InterSystems Global Summit Hollywood FL June 4-7
Most popular articles of current edition:
  1. That Old Box Of Tech Junk You Should Probably Throw Out Saves A Warehouse
  2. How To Manage Security For Operational Technology (OT), With Palo Alto Networks
  3. 5 C-Suite Bridges Every IT Leader Must Build
  4. What To Consider When Building An Autonomous SOC
  5. 3 CIOs On Generative AI's Rapid Spread
  6. Bridgestone CISO: Lessons From Ransomware Attack Include Acting, Not Thinking
  7. Gartner Forecasts Worldwide Government IT Spending To Grow 8% In 2023
  8. Designing A Scalable Edge Infrastructure With Scale Computing
  9. 10 Awesome Things You Can Do With ChatGPT
  10. @HPCpodcast: A Breakdown of the 'Treasure Trove' TOP500 List
  11. 3 Powerful Lessons Of Using Data Governance Frameworks
  12. What Does The End Of Moore's Law Mean For The Data Center Industry?
  13. Is CXL The Answer To Data Center Performance Issues?
  14. How To Stay Ahead Of The Curve: The Top 10 Skills Project Managers Need In 2023
  15. How To Say No As A CIO
  16. Why IT Operations Teams Should Embrace Context-Aware Security
  17. IT As A Catalyst For Business Transformation: Strategies For CIOs
  18. EY: Telcos Need To Show More Digital Ambition In 5G Enterprise Space
  19. QLC SSDs Are Ready for Mainstream with Solidigm
  20. #StopRansomware Guide Released by National Security Agency
  21. CIO Advisory: The Game-Changing Impact Of Embedded Finance
  22. 5 Questions To Ask When Evaluating A New Cybersecurity Technology
  23. MFA Fatigue Attacks: What Are They And How Can Your Business Combat Them?
  24. W. Curtis Preston Urges Proactive Measures To Combat Escalating Ransomware Menace (15:22)
  25. 4 Trends Shaping The Future Of Practical Generative AI
  26. 14 Best Linux Distributions For Privacy And Security In 2023
  27. Achieving High Availability Cost Efficiently
  28. Project vs. Operations Management: A Guide for Growing SMBs
  29. 6 Best Virtual Machine Programs For Windows, macOS, And Linux
  30. The DR Essential IT Leaders Can't Overlook

Most Popular Articles in Vol 302 Issue 4, Grouped into Sections


CxO


5 C-Suite Bridges Every IT Leader Must Build #3

Collaborating successfully with executive colleagues requires building individual relationships centered around understanding the nuances of each leader's technical and business needs.

3 CIOs On Generative AI's Rapid Spread #5

Chief technologists at the MIT Sloan CIO Symposium expressed a mixture of caution and enthusiasm about new and emerging AI applications.

Bridgestone CISO: Lessons From Ransomware Attack Include Acting, Not Thinking #6

A February 2022 attack knocked the giant tire maker's North American operations offline for several days.

Gartner Forecasts Worldwide Government IT Spending To Grow 8% In 2023 #7

Worldwide government IT spending is forecast to total $589.8 billion in 2023, an increase of 7.6% from 2022, according to Gartner, Inc.

3 Powerful Lessons Of Using Data Governance Frameworks #11

Organizations all over the world-and in different sectors-are discovering three specific actions with data governance frameworks that lead to success.

How To Say No As A CIO #15

Choice Hotels International CIO Brian Kirkland is at the head of a forward-looking sustainability effort fueled by a cloud-native imperative to deliver digital innovations to both franchisees and guests.

IT As A Catalyst For Business Transformation: Strategies For CIOs #17

Digital transformations have the potential to drive significant business value across the entire enterprise, and today's CIOs can embrace the pivotal opportunity to help their organizations meet new expectations.

CIO Advisory: The Game-Changing Impact Of Embedded Finance #21

ResearchAndMarkets forecasts that the embedded finance industry in the region is expected to grow by 39.7% on an annual basis to reach US$120,534.9 million in 2023.

CIOs Seek Efficiencies As Uncertain Economy Looms

With increased scrutiny on spend, IT leaders are rethinking budget outlays, turning their attention to cloud usage, automation, lean operations, and the workforce.

United Airlines CISO Deneen DeFiore On Elevating Cyber's Value To The Business

The airlines' cyber chief believes storytelling, facilitation, and a marketing mindset are vital for moving IT and cybersecurity up the organizational value chain to the benefit of the business overall.

Security


What To Consider When Building An Autonomous SOC #4

Solutions Review's Expert Insights Series is a collection of contributed articles written by industry experts in enterprise software categories. Gunter Ollmann of Devo offers a crash course on autonomous SOC, laying down the foundation on what to consider when building yours.

Why IT Operations Teams Should Embrace Context-Aware Security #16

Context-aware security can be a win-win. Here's why using it is beneficial to both your organization's end users and IT team.

#StopRansomware Guide Released by National Security Agency #20

The US National Security Agency (NSA) has published an updated guide to assist organizations with protecting against ransomware attacks.

5 Questions To Ask When Evaluating A New Cybersecurity Technology #22

Any new cybersecurity technology should be not just a neutral addition to a security stack but a benefit to the other technologies or people managing them.

MFA Fatigue Attacks: What Are They And How Can Your Business Combat Them? #23

As modern technology advances, more bad-faith actors are finding new ways to get around the latest security features. One of the new attacks is a multi-factor authentication (MFA) fatigue attack, a strategy which is used to gain access to an account through the new MFA technologies that are widely available.

GDPR at Five

Since becoming applicable 25 May 2018, the EU General Data Protection Regulation propelled data protection and privacy to unprecedented and profound prominence, both within the EU and internationally.

CISA, NSA Issue New IAM Best Practice Guidelines

The Cybersecurity and Infrastructure Security Agency (CISA) and the National Security Agency (NSA) recently released a new 31-page document outlining best practices for identity and access management (IAM) administrators.

Forrester Predicts 2023's Top Cybersecurity Threats: From Generative AI to Geopolitical Tensions

The nature of cyberattacks is changing fast. Generative AI, cloud complexity and geopolitical tensions are among the latest weapons and facilitators in attackers' arsenals. Three-quarters (74%) of security decision-makers say their organizations' sensitive data was 'potentially compromised or breached in the past 12 months' alone. That's a sobering cybersecurity baseline for any CISO to consider.

The 8 Most Common Forms Of Cyberattack In 2023

As cyber attacks become more advanced and intricate, being clued up on the different kinds of threats you'll face is vital. There are a plethora of different attacks in the arsenal of the modern attacker, so knowing what you'll be up against is important for any modern organisation.

Security Awareness Training (SAT) Is Finally Having Its Day. Here's Why.

Cybersecurity awareness is on the rise as more organizations adopt security awareness training programs. Why the hype? In several recent reports, we break down our findings around why SAT is on the rise-and why companies need it now more than ever.

AI


10 Awesome Things You Can Do With ChatGPT #9

ResearchAndMarkets forecasts that the embedded finance industry in the region is expected to grow by 39.7% on an annual basis to reach US$120,534.9 million in 2023.

4 Trends Shaping The Future Of Practical Generative AI #25

Pitchbook predicts the market for generative AI in the enterprise will grow at a 32% CAGR to reach $98.1 billion by 2026.

Companies Must Have Guardrails In Place When Incorporating Generative AI

At the time of reading this, you've likely heard of ChatGPT and/or generative AI and its versatile conversational capabilities. From asking it to draft cohesive blog posts, to generating working computer code, all the way to solving your homework and engaging in discussing world events (as far as they happened before September 2021), it seems able to do it all mostly unconstrained.

AI Leadership Insights: AI State Regulation (14:30)

Hello, and welcome to the latest edition of the Techstrong.ai video series. I'm your host, Mike Vizard.

Governance Of Superintelligence

Now is a good time to start thinking about the governance of superintelligence-future AI systems dramatically more capable than even AGI.

Low Code


Enterprise Low-Code Application Platforms Reviews And Ratings

An Enterprise Low-Code Application Platform is an application platform that is used to rapidly develop and deploy custom applications by abstracting and minimizing or replacing the coding needed in development.

Microsoft Unveils New Power Platform Features At Build 2023, Emphasizing Low-Code Technologies For Developers

At its Build 2023 conference, Microsoft unveiled a wide range of new features for its Power Platform, aimed at revolutionizing app development and empowering professional and citizen developers with low-code technologies.

Top Low Code Platforms

Low-code platforms offer organizations the promise of applications and tool development without the need for complex coding skills. Low-code (LC) software provides template-driven graphical approaches to code development, offering a lower barrier to entry than traditional full-code approaches.

How To Protect Low-Code From External Rogue Factors

In the current, unsteady technology landscape, fear of the unexpected and unknown is at the forefront of organisations' minds. Tech leaders are becoming increasingly determined to find solutions that deliver improved results while minimising risk. The utilisation of low-code solutions will gain organisations a greater competitive edge in the market as its ability to innovate and operate efficiently will be more seamless.

Low-Code Platforms Mean Anyone Can Be A Developer -- And Maybe A Data Scientist, Too

Aerospace and defense giant Rolls-Royce is using low-code platforms to democratize software development -- and it's looking to extend the approach into other in-demand areas as well.

Gestalt IT


QLC SSDs Are Ready for Mainstream with Solidigm #19

As NAND flash memory technology has evolved, MLC, TLC, and QLC has been perceived to compromise both reliability and performance. In this episode of the On-Premise IT podcast, we confront the reality of Quad-Level Cell (QLC) SSDs, shedding light on their capabilities and suitability for today's workloads.

W. Curtis Preston Urges Proactive Measures To Combat Escalating Ransomware Menace (15:22) #24

This week we invited 'Mr. Backup', W. Curtis Preston, to join us on the most recent episode of our weekly Rundown of the week's news, focusing on the escalating ransomware landscape. These attacks continue to wreak havoc across various sectors, targeting critical industries and inflicting substantial financial and operational losses.

Adopting Private 5G In Industrial Environments With Celona 5G LAN

Amid record adoption of automation in factory floors, enterprises in industrial sectors are increasingly considering private 5G LAN. Ostensibly, a 5G LAN provides what no other network has before - coverage without blind spots or service drops.

Ransomware Rampage: Cyber Threats And Costly Consequences

Ransomware attacks continue to pose a significant threat across various sectors, with recent incidents targeting critical industries and causing substantial financial and operational damages. Federal authorities have issued warnings about a surge in cyberattacks exploiting a high-severity vulnerability in Veeam software that enables unauthorized access and raises the risk of data heft and ransomware deployment.

CxO Podcasts


How To Manage Security For Operational Technology (OT), With Palo Alto Networks #2

In this informative episode of CXOTalk, Anand Oswal of Palo Alto Networks explains how to manage security for operational technology (OT). He discusses security related to interconnected devices, critical infrastructure, manufacturing, medical environments and more.

@HPCpodcast: A Breakdown of the 'Treasure Trove' TOP500 List #10

We release this special edition of the @HPCpodcast, sponsored by Lenovo, from the ISC conference in Hamburg with a detailed discussion of the new TOP500 list, issued this morning. Shahin, a list advocate, notes that the TOP500 contains 30-plus years of system data showing the convolutions and evolution of the highest performing HPC architectures - 'a treasure trove,' as he puts it.

Technology


What Does The End Of Moore's Law Mean For The Data Center Industry? #12

Moore's Law may not be dead, but it is dying. Here's how the slowdown in the growth of computing power could impact the data center industry.

Is CXL The Answer To Data Center Performance Issues? #13

Data centers face numerous challenges, including issues surrounding memory. Can CXL solve these problems?

PM


How To Stay Ahead Of The Curve: The Top 10 Skills Project Managers Need In 2023 #14

Continuous learning, evolving, and being relevant to the business landscape is the key to professional success and making a mark in the altered workplaces of today. With disruption at scale manifesting new challenges and opportunities, acquiring the right project skills to thrive in the dynamic IT/ITeS industry is imperative.

Project vs. Operations Management: A Guide for Growing SMBs #28

As a small business owner or leader, it's essential to clearly understand the different functions that keep an organization running smoothly. Two of the most critical functions are project management and operations management. While both are important, they require unique skills and have distinct responsibilities.

DR


Achieving High Availability Cost Efficiently #27

A clear understanding of where to apply high availability must be based on the financial and reputational impact an outage will incur.

The DR Essential IT Leaders Can't Overlook #30

All too often companies ignore the public relations portion of their DR plans - an omission that can lead to worse business consequences than those caused by the disaster itself.

Linux


14 Best Linux Distributions For Privacy And Security In 2023 #26

Being anonymous on the Internet is not particularly the same as surging the web safely, however, they both involve keeping oneself and one's data private and away from the prying eyes of entities that may otherwise take advantage of system vulnerabilities in order to harm targeted parties.

Microsoft Has Made Azure Linux Generally Available. Repeat, Azure Linux

After using Azure Linux internally for two years and running it in public preview since October 2022, Microsoft this week finally made its distribution generally available.

Operations


6 Data Center Migration Best Practices

Data center migrations can be a complex process. Use best practices when migrating a data center to ensure maximum uptime, avoid data loss and stay on schedule.

Protect Your Business: Top Reasons Why Cybersecurity Insurance Is A Must-Have

Cybersecurity insurance can be an important tool for managing the financial risks associated with cyberthreats, especially as these threats evolve and become more complex.

Backup


Survey: Backups Are Prime Targets For Ransomware Attacks, Most Remain Exposed

Veeam's 2023 Ransomware Trends Report shows many pay ransom but don't always recover.

Backup Storage Is A Key Attack Target: 2023 Ransomware Trends Report

Organizations of all sizes are increasingly falling victim to ransomware attacks and inadequately protecting against this cyber threat, according to the Veeam 2023 Ransomware Trends Report.

Humor


That Old Box Of Tech Junk You Should Probably Throw Out Saves A Warehouse #1

Reg readers in the US and UK are about to enjoy long weekends - perfect occasions, and timing, for a spot of spring cleaning. But as we discover in this week's edition of On-Call, our weekly reader-contributed tale of tech support traumas, that might be one chore it's wisest to set aside.

Edge


Designing A Scalable Edge Infrastructure With Scale Computing #8

One of the main differentiators for edge computing is developing a scalable architecture that works everywhere, from deployment to support to updates. This episode of Utilizing Edge welcomes Dave Demlow of Scale Computing discussing the need for scalable architecture at the edge.

Telco


EY: Telcos Need To Show More Digital Ambition In 5G Enterprise Space #18

5G take-up among most industry verticals is still low. One reason for that is the failure of telcos to articulate a compelling value proposition. This is one of the conclusions that Tom Loozen, global telecommunications leader at EY, draws from the consultancy's latest annual study of enterprise perceptions surrounding 5G and IoT.

Virtualization


6 Best Virtual Machine Programs For Windows, macOS, And Linux #29

You can use virtual machines to run different operating systems within Windows, macOS, or Linux. There's no need to reboot to switch OS, and some solutions even support 3D acceleration, which makes it possible to play games too. Here are some of our favorites.

Careers


10 Most Popular IT Certifications For 2023

Certifications are a great way to show employers you have the right IT skills and specializations for the job. These 10 certs are the ones IT pros are most likely to pursue, according to data from Dice

Encryption


Enterprise Considerations For Implementing Data Encryption

Organizations are accelerating plans for data encryption, driven by increased security, privacy, and cloud workload protection requirements. However, there are a few different approaches to data encryption and enterprises must consider several factors before choosing the right tools and architecture for their needs.

Cloud


Cloud-Based IT Operations Are On The Rise

You chose on-premises systems behind a firewall for security. Don't look now; cloud-based systems may carry out those operations on the firewall's other side.

FOSS


2 Lenses For Examining The Safety Of Open Source Software

Improving the security of open source repositories and keeping malicious components out requires a combination of technology and people.

Tape


Tape Storage Trundles On, Increases Yearly Volume To 128 Exabytes

For a storage medium said to be dying, tape is looking pretty good.

HR


3 Reasons Why AI Strategy Is HR Strategy

There are three key reasons to seize the moment, aim high, and make AI every bit as much a part of HR strategy as it is part of IT strategy.

Big Data


Complete Guide To Data Access Governance

Data is the core of your business, so keeping it secure is vital. You must be aware of every file and repository containing sensitive or business-critical data.

Developer


Our Guide To Secure Coding Practices For Developers

As an application developer, it is important to prioritize security during the development process to ensure that sensitive data such as passwords, API keys, and other credentials are protected from potential security risks.