31Jan 2023

Enterprise architecture modernizes for the digital era

With digital operating models altering business processes and the IT landscape, enterprise architecture (EA) — a rigid stalwart of IT — has shown signs of evolving as well. One key indicator of this evolution is the increasing interest in enterprise architecture management (EAM) tools, which transformational enterprise architects and CIOs are turning to in order […]

31Jan 2023

Is ITOM Still Relevant for Multi-cloud Environments?

IT Operations management (ITOM) – a framework that gives IT teams the tools to centrally monitor and manage applications and infrastructure across multi-premise environments – has been the foundation of enterprise IT infrastructure and applications for the last 30 years. It has been the backbone that ensures technology stacks are operating optimally to provide timely […]

31Jan 2023

Trulioo launches end-to-end identity platform

Identity verification firm Trulioo on Tuesday launched a new global identity platform for “person” and “business” verification. Trulioo so far sold multiple identity products, each operating in their own silos. Their products and services range from person and business verification, to no-code workflow building, low-code integrations, and anti-fraud measures. The new platform combines all these solutions […]

31Jan 2023

Privacera connects to Dremio’s data lakehouse to aid data governance

The integration of open-source based Privacera into Dremio’s data lakehouse is designed to allow joint customer enterprises to manage and organize secure data access.

31Jan 2023

Guardz debuts with cybersecurity-as-a-service for small businesses

Guardz, a Tel Aviv-based startup promising a broad range of out-of-the-box cybersecurity solutions for small and medium-size businesses (SMBs), has announced both a successful $10 million round of seed funding and the broad availability of its flagship product. The premise of the company’s main offering is tight API integration with Microsoft 365 and Google Workspace. […]

31Jan 2023

IoT, connected devices biggest contributors to expanding application attack surface

The growth of the internet of things (IoT) and connected devices are the biggest contributing factors to organizations’ expanding attack surfaces. That’s according to a new report from Cisco AppDynamics, which revealed that 89% of global IT professionals believe their organization has experienced an expansion in its attack surface over the last two years. The […]

31Jan 2023

Sentra Raises $30 Million for DSPM Technology

Sentra, a cloud data security company with roots in New York and Tel Aviv, has raised a $30 million funding round as investors continue to place big bets on the DSPM (data security posture management) category. The $30 million Series A comes just 18 months after Sentra’s launch with backing from Bessemer Venture Partners and […]

31Jan 2023

Cyber Insights 2023: Artificial Intelligence

About SecurityWeek Cyber Insights | At the end of 2022, SecurityWeek liaised with more than 300 cybersecurity experts from over 100 different organizations to gain insight into the security issues of today – and how these issues might evolve during 2023 and beyond. The result is more than a dozen features on subjects ranging from AI, quantum […]

31Jan 2023

Cyber Insights 2023: Cyberinsurance

About SecurityWeek Cyber Insights | At the end of 2022, SecurityWeek liaised with more than 300 cybersecurity experts from over 100 different organizations to gain insight into the security issues of today – and how these issues might evolve during 2023 and beyond. The result is more than a dozen features on subjects ranging from AI, quantum […]

31Jan 2023

Cyber Insights 2023: Attack Surface Management

About SecurityWeek Cyber Insights | At the end of 2022, SecurityWeek liaised with more than 300 cybersecurity experts from over 100 different organizations to gain insight into the security issues of today – and how these issues might evolve during 2023 and beyond. The result is more than a dozen features on subjects ranging from AI, quantum […]

31Jan 2023

Making Remarkable Energy Grids a Reality

Many industries already benefit from the transformative power of advanced digitalization. Telecommunications, manufacturing, retail, publishing, and others have seen amazing changes in terms of new opportunities, capabilities, and efficiencies. While the energy sector has long embraced IT, it’s on the verge of a digital makeover.    The dilemma of constantly growing energy demand and the need […]

31Jan 2023

Guardz Emerges From Stealth Mode With $10 Million in Funding

Guardz today emerged from stealth mode with $10 million raised in a seed funding round led by Hanaco Ventures, with additional investment from iAngels, Cyverse Capital, and GKFF Ventures. Founded in May 2022, the Tel Aviv, Israel-based startup has developed a platform designed to protect small and growing businesses from cyberattacks, and it also helps […]

31Jan 2023

Microsoft’s Verified Publisher Status Abused in Email Theft Campaign

Microsoft and cybersecurity firm Proofpoint on Tuesday warned organizations that use cloud services about a recent campaign that involved malicious OAuth applications and abuse of Microsoft’s ‘verified publisher’ status. The campaign mainly targeted Microsoft customers in Ireland and the UK. The tech giant has taken steps to disrupt the operation and it has published an […]

31Jan 2023

Threat actors abuse Microsoft’s “verified publisher” status to exploit OAuth privileges

Researchers from cybersecurity firm Proofpoint claim to have discovered a new threat campaign involving malicious third-party OAuth apps that are used to infiltrate organizations’ cloud environments. According to a blog on the company’s website, threat actors satisfied Microsoft’s requirements for third-party OAuth apps by abusing the Microsoft “verified publisher” status, employing brand abuse, app impersonation […]

31Jan 2023

Critical QNAP Vulnerability Leads to Code Injection

QNAP Systems this week issued a warning on a critical vulnerability that could allow attackers to inject malicious code on network-attached storage (NAS) devices. The Taiwan-based manufacturer is known for its NAS appliances and professional network video recorder (NVR) solutions, but also produces various types of networking equipment. Tracked as CVE-2022-27596 (CVSS score of 9.8), […]

31Jan 2023

How the Atomized Network Changed Enterprise Protection

Cyberattacks rose at a rate of 42% in the first half of 2022 and the average cost of a data breach has hit a record high of $4.35 million with costs in the U.S. peaking at $9.44 million. Unfortunately, this shouldn’t come as a surprise. Enterprise networks have changed dramatically, particularly over the last few […]

31Jan 2023

New UN cybercrime convention has a long way to go in a tight timeframe

Cybercrime is a growing scourge that transcends borders, spreading across the boundaries of virtually all the world’s nearly 200 nation-states. From ransomware attacks to rampant cryptocurrency theft, criminal exploitation of borderless digital systems threatens global economic security and the political welfare of all countries. Now, the United Nations has a major initiative to develop a […]

31Jan 2023

GitHub Revokes Code Signing Certificates Following Cyberattack

Code hosting platform GitHub on Monday announced the revocation of three digital certificates used for the GitHub Desktop and Atom applications. The three certificates were stolen on December 6, 2022, after an unauthorized third-party used a compromised Personal Access Token (PAT) for a machine account to clone repositories from Atom, GitHub Desktop, and other deprecated […]

31Jan 2023

Saviynt Raises $205M; Founder Rejoins as CEO

Identity and access governance vendor Saviynt on Tuesday announced the closing of a $205 million financing round and the return of its founder Sachin Nayyar as chief executive. The latest funding brings the total raised by the California company to $375 million and provides a growth-mode runway for Saviynt to establish a foothold in a […]

31Jan 2023

OpenVEX Spec Adds Clarity to Supply Chain Vulnerability Warnings

Chainguard on Tuesday published a draft OpenVEX specification to help software vendors and maintainers communicate precise metadata about the vulnerability status of products directly to end users. The Chainguard specification is an implementation of the NTIA’s VEX (Vulnerability Exploitability eXchange) concept that aims to provide additional information on whether a product is impacted by a […]

31Jan 2023

Discover’s unique IT training platform builds skills and community

With talent markets tight as ever, upskilling is increasingly becoming an IT imperative, and Discover Financial Services is among those companies sharpening staff capabilities by investing in their IT training strategies. The company, which has a culture of “empowering [employees] to work better together in modern ways,” says Angel Diaz, vice president of technology capabilities […]

31Jan 2023

Russian Millionaire on Trial in Hack, Insider Trade Scheme

A wealthy Russian businessman and associates made tens of millions of dollars by cheating the stock market in an elaborate scheme that involved hacking into U.S. computer networks to steal insider information about companies such as Microsoft and Tesla, a prosecutor told jurors on Monday.  Vladislav Klyushin, the owner a Moscow-based information technology company with […]

30Jan 2023

C&S modernizes with wholesale shift to the cloud

Some CIOs approach technology modernization by deciding on a cloud platform, designing a blueprint, and executing it with their own IT staff, C-suite funding, and the hypervisor’s vertical industry experts. Other CIOs hand over most of the project to consulting firms: the old throat choke. There is no right or wrong way to proceed.   […]

30Jan 2023

What’s Next in Securing Healthcare

By Tapan Mehta, Global Healthcare Solutions Executive at Palo Alto Networks Over the last decade, healthcare has offered new lines of services such as telehealth and remote patient monitoring, expanded accessibility and ease for both patients and healthcare professionals, and supported innovations that measurably improve patient outcomes. It’s a profound digital transformation. Today’s digital healthcare […]

30Jan 2023

Fundaments: Helping Enterprises in the Netherlands Decrease Their Carbon Footprints

With seven high-performance and high-security data centers located throughout the Netherlands and full array of cloud services and solutions, including Infrastructure-as-a-Service (IaaS) that enables customers to harness the strengths of the private, public and hybrid cloud with ease, Fundaments is trusted by enterprises in numerous industries. The company is equally well-known among independent software vendors […]

30Jan 2023

Get Business Done Faster with HPC and Exascale Supercomputing

A common misconception is that high-powered computing (HPC) and exascale supercomputing are too powerful for traditional businesses — that they’re only designed for mammoth university and government programs that seek to answer humanity’s biggest questions, like how the galaxies are formed or finding solutions for global crises like climate change and hunger. But the reality […]

30Jan 2023

3 Fundamentals to Truly Secure Remote Workers

By Christian Aboujaoude, chief technology officer at Keck Medicine, USC In the pre-pandemic days, security solutions could be more basic. Securing the perimeter could be likened to locking the door of your house. But with remote workers taking devices off premises and sometimes using their own, securing the workplace requires a new approach. Sophisticated threats […]

30Jan 2023

Are You Overthinking Your Cloud Model? You Need a Cloud Strategy

Are you overthinking your cloud model? If so, you’re likely in need of a well-defined cloud strategy.  Companies with a clear cloud strategy position themselves to achieve more from cloud computing than those without. A well-defined cloud strategy provides a playbook inclusive of principles, baselines, services, financial models, and prioritization guidelines that enable companies to […]

30Jan 2023

This Next-Generation Data Center Fabric Is a Total Game Changer

As applications and IT services advance, scaling and modernizing data centers and meeting increased performance and security requirements grows more and more challenging. While networking technology has evolved over the past decade to provide higher-performing leaf-spine topologies, the unfortunate reality is that associated security and services architectures have not kept pace. To compensate, many organizations […]

30Jan 2023

British Retailer JD Sports Discloses Data Breach Affecting 10 Million Customers

British sports fashion retail firm JD Sports on Monday revealed that it has discovered a data breach impacting roughly 10 million of its customers.  According to the company, the cyber incident affects information provided by customers who placed online orders between November 2018 and October 2020. The JD, Size, Millets, Blacks, Scotts and MilletSport brands […]

30Jan 2023

Zero trust is a never-ending journey, not a ready-made solution

Nearly all organizations are struggling with how to stay in control as their data migrates to the cloud and users connect from anywhere. The answer, they’ve been told, is zero trust. Zero trust starts from the premise that an organization is going to be breached so that they can then focus on minimizing any potential […]

30Jan 2023

Sitecore Ramps Up CX with Smarter Content Discovery and Management

Change and instability seem like the only constants for brands for over two years now. And while those conditions may have made for a rocky road, they also provided brands an opportunity to explore new ways to engage with customers regardless of where they were in their customer journey. Brands capitalized on this opportunity to […]

30Jan 2023

Vulnerabilities in OpenEMR Healthcare Software Expose Patient Data

Vulnerabilities in the OpenEMR healthcare software could allow remote attackers to steal sensitive patient data or execute arbitrary commands and take over systems. OpenEMR is an open source software used for the management of health records. It also allows patients to schedule appointments, get in touch with physicians, and pay invoices. Security researchers at Sonar […]

30Jan 2023

Economic headwinds could deepen the cybersecurity skills shortage

According to the most recent research report from ESG and the Information System Security Association International (ISSA), 57% of organizations claim that they’ve been impacted by the global cybersecurity skills shortage, while 44% of organizations believe the skills shortage has gotten worse over the past few years. The result? Increasing workloads on existing cybersecurity staff, job […]

30Jan 2023

How to survive below the cybersecurity poverty line

The security poverty line broadly defines a divide between the organizations that have the means and resources to achieve and maintain mature security postures to protect data, and those that do not. It was first coined by cybersecurity expert Wendy Nather in 2011, and the concept is just as relevant today as it was then […]

30Jan 2023

AWS launches Data Lab program in India

Amazon Web Services (AWS) on Monday said it was making its AWS Data Lab program available in India. The complimentary program is targeted at accelerating joint engineering efforts between enterprise customers and AWS technical experts to tackle complex data, architecture challenges using AWS products and services, the company said. AWS Data Lab, which primarily has […]

30Jan 2023

Meta Awards $27,000 Bounty for 2FA Bypass Vulnerability

A researcher has disclosed the details of a two-factor authentication (2FA) vulnerability that earned him a $27,000 bug bounty from Facebook parent company Meta.  Gtm Manoz of Nepal discovered in September 2022 that a system designed by Meta for confirming a phone number and email address did not have any rate-limiting protection. A fix was […]

30Jan 2023

Russia-Linked APT29 Uses New Malware in Embassy Attacks

Russia-linked cyberespionage group APT29 has been observed staging new malware for attacks likely targeting embassy-related individuals, Recorded Future reports. Also referred to as Cozy Bear, the Dukes, Nobelium, and Yttrium, APT29 is a Russian advanced persistent threat (APT) group believed to be sponsored by the Russian Foreign Intelligence Service (SVR). It’s also believed to have […]

30Jan 2023

Top 6 roadblocks derailing data-driven projects

Data is what drives digital business. Consider how strategically important it has become for companies to leverage advanced analytics to uncover trends that can help them gain decisive insights they might not otherwise possess. But data-driven projects are not always easy to launch, let alone complete. In fact, enterprises face several challenges as they look […]

30Jan 2023

The Effect of Cybersecurity Layoffs on Cybersecurity Recruitment

On Friday, January 20, 2023, Google announced it would lay off 12,000 employees. Amazon and Microsoft have laid off a combined 28,000 people; Twitter has reportedly lost 5,200 people; Meta (Facebook, etcetera) is laying off 11,000… This is just the tech giants, and almost all the staff looking for new positions are, by definition, tech-savvy […]

27Jan 2023

Winning with Unified Data Security and Access Governance

How do you become data-driven? It’s a question that seemingly has infinite answers. That’s why many companies flounder in the ambiguity of data-driven initiatives absent of concrete, actionable focus areas. Forward-thinking leaders are strategically focused on a particular data-driven initiative — self-service data access and governance. But even for companies who’ve succeeded in pinpointing the […]

27Jan 2023

Hispanic IT leaders work to close the gap

When Pete Torres transitioned to the IT industry after serving in the military, he encountered a noticeable lack of Hispanic representation at conferences and events he attended. Even when he was young, the idea of a career in technology was “not really an option,” he says, owing in part to the IT industry’s decades-long issues […]

27Jan 2023

Ericsson and Vonage are putting the power of 5G at the fingertips of developers

The Communications Platform as a Service (CPaaS) market is big and growing fast. Already worth more than $8 billion, analysts predict that the market will nearly triple in size to $22 billion by 2025. CPaaS is a cloud platform that exposes communications functions such as SMS, voice, video, and IP chat via programmable application programming […]

27Jan 2023

Hackers abuse legitimate remote monitoring and management tools in attacks

Security researchers warn that an increasing number of attackers are using legitimate remote monitoring and management (RMM) tools in their attacks to achieve remote access and control over systems. These tools are commonly used by managed service providers (MSPs) and IT help desks so their presence on an organization’s network and systems might not raise […]

27Jan 2023

What is a Data Fabric?

By now, you’ve heard the good news: The business world is embracing data-driven decision making and growing their data practices at an unprecedented clip. The pandemic may have forced their hands, but they’ve seen the value of data and will never go back to making decisions based on hunches. Here is the so-so news: They’re […]

27Jan 2023

Critical Vulnerability Impacts Over 120 Lexmark Printers

Printer and imaging products manufacturer Lexmark this week published a security advisory to warn users of a critical vulnerability impacting over 120 printer models. The issue, tracked as CVE-2023-23560 (CVSS score of 9.0), is described as a server-side request forgery (SSRF) flaw in the Web Services feature of newer Lexmark devices, which could be exploited […]

27Jan 2023

FBI takes down Hive ransomware group in an undercover operation

The US Department of Justice (DOJ) along with international partners have taken down the Hive ransomware group. The operation that began in July 2022 resulted in the FBI penetrating Hive’s computer networks, capturing its decryption keys, and offering them to victims worldwide, preventing victims from having to pay the $130 million in ransom demanded, DOJ […]

27Jan 2023

Industry Reactions to Hive Ransomware Takedown: Feedback Friday

Authorities in the United States and Europe have announced the results of a major law enforcement operation targeting the Hive ransomware.  Agencies from around the world worked together to take down Hive’s leak website and servers. In addition, agents hacked into Hive systems in July 2022, allowing them to identify targets and obtain decryption keys […]

27Jan 2023

BIND Updates Patch High-Severity, Remotely Exploitable DoS Flaws

The Internet Systems Consortium (ISC) this week announced patches for multiple high-severity denial-of-service (DoS) vulnerabilities in the DNS software suite BIND. The addressed issues could be exploited remotely to cause named – the BIND daemon that acts both as an authoritative name server and as a recursive resolver – to crash, or could lead to […]

27Jan 2023

Iranian APT Leaks Data From Saudi Arabia Government Under New Persona

The Iran-linked advanced persistent threat (APT) actor known as Moses Staff is leaking data stolen from Saudi Arabia government ministries using a recently created online persona. Also referred to as Cobalt Sapling, Moses Staff has been likely active since November 2020, but its existence was not revealed until September 2021. A declared anti-Israeli and pro-Palestinian […]

27Jan 2023

Microsoft Urges Customers to Patch Exchange Servers

Microsoft this week published a blog post to remind its customers of the continuous wave of attacks targeting Exchange servers and to urge them to install the latest available updates as soon as possible. “Attackers looking to exploit unpatched Exchange servers are not going to go away,” Microsoft says, reminding customers that both a cumulative […]

27Jan 2023

IT leaders take note: The future is what you create

The new year brings with it enthusiasm for new priorities and accomplishments to come, resolutions to seize opportunities and overcome challenges, and the opportunity to assess takeaways from the previous year and turn the page on projects and missteps past. In the ideal beginning of the year scenario, organizations would have completed celebrating and cerebrating […]

27Jan 2023

US Reiterates $10 Million Reward Offer After Disruption of Hive Ransomware

Following the shutdown of the Hive ransomware operation by law enforcement, the US government has reminded the public that a reward of up to $10 million is offered for information on cybercriminals. Authorities in the United States and Europe announced on Thursday the results of a major law enforcement operation targeting the Hive ransomware. More […]

26Jan 2023

IBM reports rise in Q4 profit, but plans to cut 3,900 jobs

IBM reported net income  of $2.9 billion in the fourth quarter of 2022 and year-on-year increases in revenue across all three of its business segments. That’s an increase in net income of 9% compared to the total reported for the corresponding quarter of 2021, or 17% comparing only continuing operations: IBM spun off most its […]

26Jan 2023

Cyberattacks Target Websites of German Airports, Admin

The websites of German airports, public administration bodies and financial sector organizations have been hit by cyberattacks instigated by a Russian “hacker group”, authorities said Thursday. The Federal Cyber Security Authority (BSI) had “knowledge of DDoS attacks against targets in Germany”, a spokesman told AFP. A distributed denial-of-service (DDoS) attack is designed to overwhelm the target with a […]

26Jan 2023

CIO Leadership Live with Roxanne Salton, Chief Digital Officer at Southern Cross Health Society

Roxanne Salton, Chief Digital Officer at Southern Cross Health Society, on why the job of transformation is not just the job of the CIO, the need to get more women into IT leadership roles, and being mindful of uncertainty in the year ahead and how it impacts your people. Watch the episode: Listen to the […]

26Jan 2023

SAP plans layoffs and selloff with cloud revenue up but profit down

SAP’s revenue rose 11% in 2022 with the cloud component of that climbing 33%, but net income dropped 68%, prompting restructuring and layoffs in its CRM activities. The company is also exploring selling its majority stake in Qualtrics, the experience management platform it bought for $8 billion in 2018, to refocus on its core business. […]

26Jan 2023

US Infiltrates Big Ransomware Gang: ‘We Hacked the Hackers’

The FBI has at least temporarily dismantled the network of a prolific ransomware gang it infiltrated last year, saving victims including hospitals and school districts a potential $130 million in ransom payments, Attorney General Merrick Garland and other U.S. officials announced Thursday. “Simply put, using lawful means we hacked the hackers,” Deputy Attorney General Lisa […]

26Jan 2023

How IT Can Deliver Better Business Outcomes

Cloud services, software-as-a-service (SaaS) applications, and on-premises infrastructures connected by wired and wireless networks now represent the backbone of modern enterprises. To fully harness the benefits of modern network architectures, network operations teams need a deep understanding of how these systems perform. This visibility is essential if teams are to avoid the downtime that results […]

26Jan 2023

Tenable Launches $25 Million Early-Stage Venture Fund

Vulnerability management software firm Tenable has launched a $25 million venture fund to place bets on early-stage startups in the attack surface and exposure management space. The new Tenable Ventures plans to make seed- and early-stage investments in companies building technology to help businesses discover, assess and manage security risk. The Columbia, Maryland-based Tenable said […]

26Jan 2023

How Real-Time Data and Open-Source Software Fuel ‘AI Factories’

By Bryan Kirschner, Vice President, Strategy at DataStax In their 2020 book Competing in the Age of AI, Harvard Business School professors Marco Iansiti and Karim Lakhani make some bold predictions about the winning enterprises of the future. These organizations, which they refer to as “AI factories,” build a “virtuous cycle between user engagement, data […]

26Jan 2023

Mapping Threat Intelligence to the NIST Compliance Framework Part 2

The NIST compliance framework consists of 5 core functions: identify, protect, detect, respond and recover. In my previous column, I mapped threat intelligence capabilities to the NIST core function of Identify. In this column, I will continue the discussion by mapping threat intelligence to the additional functions of Protect, Detect and Respond.  By doing so, […]

26Jan 2023

820k Impacted by Data Breach at Zacks Investment Research

Stock research firm Zacks Investment Research is in the process of notifying customers that their personal information was compromised in a data breach. Founded in 1978, Zacks Investment Research is one of the largest providers of stock research, analysis and recommendations for firms in the US. Earlier this week, the company informed the Maine Attorney […]

26Jan 2023

New Open Source OT Security Tool Helps Address Impact of Upcoming Microsoft Patch 

Industrial cybersecurity firm Otorio has released an open source tool designed to help organizations detect and address issues related to an upcoming update from Microsoft. Otorio’s DCOM Hardening Toolkit, which is available for free on GitHub, is a PowerShell script that lists weak DCOM authentication applications installed on the tested workstation and provides functionality to […]

26Jan 2023

CISA Provides Resources for Securing K-12 Education System

The US Cybersecurity and Infrastructure Security Agency (CISA) this week published a report detailing the cybersecurity risks the K-12 education system faces, along with recommendations on how to secure it. Over the past four years, there have been thousands of cyber incidents involving K-12 institutions, where threat actors targeted school computer systems to deploy ransomware, […]

26Jan 2023

North Korean APT Expands Its Attack Repertoire

The advanced persistent threat (APT) tracked as TA444 is either moonlighting from its previous primary purpose, expanding its attack repertoire, or is being impersonated (that is, has had its infrastructure abused by other hackers).  TA444 is a North Korean state-sponsored threat group tracked by Proofpoint as actively targeting cryptocurrencies since at least 2017. It has […]

26Jan 2023

Security Update for Chrome 109 Patches 6 Vulnerabilities

Google has awarded a total of more than $25,000 to the researchers who reported the vulnerabilities patched with the release of a Chrome 109 update. The company informed users on Tuesday that six security holes have been patched in Chrome, including four reported by external researchers. Two of them are high-severity use-after-free issues affecting the […]

26Jan 2023

Malicious Prompt Engineering With ChatGPT

The release of OpenAI’s ChatGPT available to everyone in late 2022 has demonstrated the potential of AI for both good and bad. ChatGPT is a large-scale AI-based natural language generator; that is, a large language model or LLM. It has brought the concept of ‘prompt engineering’ into common parlance. ChatGPT is a chatbot launched by […]

26Jan 2023

Dozens of Cybersecurity Companies Announced Layoffs in Past Year

Dozens of cybersecurity companies have announced cutting staff over the past year as part of reorganization strategies, in many cases triggered by the global economic slowdown.  One of the most recent announcements was made by Sophos, which in mid-January confirmed reports that it’s laying off 10% of its global workforce. Roughly 450 people have reportedly […]

26Jan 2023

Chinese Hackers Adopting Open Source ‘SparkRAT’ Tool

A Chinese threat actor tracked as DragonSpark has been using the SparkRAT open source remote administration tool (RAT) in recent attacks targeting East Asian organizations, cybersecurity firm SentinelOne reports. Relatively new, SparkRAT is a multi-platform RAT written in Golang that can run on Windows, Linux, and macOS systems, and which can update itself with new […]

26Jan 2023

UK Gov Warns of Phishing Attacks Launched by Iranian, Russian Cyberspies

The United Kingdom’s National Cyber Security Centre (NCSC) has published an advisory to warn organizations and individuals about separate spearphishing campaigns conducted by Russian and Iranian cyberespionage groups. The advisory focuses on activities conducted by the Russia-linked Seaborgium group (aka Callisto, Blue Callisto and Coldriver) and the Iran-linked TA453 (aka Charming Kitten, APT35, Magic Hound, […]

26Jan 2023

US Government Agencies Warn of Malicious Use of Remote Management Software

The Cybersecurity and Infrastructure Security Agency (CISA), National Security Agency (NSA), and Multi-State Information Sharing and Analysis Center (MS-ISAC) are warning organizations of malicious attacks using legitimate remote monitoring and management (RMM) software. IT service providers use RMM applications to remotely manage their clients’ networks and endpoints, but threat actors are abusing these tools to […]

26Jan 2023

Hive Ransomware Operation Apparently Shut Down by Law Enforcement

The Hive ransomware operation appears to have been shut down as part of a major law enforcement operation involving agencies in 10 countries.  A message displayed in English and Russian on the Hive ransomware operation’s Tor-based website reads: The Federal Bureau of Investigation seized this site as part of a coordinated law enforcement action taken […]

26Jan 2023

Recent legal developments bode well for security researchers, but challenges remain

Despite the hoodie-wearing bad guy image, most hackers are bona fide security researchers protecting users by probing and testing the security configurations of digital networks and assets. Yet the law has often failed to distinguish between malicious hackers and good-faith security researchers. This failure to distinguish between the two hacker camps has, however, improved over […]

26Jan 2023

9 API security tools on the frontlines of cybersecurity

Application programming interfaces (APIs) have become a critical part of networking, programs, applications, devices, and nearly everything else in the computing landscape. This is especially true for cloud and mobile computing, neither of which could probably exist in its current form without APIs holding everything together or managing much of backend functionality. Because of their […]

26Jan 2023

6 tips for making the most of a tight IT budget

IT leaders seeking to drive enterprise growth through technology investments are often saddled with budgets that make their tasks of increasing the top and bottom lines challenging. The year 2023 seems to be no different. Despite an estimated increase to IT budgets of 5.1% on average for 2023, research firm Gartner points to a projected […]

26Jan 2023

ServiceNow posts Q4 growth as enterprise automation remains strong

Enterprise software and workplace management orchestrator ServiceNow announced rosy revenue numbers in its Q4 2022 earnings call Wednesday evening, saying that total revenues topped $1.9 billion, which represents a 20% year-on-year increase. IDC analyst Stephen Elliot noted strong corporate management and the company’s expansion into the workplace experience market as contributing factors in the reported […]

25Jan 2023

Attackers move away from Office macros to LNK files for malware delivery

For years attackers have used Office documents with malicious macros as one of the primary methods of infecting computers with malware. Microsoft finally took steps to disable such scripts by default in documents downloaded from the internet, forcing many groups to change tactics and increasingly choose LNK (shortcut) files as a delivery mechanism. This trend […]

25Jan 2023

AVM Cloud: Empowering Enterprises in Malaysia to Deploy a Robust Sovereign Cloud

Already a leader in Malaysia’s burgeoning cloud services and solutions sector when it was acquired by Time dotCom, one of the region’s largest fixed-line communications companies in 2021, AVM Cloud recently became one of the select group of providers who offer VMware Cloud Verified Services to earn the VMware Sovereign Cloud distinction. Originally known as […]

25Jan 2023

H2M architects + engineers’ John McCaffrey on infrastructure lifecycles

John McCaffrey, CIO at H2M architects + engineers, joins host Maryfran Johnson for this CIO Leadership Live interview, jointly produced by CIO.com and the CIO Executive Council. They discuss infrastructure lifecycles, 3D scanning and design, and more. Watch this episode: Listen to this episode: Careers, CIO, CIO Leadership Live

25Jan 2023

Chinese threat actor DragonSpark targets East Asian businesses

Organizations in Taiwan, Hong Kong, Singapore and China have been recently facing attacks from a Chinese threat actor DragonSpark. The threat actor was observed using the open-source tool SparkRAT for its attacks, according to a report by SentinelOne.  SparkRAT is multi-platform, feature-rich, and frequently updated with new features, making the remote access Trojan (RAT) attractive to threat actors. […]

25Jan 2023

Veterans bring high-value, real-life experience as potential cybersecurity employees

Johanna Wood was an armored crewman with Lord Strathcona’s Horse, a Canadian Army regiment. At first glance, Wood’s military role may seem incompatible with civilian work; there’s not a lot of call for tank operators in private companies. But Wood believes her experience working in tanks gives her a significant edge as she enters the […]

25Jan 2023

Examining the CIO time management dilemma

CIOs are expected to successfully split their time between duties that can greatly vary day to day. Federal Reserve System CIO Ghada Ijam, for instance, says on a good day, 60% of her time is spent on strategic planning and the rest keeping the business running. As every CIO knows, though, days can be unpredictable, […]

25Jan 2023

United Airlines gives employees the digital tools to make customers happy

As CIO of United Airlines, Jason Birnbaum is laser focused on using technology and data to enable the company’s 86,000 employees to create as seamless a customer travel experience as possible. “Our goal is to improve the entire travel process from when you plan a trip to when you plan the next trip,” says Birnbaum, […]

25Jan 2023

Modernize Your Data Stack to Thrive in Uncertain Times

Economic instability and uncertainty are the leading causes for technology budget decreases, according to the IDG/Foundry 2022 annual State of the CIO survey. Despite a desire to cut budgets, data remains the key factor to a business succeeding – especially during economic uncertainty. According to the Harvard Business Review, data-driven companies have better financial performance, are more likely to survive, and […]

24Jan 2023

CYGNVS exits stealth, trumpeting its cyberattack recovery platform

Cyber recovery startup CYGNVS announced its emergence from stealth today, having raised $55 million in series A funding and created a highly functional “cyber crisis” platform which promises to help organizations recover from major breaches. The company’s product is in its name – CYGNVS says it’s an acronym for Cyber GuidaNce Virtual Space. It’s effectively […]

24Jan 2023

Data Democratization: How to Balance Performance and Compliance

Hyper competition, globalization, economic uncertainties — all of it converging to drive a C-suite impetus for the business to become more data-driven. Organizations invest in more data science and analytical staff as they demand faster access to more data. At the same time, they’re forced to deal with more regulations and privacy mandates such as […]

24Jan 2023

Achieve Modern Data Security Governance for Faster Insights

Every company and government entity is tasked with striking a critical balance between data access and security. As Forrester’s Senior Analyst Richard Joyce stated, “For a typical Fortune 1000 company, just a 10 percent increase in data accessibility will result in more than $65 million additional net income.” As the need to become more data-driven […]

24Jan 2023

P-to-P fraud most concerning cyber threat in 2023: CSI

US financial institutions see peer-to-peer fraud and other digital fraud as the biggest cybersecurity concern in 2023. It was cited by 29% of respondents in a survey by Computer Systems Inc. (CSI), followed by data breaches (23%), ransomware (20%) and a breach at a third party (15%).  Industry respondents also expressed concerns over identity theft at […]

24Jan 2023

Protect Your Data with Zero Trust

As the threat landscape evolves and adversaries find new ways to exfiltrate and manipulate data, more organizations are adopting a zero trust strategy. However, many are only focusing attention on endpoints, leaving the database vulnerable to malicious attacks. Databases are the last line of defense against data exfiltration by cybercriminals. To combat this, it’s essential […]

24Jan 2023

How a Data Security Platform Tackles the Toxicity of Tool Sprawl

One of the main causes of security operations (SecOps) pain is the sheer number of disparate protection tools now in use across the enterprise, leading to an ever higher volume of alerts, operational inefficiencies, and increased cost. There’s no denying the cybersecurity threat landscape has become extremely dynamic and complex — encompassing data, applications, APIs, […]

24Jan 2023

ServiceNow to detect open source security vulnerabilities with Snyk integration

ServiceNow Vulnerability Response users will now have access to Snyk Open Source. This will represent the Israeli-US vendor’s advanced software composition analysis (SCA) backed by Snyk’s security intelligence—a combination of public sources, data from the developer community, proprietary expert research, machine learning, and human-in-the-loop AI. ServiceNow Vulnerability Response is part of ServiceNow Security Operations and […]

24Jan 2023

How passkeys are changing authentication

Passwords are a central aspect of security infrastructure and practice, but they are also a principal weakness involved in 81% of all hacking breaches. Inherent useability problems make passwords difficult for users to manage safely. These security and useability shortcomings have driven the search for alternative approaches known generally as passwordless authentication. Passkeys are a […]

24Jan 2023

Skyhawk launches platform to provide threat detection and response across multi-cloud environments

Cloud threat detection vendor Skyhawk Security has released a platform designed to address alert fatigue that provides cloud detection and response (CDR) across multi-cloud environments, the company said Tuesday in a statement. The company says the Synthesis platform is being released on a “freemium” basis—the base version is available at no cost, but supplement features […]

24Jan 2023

CIOs sharpen tech strategies to support hybrid work

A significant number of organizations are operating in a hybrid model — and expect to continue with that hybrid environment for the foreseeable future. Global analytics and advice firm Gallup has found that the percentage of remote-capable workers working in a hybrid environment increased in 2022, moving from 42% in February to 49% in June. […]

24Jan 2023

Why sustainable transportation needs 5G connectivity and digitalisation

Decarbonising transportation through electrification is critical to helping companies and economies meet net-zero emissions targets. Fortunately, three forces are combining to make this vision for sustainable transportation a reality: connectivity, digitalisation, and cross-sector collaboration. In a recent “fireside chat” on the topic of sustainable transportation, Erik Ekudden, CTO of Ericsson, and Christian Levin, CEO of […]

24Jan 2023

Brilliance: The CIO’s most seductive career-limiting trait

Good leaders get things done. Great leaders build organizations that get things done. As a leader, being thought of as a source of the great ideas that help get things done is a three-fold liability, especially when you’re working with executive peers outside of IT. The first fold is that if a brilliant idea has […]

24Jan 2023

Australia fronts International Counter Ransomware Taskforce

The International Counter Ransomware Taskforce (ICRTF), envisioned by the International Counter Ransomware Initiative (CRI), kicked off its operations on Monday with Australia as its inaugural chair and coordinator. The CRI was first brought together in October 2021 with a virtual meeting of 30 countries, facilitated by the US White House National Security Council. In November 2022, […]

24Jan 2023

Microsoft’s latest OpenAI investment opens way to new enterprise services

OpenAI has landed billions of dollars more funding from Microsoft to continue its development of generative artificial intelligence tools such as Dall-E 2 and ChatGPT. A move that is likely to unlock similar investments from competitors — Google in particular — and open the way for new or improved software tools for enterprises large and […]

23Jan 2023

Attackers exploiting critical flaw in many Zoho ManageEngine products

Users of on-premises deployments of Zoho ManageEngine products should make sure they have patches applied for a critical remote code execution vulnerability that attackers have now started exploiting in the wild. Technical details about the flaw along with a proof-of-concept exploit was released late last week, which will allow more attackers to add this exploit […]

23Jan 2023

Nvidia targets insider attacks with digital fingerprinting technology

Nvidia today announced that a digital lab playground for its latest security offering is now available, letting users try out an AI-powered system designed to monitor individual user accounts for potentially hazardous behavior. The idea, according to the company, is to leverage the large amounts of data that many organizations compile anyway about login and […]

23Jan 2023

CIOs step up to fill plus-size leadership roles

With a career path that wound through R&D, product development, advanced supply chain, and technology, Praveen Jonnala is well positioned to lead a global IT organization as well as take the reins of operations and other core business functions. Jonnala stepped in as CIO at network infrastructure provider CommScope two years ago after more than […]

23Jan 2023

Murat Ozkan, Chief Information and Digital Officer at Anadolu Efes

Murat Ozkan, Chief Information and Digital Officer at Anadolu Efes, the Turkey-based international beverages company, talks about how a data management strategy comprising AI and analytics will sustain further growth. Watch the episode: Listen to the episode: CIO Leadership Live

23Jan 2023

US Supreme Court leak investigation highlights weak and ineffective risk management strategy

The Supreme Court of the United States (SCOTUS) has announced that its investigation to find the insider who leaked a draft opinion of the Dobbs v. Jackson Women’s Health Org. decision to media outlet Politico has come up empty. In a nutshell, the court’s insider risk management program, designed to protect the information the justices […]

23Jan 2023

The Impossible Manual Task for Outdated Contact Centers

The cloud, combined with conversational artificial intelligence (AI), is dramatically expanding the capabilities of the modern-day contact center. These solutions are the twin pillars of contact center success, allowing them to serve more customers faster and more effectively. The two technologies go hand in hand for creating the flexible, flawless customer experience (CX) that companies […]

23Jan 2023

The metaverse brings a new breed of threats to challenge privacy and security gatekeepers

The metaverse is coming; businesses and government agencies are already building virtual worlds to support city services, meetings and conferences, community building, and commerce. They’re also rendering spatial apps around travel, car sales, manufacturing, and architecture in what Citi predicts will be a $13-trillion market with 5 billion users by 2030. “Just as the internet, […]

23Jan 2023

2023: The year of the rise of the digital economy in GCC countries

The pandemic has led many organizations in the Middle East to shift towards a digital-first strategy. According to IDC’s group vice president and regional managing director for the Middle East, Turkey, and Africa, Jyoti Lalchandani: “This means choosing digitalization options over non-digital options as a rule while implementing or enhancing new products, services, channels, customer/employee […]

23Jan 2023

DEI that works: 5 companies reaping the benefits of IT diversity strategies

The tech industry has long been known for its lack of diversity and, as a result, there’s been a big push for companies to take DEI strategies seriously. Diversity not only helps organizations perform better but fostering equity and inclusion can also strengthen recruiting and retention rates, as well as overall employee satisfaction. In fact, […]

21Jan 2023

Wallarm touts API leak protection with new scanning feature

API security company Wallarm announced Frdiay that it had opened a preview period for its newest offering — an active scanning system that checks through public sources of compromised API data, alerts users, and provides automated responses if a compromise is detected. The API Leak Protection feature, which will be deployed via Wallarm’s existing End-to-End […]

20Jan 2023

What is business intelligence? Transforming data into business insights

Business intelligence definition Business intelligence (BI) is a set of strategies and technologies enterprises use to analyze business information and transform it into actionable insights that inform strategic and tactical business decisions. BI tools access and analyze data sets and present analytical findings in reports, summaries, dashboards, graphs, charts, and maps to provide users with […]

20Jan 2023

Does the Future of Work include Network as a Service (NaaS)?

By: Cathy Won, Consultant with eTeam, HPE Aruba Contributor. The Future of Work and the Workplace is a 2023 Leesman survey report co-authored by HPE Aruba. The report explores the critical questions on the minds of business leaders coming out of the pandemic today. What is the future of work and the workplace? How must organizations adapt? Unsurprisingly, […]

20Jan 2023

IoT Adoption in Healthcare Brings Security Opportunities

By Anand Oswal, Senior Vice President and GM at cyber security leader Palo Alto Networks Connected medical devices, also known as the Internet of Medical Things or IoMT, are revolutionizing healthcare, not only from an operational standpoint but related to patient care. In hospital and healthcare settings around the world, connected medical devices support critical […]

20Jan 2023

The Technology Enabling Successful Hybrid Workforce Transformation

What was once an anomaly is now a global reality as remote and hybrid work models settle in across industries. To adapt to this new “new normal,” organizations will need to reinforce their workforces with technologies that can keep pace. In 2022, the percentage of remote workdays in the US soared above the pre-pandemic levels […]

20Jan 2023

The Reason Many AI and Analytics Projects Fail—and How to Make Sure Yours Doesn’t

Topping the list of executive priorities for 2023—a year heralded by escalating economic woes and climate risks—is the need for data driven insights to propel efficiency, resiliency, and other key initiatives. Many companies have been experimenting with advanced analytics and artificial intelligence (AI) to fill this need. Now, they must turn their proof of concept […]

20Jan 2023

How Well-Established Enterprises Can Achieve Innovation Without Disruption

Before any innovation initiative starts, there are questions (and usually lots of them). What is innovation and, more importantly, what does it mean for your organization? What fears or misperceptions hold innovation back? If you haven’t yet, check out this blog before reading this follow-up piece. Decades ago, Netflix mailed DVDs to homes and a copy of […]

20Jan 2023

T-Mobile suffers 8th data breach in less than 5 years

Telecom player T-Mobile US has suffered a cybersecurity incident that resulted in the exposure of personal details of 37 million users, the company reported in a filing to the US Securities and Exchange Commission on Thursday.  Customer data such as customer name, billing address, email, phone number, date of birth, T-Mobile account number and information such as […]

20Jan 2023

The essential check list for effective data democratization

Truly data-driven companies see significantly better business outcomes than those that aren’t. According to a recent IDC whitepaper, leaders saw on average two and a half times better results than other organizations in many business metrics. In particular, companies that were leaders at using data and analytics had three times higher improvement in revenues, were […]

19Jan 2023

Three Keys to Protecting the Corporate Network in the Era of Hybrid Work

Remote and hybrid work is here to stay. In an increasingly complex security environment, no challenge looms larger than how to protect remote devices that tie back into the corporate network. In fact, modernizing networking technologies ranks among the top IT goals for 2022 according to an IDG survey conducted on behalf of Insight Enterprises.  With more users […]

19Jan 2023

Many ICS flaws remain unpatched as attacks against critical infrastructure rise

Patching vulnerabilities in industrial environments has always been challenging due to interoperability concerns, strict uptime requirements, and sometimes the age of devices. According to a recent analysis, a third of vulnerabilities don’t even have patches or remediations available. Out of 926 CVEs — unique vulnerability identifiers — that were included in ICS advisories from the […]

19Jan 2023

Leveraging Cybersecurity to Supercharge Retail’s Frontline

By Ravi Balwada, CTO of Guitar Center In retail, we don’t have the luxury of thinking about security as an afterthought. We have to think about security early in the innovation process and make sure our security best practices, governance and architectures are taken into account when we are designing our solutions—everything from defining what […]

19Jan 2023

Why you don’t have to fix every vulnerability

The word “vulnerability” typically comes with a “must fix now” response. However, not all vulnerabilities should be treated equally because not all of them pose a risk. It all depends on what the data represents. In fact, some vulnerabilities are OK to deprioritize, depending on associated threats and the value of the asset at risk. […]

19Jan 2023

Delegation: The biggest test for transformational CIOs

Two events influenced Schneider Electric CIO Elizabeth Hackenson to distribute more decision-making authority throughout the company’s IT organization. “During the pandemic we needed to have people make as many local decisions as possible,” which she says was essential to keep operations moving across the 100 countries in which the company operates. More importantly, the company’s […]

19Jan 2023

Chinese hackers targeted Iranian government entities for months: Report

Chinese advanced persistent threat actor, Playful Taurus, targeted several Iranian government entities between July and December 2022, according to a Palo Alto Networks report.  The Chinese threat actor also known as APT15, KeChang, NICKEL, BackdoorDiplomacy, and Vixen Panda, was observed attempting to connect government domains to malware infrastructure previously associated with the APT group, according […]

19Jan 2023

How CISOs can manage the cybersecurity of high-level executives

High-level executives, including board members and C-level executives, often have access to sensitive information, making them prime targets for bad actors looking to penetrate corporate defenses. Their personal devices, among other points of entry, are glaring attack vectors for cybercriminals looking to get in on the top floor. As CISOs know, cyber incidents all too often […]

19Jan 2023

The Significance of Open Source Software in the Digital-First Future Enterprise

As companies shift their focus from the digital transformation of individual processes to the business outcomes enabled by a digitally transformed organisation, software engineering will become a core enterprise capability. To become a software-powered organisation, companies must first identify and address the concerns of its developers in areas such as developer experience, developer velocity and […]

19Jan 2023

CIO Leadership live with Derek Cullen, CIO of Stikeman Elliott

Derek Cullen, CIO, Stikeman Elliott discusses the evolving role of the CIO as a leader and business partner. He also discusses supporting career development through networking and volunteering. Watch this episode: Listen to this episode: CIO, CIO Leadership Live

19Jan 2023

CIO Wendy Pfeiffer on getting hybrid work right

Wendy M. Pfeiffer is a technology leader who’s as dedicated to excellence in operations and delivery as she is to maintaining a focus on innovation. She joined Nutanix as SVP and CIO following a successful career leading technology teams at companies like GoPro, Yahoo, Cisco Systems, and Robert Half. Highly regarded by her industry peers for […]

19Jan 2023

8 ‘future of work’ mistakes IT leaders must avoid

CIOs supporting a hybrid mix of in-office and remote workers, and those who float between, need to implement new tools and strategies to get it right. But they will also need to change how they think about hybrid work, which analyst firm Forrester characterizes as “messy” even as it says 51% of organizations are moving […]

19Jan 2023

Lawsuit claims IBM falsely used mainframe sales to boost AI, cloud businesses

A lawsuit has been filed against 13 current and former IBM executives, including CEO and Chairman Arvind Krishna and former CEO Ginni Rometty, accusing the company of securities fraud — bundling mainframe sales together with those of poorly performing products in order to make them appear more profitable than they actually were. The lawsuit was […]

19Jan 2023

(ISC)² CISO Jon France shares predictions for 2023

Jon France – Chief Information Security Officer at (ISC)² – joins Xiou Ann Lim for this CSO Executive Sessions interview. They discuss predictions in cybersecurity for 2023, how CISOs can prepare for the year ahead, and more. To read this article in full, please click here

18Jan 2023

QuSecure launches quantum-computing based security for endpoints

QuSecure, a quantum-computing technology company based in Silicon Valley, today announced the latest version of its security platform, called QuEverywhere — designed to allow organizations to extend quantum-safe security all the way to endpoints like laptops and smartphones, the company said in a statement. QuEverywhere, according to the company, is an app- or browser-based method […]

18Jan 2023

So, You’re Moving Your Contact Center to the Cloud

‘Cloud’ is a buzzword that has run its course in a lot of industries, but there is a resurgence of cloud talk in the contact center arena these days. Contact Center as a Service (CCaaS) is a high-priority digital transformation project for many businesses around the world, and some of the biggest players in tech […]

18Jan 2023

Perception Point launches Advanced Threat Protection for Zendesk

Threat protection company Perception Point has launched Advanced Threat Protection for Zendesk to provide detection and remediation services for Zendesk customers. Perception Point said that customers can now protect customer service software Zendesk a single, consolidated platform alongside their email, web browsers and other cloud collaboration apps. Advanced Threat Protection for Zendesk has been built […]

18Jan 2023

Trustwave relaunches Advanced Continual Threat Hunting with human-led methodology

Cybersecurity vendor Trustwave has announced the relaunch of its Advanced Continual Threat Hunting platform with new, patent-pending human-led threat hunting methodology. The firm claimed the enhancement will allow its SpiderLabs threat hunting teams to conduct increased human-led threat hunts and discover more behavior-based findings that could go undetected by traditional endpoint detection and response (EDR) […]

18Jan 2023

Why it's time to review your on-premises Microsoft Exchange patch status

We start the patching year of 2023 looking at one of the largest releases of vulnerability fixes in Microsoft history. The January 10 Patch Tuesday update patched one actively exploited zero-day vulnerability and 98 security flaws. The update arrives at a time when short- and long-term technology and budget decisions need to be made. This […]

18Jan 2023

How IT leads can build a high-performing environment for sales teams

Karl Nicholson, Technology Evangelist at Slack Ask any tech team, and they’ll tell you that the use of workplace apps has skyrocketed in recent years. Off the back of the pandemic, an age of technological empowerment swept in — where employees had greater autonomy in choosing the best tools they needed to do their best […]

18Jan 2023

4 ways upskilling and reskilling can fill hard-to-hire positions

The employees you need may already be on your team but out of sight. Looking for existing staff with transferable skills, hidden skills, technical learnability, and hidden knowledge can bring these potential employees into focus. Transferable skills These are comprised of knowledge, experience, and abilities that make it easier to learn new skills. Within IT, […]

18Jan 2023

How attackers might use GitHub Codespaces to hide malware delivery

Attackers could start abusing GitHub Codespaces, a new service that allows developers to create and test applications inside development containers running on GitHub’s servers. Developers can make their applications accessible via public GitHub URLs for preview by others, a functionality that can be abused to distribute malware payloads in a stealthy way. “If the application […]

18Jan 2023

Remote.it takes steps toward zero trust with 'single line of code' provisioning

Network management company Remote.it today announced new features for its core SaaS-based service, including support for the Okta user identification platform and Docker containers, and what it’s describing as “programmatic deployment” of zero trust networks. Essentially, the company said, the idea is to provide automated provisioning and deployment of network access to managed assetts — […]

17Jan 2023

Spend Less, Get More: How Switching from Legacy PDF Editor Can Elevate Your Business

The PDF is a de facto electronic file format for a wide range of industries, giving organizations a reliable way to present information to others in a format that remains consistent no matter the user’s underlying hardware or software. From financial statements and invoices to purchase orders and healthcare records, PDFs are a fundamental element […]

17Jan 2023

COP27: successes, failures, and next steps

Like its predecessors, COP27 offered mixed results. As the conference’s detractors have long lamented, if COPs were truly effective, we wouldn’t have needed 27 of them. Still, there are some genuine marks of progress to celebrate. A landmark “loss and damage” fund will come as welcome news for the many vulnerable countries that have been […]

17Jan 2023

5 top IoT sustainability trends for 2023

The new year brings familiar problems for cities around the world. Many countries are still facing a multitude of crises: climate change continues to accelerate, economies are under pressure, and consumers are coping with inflation and skyrocketing energy bills. But a new year also brings a renewed sense of optimism and fresh focus. Innovators are […]

17Jan 2023

CIO Leadership live with TAB’s Fred Laury

Fred Laury, Chief Digital Officer at TAB New Zealand, on the importance of empathy to influence and collaborate, how the CIO role is changing post-pandemic, and how he’s learned to adjust the sails in rough waters. Watch this episode: Listen to this episode: CIO, CIO Leadership Live

17Jan 2023

How FiveStars re-engineered its data engineering stack

Building and managing infrastructure yourself gives you more control — but the effort to keep it all under control can take resources away from innovation in other areas. Matt Doka, CTO of FiveStars, a marketing platform for small businesses, doesn’t like that trade-off and goes out of his way to outsource whatever he can. It […]

17Jan 2023

Accelerating Aerospace Organizational Innovation, Speed, and Resilience with Digital Technologies

Aerospace organizations are pushing new boundaries every day. Their products, research, and technologies are changing the way the world works. We see it every day in the way humanity relies on communication, global positioning, and special analytics to enable smart cities, smart cars, and smart factories. It is their ability to systematically innovate, push boundaries, […]

17Jan 2023

US Maritime Administrator to study port crane cybersecurity concerns

The 2023 National Defense Authorization Act (NDAA) passed by Congress and signed by President Biden in late December 2022 was filled with a host of military-related cybersecurity provisions. One little-noticed provision in the bill called for a study of cybersecurity and national security threats posed by foreign-manufactured cranes at United States ports. Under this provision, […]

17Jan 2023

European data protection authorities issue record €2.92 billion in GDPR fines

European data regulators issued a record €2.92 billion in fines last year, a 168% increase from 2021. That’s according to the latest GDPR and Data Breach survey from international law firm DLA Piper, which covers all 27 Member States of the European Union, plus the UK, Norway, Iceland, and Liechtenstein. This year’s biggest fine of […]

17Jan 2023

DigiCert releases Trust Lifecycle Manager to unify certificate management, PKI services

Digital security certificate company DigiCert has announced the launch of DigiCert Trust Lifecycle Manager – a new solution designed to unify certificate authority-agnostic certificate management and public key infrastructure (PKI) services. Available now as part of the DigiCert ONE platform, Trust Lifecycle Manager aims to set a new standard for managing trust within an organization’s […]

17Jan 2023

4 moves CIOs should make to achieve a more efficient IT organization

The effects of such an unpredictable environment are profound, and no organization in any industry is immune. Looking across our client base, we expect to see varying degrees of impact as the turbulence continues. The common thread? In almost every case, there’s an increased need for data insight and technology-enabled agility to reaffirm technology’s position […]

17Jan 2023

The 7 new rules of IT leadership

The CIO role continues to evolve, changing as dramatically as the technology it manages and maintains. Moreover, the pace of the chief IT position’s transformation seems to be accelerating — likewise mirroring the speed of change in the tech stack. Consequently, tech executives must lead, manage, and work differently than they did in the past. […]

16Jan 2023

How AI chatbot ChatGPT changes the phishing game

ChatGPT, OpenAI’s free chatbot based on GPT-3.5, was released on 30 November 2022 and racked up a million users in five days. It is capable of writing emails, essays, code and phishing emails, if the user knows how to ask. By comparison, it took Twitter two years to reach a million users. Facebook took ten […]

16Jan 2023

Choice Hotels’ all-in cloud journey to sustainable business value

Choice Hotels International’s early and big bet on the cloud has allowed it to glean the many benefits of its digital transformation and devote more energies to a key corporate value — sustainability, its CIO maintains. That is largely due to the 80-year-old hotel chain’s tight partnership with Amazon Web Services, says Choice CIO Brian […]

16Jan 2023

7 tell-tale signs of fake DevOps

There’s no doubt that DevOps has helped many IT organizations achieve their goal of delivering applications and services faster and better than traditional software development processes. Unfortunately, while some IT leaders do a fine job of trumpeting DevOps’ benefits, their teams are headed in the wrong direction, embracing half-baked or completely wrong tools and practices. […]

13Jan 2023

Attackers deploy sophisticated Linux implant on Fortinet network security devices

In December network security vendor Fortinet disclosed that a critical vulnerability in its FortiOS operating system was being exploited by attackers in the wild. This week, after additional analysis, the company released more details about a sophisticated malware implant that those attackers deployed through the flaw. Based on currently available information, the original zero-day attack […]

13Jan 2023

Is Your Contact Center Recession-Proof?

In some form or another, a recession is looking increasingly likely in 2023. The Conference Board, a global nonprofit think tank, called for a 96% probability of recession in the U.S. within 12 months from October 2022. That’s a steep increase from the 0% likelihood in early 2020 through early 2022.[1] We can be confident […]

13Jan 2023

Google Cloud for Retailers adds AI-based inventory, e-commerce tools

In a bid to help retailers transform their in-store, inventory-checking processes and enhance their e-commerce sites, Google on Friday said that it is enhancing Google Cloud for Retailers with a new shelf-checking, AI-based capability, and updating its Discovery AI and Recommendation AI services. Shelf-checking technology for inventory at physical retail stories has been a sought-after […]

13Jan 2023

5 Signs Your PMO is on the Hot Seat

Not too long ago, I was on a call with a top-level executive at a large enterprise. During the discussion, I heard something pretty shocking: They were looking seriously at getting rid of the project management office (PMO) altogether. Even more disturbing: I don’t see this as an aberration. In a significant number of businesses, […]

13Jan 2023

Five Trends in 2023 Strategic Portfolio Planning

Heading into 2020, there were plenty of predictions about the year ahead (not to mention detailed business plans, economic forecasts, scheduled events, and so on)—and all were rendered worthless by the pandemic. Looking ahead to 2023, therefore, I do so with a healthy dose of humility, and an acknowledgement that there will be monumental events […]

13Jan 2023

Royal ransomware group actively exploiting Citrix vulnerability

The Royal ransomware group is believed to be actively exploiting a critical security flaw affecting Citrix systems, according to the cyber research team at cyber insurance provider At-Bay. Announced by Citrix on November 8, 2022, the vulnerability, identified as CVE-2022-27510, allows for the potential bypass of authentication measures on two Citrix products: the Application Delivery […]

13Jan 2023

2 Innovations That Can Tip the Balance in Cybersecurity

By John Davis, Retired U.S. Army Major General and Vice President and Federal Chief Security Officer for Palo Alto Networks What critical innovations can change the balance in cybersecurity, providing those of us responsible for defending our organizations with more capabilities against those who would do us harm? This is not just a theoretical exercise. […]

13Jan 2023

Securing Critical Infrastructure with Zero Trust

By Anand Oswal, Senior Vice President and GM at cyber security leader Palo Alto Networks Critical infrastructure forms the fabric of our society, providing power for our homes and businesses, fuel for our vehicles, and medical services that preserve human health. With the acceleration of digital transformation spurred by the pandemic, larger and larger volumes […]

13Jan 2023

NASA overspent $15 million on unused Oracle licenses as it failed to track usage

All Posts The US National Aeronautics and Space Administration (NASA) has overspent about $15 million on Oracle software over the past five years because it lacked a centralized software asset management practice, according to an audit report published by the space agency’s office of the inspector general (OIG).   The report attributes the huge over-expenditure […]

13Jan 2023

Diversity and inclusion: 7 best practices for changing your culture

Diversity and inclusion (D&I) have become necessary missions for most businesses. Research has long shown that diverse teams are more productive, more engaged, and the companies that create them are more profitable. And the murder of George Floyd — and the social unrest that followed — made it clear that taking a stand around social […]

12Jan 2023

Top automation pitfalls and how to avoid them

First Tech Credit Union is a San Jose-based financial institution with more than $16 billion in assets. As the eighth largest in the country, it primarily serves tech companies and their employees, but still has a lot of manual processes in place. “We’re very early in our automation journey,” says Mike Upton, the organization’s digital […]

12Jan 2023

Nvidia offers retail loss prevention software to accelerate accelerator chip sales

GPU manufacturer Nvidia is expanding its enterprise software offering with three new AI workflows for retailers it hopes will also drive sales of its hardware accelerators. The workflows are built on Nvidia’s existing AI technology platform. One tracks shoppers and objects across multiple camera views as a building block for cashierless store systems; one aims […]

12Jan 2023

Innovative Manufacturers are Investing in these Advanced Technologies

In many ways, the manufacturing industry stands on edge—emerging from a pandemic and facing all-time highs in demand yet teetering on inflation-related economic uncertainty and coping with skilled labor shortages. Answering these concerns, smart factories are moving to another edge: edge computing, where operational data from Internet of Things (IoT) sensors can be collected and […]

12Jan 2023

Chatbot Security in the Age of AI

With each passing year, contact centers experience more of the benefits of artificial intelligence. This technology — once only a distant idea portrayed with wonder and fear in science fiction — is now a key part of how businesses and customers interact. According to survey data from Call Centre Helper, customer satisfaction is the number one factor […]

12Jan 2023

CIO Leadership Live with Corinne Sharp, Co founder & CMO of the WIT Network

Women in Technology – Corinne Sharp, Co founder &CMO the WIT Network, talks about building support and community for women in technology. You can learn more at https://thewitnetwork.com/ Watch this video: Listen to this episode: Careers, CIO, CIO Leadership Live

12Jan 2023

CloudSek launches free security tool that helps users win bug bounty

Cybersecurity firm CloudSek has launched BeVigil, a tool that can tell users how safe the apps installed on their phone are, and helps users and developers win bug bounty by helping them identify and report bugs in the code. BeVigil scans all the apps installed on a user’s phone and rates them as dangerous, risky, […]

12Jan 2023

Cybersecurity spending and economic headwinds in 2023

Now that everyone, their brother, sister, and dog have chimed in on cybersecurity predictions for 2023, here are a few observations based on some recent ESG research. First the numbers: 53% of organizations will increase IT spending in 2023, 30% say IT spending will remain flat in 2023, and 18% forecast a decrease in IT […]

12Jan 2023

Data strategy is a differentiator for universities. Here’s how to get it right

Data is critical to success for universities. Data provides insights that support the overall strategy of the university. It can also help with specific use cases: from understanding where to invest resources and discovering new ways to engage pupils, to measuring academic outcomes and boosting student performance. Data also lies at the heart of creating […]

12Jan 2023

3 nonprofits committed to empowering women in tech

A 2020 report from McKinsey found that companies with stronger gender diversity numbers were 25% more likely to outperform their less diverse competition. Yet, while companies have placed a greater emphasis on addressing the gender gap of late, women remain largely underrepresented in IT positions. Here, a number of factors are at play, not the […]

12Jan 2023

Agritech forces gain ground across Africa

“Land never deceives” is a common slogan of farmers around Africa. Many people go into farming entirely, or as a side endeavor, with a high certainty they’ll make money and produce more good for all. And when technology is added to the mix, opportunities multiply. Having the largest area of uncultivated arable land in the […]

12Jan 2023

Journey Beyond transforms its contact center to deliver better customer journeys

Journey Beyond, a part of Hornblower Group, is Australia’s leading experiential tourism group. Headquartered in Adelaide, it operates 13 brands and experiences spanning the country. The company’s overall strategy is to “have a customer experience that’s second-to-none — from the moment they first engage with the company to plan their experience, to when they return […]

12Jan 2023

Events and Awards UK: New for 2023

2023 sees the return of in-person events and awards. Here are the details for our packed schedule this year. January  Applications launch for the 2023 Next CIO cohort on Friday 20th January. The award recognises and celebrates the best rising stars across the IT Sector in the UK. Through interviews at CIO UK, awards, and mentoring opportunities, […]

12Jan 2023

Cybercriminals bypass Windows security with driver-vulnerability exploit

The Scattered Spider cybercrime group has recently been observed attempting to deploy a malicious kernel driver using a tactic called bring your own vulnerable driver (BYOVD) — a warning to security professionals that the technique, which exploits longstanding deficiencies in Windows kernel protections, is still being employed by cybercriminals, according to cybersecurity company CrowdStrike. In […]

11Jan 2023

Study shows attackers can use ChatGPT to significantly enhance phishing and BEC scams

Security researchers have used the GPT-3 natural language generation model and the ChatGPT chatbot based on it to show how such deep learning models can be used to make social engineering attacks such as phishing or business email compromise scams harder to detect and easier to pull off. The study, by researchers with security firm […]

11Jan 2023

Giant Eagle’s Kirk Ball on grocery retail innovations

Kirk Ball, Chief Information Officer/Chief Technology Officer, Giant Eagle, joins host Maryfran Johnson for this CIO Leadership Live interview, jointly produced by CIO.com and the CIO Executive Council. They discuss grocery retail innovations, digital customer strategies, sourcing global talent, augmented reality and more. Watch this video: Listen to this episode: CIO, CIO Leadership Live

11Jan 2023

Understanding Innovation as a Large, Well-established Enterprise

Innovation is crucial to the continuing success of any business, especially well-established enterprises. New products and ideas are tested every day, just as new opportunities are ignored. Blockbuster thought going digital would be too expensive. Blackberry failed to adapt to the changing smartphone market. Toys R Us sued Amazon versus using them to build an […]

11Jan 2023

Timeline of the latest LastPass data breaches

On November 30, 2022, password manager LastPass informed customers of a cybersecurity incident following unusual activity within a third-party cloud storage service. While LastPass claims that users’ passwords remain safely encrypted, it admitted that certain elements of customers’ information have been exposed. The security incident was the latest to affect the service in recent times […]

11Jan 2023

8 top priorities for CIOs in 2023

Welcome to 2023. As the new year arrives, CIOs are facing a challenging to-do list as they strive to maximize IT productivity and efficiency in increasingly unpredictable times. As technology projects, budgets, and staffing grew over the past few years, the focus was on speed to market to maximize opportunity, says Troy Gibson, CIO services […]

11Jan 2023

University of Ottawa’s Martin Bernier on continuous learning

A CIO has to understand the focus of the overall business, of course, but there are usually many segments or different dimensions to consider. In Martin Bernier’s case, as CIO of the University of Ottawa, managing the hyper-dynamic environment of 50,000 students, faculties and research groups is a discipline that requires both a holistic and […]

11Jan 2023

Data leak exposes information of 10,000 French social security beneficiaries

[Editor’s note: This article originally appeared on the Le Monde Informatique website.] More than 10,000 beneficiaries of a local branch of the French social security agency CAF, or Family Allowance Fund, saw their data exposed for about 18 months, after a file containing personal information was sent to a service provider. The mistake, discovered by […]

11Jan 2023

The Delicate Dance Between AI and Human Agents

Artificial intelligence will soon take center stage in your contact center — if it hasn’t already. Artificial intelligence (AI) uptake increased dramatically over the last few years. A 2022 PwC report revealed that more than 70% of companies were already using or planning to deploy AI in some form within their business operations. Business leaders […]

10Jan 2023

Intel boosts VM security, guards against stack attacks in new Xeon release

Intel today announced the rollout of the fourth generation of its Xeon family of server chipsets, detailing several new features under the company’s confidential computing umbrella of security features. Improvements to Intel’s trusted execution environment and a new technique for combatting jump- and return-oriented programming attacks were the most notable upgrades. Xeon’s fourth generation introduces […]

10Jan 2023

How to Future-Proof Your Technology With No-Code/Low-Code Solutions

When it comes to technology, among the biggest concerns companies face is the rigidity and inflexibility of legacy platforms. These platforms make it difficult for business and IT leaders facing ever-evolving business needs to seamlessly implement a change. In some cases, an organization’s current tools simply can’t perform a necessary change or add a new […]

10Jan 2023

5 hot IT hiring trends — and 5 going cold

Hiring tech talent in 2023 means navigating an uncertain economy, the effects of widespread tech industry layoffs, and candidates who want to work for a company with a mission and workplace culture that align with their values, including diversity, equity, and inclusion. IT leaders say the best approach is to focus on adaptability. Firms that […]

10Jan 2023

How to Protect Your IT Systems During Power Interruptions

Nowadays, the world seems to experience once-in-a-century storms almost monthly. These cataclysmic weather events often cause extensive property damage, including major disruptions to the power grid that can cripple IT systems. More commonly, human error and power fluctuations can be just as costly and devastating to continued IT service delivery. To avoid costly outages and […]

10Jan 2023

CIO Leadership Live with Veneeth Purushotaman, Group Chief Information Officer, Aster DM Healthcare

Veneeth Purushotaman, Group CIO at Aster DM Healthcare explains how the hospital digital strategy helped them to become the first private hospital in Dubai to secure HIMSS Stage 6 certification. Watch the episode: Listen to the episode: CIO Leadership Live

10Jan 2023

How Can Contact Centers Use AI-Powered Chatbots Responsibly?

Chatbots have been maturing steadily for years. In 2022, however, they showed that they’re ready to take a giant leap forward. When ChatGPT was unveiled a few short weeks ago, the tech world was abuzz about it. The New York Times tech columnist Kevin Roose called it “quite simply, the best artificial intelligence chatbot ever […]

09Jan 2023

How Graph Analytics is Helping Improve Personalized Healthcare

When the world’s largest healthcare company by revenue went looking for a technology solution that could improve quality of care while reducing costs, the search took ten years. What they found—an innovative way to model healthcare data—is saving the company an estimated $150M annually and enabling its medical professionals to provide accurate and effective care […]

09Jan 2023

The New Way Companies are Harnessing Data at the Edge for Value Added in Real-Time

Imagine an airport that uses computer vision to track errant luggage in real time, or a commercial kitchen able to detect refrigeration conditions and prevent spoilage. Imagine an amusement park outfitting its rides with sensors that can talk directly to operations for upgraded safety and better guest experiences. Imagine a factory or a chain of […]

09Jan 2023

Top 9 challenges IT leaders will face in 2023

Three years ago, IT leaders were squarely focused on how to adopt fledgling AI techniques and approaches into their business models in service of digital transformations that included plans for shifting some workloads to the cloud. But then the pandemic hit, requiring a historic pivot that set some best-laid plans aside and accelerated others. Now […]

09Jan 2023

How SAP Helped Create a Next-Generation Factory for Beauty and Sustainability

The product line is designed to be beautiful as well as sustainable in terms of its durability and benefits for the environment. It’s highly resistant to scratches, abrasions, dry heat, solvents and cleaners, food, ink, makeup, crayons, and much more so that it can stay beautiful for years to come. But what the revolutionary high-pressure […]

09Jan 2023

11 top XDR tools and how to evaluate them

Little in the modern IT world lends itself to manual or siloed management, and this is doubly true in the security realm. The scale of modern enterprise computing and modern application stack architecture requires security tools that can bring visibility into the security posture of modern IT components and integrate tightly to bring real-time threat […]

09Jan 2023

If governments are banning TikTok, why is it still on your corporate devices?

TikTok, the viral app resident on millions of devices, was recently banned from executive branch devices in the United States, as set out in in the recent Omnibus Bill signed by President Joe Biden. The Omnibus Bill, as detailed in CSO Online’s overview, highlighted that the “legislation required the Office of Management and Budget in […]

09Jan 2023

Estes Express shifts gears on customer experience by streamlining data operations

Customers are increasingly demanding access to real-time data, and freight transportation provider Estes Express Lines is among the rising tide of enterprises overhauling their data operations to deliver it. To fuel self-service analytics and provide the real-time information customers and internal stakeholders need to meet customers’ shipping requirements, the Richmond, VA-based company, which operates a […]

06Jan 2023

14 UK schools suffer cyberattack, highly confidential documents leaked

More than a dozen schools in the UK have suffered a cyberattack which has led to highly confidential documents being leaked online by cybercriminals. That’s according to a report from the BBC which claimed that children’s SEN information, child passport scans, staff pay scales and contract details have been stolen by notorious cybercrime group Vice […]

06Jan 2023

Twitter's mushrooming data breach crisis could prove costly

Since Elon Musk purchased Twitter in late October, non-stop turmoil and controversy have dogged the company, from massive staff firings and resignations to reputational damage from Musk’s careless and often bizarre tweets. Now, mushrooming concern around a possible data breach stemming from a now-fixed Twitter flaw is poised to drive the company further down unless […]

06Jan 2023

How CIOs can be pillars of stability in an uncertain world

Stop me if you’ve heard this one before. Several economists, a bank president, and a couple of reporters walk into a bar. The economists lament, “A thick fog of uncertainty still surrounds us.” The bank president wails, “Economic hurricane.” The reporters keen about “gut-churning feelings of helplessness” and “a world of confusion.” Sitting in a […]

05Jan 2023

Attackers create 130K fake accounts to abuse limited-time cloud computing resources

A group of attackers is running a cryptomining operation that leverages the free or trial-based cloud computing resources and platforms offered by several service providers including GitHub,  Heroku, and Togglebox. The operation is highly automated using CI/CD processes and involves the creation of tens of thousands of fake accounts and the use of stolen or […]

05Jan 2023

Low code/no code tools reap IT benefits—with caveats

Low-code/no-code visual programming tools promise to radically simplify and speed up application development by allowing business users to create new applications using drag and drop interfaces, reducing the workload on hard-to-find professional developers. A September 2021 Gartner report predicted that by 2025, 70% of new applications developed by enterprises will use low-code or no-code technologies, up from […]

05Jan 2023

Sara Fenwick, Vice President Business Technology, Ren’s Pets

Women in IT – Sara Fenwick shares her journey as a tech leader in Canada to support diversity, equity and inclusion and her role as a woman in leadership. Watch the episode: Listen to the episode: CIO Leadership Live

05Jan 2023

NATO tests AI’s ability to protect critical infrastructure against cyberattacks

Autonomous intelligence, artificial intelligence (AI) that can act without human intervention, can help identify critical infrastructure cyberattack patterns and network activity, and detect malware to enable enhanced decision-making about defensive responses. That’s according to the preliminary findings of an international experiment of AI’s ability to secure and defend systems, power grids and other critical assets […]

05Jan 2023

The BISO: bringing security to business and business to security

Throughout her career in IT security, Irina Singh has thrived on difficult projects. With a bachelor of science degree in management of information systems and a minor in international business, she now manages a team of business information security liaisons serving four foundational business units at medical device company Medtronic. “One of my slogans is that we […]

05Jan 2023

Why Investing in the Database Market Is More Interesting Than Ever

By Olaf de Senerpont Domis, senior editor at DataStax Premji Invest is an evergreen fund formed to support the Azim Premji Foundation, which was founded by Azim Premji, the former chairman of IT services consultancy Wipro. Premji Invest deploys a “crossover format” (investing in both private and public companies) across the technology, healthcare, consumer, and FinTech […]

05Jan 2023

What it takes to succeed as a CIO today

The market for technology talent has been white hot over the past year. What will the next twelve to eighteen months bring? On a recent episode of the Tech Whisperers podcast, two executive recruiters in the CIO retained search space, Martha Heller, CEO of Heller Search Associates, and Art Hopkins, executive director of Russell Reynolds Associates’ […]

05Jan 2023

Attackers use stolen banking data as phishing lure to deploy BitRAT

In a case that highlights how attackers can leverage information from data breaches to enhance their attacks, a group of attackers is using customer information stolen from a Colombian bank in phishing attacks with malicious documents, researchers report. The group, which might have been responsible for the data breach in the first place, is distributing […]

05Jan 2023

Cyberattacks against governments jumped 95% in last half of 2022, CloudSek says

The number of attacks targeting the government sector increased by 95% worldwide in the second half of 2022 compared to the same period in 2021, according to a new report by AI-based cybersecurity company CloudSek.  The increase in attacks can be attributed to rapid digitization and the shift to remote work during the pandemic, which […]

04Jan 2023

Meta hit with $413 million fine in EU for breaking GDPR rules

Regulatory wrangling results in a huge new fine over Facebook and Instagram data handling, even as Meta vows to appeal and EU data protection groups prepare for a court battle.

04Jan 2023

Why investing in automation could be the answer to navigating a tough economic climate

Despite its potential for relieving pressure on the workforce, automation in the workplace is often seen negatively, as a cause of job losses or a growing skills gap. Yet, done well, automation can provide critical support that frees people up to focus on more impactful work — and can lead to happier, more motivated and […]

04Jan 2023

Society 5.0: What To Do Today To Be Ready To Support Human-Centered Innovation

Society 5.0 was proposed in the “5th Science and Technology Basic Plan” as a future society to which Japan should aspire. It brings together concerns for people, planet, and profit equally in order to build a better world. In Society 5.0, we believe everyone can have an abundant and balanced life. A “new wisdom” will be developed […]

04Jan 2023

What’s New and What’s Next in 2023 for HPC

Cloud, sustainability, scale, and exponential data growth—these major factors that set the tone for high performance computing (HPC) in 2022 will also be key in driving innovation for 2023. As more organizations rely on HPC to speed time to results, especially for their data-intensive applications, the $40B market[1] faces challenges and opportunities. Fortunately, the HPC community […]

04Jan 2023

Salesforce to cut 10% of its global workforce in restructuring plan

Almost two months after cloud-based CRM software provider Salesforce announced it would be cutting around 950 jobs, the company has announced it will lay off about 10% of its workforce, roughly 8,000 employees, and close some offices as part of a restructuring plan. Salesforce had nearly 80,000 global employees as of February 2022, up from […]

04Jan 2023

IBM reorganizes partner program to incentivize indirect sales

IBM is reorganizing its partner program in a bid to serve clients through partners with the same level of expertise as it does directly. This is a big deal for all but its largest clients, as IBM has spent the last two years moving much of its focus to indirect sales channels. IBM now has […]

04Jan 2023

Kudzai Kanhutu, Dean Royal Australasian College of Physicians, Infectious diseases specialist with Royal Melbourne Hospital

Leading digital health expert, Kudzai Kanhutu reflects on how she and her peers helped Melbourne deal with Australia’s worst COVID experiences, forever transforming how we care for our sick and elderly. Watch the episode: CIO Leadership Live

04Jan 2023

Why it might be time to consider using FIDO-based authentication devices

Every business needs a secure way to collect, manage, and authenticate passwords. Unfortunately, no method is foolproof. Storing passwords in the browser and sending one-time access codes by SMS or authenticator apps can be bypassed by phishing. Password management products are more secure, but they have vulnerabilities as shown by the recent LastPass breach that […]

04Jan 2023

Picture This: How Graph Analytics Simplifies Complex Insights

Enterprises across multiple industries and domains are increasingly turning to graph analytics, thanks to its power to uncover complex non-linear patterns and relationships in a dataset that would not be easily visible or apparent using most traditional analytics techniques. Applications of graph analytics is wide-ranging, including customer relationship management, social network analysis, and financial crimes […]

04Jan 2023

9 ways IT leaders can impact sustainability initiatives

Companies across industries are committing to maximizing sustainability within their operations — and IT is at the heart of most of these efforts. In its Worldwide Sustainability/ESG 2023 Predictions, analyst firm IDC sees digital and sustainability transformations converging. “Decision makers are realizing that technology is essential for reaching their ESG goals,” noted Bjoern Stengel, IDC […]

04Jan 2023

5 questions CIOs must ask after Southwest Airlines’ failure

The last thing any CIO wants is to experience catastrophic operational issues during a peak season, but that’s exactly what executives at Southwest Airlines faced last week. While weather may have been the root cause, the 16,000 flights canceled between Dec. 19-28 far exceeded any other airlines’ operational impacts. Experts point to Southwest’s point-to-point operating […]

03Jan 2023

PyTorch suffers supply chain attack via dependency confusion

Users who deployed the nightly builds of PyTorch between Christmas and New Year’s Eve likely received a rogue package as part of the installation that siphoned off sensitive data from their systems. The incident was the result of an attack called dependency confusion that continues to impact package managers and development environments if hardening steps […]

03Jan 2023

LockBit apologizes for ransomware attack on hospital, offers decryptor

LockBit, a prominent ransomware-as-a-service (RaaS) operation, has apologized for an attack on the Toronto-based Hospital for Sick Children, also known as SickKids, and offered a free decryptor.  SickKids, a major pediatric teaching hospital, announced on December 19 that it had called a Code Grey system failure, as it was responding to a cybersecurity incident that […]

03Jan 2023

New Platform Lets IT Leader Put Its Philosophy into Action

Manfred Grossmann has seen the scenario play out over and over. “I think companies that sell new products in an IT environment don’t always use them themselves,” said the vice president of corporate IT and project excellence for digital service provider Sycor Group. “Like everybody else, they focus on things that are not quite new.” […]

03Jan 2023

NHL turns to venue metrics data to drive sustainability

To reduce its carbon footprint and mitigate climate change, the National Hockey League (NHL) has turned to data and analytics to gauge the sustainability performance of the arenas where its teams play. In October, the league, with partner SAP, launched NHL Venue Metrics, a sustainability platform that teams and their venue partners can use for […]

03Jan 2023

10 IT resolutions for 2023

This past year was another pivotal one for IT, with IT leaders learning new lessons for implementing value-oriented IT initiatives and establishing thriving workplace cultures against the backdrop of economic uncertainty. CIOs anticipate addressing these and other challenges in the year ahead, but they also have big plans for 2023. These plans go beyond any […]

03Jan 2023

PureGym’s new CIO Andy Caddy plans for international expansion

Andy Caddy, formerly the group CIO at Virgin Active and group CTO at Whitebread, joins CIO UK Leadership Live to discuss his return to the CIO hotseat at low-cost gymnasium group PureGym, his development as a technology leader over a 30-year career, avoiding a race to the bottom in a low-cost fitness market, and why […]

02Jan 2023

Ransomware ecosystem becoming more diverse for 2023

The ransomware ecosystem has changed significantly in 2022, with attackers shifting from large groups that dominated the landscape toward smaller ransomware-as-a-service (RaaS) operations in search of more flexibility and drawing less attention from law enforcement. This democratization of ransomware is bad news for organizations because it also brought in a diversification of tactics, techniques, and […]

02Jan 2023

5 ways CIOs will disappoint their CEOs in 2023

Surveys can be useful, but when it comes to setting IT’s priorities they’re more rearview mirror than windshield. Which is why we at CIO Survival Guide headquarters have an alternative to suggest: List the promises you’ve made to the CEO for 2023, along with a compendium of what the various business punditries the CEO reads […]