IT News and Events
Sep 27th, 2021 — Oct 3rd, 2021 Generate the Custom HTML Email for this Issue
IT News and Events IT News and Events
Volume 282, Issue 5 << Previous Issue | Next Issue >>
IT News - CxO
disable
CIO vs. CTO: Chief Collaborators In Tech
The line between CIO and CTO roles is increasingly blurring. Here's how to these roles traditional differentiate, how they are converging, and how they can work together to create business value.
Bob Violino writes in CIO, "Most roles and responsibilities in the C-suite are fairly distinct and well defined: CFOs are responsible for all financial operations; COOs oversee daily operations; and CEOs manage the entire enterprise, for example.

With CIOs and CTOs, however, roles and responsibilities can sometimes get blurred. The fact that technology and how organizations use it changes so rapidly doesn't help matters. Nevertheless, many enterprises have both a CIO and a CTO, and it's important that the two work in harmony in order to maximize the benefits of technology..."

CIO, September 21st, 2021
(Get More Information . .) open to premium members only

Many Organizations Still Don't Quite Understand The Role Of The CDO
The Chief Data Officer position is often surrounded by confusion and uncertainty
"The position of Chief Data Officer (CDO) is surrounded by a measure of confusion and uncertainty," opines Sead in ITProPortal, "which means many firms struggle to find and retain the right candidates and CDOs go without the necessary support.

This is according to a new report, published by the analytics database firm Exasol, which claims that half of CDOs believe the value of their role isn't fully recognized in the business world. Furthermore, 46 percent said most businesses have skewed expectations of the CDO..."

ITProPortal, September 23rd, 2021
(Get More Information . .) open to premium members only

Digital Transformation Fuels CIO And CTO Role Convergence
CIO and CTO roles have shifted and converged as a result of this increased focus on digital transformation and the pandemic
"Most roles and responsibilities in the C-suite are fairly distinct and well defined. For example, CFOs are responsible for all financial operations; COOs oversee daily operations; and CEOs manage the entire business, and so on. With CIOs and CTOs however, roles and responsibilities can sometimes get blurred. In fact, with more digitalization the roles of these technology executives have often become so intertwined that some companies are seeing a need to consolidate the executive positions..." - CXOtoday.com
CXOtoday.com, September 22nd, 2021
(Get More Information . .) open to premium members only

What's Your Digital Dilemma?
There are many ways to describe the need for IT organizations to do things better
Derek Britton writes in Network Computing, "There are multiple opportunities to get it wrong. Certainly, compromising today in the name of tomorrow is what many IT leaders now call the digital dilemma. Derek Britton of Micro Focus offers the vendor perspective.

Those in IT leadership, and the organizations they represent, face many, sometimes competing challenges. That's nothing new..."

Network Computing, September 20th, 2021
(Get More Information . .) open to premium members only

Where Shadow IT Meets Enterprise Risk, Technology Leaders Have A Role
As team members outside the technology org adopt cloud solutions on their own, they can learn a thing or two from their IT colleagues, writes CIO advisor Joe Topinka.
"For years, CIOs have resisted, pushed back, and have been frustrated by business units' propensity to identify and procure business solutions without involving IT," writes Joe Topinka in Heller Search Solutions. "This is commonly known as 'shadow IT'.

"Historically, shadow IT has pitted IT organizations and business units against one another. But times are changing thanks to the soaring volume of robust cloud solutions in the market, and the arrival of digital natives in the workforce. I advise CIOs to resist the temptation to fight this inevitability and, instead, to embrace it. The truth is that software and service providers are making it easier for digital natives to tap solution capabilities on their own, without IT's direct involvement..."

Heller Search Solutions, September 22nd, 2021
(Get More Information . .) open to premium members only

The New Math Of Cybersecurity Value
An increasing number of CISOs are devising a new set of metrics to show how they're impacting risk at their organizations.
"Jenai Marinkovic doesn't put much stock into figures that show how many attacks she and her security team have stopped," notes Mary K. Pratt in CSO Online.

"Those numbers, she says, really don't provide any insights.

'Saying we blocked a million doesn't tell us anything. It doesn't communicate enough to other executives,' says Marinkovic, who provides virtual CISO services through Tiro Security and serves on the Emerging Trends Working Group with the IT governance association ISACA..."

CSO Online, September 21st, 2021
(Get More Information . .) open to premium members only

Chip Shortage: Should You Buy Tech Now Or Wait Out The Silicon Storm?
We spoke with tech pros to understand which products consumers should buy now, purchases to put on hold and when supplies could normalize, but don't expect a turnaround anytime soon
R. Dallon Adams writes in TechRepublic, "The coronavirus pandemic has sent shockwaves through supply chains leaving shortages, product delays and empty store shelves in its wake. The widespread runs on semiconductors have been acutely felt as these chips are critical to far more than computers in the digital age; logjamming production of everything from laptops to gaming consoles and automobiles. But, within this overall shortage, could there be an economic opportunity for consumers willing to wait a bit to purchase specific products down the road?..."
TechRepublic, September 21st, 2021
(Get More Information . .) open to premium members only

IT News - CRM
disable
7 Ways A CRM Can Help Reduce Costs For Your Business
Are you still printing documents and piling them up in a file folder, or sending an email with the attached copy of what's been written on paper?
"Why not move to a CRM software?" asks Matthew Popham in Business 2 Community. "Using a CRM can help move into a digital workstyle! A recent study shows that 58% of offices across Europe store some kind of record-keeping material on-site rather than using a digital system; 2% have no structured way whatsoever to store customer communications.

Why not move to a CRM software? Using a CRM can help move into a digital workstyle! A recent study shows that 58% of offices across Europe store some kind of record-keeping material on-site rather than using a digital system; 2% have no structured way whatsoever to store customer communications..."

Business 2 Community, September 23rd, 2021
(Get More Information . .) open to premium members only

IT News - Security
disable
Commenting On The SANS Threat Intelligence Summit 2021 Presentations - An Analysis And Practical Recommendations
I recently came across to the entire portfolio of SANS Threat Intelligence Summit presentations which are currently online at YouTube and I've decided to take the time and effort to go through them and offer practical and relevant threat intelligence and OSINT advice and recommendations which I hope will come handy to the presenters including anyone currently working in the field or interested in making an impact as a threat
Dancho Danchev writes in Security Boulevard, "Sample presentations from the Summit include:

Analyzing Chinese Information Operations with Threat Intelligence - this is a pretty informative presentation that offers practical and relevant Information Operations advice including a pretty decent case study on the topic of a high-profile information leak campaign based in China..."

Security Boulevard, September 20th, 2021
(Get More Information . .) open to premium members only

Data Security Trends 2021
There is no escaping data security. With so many tasks and transactions now being done virtually, every consumer is faced with an unending stream of requests for logins, passwords, two-factor authentication codes, captchas, and more
Drew Robb writes in Datamation, "On the enterprise side, users have to negotiate through a labyrinth of security layers and access controls to get to the data they need or to share it with others to perform their duties. In other words, data security is very much in your face 24/7..."
Datamation, September 20th, 2021
(Get More Information . .) open to premium members only

Millions Of Malicious Emails Are Still Slipping Past Security Filters
Criminals hunt for tired and distracted employees
Sead writes in Techradar.pro, "Despite many companies investing heavily in getting defenses set up, millions of malicious email messages made their way to the end-user, placing many of them at risk of data breaches, fraud and ransomware.

This is according to a new report from Tessian, which analyzed millions of emails passing through its email security tool between July 2020 and July 2021, finding that two million malicious messages bypassed 'traditional email defenses', such as secure email gateways..."

Techradar.pro, September 21st, 2021
(Get More Information . .) open to premium members only

The 2021 OWASP Top Ten Emphasizes Security Control Areas Over Individual Vulnerabilities For Improved Risk Management
The primary goal of the OWASP Top Ten has always been to drive awareness of the biggest application security risks out there, and thereby establish a 'floor' or minimum standard for application security efforts at an organization.
"The newly released 2021 OWASP Top Ten has done a fantastic job of communicating the breadth and depth of the problems we face today," reports David Lindner in Secuity Boulevard.

"It is based on thousands of hours of hard work by the OWASP Top Ten leadership and others-including an analysis of telemetry data that is unprecedented in size and scope and one of the biggest industry surveys on the topic ever conducted..."

Secuity Boulevard, September 23rd, 2021
(Get More Information . .) open to premium members only

Busting The Myths Surrounding Password-Based Security
People have been relying on password-based security for millennia
"The Roman military reportedly used what they called 'watchwords' to identify soldiers on patrol," recalls Enzoic in Secuity Boulevard.

"Exclusive groups and guilds used secret passwords to prove membership. The phrase 'open sesame' protected hidden treasure in the story of Ali Baba and the Forty Thieves. In more recent times, the world's first computer passwords were installed in MIT's Compatible Time-Sharing System to distinguish between users of their colossal, shared computing system in the mid-1960s. Passwords are a simple and easy way to recognize and affirm the appropriate participant of a system. But what happens when modern-day cybercriminals get involved?..."

Secuity Boulevard, September 23rd, 2021
(Get More Information . .) open to premium members only

Identity Management Beyond The Acronyms: Which Is Best For You?
With so many devices and users accessing networks, applications and data, identity access management (IAM) has become a cornerstone of cybersecurity best practices
Jennifer Gregory writes in SecurityIntelligence, "The short explanation is that you must make sure everyone (and everything) is who they claim they are. You also need to make sure they are allowed to have the access they're requesting.

Multiple options for identity access management exist today. You might encounter privileged access management (PAM), identity-as-a-service (IDaaS) or cloud permissions management (CPM). So, choosing an identity management approach can be confusing. Which acronym is right for you?..."

SecurityIntelligence, September 21st, 2021
(Get More Information . .) open to premium members only

Top 10 Ways To Prevent Cyber Attacks
Cyber attacks are growing in frequency and complexity, due to factors like a higher number of expert malicious actors, more distributed workforces and technologies to protect, and an increase in devices and users that can unknowingly act as attack gateways.
"Although there's no way to guarantee that an organization will stay safe from a cyber attack," notes Shelby Hiter in Datamation, "several physical and technical safeguards can be established to better protect network data.

Read on to learn about how your team can stay up-to-date with the latest tools and knowledge to arm themselves against the next major cybersecurity threat..."

Datamation, September 21st, 2021
(Get More Information . .) open to premium members only

IT News - EdTech
disable
Fixing The Back-To-School Slow-Network Blues
Try these four tips to improve bandwidth weighed down by additional devices in the classroom.
Ethan Banks writes in EdTech, "If your network seems to be underperforming now that everyone is back in the classroom, you might have a bandwidth problem - too many devices contending for too little network capacity. When troubleshooting a slow network, you need to look for a chokepoint. Here are some good places to start..."
EdTech, September 21st, 2021
(Get More Information . .) open to premium members only

13 DC EdTech Companies Shaping The Future Of Learning
Edtech is having a banner year in the DMV, but it's built on years of startup growth. We've rounded up the key players you need to know.
Michaela Althouse writes in Technical.ly, "The year of 2021 has been kind to many technology categories in the DMV, but one that's been in the headlines almost more than any other is the city's booming edtech industry.

With raises, acquisitions and product launches, education technology has had practically unparalleled growth as schools continue with virtual learning techniques, and seek new ways of bringing tech into the IRL classroom. At the same time, institutions are seeking new models to run front offices, and make education more accessible..."

Technical.ly, September 20th, 2021
(Get More Information . .) open to premium members only

Here's How This Edtech Has Opened Up A World Of Possibilities
One industry that has benefitted maximum from COVID-19 is edtech. The newly launched edtech startups as well as the existing ones both have shown promising growth.
"Some edtech startups are busily expanding their course offerings and video uploads to acquire more customers," writes Prabhjeet Bhatla in Entrepreneur. "At the same time, edtech Teachmint is helping teachers by providing technology solutions for online classes.

Bengaluru-based Teachmint, which began its life after the global pandemic broke last year, enables hundreds of thousands of teachers in the world's second-largest Internet market to run classes online and serve their students.

Let's have a look at Teachmint's short but promising journey..."

Entrepreneur, September 22nd, 2021
(Get More Information . .) open to premium members only

5 EdTech Research Trends & Needs For The Future
Equitable edtech, individualized learning, and innovation will be among the focuses of a new collaborative at the University of California, Irvine formed to research technology's potential in childhood learning.
"The Jacobs Foundation recently awarded a five-year, nearly $11 million grant to the University of California, Irvine to create a collaborative network of educators and researchers to help design digital technologies for children," reports Erik Ofgang in TechLearning.

"The Connecting the EdTech Research EcoSystem (CERES) brings together experts in computer science, psychology, neuroscience, and education, to better utilize education technology's potential..."

TechLearning, September 21st, 2021
(Get More Information . .) open to premium members only

IT News - Storage
disable
14 Things You Need To Know About Data Storage Management
When it comes to storing data, there is no 'one-size-fits-all' solution, so before you decide where or how to store your data, first understand the amount and type you have and why you need to store it.
"So how do you formulate a sound data-storage management strategy?" asks Jennifer Lonoff SchiffBy in Networkworld.

"IDG asked dozens of storage and data management experts, which resulted in these top 14 suggestions regarding what steps you need to take to choose the right data storage solution(s) for your organization-and how you can better ensure your data is properly protected and retrievable..."

Networkworld, September 22nd, 2021
(Get More Information . .) open to premium members only

7 NAS Encryption Best Practices To Protect Data
Data storage security is as important now as it's ever been. Encryption is one way to make NAS devices more secure against such threats as ransomware.
"Encryption is one of the most effective tools to protect data on network-attached storage," opines Robert Sheldon in SearchStorage. "Even if cybercriminals gain access to the drives or intercept communications to or from them, encryption makes the data unreadable to anyone who does not have the cryptographic key.

Use NAS encryption to prevent unauthorized individuals from gaining access to confidential data at rest or in motion. The data might include credit card numbers, intellectual property, medical records, personally identifiable information (PII) or other types of confidential data. Also, use encryption to comply with regulations such as GDPR or HIPAA..."

SearchStorage, September 21st, 2021
(Get More Information . .) open to premium members only

6 Best Free NAS Software For 2021 (Open Source Choices)
Network Attached Storage or NAS devices can be used to overcome space and storage issues and provides a centralized place for your data.
"Here users can access as well as share their data 24/7 through the network," offers Shahee in Securedyou.

"Many companies in the market offer software plus hardware boxes which are out-of-box solutions, like Synology and Qnap are two different veteran vendors. We are sharing the 6 of the best NAS software 2021 that can be used with any operating system and are 100% free..."

Securedyou, September 20th, 2021
(Get More Information . .) open to premium members only

What The Heck Is Storage Modernization?
We often hear the word 'modernization' thrown around these days.
"The push is to get the end user to refresh their infrastructure, and the storage infrastructure market is rife with modernization word. Is your storage ripe for 'modernization'?

To modernize, it has to be relative to legacy storage hardware, and the operating environment that came with it. But if the so-called 'legacy' still does the job, should you modernize? ..." - Storage Gaga

Storage Gaga, September 20th, 2021
(Get More Information . .) open to premium members only

Seagate's Gen-2 HAMR blow
Seagate has a second-generation 30TB HAMR disk drive in development, and sees Gen-1 HAMR as having limited appeal.
Chris Mellor writes in Blocks & Files, "Heat-Assisted Magnetic Recording (HAMR) is Seagate's chosen technology to increase disk drive areal density beyond the limits of current perpendicular magnetic recording (PMR) technology, and uses laser-produced local bit area heating to make a hardened magnetic material accept a write signal and then hold it in a stable fashion. Seagate is shipping a Gen-1 20TB HAMR drive in a limited way..."
Blocks & Files, September 21st, 2021
(Get More Information . .) open to premium members only

What To Know For Your Virtualized Storage Selection Process
Not all storage virtualization is created equal. Get familiar with the types, methods and implementation considerations before you buy hardware or software for your organization.
"To choose the right storage virtualization tool, be sure to look at both file- or block-based virtualized storage, storage virtualization methods and the main business and technology considerations during the evaluation process," suggests Jessica Lulka in SearchServerVirtualization.

"Data storage requires a lot of optimization and configuration knowledge. There's always more data, and infrastructure gets more complex as data intake increases. Luckily, storage virtualization can help maximize how much data you store and extend storage hardware lifecycles..."

SearchServerVirtualization, September 21st, 2021
(Get More Information . .) open to premium members only

IT News - AI
disable
Artificial Intelligence (AI) At The Edge: 3 Key Facts
As Artificial Intelligence becomes increasingly ubiquitous, it's developing a special relationship with edge computing. Consider these important factors as you develop your AI strategy
Brian McCarson writes in The Enterprisers Project , "Artificial Intelligence (AI) is moving from the realm of science fiction to widespread enterprise scalability. Even ten years ago, AI workloads were almost exclusively utilized by a small number of very profitable companies that had the resources to experiment and hire an extensive team of data scientists. Today, AI is used in a number of everyday tools, from language recognition to health care prediction and nearly every industry in between.

AI is also now deployed at the edge, not just inside massive data processing facilities. That trend will continue in the coming years. Here are three things that executives in any field should know to capitalize on the change..."

The Enterprisers Project , September 21st, 2021
(Get More Information . .) open to premium members only

5 Ways That AI Is Shaping Analytics In 2021
It's no shock to anyone who works with analytics and data that AI is changing everything.
Dina Ely writes in Business 2 Community, "From automating some of the data analysis processes of the past to new promising ventures with Big Data and machine learning, major things are coming to this element of business.

When it comes to AI shaping analytics, here are five things to watch for in 2021.

AI Transforms What We Do With Data

AI allows businesses and individuals to take part in data analysis in a brand new way. One of the top trends in AI for 2021 is that more people than ever are going to start looking into what role artificial intelligence might play in their professional lives..."

Business 2 Community, September 21st, 2021
(Get More Information . .) open to premium members only

Machine Learning At The Edge: A Hardware And Software Ecosystem
Being able to deploy machine learning applications at the edge bears the promise of unlocking a multi-billion dollar market
George Anadiotis writes in ZDNet, "For that to happen, hardware and software must work in tandem. Arm's partner ecosystem exemplifies this, with hardware and software vendors like Alif and Neuton working together...

Edge computing is booming. The idea of taking compute out of the data center, and bringing it as close as possible to where data is generated, is seeing lots of traction. Estimates for edge computing growth are in the 40% CAGR, $50 billion area.

Whether it's stand-alone IoT sensors, devices of all kinds, drones, or autonomous vehicles, there's one thing in common. Increasingly, data generated at the edge are used to feed applications powered by machine learning models..."

ZDNet, September 21st, 2021
(Get More Information . .) open to premium members only

5 Ways AI Can Be A Game-Changer For Banks
Banks that take steps to adopt an enterprise-wide AI strategy will get a lead way, gaining an edge over their competitors
"With many organizations embracing cloud and related technologies to digitally transform, Artificial intelligence (AI) has gained traction across all industries," notes Puneet Gupta in CXOtoday.com.

"The Banking Financial Services and Insurance (BFSI) is no exception. Even though AI adoption is at a nascent stage in banking and financial services, there are use cases to show that its potential to positively impact the industry is tremendous..."

CXOtoday.com, September 20th, 2021
(Get More Information . .) open to premium members only

IT News - Technology
disable
Watch: Russian Researchers Can Control Drone Swarms Like Jedi
A team of AI researchers in Russia have managed to come up with one of the coolest gesture-control systems for drones that we've seen yet. What's even more impressive is that it works with multiple machines simultaneously.
Tristan Greene writes in The Next Web, "Controlling swarms of drones in real-time is the dream. And, when you pre-program them with advanced software and run them in unobstructed areas it's pretty easy to accomplish.

But if you want to, say, control a swarm of drones inside an office building, in real time, things get a bit trickier.

Enter the Skolkovo Institute of Science and Technology's AI team:..."

The Next Web, September 23rd, 2021
(Get More Information . .) open to premium members only

IT News - Operations
disable
Driving Up Data Center Efficiency Through Constant Innovation
Increased data volumes are driving the construction of data center campuses and hyperscale data centers for providing large-scale as well as high-quality services
Sohini Bagchi writes in CXOtoday.com, "With the growing reliance on digital connectivity on account of COVID-19 and work-from-home phenomenon, the data center industry is expected to grow exponentially to reach 1,007 MW by 2023 from its existing capacity of 447 MW, according to a JLL report. The demand is likely to ramp up due to the imminent rollout of 5G, IoT-linked devices, data localization and use of AI/ML and cloud technologies. In such a scenario, enterprises are expected to play a key role in driving up data center efficiency by cultivating continuous innovation and best practices..."
CXOtoday.com, September 20th, 2021
(Get More Information . .) open to premium members only

IT News - HR
disable
How To Cultivate IT Talent Remotely
Identifying and growing IT talent in remote and hybrid workplaces is a big change for IT leaders, who must rely more on metrics, emotional intelligence, and new remote skills to elevate the best from their teams
"The pandemic proved that working remote works," writes Christina Wood in CIO. "People were productive - often more productive than they were in the office - and want to keep doing it. But if you were the kind of manager who led by owning a room and promoted people because you could see they were charismatic, dedicated, or natural leaders - qualities you watched them use - you might be feeling lost right now when it comes to knowing whom on your team you should tag for promotion..."
CIO, September 22nd, 2021
(Get More Information . .) open to premium members only

IT News - Cloud
disable
What Is Hybrid Cloud Storage?
A hybrid cloud storage solution can provide extra data security
Paul Maplesden writes in ITProPortal, "Hybrid cloud storage is a way of storing business data using both your local servers and cloud-based storage. It lets you combine your on-premises information with data you've uploaded to a public or private cloud, and gives you greater flexibility for your data retention and management needs.

We'll cover what hybrid cloud storage is, how it works, and the best cloud storage options for businesses..."

ITProPortal, September 23rd, 2021
(Get More Information . .) open to premium members only

Misconfigurations Are The Biggest Threat To Cloud Security, Period
There is no doubt that cloud adoption is accelerating at an exponential rate. Whether it's for business collaboration or to store critical data assets, organizations are increasingly relying on the cloud - in fact, recent reports have found that 62% of organizations utilize at least two cloud platforms.
"As a result of this acceleration, we have also seen a multitude of data breaches occurring due to misconfigurations in the cloud, which occur because of improper settings being used when architecting and deploying services within the cloud platform. This leads to an expanded attack surface for cybercriminals to access any data stored within the cloud environment and increases the risk of a cyber attack.

In fact, a survey conducted by Fugue also found that 73% of the organizations reported having 10+ incidents per day due to misconfigurations, 36% reported having 100+ incidents per day, and 10% suffered from 500+ incidents per day..."

Cyber Defense Magazne, September 21st, 2021
(Get More Information . .) open to premium members only

IT News - IoT
disable
Predictions For The Future Of IoT Sensor Technology
This article will explore predictions for the future of Internet of Things (IoT) sensor technology, as provided by IoT experts
"IoT has been evolving rapidly over the years," writes Aaron Hurst in InformationAge, "as more and more sectors find innovation gaps that can be plugged by the technology, and it's showing no signs of slowing down. From here, it's been estimated that the IoT sensor market will reach a value totalling $34.4 billion by 2024. Additionally, sensors have been getting smaller and more portable, allowing for more detailed datasets to be used.

With this in mind, this article will explore what the future of IoT sensor technology could have in store for organisations, according to experts in the space..."

InformationAge, September 21st, 2021
(Get More Information . .) open to premium members only

IT News - Compliance
disable
10 Data Compliance Best Practices To Establish Today
Poor data security compliance policies can make it easier for ransomware attackers to succeed in their efforts to lock up your data
Andy Stone writes in Business 2 Community, "As Sophos recently reported, some attackers are shifting to extortion-style attacks. Instead of simply encrypting files, they threaten to publish data unless a ransom is paid, thereby putting the victimized organization in a position where it will get slammed with regulatory fines-not to mention damage to its brand.

For this and many other reasons, compliance and information security are closely intertwined, placing even more importance on data privacy compliance as a core pillar of every security strategy..."

Business 2 Community, September 21st, 2021
(Get More Information . .) open to premium members only

IT News - Big Data
disable
Best Data Warehouse Tools & Solutions 2021
The concept of a data warehouse originated a couple decades back as an answer to the sprawl of storage arrays and NAS boxes. Organizations needed a way to corral their data in one centralized location.
"These days, data warehouses can exist on premises, heavily virtualized, in the cloud, or in some kind of hybrid arrangement," notes Drew Robb in ServerWatch,

"However it is done, a data warehouse is essentially a store of a large amount of data that has been gathered from a great many sources. In other words, it is a data management system that helps in the areas of storage centralization, business intelligence (BI), and analytics..."

ServerWatch, September 23rd, 2021
(Get More Information . .) open to premium members only

Sections in this issue:
click to jump to section