IT News and Events
Apr 5th, 2021 — Apr 11th, 2021 Generate the Custom HTML Email for this Issue
IT News and Events IT News and Events
Volume 277, Issue 1 << Previous Issue | Next Issue >>
IT News - CxO
7 Management Books Every CIO Must Read
Keeping pace with evolving management concepts and practices is as important as monitoring the latest IT trends. These seven books will ensure that your business management skills keep pace with your IT knowledge
"Like IT tools and resources, management skills and practices are continually evolving. Unfortunately, as time-squeezed IT leaders struggle to keep pace with a seemingly-endless flood of disruptive technologies, many continue to rely on management philosophies and practices that were discarded and replaced many years ago.

Shedding outdated management approaches and acquiring fresh skills requires an open mind and a willingness to consider both new viewpoints and practices that have withstood the test of time. Here's a look at seven management books that CIOs should read to remain productive and relevant in an ever more competitive IT and business arena..."

CIO, April 1st, 2021
(Get More Information . .) open to premium members only

7 IT Leadership Lessons Learned From COVID-19
IT leaders from HP, McAfee, Johnson Controls, and other enterprises reflect on what they learned after leading teams through a full year of the COVID-19 pandemic
"The World Health Organization declared the COVID-19 outbreak a global pandemic on March 11, 2020, and soon after IT leaders rushed to mitigate the impact on their businesses, marshaling teams to work remotely.

CIOs boosted infrastructure capacity, shipped laptops to residences, and migrated applications small and large to software-as-a-service (SaaS) applications and cloud software. Eighty-two percent of CIOs surveyed say they have implemented new technologies and IT strategies during the pandemic, according to IDG's 2021 State of the CIO survey..."

CIO, March 30th, 2021
(Get More Information . .) open to premium members only

What Is A CISO? Responsibilities And Requirements For This Vital Leadership Role
Learn what it takes to land a CISO job and how to be successful in the role.
"The chief information security officer (CISO) is the executive responsible for an organization's information and data security. While in the past the role has been rather narrowly defined along those lines, these days the title is often used interchangeably with CSO and VP of security, indicating a more expansive role in the organization.

Not every company has a top-level security executive: According to IDG's 2020 Security Priorities Study, 61% of surveyed companies do, though that rate goes up to 80% for large enterprises..."

CSO Online, April 1st, 2021
(Get More Information . .) open to premium members only

Security Ranks As Top IT Funding Priority
IT leaders rank security as the number-one IT funding priority in new research. That's a change worth analyzing, since security has historically often been underfunded and under-prioritized
"Digital transformation has accelerated, but funding the associated culture change doesn't seem to be much of a priority for IT leaders. That discovery came out of Red Hat's Global Tech Outlook 2021 research, a July-September 2020 survey of 1,470 IT professionals, mostly from companies with more than $100 million in annual revenue, representing a mix of Red Hat customers and a broader industry panel.

Do the other non-IT funding priorities seem more logical?..."

The Enterprisers Project, March 30th, 2021
(Get More Information . .) open to premium members only

CIOs Plan Hiring Spree To Support Emerging Technologies
They may not find enough skilled workers, however
"The majority of Chief Information Officers (CIO) are planning to expand their full-time workforce as they look to support new digital initiatives. This is according to a new report from Gartner, based on a poll of 184 CIOs in North America, EMEA and APAC.

Throughout 2021, 55 percent of CIOs will look to add personnel to their teams that can support projects surrounding automation, cloud and analytics, and remote work support..."

ITProPortal, April 1st, 2021
(Get More Information . .) open to premium members only

Successful Digital Transformation Using Cloud-Ready Storage
IBM on the importance of hybrid cloud storage
"The havoc wreaked on societies and economies by the pandemic has led to a surge in digital transformations and shed light on the advanced capabilities making them possible, namely hybrid cloud storage and AI.

According to a recent report from research firm Twilio, 97% of enterprise decision makers said the pandemic led them to speed up their digital transformations. Similarly, a C-Suite study from the IBM Institute for Business Value found 62% of executives plan to accelerate their digital efforts over the next two years due to the pandemic...", April 2nd, 2021
(Get More Information . .) open to premium members only

IT News - CRM
CRM's New Normal: It's Complicated
As we slowly climb out of the Covid anis horribilis, advocates of the new normal (whatever that is) may wish to temper their prognostications about working from home or working from anywhere
"While those are good ideas, and the new crop of CRM apps that support such hybrid work lives are genuinely cool, they might only demonstrate the deep functionality of CRM companies' platforms and not a social movement.

In other words, they may not be predictive of long-term approaches to business. Let's not put all of our eggs in that single Easter basket -- don't cancel your lease on high rises in your favorite city because you might still need most of the workspace..."

CRMBuyer, March 29th, 2021
(Get More Information . .) open to premium members only

IT News - Security
5 Endpoint Security Best Practices To Keep Company Data Safe
With an expanding company perimeter, it's time to implement these endpoint security best practices, from asset discovery to device profiling
"The enterprise definition of endpoint has dramatically shifted over the years. Endpoints traditionally referred to desktop computers and laptops, which could be secured with antivirus software and firewalls. Today, the term covers a wide array of devices used for business, from PCs and laptops to corporate- and employee-owned smartphones to IoT sensors -- all of which require much more security than antivirus and firewalls provide.

With an endpoint security policy in place, organizations can ensure corporate assets and data remain protected even when devices outside of their four walls access them. To build this policy, companies should ask themselves how much security is needed for their specific endpoints, as well as whether endpoint security tools should keep devices heavily locked down or provide lighter protections to allow employees some personal freedom..."

SearchSecurity, April 1st, 2021
(Get More Information . .) open to premium members only

80% Of Global Enterprises Report Firmware Cyberattacks
A vast majority of companies in a global survey from Microsoft report being a victim of a firmware-focused cyberattack, but defense spending lags, but defense spending lags
"Attacks against firmware are snowballing, outstripping many organizations' cyber-defenses, according to a survey from Microsoft. The report showed that more than 80 percent of enterprises have experienced at least one firmware attack in the past two years - but only 29 percent of security budgets goes to firmware security.

Firmware, a class of software that provides the low-level control for a device's specific hardware, is last on the list for security-protection investment. The study - which polled 1,000 enterprise security decisionmakers in China, Germany, Japan, the U.K. and the U.S. - showed that most security investments are going to security updates, vulnerability scanning and advanced threat-protection solutions..."

threatpost, March 28th, 2021
(Get More Information . .) open to premium members only

Clean Sweep: A 30-Day Guide To A New Cybersecurity Plan
While the arrival of spring promises better days ahead, enterprises are also facing a cyberthreat landscape filled with both familiar threats and emerging attack vectors
"As a result, it's worth taking stock of current security systems and services to see what's working, what isn't and where operations can be improved. But how do businesses begin?

Start with the 30-day spring cleaning challenge. Experience four weeks of practical programming, followed by a two-day wrap-up. It's designed to help companies evolve current cybersecurity policies into improved infosec operations that reduce operational risk..."

SecurityIntelligence, April 1st, 2021
(Get More Information . .) open to premium members only

Building A Fortress: 3 Key Strategies For Optimized It Security
Chris Hass, director of information security and research at Automox, discusses how to shore up cybersecurity defenses and what to prioritize
"Last year and early spring has been undoubtedly tough for cybersecurity. We've seen one of - if not the - worst cyberattacks on U.S. companies and government agencies in the last decade; and the ProxyLogon Microsoft Exchange vulnerabilities continue to be dangerous.

Knowing just how vulnerable many companies are to organized malicious actors, IT teams are re-evaluating their shortcomings and processes when it comes to building their organizations' security infrastructure. Looking into the rest of the year, companies will need to adopt new strategies, procedures and technologies to become more resilient to the onslaught of cyberattacks.

Here are the three strategies that IT teams should prioritize going forward: Zero-trust approaches; patching; and automation..."

threatpost, April 1st, 2021
(Get More Information . .) open to premium members only

Top 5 Attack Techniques May Be Easier To Detect Than You Think
New analysis shows attackers for the most part are continuing to rely on the same techniques and tactics they have been using for years
"Despite the intimidating nature of the threat landscape, organizations can achieve considerable defense in depth by monitoring a relatively small number of data sources and keeping an eye out for a handful of malicious patterns in the data.

In fact, much of the information required to detect most commonly encountered threats and malicious techniques can be drawn right from Windows event logs and systems monitoring, according to a new report by security vendor Red Canary..."

Dark Reading, March 31st, 2021
(Get More Information . .) open to premium members only

IT News - Storage
How To Develop And Implement A Data Storage Plan
Planning is an important piece of IT. Examine the elements of a storage plan, how to prepare and implement the document, and the benefits of having one
"While the approach for data storage may be simple, organizations need a formal plan.

A data storage plan addresses what gets stored, the location, when storage activities occur, who is responsible for management, how much data an organization stores, what it retains and destroys, and how storage takes place.

Read on for more details about these important pieces of a storage plan..."

SearchStorage, March 31st, 2021
(Get More Information . .) open to premium members only

How To Store Petabytes Of Machine-Generated Data?
The amount of data worldwide grows by several billion terabytes every year because more and more machines and devices are generating data. But where will we put it all? Even in this age of IoT, HDDs remain indispensable.
"Data volumes have multiplied in recent decades, but the real data explosion is yet to come. Whereas, in the past, data was mainly created by people, such as photos, videos and documents, with the advent of the IoT age, machines, devices and sensors are now becoming the biggest data producers. There are already far more of them than people and they generate data much faster than us. A single autonomous car, for example, creates several terabytes per day.

Then there is the particle accelerator at CERN that generates 1PB/s, although 'only' around 10PB/month are retained for later analysis..."

StorageNewsletter, April 2nd, 2021
(Get More Information . .) open to premium members only

New Storage Trends Promise To Help Enterprises Handle A Data Avalanche
Data, data everywhere, but where to put it all? Here's a rundown of five current and potential fast and high-capacity storage approaches
"As enterprises continue to stockpile massive amounts of information generated by people, businesses, vehicles, and a virtually endless list of other sources, many are wondering where they can store all of that data accessibly, safely, securely, and cost effectively.

The data storage business has changed significantly over the last five years and that transformation is continuing and broadening. The big difference today is that while storage used to be about hardware-related issues, such as solid-state drives, faster read/write speeds, and capacity expansion, the cloud and other storage breakthroughs have flipped the market to the opposite side..."

InformationWeek, April 1st, 2021
(Get More Information . .) open to premium members only

Spectra Logic Releases 2021 Data Storage Outlook Report
Spectra Logic, a leader in data storage and data management solutions, today announced the publication of its annual 'Data Storage Outlook' report, which explores how the world manages, accesses, uses and preserves its ever-expanding data repositories
"The sixth edition of the report predicts the data storage strategies, architectures and technologies that will enable the protection, management and preservation of historical, current and future data for generations to come.

Spectra's comprehensive 2021 Data Storage Outlook report provides forecasts for several data storage technologies, including flash, magnetic disk, tape, hybrid cloud, persistent memory and optical, along with a view into future technologies..."

HPCWire, March 31st, 2021
(Get More Information . .) open to premium members only

IT News - AI
Quantum Computing May Be Able To Solve The Age-Old Problem Of Reasoning
The new technology can take partial information and produce intelligent inferences, according to new research from Cambridge Quantum Computing
"As artificial intelligence and machine learning algorithms have received attention for making accurate predictions--in everything from judging the outcome of human rights trials to predicting the winner of the Kentucky Derby to identifying cancer--another new technology has now been applied to the task of reasoning: quantum computing.

In a new paper, scientists at Cambridge Quantum Computing exhibited how quantum computing, still a nascent field, can be useful in making practical decisions. The aim, according to the head of the Quantum Machine Learning division of CQC, Mattia Fiorentini, was to show that quantum computers can handle intuitive reasoning--using inference on a probability model--which hadn't been approached this way before.."

TechRepublic, April 2nd, 2021
(Get More Information . .) open to premium members only

Deep Learning Being Used To Detect Earliest Stages Of Alzheimer's Disease
The rise of precision medicine is being augmented by greater use of deep learning technologies that provide predictive analytics for earlier diagnosis of a range of debilitating diseases
"The latest example comes from researchers at Michigan-based Beaumont Health who used deep learning to analyze genomic DNA. The resulting simple blood test could be used to detect earlier onset of Alzheimer's disease.

In a study published this week in the peer-reviewed scientific journal PLOS ONE, the researchers said their analysis discovered 152 'significant' genetic differences among Alzheimer's and healthy patients. Those biomarkers could be used to provide diagnoses before Alzheimer's symptoms develop and a patient's brain is irreversibly damaged..."

Enterprise AI, April 2nd, 2021
(Get More Information . .) open to premium members only

IT News - Operations
Endpoint Management And Its Evolving Role In IT
Technology is changing rapidly and IT teams need IT management tools that are keeping up with this pace of change
"Traditional endpoint management tools that focus on desktops, laptops and servers are no longer adequate to manage today's complex IT environments. Now, we have virtualization, cloud infrastructure, mobile and IoT devices to manage along with traditional endpoints. A new generation of endpoint management tools is required to meet this need. These tools must enable you to manage all devices and IT environments, right from on-premises to the cloud to IoT and more, from a single console..."
Security Boulevard, April 2nd, 2021
(Get More Information . .) open to premium members only

IT News - HR
The Future Of Work: Virtual Hiring And Networking
If you want to get ready for the future of work, you should be aware that what lies ahead is mostly virtual, flexible, and tech-driven
"Even though the pandemic aftermaths are disrupting, they have shown us which direction we want to take regarding workplaces.

Social distancing forced us to shift to remote work but, it turns out, people love spending less time commuting, being more with the family, and not spending up to nine hours in a cubicle. Moreover, the statistics show employees feel 95 percent more productive working from home, and 53 percent of U.S. workers would like to continue teleworking.

There are also benefits for the companies: U.S. employers can save $30 billion a day if they allow telework. It is no surprise that two-thirds of knowledge workers think that offices disappear by 2030.

Remote work is becoming the norm, and so is virtual hiring. It is why you have to improve your recruiting strategy, HR technology, and networking. Here's how to do it..."

Business 2 Community, April 1st, 2021
(Get More Information . .) open to premium members only

IT News - Database
Individual databases have different strengths and weaknesses, and two important broad database categories are 'relational' (SQL) and 'non-relational' (NoSQL/Not-Only-SQL).
"The two frameworks are increasingly crossing over with each other but the two principally model data differently - offering either acute integrity or agile scalability.

With Couchbase predicted to debut in the stock market in the first half of 2021 for as much as $3 billion - after quietly filing an IPO - the conversation of 'SQL vs NoSQL' is even more rapidly travelling beyond just ears in niche community forums, and becoming a major public matter. Let's take a look at the key differences when choosing between the two for your big data management..."

jaxenter, April 1st, 2021
(Get More Information . .) open to premium members only

IT News - Linux
AlmaLinux, The $1M Drop-In CentOs Replacement, Is Out And Bound For Data Centers
Its creator, CloudLinux, built the distribution at warp speed, racing to fill the void left by Red Hat's EOL announcement for CentOS
"AlmaLinux, designed as a drop-in replacement for CentOS 8, is headed for data centers.

The company behind the new Linux distro, CloudLinux, announced general availability of the first stable release of AlmaLinux OS in a virtual event Tuesday. It was conceived just this past December, immediately after Red Hat's announcement that it was killing CentOS, the popular free downstream alternative to Red Hat Enterprise Linux, and moving the project upstream, under the name CentOS Stream..."

Data Center Knowledge, March 31st, 2021
(Get More Information . .) open to premium members only

How To Encrypt Files On Linux
In our increasingly digital society, protecting the privacy of sensitive data and our behavior online is a universal concern. Many users switch to Linux for its superior privacy features and the excellent selection of privacy-focused distros that it offers
"Regardless of the OS you are using, encryption is a critical element of digital privacy. In this article, we explore the best and most reliable methods of file encryption on Linux. Our experts have firsthand experience using these programs and understand the technology behind them, equipping us with the knowledge to help you securely encrypt files on your Linux system and avoid common pitfalls associated with Linux file encryption.

What Is Encryption?

Encryption is the process of encoding data in such a way that only authorized parties will be able to read it. Encrypted data can only be decoded by a decryption key. Public-key cryptography, which uses pairs of public keys that may be known by others and private keys that may never be known by anyone except for the owner, is the basis for all encryption today..."

LinuxSecurity, March 28th, 2021
(Get More Information . .) open to premium members only

IT News - Cloud
CSA Survey Suggests Cloud Security Is Improving
New research suggests the overall state of cloud security continues to improve at a time when more organizations rely on multiple cloud service providers
"A survey of 1,900 security and IT professionals published this week by the Cloud Security Alliance (CSA) in collaboration with AlgoSec, a provider of network security tools, finds only 11% of respondents said they encountered a cloud security incident in the past year. The most common problems encountered were issues with a specific cloud provider (26%), security misconfigurations (22%) and attacks such as denial-of-service exploits (20%).

When asked about the impact of the cloud outages, more than a quarter of respondents said it took more than half a day to recover..."

Security Boulevard, April 1st, 2021
(Get More Information . .) open to premium members only

The 7-Step Checklist To Avoid Common Cloud Misconfigurations
Assisting organizations and security teams get a foothold on their cloud security duties
"Another week and another cloud misconfiguration has hit the headlines. It seems as though a day doesn't go by where the news cycle doesn't contain a story relating to a leaky storage bucket or accidentally exposed database due to a security misconfiguration within infrastructure-as-a-service (IaaS). Noted as an end-user mistake, studies show 90 percent of UK data breaches were a direct result of human error, while the Verizon Data Breach Investigations Report revealed that more than 40 percent of all error-related breaches involved misconfigurations..."
ITProPortal, March 31st, 2021
(Get More Information . .) open to premium members only

5 Basic Steps For Effective Cloud Network Security
In hybrid infrastructures, old network security systems won't work. Enterprises must adopt effective cloud network security strategies to keep their assets safe
"Traditional network security protects endpoints and the data center within the perimeter by applying physical and software-based controls to safeguard the infrastructure from unauthorized use. This approach safeguarded servers and other enterprise devices from attacks that could steal or compromise data or other assets.

But security strategies must evolve as enterprises migrate workloads to the cloud. The cloud has propelled transformation, resulting in hybrid architectures where some workloads run in the cloud, while others run on premises..."

SearchNetworking, April 1st, 2021
(Get More Information . .) open to premium members only

IT News - IoT
Survey: 99% Of Security Pros Struggling To Secure Their IoT & IIoT Devices
Organizations are increasingly introducing new Internet of Things (IoT) devices into their environments
"According to Statista, the aggregate number of IoT devices deployed by organizations globally increased from 7.74 billion in 2019 to around 8.74 billion a year later. The market and consumer data firm reported that the next few years will see growth in all types of IoT devices, including Industrial Internet of Things (IIoT) offerings like smart monitors. It wrote that connected devices are expected to grow from 10.07 billion in 2021 to 25.44 billion by 2030.

This growth raises an important question: how are security professionals feeling about this projected influx of IoT and IIoT devices? Do they feel confident in their ability to secure these additional products? What approaches are they using to fuel their security efforts?..."

tripwire, March 30th, 2021
(Get More Information . .) open to premium members only

IT News - Virtualization
Hyper V vs. VMware: Comparing Virtualization Technologies
Organizations today often require many servers in different physical locations, each operating at their highest capacity to drive efficiency and ROI
"This has been made possible with the use of virtualization technologies that allow a single physical server to run multiple virtual machines that each have their own guest operating system.

Virtualization technology has its origins in the 1960s, with work that was done at IBM on time-sharing of mainframe computers. VMware didn't arrive on the scene until the late 1990s. In 2001, VMware introduced ESX Server, a Type-1 hypervisor. This technology doesn't require a host operating system to run virtual machines. Instead, the hypervisor runs on the 'bare metal'..."

Security Boulevard, March 31st, 2021
(Get More Information . .) open to premium members only

IT News - Email
Best Email Client 2021
Access your conversations straight from your desktop
"An email client? But why would you need one? As more and more businesses seem to be migrating to the cloud, you might wonder whether setting up a software application to receive emails on your desktop is even worth it. Well, to many people, it may not be. However, as any security-conscious business owner might tell you, web-based and cloud-based email services are not the safest way to communicate.

With cloud-based email services like Gmail, your sensitive data rests on the email provider's servers and is open to being scanned for marketing purposes. In fact, Google made it clear as early as 2014 that it scans your emails for tailored advertising. While this kind of thing is usually handled through AI, it still means that there is a watchful eye keeping track of your communications. That's where email clients come in, with many provided by the best email providers..."

ITProPortal, March 30th, 2021
(Get More Information . .) open to premium members only

IT News - Backup
How to Backup/Restore MySQL/MariaDB and PostgreSQL
If you are a database administrator (DBA) or are responsible for maintaining, backing up, and restoring databases, you know you can't afford to lose data
"The reason is simple: losing data not only means the loss of important information, but also may damage your business financially.

For that reason, you must always make sure that:

  • your databases are backed up on a periodic basis,
  • those backups are stored in a safe place, and
  • you perform restoration drills regularly.

This last activity should not be overlooked, as you don't want to run into a major issue without having practiced what needs to be done in such situation..."

TecMint, March 31st, 2021
(Get More Information . .) open to premium members only

Sections in this issue:
click to jump to section