IT News and Events
Secure Software Summit: Exploring Secure Coding Best Practices (Jan 27th)
Jan 10th, 2022 — Jan 16th, 2022 Generate the Custom HTML Email for this Issue
IT News and Events IT News and Events
Volume 286, Issue 2 << Previous Issue | Next Issue >>
IT - CxO
disable
How CISOs Can Address The Challenges Of Cloud Misconfigurations
CXOtoday.com, January 11th, 2022 EST

Multi-cloud strategies offer CISOs an opportunity to rethink their current approach to security, says Fortinet's Rajesh Maurya

IT Leadership: 4 Tips On Achieving Your Goals In 2022
The Enterprisers Project, January 11th, 2022 EST

CIO Rhonda Vetere shares advice on how to use the lessons of the past two years to stay motivated and focused in 2022

Why Security Awareness Training Should Begin In The C-Suite
DARKReading, January 11th, 2022

It's not just the rights and privileges that CXOs have on the network. They can also set an example of what good security hygiene looks like.

4 Ways The CIO Can Help Stem The Great Resignation
CIODIVE, January 11th, 2022

CIOs can take an active role in creating a positive environment that breeds loyalty, both within their organization and across the company

Arming CISOs With the Skills to Combat Disinformation
Security Intelligence, January 12th, 2022

As if chief information security officers (CISOs) did not have enough to deal with, add one more issue to their plates: information warfare.

The Boardroom Isn't Ready For The Next Solarwinds
Security Boulevard, January 14th, 2022

Last year, attacks such as SolarWinds and Colonial Pipeline have served as a powerful wake-up call for enterprises

View From The CIO: Digital Transformation In The Insurance Sector Was Last Year's Problem - Three New Challenges Face Our Digital Future
ITProPortal, January 14th, 2022

Three new challenges for insurance and how to get ahead

Redefining the CISO-CIO Relationship
DARKReading, January 13th, 2022

Most companies today recognize the importance of having a leader tasked with keeping the organization's information assets protected from data breaches, cyberattacks, and bad actors.

WFH to Stay Relevant for Tech Firms Amid Rising COVID Cases
CXOtoday.com, January 13th, 2022

After almost two years of following the work from home (WFH) model, just when Indian tech companies were busy making their back-to-office plans, rising Covid cases across the country and the highly transmissible Omicron variant forced them to rethink their hybrid model in order to play it safe.

The Cybersecurity Measures CTOs Are Actually Implementing
DARKReading, January 14th, 2022

Companies look to multifactor authentication and identity and access management to block attacks, but hedge their bets with disaster recovery.

IT - Storage
disable
7 Decentralized Data Storage Networks Compared
SearchStorage, January 10th, 2022

Set to change the distributed data storage market, decentralized storage offers organizations a promising alternative to centralized cloud storage

Predictions Of Storage Vendors For 2022
StorageNewsletter.com, January 11th, 2022

Like every year, StorageNewsletter.com asked vendors for their 2022 perspectives, following yesterday's top news on the opinion on 26 storage vendors on 2021.

Micron's Tiny Little 2TB SSD
The SSD Guy, January 13th, 2022

Micron has been moving very quickly for the past couple of years, and that has led to the company's undisputed leadership in NAND flash layers and DRAM process nodes.

Reduce Data Storage Waste With Planning, Retention Policies
SearchStorage, January 11th, 2022

Delete unneeded data to ensure no data storage is wasted and to save both time and money. Use retention policies, data repositories and compliance as guides to get started

Best Storage Products Of 2022
StorageNewsletter.com, January 14th, 2022

Here are the companies with the best storage products of the year as compiled by the redaction of StorageNewsLetter.com:

TDK Reports Shipped Prototype HDD Heads With MAS-MAMR Next Gen Recording Technology for 30TB HDDs
StorageNewsletter.com, January 14th, 2022

MAS-MAMR is co-developed with Toshiba corporate R&D Center and Toshiba Electric Devices and Storage, and Showa disks.

IT - AI
disable
10 NLP Predictions For 2022
datanami, January 12th, 2022

Natural language processing (NLP) has been one of the hottest sectors in AI over the past two years.

Deere CTO: Data Quality Sets Pace For Future Of AI
CIODIVE, January 12th, 2022

Data access and quality is a limiting factor for the development of future AI applications, said Deere CTO Jahmy Hindman, speaking at CES 2022 on Jan. 5. Data labeling is still mainly a manual process, which sets the pace for developing advanced models in the enterprise.

The Age of AI-ism
TechTalks, January 13th, 2022

I recently read The Age of AI: And Our Human Future by Henry Kissinger, Eric Schmidt, and Daniel Huttenlocher. The book describes itself as 'an essential roadmap to our present and our future.'

IT - Technology
disable
Gartner Says Worldwide PC Shipments Declined 5% In Fourth Quarter Of 2021 But Grew Nearly 10% For The Year
CXOtoday.com, January 13th, 2022

Market to Remain Healthy Even as Slowing U.S. PC Market Signals the End of Pandemic-Driven Growth

IEEE Computer Society Unveils Its 2022 Technology Predictions
HPCWire, January 13th, 2022

The IEEE Computer Society (IEEE CS) has unveiled its annual Technology Predictions, addressing the long-lasting influence of the pandemic on tech advancements, as well as introducing new fundamentals and anticipated trends shaping the industry for 2022 and beyond

PCI-SIG Releases PCIe 6.0 Specification
PCI-SIG, January 11th, 2022

PCI Express (PCIe) specification has served as the de facto interconnect of choice for nearly two decades

PCIe 6.0 Will Give Us SSDs With Speeds Beyond Your Wildest Dreams
techradar.pro, January 12th, 2022

The PCIe 6.0 specification has now been finalized

The Golden Age Of Computer Monitors
Computerworld, January 13th, 2022

Your display is probably the most important aspect of your ergonomic interaction with your computer. Recent advances are nothing short of amazing

IT - Blockchain
disable
How NFTs Help Shape the Future
NEWSBTC, January 14th, 2022

NFT stands for Non-Fungible Token - Non-Fungible meaning unique, and token meaning record of ownership stored on a blockchain.

Trends In Blockchain For 2022
DevOps.com, January 14th, 2022

Hiring top IT talent is more essential - and more challenging - than ever. Consider these key high-demand roles and how to attract the right candidates

IT - ERP
disable
The 11 Best ERP for Startups and Growing Businesses in 2022
Solutions Review, January 11th, 2022

The editors at Solutions Review have compiled this list of the best ERP solutions for startups and growing businesses to consider

IT - HR
disable
4 Ways HR Leaders Can Reimagine The Great Resignation As An Opportunity
HTDIVE, January 11th, 2022

Companies that focus on skills over titles may gain the upper hand, write Jonathan Pearce and Michael Griffiths of Deloitte.

8 Key Technologies For The Future Of Work
ComputerWorld, January 11th, 2022

As the hybrid workplace becomes the norm, technologies designed to accommodate, protect, and improve productivity for remote and in-office employees will be critical.

Virtual Job Fairs Continue To Help Employers Cast A Wider Net
HRDIVE, January 11th, 2022

The traditional process of vying for recruiter attention may hold marginalized talent back

IT - BI
disable
BI Tools 2022: Best Business Intelligence Software
eWeek, January 11th, 2022

BI software tools identify patterns and trends in data to assist in making strategic business decisions. Compare the top business intelligence tools to see which solution best fits your business needs.

IT - EdTech
disable
'LibreOffice Expert' Magazines Available For Schools And Communities
The Document Foundation, January 11th, 2022

Recently, Linux New Media released a special edition magazine, full of tutorials, tips and tricks about LibreOffice. And some articles were contributed by members of the LibreOffice community!

Best Free QR Code Sites for Teachers
Tech&Learning, January 11th, 2022

QR Codes can be a great way for teachers to distribute class material. Here are free sites you can use to generate QR codes.

Prediction: The Future Of Teacher Evaluations Is Video
eSchool News, January 14th, 2022

An assistant superintendent explains how her district adopted video evaluations for teachers, and why she expects more districts to do the same in the coming years

The 4 Phases Of A Cybersecurity Strategy That Schools Must Implement
EdTech, January 11th, 2022

K-12 schools that don't have a solid approach to preventing and handling cyber incidents can create one - even if they're understaffed - using these key phases

Top Tips To Protect Online Networks In Schools From Cyber Attacks
Information Age, January 10th, 2022

Will Evans, director at Performance Networks, provides his top tips for protecting online networks in schools from cyber attacks

IT - FinTech
disable
DeFi 3.0 - A Pathway Forward
NEWSBTC, January 14th, 2022

The decentralized finance (DeFi) sector is easily one the most potent and promising parts of the world's growing finance industry

Fintech's Future Through The Eyes Of CES
InformationWeek, January 12th, 2022

The technology tradeshow examined evolutions in fintech from boosting financial inclusivity to riding the cryptocurrency wave.

IT - Operations
disable
The Evolution Of Patch Management: How And When It Got So Complicated
DARKReading, January 10th, 2022

In the wake of WannaCry and its ilk, the National Vulnerability Database arose to help security organizations track and prioritize vulnerabilities to patch.

Five Trends Shaping Data Center Industry In 2022
CXOtoday.com, January 12th, 2022

The demand for data is increasing exponentially fuelled by the pandemic and constantly evolving integrated IT infrastructure.

Top Infrastructure Monitoring Tools 2022
IT Business Edge, January 13th, 2022

Infrastructure monitoring is the proactive analysis of application infrastructure that enables you to identify or predict performance issues before they become grave and ensures that network resources are functioning as intended.

What's Next for Patch Management: Automation
DARKReading, January 14th, 2022

The next five years will bring the widespread use of hyperautomation in patch management

IT - Security
disable
10 Lessons Learned From The Top Cyber Threats Of 2021
Security Boulevard, January 10th, 2022

2021 was a busy year for the cyber security community. Emerging threats posed many challenges to security professionals and created many opportunities for threat actors.

Cybersecurity Alone Is Not Enough, Systems Need Cyber Resiliency
Cyber Defense Magazine, January 10th, 2022

Electronics systems today need to go beyond preparedness for an attack to resiliency during and after one.

2022 Cyber Predictions: Preparing For Future Security Challenges
Security Boulevard, January 11th, 2022

The pandemic and subsequent economic shocks have spawned innovations in technology, including large steps forward in the cloud and edge deployments.

5 Things To Know About Next-Generation SIEM
DARKReading, January 11th, 2022

NG-SIEM is emerging as a cloud- and analytics-driven alternative to legacy SIEMs. Based on new research, Omdia highlights five important new insights for anyone considering a NG-SIEM purchase.

7 Hot Cybersecurity Trends (And 2 Going Cold)
CSO Online, January 11th, 2022

Is that security trend hot or not? From tools and technologies to threats and tactics, the numbers don't lie

DDoS Attack Trends For Q4 2021
Cloudflare, January 11th, 2022

The first half of 2021 witnessed massive ransomware and ransom DDoS attack campaigns that interrupted aspects of critical infrastructure around the world

Here's Really How To Do Zero-Trust Security
threatpost, January 11th, 2022

It's not about buying security products! Joseph Carson, chief security scientist from ThycoticCentrify, offers practical steps to start the zero-trust journey.

How To Manage Security Vulnerabilities
Network Computing, January 10th, 2022

A look at what goes into building a Vulnerability Management process and the key parameters that influence the choice of a vulnerability scanner

NIST Updates Cybersecurity Engineering Guidelines
GCN, January 12th, 2022

Amid constant cybersecurity threats, NIST added more insight for engineers and programmers on how to mitigate system vulnerabilities

Ransomware Detection Through Threat Hunting
Security Boulevard, January 14th, 2022

Ransomware is the most destructive kind of cyber attack due to the massive financial losses it inflicts on organisations worldwide.

SECNAP: What is a Security Assessment and Why is it Important
SECNAP, January 10th, 2022

With cybersecurity threats on the rise, it's important to know that your information and overall infrastructure are secure.

The Best Identity And Access Management Software Providers For 2022
Solutions Review, January 11th, 2022

Solutions Review's listing of the best Identity and Access Management software providers is an annual look into the solution providers included in our Buyer's Guide and Solutions Directory.

The Future Of Security Protocols For Remote Work
HelpNet Security, January 14th, 2022

Cybercrime has been growing rapidly for years, and the sudden pandemic-fueled shift to work from home (WFH) only accelerated the threat, forcing businesses to start putting a real focus on establishing solid security protocols and building a strong relationship with their cybersecurity vendors.

Top Five Vulnerabilities Attackers Use Against Browsers
IT Business Edge, January 12th, 2022

Web browsers are the primary target for many attackers because so much sensitive data passes through them

6 Cybersecurity Practices That Organizations Must Embrace In 2022
CXOtoday.com, January 10th, 2022

Organizations as well as governments are increasingly adopting and relying on digital systems to manage their day-to-day activities

Cybersecurity In 2022: Addressing Insider Threats
Security Boulevard, January 11th, 2022

As companies grapple with pandemic-induced economic uncertainty, operational disruption and business transformation, cybersecurity has increasingly coalesced with these priorities.

The 5 Stages Of A Credential Stuffing Attack
tripwire, January 12th, 2022

Many of us are fond of collecting things, but not everyone is excited about Collections #1-5. In 2019, these Collections, composed of ca. 932 GB of data containing billions of email addresses and their passwords, made their way around the Internet.

vBeers-SF
disable
vBeers South Florida (January 19th) Biergarten Boca, Boca Raton
Wednesday, January 19th, 2022: 6:00 PM to 8:00 PM EST

IT - Server
disable
10 Cool Hyperconverged Infrastructure (HCI) Systems In 2022
CRN, January 14th, 2022

From Dell VxRail and HPE SimpliVity to Quantum VS-HCI and Scale Computing HE500, CRN breaks down 10 of the hottest hyperconverged infrastructure systems to know in 2022

IT - Linux
disable
Linux Kernel 5.16 Released. This Is What's New
debugpoint, January 14th, 2022

Linus Torvalds released Linux Kernel 5.16 as the first stable Kernel release of the year 2022, improving storage, processor, ports and all modules

LUKS: Linux Hard Disk Data Encryption with NTFS Support in Linux
TECMINT, January 10th, 2022

LUKS acronym stands for Linux Unified Key Setup which is a widely method of disk-encryption used by Linux Kernel and is implemented with the cryptsetup package.

Modern Alternatives To Some Of The Classic Linux Commands
It's FOSS, January 14th, 2022

When you start learning Linux, you begin with a standard set of Linux commands that have been in existence since the UNIX days

IT - MFA
disable
5 Reasons Why You Shouldn't Wait Any Longer To Deploy MFA
Security Boulevard, January 11th, 2022

MFA, or multi-factor authentication, has the power to prevent the majority of data breaches. Yet many organizations are still lagging in implementation.

MFA Market To Reach $21.3 Billion By 2027
HelpNet Security, January 14th, 2022

Amid the COVID-19 crisis, the global market for multi-factor authentication (MFA) estimated at $8.6 billion in the year 2020, is projected to reach a revised size of $21.3 billion by 2027, growing at a CAGR of 13.9% over the analysis period 2020-2027, according to ResearchAndMarkets.

Understanding and Complying with the New MFA Requirements for Cyber Insurance
Solutions Review, January 12th, 2022

Yaron Kassner, the CTO and co-founder of Silverfort, shares some expert insights into the new MFA requirements that companies need to know about.

IT - Cloud
disable
5 Cloud Security Trends In 2022
eWeek, January 11th, 2022

The pandemic focus on work from home in 2021 put the spurs to cloud migration for many businesses, which had to migrate to the cloud almost overnight to support remote workforces.

6 Cloud Security Trends To Watch For In 2022
HelpNet Security, January 10th, 2022

It's fascinating to take a step back and look at how 'the cloud' developed over the last two decades.

Guide To Managing Edge Computing's Explosive Data Growth
eWeek, January 12th, 2022

Properly managing edge computing's massive data growth requires using multiple partners and good communication between IT and business leaders.

Impact Of Cloud Computing In Different Industries
Business 2 Community, January 10th, 2022

The global cloud computing industry is predicted to increase at a 16.3 percent compound annual growth rate (CAGR) from USD 445.3 billion in 2021 to USD 947.3 billion in 2026, indicating mass adoption of cloud computing by corporate giants to unicorn start-ups.

Maybe Cloud Migration Needs More Than Six Rs
Inforworld, January 11th, 2022

The six Rs are a common part of cloud migration plans. However, perhaps it's time to pay more attention to what each workload specifically needs.

IT - Wireless
disable
There Are Now 200 5G Networks In 87 Countries Across The World
techradar.pro, January 11th, 2022

GSA report highlights network and device momentum

IT - DR
disable
Firms Should Reprioritize Their DR Strategies
CXOtoday.com, January 11th, 2022

Companies should ensure their DR strategies are ready to handle sudden, unforeseen incidents that threaten their business continuity

The Most Read Continuity Central Feature Articles Of 2021
Continuity Central, January 14th, 2022

What did Continuity Central readers find most interesting during 2021? Out of more than a thousand pieces of content published, here are the top twenty feature articles...

What To Include In A Cybersecurity Disaster Recovery Plan
Security Boulevard, January 11th, 2022

If the unthinkable were to happen to your business, what's your disaster recovery plan?

IT - Networks
disable
How To Use Wireshark For Capturing And Analyzing Network Packets
HowtoForge, January 12th, 2022

Wireshark (formerly Ethereal) is a FOSS (free and open-source software) for network protocol analyzer.

IT - Careers
disable
IT Careers: 5 Flourishing And 4 Fading IT Skills For 2022
The Enterprisers Project, January 11th, 2022

Looking for a new IT job in 2022? Explore some of the most in-demand skills

Information Age's Guide To Tech Leadership Roles
Information Age, January 10th, 2022

Our guide to tech leadership roles will explore four of the most prominent positions: the chief technology officer (CTO), chief information officer (CIO), chief data officer (CDO), and chief product officer (CPO)

Information Security Analyst Tops List Of 2022 Top Jobs
InformationWeek, January 12th, 2022

Three technology jobs rank in the top 10 of U.S. News and World Report list of 2022 Best Jobs, evaluated on the basis of salary, work-life balance, and job outlook. Did your job make the list, and how does your salary compare to the median?

The Future Of Work Is Here
Computerworld, January 13th, 2022

The COVID-19 pandemic washed away the old ways of working in a deluge of change. As the waters recede, professionals find themselves questioning everything about where we go from here.

IT Talent: 3 Hot IT Roles In 2022 And Beyond
The Enterprisers Project, January 14th, 2022

Hiring top IT talent is more essential - and more challenging - than ever. Consider these key high-demand roles and how to attract the right candidates

IT - Email
disable
Check Your SPF Records: Wide IP Ranges Undo Email Security And Make For Tasty Phishes
ZDNet, January 14th, 2022

With parts of the Australian private sector, governments at all levels, and a university falling foul of wide IP ranges in a SPF record, it might be time to check yours.

IT - Backup
disable
2022-2023 Top 5 Small Enterprise vSphere Backup Solutions
StorageNewsletter.com, January 11th, 2022

The Data Center Intelligence Group (DCIG) announced 2022-23 DCIG Top 5 Small Enterprise vSphere Backup Solutions report.

Four Predictions For Storage And Backup Security In 2022
StorageNewsletter.com, January 14th, 2022

Cyberstorage gained more attention in the media in 2021 with the rise in storage hacks, ransomware attacks, and cases of immutable storage erased

IT - Big Data
disable
Big Growth Forecasted For Big Data
datanami, January 11th, 2022

These are heady times to be in the big data business, with big growth predicted for the foreseeable future across several measures, including data generation and storage, market spending, and data analytics hiring.

The Data Silos Holding You Back Are All In Your Head
insideBIGDATA, January 14th, 2022

In the modern data landscape, there has been much discussion of the need to break down data silos for faster, more effective results.

The insideBIGDATA IMPACT 50 List for Q1 2022
insideBIGDATA, January 10th, 2022

The team here at insideBIGDATA is deeply entrenched in following the big data ecosystem of companies from around the globe.

What Is Data Visualization? Benefits, Types & Best Practices
eWeek, January 14th, 2022

Data Visualization is the visual representation of information, making it an easier and better source for learning and data analysis.

IT - Encryption
disable
Best Practices For Improving Cloud Encryption
Security Boulevard, January 14th, 2022

As businesses increasingly adopt cloud technology, cloud security becomes paramount.

Public-Key Cryptography Standards (PKCS)
SearchSecurity, January 11th, 2022

Public-Key Cryptography Standards (PKCS) are a set of standard protocols, numbered from 1 to 15. These standards were developed to enable secure information exchange on the internet by using a public key infrastructure (PKI).

IT - Developer
disable
7 Security Coding Guidelines To Keep In Mind
Security Boulevard, January 13th, 2022

Are you aware of the coding strategies used by developers?

The 8 Major Players In Enterprise Architecture Tools, 2021
Solutions Review, January 11th, 2022

These providers have recently been named major players in enterprise architecture tools for 2021 by analyst house Gartner, Inc.

IT - CxO Events
disable
TechForge: Hybrid Cloud Congress (Jan. 18th)
Tuesday, January 18th, 2022: 9:50 AM to 2:20 PM EST

Hybrid Cloud Congress on 18 January 2022 is all about the business benefits born out of combining and unifying public cloud and private cloud services to create a single, flexible, agile and cost-optimal IT infrastructure

DevOps.com: DevOps Mythbusters (Jan 18th)
Tuesday, January 18th, 2022: 1:00 PM to 2:00 PM EST

DevOps has grown in popularity over the past few years, but a lot of questions, misconceptions and myths have taken root alongside its rapid rise. What is DevOps really about?

CIONEXT: CIO and CFO: Joining Forces for Automation? (Jan 19th)
Wednesday, January 19th, 2022: 9:00 AM to 10:30 AM EST

In this edition of CIONEXT we examine how the CIO and CFO can jointly create a Fully Automated Enterprise by utilising robotics, citizen's development and AI.

CIO: Leveraging An IT Consumption Model To Modernize Your Enterprise Data And Analytics (Jan. 20th)
Thursday, January 20th, 2022: 1:00 PM to 2:00 PM EST

Join CIO contributing editor Charles Pelton and subject-matter experts from Hewlett Packard Enterprise for a private, hour-long, interactive, virtual roundtable discussing how to modernize your enterprise data and analytics.

CIO: The Role of Cloud-Ready Load Balancing in Optimizing the Management of Complex Heterogeneous Infrastructures (Jan. 20th)
Thursday, January 20th, 2022: 3:00 PM to 4:00 PM EST

Join CIO contributing editor Lane Cooper and subject-matter experts from VMware for a private, hour-long, interactive, virtual roundtable discussing how cloud-ready load balancing initiatives are optimizing the management of complex, heterogeneous enterprise computing environments.

DevOps: Testing in Production With Feature Flags & Continuous Deployment (Jan. 20th)
Thursday, January 20th, 2022: 3:00 PM to 4:00 PM EST

Testing in production used to be a joke. In fact, it was a popular "Most interesting man in the world" meme. But, as life often imitates art, this meme has become reality.

CXOTalk: CIO 2022: Technology and Investment Planning (Jan 21st)
Friday, January 21st, 2022: 1:00 PM to 2:00 PM EST

How should Chief Information Officers think about technology planning and investment strategy for 2022? The Global Chief Technology Officer of EY, Nicola Bianzino, explains how to prioritize information technology investments in 2022.

CIO: Enterprise-wide Digital Strategies for Optimizing Omnichannel Experiences (Jan. 25th)
Tuesday, January 25th, 2022: 1:00 PM to 2:00 PM EST

Join CIO contributing editor Lane Cooper and subject-matter experts from our roundtable sponsor, Wipro, for a private, interactive, virtual roundtable.

CIO: Funding Effective Enterprise Transformation by Optimizing Network Spend (Jan. 26th)
Wednesday, January 26th, 2022: 1:00 PM to 2:00 PM EST

Join CIO contributing editor Lane Cooper and subject-matter experts from our sponsor, Kyndryl, for a private, hour-long, interactive, virtual roundtable.

Enterprise Connect: Crazy Contact Center Predictions for 2022 (Jan 26th)
Wednesday, January 26th, 2022: 2:00 PM to 3:00 PM EST

Predicting the future isn't easy, but in this lighthearted look at what COULD happen, Blair Pleasant and Ron Stevenson will discuss what will LIKELY happen in the year ahead. Some of the predictions which we know WON'T come true (and we'll suggest real actions to take, instead).

CIO: Future Of Work Summit (February 15-17) EST
Tuesday, February 15th, 2022: 1:00 PM to 5:00 PM, Thursday, February 17th EST

If you think 2022 will look like last year, think again. Everything about our workplace is changing. Talent wars are raging. Skills gaps are widening. And workspaces are anywhere - and everywhere. And that's just the beginning.

VentureBeat: The Data Summit: The new oil of the digital age (March 9th)
Wednesday, March 9th, 2022: 8:00 PM 3:00 PM EST

As enterprises realize that data is the new oil of the digital age, navigating their data journey becomes paramount.

IT - CxO Security Events
disable
DARKReading: Beyond Spam and Phishing: Emerging Email-based Threats (Jan 18th)
Tuesday, January 18th, 2022: 1:00 PM to 2:00 PM

Learn about the latest tactics and techniques threat actors are using to target enterprise email systems - Gain insight into how your users could be duped in social engineering attacks

What's Next for DevSecOps: 'Shift Right' for Runtime Protection (Jan 18th)
Tuesday, January 18th, 2022: 3:00 PM to 4:00 PM EST

Shifting left - embedding security processes and output into the development pipeline - has been the focus for integrating security into DevOps for some time.

Recorded Future: Attack Lifecycle: How Attackers Harvest Credentials & Gain Initial Access (Jan. 19th)
Wednesday, January 19th, 2022: 11AM EST

Credential harvesting and gaining initial access are two important pieces in the initial phases of the cyber attack lifecycle; attackers can't have one without the other and utilize various tactics and techniques when starting an attack.

CSO: CISO Priorities for 2022: Supporting and Securing Hybrid Workforces (Jan. 20th)
Thursday, January 20th, 2022: 11:00 AM to 12:00 PM EST

We invite you to join CSO contributing editor Charles Pelton and observability subject-matter expert AJ Pahl from our sponsor, Elasticsearch, for a one-hour, private, virtual roundtable that explores: CISO Priorities for 2022: Supporting and Securing Hybrid Workforces.

InformationWeek: The Tech Exec's Ransomware Incident Response Playbook (Jan 20th)
Thursday, January 20th, 2022: 1:00 PM to 2:00 PM EST

Sooner or later, your business is likely to be hit with a ransomware attack. Perhaps you've planned for it, but are you truly prepared?

ITProToday: How to Integrate Community-Driven Threat Intelligence into Your SIEM (Jan. 20th)
Thursday, January 20th, 2022: 11:00 AM to 12:00 PM EST

In this webinar, learn: How community-driven threat intelligence provides critical event information; What the community-driven threat intelligence adds to SIEM effectiveness

DevOps.com: DevSecOps: Closing the Security Gap With Developers (Jan. 21st)
Friday, January 21st, 2022: 11:00 AM to 122:00 PM EST

Organizations that rely on developing secure, functional products understand the value of increased collaboration between security and development teams. Tighter partnerships between the two teams can allow organizations to deliver better, safer products faster, but how can this work in the real world?

DARKReading: Securing Your APIs: What You Need to Know (Jan. 25th)
Tuesday, January 25th, 2022: 1:00 PM to 2:00 PM EST

In this webinar, Veracode's Head Dynamic Analysis Engineer, Dan Murphy, will cover: The challenges of generating RESTful traffic from API specifications in OpenAPI 2.0 and 3.0, that gets past the HTTP 400 Bad Input Response

Network Computing: Practical Approaches to Implementing Zero Trust in Your Private Cloud (Jan 26th)
Wednesday, January 26th, 2022: 1:00 PM to 2:00 PM EST

Protecting core applications and sensitive data in a private cloud requires the agility of cloud-centric, cloud-delivered security to converge with Zero Trust Enterprise Architecture principles.

DARKReading: Beyond Passwords: New Thinking and Strategies for Authentication (Jan. 27th)
Thursday, January 27th, 2022: 1:00 PM to 3:00 PM EST

Learn about the available options for moving away from passwords to more secure and modern authentication technology. Gain an understanding of what multifactor authentication can do, and where it could fall short

Secure Software Summit: Exploring Secure Coding Best Practices (Jan 27th)
Thursday, January 27th, 2022: 12:00 PM to 6:00 PM EST

Secure Software Summit brings together the world's leading innovators, practitioners and academics of secure software development to share and teach the latest methods and breakthroughs on secure coding and deployment practices in an interactive format designed to entertain, teach and enlighten.

DARKReading: Monitoring and Securing Remote and Work-From-Home Environments (Feb. 2nd)
Wednesday, February 2nd, 2022: 1:00 PM to 2:00 PM EST

In the wake of COVID-19, many IT departments find themselves managing more remote and work-from-home systems than ever before. What does this mean for cybersecurity?

DARKReading: 2021 DDoS Attack Trends: Year in Review (Feb. 9th)
Wednesday, February 9th, 2022: 1:00 PM to 2:00 PM EST

2021 was an exceptionally busy year for attackers. From some of the largest volumetric DDoS attacks launched by historically large swarms of botnets, to massive ransomware and ransom DDoS attack campaigns that interrupted aspects of critical infrastructure around the world, DDoS was the focal point of network security for many organizations.

DARKReading: Developing an Effective Threat Intelligence Program for Your Enterprise (Feb. 10th)
Thursday, February 10th, 2022: 1:00 PM to 2:00 PM EST

There are many resources, both public and commercial, that collect information about current trends in online attacks. This 'threat intelligence' can make it easier for security teams to prioritize their defense efforts and prepare for online exploits that are likely to hit their organizations. In this webinar, experts will discuss strategies for collecting and analyzing threat intelligence to inform your cyber defense practices.

DARKReading: Best Practices for Extending Identity & Access Management to the Cloud (Feb. 15th)
Tuesday, February 17th, 2022: 1:00 PM to 2:00 PM EST

Managing and securing user credentials was never easy, and now that they are scattered across cloud platforms, software-as-a-service tools, mobile devices, and on-premises systems, the task has become even more complex. With adversaries increasingly targeting their attention to credential theft, enterprise defenders need to know what accounts they have and where they are located. In this webinar, experts discuss the best practices for identity and access management in the cloud, and how to gain visibility into misconfigured or improperly secured cloud-based accounts.

FutureCon Virtual Eastern Conference (Feb. 16th)
Wednesday, February 16th, 2022: 8:00 PM 5:30 PM EST

FutureCon Events brings high-level Cyber Security Training discovering cutting-edge security approaches, managing risk in the ever-changing threat of the cybersecurity workforce.

Tintri News
disable
Tintri 2022 Predictions: Workload Intelligence, Autonomous Operations, and AIOps - Addressing IT's Most Pressing Pain Points
Tintri News, January 13th, 2022

It's not new news. Exponential data creation and manipulation continue by the microsecond. The accelerant fueling the shift? New methodologies bring new efficiencies and reduce costs, while improving application lifecycles, thus exposing a global digital transformation at a scale and speed never before witnessed.

Cisco News
disable
Wearable Solution For Frontline Workers Set To Transform Collaboration On The Go
Cisco News, January 10th, 2022

Technology fades into the background as new Cisco and Google partnership puts the needs of frontline workers front and centre

AWS News
disable
AWS Announces General Availability of Amazon EC2 Hpc6a Instances
AWS News, January 10th, 2022

New purpose-built Amazon EC2 instances for HPC workloads deliver up to 65% better price performance compared to similar compute-optimized Amazon EC2 instances

Oracle News
disable
Helbiz Kitchen Boosts Ghost Kitchen Global Growth With Oracle Cloud
Oracle News, January 11th, 2022

Helbiz a global leader in micro-mobility also runs one of the world's largest ghost kitchens. Its 21,500 square foot Helbiz Kitchen brings together the best dishes from across Milan-from burgers to ice cream-by licensing from popular brands and preparing multiple cuisines in one location

Introducing Oracle Cloud For Telcos - Redefining The Telco Cloud Market
Oracle News, January 11th, 2022

Operating complex networks to serve millions of subscribers is a constant challenge. From day-to-day operations and expansion to new technology and standards, the telco world is about reinventing yourself every day.

Oracle Scales Up Converged Charging To Serve 100 Million Subscribers
Oracle News, January 11th, 2022

Multi-site deployment validates geographical scale and real-time charging efficiency of Oracle Cloud Scale Charging on OCI

Qatar Airways Gains Business Advantage In Moving Financial Planning To Oracle Cloud
Oracle News, January 12th, 2022

One of the world's fastest-growing airlines implements Oracle Cloud EPM to increase agility, improve insights and enhance business decision-making

Lenovo News
disable
Enterprise Metaverse: Employees Are Ready, Can Organizations Deliver?
Lenovo News, January 13th, 2022

Research commissioned by Lenovo reveals close to half of employees are willing to embrace a metaverse workplace, presenting an opportunity for businesses to usher in the future of work

Growing Alliance For The Environment: DB Schenker And Lufthansa Cargo Welcome Lenovo On Their Co2-Neutral Flights
Lenovo News, January 11th, 2022

New SAF customer Lenovo uses regular cargo flights from Shanghai to Frankfurt - Every week 78 tons less greenhouse gases - Carbon-neutral air transport of IT hardware powered by sustainable aviation fuel

Nutanix News
disable
Partners Are Our Customers
Nutanix News, January 13th, 2022

Recently Nutanix received an immense honor in achieving Champion status in the Canalys Channel Leadership Matrix 2021 for EMEA, Latin America, and Asia-Pacific.

Microsoft News
disable
Empowering 2 Billion Global Frontline Workers
Microsoft News, January 12th, 2022

The past two years have been challenging for everyone, especially frontline workers tasked with keeping the proverbial lights on throughout the pandemic.

Leaders Across Healthcare, Academia And Technology Form New Coalition To Transform Healthcare Journey Through Responsible AI Adoption
Microsoft News, January 13th, 2022

Coalition established to identify and solve significant societal and industry barriers through the use of AI

Microsoft Announces New Research And Technology To Empower Millions Of Frontline Workers
Microsoft News, January 12th, 2022

New product features come as company sees 400% Microsoft Teams growth per month by frontline workers during the pandemic

IBM News
disable
IBM Acquires Envizi to Help Organizations Accelerate Sustainability Initiatives and Achieve Environmental Goals
IBM News, January 11th, 2022

IBM announced it has acquired Envizi, a leading data and analytics software provider for environmental performance management.

IBM Welcomes LG Electronics to the IBM Quantum Network to Advance Industry Applications of Quantum Computing
IBM News, January 10th, 2022

LG Electronics joins IBM Quantum Network and aims to explore applications of quantum computing to support big data, artificial intelligence, connected cars, digital transformation, IoT, and robotics applications

Retail Industry Reshapes With Hybrid Cloud And AI To Help Meet Shifting Consumer Shopping And Sustainability Preferences
IBM News, January 13th, 2022

2022 IBM/NRF global consumer study finds: 'Hybrid shopping' is the method of choice for over one in four consumers surveyed; 62% of consumers surveyed are willing to change their purchasing habits to reduce environmental impact, but intention/action gap remains

Fortinet News
disable
2022 Cybersecurity Trends: A Q&A With Fortinet CISOs
Fortinet News, January 10th, 2022

From AI and automation to ransomware and cybersecurity mesh architectures, two Fortinet Field CISOs give a glimpse into some of the priorities they are hearing from customers and partners. Alain Sanchez and Joe Robertson share their perspective about some of the biggest trends they are seeing going into 2022.

Considering A Career In Cybersecurity? Don't Let Misconceptions Hold You Back
Fortinet News, January 14th, 2022

While some industries have seen a decline in job prospects over the last 18 months, there's one sector where job opportunities abound: cybersecurity

COVID Omicron Variant Lure Used To Distribute Redline Steale
Fortinet News, January 10th, 2022

Just like the previous year, 2021 ended with COVID and 2022 started with the same. The only difference is that the world is now dealing with the new Omicron variant rather than the Delta variant, which emerged in April 2021.

Fortinet Survey Indicates Gaps In Zero Trust Implementation
Fortinet News, January 12th, 2022

In cybersecurity, zero-trust has been a hot topic for years, and most experts support the concepts behind the zero-trust security model.

IDC MarketScape Report Names Fortinet a Leader in SD-WAN
Fortinet News, January 12th, 2022

With nearly 35,000 WAN Edge customers worldwide, organizations across industries and vertical markets trust Fortinet to address their WAN transformation and security challenges.

Reaching Fortinet NSE Level 8 - A Cybersecurity Training Perspective
Fortinet News, January 11th, 2022

Reaching level 8 in the Fortinet Network Security Expert (NSE) program requires some time, ambition, and the desire to get certified for cybersecurity

Red Hat News
disable
How Red Hat's Helping Customers With High Performance Computing, Container Technology And More
Red Hat News, January 10th, 2022

Things are ramping for our customers in the Europe, Middle East and Africa region (EMEA). In this month's customer success stories, we'll share how customers in Belgium, Norway and Slovenia have counted Red Hat technologies to work better and faster as we enter the new year.

Friday Five - January 14, 2022
Red Hat News, January 14th, 2022

The Friday Five is a weekly Red Hat blog post with 5 of the week's top news items and ideas from or about Red Hat and the technology industry. Consider it your weekly digest of things that caught our eye.

Automating Postfix installation and configuration with RHEL System Roles
Red Hat News, January 12th, 2022

Many organizations have a requirement to configure a mail transfer agent (MTA) on Red Hat Enterprise Linux (RHEL) servers

How Red Hat Helps Organizations Build DevOps Capabilities
Red Hat News, January 12th, 2022

The beginning of any new year brings a wealth of new opportunities for growth and change, which is equally valid for organizations across all industries.

How To Update A Disconnected Red Hat Satellite Server
Red Hat News, January 10th, 2022

There are multiple use cases for Red Hat Satellite where the Satellite server is not connected directly to the Internet (through a proxy or otherwise).

Red Hat And Temenos Enable Process Automation For Digital Banking
Red Hat News, January 11th, 2022

Banking software company and Red Hat partner, Temenos, announced the integration of Red Hat Process Automation Manager into the Temenos Infinity digital banking platform

Citrix News
disable
Add Citrix DDoS mitigation service to Citrix Virtual Apps and Desktops to protect your business
Citrix News, January 13th, 2022

Citrix Virtual Apps and Desktops is easy to manage, delivers a seamless app experience, can secure your organization's apps, and help you boost employee productivity

Employees Resolve To Shape New Future Of Work In 2022
Citrix News, January 11th, 2022

Nearly 80 percent say they'll work on flexible models, with more than 72 percent planning to remain fully remote.

Getting Started With Citrix Podio: 4 Tips To Jumpstart Your Team
Citrix News, January 14th, 2022

Let's face it - change can be disruptive. It can be difficult to shift away from how we currently work

IAM vs PAM: How are they different?
Citrix News, January 10th, 2022

As more companies adopt hybrid work models and employees are spread over larger geographic areas, cybersecurity and access control have been thrust into the spotlight.

Sections in this issue:
click to jump to section