IT News and Events
Oct 14th, 2019 — Oct 20th, 2019 Generate the Custom HTML Email for this Issue
IT News and Events IT News and Events
Volume 259, Issue 3 << Previous Issue
IT News - CxO
disable
CIO Role: How To Lead Transformation
In this video interview, Quikrete CIO Jay Ferro candidly discusses what it takes for today's CIO to play a transformational role in their organization
"What does it take to deliver higher quality to more customers? How do you challenge yourself to stay one, two, three, and even four steps ahead of where you need to be?" asks Ginny Hamilton in The Enterprisers Project.

"In his CXOTalk interviews, industry analyst Michael Krigsman leads in-depth discussions with business and technology leaders, getting them to share inside stories of their successes and challenges. Recently, Krigsman interviewed longtime Enterpriser Jay Ferro about what it takes for a CIO to become a transformational leader..."

The Enterprisers Project, October 8th, 2019
(Get More Information . .) open to premium members only

Why Business IT Transformation Requires A New CIO Mindset
To accelerate and sustain transformation, CIOs need to change the way they approach technology, engineering and operations. And that means shifting the focus from projects to products
"The average age of an S&P 500 company has now shrunk to less than 20 years, down from 60 years in the 1950s - and this is largely down to widespread technological disruption."

Rohit Nand writes in CIO, "From FinTech to ManufacturingTech and even BeautyTech, established organizations today recognize that they need to be technology-first in order to keep up with digital-native companies, as well as drive agility in how they develop new products, capture new markets and acquire new customers..."

CIO, October 8th, 2019
(Get More Information . .) open to premium members only

Winning The Security Fight: Tips For Organizations And CISOs
For large organizations looking to build a robust cybersecurity strategy, failure to get the fundamentals in place practically guarantees a disaster
Zeljka Zorz writes in HelpNet Security, "If you ask Matthew Rosenquist, a former Cybersecurity Strategist for Intel (now independent), overcoming denial of risk, employing the right cybersecurity leader, and defining clear goals are the three most critical objectives for avoiding a negative outcome.

'Every organization, large and small, begins with a belief they are not at significant risk. This denial is dangerous and can persist even when attacks occur,' he told Help Net Security.

This denial must be addressed with facts and critical thinking and, once leadership accepts the need for cybersecurity and the responsibility for addressing related risks, they must find and employ a good cybersecurity leader..."

HelpNet Security, October 9th, 2019
(Get More Information . .) open to premium members only

IT News - Storage
disable
Guide To Tiered Storage
Tiered storage offers reduced data storage costs, higher efficiency and the ability to reuse older equipment
"Tiered storage is a storage method which involves storing data on a range of different storage media with different characteristics, such as performance, cost, and capacity.

The different storage media are organized into a hierarchy, where the highest performance storage media is deemed to be Tier 0 or Tier 1, followed by Tier 2, Tier 3, and so on.

Tier 0 or Tier 1 is usually made up of flash or 3D XPoint-based solid state drives, while successive tiered storage levels may involve high performance fibre channel or SAS drives (or RAID arrays containing them), lower performance SATA drives, optical disks, tape storage systems, and cloud-based nearline or offline storage systems..." - Oracle News

Oracle News, October 10th, 2019
(Get More Information . .) open to premium members only

Storage-As-A-Service Comes Of Age
A research study from Evaluator Group guides users through the maze of approaches and issues they will encounter when evaluating storage as a service (STaaS)
"It also offers a window into mixed and sometimes conflicting user perceptions; highlighting the potential motivations for deploying STaaS, while pointing out the reasons why users may have misgivings.

Study of Enterprise User Perceptions and Requirements

Potential enterprise end users of STaaS commonly equate it to public cloud storage. Cloud storage is available, offers unlimited capacity, and the ability to spin up/down resources using only what you pay for-all available as a pay-as-you go, managed resource. This has made it a ready alternative to traditional storage..." - Storage Newsletter

Storage Newsletter, October 11th, 2019
(Get More Information . .) open to premium members only

IT News - Technology
disable
Breaking Down The 10 Need-To-Know Emerging Technologies
To keep up with the rapid innovation and disruption happening across all industries and stay ahead of their competition, CIOs and technology leaders should assess and effectively leverage emerging technologies for their net-new values
"The world of emerging tech by nature is fast-moving and ever-changing, and consequently, it's difficult to get a handle on the state of the various markets, not to mention leveraging them in driving business innovation. Forrester's emerging tech spotlights have previously identified and characterized the various emerging technologies that are worth your time.

To help you figure out how to best consume them, Will McKeon-White and I did our best to help simplify this shifting landscape in our latest report, written as a downloadable PowerPoint file..." - ZDNet

ZDNet, October 10th, 2019
(Get More Information . .) open to premium members only

IT News - Bitcoin
disable
Experts Weigh In On The Future Of Bitcoin And Blockchain
Bitcoin is a revolutionary new technology that has taken the world by storm, and could not only disrupt modern financial systems
Tony Spilotro writes in NEWSBTC, "... but it could also go on to replace all fiat currencies and become the sole digital currency used across the globe.

With so much potential, even experts have joined in on speculating over the king of speculative assets, and have weighed in on their expectations for the first-ever crypto asset..."

NEWSBTC, October 8th, 2019
(Get More Information . .) open to premium members only

IT News - Blockchain
disable
Most Blockchain Applications Sunk In The 'Trough Of Disillusionment,' Gartner Says
In its 2019 Hype Cycle for Blockchain Technologies, Gartner found most blockchain technologies remain stuck in an "experimentation mode."
"The analyst firm said most applications are yet to live up to their hype, and that interest in them has waned as applications failed to deliver on their expected outcomes," writes Roberto Torres in CIODIVE.

"As technology advances and unique use cases for blockchain applications continue to roll out, by 2021 analysts expect the technology will begin to evolve past this phase. But the "digital business revolution" promised by blockchain will need even more time. By 2028, Gartner projects blockchain will become fully scalable technically and operationally..."

CIODIVE, October 9th, 2019
(Get More Information . .) open to premium members only

Gartner: Corporate Blockchain Won't Take Off For Another Decade
For years, all sorts of companies have flooded the media with reports of using blockchain technology for everything from tracking vegetables to fake luxury handbags
Avi Mizrahi writes in bitcoin.com, "These claims mostly involved tests that were done only for the sake of publicity, riding the coattails of cryptocurrency, and almost never about actual products. A new report from Gartner asserts that in reality the enterprise solutions behind these projects are still five to ten years away from making an actual impact...

For enterprise blockchain solutions to become mainstream, Gartner said users shouldn't have to worry about picking the right platform, the right smart contract language, the right system interfaces, and the right consensus algorithms. Additionally, the company explained that concerns about how users will interoperate with partners that use different blockchain platforms for their projects must be rectified..."

bitcoin.com, October 11th, 2019
(Get More Information . .) open to premium members only

IT News - PM
disable
Agile Project Management: 10 Mistakes To Avoid
Think agile is all hype, or that it isn't right for you? One of these common roadblocks could be standing between your organization and the promised benefits of agile project management
"Agile project management holds a lot of promise for leaders," writes Carla Rudder in The Enterprisers Project.

"Those who have successfully made the switch in their organizations sing agile's praises, like the ability to rapidly course-correct, release software faster, and create happier teams and customers. But if you've been working at it for a while and you still aren't seeing the promised benefits, you might start to think that agile is more hype than substance, or that it isn't right for your organization.

Consider this: It may not be agile that's to blame - it could be you..."

The Enterprisers Project, October 9th, 2019
(Get More Information . .) open to premium members only

IT News - CRM
disable
Now Is The Time For Sales Organizations To Embrace AI
Artificial intelligence is arguably the most disruptive technology to emerge over the last few decades
"Consumers are producing data at record levels. It's estimated we'll produce 463 exabytes per day by 2025. Yet humans aren't equipped to process that complex information," opines Kayleigh Halko in CRMBuyer.

"We're starting to rely more on AI to interpret massive amounts of consumer and third-party data in real time, and to make it relevant for our uses. As a result, businesses can create personalized and tailored interactions for their customers at every step of the buying journey, delivering unforgettable experiences..."

CRMBuyer, October 11th, 2019
(Get More Information . .) open to premium members only

IT News - Operations
disable
Top Tips For Moving Workloads To Hyper-Converged Technology
Take security and management seriously when migrating workloads to HCI. Closely evaluate supporting systems -- and the applications and hyper-converged system itself --- as well
Robert Sheldon writes in SearchConvergedInfrastructure, "Hyper-converged infrastructure can help address many of the challenges that come with implementing today's workloads on a traditional three-tier architecture. Hyper-converged platforms are easier to deploy, manage and scale than typical IT infrastructures, freeing up IT resources for other projects. However, organizations implementing HCI must take into account a number of factors when preparing to migrate workloads to that platform. Here, we look at five important considerations that IT should keep in mind before making the move to HCI..."
SearchConvergedInfrastructure, October 9th, 2019
(Get More Information . .) open to premium members only

IT News - Security
disable
DNS-over-HTTPS Causes More Problems Than It Solves, Experts Say
Several experts, companies, and national entities have voiced very convincing concerns about DoH and its features
"The DNS-over-HTTPS (DoH) protocol is not the privacy panacea that many have been advocating in recent months," warns Catalin Cimpanu in ZDNet.

"If we are to listen to networking and cybersecurity experts, the protocol is somewhat useless and causes more problems than it fixes, and criticism has been mounting against DoH and those promoting it as a viable privacy-preserving method..."

ZDNet, October 6th, 2019
(Get More Information . .) open to premium members only

How To Develop And Implement A Network Security Plan
When formulating a focused network security plan, you'll need to address specific questions about outbound traffic, user logins and government regulations
"With network security, we might think more is better. A common network security plan, for instance, might entail "all we can get", writes Kevin Tolly in SearchNetworking.

"For starters, though, going overboard on network security is economically impractical. Each layer of security adds Capex and Opex costs. Furthermore, most network security services involve scanning network traffic in real time. As a result, the added latency of each security layer can degrade UX..."

SearchNetworking, October 10th, 2019
(Get More Information . .) open to premium members only

How To Think Like A Hacker
In the arms race of computer security, it's never been more important to develop an adversarial mindset that can identify assumptions and determine if and how they can be violated
"Computer security is a very unique field," notes Dr. Giovanni Vigna in Dark Reading.

"Unlike other fields in which the challenge is to overcome the scale of a problem or the complexity of an algorithm, in computer security the challenge is the wit of another human being who is trying to carry out an attack in order to compromise and disrupt a computing infrastructure.

Because of its adversarial nature, computer security is in continuous evolution..."

Dark Reading, October 9th, 2019
(Get More Information . .) open to premium members only

IT News - Linux
disable
Did Linux Kill Commercial Unix?
Sales of commercial Unix have fallen off a cliff. There has to be something behind this dramatic decline
"Has Linux killed its ancestor by becoming a perfectly viable replacement, like an operating system version of Invasion of the Body Snatchers?" asks Dave McKay in How-To Geek.

The Beginning of Unix

"The initial release of Unix occurred fifty years ago in 1969, at Bell Labs, a research and development company owned by AT&T. Happy birthday, Unix. Actually, at that time it was still called Unics, standing for UNIplexed Information and Computing Service. Apparently, no one can recall when the 'cs' became an 'x.' It was written on a DEC PDP/7 computer, in DEC assembly language..."

How-To Geek, October 10th, 2019
(Get More Information . .) open to premium members only

7 Steps To Securing Your Linux Server
This primer will introduce you to basic Linux server security. While it focuses on Debian/Ubuntu, you can apply everything presented here to other Linux distributions
Patrick H. Mullins writes in opensouce.com:

  • Update your server
  • Create a new privileged user account
  • Upload your SSH key
  • Secure SSH
  • Enable a firewall
  • Install Fail2ban
  • Remove unused network-facing services

"This tutorial presents the bare minimum needed to harden a Linux server. Additional security layers can and should be enabled depending on how a server is used..."

opensouce.com, October 7th, 2019
(Get More Information . .) open to premium members only

IT News - Cloud
disable
5 Google Cloud Tools You Should Know
As one of the top cloud vendors, Google provides a wide range of tools and services for its customers. Review five newer Google Cloud offerings and understand the features each has to offer
Sara Grier writes in SearchCloudComputing, "As one of the top cloud providers, Google must keep up with the competitive nature of the cloud and release services to meet the needs of its customers. Similar to AWS and Azure, there are a range of Google Cloud tools for users to choose from to help ease some of the stress that comes with the public cloud.

Review five of Google's newer cloud services and tools and determine if they could be useful for your workloads..."

SearchCloudComputing, October 11th, 2019
(Get More Information . .) open to premium members only

1 Top Cloud Security Threats
More data and applications are moving to the cloud, which creates unique infosecurity challenges.
"Here are the "Egregious 11," the top security threats organizations face when using cloud services, " writes Bob Violino in CSO Online.

"Cloud computing continues to transform the way organizations use, store, and share data, applications, and workloads. It has also introduced a host of new security threats and challenges. With so much data going into the cloud - and into public cloud services in particular - these resources become natural targets for bad actors..."

CSO Online, October 11th, 2019
(Get More Information . .) open to premium members only

48% Of All Corporate Data Stored In Cloud
A study from Thales Group, with research from the Ponemon Institute, LLC, has exposed an increasing disparity between the rapid growth of data stored in the cloud and an organization's approach to cloud security
"Although nearly half (48%) of corporate data is stored in the cloud, only a third (32%) of organizations admit they employ a security-first approach to storage in the cloud.

Surveying over 3,000 IT and IT security practitioners in Australia, Brazil, France, Germany, India Japan, the UK and the United States, the research found that only one in three (31%) organizations believe that protecting data in the cloud is their own responsibility..." - Storage Newsletter

Storage Newsletter, October 11th, 2019
(Get More Information . .) open to premium members only

IT News - IoT
disable
7 Ways 5G Mobile Networks Will Change IoT Security, And How To Prepare
Every internet of things security issue will be greatly magnified in a 5G environment. Address these seven areas before you deploy your own
Maria Korolov writes in CSO Online, "Super-fast 5G mobile networks promise to link not only people more efficiently, but also allow for greater interconnectivity and control of machines, objects and devices. Its high Gbps data transfer rates, low latency and high capacity will be a boon to consumers and businesses alike. That comes with significant new security risks, as one early adopter is learning..."
CSO Online, October 7th, 2019
(Get More Information . .) open to premium members only

IT News - Careers
disable
The New Core Competencies IT Must Master
The technical skills that earned you a seat at the table won't earn you a voice at the table. A new set of skills is essential for high-level IT success
"A couple of weeks ago, I had a conversation with Claus Jensen, CTO of CVS Health, about the shifting challenges facing today's IT organizations. He calls the current state of affairs a triple whammy," writes Dan Roberts in CIO.

"We all know that the environment is changing - the rate of change accelerating. But also, the expectations of large enterprises are changing around social responsibility, consumer expectations, and more. And finally, what we expect of employees is changing: They now need to be more than just good soldiers. They need to be leaders, collaborators, visionaries..."

CIO, October 9th, 2019
(Get More Information . .) open to premium members only

IT News - Encryption
disable
Choosing Between an SSL/TLS VPN vs. IPsec VPN
Infosec pros need to know the ins and outs of SSL/TLS VPNs vs. IPsec VPNs to better understand which product's features will fulfill the needs of their organization. Get help comparing here
"If your organization struggles with managing its IPsec VPN, going clientless can sound compelling -- SSL/TLS-based VPNs can be much easier to deploy and manage," writes Lisa Phifer in SearchSecurity.

"The key is deciding when to use IPsec and when to use SSL/TLS. There isn't necessarily a right or wrong answer. In fact, in many enterprises, it isn't an SSL/TLS VPN vs. IPsec VPN; it's an SSL/TLS VPN and IPsec VPN..."

SearchSecurity, October 10th, 2019
(Get More Information . .) open to premium members only

Sections in this issue:
click to jump to section