IT News and Events
Nov 14th, 2022 — Nov 20th, 2022 Generate the Custom HTML Email for this Issue
IT News and Events IT News and Events
Volume 296, Issue 3 << Previous Issue | Next Issue >>
Cisco News
disable
Cisco Reports First Quarter Earnings
$13.6 billion in revenue, up 6% year over year; GAAP EPS $0.65, down 7% year over year, and Non-GAAP EPS $0.86, up 5% year over year
Cisco reported first quarter results for the period ended October 29, 2022. Cisco reported first quarter revenue of $13.6 billion, net income on a generally accepted accounting principles (GAAP) basis of $2.7 billion or $0.65 per share, and non-GAAP net income of $3.5 billion or $0.86 per share.

"Our fiscal 2023 is off to a good start as we delivered the largest quarterly revenue and second highest quarterly non-GAAP earnings per share in our history," said Chuck Robbins, chair and CEO of Cisco. "These results demonstrate the relevance of our strategy, our differentiated innovation, and our unique position to help our customers become more resilient."

Cisco News, November 16th, 2022
(Get More Information . .) open to premium members only

Network + Security = Connected & Protected
Cisco Partner Summit has ended, but we continue to build on the momentum and excitement around our security innovations and announcements.
At Partner Summit Jeetu Patel, Emma Carpenter and Shaila Shankar took the stage to highlight our partner profitability programs and the opportunities around the firewall refresh cycle.

New Security Global Marketing Campaign - If it's connected, it's protected Alongside our product and profitability announcements, our marketing team launched a new global marketing brand campaign. Carrie Palin, unveiled our latest video highlighting how Cisco security delivers a complete set of security solutions, all designed to integrate seamlessly with third party technology to deliver resilient, end-to-end protection.

Cisco News, November 18th, 2022
(Get More Information . .) open to premium members only

Supercharge 5G With Converged CRAN Architecture
Communication service providers (CSPs) are being challenged to deploy 5G in dense urban and high traffic environments while trying to optimize for cost and simplify capacity expansions.
Centralized radio access network (CRAN) architectures are becoming critical as CSPs adopt mid-band and high-band spectrums to address 5G opportunities. CRAN architecture lowers capital expenditures (CapEx), simplifies operations, and enhances RAN performance with spectrum sharing technologies. CSPs need to look at their existing transport architecture to ensure that they realize these benefits by adopting CRAN.

Evolving the transport network is a first important step in adopting 5G on an existing 4G RAN network. The decision to either stay with distributed RAN (DRAN) architecture by expanding backhaul capacity or migrating to CRAN architecture with fronthaul investment is something every CSP must consider.

Cisco News, November 18th, 2022
(Get More Information . .) open to premium members only

Taking An In-Depth Look At Your Application And Network Performance
Understanding your applications and network in depth - how applications and infrastructure are performing, or not - is what observability offers to your business
Briefly defined, full-stack observability (FSO) is real-time observability across applications, software-defined compute, storage, services, network, etc. FSO offers in-depth visibility into the behavior, performance, and health of applications and infrastructure through metrics, events, logs, and traces (MELT)-providing visibility, insights and actions that help teams optimize customer experiences and deliver business outcomes.
Cisco News, November 17th, 2022
(Get More Information . .) open to premium members only

Why A New Approach To Security Is Needed In Education
The shift to virtual and hybrid teaching, learning, work, and services brought on by the pandemic (and which continues today) has accelerated cybersecurity risks for education institutions of all levels.
While data breaches are common across all industries, the risk for education is particularly acute given the sensitivity of students, faculty, staff, and research data. The increase in individuals accessing school systems outside of the campus and on personal devices has increased the threat surface exponentially. Adding in the fact that many institutions are understaffed and/or have insufficient security measures in place makes universities and schools attractive, lucrative, and easy targets for cyber criminals.
Cisco News, November 17th, 2022
(Get More Information . .) open to premium members only

IT News - CxO
disable
5 Ways To Overcome Multifactor Authentication Vulnerabilities
Improve the resiliency of multifactor authentication by giving users more information, making default settings more secure, hiding secrets and more.
Multifactor authentication boosts the safety of usernames and passwords, but depending on the MFA method used, it may not offer as much protection as you might think.

To better secure user accounts and data, it's time to make MFA more resilient.

At Authenticate 2022, Roger Grimes, data-driven defense evangelist at security awareness company KnowBe4, presented how vendors can improve their MFA products.

SearchSecurity, November 8th, 2022
(Get More Information . .) open to premium members only

CIO's Guide To More Engaged IT Teams In The Post Pandemic World
We are living in interesting times. With the pandemic mostly behind us but still lingering, our IT teams have adopted fairly well in producing remarkable results by collaborating and working remotely.
In this short article, I will share how we can make our teams even more productive by supercharging them in a post-pandemic era and implementing the following ideas in a virtual setting or in person:

1. Have Fun: IT professionals spend 50-60 or even more hours on their jobs. If they are not having fun, they will burn out faster and possibly be not as productive. There are several ways you can make their professional lives fun...

Architecture&Governance, November 7th, 2022
(Get More Information . .) open to premium members only

The Shifting Role Of The CISO
My year as a venture capital CISO-in-residence.
The CISO role has evolved dramatically over the past decade, maturing from security officer to impactful business leader who, increasingly, is a part of their organization's C-suite. In light of the considerable impact security risks have on business objectives, this is a welcome transformation. Encouraging employees to go beyond their day-to-day and view security as a priority, making allies of users and business managers and providing the organization with tangible value, is extremely rewarding.
DARKReading, November 8th, 2022
(Get More Information . .) open to premium members only

5 Harvard Business Review Articles That Will Resonate With CIOs Right Now
From AI to digital transformation and everything in between, these HBR articles cover the critical topics IT leaders care about most
Through our partnership with Harvard Business Review, we regularly refresh our resource library with five new HBR articles we believe CIOs and IT leaders will value highly. Check out the curated pieces below, available to readers now.

  • Why You Need an AI Ethics Committee
  • How to Overcome Your Fear of the Unknown
  • 4 Types of Business Transformation
  • How leaders can escape their echo chambers
  • Is your company squandering digital opportunities?

Read on for details

The Enterprisers Project, November 8th, 2022
(Get More Information . .) open to premium members only

3 Critical Roles For Successful Digital Transformation
It takes a team to implement digital transformation, but these three roles can make the difference between success and failure. Here's how
Companies are like high-performance engines - they're optimized over time to create the greatest output. They handle small incremental changes and fine-tuning well but often break down when broader changes and rebuilding are needed.

Enter the digital transformation journey. How can companies learn how to shift quickly to meet the needs of their customers, employees, and the market when incremental progress isn't working? What roles can help ensure success along the way?

The Enterprisers Project, November 7th, 2022
(Get More Information . .) open to premium members only

IT Leadership: Lessons From The Military
Top CIOs with military backgrounds share the leadership advice that has helped shape their career success
Turbulent times can either paralyze you with fear or energize you with unlimited opportunities - and great leaders are often what make the difference. In the midst of complexity and volatility, top leaders anticipate and adapt. They build clarity out of uncertainty. They communicate a vision that inspires you to strive for more. They challenge and elevate their teams, giving people the confidence to not just persevere but step up to the big moments and make bold things happen.
The Enterprisers Project, November 9th, 2022
(Get More Information . .) open to premium members only

Evolving Landscape Of Enterprise Security Through The Eyes Of CIOs
As sophisticated cyber threats increase in volume and effectiveness, organizations across all industries are shifting from a threat-preventive approach to a cyber defense model.
The recent acceleration of digitalization has made organizations re-evaluate their cybersecurity preparedness. In today's hybrid world, we must fortify data with modern surveillance techniques that promote resilience and business continuity. More than ever, organizations must invest in a robust security infrastructure to combat cybercrimes.

Ransomware groups are becoming more sophisticated and are increasing in volume, with 35 vulnerabilities associated with ransomware during the first three-quarters of 2022 and 159 trending aggressive exploits. To make matters worse, a lack of adequate data and threat context makes it difficult for organizations to effectively tweak their systems and effectively mitigate vulnerability exposure.

CIO, November 8th, 2022
(Get More Information . .) open to premium members only

My First 90 Days As A New CIO
Tom Sweet, CIO of Industrial Refrigeration Pros, reflects on the initial three months of his first job as head of technology and security.
I set my career sights on becoming a CIO or a CTO many years ago. In 2019, I was a finalist for two C-level opportunities but was selected for neither one. I learned a lot from the experiences and am grateful for them. Though rejection feels lousy, it can also be a blessing. It is far worse to be selected for a role and then not fit in with the company culture or values.

Ultimately in 2022, a referral led to my first CIO opportunity at a private equity-backed venture. New to the Dallas-Fort Worth area and in need of an IT leader for this growing firm, the CEO reached out to an ERP consultant for some referrals.

Heller, November 9th, 2022
(Get More Information . .) open to premium members only

IT News - Storage
disable
How To Effectively Compare Storage System Performance
Your power as a buyer is stronger before the sale closes: Ask for what's required to effectively evaluate storage vendors' system performance.
Storage vendors love to talk about their performance specifications, such as IOPS, throughput and latencies. The problem is that there's no standardization of those specifications among vendors.

There is little guidance as to how vendors measure or come up with those storage system performance numbers or how they correlate to a specific workload or application. In addition, vendors measure performance in different ways. Add in different storage types -- block, file and object -- and it gets even more complicated.

You, the IT pro, are essentially left to your own devices to figure it out. So, how should you compare performance?

SearchStorage, November 7th, 2022
(Get More Information . .) open to premium members only

A Comparison Of Distributed File Systems
There are many different distributed file systems available, so careful analysis of the options, as well as good project management, helps ensure a successful installation.
Distributed file systems enable users to access file data that is spread across multiple storage servers. Key features -- including application and platform support and storage type -- differ from one product to another, so it's crucial for organizations to make a vigilant comparison of distributed file systems.

Users must examine their requirements and the differences among distributed file systems, evaluate the many products available on the market and then commence a systematic process for selection and implementation.

SearchStorage, November 9th, 2022
(Get More Information . .) open to premium members only

IT News - AI
disable
Building The Highway To AI Success With Cloud Infrastructure
The automotive industry continues to adopt artificial intelligence (AI) at an increasingly rapid pace to stay abreast of numerous production challenges and market opportunities.
AI delivers many engineering and manufacturing benefits, from accelerating design iterations to refining quality control on production lines. AI also helps forward thinking automotive companies adapt effectively and swiftly to rapidly changing business and industry priorities.
EnterpriseAI, November 11th, 2022
(Get More Information . .) open to premium members only

You'd Never Know AI Drew This Beautiful Comic Series
The Bestiary Chronicles is both a modern fable on the rise of artificial intelligence and a demonstration of how shockingly fast AI is evolving.
You might expect a comic book series featuring art generated entirely by artificial intelligence technology to be full of surreal images that have you tilting your head trying to grasp what kind of sense-shifting madness you're looking at.

Not so with the images in The Bestiary Chronicles, a free, three-part comics series from Campfire Entertainment, an award-winning New York-based production house focused on creative storytelling.

CNET, November 11th, 2022
(Get More Information . .) open to premium members only

IT News - Technology
disable
Understanding The Power Benefits Of Data Processing Units
The use of hardware acceleration in a DPU to offload processing-intensive tasks can greatly reduce power use, resulting in more efficient data center.
The data processing unit (DPU) is a relatively new technology that offloads processing-intensive tasks from the CPU onto a separate 'card' in the server. I put 'card' in quotes as that's the form factor but in reality, a DPU is a mini server on board that's highly optimized for network, storage, and management tasks. A general CPU on board a server was never designed for these types of intensive data center workloads and can often bog down a server.

A good analogy is to consider the role of a GPU. They handle all the graphics- and math-intensive tasks, enabling the CPU to handle the types of tasks it was designed to. A DPU plays a similar role with data center tasks. Despite the strong value proposition, there are still many skeptics of DPUs, primarily because they use more power than a regular network card, but that shows a lack of understanding of workloads.

Blocks&Files, November 8th, 2022
(Get More Information . .) open to premium members only

IDC Futurescape: Top 10 Worldwide Future Of Connectedness Predictions
International Data Corporation (IDC) has announced its Future of Connectedness predictions for 2023 and beyond.
The transition to hybrid work and more distributed workforces has created greater expectations from employees, customers, and partners for seamless anytime anywhere digital interactions to mission-critical systems and processes.

As businesses look ahead to 2023 and beyond, they will face added stressors - economic uncertainty, regional conflicts, supply chain constraints, and a shortage of workers and staffing. While these challenges will play a role in key decisions, IDC data shows that 81% of organizations are still prioritizing connectivity programs. Companies are expected to continue leveraging investments to automate key processes, transform workplaces, improve customer experiences, and increase corporate resiliency.

IDC, November 10th, 2022
(Get More Information . .) open to premium members only

Solidigm Roadmap Promises 61TB SSD
Solidigm presented a detailed look of its near-term SSD roadmap at the Tech Field Day 2022 event, and tucked away in the portfolio is a 61TB drive.
There are actually two drives on the way, both built with Solidigm's fourth-generation 192-layer QLC (4bits/cell) 3D NAND, and called Essential Endurance and Value Endurance. The Essential Endurance variant has a 4KB block size and 3.84, 7.68, 15.36, and 30.72TB capacities, and a maximum 32PB written (PBW) endurance. The Value Endurance has a 16KB block size and capacities of 7.68, 15.36, 30.72, and 61.44TB with a doubled maximum endurance of about circa 65PBW.
Blocks&Files, November 7th, 2022
(Get More Information . .) open to premium members only

IT News - ERP
disable
3 Ways Companies Can Utilize ERP As Recession Hedge
Strong enterprise resource planning (ERP) systems can help businesses prepare to survive an impending and potentially inevitable recession.
With many economists predicting an imminent recession and sluggish consumer spending, CFOs need to be prepared to weather the storm.

'We are headed into another change,' Sharon Bhalaru, partner at national accounting and consulting firm Armanino LLP, said in an interview with CFO Dive, noting that many companies are right now wrestling with a difficult period marked by volatility, uncertainty, complexity and ambiguity - the concept known as VUCA.

CIODIVE, November 9th, 2022
(Get More Information . .) open to premium members only

IT News - Humor
disable
Go Ahead, Be Rude. You Don't Know It Now, But It Will Cost You $350,000
Welcome again to On-Call, The Register's Friday frolic through readers' memories of support jobs that had odd endings.
This week, meet "Larry," who once worked for a company that we won't name. Just understand that this firm is a big name in the business IT world. You don't need to have the powers of a seer to figure this one out.

Larry was running a project to replace the laptops in an entire division of 500 staff, and decided to split the deal between two PC makers.

Users were mostly happy with their shiny new laptops, but one user brought theirs to Larry to report it wasn't working. This machine - well and truly still under warranty - was making the kind of noises that suggested a storage drive had died.

The Register, November 11th, 2022
(Get More Information . .) open to premium members only

IT News - BI
disable
5 Tips For Excelling At Self-Service Analytics
Organizations are accelerating their ability to make data-driven decisions by offering analytics capabilities directly to business users. Here's how to do it right.
Data-informed decision-making is a key attribute of the modern digital business. But experienced data analysts and data scientists can be expensive and difficult to find and retain.

One potential solution to this challenge is to deploy self-service analytics, a type of business intelligence (BI) that enables business users to perform queries and generate reports on their own with little or no help from IT or data specialists.

CIO, November 9th, 2022
(Get More Information . .) open to premium members only

IT News - HR
disable
The Companies That Went Fully Remote - And Never Looked Back
Scrapped plans for a new headquarters. An expired lease. A coronavirus-driven shift to remote work has been seamless enough for some companies to ditch physical offices altogether.
Going into 2020, Boston-based Interactions LLC had a clear plan. The technology company would move its headquarters, doubling its total office space at a cost of more than $5 million. All seemed to be going smoothly, and the company was in the process of completing the requisite paperwork.

Then came the coronavirus - and with it, a story that anyone who has sat in an HR department over the past two-odd years likely knows all too well.

HRDive, November 7th, 2022
(Get More Information . .) open to premium members only

IT News - Operations
disable
What Businesses Need To Know About Ransomware Removal And Recovery
Ransomware is a major threat for businesses of all sizes. According to figures from Statista, there were more than 623 million of these attacks in 2021, and the average cost of a ransomware payment reached $541,000 last year - though this only accounts for a fraction of the total cost of these incidents.
This correlates with confirmed attack statistics by BlackFog which saw a record number of attacks in 2021 and 2022.

Therefore, preventing ransomware from causing harm must be a top priority. But while efforts to prevent ransomware entering a business in the first place are vital, it's also crucial that firms have a strong response plan in place should their first lines of defense fail.

A clear strategy for ransomware removal and recovery can help minimize the costs and disruption associated with these incidents, prevent data from being exposed and reduce the chances of cybercriminals returning for repeated attacks.

ComputerWeekly, November 7th, 2022
(Get More Information . .) open to premium members only

IT News - Security
disable
Finding and Remediating OpenSSL Vulnerabilities at Scale: The Balbix Playbook
Whenever a new critical vulnerability hits the world (like last week's high severity OpenSSL vulnerabilities), security teams have to scramble to answer:...
  • What software is impacted?
  • What systems are impacted?
  • How long will it take to patch critical systems?
  • What the impact would be from leaving the vulnerability open in systems with low exposure or impact?

This task is increasingly not a human scale problem; the number of vulnerabilities and assets that organizations like yours have to manage, are growing exponentially.

The path forward lies in automation. Automation allows you to easily find and remediate vulnerabilities at scale. With automation, you can get instant visibility of impacted assets and can easily remediate vulnerabilities to reduce their exposure from weeks and months to days.

Security Boulevard, November 11th, 2022
(Get More Information . .) open to premium members only

IT Security: 3 Areas To Prioritize For The Rest Of 2022
Even in the last weeks of 2022, there are steps you can take to bolster your organization's security. Consider this expert advice
As 2022 winds down, it's tempting to allocate all IT brain power and resources to 2023 planning. But it would be a mistake to assume that there are no remaining agenda items to address this year. The evolving cybersecurity landscape means new vulnerabilities and attack methods are continually emerging.

While combating these threats is undoubtedly a priority for the year ahead, here are three key areas that should be dealt with before you close the door on 2022.

The Enterprisers Project, November 11th, 2022
(Get More Information . .) open to premium members only

IT News - Database
disable
Not Every Database Is The Same: Graph vs. Relational
According to IDC, the amount of digital data created over the next five years will be greater than twice the amount of data created since the advent of digital storage.
Mirroring this sentiment, Statista predicts that data creation will grow to more than 180 zettabytes by 2025, which is about 118.8 zettabytes more than in 2020. This vast, and ever-increasing, volume of data is creating havoc for organizations that need to streamline data integration, lower the cost of data storage, and power downstream analytics.

Complicating an already challenging situation is the fact that today's enterprise data landscape is increasingly hybrid, varied, and changing. IoT-generated data, increasing volumes of unstructured data, the growing reliance on outside data sources, and rising prevalence of hybrid multi-cloud environments are forcing organizations to scrutinize how they store data.

Dataversity, November 7th, 2022
(Get More Information . .) open to premium members only

IT News - FOSS
disable
7 Best Open Source Web-Based Email Clients
Email services are here to stay, even if decentralized tech takes over the internet.
However, with big tech trying to control everything new aspect of emerging technologies, how can you take charge of your email service?

Whether a business/enterprise or an individual, a self-hosted open-source webmail service is always an option worth considering. Your server, your digital infrastructure, and your email service platform. This way, you do not have to rely on a vendor or a third party to manage your email services. You do it your way.

IT'S FOSS, November 9th, 2022
(Get More Information . .) open to premium members only

IT News - HPC
disable
Hyperion Paints A Positive Picture Of The HPC Market
Return to normalcy is too strong, but the latest portrait of the HPC market presented by Hyperion Research yesterday is a positive one.
Total 2022 HPC revenue (on-premise and cloud) will likely wind up around $38.5 billion, roughly 10% over 2021 ($34.8 billion), and next year, 2023, is forecast to hit in the $42.7 billion range. Post-pandemic HPC is bouncing back, if perhaps a bit unevenly.

Lingering supply chain issues, both pandemic- and geopolitical-related, continue to cloud the outlook. There are also worries of a potential broader economic slowdown. Stir all of that altogether and these remain difficult days to be in the forecasting business. On the plus side, demand for AI technology (chips and systems and software) remains strong. Use of cloud-based HPC is surging. Sales at the top end of the market remain strong. And storage, a perennially robust HPC market, is getting an added boost driven by the data demands of AI and IoT.

HPCwire, November 8th, 2022
(Get More Information . .) open to premium members only

One New Feature For Intel's HPC Compute Engines: Contrition
It is very rare for any of the major semiconductor suppliers of the world to ever admit that things are going wrong, even when we all know that they have been.
But as part of a briefing ahead of the SC22 supercomputing conference next week and just ahead of AMD's launch of the 'Genoa' Epyc 9004 series of processors, we got a little something that looked like contrition as Intel is late delivering its 'Sapphire Rapids' Xeon SP CPUs with HBM memory and its related 'Ponte Vecchio' Xe HPC GPUs.

This may be the last time we have to type or read Xe HPC when referring to Intel's compute engines focused on HPC and AI, so let's celebrate that for a second as we contemplate the 'Max Series' branding that Intel has adopted for its HBM-goosed Xeon SP processors, its Ponte Vecchio and follow-on 'Rialto Bridge' datacenter GPUs, and the future hybrid 'Falcon Shores' hybrid CPU-GPU packages due in 2024 alongside the 'Granite Rapids' Xeon SPs. So long superscript e, we never really liked you in a brand name. Go back to the natural logarithm where you belong. . . .

The Next Platform, November 9th, 2022
(Get More Information . .) open to premium members only

IT News - Cloud
disable
2023 Cloud Data Management Predictions
Here are five cloud data management trends to track to maximize data value.
Managing the cost and complexity of cloud infrastructure will be Job No. 1 for enterprise IT in 2023. Cloud spending will continue, although at perhaps a more measured pace during uncertain economic times. What will be paramount is to have the best data possible on cloud assets to make sound decisions on where to move data and how to manage it for cost efficiency, performance, and analytics projects.
ITProToday, November 9th, 2022
(Get More Information . .) open to premium members only

IT News - Wireless
disable
How To Ensure 5G Wireless Network Security
5G creates opportunity for users but also for cybercriminals, so how can organisations ensure 5G wireless network security?
One thing is clear about 5G and network security- it does not involve more of the same. Organisations can't just scale-up existing practices and technologies; they need a new approach.

As Adrian Belcher, Solutions Architect at Gigamon, told me, organisations need 'to treat 5G as a paradigm shift, and they will need an open mindset'.

Information Age, November 7th, 2022
(Get More Information . .) open to premium members only

IT News - DR
disable
Cyber Attacks Are Challenging Organizational Business Continuity Capabilities
New research shows that the majority of organizations don't have confidence that their business continuity strategies will be effective following a successful cyber attack.
This is one of the findings in 'The State of Data Security', a Wakefield Research study commissioned by Rubrik Zero Labs to gather insights from more than 1,600 security and IT leaders including CISOs, CIOs, VPs, and Directors across 10 countries.

Key findings include:

> 92 percent of respondents are concerned they will be unable to maintain business continuity if they experience a cyber attack.

> Only 5 percent of organizations were able to return to business continuity or normal operations within one hour of discovering a cyber attack.

Continuity Central, November 8th, 2022
(Get More Information . .) open to premium members only

IT News - Networks
disable
IPv4 vs. IPv6: What's the difference?
IPv4 and IPv6 are two forms of IP addresses, but they differ in length and style. Compare the two, and find out why organizations might implement one over the other.
IP is a mechanism used to logically identify devices at the network layer of the TCP/IP model. Each device on an IP network must have a unique IP address, subnet and default gateway to perform intersubnet or intervirtual LAN communication by way of routing.

Devices on the internet currently use one of two versions of IP addresses: IPv4 or IPv6. Let's compare how these two addressing types differ.

SearchNetworking, November 9th, 2022
(Get More Information . .) open to premium members only

Network Monitoring Requirements: 3 Keys For Modern Network Architectures
The editors at Solutions Review strategize modern network monitoring requirements in this curated piece based on a guide from our partners at Broadcom.
In the age of Bring-Your-Own-Device (BYOD) and work from home, the enterprise network has expanded far beyond the corporate office walls to any device, on any network, anywhere in the world. Connectivity is more important than ever before. Any potential degradation in network performance, reduction in availability, or even an outage must be proactively prevented to ensure continued revenue growth and an engaging customer experience. This is why IT teams must focus on modernizing their network monitoring requirements and strategy.

There are many ways to dissect your approach to NetMon. However, these are the three keys for building modern network architectures.

Solutions Review, November 7th, 2022
(Get More Information . .) open to premium members only

Cloud Networking vs. Cloud Computing: What's The Difference?
Organizations might sometimes consider cloud computing and cloud networking as interchangeable due to their similarities. But the two strategies have different goals and processes.
Cloud computing and cloud networking are related but distinct ideas.

Cloud computing is concerned about how applications run. Cloud networking covers how connectivity to and among applications is managed and delivered.

Cloud computing

Cloud computing shifts enterprise workload hosting from traditional in-house or colocated data centers to a cloud service provider (CSP)'s data center. The enterprise customer has no access to or direct control of the computing infrastructure underlying the services the workload runs on.

SearchNetworking, November 11th, 2022
(Get More Information . .) open to premium members only

IT News - Careers
disable
6 ITOps Skills That Will Never Be Automated
While automation has transformed the way IT operations team work, there remains a variety of ITOps tasks that are just not possible or feasible to automate.
From NoOps to AIOps, the IT industry is abuzz with buzzwords focused on automating IT operations processes. Work that used to involve lots of time and toil can, we're told, be automated away by algorithms and AI.

But that doesn't mean automation will dominate every part of IT operations work. There will always be tasks that even the smartest AI can't handle.

ITProToday, November 9th, 2022
(Get More Information . .) open to premium members only

IT News - Email
disable
Business Email Compromise: Low-Tech, High-Impact Threat
One of the least technologically sophisticated cyberattacks, business email compromise (BEC), is also one of the most damaging.
According to the FBI's Internet Crime Complaint Center (IC3), there were 241,206 business email compromise incidents between 2016 and 2021, with combined global business losses of $43,312,749,946. In its 2021 internet crime report, the FBI cited BEC as the top internet crime in terms of victim loss for the seventh year in a row, totaling almost $2.4 billion in 2021. That was about a billion dollars more than the second-ranked crime.
Security Boulevard, November 7th, 2022
(Get More Information . .) open to premium members only

IT News - Backup
disable
Ransomware Resiliency For Storage & Backup: Trends, Threats & Tips
Ransomware attacks have been in the public eye for quite a while now. Growth is propelled not only by the surge in the number of cybercrime groups specializing in ransomware, but to a large extent, also by the continual increase in attack sophistication.
Ransomware has evolved into a fully-fledged industry, with competing groups that continually introduce new capabilities and techniques.

Some of the new trends in data crimes, such as data leak, threat of data exposure and shaming techniques have ignited the media attention, though other, potentially even more devastating are still not widely discussed, which we'll attempt to correct here.

vmblog.com, November 7th, 2022
(Get More Information . .) open to premium members only

IT News - Encryption
disable
Understanding Bring Your Own Encryption And Keys (BYOE)
The main argument against cloud computing put forward by its detractors is security. BYOE ensures the security of all your cloud services. Let's see how.
In cloud computing, the owner of the data has no direct control over it and is forced to rely on the cloud service provider to keep it safe from unauthorized access. The most commonly accepted solution for protecting information residing in clouds is to encrypt it.

The problem with data encryption is that it not only prevents unauthorized users from accessing the data but also adds complications to using the data for legitimately authorized users.

Geekflare, November 10th, 2022
(Get More Information . .) open to premium members only

All Means All When It Comes To Encryption
Nigel Thorpe, technical director at SecureAge, makes the case for encrypting everything all of the time when it comes to protecting data
The traditional and well-established approach to cyber security is to build multiple layers of defences to stop hackers or rogue insiders getting unauthorised access to data.

But you only have to follow the news headlines to see this does not always work. Determined criminals, hacktivists, or simply lucky hackers have a habit of finding a way through. It's just a case of when. If we cannot keep people out nor trust the people around us, we must rethink the traditional 'castle and moat' methods of protection and adopt a data-centric approach, where security is built into data itself.

ComputerWeekly, November 10th, 2022
(Get More Information . .) open to premium members only

Sections in this issue:
click to jump to section