IT News and Events
May 9th, 2022 — May 15th, 2022 Generate the Custom HTML Email for this Issue
IT News and Events IT News and Events
Volume 290, Issue 2 << Previous Issue
Citrix News
disable
Citrix Features Explained: Increase app security with Citrix Secure Private Access
For your hybrid workers to do their best, most productive work, they need anywhere access to a wide variety of SaaS and web applications.
But today the average business relies on 88 different apps, creating a larger-than-ever attack surface for your cybersecurity team to protect. Making web app security even more complex, each type of SaaS app demands a different type of security posture to defend against new threats. As you explore how to secure SaaS applications, it's vital you deliver anywhere access to your hybrid workforce without sacrificing SaaS app security.

Citrix Secure Private Access helps companies strengthen web app security with versatile and secure app access that doesn't disrupt the hybrid work experience. In this post, we will examine how you can use Public SaaS App Access, Private Web App Access, and Private Client/Server App Access to empower your hybrid workers without compromising your SaaS application security requirements.

Citrix News, May 12th, 2022
(Get More Information . .) open to premium members only

Citrix ADC with Google Anthos: Modern app delivery and security for hybrid multi-cloud
Agile, flexible DevOps practices are crucial to successful digital transformation initiatives.
Citrix is investing to provide all the tools DevOps, CloudOps and SecOps teams need to lead digital transformations, cloud migration, and app modernization.

There's no single path for cloud migrations, and different requirements around areas like cloud maturity, regulation, and compliance among others will lead to different deployment models. This is where Google Anthos shines with its unified management for infrastructure and apps. Incorporating emerging cloud-native processes like GitOps and continuous configuration, which Anthos supports out of the box, gives IT teams new ways to manage infrastructure.

Citrix News, May 11th, 2022
(Get More Information . .) open to premium members only

Citrix Masterclass: How we accessed the C-suite by talking human
I'm thrilled to be on the hot seat at the next episode of the Citrix Partner Marketing Masterclass series on Wednesday May 18!
I've been at Ultima for over six years now and have grown through the ranks to my current role as Head of Marketing.

Like many of you, the pandemic changed our business and we were forced to pivot. While the past couple of years presented several challenges, one benefit we were afforded was the time to pause and rethink how we want to communicate and interact with our market.

Citrix News, May 11th, 2022
(Get More Information . .) open to premium members only

IT News - CxO
disable
What's Next For Digital Transformation?
Thirty-plus years is a long time to be stuck on something. Is it time we move on?
"Digital transformation isn't new," opines Thornton May in CIO.

"Indeed, it has been on the CIO's agenda for at least 35 years.

I assisted in designing and stage-managing my first symposium on digital transformation in 1987. The keynote speakers were the CEO at the emerging technology supplier and the Chairman/CEO at one of the world's largest and most technologically sophisticated financial institutions..."

CIO, May 2nd, 2022
(Get More Information . .) open to premium members only

5 Harvard Business Review Articles That Will Resonate With CIOs Right Now
From career advice to artificial intelligence and everything in between, these HBR articles cover the critical topics IT leaders care about most
Katie Sanders writes in The Enterprisers Project, "Each month, through our partnership with Harvard Business Review, we refresh our resource library with five new HBR articles we believe CIOs and IT leaders will value highly. Check out the curated pieces below, available to readers through the end of the month.

  • The 4 Pillars of Successful Digital Transformations
  • Can AI Teach Us How to Become More Emotionally Intelligent?
  • Lessons from Hollywood's Digital Transformation
  • How to Succeed Quickly in a New Role
  • Yes, You Can Quit Your Job Without Burning a Bridge

Read on for details

The Enterprisers Project, May 4th, 2022
(Get More Information . .) open to premium members only

Top 10 Business Needs Driving IT Spending Today
Security and efficiency directives are fueling a shift in IT spending toward foundational business requirements to position organizations for uncertain future.
"Ceridian SVP and CIO Carrie Rasmussen got a 7% bump in her IT budget for 2022, with her company's growth, its ongoing digitalization drive, and security mindfulness driving the boost," writes Mary Pratt in CIO.

"More specifically, Rasmussen is boosting her spend on cybersecurity to help manage risk, a key element for enabling Ceridian's planned global expansion.

Some of the extra funds are paying for work to consolidate applications and services, a move Rasmussen classifies as an efficiency play 'that will free up money to reinvest.'..."

CIO, May 4th, 2022
(Get More Information . .) open to premium members only

Tackling The Threats Posed By Shadow IT
While remote technologies have allowed businesses to shift their workforces online, this flexibility has created a swathe of challenges for IT teams who must provide a robust security framework for their organization - encompassing all the personnel and devices within their remit.
"In addition to the ever-increasing number of personal devices, corporate devices and programs, more and more applications are moving to the cloud as workloads become increasingly distributed across public clouds and software-as-a-service (SaaS)," writes Chris Mayers in HelpNet Security.

"This means IT teams are even harder pressed to secure and manage the complex environments they operate in. The unsanctioned use of corporate IT systems, devices, and software - known as shadow IT - has increased significantly during the shift to remote work, and recent research found almost one in seven (68%) are concerned about information security because of employees following shadow IT practices.

HelpNet Security, May 5th, 2022
(Get More Information . .) open to premium members only

3 Consultant Mistakes CIOs Can't Help Making
When it comes time to tap outside expertise, IT leaders too often fail to know what to ask for, who to select, or what to do with the advice they pay for.
"There comes a time in the professional life of most CIOs when they - you - need to bring in a consultant," opines Bob Lewis in CIO.

"Not a contractor. That's someone with a defined set of skills you bring in to help with day-to-day tasks.

We're talking about someone with broad expertise and experience-based judgment you pay for good advice. Having spent time on both sides of the CIO/consultant relationship I can say, with confidence, that a lot of CIOs don't know how to best work with us..."

CIO, May 5th, 2022
(Get More Information . .) open to premium members only

Gartner's Top CEO Priorities For 2022
Workforce issues loom large, while sustainability becomes a mainstream concern.
"People, purpose, prices and productivity emerged in a recent Gartner survey as key issues for the C-suite in 2022, and looking to 2023, reflecting a radical shift in priorities not seen in 15 years but likely to represent enduring change in the mindset of CEOs," writes Mark Raskino in CXOtoday.com.

"In 2022, the Gartner CEO and Senior Business Executive Survey showed that, catalyzed by multiple macro trends and economic factors, business leaders are reprioritizing some key areas of enterprise purpose and management focus.

The Gartner survey polled more than 400 senior business leaders about their 2022-23 priorities and technology-related thinking. (Participants span industries outside the tech sector and commercial, revenue-pursuing organizations.)..."

CXOtoday.com, May 5th, 2022
(Get More Information . .) open to premium members only

IT News - MFA
disable
Github To Developers: Turn On 2FA, Or Lose Access
All active GitHub users who contribute code will be required to enable at least one form of two-factor authentication by the end of 2023.
"Security experts have been banging the multifactor authentication (MFA) drum for years," writes Fahmida Y. Rashid in DARKReading, "encouraging users to move away from solely relying on the username/password combination to secure their most sensitive accounts. Now GitHub is done with encouraging: By the end of 2023, all users who contribute code to GitHub-hosted repositories must have one or more forms of two-factor authentication (2FA) enabled, the company says.

Zero-day attacks and sophisticated exploits are scary, but social engineering and credential theft pose bigger headaches for enterprise defenders. User credentials grant attackers full access to the application and the associated data, or in case of a code repository like GitHub, visibility into source code as well as the ability to maliciously modify the code..."

DARKReading, May 4th, 2022
(Get More Information . .) open to premium members only

IT News - Storage
disable
What Are Emerging Data Storage Options?
Data storage has undergone major changes in the last few years and became a key tool in enterprises' digital transformation strategies. Here are five emerging data storage options.
"Emerging data storage is a category of high-speed storage that includes hyper-converged infrastructure, NVMe/PCIe storage interface, edge storage, among other innovative technologies," notes Rich Castagna in ITProToday.

"Data storage technology has traditionally acted as a background player in data centers but is today recognized as a strategic enterprise computing resource. The change in storage's status began in the mid-1990s, when the idea of centralized, networked and shared storage took hold and put storage on a nearly equal footing as application servers. Storage's role in modern data architectures grew as storage area network (SAN) and network-attached storage (NAS) technologies evolved into sophisticated data repositories. The introduction of solid-state media accelerated storage's evolution as flash added read/write speeds that affected the entire computing environment..."

ITProToday, May 6th, 2022
(Get More Information . .) open to premium members only

IT News - AI
disable
Artificial Intelligence Enables Next-Gen Data Loss Prevention
Zscaler discusses how AI is evolving its DLP strategy, which is particularly challenging with today's distributed data
Zeus Kerravala writes in eWeek, "Data management and security practices are changing rapidly as data becomes fully distributed and fully situated in the cloud today.

Every organization is using hundreds of software-as-a-service (SaaS) apps-many that aren't company approved. SaaS apps allow users to access them from anywhere at any time, boosting productivity and collaboration, which is why 'shadow IT' has become one of the biggest headaches for corporate IT..."

eWeek, May 6th, 2022
(Get More Information . .) open to premium members only

Making AI Accountable: Blockchain, Governance, And Auditability
Recording the model development process on the blockchain can make that process more structured, transparent, and repeatable, resulting in less bias and more accountability.
"The past few years have brought much hand wringing and arm waving about artificial intelligence (AI)," writes Scott Zoldi in InfoWorld, "as business people and technologists alike worry about the outsize decisioning power they believe these systems to have.

As a data scientist, I am accustomed to being the voice of reason about the possibilities and limitations of AI. In this article I'll explain how companies can use blockchain technology for model development governance, a breakthrough to better understand AI, make the model development process auditable, and identify and assign accountability for AI decisioning..."

InfoWorld, May 5th, 2022
(Get More Information . .) open to premium members only

5 AI Adoption Mistakes To Avoid
Artificial intelligence (AI) and related technologies are becoming increasingly mainstream business tools. If you're planning an AI implementation, beware of these potential pitfalls
"Artificial intelligence (AI) and machine learning can be invaluable assets to business success, opines Justin Silver in The Enterprisers Project. "By implementing AI, businesses can automate hours' worth of manual labor sifting through data to enable smarter and faster business decisions. However, automation and AI do not remove the need for human responsibility.

It's important to follow best practices to ensure AI helps versus hurts your business. Here are five mistakes to avoid in leveraging AI to meet company goals..."

The Enterprisers Project, May 5th, 2022
(Get More Information . .) open to premium members only

IT News - ERP
disable
8 Of The Best ERP Software For Energy Companies To Consider
The editors at Solutions Review have compiled this list to spotlight some of the top-rated ERP software for energy companies of all sizes to consider implementing into their processes.
William Jepma writes in Solutions Review, "ERP is a robust enterprise technology solution for manufacturing and distribution businesses. It is also an essential tool for finance, accounting, risk management, and other use cases for companies across industries. Now, more than ever, ERP is becoming increasingly crucial for companies across the energy industry. These companies need an integrated solution suite to help them connect departments and manage resources across global business needs.

To help your company find the best ERP software for its needs, the editors at Solutions Review have compiled the following list of ERP software for energy marketplaces. Our editors selected these software solutions based on each provider's Authority Score, a meta-analysis of user sentiment through the web's most trusted business software review sites, and our proprietary five-point inclusion criteria. The list is organized alphabetically..."

Solutions Review, May 6th, 2022
(Get More Information . .) open to premium members only

IT News - HR
disable
3 Predictions For The Future Of IT Jobs
The ONUG Spring Conference offered predictions about the future of IT jobs and teams, weighing trends in low-code/no-code development, AI and automation, and more.
"Since nobody has a crystal ball, predicting the future is always an uncertain endeavor," writes Jordan Horowitz in ITProToday. "The best we can do is use the past and the present as our guides while asking questions like, What did the world look like 10 years ago, and what kinds of predictions did we make back then? Which of those predictions came true, and which ones didn't? Trying to answer these questions can help paint a picture of what the future might bring and prepare us for potential challenges.

In a panel discussion at last week's Open Networaking User Group (ONUG) Spring Conference, held virtually and in Secaucus, N.J., four technology experts tried to answer the question, 'Will IT teams exist in the next 10 years?' The panelists covered a wide range of topics related to the future of IT jobs, such as talent recruiting, low-code/no-code development, and AI and machine learning (ML). They resisted making wild, pie-in-the-sky predictions and remained grounded, while, at the same time, avoided the kind of pessimism that can stifle innovation in any field..."

ITProToday, May 4th, 2022
(Get More Information . .) open to premium members only

How HR Leaders Should Approach Today's Ever-Evolving Workplace
Navigating hybrid work arrangements, tackling hypercompetitive talent landscapes, and changing employee-employer relationships are now the norm for HR leaders.
The level of volatility will only increase this year as new COVID-19 variants emerge, hybrid work continues to create unevenness in the employee experience, and employers and employees contend with compensation in a high-inflation environment.

We sat down with Brian Kropp, chief of research in the Gartner HR practice, to discuss how HR leaders should approach an ever-evolving work environment.

Gartner, May 5th, 2022
(Get More Information . .) open to premium members only

IT News - Security
disable
The New Cybersecurity Mandate
Parsing the White House's cybersecurity directives.
"The increasing importance of cybersecurity was underlined in President Biden's of May 12, 2021," notes Matthew Tyson in CSO Online.

"This focus has been reiterated, and even more emphatically described in the context of the Russian invasion of Ukraine.

A surprising conclusion from these governmental missives is that in the high-tech world of cybersecurity, the core challenge is not advanced cryptological methods nor quantum computing, but simply implementing known best practices in the real world.

I'll bet you never thought you'd see a president issue an executive order describing how to handle logging, but that day has come. Let's take a look at what the highest levels of government are calling for in cybersecurity.

CSO Online, May 5th, 2022
(Get More Information . .) open to premium members only

7 Threat Detection Challenges Cisos Face And What They Can Do About It
Security operations (SecOps) teams continue to be under a constant deluge of new attacks and malware variants.
"In fact," notes Sanjay Raja in HelpNet Security, "according to recent research, there were over 170 million new malware variants in 2021 alone. As a result, the burden on CISOs and their teams to identify and stop these new threats has never been higher. But in doing so, they're faced with a variety of challenges: skills shortages, manual data correlation, chasing false positives, lengthy investigations, and more. In this article, I'd like to explore some of the threat detection program challenges CISOs are facing and provide some tips on how they can improve their security operations..."
HelpNet Security, May 5th, 2022
(Get More Information . .) open to premium members only

Phishing Is Surging - Can Enterprises Protect Themselves?
Phishing is a growing risk and concern for businesses today. There are 383,278 spam, phishing and malware attacks on the BBC every day, according to recent data from think-tank Parliament Street.
Jason Kent writes in enterprise times, "That is up by 35% compared to 2020 data. Phishing attacks are a serious threat that can lead to ransomware infection. 59% of organisations that fall victim to a phishing attack are infected with ransomware as a result. As these threats escalate, what, if anything, can organisations do to protect themselves?

Phishing is the number one attack vector for bad actors

Phishing is a social engineering attack. It attempts to steal user data such as login credentials and credit card numbers. Such schemes are becoming increasingly sophisticated. They can easily trick people into assuming it is a normal email or text from a trusted person or reputable business, such as their colleague or bank..."

enterprise times, May 5th, 2022
(Get More Information . .) open to premium members only

5 Tips For World Password Day From Cybersecurity Experts
Still using 'MrFluff' as your password? Maybe mixed with a little Leet-speak - say, 'MrFl0ff' - to confound all those hackers who want to vacuum out your 401K plan?
Lisa Vaas writes in Security Boulevard, "Still using 'MrFluff' as your password? Maybe mixed with a little Leet-speak - say, 'MrFl0ff' - to confound all those hackers who want to vacuum out your 401K plan?

Well, today is the first Thursday in May, and that means it's World Password Day. Time to celebrate! You can do that by retiring 'MrFl0ff' and replacing him with a longer, stronger password than a pet's name (consistently a subset of the most hacked passwords worldwide, studies have found). Contrast Security experts also suggest turning on multi-factor authentication (MFA) for important accounts, which would give MrFluff a new, far harder to crack name - like, say, *6fjI5%4&crkN.'

We asked Contrasters for more tips on what developers and enterprises should know about password policies: Read on!..."

Security Boulevard, May 5th, 2022
(Get More Information . .) open to premium members only

5 Cybersecurity Threats That Aren't Going Away
Last year saw the highest average cost of a data breach in 17 years, with the cost rising from $3.86 million to $4.24 million on an annual basis, according to the IBM Cost of a Data Breach Report.
Clearly, organizations must have the correct people and processes in place to prepare for unrelenting cyber attackers.

As CIOs, CISOs, CTOs, and IT managers think about boosting cybersecurity strategies, they should consider what happened in the year prior and what might potentially get worse. Below are some of the cybersecurity threats that remain stubbornly consistent - and must be guarded against at all times.

eWeek, May 5th, 2022
(Get More Information . .) open to premium members only

IT News - Database
disable
Why Are Graph Databases Beginning To Take Off?
Graph databases are gaining in popularity, yet surprisingly, they've been around for over two decades. To understand more about the rise and use of graph databases, Enterprise Times spoke with Dr Yu Xu, CEO of TigerGraph.
"One of the challenges of any database technology is maturity and acceptance," opines Ian Murphy in enterprise times. "Yet, given the size of the market, there should be plenty of room for multiple technologies. We asked Dr Xu what has been holding graph databases back.

Dr Xu replied, 'It's harder to make a breakthrough because people feel more comfortable with traditional databases, like a relational database. They think they can use the relational database for everything and don't need any other tools.' The problem here is that we know the RDBMS is struggling to support all our use cases..."

enterprise times, May 6th, 2022
(Get More Information . .) open to premium members only

IT News - CRM
disable
Advantages And Challenges Of CRM Software
Maintaining a customer-centric business model means knowing how to best meet consumer demands.
Madeline Clarke writes in CIOinsight, "For this reason, enterprises and organizations often utilize CRM software systems to uncover the best ways to exceed their customers' expectations.

CRM software can provide helpful insights for enterprises when leveraged effectively. However, a mistake that many organizations make when implementing CRM solutions is not knowing the ins and outs of this software beforehand. For the smoothest process, take the time to understand the advantages and challenges of implementing a CRM software system..."

CIOinsight, May 5th, 2022
(Get More Information . .) open to premium members only

IT News - Linux
disable
How To Set Up Passwordless SSH Login With SSH Keys
Many novice users to Linux are surprised to learn that the most secure method to connect to another server with SSH is using keys.
We computer users have been conditioned to use passwords for everything.

It's surprising to learn that there are methods other than passwords, but there is something better: cryptographic keys.

In this tutorial we will learn what SSH keys are and why they are better than passwords. You will learn how to set them up on your computer and how to use them to login with SSH without a password.

ByteXD, May 6th, 2022
(Get More Information . .) open to premium members only

IT News - FOSS
disable
LibreOffice 7.3.3 Office Suite Is Now Available For Download With 88 Bug Fixes
The Document Foundation announced today the release and general availability of LibreOffice 7.3.3 as the third maintenance update to the latest and greatest LibreOffice 7.3 office suite series.
LibreOffice 7.3.3 is here five weeks after LibreOffice 7.3.2 as the third minor release of the LibreOffice 7.3 family to address more bugs and further improve interoperability with proprietary document formats. A total of 88 bugs were fixed in this update, as you can see from the RC1 and RC2 changelogs.

These bug fixes strengthen the LibreOffice 7.3 office suite to provide users with better stability and reliability, as well as to offer them the highest level of compatibility with proprietary document formats from the MS Office office suite, such as DOCX, XLSX, and PPTX files.

9to5Linux, May 5th, 2022
(Get More Information . .) open to premium members only

IT News - Cloud
disable
6 Key Challenges Of Complex Cloud Environments - And How To Manage Them
Organizational reliance on the cloud is on the rise, so too are the difficulties of managing increasingly complex cloud strategies.
"The dramatic shift to cloud services over the past few years has given organizations unprecedented flexibility and scalability, enabling them to forge ahead with digital transformation efforts," writes Bob Violino in CIO.

"For many, it has also led to intermingled, complex strategies that threaten to take away some of the luster of the cloud.

Enterprises don't typically deploy one cloud service and call it a day. They rely on multiple offerings from various vendors for everything from procuring key business applications to creating new development environments to running their entire IT infrastructure..."

CIO, May 3rd, 2022
(Get More Information . .) open to premium members only

8 Ways To Reduce Cloud Costs
Organizations need the right strategies in place to avoid cloud cost pitfalls. Stay within your budget with these cost management best practices.
Sarah Neenan and Stephen J. Bigelow write in SearchCloudComputing, "Many organizations reap the benefits of hosting workloads in the cloud, yet this infrastructure model is not sustainable if you can't keep your cloud bills under control. Companies must carefully evaluate their cloud services fees.

Cloud bills skyrocket for multiple reasons, such as overprovisioned resources, unnecessary capacity and poor visibility into the environment. Fortunately, there are tools and cost optimization practices that can help eliminate unnecessary spending. Cost optimization also helps organizations strike a balance between cloud performance and spend.

Learn how to reduce cloud costs with the following practices and tools..."

SearchCloudComputing, May 4th, 2022
(Get More Information . .) open to premium members only

Best Serverless Computing Providers Of 2022
Serverless computing offers an alternative to traditional compute methods and infrastructure, which frees up time for IT personnel to dedicate to more important tasks. As such, serverless computing is becoming more popular in industry and market trends.
"An O'Reilly survey found that 40 percent of respondents worked at a company that had adopted serverless architecture," reports Drew Robb in ServerWatch.

"And a Datadog survey discovered that 50 percent of AWS users were using the serverless function. Furthermore, Precision Reports projects the global serverless architecture market size will reach $10290 million by 2026, from $3570 million in 2019, at a CAGR of 16.2 percent during 2021-2026.

In a market that's growing so rapidly, it can be difficult to determine which serverless vendor is right for you. Keep your business's unique needs in mind as you evaluate each solution's key differentiators..."

ServerWatch, May 4th, 2022
(Get More Information . .) open to premium members only

Multicloud And Consistent Innovation Now A Necessity For Orgs, Not A Choice
Few other branch-out concepts from cloud computing's overarching umbrella have been as impactful as multicloud.
"Focusing on this technology, Dell Technologies Inc. and Deloitte Consulting are working to create better, more conducive environments within which organizations can either migrate to or maximize their existing stacks," reports Victor Dabrinze in SiliconANGLE .

"'Anybody who's leveraging cloud computing is going to find that there's a need to leverage multiple clouds and multiple kinds of technologies,' said David Linthicum (pictured, left), chief cloud strategy officer at Deloitte. 'And, therefore, we're kind of focused on what's in between the clouds versus the clouds themselves..."

SiliconANGLE , May 5th, 2022
(Get More Information . .) open to premium members only

IT News - Networks
disable
SD-WAN And Cybersecurity: Two Sides Of The Same Coin
For most organizations, SD-WAN and security have become closely intertwined decisions. This interdependency can be viewed in a couple of ways, each of which can offer benefits for enterprises.
Software-defined wide area networking, or SD-WAN, is the next frontier for the network edge. Multiple analysts report that the SD-WAN market is in the billions of dollars, with an annual growth rate in the 25% to 35% range. Managed service providers and carriers globally are increasingly deploying managed SD-WAN services to reach new markets. Almost all networking and security vendors have SD-WAN offerings, complicating the decision when choosing an SD-WAN solution.

Security and WAN connectivity decisions have become a collaborative decision between the security and networking teams. Prior to this, enterprise networking teams were responsible for setting up connectivity to major company locations, while connections to branches and remote offices fell to the enterprise WAN manager. In the meantime, dedicated security teams were tasked with procuring, deploying, and managing firewalls.

CSO Online, May 4th, 2022
(Get More Information . .) open to premium members only

6 Types Of Enterprise Networking Topologies
Network topology is essential to network configuration, as it determines the arrangement of a network and defines how nodes connect. Here are six common types of network topologies.
Andrew Froehlich writes in SearchNetworking, "No two networks are designed and built the same. One business might have drastically different network deployment goals from another. Network professionals tailor each system to meet the levels of access, control and performance based on the goals of a business.

That said, enterprise-grade networking technologies come with their own limitations, so network professionals must build networks based on how the equipment operates. Most network topologies -- which include networking equipment and supplemental software -- are flexible, but they also have a few specific deployment methods.

Here's a look at six popular types of network topologies. Some legacy topologies are rarely used, while others are newer and provide more performance, reliability and security. Let's look at each topology type and how each operates..."

SearchNetworking, May 6th, 2022
(Get More Information . .) open to premium members only

IT News - Careers
disable
Uptime Institute Debuts Sustainability-Focused Accreditation For Datacentre Professionals
Uptime Institute continues to build out its education resources and support offerings for datacentre operators that want to get to grips with the changing regulatory landscape around sustainability
"The Uptime Institute is continuing to build out the support it can offer datacentre managers and operators that need to hone their sustainability strategies, with the roll-out of a new accreditation," reports Caroline Donnelly in ComputerWeekly.

"The datacentre resiliency think tank's Accredited Sustainability Advisor (ASA) course is geared towards providing participants with the knowledge and practical skills they need to create and manage a sustainability strategy on behalf of their organisation..."

ComputerWeekly, May 6th, 2022
(Get More Information . .) open to premium members only

10 Ways To Recession-Proof Your IT Career
With inflation and other global factors increasing the risk of recession, savvy IT pros are reconsidering their approaches to work to ensure career prospects in uncertain economic times.
"Tech leaders are known for planning ahead," writes Paul Heltzel in CIO, "and many are watching the state of the economy with interest, as inflation is on the rise, coupled with pandemic-related supply shortages and other global factors that increase the risk of a recession. The same forward-thinking approaches that help tech companies adapt - when faced with other forms of disruption - can also be applied to your career.

There are steps you can take to protect and advance your career in worrisome economic times, including developing new skills and changing old habits. Progressive companies stay ahead of the curve by looking ahead, and you can do the same by making good use of your time and seeking new opportunities.

Here's a look at 10 ways you can help protect your career prospects in uncertain economic times..."

CIO, May 2nd, 2022
(Get More Information . .) open to premium members only

IT News - Email
disable
$43 Billion Stolen Through Business Email Compromise Since 2016, Reports FBI
Over US $43 billion has been lost through Business Email Compromise attacks since 2016, according to data released this week by the FBI.
Graham Cluley writes in Security Boulevard, "The FBI's Internet Crime Complaint Center (IC3) issued a public service announcement on May 4 2022, sharing updated statistics on Business Email Compromise (BEC) attacks which use a variety of social engineering and phishing techniques to break into accounts and trick companies into transferring large amounts of money into the hands of criminals.

The report looked at 241,206 incidents reported to law enforcement and banking institutions between June 2016 and December 2021, and says that the combined domestic and international losses incurred amounted to US $43.31 billion..."

Security Boulevard, May 5th, 2022
(Get More Information . .) open to premium members only

IT News - Big Data
disable
The Future Of Data Management: It's Already Here
Analysts such as Gartner are claiming that data fabric is the future of data management. But, in fact, the future is already here.
Navin Sharma writes in datanami, "We see many signs of market maturity, ranging from total-addressable market projections to vendors pushing ROI. Data fabric's unique ability to integrate enterprise data and reduce the need for repetitive tasks in data discovery, analysis, and implementation are the reasons why many believe this will be the breakout year for the modern data integration approach.

Gartner defines data fabric as a design concept that serves as an integrated layer, or fabric, of data and connecting processes. A data fabric enables data that is dispersed across various locations and used by different applications to be accessed and analyzed in real-time within a unifying data layer, under the same management and security. And they do it by leveraging both human and machine capabilities..."

datanami, May 5th, 2022
(Get More Information . .) open to premium members only

IT News - Encryption
disable
Post-Quantum Cryptography Set to Replace RSA, AES, ECC
In the next 10 years, public-key encryption needs to be replaced by post-quantum techniques that can stand upIn the next 10 years, public-key encryption needs to be replaced by post-quantum techniques that can stand up to the new challenges. to the new challenges.
Within a decade, the growth of powerful quantum computers will lead to a new era in security, in which once-impenetrable public-key techniques like RSA and ECC will fall to higher levels of brute force. Such techniques need to be replaced by post-quantum cryptography that can stand up to the new challenges.

That's according to an intelligence brief from research company PreScouter. The brief, titled "Quantum Computing and Cybersecurity: Preparing for Post-Quantum Cryptography," says the global quantum computing market will grow from $472 million in 2021 to $1.765 billion by 2026. As the technology spreads from research labs to the cloud, the likelihood of it getting used to defeat current encryption methods rises to near certainty. Indeed, the Biden administration just issued two directives to prepare US government and businesses against future quantum cyberattacks.

DARKReading, May 6th, 2022
(Get More Information . .) open to premium members only

Sections in this issue:
click to jump to section