IT News and Events
Oct 21st, 2019 — Oct 27th, 2019 Generate the Custom HTML Email for this Issue
IT News and Events IT News and Events
Volume 259, Issue 4 << Previous Issue | Next Issue >>
IT News - CxO
disable
5 Things Security Executives Need To Know About Insider Threat
Insider threat is, unfortunately, an issue that has not yet received sufficient priority
Tom Miller writes in HelpNet Security, According to the 2018 Deloitte-NASCIO Cybersecurity Study, CISOs' top challenges remain 'budget, talent and increasing cyber threats,' and to some, insider threat doesn't even make the list of top-ten priorities.

Considering what's at stake - and our 21st-century ability to see signs of, and ultimately prevent, insider threat - this is a phenomenon security executives can no longer afford to ignore. Specifically, leaders need to know these five things about insider threat:.."

HelpNet Security, October 14th, 2019
(Get More Information . .) open to premium members only

Book Review: 'Cybersecurity Is Everybody's Business'
This book is packed with great information on myriad 21st-century Internet security, data privacy and cybersafety topics
"The technology and cybersecurity industries are rapidly evolving before our eyes," opines Dan Lohrmann in Government Technology.

"Although hacking, data breaches, denial of service attacks, other Internet security incidents and cybercrime are not new, the online world is changing now more than ever as we head toward 2020.

So how can Internet users keep-up with this dizzying pace of change, much less the new terminology, cyberattack scenarios, criminal online tricks and related matters?..."

Government Technology, October 14th, 2019
(Get More Information . .) open to premium members only

Executives Are Not Actively Engaged In Ensuring The Effectiveness Of Cybersecurity Strategy
There's a clear lack of accountability, especially on the board and among C-suite executives, and a lack of confidence in determining the efficacy of security technologies
"AttackIQ and Ponemon Institute surveyed 577 IT and IT security practitioners in the United States who are knowledgeable about their organizations' IT security strategy, tactics, and technology investments..."

'Enterprise culture is formed at the top. If enterprise leaders are not actively engaged in ensuring a strong cybersecurity posture, it sends the message that cybersecurity is not a mission critical issue,' said Larry Ponemon, chairman of Ponemon Institute.

HelpNet Security, October 17th, 2019
(Get More Information . .) open to premium members only

IT News - Security
disable
Planting Tiny Spy Chips In Hardware Can Cost As Little As $200
Proof-of-concept shows how easy it may be to hide malicious chips inside IT equipment
Andy Greenberg writes in Ars Technica, "More than a year has passed since Bloomberg Businessweek grabbed the lapels of the cybersecurity world with a bombshell claim: that Supermicro motherboards in servers used by major tech firms, including Apple and Amazon, had been stealthily implanted with a chip the size of a rice grain that allowed Chinese hackers to spy deep into those networks. Apple, Amazon, and Supermicro all vehemently denied the report. The National Security Agency dismissed it as a false alarm. The Defcon hacker conference awarded it two Pwnie Awards, for "most overhyped bug" and "most epic fail." And no follow-up reporting has yet affirmed its central premise..."
Ars Technica, October 14th, 2019
(Get More Information . .) open to premium members only

IT News - MFA
disable
Why Cybercriminals Prefer Passwords
Are passwords still a viable security option in 2019?
  • I wouldn't try to protect a mobile payment network with them.
  • I wouldn't use them to control access to a healthcare facility.
  • I wouldn't trust them to safeguard online retail transactions either.

"Granted, they do provide a tiny measure of security, but experience shows passwords are hacked, stolen, and guessed too easily to rely on one day longer. Passwords have become an open invitation to costly fraud and invasion....

Fortress Identity, October 16th, 2019
(Get More Information . .) open to premium members only

Bankers, Here Are Nine Things Hackers Hope You Never Learn
It's time to turn your institution into a biometric fortress
Alessandro Chiarini writes, "In my role as an advisor to financial institutions on mobile biometric authentication, I meet bankers from all over the world. Most are technologically literate and leverage technology effectively in their operations, marketing, sales, communications, etc. However, many share a blind spot when it comes to their vulnerability to internal and external threats. They are insufficiently aware of:

  • The scale and nature of the dangers they face, internally as well as externally.
  • The latest security solutions available to financial institutions.
  • The ease and economy with which voice biometric authentication can be implemented for mobile devices.

Below, I list nine things all bankers should know about protecting themselves..."

Fortress Identity, October 15th, 2019
(Get More Information . .) open to premium members only

Compound Biometrics - Protection In-Depth
Many financial services firms stopped kidding themselves about passwords a long time ago
"The march toward really effective user authentication has taken much longer than it should have. And that is true for all industries.

Just last year about 85% of data breaches were enabled by compromised passwords. Most attacks were external, but nearly 25% of them came from inside the organization.

Early replacements for passwords or methods of fortifying passwords helped for a while, but fraudsters quickly found ways of getting around them. In fact, the relentless ingenuity of cybercriminals in spoofing new security measures continues to frustrate firms that are still attempting to cope with what I would call half-measures..."

Fortress Identity, October 14th, 2019
(Get More Information . .) open to premium members only

IT News - Storage
disable
MAMR Tech Fuels Mammoth 20 TB Hard Drives
Age-old hard disk drives get a new twist as energy-assisted technologies fuel Western Digital's upcoming new 20 TB HDDs and rivals Seagate and Toshiba work on product plans
"There's plenty of life in spinning disk technology, with innovative new 18 TB and 20 TB hard drive options on the horizon just months after 16 TB models started shipping," notes Carol Sliwa in SearchStorage.

"Faster NAND flash and Optane solid-state drives may command more attention, but hyperscalers, cloud providers and enterprises in need of high-capacity storage at a lower cost still turn to hard disk drives (HDDs)..."

SearchStorage, October 18th, 2019
(Get More Information . .) open to premium members only

ITPalooza
disable
ITPalooza 2019 - 8th Annual IT Conference in Ft. Lauderdale
Download The Official Itp19 Sponsorship Prospectus
Thursday, December 5, 2019, Ft. Lauderdale

ITPalooza is South Florida's Premier Technology Conference. Now in its 8th year, ITPalooza is the preeminent platform to drive business deals and forge valuable connections with local and regional tech professionals.

Statistics for the last seven editions:

  • 15,000 - Attendees and Guests
  • 800 - Speakers and Presenters
  • 1100 - Participating Companies
  • 82% - Technology Professionals

Quick Summary of Sponsorships:

  • Platinum Package With Sponsored Speaking Session (6) - $5,500
  • Platinum Package With Vip Lounge / Party Sponsorship (4) - $5,000
  • Attendee Lunch Sponsor (4) - $2,000 - $2,750
  • Check-In Sponsor (4) - $2,000 - $2,750
  • Gold Package (75) - Gold Package (75)
  • Silver Package (50) - $1,000 - $1,750
  • Non-Profit / Startup Package (20) - $500 - $1,000

If you need a convenient PDF document to forward to your boss or a colleague, download the official ITP19 sponsorship opportunities price list, here it is.

Thursday December 5th
(Get More Information . .) open to premium members only

IT News - AI
disable
AI Will Free Security Pros From Menial Tasks, Experts Say
Automation will let security pros at government agencies focus on threat hunting and higher-level development projects
"State and local governments are looking at artificial intelligence as a way to manage and secure an overwhelming wave of data collected by government agencies today while freeing human beings to manage more subtle and complex aspects of cybersecurity challenges," writes Steve Zurier in StateTech.

"Alan Shark, executive director of the Public Technology Institute, says state and local security teams can use AI to free security analysts from the repetitive and time-consuming tasks of reading all the security logs from intrusion detection and intrusion prevention appliances, anti-virus software, URL filters and endpoints..."

StateTech, October 17th, 2019
(Get More Information . .) open to premium members only

IT News - Humor
disable
Master Of Disguise
That was quite a display
"It's about 20 years ago, and this pilot fish travels around the U.S. demonstrating his company's network computer at trade shows.

'The device,' says fish, 'was basically a dumb terminal connected to a PC server instead of a mainframe, and therefore capable of serving up Windows and web applications. Since the product was small and easy to miss, I would always attach an impressive 17-inch LCD flat-screen monitor that retailed for $2,000.'

In 1998, most people have never seen a flat-screen monitor..." - ComputerWorld

ComputerWorld, October 14th, 2019
(Get More Information . .) open to premium members only

Flashback Friday: Give Them A Headache And They Might Be Generous
But we bet they'll find a way to get that 8 cents back
"It's the mid-1980s, and this pilot fish is working on a project to convert his company's payroll system from one proprietary mainframe to a newer model.

'After converting the system, we did parallel runs for the same week between old and new hardware,' says fish.

And lo and behold, the newer hardware comes up with a total payroll that's 8 cents less than the run on the old hardware..." - ComputerWorld

ComputerWorld, October 18th, 2019
(Get More Information . .) open to premium members only

Very Interesting
Software takes everything so literally
"One day, back in the '80s, all the ATMs at the bank where pilot fish works suddenly refuse to dispense cash. Customers get a cryptic message about the system not being able to process requests..." - ComputerWorld
ComputerWorld, October 14th, 2019
(Get More Information . .) open to premium members only

IT News - Operations
disable
Hyperscale Datacenters Lift Many Boats
Soaring demand for hyperscale datacenters and colocation services is having a ripple effect within the value chain that builds and integrates those services
George Leopold writes in datanami, "As edge deployments and software-defined infrastructure drove overall hyperscale datacenter spending last year to an estimated $120 billion, the survey released by Schneider Electric notes that growing demand also highlights continuing skills gap. The ongoing skilled labor shortage was the top challenge across the datacenter ecosystem, according to the survey released on Monday (Oct. 14)..."
datanami, October 15th, 2019
(Get More Information . .) open to premium members only

Analysts: There Are Now More Than 500 Hyperscale Data Centers In The World
It took two years to build more than 100 massive server farms, but the rate is accelerating
"How long does it take the world to build 100 hyperscale data centers?" asks Yevgeniy Sverdlik in DataCenter Knowlegde. "Lately, about two years.

The number of these massive facilities -- they house all our data, serve all our entertainment, and power and cool the computing infrastructure for applications our lives now revolve around -- is now north of 500, says one analyst firm..."

DataCenter Knowlegde, October 18th, 2019
(Get More Information . .) open to premium members only

IT News - BI
disable
What Is Business Intelligence? Transforming Data Into Business Insights
Business intelligence (BI) leverages software and services to transform data into actionable insights that inform an organization's business decisions
Mary K. Pratt writes in CIO, "Business intelligence (BI) leverages software and services to transform data into actionable insights that inform an organization's strategic and tactical business decisions. BI tools access and analyze data sets and present analytical findings in reports, summaries, dashboards, graphs, charts and maps to provide users with detailed intelligence about the state of the business..."
CIO, October 14th, 2019
(Get More Information . .) open to premium members only

IT News - HR
disable
Forecast: The Talent Drought Will Get Worse
Sure, the unemployment rate is at a record low. But hiring will eventually get easier for employers.right? Wrong.
"The latest forecasts show the labor shortage deepening, not easing up.

How much worse will it get? A recent Korn Ferry study estimates there will be a global shortage of 85.2 million workers by 2030. The U.S. is on the precipice of a dire talent drought, which is further exacerbated by an ageing population: Baby Boomers are retiring at the rate of 10,000 people every day for the next decade..."

HR Dive, October 17th, 2019
(Get More Information . .) open to premium members only

IT News - Database
disable
Is Amazon's Database Strategy A Glimpse Into The Future?
IBM, through the work of Edgar Codd, invented the ideas behind the relational database back in 1970
Timothy Prickett Morgan writes in The Next Platform, "Even though IBM Research created the System R database in 1974 and had a few customers for this research effort, and even though its 'Pacific' project integrated a relational database into an object-based operating system to create the System/38 back in 1978 - a very advanced machine for its day that still lives on in the Power Systems family running the IBM i operating system - it is Oracle that gets credit for commercializing the relational database.

Perhaps that is justified because IBM didn't really sell more than a few tens of thousands of System/38s in their decade of availability and moreover Big Blue did not get a relational database, called SQL/DS, out on mainframes until 1981 and did not get its flagship DB2 database running on mainframes until 1983..."

The Next Platform, October 16th, 2019
(Get More Information . .) open to premium members only

MongoDB vs. MySQL: How To Choose
MongoDB and MySQL are the leading open source NoSQL and relational databases, respectively. Which is best for your application?
""During the dot-com bubble in the 1990s, one common software stack for web applications was LAMP, which originally stood for Linux (OS), Apache (web server), MySQL (relational database), and PHP (server programming language)," recalls Martin Heller in Inforworld.

"MySQL was the preferred database mostly because it was free open source and had good read performance, which fit well with 'Web 2.0' apps that dynamically generated sites from the database..."

Inforworld, October 14th, 2019
(Get More Information . .) open to premium members only

IT News - FOSS
disable
7 Powerful Open Source Tools For Your Data Projects
These powerful open source tools for data projects will make your work that much more seamless and functional. Here's what is recommended
Kayla Matthews writes in SmartDataCollective, "Regardless of if you're a data science professional or an IT department who wants to help your company have more successful data science projects, it's essential to have some data science tools under your belt to avail of when needed.

Here are some open-source options to consider..."

SmartDataCollective, October 14th, 2019
(Get More Information . .) open to premium members only

IT News - DevOps
disable
How Enterprise IT Teams Can Win The Hearts Of DevOps
Take your average IT team in a young enterprise in the midst of skyrocketing growth. There's a good chance the workflows they've used since the outset can't keep up with the ever-increasing volume of requests from the business
"In the minds of some DevOps and app development teams in particular, the IT department of the scrappy startup has gradually become the department of slowing things down," opines Brian J. Kelly in DevOps.com.

"As a result, tasks that once took hours, such as provisioning resources (e.g., virtual machines, workloads, XaaS), can now take days. For agile DevOps teams, this is essentially a showstopper: They need access to resources when they need them-not when you deem them worthy. Anything else feels like a drag on development and the business..."

DevOps.com, October 16th, 2019
(Get More Information . .) open to premium members only

IT News - Cloud
disable
IaaS vs. PaaS options on AWS, Azure and Google Cloud Platform
Looking to shift your workloads to the cloud? Understand and compare the IaaS and PaaS options on AWS, Azure and Google Cloud Platform
Chris Tozzi writes in SearchCloudComputing, IaaS and PaaS are two of the oldest and most widely used categories of cloud computing services -- similar in some ways but still fundamentally different types of platforms.

Enterprises must understand those differences in order to choose the right type of cloud service for a given use case. This article explains the benefits and drawbacks of IaaS vs. PaaS, and surveys the main IaaS and PaaS offerings available from AWS, Microsoft Azure and Google Cloud Platform..."

SearchCloudComputing, October 15th, 2019
(Get More Information . .) open to premium members only

3 Potential Multi-Cloud Challenges That Could Go Unnoticed
Disaster recovery, vendor lock-in and cost are major factors as organizations evaluate multi-cloud strategies. However, these pros can become cons if teams aren't careful.
"Organizations adopt multi-cloud strategies for disaster recovery protection, vendor lock-in avoidance and affordable prices," notes Michaela Goss in SearchNetworking. "However, these advantages can also lead to several multi-cloud challenges for organizations.

Multi-cloud network environments comprise two or more cloud providers or services. Organizations and network teams should consider the maturity and portability of their networks before they adopt a multi-cloud strategy, said Sridhar Vasudevan, principal strategist for cloud and data center strategies at Insight Enterprises, an IT service provider based in Tempe, Ariz..."

SearchNetworking, October 16th, 2019
(Get More Information . .) open to premium members only

Key Differences Between Cloud Storage Offerings
Cloud storage offerings are often largely similar. We run through the key areas where they can differ, such as location, range of services and data protection
"Two key IT challenges that seem to come up a lot right now are how to take advantage of the cloud and what to do about ever-growing storage capacity needs," reports Paul Stringfellow in ComputerWeekly.

"The fact is that the answer to each can also part answer the other question..."

ComputerWeekly, October 16th, 2019
(Get More Information . .) open to premium members only

IT News - Careers
disable
I Think They Expect Me To Work For Free
In the October 15, 2019 Ask The Headhunter Newsletter a reader wonders whether he's being asked to do a job interview or to work for free...
Question:

"I'm interviewing with a large start-up co-working company. The position is in part a strategy role. They asked me to create a fairly involved business plan for a product launch that they are planning to offer in a few months. I am concerned that this is an effort to get free analysis out of me. They'll take my plan and then leave me in the cold. Do you see a way to move forward without providing free consulting services?..."

Ask The Headhunter, October 14th, 2019
(Get More Information . .) open to premium members only

14 Hot Cybersecurity Certifications Right Now
n an industry where certifications can make or break a job candidacy, which ones have security pros been going after in 2019?
"We know there are plenty of jobs out there for those interested in working in security," notes Joan Goodchild in insideBIGDATA.

"And there is also no shortage of security certifications for those who want to demonstrate to employers they have earned the education they need to succeed. But in a fast-moving and evolving field, which certifications are catching fire lately?..."

insideBIGDATA, October 15th, 2019
(Get More Information . .) open to premium members only

IT News - Encryption
disable
Essential Guide: Encryption
Encryption is the method by which information is converted into secret code that hides the information's true meaning
"In computing, unencrypted data is also known as plaintext, and encrypted data is called ciphertext. The formulas used to encode and decode messages are called encryption algorithms or ciphers," writes Margaret Rouse in SearchSecurity.

"To be effective, a cipher includes a variable as part of the algorithm. The variable, which is called a key, is what makes a cipher's output unique. When an encrypted message is intercepted by an unauthorized entity, the intruder has to guess which cipher the sender used to encrypt the message, as well as what keys were used as variables. The time it takes to guess this information is what makes encryption such a valuable security tool..."

SearchSecurity, October 16th, 2019
(Get More Information . .) open to premium members only

Sections in this issue:
click to jump to section