help mitigate these risks, he noted.

DevOps

Blocks & Files - 2024 IT management trends: It’s generative AI and everything else

In 2024, GenAI will accelerate workload placement trends, with organizations reckoning with how and where to run large language models (LLMs) that fuel their GenAI applications. Some IT decision makers will choose public services.

IT Management

Information Week - 10 Ways to Run a Very Lean IT Operation

Use IT retirees. There are some excellent IT professionals who are retired and simply “sitting on the bench” and waiting to be called. One approach some small companies have used with some success is to advertise for IT help in particular tech areas, such as networks or systems. These companies often receive resumes from “old hand” IT retirees who have done these tasks for many years, don’t need much income, but are looking to stay active with IT. These retirees also can be excellent trainers of internal IT staff members.

IT Management

Computerworld - Making sense of genAI pricing in office apps

While it’s standard for software vendors to price similar services at different levels as they vie for market share and profitability, the relative novelty of generative AI brings some specific challenges. On one hand there’s the compute cost to process user queries and how quickly this cost might fall. Then there’s the question of what benefits these tools will actually provide to customers and, ultimately, how much organizations are willing to pay.

Automation & Productivity

Network Computing - Building Resilience in Uncertain Times: The Power Of Connected Networks

Connected networks are sophisticated peer-to-peer networks linking an organization with its stakeholders—suppliers, partners, customers, and competitors—across processes, systems, and geographies. They allow every stakeholder to see exactly how different parts of the ecosystem interact and impact the customer experience and business outcomes. This single-pane view creates opportunities for better decision-making for more economic leverage.

IT Management

CSO - AI dominates cybersecurity megatrends for 2024: Report

The top deck (first four) of the list included AI-related trends that SIA expects will make a substantial impact in the segment in the coming year. Topping the list was AI security, which refers to the cybersecurity practices for the protection of data, IP, and corporate integrity with the adoption of AI into businesses of all sizes.

AI/Security

Datanami - IDC Reports Robust Growth in Public Cloud Services with $315.5B Revenue in First Half of 2023

Software as a Service – Applications (SaaS – Applications) continued to be the largest source of public cloud services revenue, accounting for nearly 45% of the total in 1H23. Infrastructure as a Service (IaaS) was the second largest revenue category with 20.4% of the total while Platform as a Service (PaaS) and Software as a Service – System Infrastructure Software (SaaS – SIS) delivered 18.0% and 16.9% of overall revenue respectively.

Cloud

VentureBeat - How ConductorOne’s Copilot Improves Identity Governance with AI

Managing user and machine identities in multi-cloud environments is among their teams’ most challenging tasks. The most challenging areas of managing identities in a multi-cloud environment include getting permissions right while eliminating orphan accounts, monitoring access privileges and reducing the risk of stolen privilege access credentials.

AI/Security

Network Computing - Why Simple Cloud Computing Architectures May Be Better

It's not hard to understand why the typical organization today is attracted to cloud architectures that are more complex than necessary. Continuous improvement and endless optimization have become key mantras of the IT industry. If you were to suggest that a simple cloud architecture meets your organization's requirements and that there's no need to invest in more complex cloud setups or services, you'd probably sound unimaginative at best, or lazy and out of touch at worst.

Cloud

CIO Influence - Major Market Trends and Disruptions CIOs Must Be Ready for in 2024

With the launch of ChatGPT at the end of 2022, 2023 ushered in peak hype around AI. Vendors rapidly reacted to the stunning user adoption rates of ChatGPT by introducing their own versions of “generative AI” into their software, whether it involved real machine learning, LLMs, NLP, etc. – or if it was all smoke, mirrors, and buzzwords. There are some legitimate and very exciting uses of generative AI, but some marketers would lead you to believe its powers are far more ubiquitous than it really is – at least for the moment.

Tech Trends

Network Computing - The Transformational Impact of Continuous Network Assessments

As a result, it's common for organizations to only conduct network assessments every few years – often driven by compliance mandates – frequently spending hundreds of thousands of dollars on outside consultants who take weeks or months to conduct them. Even worse, the labor-intensive assessments being conducted today are typically based on representative sample data rather than comprehensive observation of the live network. What this means is today's assessments only provide a glimpse of the actual network as it was at some point in the past, not an accurate, up-to-date, detailed view.

Network Management

Datanami - Privacera Unveils AI and Data Security Governance Predictions for 2024

“In 2024, we expect a large influx of innovations by enterprises of every scale adopting and deploying generative AI, and using sensitive data to train the underlying AI and Large Language models,” says Balaji Ganesan, co-founder and CEO, Privacera. “This transformation can only be successful with a unified data security governance strategy in place, and requires data leaders to apply controls to both, sensitive data and AI, in a consistent and scalable manner.”

AI/Security

CIO Influence - Role of LLMs and Advanced AI in Cybersecurity: Predictions from HP Inc. Executives

AI-powered security solutions for risk analysis, predictive intelligence, and identity and access management assist cybersecurity teams with unmatched ability to safeguard their digital infrastructure. However, there’s no guarantee that AI alone can protect everything your organization owns or stores. CIOs still lack 100% visibility into what their cybersecurity postures look like and what kind of preparedness is required to thwart a sophisticated cyber attack led by ransomware and zero-day attack vectors.

Security

VentureBeat - Protecting against new Kubernetes threats in 2024 and beyond

A wave of new attacks targeted Kubernetes in 2023: Dero and Monero crypto miners, Scarleteel and RBAC-Buster. Finding an initial foothold with a web app vulnerability, then moving laterally is the hallmark of a Kubernetes attack. Understanding the reality of these attacks can help protect your organization from current and future attacks targeting Kubernetes.

Security

CSO - Almost 50% of organizations plan to reduce cybersecurity headcounts: Survey

The report revealed that smaller organizations are struggling on multiple levels to incorporate security observability as part of their security systems. They lack the resources to hire the right people to use the security tools. However, this also makes them prudent about spending, thus ensuring they avoid hype-driven adoption of the products. On the other hand, large organizations have access to a wide range of tools and products, but they struggle to integrate them for optimal performance.

Security

DarkReading - Municipalities Face a Constant Battle as Ransomware Snowballs

Sophos reported that more than a quarter of state and local government organizations (28%) in its survey admitted to making a payment of at least $1 million or more when it came to ransoms, a massive increase compared with the 5% that made that large of a payment in the 2022 data. Of the organizations whose data was encrypted in an attack, 99% got their information back, with 34% reporting that they paid a ransom and 75% relying on backups.

Security

CIO Dive - There will be a surplus of tech workers by 2026, executives project

As technology skills expand throughout the enterprise, nearly three-quarters of IT leaders say it’s more important for employees to have multiple skills than specialization. Creativity, emotion and critical thinking are the top contributions of the human workforce in a talent market shaped by AI.

Tech Jobs

Information Week - 10 Hot Technology Developments Right Now

In many ways the technology story of 2023 was all about artificial intelligence. In fact, in this list of hot technology trends, almost all relate in some way to AI. That begs the question of whether we’ll eventually stop calling out AI as a separate thing or if all technology will just incorporate AI in some way.

Tech Trends

Network World - Gartner: Just 12% of IT infrastructure pros outpace CIO expectations

Another key action incorporates enhanced analysis capabilities to measure the effectiveness of their programs and investments. While in uncertain economic times, I&O leaders must maximize the impact of technology. "According to the survey, 89% of leaders in highly effective I&O organizations formulate strategies for process transformation and optimization, and 82% identify opportunities to reduce technology costs through economies of scale or cross-enterprise synergies," Gartner says.

IT Management

Network Computing - Overspending on SaaS? 6 Ways to Cost Optimization

Before starting with cost optimization, you must first analyze where you’re overspending. Start with a thorough spend analysis using a spend management platform. Identify all your SaaS applications, licenses, associated costs, and the ROI they generate.

IT Management

Information Week - Massive Okta Breach: What CISOs Should Know

Okta recommends customers take several immediate steps to defend against potential attacks from the breach, including securing administrator access through multi-factor authentication (MFA), “admin session binding” that requires admins to reauthenticate in certain instances, “admin session timeout” set to a default of 12-hour session duration and 15-minute idle time, and phishing awareness.

Security

CIO Dive - Talent woes among top barriers to generative AI ambitions

Among the most in-demand positions for companies currently using the technology are AI programming and data analysis. AI talent leaving major tech providers isn’t enough to meet demand across industries, according to the firm.

Artificial Intelligence

CIO Influence - Building a Strong Data and Analytics (D&A) Strategy with a Culture Mindset

According to a McKinsey survey, 14% of C-level leaders spend 70 percent of their time making decisions. In most cases, these decisions are based on inefficient models. This inflates the cost of decision-making. Reliable data search and discovery tools improve the accuracy of the decision-making, with added layers of compliance and privacy guarded by a strong data governance framework.

Data & Analytics

Datanami - 10% of Organizations Surveyed Launched GenAI Solutions to Production in 2023

The survey highlights other challenges that might be causing a slow adoption of LLM technology in businesses, such as lack of knowledge, cost and compliance. Of the respondents, 84% admit that their skills need to improve due to increasing interest in LLM adoption, while only 19% say they have a strong understanding of the mechanisms of how LLMs generate responses.

AI/LLM

sdxCentral - Deloitte predicts genAI, specialized computing, industrial metaverse will top 2024 trends

Those technologies include generative AI; spatial computing and the industrial metaverse; moving beyond brute force compute to specialized compute; the evolution to DevEx; securing against innovative attack methods; and evolving from technical debt to technical wellness.

Tech Trends

CIO Influence - Cloud Optimization Strategies for Navigating Cloud Evolution in 2024

In this evolving landscape, the need for enhanced support from the ecosystem has become increasingly evident. Cloud providers rely heavily on various partners, including SIs, Independent Software Vendors (ISVs), and Resellers. These partners bring a crucial capability to the table: the ability to implement and integrate cloud solutions with existing environments, addressing use cases that enterprises struggle to tackle independently.

Cloud

CIO Influence - Featured Story of the Week: 2024 Enterprise Storage Trends for CIOs

Combining resilience (the ability to instill defensive security measures to repel attacks), detection (the ability to know when data is corrupted and whether a known good copy of data is free of ransomware or malware), and recovery (the ability to bounce back) from cyberattacks is the key to hardening storage infrastructure.

Data Storage

sdxCentral - What’s Next: Soni Jiandani, CVP of networking at AMD talks AI, DPUs and finding needles in the haystack

AI is going to have a dramatic impact on networking technology. It is ultimately changing everything. Your success with AI will depend on whether your infrastructure is able to support such powerful applications and the demands it makes. And while the cloud is emerging as a major resource, many enterprises have to also rely on the on-premise environments to accommodate for things like big data storage. Do I have enough? Can it scale with my models and AI-generated data from a networking infrastructure point of view

Network Management

SiliconANGLE - Analysis: Cisco brings AI capabilities to its revamped security portfolio

My research shows that enterprise-class companies have, on average, 32 security vendors. This is the average, and I’ve seen some companies with many more than this. I did some work with one of the government agencies, which had more than 200 vendors. One of the engineers there confessed there is so much paranoia around security that they deploy almost every point product from every startup to be more secure. The problem is, with security, more isn’t better, as keeping policies up to date is impossible across dozens of vendors

Security

Information Week - Security Questions to Ask After the ZeroedIn Breach

He says organizations should ask to what extent they must work with third-party suppliers and understand the security risk that they take on by using those services, whether it is software, data, or services. “It’s not enough that third party says, ‘Oh yeah, I am certified,’” Maor says. “Certification does not equal security.”

Security

Network World - 5 ways to boost server efficiency

Older servers are less energy efficient than new ones, says Jay Dietrich, Uptime Institute’s research director of sustainability. For example, Intel servers’ efficiency improved by 34% between 2017 and 2019 for CPUs running at 50% utilization, according to a recent report he co-authored. And AMD-based servers saw a whopping 140% improvement, he says.

IT Management

Government Executive - USDA unveils its new data strategy

The new strategy contains five areas of focus: data governance and leadership, data and analytics workforce, common data and analytics, open data architecture, and purposeful analytics.

Data & Analytics

Computerworld - The arrival of genAI could cover critical skills gaps, reshape IT job market

More than a quarter of those surveyed, however, called genAI a fad, comparing it to Meta’s recently launched Threads app — an upstart competitor to X/Twitter. “These leaders stated that they believe Gen AI to be just another fad [that] challenges for dominance quickly and then dies off just as fast,” the Kaspersky study said.

Automation & Productivity

CIO Influence - Future of Data Integration: How AI is Changing the Blueprint for Businesses

By unearthing these hidden connections, organizations gain a competitive edge, fuelling innovation and driving transformative change. As generative integration continues to evolve, it’s clear that it’s not just about simplifying the integration process – it’s about paving the way for a future where data-driven decisions are made with unparalleled clarity and confidence.

Artificial Intelligence

Forbes - How Can Businesses Make Sure That Their Cybersecurity Operations Are Robust?

Primarily, my focus will be on addressing questions such as "What are the essential components of your cybersecurity checklist?" and "How can you identify potential vulnerabilities within your systems?" Consider this a go-to, threat-proof checklist that guards your business against potential risks with proactive security measures at any time.

Security

VentureBeat - Breaches happen: It’s time to stop playing the blame game and start learning together

Unfortunately, the overwhelming reaction to such an incident is to ostracize the victim. In fact, up to 83% of consumers admit that they pause or end their spending with an organization after an incident. While understandable, that reaction misses the opportunity the industry has to learn and grow together after details of an incident become available.

Security

SiliconANGLE - Three strategies to develop edge skills in your organization

A common pitfall I&O leaders run into is to assume that the entire organization needs the same level of skill sets and expertise for edge implementation and operations. Edge implementations require diverse and specific skills, which makes it harder for an organization to be at the same expertise level. As a result, even if they have clarity around the skills needed for implementing these technologies in their organization, I&O leaders are unable to ensure the skills are in place before starting an edge initiative

Edge Computing

Forbes - 19 Tech Experts Bust Common Cybersecurity Myths And Misconceptions

The myth is that cybersecurity training is going to help everyone get smarter about security. The truth is that security training videos with a quiz at the end do not mitigate risk; they just add to people’s never-ending to-do lists. What we really need are tools that connect cybersecurity risk to specific activities as a way to help people practice better security hygiene.

Security

Government Technology - Cybersecurity Trends Point to More Sophisticated Attacks Ahead

Ultimately, turning the tide against ransomware means getting attackers to see the crime as more trouble than it’s worth. Recent years saw some states consider whether banning cyber extortion payments could help get us there. Federal officials said this year they’d been mulling whether to enact a widespread payments ban, though some cyber experts say such a move could involve painful short-term side effects and administrative challenges.

Security

TechBullion - Why should businesses outsource cybersecurity

The technicians are essential introductions to the day-to-day development landscape of cyberspace and technical engineers and technicians in cybersure security roles are often the gateways to mssps of mssps. who gets the benefit of the processes and techniques Potential threats are identified before they escalate, reducing the impact of cyber incidents This proactive approach to cyber security is industry practices meet, and provides companies with a strong defense against emerging threats.

Security

CIO Influence - CIO’s Roadmap to Aligning AI with Organizational Culture and Operations

A few tasks can be entirely automated with AI; however, in most instances, AI will enhance these tasks. Its role in democratizing access to knowledge will render services offered by knowledge workers more economical, thereby fostering increased demand and job opportunities. Gartner predicts creating over half a billion new human jobs by 2033 by introducing AI solutions for task augmentation or autonomous task delivery.

Artificial Intelligence

AiThority - Scality’s 2024 Predictions: AI, Hybrid Cloud and Ransomware Detection Will Define the Data Storage Landscape, While Hard Disk Drives Live On

Some all-flash vendors prognosticate the end of spinning disk (HDD) media in the coming years. While flash media and solid state drives (SSDs) have clear benefits when it comes to latency, are making major strides in density, and the cost per GB is declining, we see HDDs holding a 3-5x density/cost advantage over high-density SSDs through 2028.

Data Storage

Information Week - New Secure AI Development Rules are Historic, But Do They Matter?

These new guidelines are primarily directed at AI systems providers, whether those systems are built from scratch or on top of services provided by others. But the document authors urge all stakeholders to read the guidelines to help them make informed decisions about how AI is used in their organizations.

Artificial Intelligence

eWeek - Persistent Systems CTO Pandurang Kamat on Generative AI in the Enterprise

“The other concern is around AI ‘hallucinations, as they’re known, where these models can start making up things not backed by facts – that becomes a big concern. But there are a slew of grounding tools that have emerged and continue to get better. Additionally, there are a number of techniques, a series of very scientifically-based techniques, that you can use to ground and control these hallucinations.

Artificial Intelligence

Forbes - Doing More With Less: Cybersecurity Tools And Budget Efficiency

In an industry like cybersecurity that’s full of confusing acronyms and new products that vendors promise will improve your organization’s security, it’s easy to get swayed into spending money on products you don’t actually need. Now more than ever, it’s critical that companies look inward to optimize the cybersecurity tools they already have, using a mathematical, fact-based approach.

Security

VentureBeat - Generative AI is reshaping knowledge work. Are you ready?

As an IT leader, your company’s velocity and nautical mileage for adopting new solutions will vary. Yet even if gen AI holds great promise there is a sizeable gap in the number of technology tools available and the capabilities of employees to put them to use.

Artificial Intelligence

InfoWorld - The evolution of multitenancy for cloud services

These days we are focused on new, faster processors and reduced power consumption. More gains can be obtained by better optimizing the systems that manage how the processors and storage systems are allocated to tenant processes. If I were the CTO of a cloud provider, I would start there and then move to the CPUs and I/O systems, which are more important.

Cloud

SiliconANGLE - Amazon CTO Werner Vogels architects a more frugal future for the enterprise cloud 

“There is new AI and old-fashioned AI,” Vogels noted. “You should keep in mind that not everything needs to be done with these large language models. AI makes predictions, professionals decide.”

AI/Cloud

Computerworld - Super apps: the next big thing for enterprise IT?

“Super apps are designed to sit on top of the library of mini apps that have specific functionalities that users can download and use,” Helmer said. “Users can pick and choose and personalize their experiences by enabling some mini apps, which all have a similar user interface, and removing the ones that they don’t really care about.”

Automation & Productivity

CIO Influence - Is Private Cloud the Game-Changer CIOs Have Been Seeking?

Previously seen as a legacy-heavy, poorly managed, and outdated system lacking modern cloud architecture, the private cloud carried a stigma of high costs and inefficiencies. However, recent advancements have transformed this perception. Present-day private cloud infrastructure matches its public counterpart’s sophistication and operational efficiency, excelling notably in specific scenarios.

Cloud

Forbes - Unpacking The New SEC Cybersecurity Rules: What Every CXO Needs To Know

Prior to the SEC ruling, cyber was already becoming a bigger priority in the boardroom, though this new development has certainly heightened its visibility. Now, board members and CXOs must not only be aware and knowledgeable on cyber, but they must be able to understand the potential business impacts of a cyber breach, all within the context of managing cyber risk.

Security

TechRepublic - Gartner: By 2028, 70% of Workloads Will Run in a Cloud Computing Environment

“If there’s one fundamental area for enterprises, it is that you need to go house-by-house or closet-by-closet to really look at your application portfolio and decide what is best to do with it, what can be replaced what needs to be replatformed and what needs to be refactored,” Smith said.

Cloud

The Hacker News - Discover Why Proactive Web Security Outsmarts Traditional Antivirus Solutions

To be clear, we're not denying that an antivirus-approach solution is ideal for detecting and responding to threats, but there's no escaping the fact that it's limited by design: it's reactive. A traditional antivirus-approach solution flags known malicious signatures once they're already in your environment, so it only acts when detections match the signatures in its database.

Security

Network Computing - How to Speed Cyberattack Discovery

When deploying human-based threat-hunting capabilities, it’s helpful to think about the parallels to physical security leading practices, Morris says. “For example, human security guards, tasked with protecting critical assets, constantly inspect physical infrastructures and maintain the integrity of their responsible spaces by actively patrolling and investigating,” he explains. “The less static, routine, and predictable a defensive team is, the harder it is for attackers to anticipate defenders’ actions.”

Security

AiThority - Kolide Survey Finds 89 Percent of Knowledge Workers Use AI, But Businesses Fail to Provide Governance or Education

68% of companies allow AI use: There is a significant gap between the percentage of employees allowed to use AI (68%) and those who actually use it (89%), indicating a lack of oversight and scrutiny on AI-generated work.

Artificial Intelligence

Network Computing - Understanding Cisco’s Generative Artificial Intelligence Strategy 

Cisco’s approach to AI is multifaceted and deeply integrated across its portfolio. A key element of Cisco’s evolution toward gen AI is the development of Silicon One, a chip designed to handle massive workloads. Silicon One supports Cisco customers and hyperscalers in building AI-based infrastructure, encompassing advanced technology, data center networking, and optics.

Artificial Intelligence

Network World - Is anything useful happening in network management?

All 169 said they are interested in AI for network management, and 30 said that they have identified at least one option. Only 9 said that they have a budget for their identified option in 2024, and all of them reported a common problem with AI in network management--the problem of scope. Here, they mean two kinds of scope: the extent to which AI is specialized to their own network data, and the range of devices that AI can actually see.

Network Management

sdxCentral - Inside a new CISO’s first 90 days: How to start strong

Baer pointed out that many enterprises claim to be “flat” with complete lines of communication to leadership, “but the reality is all organizations have hierarchy,” as well as formalities and rituals, of sorts. It’s important to be clear on who makes decisions around business priorities, budgeting and hiring and firing.

IT Management

Automation.com - Five Cybersecurity Trends to Expect in 2024

Quantum computing is advancing rapidly, so forward-thinking cybercriminals will be stealing encrypted data that they cannot unlock with today’s technology but that they might soon be able to decrypt. The top targets will be organizations with large volumes of sensitive data, such as government and defense agencies, financial and legal firms, and large corporations with valuable intellectual property. To reduce risk, organizations should not treat encryption as a panacea but instead build a multi-layered strategy that includes data classification, risk assessment and mitigation, and incident detection and response.

Security

InfoWorld - Are we too focused on vendors? 

Are we too vendor-focused in the cloud computing market? A better question is, are vendors leading us down the wrong paths? Indeed, instead of tackling the core problems at hand, we’re distracted by the new features and the excellent new tools that are, if we’re honest, more fun to look at than solving actual problems.

Cloud

Datanami - New Dremio Report Highlights Surge in Data Lakehouse Adoption for Enhanced Cost Efficiency and Analytics

Amid the generative AI frenzy, a quieter revolution has been taking place: Open table formats—a foundational component of data lakehouses—are bringing full SQL functionality directly to the data lake. This enables organizations to move away from decades-old data warehouse architectures and their associated inefficiencies.

Data & Analytics

sdxCentral - Databricks CISO details how to shepherd a data and AI journey at scale

“They’ve heard the scary stories about AI can cause harm, and when their business wants to utilize AI, they don’t know if it’s in that tiny minority of AI that could likely cause harm, or if it’s in the majority that wouldn’t,” he said. “Security people tend to have a low tolerance for risk just instinctively. And so they’re likely to respond with ‘We shouldn’t do it’.”

AI/Security

VentureBeat - How generative AI will enhance cybersecurity in a zero-trust world

CISOs and CIOs continue to weigh the benefits of deploying generative AI as a continuous learning engine that constantly captures behavioral, telemetry, intrusion and breach data versus the risks it creates. The goal is to achieve a new “muscle memory” of threat intelligence to help predict and stop breaches while streamlining SecOps workflows.

AI/Security

CIO Influence - The Impact of AI on Security Issues

A manipulated data set changes the way the AI will respond to a query for anything related to the data. The input data drives the response and if the data is changed, then the response would change. So if someone wants to provide misinformation to an audience, they just need to change the input data with the misinformation

AI/Security

The Hacker News - Experts Uncover Passive Method to Extract Private RSA Keys from SSH Connections

In other words, a passive adversary can quietly keep track of legitimate connections without risking detection until they observe a faulty signature that exposes the private key. The bad actor can then masquerade as the compromised host to intercept sensitive data and stage adversary-in-the-middle (AitM) attacks.

Security

DarkReading - Researchers Undermine 'Windows Hello' on Lenovo, Dell, Surface Pro PCs

By default, Windows Hello requires that fingerprint readers are "match-on-chip" (MoC), as opposed to "match-on-host" (MoH). MoC means that they have microprocessors and storage built in, eliminating the need to process and store sensitive biometric data on the host computer. That way privacy is maintained, even if the host is compromised.

Security

Information Week - How to Avoid Security Concerns While Implementing Automation

A recent survey reports that the majority of automation projects fail to take off due to their complexity. For those that do manage to reach the execution stage, there is a 50% chance of them failing. A vast majority of business leaders are not happy with their robotic process automation (RPA) implementation speed.

Automation & Productivity

sdxCentral - How to navigate the private network adoption market

This number of choices is good for those that need it, but can be daunting for a decision-maker who is tasked with picking a long-term private network path for a large-scale organization. This difficulty is further enhanced by the private network market’s lack of maturity, which means a decision made today could run into a support void tomorrow.

Network Management

Network Computing - Candy Alexander Explains Why Bandwidth and Security are Both in High Demand

"Again, it's data that has become more important than ever before. One of the biggest challenges of providing ubiquitous secure access is that users now need to be able to access data from anywhere, at any time, and on any device. This can be difficult to manage due to several factors, such as the ever-increasing volume of data and the velocity at which it is generated."

Network Management

sdxCentral - DNS at 40 keeps improving with better security

“RFC 9461 provides the mapping for the DNS service type, allowing DNS servers to offer alternative endpoints and transports, whereas RFCs 9462 (DDR) and 9463 (DNR) provide endpoints with the capability to discover encrypted resolvers,” Campling explained. “This means that endpoints are not reliant on software having resolver details hard-coded into them and should support much greater choice, ultimately benefiting users.”

Network Management

SiliconANGLE - How IT teams can empower every individual to drive their own productivity 

When so many business functions require implementation support, and there aren’t enough technical skills or IT people to address everyone’s needs, many companies are stuck in stop-and-go business patterns. As the demand for automation increases, IT leaders should take a new approach to scaling it across their functions — one that’s composable, accessible, and user-driven.

IT Management

sdxCentral - Gartner names 5 leading access management platforms

Gartner identifies the must-have capabilities including a directory or identity repository for users; identity administration for integrated applications basic life cycle management and profile management capabilities and the system for cross-domain identity management; SSO and session management, compatible with standard identity protocols and APIs for accessing standards-based and legacy apps; and user authentication including commodity MFA and authorization enforcement.

Security

SiliconANGLE - Managing in 2024: How generative AI will scale insight

In addition to this scaled human insight, gen AI may also scale itself, aggregating siloed information into an overall depiction of the business in all its complexities and dependencies, such as the production process, supply chains or external economic events. Insights from one part of the company, such as marketing or manufacturing, can be scaled to a new type of collective insight.

Artificial Intelligence

VentureBeat - How to apply natural language processing to cybersecurity

The overlap between NLP and cybersecurity lies in analysis and automation. Both fields require sifting through countless inputs to identify patterns or threats. It can quickly process shapeless data to a form an algorithm can work with — something traditional methods might struggle to do.

Security

SiliconANGLE - Cloud security continues to give IT managers headaches. Here’s why 

The reports show that despite reams of details on best security practices, organizations don’t do well with their implementation, follow-through or consistent application. For example, consider well-known practices such as the usage of complex and unique passwords, collection of access logs and avoidance of hard-coded credentials.

Security

VentureBeat - Generative AI is a toddler — don’t let it run your business

Cutting-edge technology and young kids may initially seem completely unrelated, but some AI systems and toddlers have more in common than you might think. Just like curious toddlers who poke into everything, AI learns through data-driven exploration of huge amounts of information. Letting a toddler run wild invites disaster, and as such, generative AI models aren’t ready to be left unattended either.

Artificial Intelligence

SC Media - Veterans are the key to the cybersecurity talent shortage

Industry-specific knowledge also becomes invaluable, particularly for IT organizations competing for business in the military or other government branches. Security clearances are often a prerequisite for doing business with government entities, and veterans transitioning to the private sector with these clearances in hand can give their new employers a competitive edge.

Tech Jobs

Network Computing - Is Your Infrastructure Ready? What You Need to Know Ahead of an AI Investment 

There are skills, technologies, and practices that need to be put in place to successfully see a return on your AI investment. The AI tech stack is still forming, but it is rapidly shaping up to include a broad range of technologies and capabilities that many organizations today do not possess.

Artificial Intelligence

CFO - CFOs Must Boost Their Cybersecurity Savvy, Former FBI Agent Says

Today’s executives need to change their mindset and take the time to become cyber savvy, said Cordero. So what does a CFO well-trained in cybersecurity look like? “I define [them] as an executive who understands the different facets of cybersecurity as an enterprise risk,” Cordero said.

Security

TechCrunch - 3 skills could make or break your cybersecurity career in the generative AI era

In addition to its benefits, generative AI introduces data security and privacy concerns that we can’t disregard. While candidates should know how to use this technology to their advantage, they must also understand how large language models (LLMs) can leverage and compromise organizations’ internal data. Unsurprisingly, nearly half of executives worry that the integration of generative AI will result in new attacks against their AI models, services, or data.

Security

CIO Influence - Evolving Cyber Threats: AI’s Role in Reshaping the Landscape

The importance of AI in cybersecurity cannot be overstated. It acts as a proactive shield, not merely reacting to known threats but actively anticipating and adapting to emerging risks. By leveraging machine learning algorithms, AI systems continuously refine their understanding of evolving attack vectors, enabling security teams to fortify their defenses preemptively.

Security

The Hacker News - How Multi-Stage Phishing Attacks Exploit QRs, CAPTCHAs, and Steganography

By concealing malicious links within QR codes, attackers can evade traditional spam filters, which are primarily geared towards identifying text-based phishing attempts. The inability of many security tools to decipher the content of QR codes further makes this method a go-to choice for cybercriminals.

Security

Dark Reading - Detection & Response That Scales: A 4-Pronged Approach

"When you operate completely silent and disjointed, it puts your teams completely out of touch with your organization and inhibits their ability to work side by side with partner teams," he says. "The detection capability doesn't scale. We need the rest of the organization to be in lockstep with us and working alongside us — that's what defines a modern detection and response approach."

Security

InfoWorld - A cloud professional’s cloud predictions for 2024

Second, generative AI is getting most of the attention in the cloud space. As I stated before, cloud conferences are now generative AI conferences as cloud providers see a huge windfall in cloud services to support net-new generative AI systems. Generative AI systems need an enormous number of resources compared to other stuff.

Cloud

Forbes - In Promoting Cybersecurity, Everyone Has A Role

 Nearly every day we learn about a cyber intrusion or creative way that either criminal organizations or state actors are exploiting vulnerabilities. Just last month, researchers discovered a cheap streaming device that came with secretly installed malware right out of the box, which then served as a node in an organized crime scheme.

Security

DarkReading - IT Pros Worry Generative AI Will Be a Major Driver of Cybersecurity Threats

Even with generative AI making the list of top three cybersecurity threats over the next 12 months, it was clear from the report that generative AI is viewed as both a positive and negative development. Respondents say generative AI would increase productivity (43%), ensure the business is more protected against cyber threats (42%), and ensure employees are trained in cybersecurity fundamentals (36%). On the negative side, there are fears that generative AI will open new avenues for attack (67%) and put businesses at greater risk of attacks (58%).

Artificial Intelligence

sdxCentral - How standards will eliminate SASE and zero-trust confusion

Because SASE encompasses both networking and security, it can require a change in how organizations think about security when considering SASE’s integrated approach. The mixture of solutions from different vendors in different departments can lead to siloed thinking and mismatched skill sets between networking and security teams. It is important that a common language set is defined to create tight coupling among these teams. A fragmented vendor ecosystem and lack of common terminology underscores this need.

Security

Forbes - Three Questions To Ask Third-Party Vendors About Cybersecurity Risk

Search for providers that not only have well-defined security policies and procedures in place but are also transparent about these practices. This means the vendor provides public access to their security policies and procedures, and their policies address all aspects of cybersecurity, including incident response, data security and vulnerability management.

Security

Information Week - To AI Hell and Back: Finding Salvation Through Empathy

Dante needed guides to help him on his journey through Hell. In the modern AI landscape, Iannopollo said, business leaders will need their own guides. “Welcome to the nine circles of Hell,” she told the audience. “This is the place where AI hallucinates, where AI produces bias and discrimination … Hell is the place where IP abuse and privacy violations and security breaches happen.”

Artificial Intelligence

Network Computing - Spider-Man, the Multiverse, and IPv6

Many versions of Linux and Windows now prefer IPv6. Beyond that, embedded versions of Linux are common in IoT devices, and these devices have proliferated across environments. If you are not engaged with that plane when these IoT devices reach out to your network requesting an IPv6 address, you may not even know. It's not unusual for organizations to have a considerable number of these rogue devices that are generally unmanaged, which creates risk within the organization.

Network Management

Datanami - Redpanda Unveils State of Streaming Data Report on Industry Trends, Ecosystem Components and Challenges

The report shares what’s driving companies to migrate their systems from batch processing to real-time systems and the challenges they face. Based on a third-party survey of 300 engineering organizations familiar with streaming data, the report is the first comprehensive, independent study on the current state of the streaming data industry.

Data Management

Information Week - Top US Gov’t CISO Details Zero-Trust Strategy Race

"The things we’ve been talking about for the past decade and working about … it’s all happening to us right now. We needed to figure out how we’re going to galvanize and try to insert energy and focus into federal agencies to really drive forward on the things that we’d been working on for well over a decade. But we were struggling to make meaningful progress.”

Security

Datanami - HPE Research Highlights Rising Challenges in Meeting Enterprise Data Demands

For many organizations, AI will put their IT organizations at a crossroads. Capturing value from data to thrive in the era age of AI-enabled insight will require enterprises to rapidly mature their approach to hybrid cloud and how they store, manage and protect data across its lifecycle.

Data Management

CIO Influence - Shining a Spotlight on User Identity and Device Trust in Cybersecurity

While the rising volume of cyberattacks in financial services and across other industries could be due to increasingly sophisticated cybercriminals, this is largely a misconception. The truth is that hackers are using many of the same tactics they’ve been successfully employing for the last decade, the majority of which are aimed at exploiting user identities or compromising endpoint devices (PCs, laptops, phones, etc.). However, today’s cybercriminals have the advantage of a range of toolkits that open up hacking to “entry-level” threat actors with minimal technical skill

Security

Information Week - The IT Jobs AI Could Replace and the Ones It Could Create

Knowledge base managers and data scientists will be essential roles for enterprises as more and more data is fed into large language models (LLMs). “It's still a garbage in, garbage out problem, and if AI will now do more of our work, what we feed them is more important than ever,” says Katz.

Tech Jobs

CIO Influence - Unlocking the Code: Key Differences Between Networking and Cloud Computing

Cloud networking involves orchestrating and delivering network resources and services utilizing cloud infrastructure. Serving as a form of IT architecture, it empowers organizations to establish connections among users, applications, and data irrespective of their geographical locations. The versatility of cloud networking manifests in its ability to form private cloud networks—segregated from the public Internet—and public cloud networks, accessible to anyone with Internet connectivity

Network Management

Computerworld - The end of the standalone application

That said, in the world of Linux, we still have "our" software. I'm writing this on LibreOffice; when I need to work with images, I use GIMP; and instead of Outlook for e-mail, I use Evolution. Of all the major software vendors in the Windows world, only Microsoft has continued to offer standalone software.

Automation & Productivity

CIO Influence - Discover Business Intelligence’s Transformative Role in CIO Leadership

Business intelligence tools have revolutionized the way organizations access and analyze data, making it possible to harness a wealth of information that would have been impenetrable and indecipherable otherwise. In this context, the Chief Information Officer (CIO), who is responsible for managing all the organizational-level information, plays a pivotal role. By leveraging previously untapped data sources and employing advanced BI techniques, a CIO can drive transformation across multiple facets of the organization, fueling its journey toward a data-driven and future-ready future.

Data & Analytics

Information Week - Balancing Act: Knowing When AI’s Risk is Worth Reward

In the near term, GenAI will be very attractive for senior-level workers, Mellen said. “Ultimately, generative AI and security tools are going to be very useful for those folks who are experienced and more senior level because they have been itching for a tool that is going to help them validate what’s happening in the environment and respond faster.”

Artificial Intelligence

SC Media - Gone phishing: Hackers leverage automation to launch MFA attacks and SEO poisoning

We’ve seen cybercriminals turn to real-time MFA-bypassing solutions, like “in-the-middle” techniques, MFA fatigue, and OAuth consent phishing. In fact, these types of “in-the-middle” techniques are some of the most frequently-observed methods used to gain access to MFA-secured networks in 2023

Security

Network Computing - A Threat Actor’s Playground: Why Security Teams Must Decrypt HTTPS Traffic

Yet many security teams do not enable decryption at the firewall due to the potential complications it can present. Decrypting and then re-encrypting traffic passing through a gateway requires considerable compute resources, including next-gen firewalls (NGFW) or unified threat management (UTM) appliances, and can impact network performance.

Security

sdxCentral - Do answers to AI infrastructure challenges lie in networking, not GPUs?

“We are the network operating system that can straddle switching and routing; that can straddle cloud, telecom service providers and enterprise; that can bring efficiencies inside the core of a data center, between data center capacities and between GPU clusters; and then extend that into the edge of the network,” Ayyar said.

Network Management

Network Computing - The Bottom Line on Upcoming Non-Terrestrial Network (NTN) Services

A year ago, the focus was on how much time it would take big-name players such as Iridium, SpaceX, OneWeb, AST, Viasat, Amazon (Project Kuiper), and others to launch enough LEOs into space to build constellations of birds to be considered viable for enterprise IT. Delays have slowed some players, such as Amazon, which recently launched its first two LEOs for its internet service into space recently. But by comparison, Musk's SpaceX has launched thousands and is offering services internationally.

Network Management

The Hacker News - The New 80/20 Rule for SecOps: Customize Where it Matters, Automate the Rest

As more vendors attempt to challenge the dominant players in the SIEM category, demand is increasing for solutions that offer automation, which can cover 80%, while also offering customization capabilities to cover bespoke use cases - the remaining 20%.

Security

Network Computing - QoS in the Era of Pervasive Video and Edge Apps

Among vendors in the end-to-end network QoS space are Fortinet, Solarwinds, ManageEngine, and others, as well as Opensource providers like OpenNMS. The focus is on providing a single network management framework that can address QoS while also reducing the number of different tools from assorted vendors that network analysts use. The tradeoff for sites using a single, overarching set of tools is that they might sacrifice some network management autonomy and risk vendor lock-in by going for an all-in-one solution.

Network Management

The Hacker News - When Email Security Meets SaaS Security: Uncovering Risky Auto-Forwarding Rules 

SaaS applications are part of the modern supply chain, and as such they should undergo proper vendor risk assessments and user access reviews prior to connecting them to company data. With Shadow IT, breached applications, non-compliant applications or malicious applications go unnoticed.

Security

Information Week - Considering a Career as an IT Hardware Engineer?

“There are free tools, such as KiCaD, that allow the hobbyist community to thrive alongside professionals. “Even at the high school level there are many associations and clubs, such as FirstRobotics, where students can learn through hands-on experience.”

Tech Jobs

sdxCentral - AT&T: Our network is the ‘next killer app’

“To date in the wireless industry, and surely in the telecom industry, the connectivity networks have really been closed boxes where partners would provide to us a system that worked great. It was all integrated hardware, software and applications in that system and if you needed help with it you generally had to call the partner: ‘hey, Cisco; hey, Nokia, Ericsson, can you help me with this?’ We’re really working on breaking that up into open disaggregated networks.”

Network Management

CIO Influence - As Companies Eye Generative AI to Improve Productivity, Two-thirds Admit to GenAI-related Security or Misuse Incidents

The newness of these programs is likely why. While the majority (84%) of respondents have invested or are planning to invest in GenAI, 71% of these GenAI operations were launched within the last two years, and nearly half (49%) were launched in just the last 12 months. Of those respondents whose businesses have adopted AI, 85% are concerned about its privacy and security risks.

Privacy & Security

sdxCentral - HPE program makes, not takes, cybersecurity talent

“With this mindset, the talent pool becomes an ocean,” Ford said. “In the two years that we have been doing this, I can say confidently that we have discovered people with unique and valuable experience who would most certainly have been overlooked had we employed conventional hiring methodologies.”

Tech Jobs

CIO Dive - 5 OpenAI, ChatGPT updates for CIOs to watch

Companies can create tailored versions of ChatGPT, called GPTs, within the tool’s app for a specific task without any coding knowledge. Once created, users can publish the GPTs for public use or share them only for a company’s internal use.

ChatGPT

eWeek - 20 Top Artificial Intelligence Certifications 2023

AI certifications demonstrate understanding and competence in various aspects of AI, such as machine learning, natural language processing, computer vision, robotics, and AI software.

Training & Certs

sdxCentral - Why IPv6 matters for SD-WAN and why vendors are certifying their products

“While there is continued migration to IPv6, at times, it does require an upgrade or replacement of hardware and software,” Sheu said. “This includes upgrading routers, switches, and other network equipment as well as updating software.”

Network Management

Computerworld - Q&A: ServiceNow CIO sees an 'iPhone moment' for genAI

ServiceNow is now implementing genAI through an internal pilot program. Leveraging its own platform and third-party LLMs, the company has gone live with 15 genAI pilots across multiple departments, including customer service, IT, HR, and sales.

Artificial Intelligence

Information Week - Getting Aggressive with Cloud Cybersecurity

With cloud native infrastructures deployed across the enterprise, typical endpoint and intrusion detection tools are not sufficient to identify attacks or vulnerabilities in a non-VM infrastructure, cautions Accenture Federal Services’ cyber chief technical officer Dave Dalling via email. “Real-time automated responses can quickly shut off attacks and prevent lateral movement through credential stealing and role escalation.”

Security

Computerworld - It’s time to take your genAI skills to the next level

A new study found that employees with skills in artificial intelligence (AI) can earn salaries as much as 40% higher than peers without AI skills. But the real value, they found, was combining AI skills with a wide range of other skills. The secret to commanding higher salaries is something called “complementarity” — the ability to combine valuable non-AI skills with AI skills

Tech Jobs

Network World - 2024 network plans dogged by uncertainty, diverging strategies 

It seems that in 2023, all the certainties CIOs had identified in their network planning up to now are being called into question. That isn’t limited to networking, either. In fact, 82 of 83 said their cloud spending is under review, and 78 said that their data center and software plans are also in flux. In fact, CIOs said their network pressures are due more to new issues relating to the cloud, the data center, and software overall than to any network-specific challenges.

Network Management

Network Computing - Unlocking IT Success: Navigating Talent Shortages with Integrated Solutions

This predicament poses a potential roadblock to a company’s progress. The solution lies in integration. Rather than bringing together disparate, one-off solutions to address various technology needs, IT teams that opt for a unified approach by obtaining hardware, software, and services from a single, trusted partner are poised for greater success. This strategy not only enhances IT’s ability to serve customers but also eases the burden on their internal staff.

IT Management

Network World - Survey: Observability tools can create more resilient, secure networks

Digital resilience efforts are growing but inconsistent, according to the survey results. For instance, 40% of respondents have a formal approach to resilience that has been instituted organization-wide, while another 40% have a formal approach that has only been instituted in pockets. Some 16% have a formal approach to resilience that has yet to be instituted, and 4% do not have a formal approach to resilience.  

Network Management

sdxCentral - What is multifactor authentication (MFA)? How it works, why adopt it and its challenges

“Always, the first thing I say is: Use MFA for 100% of your users, 100% of the time. It is the first thing you should be doing for security posture that will help decrease your risk. We’ve done research that over 90% of breaches have some type of password element in them, whether it’s a brute-force attack or a phishing attack. So, we know that multifactor authentication can help reduce a customer’s exposure.”

Security

Network World - How to determine RTOs and RPOs for backup and recovery

When evaluating the design of your backup systems or developing a design of a new backup and recovery system, there are arguably only two metrics that matter: how fast you can recover, and how much data you will lose when you recover. If you build your design around the agreed-upon numbers for these two metrics, and then repeatedly test that you are able to meet those metrics in a recovery, you’ll be in good shape.

Data Management

Network Computing - Addressing Visibility Blind Spots in Co-los and the Public Cloud

To overcome this barrier, IT teams must look for ways to extend their visibility and utilize end-to-end monitoring that enables the accurate identification, triage, isolation, and collection of evidence of enterprise application problems. This article will delve into how enterprises can address common blind spots introduced during cloud and co-lo migrations, regain visibility of mission-critical applications, and troubleshoot potential performance problems faster.

Cloud

sdxCentral - What’s Next: Kevin Deierling, senior VP at Nvidia, on AI, networking platforms, frameworks and Morpheus

When asked what artificial intelligence (AI) means to your network, Deierling said, “The fuel for AI is data, and the starting point is getting that data into the system.” Networking, he said, is a critical part of getting data into the data center. Going further, calling the network the backbone of the data center, Deierling said networking was “the foundational element of these new generations of AI computing.”

Network Management

Forbes - Mastering The Art Of Building A Top-Tier Cybersecurity Team

Cybersecurity navigation is a roadmap, workflow or organized process that drives cyber protection. The teams must be organized, monitored, and exhibit a "top-tier attitude." The concept means every employee is cyber-focused, identified as a high-value asset and thinks holistically. Also, the teams are technically driven and operate as human firewalls. If practiced, a leader can master cybersecurity team development and protect their most vital resources.

Security

StateScoop - State leaders see generative AI’s potential to bring positive impacts on the mission

“A lot of folks are interested in accelerating outcomes, but one of their biggest challenges is the procurement process. So folks are looking for ways to be able to build more agility into the procurement process, so that it can support rapid innovation.”

Automation & Productivity

VentureBeat - Forrester’s 2024 Predictions Report warns of AI ‘shadow pandemic’ as employees adopt unauthorized tools

The 38-page report sees AI platform budgets tripling in 2024 as companies invest in scalable solutions to build, deploy, and monitor AI models. But Forrester cautions this won’t be enough to satisfy employee demand. The report predicts 60% of employees will use their own AI tools at work, introducing new regulatory and compliance challenges.

Artificial Intelligence

sdxCentral - How NaaS may be the answer to enterprise private network needs

“Even if you have a fairly technical IT team, there’s a lot of things in running the day-to-day operations that are just mundane tasks, that just I’m not sure they need to do anymore,” Kerravala said. “My advice to IT pros is always if you’re doing things today that aren’t really core to your resume, stop doing them. Find a way to either automate them out of your job or move it to a managed service provider.”

Network Management

Network Computing - How a Focus on Security Blind Spots Can Force Shadow IT out of the Darkness

In a company where shadow IT proliferates, often several cloud services are in use, and these are frequently linked. There is an ease to setting up cloud environments, and coupled with the building and setting up of many environments – some automatically based on scripts – IT and security teams must rush to keep up with the growing attack surface this creates.

Security

sdxCentral - Why Juniper, HPE Aruba and VMware are losing SD-WAN ground to security vendors

The SDxCentral data reveals a fundamental shift in how our readers view SD-WAN. Traditional SD-WAN is no longer good enough due to increasing security threats that are driving demand for secure SD-WAN or SASE offerings where security is baked in from the design phase. We’re seeing a fundamental shift in reader engagement away from traditional SD-WAN leaders to secure SD-WAN and single-vendor SASE providers.

Security

Information Week - How IT Can Help Detect Corporate Espionage

The espionage threat isn’t limited to large enterprises. Businesses of all sizes are vulnerable, since they’re part of the supply chain. Smaller businesses often don’t see themselves as a target, but they store data and can also act as a gateway to the larger enterprises businesses they serve, Hural explains. “With smaller budgets and often lower priorities when it comes to cybersecurity, these businesses are generally less fortified, creating viable access points for threat actors.”

Security

sdxCentral - Cybersecurity workforce is growing fast, but still 4 million short

Of the nearly 15,000 cybersecurity practitioners and decision-makers surveyed by ISC2, a whopping 92% reported skills gaps at their organization, the top three being in cloud computing security, AI and machine learning (ML), and zero-trust implementation.

Security

VentureBeat - With U.S. tech salaries at a 5-year-low, here’s how to make more money

Though average tech salaries hover at the $158,000 mark (nearly double the average U.S. knowledge worker), the combined impact of layoffs in the tech sector, hiring freezes, inflation and the explosion of generative AI have resulted in salary stagnation across the board.

Tech Jobs

Datanami - The Five Biggest Threats to Data Democratization

Every time a user enters data into a prompt for ChatGPT, the information is ingested into the service’s Large Language Models (LLMs) used to train the next version of language processing algorithm. The information could be retrieved by unauthorized persons if proper data security isn’t in place.  Enterprises are scrambling to finds ways to leverage the power of the tool without increasing the risk of a data breach.

ChatGPT

SiliconANGLE - SlashNext report uncovers 1,265% increase in phishing emails in a year

On average, 31,000 phishing attacks are sent on a daily basis, with 68% of all phishing emails text-based business email compromise or BEC attacks — those that involve cybercriminals impersonating or hijacking business email accounts to deceive victims into making unauthorized transfers of funds or revealing sensitive information. Some 39% of all mobile-based attacks were also found to involve SMS phishing, also known as smishing.

Security

DarkReading - What Lurks in the Dark: Taking Aim at Shadow AI

There is a fundamental tension between IT teams, which want control over apps and access to sensitive data in order to protect the company, and employees, who will always seek out tools that help them get more work done faster. Despite countless solutions on the market taking aim at shadow IT by making it more difficult for workers to access unapproved tools and platforms, more than three in 10 employees reported using unauthorized communications and collaboration tools last year.

Security

Network Computing - Top Tips for a Strong Zero Trust Architecture

Defining your attack surface should be the first item on your zero trust implementation list. This requires you to zero in on the areas your organization needs to protect. Focus on your most valuable digital assets. Otherwise, you may find yourself overwhelmed with implementing policies and deploying tools across your entire enterprise network.

Security

SiliconANGLE - AWS IAM credentials at risk: EleKtra-Leak operation revealed by Unit 42 

EleKtra-Leak leverages automated tools that allow threat actors to clone public GitHub code repositories continuously, scanning for exposed AWS IAM credentials. Once those credentials are detected, they’re exploited to create multiple AWS Elastic Compute Cloud or EC2 instances.

Security

Network World - Network complexity, talent shortages drive shift in enterprise IT buying habits

“The old way of looking at networking and security teams was to approach them as siloes. An organization had a network team, a security team and an application team that worked separately,” Zagury said. As technology gets abstracted to platforms, and enterprises adopt a platform approach, the disciplines are coming together, she said.

IT Management

Network Computing - Business-Optimized Networks Usher In A New Era For Networking Infrastructure

Networking professionals have an “it’s just plumbing” attitude. Most professionals think of networking infrastructure as a commodity, believing it offers little value than just connecting laptops to servers and acting as the conduit for application traffic generated. Most of the traffic serves a generic set of applications, including customer relationship management (CRM), accounting, email, and voice-over IP (VoIP)

Network Management

VentureBeat - Okta’s breach shows why identities come first in a zero trust world

Security teams need to interview their IT teams to understand what data they commonly have to share to resolve support cases.” Spicer advises, “You should also inspect the output for automatically generated troubleshooting data from sensitive systems. You could find anything from certificates and credentials to PII in those data sets.”

Security

Information Week - How to Speed Cyberattack Discovery

“In particular, threat hunting, during which human defenders actively maneuver through their networks and systems to identify indicators of a network attack and preemptively counter these threats, can speed the discovery of cyberattacks.”

Security

Network World - Infrastructure teams need multi-cloud networking and security guardrails

Cloud operations and DevOps groups will never cede ground, but they will welcome self-service networking and security solutions that provide guardrails that protect them from disaster. Cooperation between traditional infrastructure teams and cloud teams is even more important as enterprises embrace multi-cloud architecture, where complexity and risk are increasing. In fact, my research has found that security risk, collaboration problems, and complexity are the top pain points associated with multi-cloud networking today.

Cloud

CIO Infuence - Cybercrime Busters: Top 5 Cybersecurity Insights for Enterprise Storage

The gap in many corporate cybersecurity strategies is the absence of cyber storage resilience and recovery. It’s imperative that enterprises shore up their cyber resilience and recovery in their data and storage infrastructure to be properly equipped to combat ransomware attacks. This insight was derived from the fact that the more resilience an enterprise storage infrastructure has, the more it can withstand an attack and bounce back with confidence.

Security

VentureBeat - Surviving a ransomware attack begins by acknowledging it’s inevitable

“Today, many security and IT teams struggle to identify the real-world risks that vulnerabilities pose, and therefore improperly prioritize vulnerabilities for remediation. For example, many only patch new vulnerabilities or those that have been disclosed in the National Vulnerability Database (NVD). Others only use the Common Vulnerability Scoring System (CVSS) to score and prioritize vulnerabilities.“

Security

sdxCentral - 4 questions to answer before you pick a WAN service: SD-WAN, SASE, 5G or something else?

Large enterprises that have already built out WAN infrastructure will be reluctant to walk away from those investments. Similarly, businesses that rely on MPLS to support mission-critical applications may still require SLAs guaranteeing reliable bandwidth, low data loss and low latency. Since SD-WAN vendors do not control the underlying connectivity, they are not able to match those SLAs.

Network Management

DarkReading - Meet Rhysida, a New Ransomware Strain That Deletes Itself

"It stands out for its unique self-deletion mechanism and compatibility with pre-Windows 10 versions of Microsoft. Written in C++ and compiled with MinGW and shared libraries, Rhysida showcases sophistication in its design," Kaspersky said in its findings about the group. "While relatively new, Rhysida faced initial configuration challenges with its onion server, revealing a group's rapid adaptation and learning curve."

Security

CIO Influence - Minimizing IT Challenges for Employees in Remote and Hybrid Settings

IT teams may no longer own all the assets utilized daily by employees, but they remain responsible for these operations. Despite not being able to directly exert control over employees’ home networks, they can have visibility over these environments with network monitoring tools. Implementing network visibility software helps IT professionals overcome these new obstacles by providing the ability to maintain visibility and control amid changing work circumstances.

Automation & Productivity

NetworkComputing - 7 Strategic Network Automation Steps to Continuously Improve Network Security

While data backups receive significant attention, operational tasks that keep networks secure, such as device backups, OS upgrades, and configuration grooming, often go undone. It's incredible that even today, the majority of these changes are made by hand, which makes them error-prone. Even the simplest misstep can have a ripple effect that brings down a network and/or disrupts a supposedly fault-tolerant business service. No one is immune – not even tech giants like Microsoft and Google.

Network Management

Information Week - Firms Arm US Against AI Cyberattacks

Adversarial AI uses algorithmic and mathematical approaches to deceive, manipulate and attack AI systems. While published reports of AI attacks are scant, companies, organizations and governments are getting ready for increased attacks as open-source language models proliferate. Gauging the severity of the immediate AI threat is tough, experts say, as companies may not be reporting incidents.

Artificial Intelligence

NetworkComputing - Cisco Flaw Highlights Dynamic Nature of Vulnerability Management

Hackers quickly exploited the newly discovered critical zero-day bug to hijack thousands of Cisco switches and routers. Sunday, Cisco released free software updates that address the vulnerabilities causing these problems. In addition to the software update, Cisco strongly recommends that enterprises disable the HTTP Server feature on all internet-facing systems.

Security

Network World - Can enterprises trust the internet?

It’s no wonder that enterprise CFOs often have a hard time accepting network prices. One senior network planner at a healthcare conglomerate told me that he got major pushback on a 500 Mbps MPLS VPN connection cost of more than $4,000 per month when the CFO had 1 Gbps home broadband at just over $100 a month. But the deal was approved, because the CFO accepted a simple justification: “You can’t trust the internet.”

Network Management

NetworkComputing - The Evolving Threat Landscape: What’s Next for Security? 

Through more than a decade of use, there have been many high-profile, public-cloud-related breaches. But digging into the details of those breaches, we find a common theme, and it is not public cloud infrastructure or shared compute. The point of entry for attackers has almost always been a misconfiguration that opened a security hole attackers could drive a truck through. Misconfigured S3 buckets, open administrative access to Kubernetes' consoles, and standard API/app vulnerabilities that could have been blocked with a traditional web application firewall. 

Security

Computerworld - As M365 Copilot launch looms, businesses likely to move cautiously

But while Microsoft has moved quickly to incorporate genAI into tools such as Word, Excel, and Teams, many Microsoft 365 customers are expected to take a cautious approach to deploying Copilot within their organizations. This means a focus on internal trials to identify use cases, and bolstering data security practices to mitigate the risks of connecting large language models to corporate systems.

Automation & Productivity

Forbes - Three Positive Ways To Protect Against Zero-Day Attacks

Before Labor Day 2023, insiders detected 57 zero-day vulnerabilities, a higher total than all of 2022, and the scope of the attacks has gotten broader. Rather than target vulnerabilities in security or communications programs, now all sorts of software are dealing with zero-day attacks, from email servers to printer software.

Security

Blocks & Files - What is the best choice of storage in the container era?

According to the user survey report released by the Cloud Native Computing Foundation (CNCF) in 2020, 78 percent of users have deployed or are about to deploy stateful applications in containers in application scenarios like databases, message queues, logs, and data analysis. The report also showed that storage has become a major factor that affects the commercial deployment of containers.

Data Storage

Security Magazine - Report: CISOs’ big worry in new role is inaccurate data on security posture

The issue of data quality was of greater concern to respondents than the lack of security budget (44%) and being scapegoated for a breach (44%).

Security

Information Week - 3 Reasons Why Cloud Migration Fails in Large Enterprises

Failing to involve key stakeholders, such as IT teams, business units, and compliance experts, can result in misalignment with organizational goals. Rushing into migration without thorough planning can lead to data loss, system downtime, and increased costs. Overlooking regulatory requirements and security measures can expose an organization to legal issues and data breaches.

Cloud

DarkReading - Change From Within: 3 Cybersecurity Transformation Traps for CISOs to Avoid

CISOs will thrive within this change by focusing on input, empathy, and alignment. This will enable lasting success for the shift by allowing CISOs to fully identify and understand information asymmetries throughout the organization and then remove them to clear the path to optimal communications and awareness.

Security

sdxCentral - Why enterprises need to apply NIST Cybersecurity Framework 2.0

“The overall message of CSF 2.0 is that risk management needs to be elevated to an enterprise-level, with key leadership involvement,” Gartner Distinguished VP Analyst Katell Thielemann told SDxCentral. “Instead of focusing on security controls, security teams need to understand what role security plays in the overall lifecycle of risk management, to include ecosystems like supply chains.”

Security

The Hacker News - Who's Experimenting with AI Tools in Your Organization?

With Nudge Security, you can get an immediate inventory of all the AI tools your employees are using, and set up alerts to notify you whenever a new AI tool is introduced. Nudge Security automatically discovers AI tools and other SaaS applications in your environment, and categorizes them by type for easy filtering, including the free, paid, and trial accounts that you might not be able to discover by relying on procurement processes or combing through expense reports.

Security

Blocks & Files - HPE and Dell diverge on AI strategy

Both rate AI as the biggest driver of IT infrastructure revenue growth in the next few years and both have a strategy that extends across edge sites and hybrid cloud datacenters. Both see x86 servers doing AI inferencing, but Dell’s strategy extends its AI inferencing down to PCs, which it makes and sells but HPE does not. HPE’s strategy extends upwards into supercomputers, which it makes and sells but Dell does not.

Artificial Intelligence

NetworkComputing - DigiCert Study Finds That Quantum Interest is High, But Security Concerns Exist 

This urgency hasn’t translated into actionable measures for many. A mere 30 percent of organizations have set aside a budget for quantum readiness. Roughly half of the surveyed IT experts expressed uncertainty about the ramifications of quantum computing, and many reported that their leadership is either only somewhat aware or entirely uninformed about the imminent security implications.

Quantum Computing

sdxCentral - Okta reveals surging investment in zero-trust security

Okta’s report also revealed trends across regions and industries. North America is leading the zero-trust charge with 73% of organizations having a defined strategy and Japan and Australia were least likely to have one at 47%. In terms of industries, the financial services sector narrowly edges out the software industry with 71% adoption compared to 69%.

Security

VentureBeat - Gartner: Generative AI will be everywhere, so strategize now

Nearly three-quarters (73%) of CIOs polled by Gartner said their enterprise will increase funding for AI/ML in 2024. Similarly, 80% said their organizations are planning on full gen AI adoption within the next three years.

Artificial Intelligence

Computerworld - Teaching AI to behave is the fastest-growing career skill

“It’s critical. Prompt engineering is a very important part of what’s coming, not just for OpenAI, Google, Amazon, and Microsoft, but also for all the open-source models,” Brethenoux said. “They’re going to go into the workforce, and they need to master that technology one way or another.”

Tech Jobs

Network World - Gartner: IT spending to climb 8% to $5.1 trillion in 2024

Organizations are continuing to invest in AI and automation to increase operational efficiency and bridge IT talent gaps, Lovelock stated. “The hype around GenAI is supporting this trend, as CIOs recognize that today’s AI projects will be instrumental in developing an AI strategy and story before GenAI becomes part of their IT budgets starting in 2025.”

IT Management

VentureBeat - 5 Ways to Rein in Data Center Consumption in 2024

Yet, at the same time, a July 2023 survey from Hitachi Vantara found that tackling data center sustainability is no easy task. It found that two-thirds of IT leaders currently measure their data center’s energy consumption; however, one-third of respondents acknowledged that their data infrastructure uses too much energy and nearly half (46%) admitted their sustainability policies don’t address the impact of storing unused data.

Sustainability

Google Cloud - From turnkey to custom: Tailor your AI risk governance to help build confidence

Google Cloud customers can use our Responsible AI approach to mitigate risks from unintended or unforeseen outputs that models can produce. Vertex’s Explainable AI makes it easier to know how an AI model makes a decision. And, we are currently offering a Model Fairness tool in preview. Finally, features such as Model Evaluation, Model Monitoring, and Model Registry can all help to support data and model governance.

Artificial Intelligence

CIO Influence - How Backing Up Data Could Endanger Your Organization — and What to Do About It

Even the best of intentions can have unintended consequences. Unfortunately, common cloud backup methods can lead to the growth of shadow data — organizational data that is copied, backed up, or housed in a data store not under the same security structure or governed by security or IT. Because this data is left “in the dark,” it’s a hot target for today’s threat actors — and organizations have taken note. A majority of data security and governance professionals (68%) have named shadow data as the No.1 concern of protecting cloud data.

Data Management

NetworkComputing - SD-WAN vs MPLS: What's The Difference & Which Is Better?

To understand which option better meets your network needs today and tomorrow, it's crucial you understand the key difference between the solutions. SD-WANs are service-provider agnostic. In contrast, MPLS requires enterprises to use the same service provider at all locations.

Network Management

Government Technology - How Does Tech Debt Impact Government Service Delivery?

Tech debt, sometimes called innovation debt, refers to the cost of not improving systems, of relying on aging technologies that either are no longer the best tools for the job of serving residents or are so old that the staff who supported them have retired from government work.

IT Management

DarkReading - The Most Popular IT Admin Password Is Totally Depressing

"While our top 20 findings are limited to known and predictable passwords, the fact that they were associated with admin portals also tells us that bad actors are well equipped to target privileged users," the Outpost24 team explained.

Security

Network World - Generative AI pervades Gartner’s 2024 predictions for cybersecurity roles, application modernization and more

By 2027, GenAI tools will be used to explain legacy business applications and create appropriate replacements, reducing modernization costs by 70%.

Tech Trends

Datanami - NetApp’s 2023 Data Complexity Report Reveals Urgent Need for Unified Data Storage

 The report found that 98% of organizations are in the middle of their cloud journey, with three out of four reporting workloads stored on-premises, highlighting the need for a unified approach to hybrid multi-cloud architectures and continued innovation in both on-premises all-flash storage and public cloud storage to enable AI adoption at scal

Data Storage

CIO Influence - Are You Covered? Large Language Models and AI Security in the Enterprise

Observability is rapidly emerging as a critical issue in the LLM security ecosystem. With so many people in an organization using multiple models for myriad uses on all manner of devices, tracking and auditing usage is critical. Typically, administrators do not have the ability to view users’ prompt histories, which means they can only know in the most general terms who is using the model and how often.

Artificial Intelligence

Datanami - Dremio’s New Research Demonstrates Data Lakehouse Value with Math-Style Proof and Technical Clarity

The paper decomposes commonly used but overloaded terms like data warehouse, data warehousing, and data lakehouse into discrete components (such as query engine, table format, etc.), then offers clear terms and definitions based on these components to bring clarity to communication that uses these common terms.

Data & Analytics

CIO Influence - Risk and Compliance Management: Take a Risk-Centric Approach to Manage Security

Compliance and risk are often thought of as separate considerations, and for larger companies, they can serve distinct functions. In reality, risk and compliance share a symbiotic relationship with compliance affecting risk, and risk affecting compliance. Therefore, what you do within your compliance program will directly impact your level of risk.

Risk Management

Network World - Gartner: Enterprises need to focus on AI priorities and readiness

To that end, Gartner predicts that by 2025, GenAI will be a workforce partner for 90% of companies worldwide. In addition, by 2026, more than 80% of enterprises will have used GenAI application programming interfaces (APIs) or models, and/or deployed GenAI-enabled applications in production environments, up from less than 5% in 2023, Gartner stated. (Also see Gartner's top strategic technology trends for 2024)

Artificial Intelligence

Datanami - New Data Suggests IT and Security Leaders Are Ignorant to Generative AI Threats

When asked, IT and security leaders are more concerned about getting inaccurate or nonsensical responses (40%) than security-centric issues, like exposure of customer and employee personal identifiable information (PII) (36%), exposure of trade secrets (33%), and financial loss (25%).

Artificial Intelligence

Information Week - Generative AI an Emerging Risk as CISOs Shift Cyber Resilience Strategies

“Often we’re exposing credentials so that anyone who compromises and exploits those can have access to incredibly sensitive content,” he says. “For example, one vendor found their software developers were debugging code in LLMs, and then it was compromised.”

Security

sdxCentral - Netskope report: Social engineering is the attack method of choice

More than half of the malware that users have attempted to download so far this year was delivered via cloud apps. Users were lured into downloading malware from 477 distinct cloud apps, most notably Microsoft.

Security

The Hacker News - Exploring the Realm of Malicious Generative AI: A New Digital Security Challenge

Recently, the cybersecurity landscape has been confronted with a daunting new reality – the rise of malicious Generative AI, like FraudGPT and WormGPT. These rogue creations, lurking in the dark corners of the internet, pose a distinctive threat to the world of digital security. In this article, we will look at the nature of Generative AI fraud, analyze the messaging surrounding these creations, and evaluate their potential impact on cybersecurity.

Security

Information Week - Doing More With Less: A Guide for IT Leaders

Adapting to this landscape isn’t just about juggling resources, it’s about reshaping mindsets. IT leaders now operate at the intersection of frugality and forward-thinking, emphasizing value-driven solutions while keeping an eye on the horizon.

IT Management

NetworkComputing - The Pillars of Cloud Infrastructure Security in 2023 and Beyond

To take up these challenges, companies must embrace a holistic approach to security, whereby the protection mechanisms are as resilient as the cloud environment itself, and uniform security standards are in place across all aspects of the infrastructure. This article sheds light on the fundamental components of a robust security posture in a world where cloud computing plays an increasingly important role.

Cloud Security

TechRepublic - New CISA and NSA Identity and Access Management Guidance Puts Vendors on Notice

“The publication (it’s hard to call it guidance) highlights the challenges with comparing the features provided by vendors. CISA seems to be putting vendors on notice that they want vendors to be clear about what standards they do and don’t support in their products, especially when a vendor only supports portions of a given standard.”

Security

sdxCentral - 4 things you need to know to protect data in multicloud environments

Even though multicloud is the new enterprise reality, it doesn’t mean that enterprises have figured out how to manage that new reality. Recent research from Enterprise Management Associates (EMA) forecasts that 88% of enterprises will adopt multiple cloud services by 2024, up from 72% in 2022. However, EMA found that only 35% of enterprises believe that their multi-cloud networking strategies have been successful, and only 24% of the 351 IT organizations surveyed were satisfied with their multicloud network monitoring and observability capabilities.

Cloud

Network World - Networking and security teams tasked to converge, collaborate

The goal of shared processes could be a hefty challenge for some organizations. In the Cato Networks survey, 12% of respondents reported that their networking and security teams either have “turf wars or struggle working together,” and another 34% said they “occasionally have problems working together.” The remaining 54% reported that the two teams work well together now.

IT Management

sdxCentral - Horizontal vs. vertical AI: What do enterprises need to know?

“Vertical AI solutions are designed to provide targeted and specialized functionalities,” said Chen. These tools leverage industry-specific knowledge and expertise to offer more targeted, personalized and reliable results. Specialized algorithms are specifically designed for an industry or use case and are often offered as plug-and-play because they are typically prebuilt.

Artificial Intelligence

Network World - Gartner: Top strategic technology trends for 2024

“A lot of the trends are around AI development, but also in protecting the investment that organizations have already made. For example, they’ve invested in machine learning, natural language. And there's a ramp up in software engineering right now where people are building more things because they have access to that data and the development tools are getting better,”

Tech Trends

SiliconANGLE - Nine rules for CIOs to optimize IT costs strategically 

IT financial management tracks the total cost of IT and provide multiple views of IT spend to help stakeholders make informed business decisions. Repeated requests from the business to cut IT costs often indicate that the value of the spend is not understood at the business outcome level. To support your strategic cost optimization initiative, ensure that all IT costs are allocated to a business-valued application, product or service. Add cost detail and complexity to the ITFM allocation model only where needed.

IT Management

TechRepublic - Capital One/Forrester Study: Deploying Self-Service Data Strategies Is Fraught With Challenges

Top challenges cited in the study include maintaining user-friendly environments (49%), increasing data trust and quality (49%) and scaling self-service for decentralized environments (47%).

Data & Analytics

NetworkComputing - Are Smaller, High-volume Outages Dominating Downtime?

The impact of these incidents can be so big that they have a material, reportable impact on uptime for a significant subsection of users, potentially for the entire user base. Often with quite a bit of collateral damage, and as a result, they're often publicly reported on by news outlets and analyzed in depth by the responsible party.  

Network Management

sdxCentral - 5 tips to get your CISO on board with IAM

Look at how stakeholders — infrastructure, DevOps, IAM teams and others — do their jobs, what processes they’re leveraging and where the pain points are, he advised. Have one-on-ones, understand team members’ backgrounds and determine where their skills are (and if there are deficiencies, do they need to do training or hire additional talent?).

Security

AiThority - Risks Of IT Integration

According to a research, 27 percent of companies said their synergies failed to mmet expectations for acquisitions. Fifty to eighty percent of mergers and acqusitions fail because of poor IT integrations. There is a lot of demand for a merged company to produce immediate commercial value and to deliver return on investment. However, the back-end logistics of IT/Security integration are typically difficult, slow, and hazardous, which impedes progress.

IT Management

Information Week - Critical Zero-Day Atlassian Bug: What CISOs Must Know

Microsoft Threat Intelligence identified a nation state threat actor (Storm-0062) exploiting this vulnerability in the wild since Sept. 14, according to an update on X (formerly Twitter). Microsoft noted that this threat actor is also tracked as DarkShadow and Oro0lxy. Storm-0062 is a name for Chinese state hackers who have a history of state-sponsored hacking activity.

Security

sdxCentral - Gartner Magic Quadrant reveals SD-WAN leaders, plus SASE and genAI trends

In choosing a vendor, enterprises should always run a proof of concept (PoC) to ensure solutions work as expected and, if they are managing internally, that they are comfortable with that process. Buyers should also be comfortable with vendor roadmaps as the market continues to evolve.

Network Management

Information Week - Quick Study: The Evolving Roles of CIOs and IT Leaders

The roles and responsibilities of chief information officers have changed dramatically, and will continue to shift as the job itself morphs in the years ahead. Here’s a curated collection of articles that looks at the many hats IT leaders are wearing today.

IT Management

sdxCentral - To pay or not to pay: Why CISOs are the least important in ransom decisions

Notably, in the wake of these events, 18% of the respondents said they paid the ransom directly to the attackers, 37% paid through cyber insurance and 28% used third-party negotiators. The retail sector stands out with a staggering 95% paying the ransom.

Security

Information Week - The Mind of the Inside Attacker

A rough categorization of insider threats has emerged, starting with their roles in the company. While some are permanent employees, others may be part-time or work in contractor roles that nonetheless afford them access to proprietary data. While many insider attacks are motivated by personal spite or revenge, it has become increasingly common for moles to be placed within an organization with the explicit goal of accessing data.

Security

Datanami - Ascend.io Survey: Automation Seen as Key Solution for Overburdened Data Teams

Data teams now use five tools on average in their data stack and over two-thirds (68%) plan to maintain or increase this number in the next year. Despite this trend, data teams report stagnation in their overall capacity. Virtually all data professionals surveyed (95%) report being at or above their work capacity for the fourth year in a row, with data engineers reporting being significantly overworked more than three times as often as their peers in data analytics and data architecture.

Data Management

Information Week - 6 Pain Points for CISOs and CIOs and What to Do About Them

Many companies are working with a mix of legacy technology, like on-premises servers, and new cloud and SaaS systems. CIOs and CISOs are faced with the operational and security challenges that come with this disparate tech stack and the migration to new systems.

IT Management

CIO Influence - Cybersecurity Awareness Month: Tips From an Ethical Hacker to Secure Our World

Recognizing phishing attempts involves being vigilant about suspicious emails, messages, or links that attempt to imitate a trusted source. Cybercriminals often use urgent language, false claims, or deceptive URLs to manipulate victims into taking action that compromises their security. By educating ourselves and others about these tactics, we can reduce the risk.

Security

sdxCentral - High-severity vulnerability led to largest-ever DDoS attack, say Google, Cloudflare and AWS

The attackers exploited this by flooding websites with hundreds of thousands of “requests” and abruptly canceling them. “By automating this trivial ‘request, cancel, request, cancel’ pattern at scale, threat actors are able to create a denial of service and take down any server or application running the standard implementation of HTTP/2,"

Security

Network World - Hot (and not) networking skills for 2023

"We're moving to infrastructure as code for efficiency," says Sangillo. "We're embedding in the job description of every network engineer that we want you to be comfortable with software and orchestration solutions, speak the language of APIs, use Python, and use low-code solutions."

Network Management

CIO Influence - October Cybersecurity Awareness Month: Top 50 IT and Security Professionals Share their Strategies

Most IT and security leaders agree that cybersecurity policies are lagging behind technology trends. Lack of adequately trained IT professionals, poor leadership, excessive reliance on aging IT and security solutions, and growing pressure from cybersecurity regulatory authorities have all combined together to create a difficult scenario for organizations. For 2024, organizations require a staunch, personalized training approach to thwart cyber crimes.

Security

Blocks & Files - Building cyber resilience with data vaults

In August 2023, Danish hosting subsidiaries CloudNordic and AzeroCloud were on the receiving end of one of the most serious ransomware attacks ever made public by a cloud services company. During the incident, CloudNordic suffered a complete encryption wipe-out that took with it applications, email services, websites, and databases, and even backup and replication servers. In a memorably frank admission, the company said that all customer data had been lost and would not be recoverable.

Security

sdxCentral - Why a return to the office brings identity and mental health challenges

Identity remains one of the biggest challenges for organizations with 43% saying that more than 20% of their workforce identities are insufficiently secured, according to Poller’s latest research. A whopping 77% of organizations think or know they’ve experienced credential compromise in the past year, and 76% of those experience multiple compromises And, account compromise leads to cybersecurity attacks more than 70% of the time.

Security

NetworkComputing - Apples for Apples: Measuring the Cost of Public vs. Private Clouds

It's no surprise, then, that an increasing focus among IT leaders is on both the absolute cost and the effectiveness of that cloud spend within their organizations. For some, this has been more than a challenge, with one of the very reasons that cloud has become so popular in the first place - the ability for engineers to swipe a credit card and spin up effectively limitless resources, enabling them to commit to elastic levels of spending, often under the radar of any central budgetary control. This has hampered many in their ability to both get a handle on exactly what and where these costs are coming from and also to plan effectively for a more strategic relationship with the hyperscalers.

Cloud

Blocks & Files How to stop ransomware thieves WORMing their way into your data

One component of this is the 3-2-1-1-0 rule: this means, storing three copies of your data, in addition to the original, across two media types, one of which must be off-site. Ootbi satisfies both of these by storing one in the cloud and the other on the customer’s premises on its own appliance’s NVME flash storage.

Data Protection

DarkReading - 10 Routine Security Gaffes the Feds Are Begging You to Fix

The agencies added that software providers need to immediately adopt principles of secure-by-design to prevent these and other misconfigurations.

Security

VentureBeat - Goldman Sachs CIO is ‘anxious to see results’ from GenAI, but moving carefully | The AI Beat

That’s because for all the C-suite executives out there feeling generative AI FOMO and getting pressure from CEOs to move quickly to develop AI-centric strategies, things are actually moving far slower than you might imagine (or AI vendors, who warn companies about falling behind, might want)

Artificial Intelligence

InformationWeek - Dispelling 5 Misconceptions About Data

Your business will be judged by how much data you collect. Ever since data became a business imperative, companies have been scrambling to gather as much of it as possible, without a coherent strategy.  Yet, no amount of data can solve a business problem if it’s not the right kind of data. Companies will not be judged on the amount of data they have, but in the business decisions that were derived from it.

Data Management

NetworkComputing - Global NaaS Event Roundup: Taking NaaS and SASE Forward

MEF and its member organizations are laying the groundwork to bring a new generation of Network-as-a-Service (NaaS) to market. They envision NaaS as services that combine on-demand connectivity, application assurance, cybersecurity, and multi-cloud-based services. To meet enterprise demands, those providing these services will need a standards-based automated ecosystem.

Network Management

SiliconANGLE - Lower for longer: Tech spending remains tepid 

Generative artificial intelligence is in some ways both a blessing and a curse. The excitement, potential and magic of large language models is fantastic. It creates urgency and mobilizes teams to focus on creating new forms of value, new business models, restructure processes and the like. But given the economic climate, what we’re seeing is generally not a lot of new money coming into IT budgets at the top line. Rather, there’s a reprioritization happening.

Tech Spending

InformationWeek - AI and Overcoming User Resistance

You’re not just retraining an employee on a new set of steps for processing an invoice or taking an order. You’re actually introducing an automated thinking process into what an employee has been doing. Now, technology is going to make or recommend decisions that the employee used to make. This can lead to employees experiencing a loss of empowerment and control.

Automation & Productivity

Network World - Generative AI set to reshape SD-WAN market

There’s a trend toward AI capabilities that enable networking decisions to be made with little or no human intervention. These capabilities can help enterprises to streamline network design, configuration and ongoing management as well as increase agility and improve performance, according to Gartner. The research firm predicts that by 2026, generative AI technology embedded in SD-WAN offerings will be used for 20% of initial network configuration, up from near zero in 2023.

Network Management

sdxCentral - Inside global SecOps: A day in the life of a Trellix threat intelligence head

Trellix’s threat intelligence group operates around the clock, collecting and digesting research and intelligence from industry peers and government agencies, analyzing cybercriminal behaviors and attacks, alerting customers, offering threat intelligence services and working with the vendor’s product teams to enhance its cybersecurity services. They also closely collaborate with law enforcement, sharing information and assisting in takedowns of nefarious groups.

Security

SiliconANGLE - Outside the 8½-by-11 box: Five thoughts from Zoomtopia 2023 

Zoom isn’t afraid of Microsoft but would like a level playing field. Most of the collaboration vendors have ceded the leadership position to Microsoft Teams. Not because of product quality – almost every collaboration tool is easier to use – but because the Microsoft licensing engine keeps customers locked in. When I attend analyst events or user conferences from other vendors, there is always a heavy dose of Teams interoperability. At Zoomtopia, nary a word was said about Teams coexistence. Zoom believes it has a superior product and, with a level playing field, feels it can win any customer.

Automation & Productivity

The Hacker News - New OS Tool Tells You Who Has Access to What Data

A comprehensive Data Security Platform is essential for full visibility and control of sensitive data. One example is Satori's Universal Data Permissions Scanner (UDPS), an open-source authorization analysis tool. UDPS, available on GitHub, enables universal visibility into data access permissions across various data stores. With this tool, it's easier to identify who has the potential to access sensitive data, which can help organizations take a proactive approach to enhancing their security posture, streamline compliance, and ensure well-governed data access.

Data Management

InformationWeek - US Tech Layoffs Soar 716% in 2023: Report

But the number of job cuts has been falling steadily over the summer, the firm says, with 2,537 cuts in September, the lowest number since June 2022. The 2023 tech layoffs are the second worst totals on record. In 2001, 168,395 cuts were announced in the sector.

Tech Jobs

Network World - What is DNS and how does it work?

DNS is organized in a hierarchy. An initial DNS query for an IP address is made to a recursive resolver. This search first leads to a root server, which has information on top-level domains (.com, .net, .org), as well as country domains. Root servers are located all around the world, so the DNS system routes the request to the closest one.

Network Management

CIO Influence - 75 Percent of Companies Struggling with IT Operational Challenges in a Hybrid World, According to HP Study

Companies cited a need for more efficient endpoint software tracking and management (48%). To achieve this, respondents want device backup and restore capabilities (55%), automation of device recovery processes (47%), BIOS update deployment (46%), and device location tracking (46%).

IT Management

VentureBeat - The case for bringing generative AI on premises

For many organizations, the latter option is the only sensible solution — they either cannot place certain data in the public cloud or cannot risk their sensitive or proprietary data even with additional security controls offered through enterprise generative AI solutions. But by adopting generative AI on their own hardware within their own environments, organizations maintain maximum control over their data and security posture.

Artificial Intelligence

Blocks & Files - Public cloud ephemeral storage can’t be persistent – right?

In summary we could say the ephemeral storage supplied by AWS, Azure, and Google for VMs and containers is unprotected media attached to a compute instance. This storage is typically higher speed than persistent storage, much lower cost, and has no storage services, such as snapshotting, compression, deduplication, or replication.

Data Storage



Was this article helpful?

ESC

Eddy, a super-smart generative AI, opening up ways to have tailored queries and responses