IT News and Events
Oct 31st, 2022 — Nov 6th, 2022 Generate the Custom HTML Email for this Issue
IT News and Events IT News and Events
Volume 296, Issue 1 << Previous Issue | Next Issue >>
IBM News
disable
IBM Announces Demonstration Project With U.S. Patent And Trademark Office To Help Make Patent Research Insights More Accessible And Usable
iBM announces a demonstration project with the U.S. Patent and Trademark Office (USPTO) to test an artificial intelligence (AI) driven intellectual property (IP) analysis tool, the IBM IP Advisor with Watson Demonstration System
Leveraging conversational AI technology with IBM Watson Assistant, and content insight mining and guided navigation solutions with IBM Watson Discovery, the system is designed to help users more efficiently uncover and analyze relevant patent data, allowing more time for strategic, value-added tasks.

Information known publicly before the actual filing date of a U.S. patent application, such as currently held and similar U.S. patents and published patent applications, is called prior art. When an inventor has an idea for a new product, a prior art study can be helpful in understanding the landscape of the field of invention by assessing not only prior art, but also competitors and opportunities for innovation in the field.

However, with the continued rise in the number of patent applications being filed and the increasing volume of patent data, finding relevant, accurate information and analyzing prior art can be difficult and time consuming - especially for new inventors, 'Main Street' retailers and consumers not steeped in patent law. IBM aims to help address this challenge and promote greater participation in the innovation process with the IBM IP Advisor with Watson Demonstration System.

IBM News, October 31st, 2022
(Get More Information . .) open to premium members only

IBM Launches New Software To Break Down Data Silos And Streamline Planning And Analytics
Solution includes new Analytics Content Hub to bring together business intelligence solutions from multiple vendors
IBM announced new software designed to help enterprises break down data and analytics silos so they can make data-driven decisions quickly and navigate unpredictable disruptions. IBM Business Analytics Enterprise is a suite of business intelligence planning, budgeting, reporting, forecasting, and dashboard capabilities that provides users with a robust view of data sources across their entire business.

Along with IBM Planning Analytics with Watson and IBM Cognos Analytics with Watson, this suite also includes a new IBM Analytics Content Hub that helps streamline how users discover and access analytics and planning tools from multiple vendors in a single, personalized dashboard view.

IBM News, November 3rd, 2022
(Get More Information . .) open to premium members only

Red Hat News
disable
Edge-Compatible Recommendations Now Available In Red Hat Insights Advisor
The open hybrid cloud vision of Red Hat covers four footprints: physical, virtual, cloud and edge. Red Hat Enterprise Linux (RHEL) is at the forefront of the innovation that comes with edge computing by providing a more consistent, reliable and security-focused operating system to fuel the demand from enterprises to operate at the closest point of data generation.
Red Hat Insights is a valuable part of the RHEL subscription and experience across all footprints of the hybrid cloud, with edge being no exception. We have made Advisor recommendations compatible with RHEL deployed at the edge to help you extend your data center capabilities. You will have an analytics tool at your disposal which will help keep your servers healthier by proactively highlighting operational issues.
Red Hat News, October 31st, 2022
(Get More Information . .) open to premium members only

Friday Five - November 4, 2022
The Friday Five is a weekly Red Hat blog post with 5 of the week's top news items and ideas from or about Red Hat and the technology industry. Consider it your weekly digest of things that caught our eye.
  • Red Hat Security Bulletin - OpenSSL Project
  • Technically Speaking (E16): Composable infrastructure & the CPUs new groove
  • Introducing the New Red Hat Device Edge
  • Service Preview of Red Hat Advanced Cluster Security Cloud Service
  • The (open) source of cutting-edge innovation

Read on for details

Red Hat News, November 4th, 2022
(Get More Information . .) open to premium members only

Explore Red Hat Openshift Training Tailored To Your Professional Journey
When determining the next steps of your professional development journey, you want to make sure you are on the right path to meet your goals. Red Hat Training and Certification offers guided learning pathways for individuals of all experience levels, covering topics such as deploying containers, developing containerized applications, managing container storage and using automated DevOps pipelines.
With so many options available, Red Hat is committed to making the process easy to navigate so you can understand what courses are aligned with your professional journey.

Whether you are looking to upskill an entire department or simply want to develop yourself professionally, several organized skills paths have been created based around specific job roles and responsibilities, so it's simple to tailor training to the work that you are interested in.

Each path features real-world examples and advanced courses to further your understanding of cloud-native applications from different perspectives, including both OpenShift Administrators and OpenShift Developers.

Red Hat News, November 2nd, 2022
(Get More Information . .) open to premium members only

Sharing Red Hat Insights With Your Technical Account Manager For Better Collaboration
I have been working as a Technical Account Manager (TAM) with Red Hat for around a year now. I love interacting with my customers, working with them on shared goals and providing proactive tips on how to get the most out of the Red Hat products they are using.
One of the Red Hat tools that I love to share with customers is Red Hat Insights. Red Hat Insights itself is a great tool, and is included in many Red Hat subscriptions (including Red Hat Ansible Automation Platform, Red Hat Enterprise Linux and Red Hat OpenShift). It can really help you understand risks within your environment and any areas you should be focusing on.

Insights analyzes your systems to determine if you are experiencing an issue and can also proactively predict-based on the configuration of your systems-if you are likely going to experience similar issues as other organizations in a similar context. Your TAM can really help you understand and address those findings.

Red Hat News, November 1st, 2022
(Get More Information . .) open to premium members only

IT News - CxO
disable
The Rise Of The Revenue-Generating CIO
IT leaders are increasingly looked to as C-suite entrepreneurs capable of contributing solutions aimed at top-line growth. Here's how revenue-centric CIOs are getting it done.
It's Business 101: A company exists to make money. So as a CIO, Ajay Sabhlok believes his mandate is 'to figure out how to generate revenue for the company.'

Sabhlok, CIO and chief data officer of security technology vendor Rubrik, says he does that by searching for unmet needs, bottlenecks, and problem areas and then considering how technology can turn those around.

Case in point was the company's lead-to-cash process. Data showed that the company wasn't closing expected orders, which was showing up as lost revenue in quarterly reports, Sabhlok says. So, he and his team identified and articulated the need for a more advanced opportunity management process - one that has an engine for more accurate scoring of business leads, automates manual tasks that were holding up orders, and delivers data-driven insights through user-friendly dashboards.

CIO, October 25th, 2022
(Get More Information . .) open to premium members only

Digital Transformation: 3 Contrarian Tips
These common pitfalls can thwart even the best digital transformation initiatives. Consider this expert advice to avoid problems later
According to data from PwC, 60% of senior executives say digital transformation is their most critical growth driver in 2022. Companies are making investments to back up this claim. IDC has forecast that "Global spending on the digital transformation (DX) of business practices, products, and organizations is forecast to reach $2.8 trillion in 2025, more than double the amount allocated in 2020."

Some of this focus is deserved; many organizations that have embarked on their DX journey have cited real benefits, like increased efficiency, happier customers, and faster time-to-market with new products.

The Enterprisers Project, October 25th, 2022
(Get More Information . .) open to premium members only

Reimagining The Role Of The CISO
Embedding security throughout your company has greater organizational impact and myriad benefits.
As cybersecurity has become an increasingly important consideration in corporate decision-making, there's been a corresponding move to elevate the role of the chief information security officer (CISO) to a higher point in the executive hierarchy. The reasoning seems to be, "If cyber is important, CISOs must be important." However, elevating the role sets the CISO up to be a lone voice in the desert crying "security," with little connection to the day-to-day decision-makers in IT, engineering, or products.
DARKReading, October 28th, 2022
(Get More Information . .) open to premium members only

CIOs Face IT Spending Squeeze, Security Woes, Higher Expectations In 2023
CIOs are headed into a perfect storm in 2023 as top execs want to see accelerated time to value from tech investments. That's according to survey results presented at the recent Gartner IT Symposium.
CIOs are headed into a challenging year in 2023 as top executives expect a faster time to value on projects while IT spending is squeezed by inflation. At the same time, CIOs remained very focused on cybersecurity as the threat landscape continues to worsen.

Those were among some of the highlights of the Gartner IT Symposium/Xpo in Orlando this month.

InformationWeek, October 25th, 2022
(Get More Information . .) open to premium members only

When CISOs Are Doomed To Fail, And How To Improve Your Chances Of Success
Immense pressure to reduce cybersecurity risk, limited resources, or unsupportive executive leadership can make CISOs a target for blame. Here's how some of them cope.
There's a joke cryptographer Jon Callas likes to tell: CISO stands for Chief Intrusion Scapegoat Officer, "because CISOs are often thrown into a position where they can't succeed." Callas, who is the director of public interest tech at the Electronic Frontier Foundation, says that security officers are often "simultaneously in charge and powerless." They know what they should do to mitigate risks, but they can't get enough support.
CSO Online, October 25th, 2022
(Get More Information . .) open to premium members only

How To Be A Successful Digital Transformation Leader
CIOs must rethink their role as digital leaders, due to workplace disruptions and ongoing changes to business, operating and IT delivery models.
When CIOs deal with uncertainty and change, they are more effective business leaders. Digital transformation requires technology leaders to reinvent their approach, rather than simply respond or react to business requirements.

As CIOs face ever-expanding responsibilities in their roles, they must remain effective in dealing with uncertainty and change. Digital not only disrupts business, it also transforms leadership. Gartner research shows that successful digital business initiatives demand paradigm shifts in technology leadership and new ways of thinking and approaching challenges.

CXOtoday.com, October 29th, 2022
(Get More Information . .) open to premium members only

IT News - MFA
disable
Cyberattacks Are Bypassing Multi-Factor Authentication
Cyber attackers are learning how to bypass MFA and data centers need to start looking at more advanced security measures. Until then, compensating controls need to be put in place to protect against breaches.
There has been a recent surge in cyber attacks which dodge past multi-factor authentication (MFA) security measures, putting data center systems at risk. The challenge for data centers lies in the need to align with an overall enterprise security strategy that may hold onto legacy MFA protocols and the need to progress past traditional MFA to meet the unique security needs of data centers.

In August, attackers tricked a Cisco employee into accepting an MFA request, and were able to access critical internal systems.

DataCenter Knowledge, October 28th, 2022
(Get More Information . .) open to premium members only

Microsoft Authenticator Gains Feature To Thwart Spam Attacks On MFA
And the iOS Authenticator app now uses App Transport Security.
Microsoft has rolled out 'number matching' in push notifications for its multi-factor authentication (MFA) app Microsoft Authenticator.

The new advanced feature is generally available in Microsoft Authenticator and should help counter attacks on MFA that rely on push notification spam.

ZDNET, October 28th, 2022
(Get More Information . .) open to premium members only

IT News - Storage
disable
7 NAS Encryption Best Practices To Protect Data
Data storage security is as important now as it's ever been. Encryption is one way to make NAS devices more secure against such threats as ransomware.
Encryption is one of the most effective tools to protect data on network-attached storage. Even if cybercriminals gain access to the drives or intercept communications to or from them, encryption makes the data unreadable to anyone who does not have the cryptographic key.

Use NAS encryption to prevent unauthorized access to confidential data at rest or in motion. The data might include credit card numbers, intellectual property, medical records, personally identifiable information (PII) or other types of confidential data. Also, use encryption to comply with regulations such as GDPR or HIPAA.

SearchStorage, October 25th, 2022
(Get More Information . .) open to premium members only

USB-IF Published USB4 V2.0 Spec to Enable 80Gb/s Performance
Utilizing physical layer architecture based on PAM3 signal encoding, over existing 40Gb/s USB Type-C passive cables and newly defined 80Gb/s USB Type-C active cables
USB Implementers Forum (USB-IF) announced the publication of the USB4 Version 2.0 specification, a update to enable USB 80Gb/s performance over the USB Type-C cable and connector.

The updated USB4 spec doubles the maximum aggregate bandwidth of USB to the benefit of higher-performance displays, storage, and USB-based hubs and docks. The USB Type-C and USB Power Delivery (USB PD) specs have also been updated to support this higher level of data performance.

StorageNewsletter.com, October 25th, 2022
(Get More Information . .) open to premium members only

After WD, Toshiba MG10 Series 20TB 3.5-Inch SATA/SAS HDD With CMR
10-disk helium-sealed design that leverages Flux Control MAMR technology, 7,200rpm, 550TB/year workload rating
Toshiba Electronics Europe GmbH announces the MG10 Series of capacity 20TB '1' HDDs with CMR .

It has a 10-disk helium-sealed design that leverages the company's Flux Control Microwave Assisted Magnetic Recording (FC-MAMR) technology to boost storage capabilities.

With 11.1% more capacity than the firm's prior 18TB model, 20TB MG10 Series HDDs are compatible with a range of applications and OSs, and are adapted to mixed random and sequential RW workloads in both cloud-scale and traditional data-centre use cases.

StorageNewsletter.com, October 25th, 2022
(Get More Information . .) open to premium members only

IT News - AI
disable
The Future Of AI Regulations And How Companies Can Prepare
The development of machine learning and artificial intelligence has gone into overdrive in recent years.
Now governments around the world at both federal and local levels are attempting to get out ahead of what may come from the exponential growth of AI's potential to fundamentally change the digital world.

During the IAPP Privacy. Security. Risk 2022 conference, Uber Privacy and Security Public Policy Lead Shani Rosenstock facilitated a panel discussion about the number of the existing and potential regulations affecting AI around the world and how organizations can prepare for future legislation that will govern their machine learning systems.

iapp, October 25th, 2022
(Get More Information . .) open to premium members only

AI Ethics: 4 Things CIOs Need To Know
AI adoption is taking off, but ethical concerns persist. Consider these tips to help reduce or eliminate bias in your data sets
Problems with artificial intelligence (AI) and ethics have been well publicized over the past few years. As AI becomes more pervasive, CIOs must be cognizant of ethical issues and look for ways to eliminate or reduce bias.

The source of the problem is the data sets algorithms consume to inform decision-making. Too often, these data sets lead to outcomes biased around gender and race - from mortgage applications to healthcare and criminal sentencing. Therefore, more focus must be put on ensuring that the data sets utilized are fair, accurate, and free of bias.

The Enterprisers Project, October 25th, 2022
(Get More Information . .) open to premium members only

IT News - ERP
disable
5 Top ERP Trends For 2022 - And Their Implications For IT Leaders
Staying on top the latest shifts in enterprise resource planning (ERP) strategies and implementations will help IT leaders deliver maximum value from these business-critical systems.
It wouldn't be far-fetched to call ERP (enterprise resource planning) the brain of an organization's IT infrastructure. After all, an ERP system streamlines, standardizes, and integrates a wide range of vital business processes across diverse business functions.

Implementing an ERP solution ranks among the most capex-intensive projects any IT leader will undertake. In addition to substantial investments, the solution has the potential to impact all strategic business units of a company. It is, therefore, imperative for a CIO to follow best practices for deploying an ERP solution and then keep a close watch on the trends shaping it going forward.

Here's a look at how the ERP category is evolving as an enterprise-wide solution and how these trends will impact IT leaders.

CIO, October 27th, 2022
(Get More Information . .) open to premium members only

The 7 Best ERP Software Solutions For The Service Industry
The editors at Solutions Review have compiled the following list to spotlight some of the best ERP systems for companies in the service industry to consider.
No matter the industry, the market, or the size, every business can benefit from an ERP solution. However, considering how many different sectors exist within the service industry marketplace, finding an ERP system tailored to a company's unique needs can be challenging. ERP solutions for the service industry can take multiple forms and offer capabilities that cater to the consumer, business, public, administrative, professional, retail, and other industry-specific verticals.

With that in mind, the team at Solutions Review compiled the following list to spotlight some of the best ERP solution providers for companies in the service industry to consider. Our editors selected these software solutions based on each provider's Authority Score, a meta-analysis of user sentiment through the web's most trusted business software review sites, and our proprietary five-point inclusion criteria. The list is organized alphabetically.

Solutions Review, October 27th, 2022
(Get More Information . .) open to premium members only

IT News - BI
disable
The 16 Best Enterprise Reporting Solutions And Software For 2022
Solutions Review's listing of the best enterprise reporting solutions is an annual sneak peek of the top tools included in our Buyer's Guide for Business Intelligence Platforms and companion Buyer's Matrix Report.
The editors at Solutions Review have developed this resource to assist buyers in search of the best enterprise reporting solutions to fit the needs of their organization. Choosing the right vendor and solution can be a complicated process - one that requires in-depth research and often comes down to more than just the solution and its technical capabilities. To make your search a little easier, we've profiled the best enterprise reporting solutions all in one place. We've also included platform and product line names and introductory software tutorials straight from the source so you can see each solution in action.
Solutions Review, October 25th, 2022
(Get More Information . .) open to premium members only

IT News - HR
disable
10 HR Horror Stories For A Spine-Chilling Halloween
From deepfake job applicants to a false kidnapping claim, 2022 had no shortage of nightmares for HR pros.
To mark Halloween, we're revisiting those stories and others, taking you on a horrifying journey of this year's most spine-chilling HR headlines.

Read on for words of caution and some scary lessons learned.

HRDIVE, October 25th, 2022
(Get More Information . .) open to premium members only

HR Departments Play A Key Role In Cybersecurity
A more secure organization starts with stronger alignment between HR and the IT operation.
A common shortcoming of human resources (HR) departments is that - despite being an operation designed to put humans at the center of how an organization is run - they often fail to adequately align with their IT counterparts and the core technology systems that define how a business is run and protected from cyber-risk.

Insufficient coordination between HR and IT processes and procedures remains common and gives rise to security gaps that can represent some of the most dangerous vulnerabilities on a company's attack surface. Let's examine the scope of the challenge and some key cyber-asset management priorities that can close the schism for a more robust cybersecurity posture.

DARKReading, October 25th, 2022
(Get More Information . .) open to premium members only

Skills-Based Hiring An HR Strategy For IT Talent Woes
The global IT labor shortage will persist through 2023, and to compete, employers should consider skills-based hiring and compensation, according to Gartner.
One of the themes at Gartner's annual HR conference is the problem of employee turnover. It is particularly acute in IT because of high demand for workers with technical skills. But a potential approach to improving retention and hiring prospects is skills-based compensation, according to the research firm.

The IT skills shortage is a global problem driven by the COVID-19 pandemic, which encouraged companies to digitize and automate processes. Now, reports of layoffs and hiring freezes might have some employers waiting to hire in the hopes that the IT labor market will cool down, but waiting is a mistake, Gartner analyst Lily Mok said during the research firm's ReimagineHR conference.

SearchHRSoftware, October 26th, 2022
(Get More Information . .) open to premium members only

IT News - Operations
disable
IT Service Management Best Practices: Automating ITSM
Improve service delivery, customer satisfaction and employee morale by automating repetitive tasks and supercharging your IT Service Management with iPaaS.
Automation is a hot topic -- especially within IT organizations. Yet despite its popularity, nearly 41% of businesses say they are struggling with excessive manual processing and lack of IT Service Management (ITSM) automation, according to a recent market study.

In that same study, businesses list both a lack of IT automation and a heavy reliance on IT to administer ITSM as the biggest challenges facing IT organizations right now. And in today's age of digital transformation -- where automation and workflow management are the foundation of ITSM success -- this makes sense.

InformationWeek, October 26th, 2022
(Get More Information . .) open to premium members only

IT News - Security
disable
A New OpenSSL Vulnerability Is Coming - Get Ready To Patch
On Tuesday 1st of November, between 1-5pm UTC a new version of the widely adopted OpenSSL 3.x series will be released for general consumption.
The OpenSSL project announced this in their mailing list and through twitter, also revealing the existence of a new CRITICAL security vulnerability this patch fixes.

In a twist to the usual formula the project is giving the world a week's advance notice of the impending patching, and we all should indeed take note of it and be prepared. OpenSSL is widely considered to be a part of the critical infrastructure of the internet - among other things generating the certificates that allow websites to run over HTTPS.

SearchSecurity, October 26th, 2022
(Get More Information . .) open to premium members only

Cybersecurity Reporting Tools That Will Make Your Life Easier
The cybersecurity industry has proliferated in the past few years, and as it has grown, so has its value.
According to research conducted by Statista, the cybersecurity market is currently worth $159.8 billion and is expected to grow to $345.4 billion by 2026. As the number of cyber and IT businesses, tools, and employees has grown, the volume of cyber attacks on businesses of all shapes and sizes has skyrocketed.

Businesses across the globe feel the effect of cyberattacks and crimes. According to research conducted by Cybersecurity Ventures, the cost of cybercrime reached $6 trillion in 2021, and the damages are estimated to grow to $10 trillion by 2025.

Security Boulevard, October 27th, 2022
(Get More Information . .) open to premium members only

How To Secure A Network: 9 Steps To Setup A Secure Network
Network security protects a company's network, infrastructure, and data to prevent cyberattacks and data breaches.
The best way to protect a company's network is to use a variety of cybersecurity strategies and tools that focus on network security. See below to learn all about the steps a company can take to better secure their network:
Datamation, October 25th, 2022
(Get More Information . .) open to premium members only

Cybersecurity Risks & Stats This Spooky Season
From ransomware to remote workers to cyber-extortion gangs to Fred in shipping who clicks on the wrong link, cybersecurity concerns can keep you awake this season and all seasons.
Autumn is here and with it, pumpkins, Halloween, and scary movies. And despite the horrors that accompany the season, for many people, nothing is more terrifying than . cybersecurity risks.

In fact, among US executives, literally nothing is more frightening than cyberattacks. According to a survey by PwC this year, 40% of executives considered cyberattacks to be their top business risk. With some research suggesting the average breach could cost nearly $10 million, it's no wonder cybersecurity concerns are so scary.

In honor of Cybersecurity Awareness Month, we've decided to break down some of the chilling threats facing business leaders, as well as spotlight stats from a recent iboss and Forrester research survey of cybersecurity pros.

DARKReading, October 25th, 2022
(Get More Information . .) open to premium members only

8 Hallmarks Of A Proactive Security Strategy
More CISOs are balancing their response and recovery capabilities with proactive measures that anticipate attacks and vulnerabilities.
CISOs have long been tasked with building response and recovery capabilities, the objective being to have teams that can react to a security incident as quickly as possible and can restore business functions with as little damage as possible.

The need for those activities is certainly not going to go away, but many security chiefs are seeking to take more proactive steps to balance out reactive ones.

'On the proactive side, you're trying to predict what kind of attack can occur in your environment and find your vulnerabilities before others do, so you reduce risk before it materializes,' says Pierre-Martin Tardif, cybersecurity professor at Universite de Sherbrooke and member of the Emerging Trends Working Group with the professional IT governance association ISACA.

CSO Online, October 25th, 2022
(Get More Information . .) open to premium members only

IT News - Server
disable
Blueprints To Shake Up Next-Generation Server Designs Emerge At OCP Summit
A new generation of designs ready to shake up conventional server architecture emerged at the recent Open Compute Project Summit, where Google, Facebook and Microsoft showed off new blueprints for high-performance computers.
The hardware demonstrated at the trade show, which was held in Santa Clara, California, showed that cloud providers were continuing to deprioritize CPUs, while putting more focus on networking, storage and accelerators like GPUs and AI chips. The OCP designs can be replicated and improved upon by server makers.

The headliner was Meta's server designed called Grand Teton, which the company is deploying for datacenters to run artificial intelligence applications. Meta's goal is to bring to its mega datacenters more AI capacity, which underpins many functions on its social media platforms, but also prepare for its metaverse future, said Alexis Bjorlin, vice president of engineering at Meta, in a blog entry.

HPCWire, October 25th, 2022
(Get More Information . .) open to premium members only

IT News - Linux
disable
How To Set Up SSH Key Authentication In Linux For More Secure Logins
Here's how easy it is to add a layer of security to your secure shell logins on Linux.
Secure Shell (SSH) is the de facto standard for gaining access to remote Linux machines. SSH took the place of telnet long ago, to add a much-needed layer of security for remote logins.

That doesn't mean, however, that the default SSH configuration is the best option for those who are a bit more concerned about the security of their systems. Out of the box, SSH works with traditional user and password logins. And even though those logins are far more secure than they were with telnet, you're still typing and sending a password across the internet.

ZDNET, October 25th, 2022
(Get More Information . .) open to premium members only

IT News - FOSS
disable
5 Advantages And 6 Disadvantages Of Open Source Software
Open source software is popular with both small and large organizations, and for good reason. But CIOs should understand which situations works best for this lower cost option.
With all the benefits of open source software, the idea of paying for expensive vendor offerings seems counterintuitive.

Open source software has a number of advantages. But the software isn't without its downsides. IT leaders must carefully examine both the advantages and disadvantages of open source software to understand where it fits in their technology ecosystem.

SearchCIO, October 25th, 2022
(Get More Information . .) open to premium members only

IT News - Cloud
disable
Big 3 Public Cloud Providers Highlight Cost Control Capabilities
Amazon, Microsoft, and Google all reported quarterly cloud earnings, emphasizing the ability of the cloud to reduce operating costs.
How are organizations fighting inflation? The Big Three public cloud providers are hoping the answer is the use of cloud services.

The three largest public cloud providers - Amazon Web Services (AWS), Microsoft Azure, and Google Cloud - reported earnings this week, all showing varying degrees of growth. Google and Microsoft both reported earnings on Oct. 25, while Amazon reported a couple days later on Oct. 27. Microsoft reported combined cloud revenue of $25.7 billion, up 24% over last year. Google's parent company Alphabet reported $6.9 billion in cloud revenue for a 38% year-over-year gain. During Amazon's third-quarter fiscal 2022, AWS revenues grew to $20.5 billion, up 28% year over year.

ITProToday, October 28th, 2022
(Get More Information . .) open to premium members only

IT News - DR
disable
Key Elements Of DR Strategy For BC
Not having access to critical data for even a few hours can cause irreparable damage in the form of lost business, fines and reputational damage - according to Gartner, the average cost of IT downtime is $5,600 per minute.
Whether it's ransomware, riots or the malicious behaviour of a disgruntled employee, for organisations to recover effectively from a disaster they first need to be sure all their critical data is backed up. However, given the complex nature of today's multi and hybrid cloud IT environments, there's every chance they won't know they have everything valuable protected until it's too late. Keeping track of data on multiple different platforms and having visibility of it all is already a major headache for IT departments, never mind ensuring business-critical data is backed up. Therefore it's important to deploy a backup and recovery solution with the widest coverage and the ability to identify gaps in protection.
Security Boulevard, October 25th, 2022
(Get More Information . .) open to premium members only

IT News - Networks
disable
Our VPN Testing Results Are In And You'll Absolutely Guess Who's Number One!
ExpressVPN continues to impress as our best overall VPN
It's that time again! We've cracked away at hours upon hours of testing security, monitoring speeds, review privacy policies, streaming movies and TV, installing apps ... it's exhausting! But the time has come, and we can finally divulge our list of 2022's best VPN.

We did again find ourselves very much in a "no news is good news" situation, as ExpressVPN still holds strong as our number one pick overall. Not lagging too far behind - and even catching up a bit along the way - are fan-favorites NordVPN and Surfshark. Rounding out the top five, as you may expect, are Private Internet Access and ProtonVPN.

techradar.pro, October 25th, 2022
(Get More Information . .) open to premium members only

6 Top Next-Generation Firewall Software To Protect Your Network
Firewall technology has been used by organizations and individuals looking to secure their networks and applications for decades now. Evolving over the years, Next-Generation Firewall (NGFW) is the third generation of firewall software technology, taking network and endpoint security capabilities to the next level.
NGFWs stand out from their traditional counterparts by seamlessly combining the capabilities of first-generation firewalls with a variety of modern network security solutions such as device filtering, in-depth packet inspection, and intrusion prevention capabilities.

With more cybersecurity companies releasing their own NGFW offerings, choosing the right solution for your network can be overwhelming.

Continue reading to learn more about some of the leading NGFW software providers in the global market and what they offer:

Datamation, October 25th, 2022
(Get More Information . .) open to premium members only

What Is A Next-Generation Firewall?
Setting up security tools at the outer parameter of your network is an essential part of an effective network security strategy.
There are countless tools that fall into the categories of Endpoint Detection and Response (EDR) and Network Detection and Response (NDR) with varying areas of expertise and levels of importance. However, firewalls stand out as one of the most indispensable network security solutions.

With security technology constantly evolving to combat the myriad of highly-sophisticated cyber threats, so did firewalls. Now that traditional firewall software is no longer effective on its own, businesses and companies are advised to employ a Next-Generation Firewall (NGFW) solution.

So, what is an NGFW, what makes it different from the previous generation of firewalls, and how can it help you keep your network and user devices safe from cyber threats and attacks?

Datamation, October 25th, 2022
(Get More Information . .) open to premium members only

Sections in this issue:
click to jump to section