IT News and Events  
May 9th, 2022 — May 15th, 2022
Volume 290, Issue 2
 
  
 
 
Cisco News
May 13, 2022
Article #116702
Volume 290
Issue 2
Cisco News
 

Perspectives on the Future of Service Provider Networking: The Role of Machine Learning and Artificial Intelligence
Cisco News, May 13th, 2022

The next frontier of innovation for cloud providers is being built on machine learning and artificial intelligence (ML/AI). These emerging capabilities offer customers real-time insight and increase the value and stickiness of the cloud's services. In contrast, networking has lagged. While speeds and feeds have enjoyed Moore's Law-like exponential growth, there hasn't been a corresponding explosion in-network service innovation (much less a leap toward ML/AI-driven services and operations). more

May 12, 2022
Article #116703
Volume 290
Issue 2
Cisco News
 

Better Together: Cisco DNA Center and ThousandEyes
Cisco News, May 12th, 2022

In this blog, we show the benefits of combining Cisco DNA Center with Cisco ThousandEyes and how together, they can help an organization easily address the complexities of troubleshooting application issues and improve the user experience across multiple domains. more

May 12, 2022
Article #116704
Volume 290
Issue 2
Cisco News
 

Focus on HyperFlex: Simplify your edge environments with a local containerized witness
Cisco News, May 12th, 2022

This shift has IT leaders looking at a more de-centralized approach where infrastructure is close to the data in order to deliver better end-user experiences. Organizations are looking at running applications in Remote Office-Branch Office (ROBO) locations with minimal hardware footprint while, at the same time, demanding a completely secure and cloud-like experience. more

May 12, 2022
Article #116705
Volume 290
Issue 2
Cisco News
 

Becoming a Resilient Digital University
Cisco News, May 12th, 2022

La Trobe announced its single largest technology investment in networks, cyber security and other critical IT services with Cisco and Optus. The announcement was notable for the size of the investment and how Universities now see technology enabling its strategic goals.

La Trobe University Vice Chancellor John Dewar suggested the investment was necessary to achieve the university's learning, research and sustainability goals.

'A core component of our University City of the Future is the concept of using the campus as a 'Living Lab'; using existing and emerging technologies to ensure we can reach our Net Zero goals. Not only will we achieve those sustainability goals, but we'll also be bringing together research and innovation in new and exciting ways to benefit industry as well as upskill the workforce in critical areas such as cybersecurity. And underpinning all of that is the need for robust digital infrastructure to ensure we can be resilient and adaptive.' Professor John Dewar, La Trobe University Vice Chancellor more

May 11, 2022
Article #116706
Volume 290
Issue 2
Cisco News
 

Latest Innovations in Cisco DNA Software for Wireless
Cisco News, May 11th, 2022

By deploying the latest innovations in Cisco DNA Advantage software for Wireless along with Cisco DNA Center, you can provide your workforce with improved wireless stability, performance, and security. This leads to increased worker productivity, no matter where they are working from.

What's new?

Wireless 3D Analyzer: Gain a completely new perspective of the typically invisible Wi-Fi radio frequency (RF). 2D maps that show AP placement on the floor and how RF is propagated from a top-down view no longer cut it because we live in a 3D world. more

IT News - CxO
May 15, 2022
Article #116667
Volume 290
Issue 2
IT News - CxO
 

What's Next For Digital Transformation?
CIO, May 2nd, 2022

"Digital transformation isn't new," opines Thornton May in CIO.

"Indeed, it has been on the CIO's agenda for at least 35 years.

I assisted in designing and stage-managing my first symposium on digital transformation in 1987. The keynote speakers were the CEO at the emerging technology supplier and the Chairman/CEO at one of the world's largest and most technologically sophisticated financial institutions..." more

May 15, 2022
Article #116668
Volume 290
Issue 2
IT News - CxO
 

5 Harvard Business Review Articles That Will Resonate With CIOs Right Now
The Enterprisers Project, May 4th, 2022

Katie Sanders writes in The Enterprisers Project, "Each month, through our partnership with Harvard Business Review, we refresh our resource library with five new HBR articles we believe CIOs and IT leaders will value highly. Check out the curated pieces below, available to readers through the end of the month.

  • The 4 Pillars of Successful Digital Transformations
  • Can AI Teach Us How to Become More Emotionally Intelligent?
  • Lessons from Hollywood's Digital Transformation
  • How to Succeed Quickly in a New Role
  • Yes, You Can Quit Your Job Without Burning a Bridge

Read on for details more

May 15, 2022
Article #116669
Volume 290
Issue 2
IT News - CxO
 

Top 10 Business Needs Driving IT Spending Today
CIO, May 4th, 2022

"Ceridian SVP and CIO Carrie Rasmussen got a 7% bump in her IT budget for 2022, with her company's growth, its ongoing digitalization drive, and security mindfulness driving the boost," writes Mary Pratt in CIO.

"More specifically, Rasmussen is boosting her spend on cybersecurity to help manage risk, a key element for enabling Ceridian's planned global expansion.

Some of the extra funds are paying for work to consolidate applications and services, a move Rasmussen classifies as an efficiency play 'that will free up money to reinvest.'..." more

May 15, 2022
Article #116670
Volume 290
Issue 2
IT News - CxO
 

Tackling The Threats Posed By Shadow IT
HelpNet Security, May 5th, 2022

"In addition to the ever-increasing number of personal devices, corporate devices and programs, more and more applications are moving to the cloud as workloads become increasingly distributed across public clouds and software-as-a-service (SaaS)," writes Chris Mayers in HelpNet Security.

"This means IT teams are even harder pressed to secure and manage the complex environments they operate in. The unsanctioned use of corporate IT systems, devices, and software - known as shadow IT - has increased significantly during the shift to remote work, and recent research found almost one in seven (68%) are concerned about information security because of employees following shadow IT practices. more

May 15, 2022
Article #116671
Volume 290
Issue 2
IT News - CxO
 

3 Consultant Mistakes CIOs Can't Help Making
CIO, May 5th, 2022

"There comes a time in the professional life of most CIOs when they - you - need to bring in a consultant," opines Bob Lewis in CIO.

"Not a contractor. That's someone with a defined set of skills you bring in to help with day-to-day tasks.

We're talking about someone with broad expertise and experience-based judgment you pay for good advice. Having spent time on both sides of the CIO/consultant relationship I can say, with confidence, that a lot of CIOs don't know how to best work with us..." more

May 15, 2022
Article #116672
Volume 290
Issue 2
IT News - CxO
 

Gartner's Top CEO Priorities For 2022
CXOtoday.com, May 5th, 2022

"People, purpose, prices and productivity emerged in a recent Gartner survey as key issues for the C-suite in 2022, and looking to 2023, reflecting a radical shift in priorities not seen in 15 years but likely to represent enduring change in the mindset of CEOs," writes Mark Raskino in CXOtoday.com.

"In 2022, the Gartner CEO and Senior Business Executive Survey showed that, catalyzed by multiple macro trends and economic factors, business leaders are reprioritizing some key areas of enterprise purpose and management focus.

The Gartner survey polled more than 400 senior business leaders about their 2022-23 priorities and technology-related thinking. (Participants span industries outside the tech sector and commercial, revenue-pursuing organizations.)..." more

IT News - MFA
May 15, 2022
Article #116699
Volume 290
Issue 2
IT News - MFA
 

Github To Developers: Turn On 2FA, Or Lose Access
DARKReading, May 4th, 2022

"Security experts have been banging the multifactor authentication (MFA) drum for years," writes Fahmida Y. Rashid in DARKReading, "encouraging users to move away from solely relying on the username/password combination to secure their most sensitive accounts. Now GitHub is done with encouraging: By the end of 2023, all users who contribute code to GitHub-hosted repositories must have one or more forms of two-factor authentication (2FA) enabled, the company says.

Zero-day attacks and sophisticated exploits are scary, but social engineering and credential theft pose bigger headaches for enterprise defenders. User credentials grant attackers full access to the application and the associated data, or in case of a code repository like GitHub, visibility into source code as well as the ability to maliciously modify the code..." more

IT News - Storage
May 15, 2022
Article #116685
Volume 290
Issue 2
IT News - Storage
 

What Are Emerging Data Storage Options?
ITProToday, May 6th, 2022

"Emerging data storage is a category of high-speed storage that includes hyper-converged infrastructure, NVMe/PCIe storage interface, edge storage, among other innovative technologies," notes Rich Castagna in ITProToday.

"Data storage technology has traditionally acted as a background player in data centers but is today recognized as a strategic enterprise computing resource. The change in storage's status began in the mid-1990s, when the idea of centralized, networked and shared storage took hold and put storage on a nearly equal footing as application servers. Storage's role in modern data architectures grew as storage area network (SAN) and network-attached storage (NAS) technologies evolved into sophisticated data repositories. The introduction of solid-state media accelerated storage's evolution as flash added read/write speeds that affected the entire computing environment..." more

IT News - AI
May 15, 2022
Article #116688
Volume 290
Issue 2
IT News - AI
 

Artificial Intelligence Enables Next-Gen Data Loss Prevention
eWeek, May 6th, 2022

Zeus Kerravala writes in eWeek, "Data management and security practices are changing rapidly as data becomes fully distributed and fully situated in the cloud today.

Every organization is using hundreds of software-as-a-service (SaaS) apps-many that aren't company approved. SaaS apps allow users to access them from anywhere at any time, boosting productivity and collaboration, which is why 'shadow IT' has become one of the biggest headaches for corporate IT..." more

May 15, 2022
Article #116689
Volume 290
Issue 2
IT News - AI
 

Making AI Accountable: Blockchain, Governance, And Auditability
InfoWorld, May 5th, 2022

"The past few years have brought much hand wringing and arm waving about artificial intelligence (AI)," writes Scott Zoldi in InfoWorld, "as business people and technologists alike worry about the outsize decisioning power they believe these systems to have.

As a data scientist, I am accustomed to being the voice of reason about the possibilities and limitations of AI. In this article I'll explain how companies can use blockchain technology for model development governance, a breakthrough to better understand AI, make the model development process auditable, and identify and assign accountability for AI decisioning..." more

May 15, 2022
Article #116690
Volume 290
Issue 2
IT News - AI
 

5 AI Adoption Mistakes To Avoid
The Enterprisers Project, May 5th, 2022

"Artificial intelligence (AI) and machine learning can be invaluable assets to business success, opines Justin Silver in The Enterprisers Project. "By implementing AI, businesses can automate hours' worth of manual labor sifting through data to enable smarter and faster business decisions. However, automation and AI do not remove the need for human responsibility.

It's important to follow best practices to ensure AI helps versus hurts your business. Here are five mistakes to avoid in leveraging AI to meet company goals..." more

IT News - ERP
May 15, 2022
Article #116698
Volume 290
Issue 2
IT News - ERP
 

8 Of The Best ERP Software For Energy Companies To Consider
Solutions Review, May 6th, 2022

William Jepma writes in Solutions Review, "ERP is a robust enterprise technology solution for manufacturing and distribution businesses. It is also an essential tool for finance, accounting, risk management, and other use cases for companies across industries. Now, more than ever, ERP is becoming increasingly crucial for companies across the energy industry. These companies need an integrated solution suite to help them connect departments and manage resources across global business needs.

To help your company find the best ERP software for its needs, the editors at Solutions Review have compiled the following list of ERP software for energy marketplaces. Our editors selected these software solutions based on each provider's Authority Score, a meta-analysis of user sentiment through the web's most trusted business software review sites, and our proprietary five-point inclusion criteria. The list is organized alphabetically..." more

IT News - HR
May 15, 2022
Article #116694
Volume 290
Issue 2
IT News - HR
 

3 Predictions For The Future Of IT Jobs
ITProToday, May 4th, 2022

"Since nobody has a crystal ball, predicting the future is always an uncertain endeavor," writes Jordan Horowitz in ITProToday. "The best we can do is use the past and the present as our guides while asking questions like, What did the world look like 10 years ago, and what kinds of predictions did we make back then? Which of those predictions came true, and which ones didn't? Trying to answer these questions can help paint a picture of what the future might bring and prepare us for potential challenges.

In a panel discussion at last week's Open Networaking User Group (ONUG) Spring Conference, held virtually and in Secaucus, N.J., four technology experts tried to answer the question, 'Will IT teams exist in the next 10 years?' The panelists covered a wide range of topics related to the future of IT jobs, such as talent recruiting, low-code/no-code development, and AI and machine learning (ML). They resisted making wild, pie-in-the-sky predictions and remained grounded, while, at the same time, avoided the kind of pessimism that can stifle innovation in any field..." more

May 15, 2022
Article #116695
Volume 290
Issue 2
IT News - HR
 

How HR Leaders Should Approach Today's Ever-Evolving Workplace
Gartner, May 5th, 2022

The level of volatility will only increase this year as new COVID-19 variants emerge, hybrid work continues to create unevenness in the employee experience, and employers and employees contend with compensation in a high-inflation environment.

We sat down with Brian Kropp, chief of research in the Gartner HR practice, to discuss how HR leaders should approach an ever-evolving work environment. more

IT News - Security
May 15, 2022
Article #116679
Volume 290
Issue 2
IT News - Security
 

The New Cybersecurity Mandate
CSO Online, May 5th, 2022

"The increasing importance of cybersecurity was underlined in President Biden's of May 12, 2021," notes Matthew Tyson in CSO Online.

"This focus has been reiterated, and even more emphatically described in the context of the Russian invasion of Ukraine.

A surprising conclusion from these governmental missives is that in the high-tech world of cybersecurity, the core challenge is not advanced cryptological methods nor quantum computing, but simply implementing known best practices in the real world.

I'll bet you never thought you'd see a president issue an executive order describing how to handle logging, but that day has come. Let's take a look at what the highest levels of government are calling for in cybersecurity. more

May 15, 2022
Article #116680
Volume 290
Issue 2
IT News - Security
 

7 Threat Detection Challenges Cisos Face And What They Can Do About It
HelpNet Security, May 5th, 2022

"In fact," notes Sanjay Raja in HelpNet Security, "according to recent research, there were over 170 million new malware variants in 2021 alone. As a result, the burden on CISOs and their teams to identify and stop these new threats has never been higher. But in doing so, they're faced with a variety of challenges: skills shortages, manual data correlation, chasing false positives, lengthy investigations, and more. In this article, I'd like to explore some of the threat detection program challenges CISOs are facing and provide some tips on how they can improve their security operations..." more

May 15, 2022
Article #116681
Volume 290
Issue 2
IT News - Security
 

Phishing Is Surging - Can Enterprises Protect Themselves?
enterprise times, May 5th, 2022

Jason Kent writes in enterprise times, "That is up by 35% compared to 2020 data. Phishing attacks are a serious threat that can lead to ransomware infection. 59% of organisations that fall victim to a phishing attack are infected with ransomware as a result. As these threats escalate, what, if anything, can organisations do to protect themselves?

Phishing is the number one attack vector for bad actors

Phishing is a social engineering attack. It attempts to steal user data such as login credentials and credit card numbers. Such schemes are becoming increasingly sophisticated. They can easily trick people into assuming it is a normal email or text from a trusted person or reputable business, such as their colleague or bank..." more

May 15, 2022
Article #116682
Volume 290
Issue 2
IT News - Security
 

5 Tips For World Password Day From Cybersecurity Experts
Security Boulevard, May 5th, 2022

Lisa Vaas writes in Security Boulevard, "Still using 'MrFluff' as your password? Maybe mixed with a little Leet-speak - say, 'MrFl0ff' - to confound all those hackers who want to vacuum out your 401K plan?

Well, today is the first Thursday in May, and that means it's World Password Day. Time to celebrate! You can do that by retiring 'MrFl0ff' and replacing him with a longer, stronger password than a pet's name (consistently a subset of the most hacked passwords worldwide, studies have found). Contrast Security experts also suggest turning on multi-factor authentication (MFA) for important accounts, which would give MrFluff a new, far harder to crack name - like, say, *6fjI5%4&crkN.'

We asked Contrasters for more tips on what developers and enterprises should know about password policies: Read on!..." more

May 15, 2022
Article #116683
Volume 290
Issue 2
IT News - Security
 

5 Cybersecurity Threats That Aren't Going Away
eWeek, May 5th, 2022

Clearly, organizations must have the correct people and processes in place to prepare for unrelenting cyber attackers.

As CIOs, CISOs, CTOs, and IT managers think about boosting cybersecurity strategies, they should consider what happened in the year prior and what might potentially get worse. Below are some of the cybersecurity threats that remain stubbornly consistent - and must be guarded against at all times. more

IT News - Database
May 15, 2022
Article #116687
Volume 290
Issue 2
IT News - Database
 

Why Are Graph Databases Beginning To Take Off?
enterprise times, May 6th, 2022

"One of the challenges of any database technology is maturity and acceptance," opines Ian Murphy in enterprise times. "Yet, given the size of the market, there should be plenty of room for multiple technologies. We asked Dr Xu what has been holding graph databases back.

Dr Xu replied, 'It's harder to make a breakthrough because people feel more comfortable with traditional databases, like a relational database. They think they can use the relational database for everything and don't need any other tools.' The problem here is that we know the RDBMS is struggling to support all our use cases..." more

IT News - CRM
May 15, 2022
Article #116693
Volume 290
Issue 2
IT News - CRM
 

Advantages And Challenges Of CRM Software
CIOinsight, May 5th, 2022

Madeline Clarke writes in CIOinsight, "For this reason, enterprises and organizations often utilize CRM software systems to uncover the best ways to exceed their customers' expectations.

CRM software can provide helpful insights for enterprises when leveraged effectively. However, a mistake that many organizations make when implementing CRM solutions is not knowing the ins and outs of this software beforehand. For the smoothest process, take the time to understand the advantages and challenges of implementing a CRM software system..." more

IT News - Linux
May 15, 2022
Article #116678
Volume 290
Issue 2
IT News - Linux
 

How To Set Up Passwordless SSH Login With SSH Keys
ByteXD, May 6th, 2022

We computer users have been conditioned to use passwords for everything.

It's surprising to learn that there are methods other than passwords, but there is something better: cryptographic keys.

In this tutorial we will learn what SSH keys are and why they are better than passwords. You will learn how to set them up on your computer and how to use them to login with SSH without a password. more

IT News - FOSS
May 15, 2022
Article #116686
Volume 290
Issue 2
IT News - FOSS
 

LibreOffice 7.3.3 Office Suite Is Now Available For Download With 88 Bug Fixes
9to5Linux, May 5th, 2022

LibreOffice 7.3.3 is here five weeks after LibreOffice 7.3.2 as the third minor release of the LibreOffice 7.3 family to address more bugs and further improve interoperability with proprietary document formats. A total of 88 bugs were fixed in this update, as you can see from the RC1 and RC2 changelogs.

These bug fixes strengthen the LibreOffice 7.3 office suite to provide users with better stability and reliability, as well as to offer them the highest level of compatibility with proprietary document formats from the MS Office office suite, such as DOCX, XLSX, and PPTX files. more

IT News - Cloud
May 15, 2022
Article #116674
Volume 290
Issue 2
IT News - Cloud
 

6 Key Challenges Of Complex Cloud Environments - And How To Manage Them
CIO, May 3rd, 2022

"The dramatic shift to cloud services over the past few years has given organizations unprecedented flexibility and scalability, enabling them to forge ahead with digital transformation efforts," writes Bob Violino in CIO.

"For many, it has also led to intermingled, complex strategies that threaten to take away some of the luster of the cloud.

Enterprises don't typically deploy one cloud service and call it a day. They rely on multiple offerings from various vendors for everything from procuring key business applications to creating new development environments to running their entire IT infrastructure..." more

May 15, 2022
Article #116675
Volume 290
Issue 2
IT News - Cloud
 

8 Ways To Reduce Cloud Costs
SearchCloudComputing, May 4th, 2022

Sarah Neenan and Stephen J. Bigelow write in SearchCloudComputing, "Many organizations reap the benefits of hosting workloads in the cloud, yet this infrastructure model is not sustainable if you can't keep your cloud bills under control. Companies must carefully evaluate their cloud services fees.

Cloud bills skyrocket for multiple reasons, such as overprovisioned resources, unnecessary capacity and poor visibility into the environment. Fortunately, there are tools and cost optimization practices that can help eliminate unnecessary spending. Cost optimization also helps organizations strike a balance between cloud performance and spend.

Learn how to reduce cloud costs with the following practices and tools..." more

May 15, 2022
Article #116676
Volume 290
Issue 2
IT News - Cloud
 

Best Serverless Computing Providers Of 2022
ServerWatch, May 4th, 2022

"An O'Reilly survey found that 40 percent of respondents worked at a company that had adopted serverless architecture," reports Drew Robb in ServerWatch.

"And a Datadog survey discovered that 50 percent of AWS users were using the serverless function. Furthermore, Precision Reports projects the global serverless architecture market size will reach $10290 million by 2026, from $3570 million in 2019, at a CAGR of 16.2 percent during 2021-2026.

In a market that's growing so rapidly, it can be difficult to determine which serverless vendor is right for you. Keep your business's unique needs in mind as you evaluate each solution's key differentiators..." more

May 15, 2022
Article #116677
Volume 290
Issue 2
IT News - Cloud
 

Multicloud And Consistent Innovation Now A Necessity For Orgs, Not A Choice
SiliconANGLE , May 5th, 2022

"Focusing on this technology, Dell Technologies Inc. and Deloitte Consulting are working to create better, more conducive environments within which organizations can either migrate to or maximize their existing stacks," reports Victor Dabrinze in SiliconANGLE .

"'Anybody who's leveraging cloud computing is going to find that there's a need to leverage multiple clouds and multiple kinds of technologies,' said David Linthicum (pictured, left), chief cloud strategy officer at Deloitte. 'And, therefore, we're kind of focused on what's in between the clouds versus the clouds themselves..." more

IT News - Networks
May 15, 2022
Article #116700
Volume 290
Issue 2
IT News - Networks
 

SD-WAN And Cybersecurity: Two Sides Of The Same Coin
CSO Online, May 4th, 2022

Software-defined wide area networking, or SD-WAN, is the next frontier for the network edge. Multiple analysts report that the SD-WAN market is in the billions of dollars, with an annual growth rate in the 25% to 35% range. Managed service providers and carriers globally are increasingly deploying managed SD-WAN services to reach new markets. Almost all networking and security vendors have SD-WAN offerings, complicating the decision when choosing an SD-WAN solution.

Security and WAN connectivity decisions have become a collaborative decision between the security and networking teams. Prior to this, enterprise networking teams were responsible for setting up connectivity to major company locations, while connections to branches and remote offices fell to the enterprise WAN manager. In the meantime, dedicated security teams were tasked with procuring, deploying, and managing firewalls. more

May 15, 2022
Article #116701
Volume 290
Issue 2
IT News - Networks
 

6 Types Of Enterprise Networking Topologies
SearchNetworking, May 6th, 2022

Andrew Froehlich writes in SearchNetworking, "No two networks are designed and built the same. One business might have drastically different network deployment goals from another. Network professionals tailor each system to meet the levels of access, control and performance based on the goals of a business.

That said, enterprise-grade networking technologies come with their own limitations, so network professionals must build networks based on how the equipment operates. Most network topologies -- which include networking equipment and supplemental software -- are flexible, but they also have a few specific deployment methods.

Here's a look at six popular types of network topologies. Some legacy topologies are rarely used, while others are newer and provide more performance, reliability and security. Let's look at each topology type and how each operates..." more

IT News - Careers
May 15, 2022
Article #116691
Volume 290
Issue 2
IT News - Careers
 

Uptime Institute Debuts Sustainability-Focused Accreditation For Datacentre Professionals
ComputerWeekly, May 6th, 2022

"The Uptime Institute is continuing to build out the support it can offer datacentre managers and operators that need to hone their sustainability strategies, with the roll-out of a new accreditation," reports Caroline Donnelly in ComputerWeekly.

"The datacentre resiliency think tank's Accredited Sustainability Advisor (ASA) course is geared towards providing participants with the knowledge and practical skills they need to create and manage a sustainability strategy on behalf of their organisation..." more

May 15, 2022
Article #116692
Volume 290
Issue 2
IT News - Careers
 

10 Ways To Recession-Proof Your IT Career
CIO, May 2nd, 2022

"Tech leaders are known for planning ahead," writes Paul Heltzel in CIO, "and many are watching the state of the economy with interest, as inflation is on the rise, coupled with pandemic-related supply shortages and other global factors that increase the risk of a recession. The same forward-thinking approaches that help tech companies adapt - when faced with other forms of disruption - can also be applied to your career.

There are steps you can take to protect and advance your career in worrisome economic times, including developing new skills and changing old habits. Progressive companies stay ahead of the curve by looking ahead, and you can do the same by making good use of your time and seeking new opportunities.

Here's a look at 10 ways you can help protect your career prospects in uncertain economic times..." more

IT News - Email
May 15, 2022
Article #116684
Volume 290
Issue 2
IT News - Email
 

$43 Billion Stolen Through Business Email Compromise Since 2016, Reports FBI
Security Boulevard, May 5th, 2022

Graham Cluley writes in Security Boulevard, "The FBI's Internet Crime Complaint Center (IC3) issued a public service announcement on May 4 2022, sharing updated statistics on Business Email Compromise (BEC) attacks which use a variety of social engineering and phishing techniques to break into accounts and trick companies into transferring large amounts of money into the hands of criminals.

The report looked at 241,206 incidents reported to law enforcement and banking institutions between June 2016 and December 2021, and says that the combined domestic and international losses incurred amounted to US $43.31 billion..." more

IT News - Big Data
May 15, 2022
Article #116673
Volume 290
Issue 2
IT News - Big Data
 

The Future Of Data Management: It's Already Here
datanami, May 5th, 2022

Navin Sharma writes in datanami, "We see many signs of market maturity, ranging from total-addressable market projections to vendors pushing ROI. Data fabric's unique ability to integrate enterprise data and reduce the need for repetitive tasks in data discovery, analysis, and implementation are the reasons why many believe this will be the breakout year for the modern data integration approach.

Gartner defines data fabric as a design concept that serves as an integrated layer, or fabric, of data and connecting processes. A data fabric enables data that is dispersed across various locations and used by different applications to be accessed and analyzed in real-time within a unifying data layer, under the same management and security. And they do it by leveraging both human and machine capabilities..." more

IT News - Encryption
May 15, 2022
Article #116697
Volume 290
Issue 2
IT News - Encryption
 

Post-Quantum Cryptography Set to Replace RSA, AES, ECC
DARKReading, May 6th, 2022

Within a decade, the growth of powerful quantum computers will lead to a new era in security, in which once-impenetrable public-key techniques like RSA and ECC will fall to higher levels of brute force. Such techniques need to be replaced by post-quantum cryptography that can stand up to the new challenges.

That's according to an intelligence brief from research company PreScouter. The brief, titled "Quantum Computing and Cybersecurity: Preparing for Post-Quantum Cryptography," says the global quantum computing market will grow from $472 million in 2021 to $1.765 billion by 2026. As the technology spreads from research labs to the cloud, the likelihood of it getting used to defeat current encryption methods rises to near certainty. Indeed, the Biden administration just issued two directives to prepare US government and businesses against future quantum cyberattacks. more