IT News and Events
Nov 22nd, 2021 — Nov 28th, 2021 Generate the Custom HTML Email for this Issue
IT News and Events IT News and Events
Volume 284, Issue 4 << Previous Issue
Citrix News
disable
How To Ensure Your Hybrid Workforce Is Both Secure And Productive
How does security stay ahead of threats to the expanded attack surface of new work models?
"The rapid shift to hybrid and remote working models has empowered employees. It has enabled them to do their best work wherever they are. A distributed workforce also brings benefit to organizations through greater resilience and business continuity, along with agility and the environmental benefits of reduced commuting and real estate.

But what does that mean for information security? How are successful organizations balancing security requirements with the need to ensure a friction-free employee experience?..."

Citrix News, November 23rd, 2021
(Get More Information . .) open to premium members only

The Top 10 FAQs From Our Citrix Virtual Apps And Desktops Webinar
It is always exciting to share what's new and upcoming with the products our customers know and love. Last month, Paul Carley and I delivered a What's New and What's Next with Citrix Virtual Apps and Desktops webinar. If you missed it and are looking to get the latest information (and a few bad jokes), you can watch the webinar now on demand!
"With all the engagement and great questions we got, we wanted to follow up with answers to the most commonly asked questions we received. From on-premises environments to cloud and hybrid deployments, there is a ton to love about the latest updates. Let's look at the top 10 most frequently asked questions from the webinar to give you more insight into what's new and next in the world of Citrix Virtual Apps and Desktops..."
Citrix News, November 24th, 2021
(Get More Information . .) open to premium members only

Workplace Technology 2022: Unlocking The Art Of The Possible
If there is one positive thing that the technology industry can take from the global pandemic, it is that change is often not as impossible as it may seem
"Most businesses were already on some form of digital transformation journey before the pandemic hit. And the global business landscape has shifted significantly because of COVID, creating almost the perfect-storm scenario for forward thinking organizations to double down on their efforts..."
Citrix News, November 22nd, 2021
(Get More Information . .) open to premium members only

IT News - CxO
disable
CIOs Talk Agile: Failing Fast And Learning Faster
Since IT organizations typically lead in the move to Agile, what do CIOs think about this methodology? And where are they in the adoption? A recent CIOChat event addressed this topic.
Myles Suer writes in eWeek, "In a recent Harvard Business Review, K. Gardner and Alia Crocker wrote that 'for Agile to work, leaders need to pick the right people.' Otherwise, organizations will 'not only fail to meet their goals but also cause disruption within an organization.

A poorly managed initiative can miss critical deadlines, slow product development, and lead to staff burnout, the loss of key talent, and infighting among teams.' Since IT organizations typically lead in the move to Agile, what do CIOs think about this methodology? And where are they in the adoption? A recent CIOChat event addressed this topic..."

eWeek, November 17th, 2021
(Get More Information . .) open to premium members only

6 Emerging Technologies To Watch From The Current Gartner Hype Cycle
The Gartner Hype Cycle is a visual representation of the maturity and adoption of emerging technologies
"Gartner has used it since 1995 to help clients understand how new developments in IT affect their business.

The cycle includes five phases: Innovation Trigger, Peak of Inflated Expectations, Trough of Disillusionment, Slope of Enlightenment, and Plateau of Productivity. Companies need to know where they are on this curve as it will offer insight into what opportunities exist now and what challenges may arise if they wait too long before implementing changes.

Below are six emerging technologies from the current hype cycle..."

IT Business Edge, November 19th, 2021
(Get More Information . .) open to premium members only

How CISOs Escape The Cost Center Trap
Even as the CISO role is becoming more business-focused, in many organizations the notion of security as purely a cost center persists. Here's how savvy CISOs can turn that around
"The increasing number and sophistication of cyberattacks have companies boosting their cybersecurity budgets-again-in the upcoming year.

PwC's Global Digital Trust Insights Survey found that 69% of organizations expect to boost cyber spending in 2022; 26% will see their security budget up by 10% or more..."

CSO Online, November 18th, 2021
(Get More Information . .) open to premium members only

CISO as a service (vCISO, virtual CISO, fractional CISO)
What is a CISO as a service (CISOaaS)?
"A CISO as a service (CISOaaS) is the outsourcing of CISO (chief information security officer) and information security leadership responsibilities to a third-party provider. By hiring a third-party provider to manage its security program remotely, an organization gains access to staff and resources that it doesn't have in house, allowing it to better keep up with information security and compliance demands.

CISOaaS is often paid for on a subscription or per-use basis, like many XaaS models. Also like many XaaS models, CISOaaS offerings may be entirely remote, or may be a hybrid model in which the provider's experts work with an organization's existing security team both remotely and onsite..."

SearchSecurity, November 18th, 2021
(Get More Information . .) open to premium members only

Air Products CIO Overhauls IT To Support Business Transformation
To enable the $9 billion industrial gas provider to deliver new 'mega projects,' CIO Brian Galovich has put self-service at the center of the target architecture, moved infrastructure to the cloud, digitized key business processes, and updated the IT operating model
"I recently caught up with Galovich to learn about the business transformation underway at Air Products, how the IT organization is changing to help drive that transformation, lessons he's learned along the way, and more. Following is an edited version of that conversation...

Brian Galovich: When Seifi Ghasemi became Air Products' Chairman, President and CEO seven years ago, he began to divest the chemicals business and focus on the core business of industrial gases..."

CIO, November 17th, 2021
(Get More Information . .) open to premium members only

The CIO's Role In Strengthening Information Security
The CIO is critical for ensuring strong cybersecurity within the organization. Learn why the CIO's role inherently makes that difficult, and how to overcome obstacles.
Kevin Beaver writes in SearchCIO, "These are trying times for IT professionals. With such a reliance on technology combined with so many people now working remotely, the organization's security hangs in the balance like never before.

There's not only pressure to perform but to get security right every time. Ensuring good network and system security is tricky enough for technical staff. When overall business resilience falls under your domain as the CIO, it's even more to take on and can seem insurmountable..."

SearchCIO, November 20th, 2021
(Get More Information . .) open to premium members only

IT News - Storage
disable
What Are 3 Best Practices For Storage Encryption At Rest?
Consider the fine print of encrypting data at rest. For example, access control permissions can make or break a storage encryption plan.
Encryption is one of the most fundamental practices for keeping data secure. However, there is more to using storage encryption than just its enablement.

Here are three best practices for working with storage encryption at rest.

Review access control permissions

Regularly review the access control permissions for data. Although this best practice might seem to have little to do with storage encryption at rest, there is a reason for its inclusion here. Excessively permissive access control policies can undermine the security benefits gained with storage encryption.

If access policies grant everyone -- including unauthenticated users -- access to the data, then encryption becomes meaningless...

SearchStorage, November 16th, 2021
(Get More Information . .) open to premium members only

Western Digital Unveils 20TB Hard Drives
New Ultrastar DC HC560 and WD Gold HDDs feature Western Digital's OptiNAND technology
Western Digital has unveiled not one but two 20TB hard disk drives (HDDs) with its new Ultrastar DC HC560 and WD Gold HDD.

Both of the company's new large capacity drives are available in the standard 3.5-inch form factor and feature its proprietary OptiNAND technology. OptiNAND integrates INAND Universal Flash Storage (UFS) Embedded Flash Drive (EFD) with traditional spinning disks which allows a total of 20TB to be packed onto nine platters with each platter containing 2.2TB of storage.

techradar.pro, November 16th, 2021
(Get More Information . .) open to premium members only

Server Lifecycle Approach Lowers Risk, Raises App Performance
Nemertes Research CTO John Burke warns that a server's lifecycle may be shorter than you think and offers a four-stage approach to maintain on-premises servers at peak efficiency
At no time has there been greater pressure for data-driven enterprises to streamline processes, sustain supply chains, monetize vast amounts of data, improve customer and employee engagements, and drive business outcomes. To gain a competitive edge, huge investments in advanced technologies have been among the highest priorities for businesses.

But there comes a time when companies digitally transforming at unprecedented speeds need to pause, evaluate their business models, validate their ROIs, and intelligently assess which technology equipment needs to be refreshed, replaced, recycled or abandoned. Racks of aging servers housed in physical data centers are no exception.

SearchConvergedInfrastructure, November 16th, 2021
(Get More Information . .) open to premium members only

How To Effectively Plan Cloud Storage Scalability
There are many benefits but also many considerations in including cloud storage as part of a scalability strategy, from analysis of needs to testing your providers.
"Changes to an organization, such as a merger, acquisition or release of a new product, can result in a domino effect on the firm's IT infrastructure. These changes can specifically affect the data storage infrastructure and require additional capacity in a short time frame.

As a result, the ability to scale storage resources to accommodate a business need is essential. That's where cloud storage scalability has become a key piece of the planning process..."

SearchStorage, November 15th, 2021
(Get More Information . .) open to premium members only

5 Steps To Reduce Your Data Storage Headaches
Today's business environments are highly data-intensive, leveraging analytics and insights to drive innovation and decision-making
Yet, managing increased amounts of critical business data, complex workloads, and distributed storage environments can be challenging for organizations. Here are five specific steps you can take to reduce the most common data storage headaches.

Scale with Object Storage

As companies continue to store vast volumes of unstructured data for analysis and insights, scalability must be front of mind. Because data grows exponentially, you can't always predict what your future storage needs will look like. Storage needs can change suddenly, overwhelming your current data storage capacity. As a result, you need storage that you can rapidly scale out or up to meet changing requirements.

Business 2 Community, November 16th, 2021
(Get More Information . .) open to premium members only

IT News - AI
disable
Artificial Intelligence: Everyone Wants IT, But Not Everyone Is Ready
Business is bullish on AI, but it takes a well-developed understanding to deliver visible business benefits
Artificial intelligence technologies have reached impressive levels of adoption, and are seen as a competitive differentiator. But there comes a point when technology becomes so ubiquitous that it is no longer a competitive differentiator -- think of the cloud. Going forward, those organizations succeeding with AI, then, will be those that apply human innovation and business sense to their AI foundations.

Such is the challenge identified in a study released by RELX, which finds the use of AI technologies, at least in the United States, has reached 81% of enterprises, up 33 percentage points from 48% since a previous RELX survey in 2018.

ZDNet, November 16th, 2021
(Get More Information . .) open to premium members only

Machine Learning: The Key To Unlocking Unstructured Data
Enterprises across every industry are increasingly recognizing the power of machine learning. It can turn any organization's data into valuable insights-insights that have the potential to revolutionize every aspect of the business.
Machine learning (ML) is a type of data analysis based on the concept that systems can use data to learn with little to no human effort needed. ML systems process data to identify patterns, ferret out anomalies, and recognize subtle correlations that people wouldn't notice. It gives organizations deeper insight into how and why some workflows are profitable or efficient and others aren't. It can help prevent fraud, eliminate production bottlenecks, inform sales and marketing professionals of what tactics work with which target audiences, and so much more.
Business 2 Community, November 17th, 2021
(Get More Information . .) open to premium members only

How To Build Scalable Edge AI Systems
One challenge in scaling edge is that it's nearly everywhere, compared to the more centralized cloud, according to Mishali
Another challenge is training edge AI models.

"The approach today for edge AI is to do the inference very close to the data source," Mishali said.

He added that for training, data needs to be captured and then sent to a central data center or to the cloud. This requires a lot of power, and a lot of GPUs, to do effective training.

"This can be a real challenge for scaling applications," Mishali continued, adding that enterprises face the difficult challenge of making sure that data flows smoothly among numerous endpoints and bandwidths.

SearchEnterpriseAI, November 16th, 2021
(Get More Information . .) open to premium members only

What Does Explainable AI Mean For Your Business?
Artificial intelligence (AI) has turned into a highly pervasive technology, and it has been incorporated in a wide array of industries across the globe
"The tough competition in the market and success stories surrounding AI adoption are among the few major factors that compel more and more enterprises to adopt AI in various aspects of their business.

Machine learning (ML), the key component of AI technology, has become powerful to the level of displaying superhuman capabilities on most human tasks. However, this superhuman performance comes with higher complexity in the AI and ML models, turning them into a 'black box,' a decision-making model too complex to be understood by humans..."

IT Business Edge, November 19th, 2021
(Get More Information . .) open to premium members only

5 Questions To Ask Before Buying AI Products
Leaders must assess the business value, sophistication and track record of AI products before committing to an AI solution
Consumers and employees are growing accustomed to the benefits of AI-supported products, putting pressure on executives with purchasing power.

Employees want to find AI products in their work toolkit that can make workflows easier and amplify their efficiency. Consumers want the companies they patronize to be speedy and accurate in everything from customer service to e-commerce suggestion engines.

CIODIVE, November 18th, 2021
(Get More Information . .) open to premium members only

IT News - Technology
disable
Automation By The Numbers: 11 Stats To Know
Automation's reach extends beyond any single business function or technology. Let's dig into 11 statistics (and then some) that reflect the outsized influence of automation
"Automation pervades most other contemporary IT trends. Cloud and cloud-native? You're talking about automation. Security and DevSecOps? Again, you're talking about automation. Talent and culture? Yep, you're still talking about automation.

IT is both in the midst of its own automation transformation and also an indispensable catalyst of organization-wide automation strategies. It's actually difficult to exaggerate the role that automation is playing in businesses and industries of all kinds today. (The 'automate all the things' meme has a kernel of truth to it.)..."

The Enterprisers Project, November 15th, 2021
(Get More Information . .) open to premium members only

IT News - Security
disable
Termination Gap: A Major Insider Threat
The termination gap can cause all kinds of trouble
That length of time between an employee leaving their role and their user access being de-provisioned is when dangerous activities can occur - including a malicious breach by that internal user - and the truth is organizations aren't worrying enough about it.

What is the termination gap?

The termination gap is exactly what it sounds like: an insider threat caused by the gap of time between an employee's termination (or a change in their job role and function), and a de-provisioning of their role-based access credentials to critical access points and assets. According to the Ponemon Institute 2020 Cost of Insider Threats: Global Study, there were 4,716 insider incidents recorded across the globe. In addition, criminal insiders made up 14% of insider breaches last year with a price tag of over $4 million-this caused by improper user access provisioning.

Security Boulevard, November 18th, 2021
(Get More Information . .) open to premium members only

3 Takeaways From The Gartner Risk Management Summit
Security leaders can be treated as partners supporting the business and share accountability by establishing relationships with business stakeholders
"Treating cybersecurity as a business function was a recurring theme throughout Gartner's Security and Risk Management Summit this week.

Security leaders focusing on innovation, forward-looking strategy, and the role of security in supporting digital transformation efforts will be viewed as critical business partners supporting business value creation, said Tina Nunno, distinguished research vice president and Gartner Fellow. As security leaders establish closer working relationships with stakeholders across the enterprise, including executive leaders as well as line-of-business leaders, they will be viewed as partners and not treated as service providers within the organization..."

DARKReading, November 19th, 2021
(Get More Information . .) open to premium members only

3 Top Tools For Defending Against Phishing Attacks
"Treating cybersecurity as a business function was a recurring theme throughout Gartner's Security and Risk Management Summit this week. Security leaders focusing on innovation, forward-looking strategy, and the role of security in supporting digital transformation efforts will be viewed as critical business partners supporting business value creation, said Tina Nunno, distinguished research vice president and Gartner Fellow. As security leaders establish closer working relationships with stakeholders across the enterprise, including executive leaders as well as line-of-business leaders, they will be viewed as partners and not treated as service providers within the organization..."
Even with the most sophisticated email scanning and phishing detection system available, phishing emails are still a very common intrusion vector for cybercriminals to use to introduce malware, including ransomware, to a business' network. That's because 1) increasingly, legitimate systems are used; and 2) phishing emails can also be effective even when employees are highly educated and are good at spotting and reporting them.

Fortunately, there are tactics to protect your network even when the emails can't be stopped outright.

threatpost, November 18th, 2021
(Get More Information . .) open to premium members only

Theresa Payton's Cybersecurity Tips And Predictions
The repercussions and liability of cybercrime continuously threaten organizations
"With so much at stake, business leaders and security professionals must initiate meaningful change to overcome present-day challenges in the cybersecurity industry. A recent study by Stanford University has shown that at least 88 percent of breaches in the past 12-24 months were a result of human error. With this statistic in mind, former White House CIO Theresa Payton highlights the ways organizations can strengthen their cybersecurity strategy and tactics by 'designing for the human.'..."
Security Boulevard, November 20th, 2021
(Get More Information . .) open to premium members only

Top Challenges To Managing Insider Threats
In a recent blog post, we shared some insightful highlights from a panel discussion we had the opportunity to moderate at the SANS Institute Insider Risk Solutions Forum in September
During this conversation, top security executives from Gilead Sciences, Eaton Corporation, and NBN Australia shared their expert knowledge around insider risk management solutions.

Our previous post touched on some of the ways organizations can determine what to protect and who to protect it from. In today's post, we're going to explore the biggest challenges to managing insider risk-let's dive into the good stuff.

Security Boulevard, November 16th, 2021
(Get More Information . .) open to premium members only

Gartner Identifies Three Steps For Security And Risk Leaders To Lead From An Offensive Position
Analysts Explore How Security Leaders Can Increase Their Executive Impact at the Gartner Security & Risk Management
To respond to an ever-changing threat landscape and increase impact among executive leadership, security and risk leaders should take a three-step approach to shift from a defensive to an offensive leadership position, according to Gartner, Inc.

'This is a time of extraordinarily high visibility for security leadership,' said Tina Nunno, distinguished research vice president and Gartner Fellow. 'By embracing an offensive mindset, security leaders have an opportunity to permanently shift their role from a service provider to a coach who provides critical strategy and guidance to support business value creation.'

Gartner, November 16th, 2021
(Get More Information . .) open to premium members only

The Next Big Thing In Network Security?
SASE has emerged as an effective way to address the shifting enterprise network perimeter by merging network and security services in one
"It's no surprise, but the security threat landscape is rapidly becoming more sophisticated, as evidenced by the Colonial Pipeline, Kaseya, and SolarWinds attacks earlier this year. Considering the pace of digital transformation in today's business, a single cyberattack can bring a company's operations to a standstill. In June, FBI Christopher Wray commented that the cyber threat is increasing 'almost exponentially' and the FBI was looking into more than 100 different ransomware variants, a three-fold increase from the previous year..."
CIO, November 15th, 2021
(Get More Information . .) open to premium members only

Implementing Best Practices For Data Loss Prevention
Every organization, regardless of size or industry, needs a data loss prevention (DLP) plan.
This includes all of the strategic tools and processes that will help a business avoid having their data lost, mishandled, or accessed by someone who shouldn't have access.

Whether your goal is to protect customer data, intellectual property, or corporate data, your DLP policy should be crafted and implemented with great care. Failure to do so could result in catastrophe.

IT Business Edge, November 19th, 2021
(Get More Information . .) open to premium members only

IT News - Linux
disable
Best Linux Desktops For Beginners 2021
Tired of Windows? Sick of paying big money for Macs? Want a better, more secure desktop? Give Linux a try.
"Some people still insist that using Linux is hard. Sure, it was difficult -- when I started with the Linux desktop back in the 1990s. But that was a long time ago. Today, the easiest desktop of all, Chrome OS, is simply Linux with the Chrome web browser on top of it. The more full-featured Linux desktop distributions are as easy to use in 2021 as Windows or macOS.

Yes, you can get a lot more from Linux if you know how to do shell programming and the like. But that's also true of Windows and PowerShell. With both operating systems, you don't need to know the deep ins and outs of either one to get your work done..."

ZDNet, November 17th, 2021
(Get More Information . .) open to premium members only

IT News - Cloud
disable
Top Cloud Migration And Adoption Trends For 2022 And Beyond
Cloud migrations are inevitable for some enterprises as they navigate a move off premises or between clouds. Evaluate some of the latest migration trends and the pros and cons that come with each
"The last couple of years have brought a significant shift in how enterprises think and use the cloud -- and the pandemic only hastened these cloud migration initiatives.

Companies that only explored how to migrate apps and workloads to the cloud have dramatically accelerated those plans to stay relevant and survive in an era of upheaval to the economic environment, supply chains and new business models.

As organizations continue to shift gears to match strategic plans and respond to macroeconomic factors, expect these nine key trends to drive cloud migration in 2022 and beyond..."

SearchCloudComputing, November 18th, 2021
(Get More Information . .) open to premium members only

IT News - IoT
disable
How The Cloud And Internet Of Things (IoT) Are Used By DOW, DHL Supply Chain, Thermo Fisher, Coca-Cola Icecek, And Deep Sky Vineyard: Case Studies
As many companies find new ways to extract data from their networks of connected Internet of Things (IoT) devices to improve process monitoring, customer interactions, and efficiency, they become more dependent on cloud environments
The case studies below illustrate how several companies integrate their IoT devices with the cloud to improve their businesses

5 IoT Cloud Case Studies

  • Coca-Cola Icecek
  • Deep Sky Vineyard
  • DHL Supply Chain
  • DOW
  • Thermo Fisher

Read on for details

Datamation, November 20th, 2021
(Get More Information . .) open to premium members only

Internet of Things (IoT) in Retail
A quick trip to the local supermarket, big box store, or comparable brick-and-mortar establishment will reveal how pervasive the Internet of Things (IoT) has become in retail
"However, self-checkout kiosks and hyper-personalized in-aisle advertising displays are just a small sampling of the current customer-facing retail IoT innovations.

Behind the scenes, in the stock rooms, warehouses, and fulfillment centers, IoT innovations have also radically transformed the way customers' orders are assembled, handled, and shipped..."

Datamation, November 20th, 2021
(Get More Information . .) open to premium members only

Internet of Things (IoT) Use Cases 2021
The Internet of Things (IoT) offers companies sensor-based technology at the end-user level and low-latency connectivity - making it possible to create products with smarter data, improved automation, and optimized experiences
Companies across industries are tapping into IoT to deliver new capabilities to their customers, and the use cases, partly driven by 5G and edge computing, continue to grow along with the IoT market.

7 Applications Of IoT

  • Entertainment: augmented reality (AR)
  • Health care: remote monitoring and patient care
  • Government: smart cities
  • Transportation: fleet management
  • Real estate: smart security
  • Human resources: worker safety monitoring
  • Education: improving digital access for students

Learn about industrial IoT use cases: Industrial Internet of Things (IIoT) Use Cases

Datamation, November 19th, 2021
(Get More Information . .) open to premium members only

IT News - Careers
disable
Are College Degree Requirements Unreasonable?
Do employers shoot themselves in the foot when they require college degrees, especially for jobs that don't seem to warrant them?
In today's job market, is it reasonable for an employer to treat a college degree as an indicator of ability to do a job? Or is this people filter just an inadequate proxy for more effective candidate assessment methods? ...

My contribution to Solman's story is that perhaps we shouldn't read too much into the keywords 'college degree required.' In general - even if a job really would benefit from a degree - the degree requirement is often just another way for employers to filter what comes out of the digital fire hose of job applicants. In other words, if you don't have the degree, ignore the requirement, because it serves more to reject you than to select viable candidates..."

Ask The Headhunter, November 15th, 2021
(Get More Information . .) open to premium members only

IT News - Backup
disable
Top Rated Data Center Backup Products
Backup and recovery software performs a well understood role in IT. However, the requirements for backup and recovery tools, as well as their actual implementation and performance can vary widely
"As architectures grow more complex, so too can the demands on backup and recovery packages. IT Central Station members comment on what selection factors are best to consider when looking at the purchase of backup/recovery solution.

Members cite performance as an important selection criterion for backup and recovery software tools. Reviewers explain that they want their backup and restore to be fast and easy to use. Instant recovery is prized. Users want a simple GUI, too. Many members put forth a powerful, simple idea, though, which is that backup success is all that counts - that no number of features can ever compensate for a failure to restore missing data..."

IT Central Station, November 17th, 2021
(Get More Information . .) open to premium members only

IT News - Big Data
disable
Big Data In IoT Market To Reach $50.9 Billion By 2026
A ResearchAndMarkets report evaluates the technologies, companies, and solutions for leveraging big data tools and advanced analytics for IoT data processing
Emphasis is placed on leveraging IoT data for process improvement, new and improved products, and ultimately enterprise IoT data syndication.

  • The state of the big data in IoT market
  • The overall global market for big data in IoT will reach $50.9 billion by 2026.
  • Data analytics is the largest segment by product and service in the big data IoT market.
  • Big data in IoT as a service will reach $7.3 billion by 2026 with North America leading the market.
  • Storage of big data in IoT will reach $16.2 billion by 2026, driven by low-cost cloud-based solutions.
  • Big data in IoT within the government sector will exceed $6 billion by 2026, fueled by military and public safety initiatives.
  • Financial services, government, telecom, retail, healthcare, manufacturing, building automation, consumer electronics, and transport and cargo are some of the major industry verticals for the big data in the IoT market.

Data that is uncorrelated and does not have a pre-defined data model and is not organized in a predefined manner requires special handling and analytics techniques.

HelpNet Security, November 19th, 2021
(Get More Information . .) open to premium members only

Sections in this issue:
click to jump to section