IT News and Events
Jun 14th, 2021 — Jun 20th, 2021 Generate the Custom HTML Email for this Issue
IT News and Events IT News and Events
Volume 279, Issue 3 << Previous Issue
IT News - CxO
5 Unpopular Decisions Every IT Leader Must Make
Having to make difficult decisions may be the most challenging part of a CIO's job. But from an organizational and career perspective, tough choices can be the most rewarding
Minda Zetlin reports in CIO that, "Mike Anderson spent a lot of time this spring having difficult conversations about Salesforce.

'Salesforce was functionally owned by sales operations,' explains the CIO and chief digital officer of cloud security provider Netskope. 'And people had no governance around the system. You add a field here, add a field there - salespeople love it when you can add more fields in a system like that.'

CIO, June 7th, 2021
(Get More Information . .) open to premium members only

7 IT Cost-Cutting Mistakes You Must Avoid
Are you cutting costs or cutting corners? Your job may depend on knowing the difference
"Successful CIOs are always looking for ways to eliminate excess costs," writes John Edwards in CIO. "Unfortunately, in their zest to trim waste, many IT leaders find themselves falling into common traps that needlessly damage IT and enterprise services and operations.

Knowing what to cut, when to cut, and how deeply to cut, is as much an art as an economic science. A good way to get started is by avoiding the following seven major IT budget-cutting mistakes..."

CIO, June 10th, 2021
(Get More Information . .) open to premium members only

'IT Is The Business' - How The Two Coming Together Is Bringing Benefits To Both
In the past, IT teams have tended to work in silos, apart from the wider business rather than working collaboratively with it. Today, the situation is changing fast
"In the past, IT teams have generally been seen as the engineers or technicians within the organizations they work for," writes Roy Clarke in ITProPortal. "They have tended to work in silos, apart from the wider business rather than working collaboratively with it.

Historically, IT teams often held the keys to innovation and also much of the functional thinking within the business. They frequently had long-standing relationships in place with technology providers, that few across the organization were party to, and they would also sometimes have a virtual monopoly on the in-depth technological knowledge that was more often required in the past to make an informed choice of system..."

ITProPortal, June 7th, 2021
(Get More Information . .) open to premium members only

Why CIOs Must Become Jack-Of-All-Trades In A Technology-Focused World
Innovation and digital transformation remain essential, but for IT leaders to succeed in 2021 and beyond, they must be prepared to wear a number of hats.
"It's time we rethink the CIO role," writes Lloyd Adams in CIODIVE.

"Journalist David Epstein's recently released book, "Range: Why Generalists Triumph in a Specialized World," dives into the lives of famous success stories like Tiger Woods, Roger Federer and the chess-playing Polgar sisters. The case studies discern the value of dedication to a single field, relentless practice and development, and commitment from a young age.

However, Epstein's book works to upend the established lore of popular culture and the church of "10,000 Hours."

To truly succeed, he says, one must be deeply curious about several fields, skills and capabilities. He argues jacks-of-all-trades are poised to innovate and evolve in ways specialists simply never could. To paraphrase Epstein, CIOs cannot just be technology experts anymore either..."

CIODIVE, June 7th, 2021
(Get More Information . .) open to premium members only

5 Ways IT Is Driving New Revenue
CIOs are increasingly being called on to boost bottom lines by driving new revenue. Here's how five IT leaders have transformed IT into engines for business growth
Esther Shein writes in CIO, "IT has gone above and beyond throughout the pandemic to accelerate digital initiatives and keep organizations humming. But coming off a difficult financial year, businesses are leaning even more heavily on IT, tasking IT leaders with the need to create new revenue-generating initiatives.

An overwhelming majority of CIOS (96%) report their role is expanding beyond traditional IT responsibilities, according to IDG's 2021 State of the CIO report. Actions that have increased in importance in becoming more revenue-driven or to support the creation of new products and services include automating business and/or IT processes, interacting directly with customers, and developing customer journeys..."

CIO, June 9th, 2021
(Get More Information . .) open to premium members only

Two Things That Will Never Work Here
When looking to create a more agile business, we can take inspiration from many sources. But ultimately, the problems we need to solve are our own
"When working with organizations on their service delivery capabilities," writes Dave Mangot in CIO, "there are two recurring themes, which are somewhat humorously contradictions. Many organizations simultaneously have a view that they are unique, while also deciding that they can borrow the work of others and everything will work out fine. Both of these things are true.


As someone who has made organizational and technical transformation throughout my career, I've often come up against 'that will never work here.' It often manifests itself as 'we can't be more like Netflix because they only serve movies and we run a serious business.' The fact that Netflix is more highly available to their customers than the 'serious business' is never considered..."

CIO, June 7th, 2021
(Get More Information . .) open to premium members only

An Eye-Opener For Modern CISOs!
Every day a CISO spends their time almost entirely in protecting people, assets, and IT infrastructure. However, are they missing anything? Let's find out!
Richard Singha writes in Security Boulevard, "Don't jump to any conclusion that CISOs are completely blind to the cyber threats surrounding them after reading the title of the blog. Let me remind you a CISO is doing much more than one can imagine!

But as the saying goes, 'there is always room for improvement!'

So, wondering what can be done more?

Before you find that out, let's take a look at some of the things they are doing already.

I said some because there is a reason. If I try to explain all the things a CISO does then one blog wouldn't be enough. But just a scratch on the surface!

Now being said that, I will try to cover as much as possible..."

Security Boulevard, June 11th, 2021
(Get More Information . .) open to premium members only

The CIO's 3 Must-Haves For Creating A Culture Of Automation Innovation
Today's chief information officers (CIOs) do a lot more than manage the technology that runs the business
"They're also increasingly responsible for building a culture of innovation that's essential to thriving in a crowded and competitive market. And for a growing number of CIOs, automation technology such as robotic process automation (RPA) is the key to creating and sustaining that culture. RPA frees the CIO's team-and the business users they support-from the manual, repetitive tasks that are a drag on innovation. It frees them to focus on the creative aspects of their jobs and discover innovative solutions to the challenges they face.

So how can CIOs foster an innovative culture across the enterprise and encourage an 'automation first' mindset with 'how can I automate?' as the first thought when an employee needs help to accomplish a task or improve a work process?..."

CIO, June 10th, 2021
(Get More Information . .) open to premium members only

IT News - Storage
Graphene Enables 10X Higher Storage In HDDs
Graphene-based overcoats used in combination with technologies, such as HAMR and bit patterned magnetic recording, method to pattern magnetic media in small pillars which enables high areal density, are expected to outperform current HDDs providing density of 10Tb/in2 or more
"Researchers at Graphene Flagship partners the University of Cambridge, UK, Ecole Polytechnique Federale de Lausanne (EPFL), Switzerland, Empa-Swiss Federal Laboratories for Material Science and Technology, Switzerland and Graphene Flagship associate member the University of Exeter, UK, in collaboration with colleagues at CSIR-Advanced Materials and Processes Research Institute, India, National University of Singapore (NUS), A*STAR (Agency for Science, Technology and Research), Singapore, the University of Illinois and Argonne National Laboratory, US, have demonstrated that graphene can be used to produce ultra-high density HDD..."
StorageNewsletter, June 7th, 2021
(Get More Information . .) open to premium members only

Enterprise SSD Prices To Increase By More Than 10% Q/Q In 3Q21
Due to growing procurement capacity, with Samsung in control of more than 50% of market
"Enterprise SSD procurement has been rising on the back of growing server shipments since 2Q21, according to TrendForce, Inc.'s investigations.

In particular, the share of 8TB products in shipments of SSDs to data centers has shown the most noticeable growth, which is expected to persist through 3Q21.

However, certain SSD components and parts may be in shortage due to insufficient foundry capacity. TrendForce is therefore revising the Q/Q hikes in contract prices of enterprise SSDs for 3Q21 to 10-15% from the previous projection of 5-10%..."

StorageNewsletter, June 7th, 2021
(Get More Information . .) open to premium members only

Storage Security
Storage security is the group of parameters and settings that make storage resources available to authorized users and trusted networks -- and unavailable to other entities
"These parameters can apply to hardware, programming, communications protocols and organizational policy.

Several issues are important when considering a security method for a storage area network (SAN). The network must be easily accessible to authorized people, corporations and agencies. It must be difficult for a potential hacker to compromise the system. The network must be reliable and stable under a wide variety of environmental conditions and volumes of usage. Protection must be provided against online threats such as viruses, worms, Trojans and other malicious code..."

SearchStorage, June 9th, 2021
(Get More Information . .) open to premium members only

Worldwide Enterprise External OEM Storage Systems Market Revenue Increased 1.7% During the First Quarter of 2021
According to the International Data Corporation (IDC) Worldwide Quarterly Enterprise Storage Systems Tracker, global market revenue for enterprise external OEM storage systems grew 1.7% year over year to $6.7 billion during the first quarter of 2021 (1Q21).
"Total external OEM storage capacity shipped was up 16.3% year over year to 19.9 exabytes during the quarter.

1Q21 revenue generated by the group of original design manufacturers (ODMs) selling directly to hyperscale datacenters grew at 14.1% year over year to $5.6 billion, while capacity shipped grew 28.3% year over year to 70.2 exabytes. Enterprise storage capacity shipments for the entire market (External OEM + ODM Direct + Server-Based Storage) increased 20.6% to 118.8 exabytes..."

IDC, June 10th, 2021
(Get More Information . .) open to premium members only

New Seagate Disk Tech Could Drive Down The Cost Of High-Capacity HDDs
Seagate reportedly secures a dozen customers for new drives
"Seagate has been working on a cleverly tweaked version of its conventional hard disk drives (HDD) that not just improves speeds, but might also be cheaper to produce," reports Mayank Sharma in

"Dubbed Mach.2, the new tech gets its name from the fact that these drives use two actuators instead of one, which helps significantly improve both the sequential and random read/write speeds.

Seagate recently announced its first dual-actuator disk, the Mach.2 Exos 2X14, which according to the official spec sheet offers a sustained transfer rate of 524MB/s making it the world's fastest HDD...", June 7th, 2021
(Get More Information . .) open to premium members only

IT News - AI
Why The Future Of AI Is On The Edge
Today's societies are becoming ever more data-centric and automated. Autonomous systems are already hitting our roads, oceans, and air space. Millions of smart sensors are getting embedded into cars, smart cities, smart homes, and warehouses using intelligent system, promising to connect everything from people to machines and even robotic agents
"This rapid growth in the number of intelligent applications is expected to drive the growth of the edge AI software market.

What's driving edge AI?

Most AI processes are carried out using cloud-based data centers that need substantial compute capacity. These expenses can add up quickly. Also, when AI applications are run on cloud technologies, they experience latency problems, making it difficult to provide fast responses..."

CXOtoday, June 10th, 2021
(Get More Information . .) open to premium members only

Machine Learning At The Edge: TinyML Is Getting Big
Being able to deploy machine learning applications at the edge is the key to unlocking a multi-billion dollar market
"Is it $61 billion and 38.4% CAGR by 2028 or $43 billion and 37.4% CAGR by 2027?" asks George Anadiotis in ZDNet. "Depends on which report outlining the growth of edge computing you choose to go by, but in the end it's not that different.

What matters is that edge computing is booming. There is growing interest by vendors, and ample coverage, for good reason. Although the definition of what constitutes edge computing is a bit fuzzy, the idea is simple. It's about taking compute out of the data center, and bringing it as close to where the action is as possible..."

ZDNet, June 7th, 2021
(Get More Information . .) open to premium members only

Study Shows AI-Generated Fake Reports Fool Experts
If you use such social media websites as Facebook and Twitter, you may have come across posts flagged with warnings about misinformation
Priyanka Ranade writes in GCN, "So far, most misinformation - flagged and unflagged - has been aimed at the general public. Imagine the possibility of misinformation - information that is false or misleading - in scientific and technical fields like cybersecurity, public safety and medicine.

There is growing concern about misinformation spreading in these critical fields as a result of common biases and practices in publishing scientific literature, even in peer-reviewed research papers. As a graduate student and as faculty members doing research in cybersecurity, we studied a new avenue of misinformation in the scientific community. We found that it's possible for artificial intelligence systems to generate false information in critical fields like medicine and defense that is convincing enough to fool experts..."

GCN, June 7th, 2021
(Get More Information . .) open to premium members only

IT News - Technology
How GaN Is Changing The Future Of Semiconductors
GaN is helping the semiconductor industry shake its reliance on silicon
"The global semiconductor shortage is delaying the production of everything from refrigerators and microwaves to gaming consoles and smartphones," warns Desire Athow in "Experts are saying it could take months for the industry to recover, but in reality the shortage is changing consumer electronics forever.

The industry has been reliant on silicon for decades, but the chip shortage is helping to make electronic devices more environmentally friendly, more efficient and smaller. More companies are turning to gallium nitride (GaN), because it is easier and faster to produce than silicon chips, among other benefits...", June 7th, 2021
(Get More Information . .) open to premium members only

Source Photonics Releases 800G Optical Transceivers For Datacenter And Telecom Applications
Source Photonics announced a range of 800G optical transceivers for datacenter and telecom applications during the OFC 2021 virtual event
"As the initial wave of widescale deployment of 400G is taking place in datacenters, hyperscale datacenter customers are already looking into 800G and beyond, together with the release of 25.6T switching ASIC, to further support the increasing demand for bandwidth-intensive applications.

The 800G client interfaces will not only double port density over currently available 400G transceivers, but also are expected to further reduce per gigabit power and cost over equivalent 400G client interfaces..."

HelpNet Security, June 8th, 2021
(Get More Information . .) open to premium members only

RISC-V Boffins Lay Out A Plan For Bringing The Architecture To High-Performance Computing
RISC-V International, the nonprofit at the helm of the free and open-source CPU instruction set architecture, says it is writing a high-performance computing (HPC) roadmap of "new features and capabilities."
"For an architecture which only began life at the University of California, Berkeley, in 2010, RISC-V has enjoyed considerable success," writes Gareth Halfacree in The Register.

"A wealth of products based on RISC-V are already in the market, with more arriving regularly, but the majority of these, like Seagate's storage processor designs and the OpenTitan root-of-trust (RoT), target embedded or otherwise less performance-critical applications.

RISC-V International, though, believes there are more strings to its bow. In an announcement from member Dr John D Davis, chair of the RISC-V Special Interest Group on High Performance Computing (SIG-HPC), it has set out its stall for taking over the performance end of the market..."

The Register, June 10th, 2021
(Get More Information . .) open to premium members only

IT News - Security
Becoming A Self-Taught Cybersecurity Pro
Cybersecurity pros are in high demand. Here's how one system administrator developed his own personal online night school curriculum to gain the expertise for a successful security career
"If you are looking to take your IT career in a new direction where there's loads of demand," writes Jessica Davis in InformationWeek, "there are several interesting subspecialities, and the pay continues to increase, a career in cybersecurity can't be beat right now.

It's impossible to ignore all the high-profile attacks -- from the SolarWinds supply chain attack impacting multiple government agencies, to the more recent spate ransomware attacks against gas pipeline company Colonial Pipeline and meat producer JBS, to name a few. The move to work from home and to accelerate digital transformations has only increased the alert level and the demand for cybersecurity pros..."

InformationWeek, June 9th, 2021
(Get More Information . .) open to premium members only

6 Minimum Security Practices To Implement Before Working On Best Practices
Every Windows network admin can improve their security posture by focusing on these six basic areas.
Susan Bradley writes in CSO Online, "We all want to abide by security best practices, but who decides what is best? If something is best for one firm, it is best for all? Too often we do not take the time to analyze what we are protecting to ensure we are protecting it as well as we can. There are, however, some basic techniques that can be deployed in nearly all organizations. I'm calling these recommendations 'minimum practices.' Here are six to consider..."
CSO Online, June 9th, 2021
(Get More Information . .) open to premium members only

ISACA Workforce Report - Avast
Since 1967, ISACA has been providing a centralized source of information and guidance within the IT governance and control field
"ISACA's State of Cybersecurity 2021, Part 1 report contains the organization's update on its workforce development efforts. This is the seventh year that ISACA has surveyed its membership, and the report is based on more than 3,600 respondents from 120 countries, with more than half of them saying their primary jobs are directly in the field.

In spite of the Covid-19 pandemic, overall cybersecurity spending has dropped, which seems counterintuitive but continues to be a trend that ISACA has been documenting for several years (see the chart below)..."

Security Boulevard, June 7th, 2021
(Get More Information . .) open to premium members only

Cybersecurity Maturity Model Certification (CMMC)
The Cybersecurity Maturity Model Certification (CMMC) is a new universal standard set by the Department of Defense (DoD)
Ty Mezquita writes in Business 2 Community, "The model was developed due to slow adoption of its predecessor, the Defense Acquisition Federal Regulation Supplement (DFARS). There's been widespread recognition that the one-size-fits-all prescriptions in DFARS weren't working and was leading DoD contractors to falsely claim compliance to the prescriptions it contained when in fact they were not compliant. This recognition has led to the formation of a five-level cybersecurity maturity scale, which DoD contractors can use to assess themselves and become certified. This is known as the CMMC standard..."
Business 2 Community, June 11th, 2021
(Get More Information . .) open to premium members only

The Cybersecurity Hero's Journey Is Ours
One of the oldest cliches in security is 'security is a journey, not a destination.' It is clear that, when it comes to defending ourselves and the enterprise, we never reach the end
"There is always going to be a new challenge. Life is that way. We are always moving," writes Charles Kolodgy in Security Boulevard.

"One theme associated with life's travels is the 'hero's journey.' This template - where a hero goes on an adventure, is victorious over a challenge and then is forever changed because of it - took root in ancient cultures as people used epic tales to describe the origin of the world, explain human interaction and rationalize strange phenomenon. The tales of Gilgamesh, Odysseus and Beowulf are examples. In the modern era, the hero's journey is a formula used for today's entertainment. This is epitomized by the 'Lord of the Rings,' 'Star Wars' and 'The Matrix.'.."

Security Boulevard, June 7th, 2021
(Get More Information . .) open to premium members only

Colonial Pipeline Attack Began With Compromised Account Credentials
A VPN service without 2FA gave criminals access that resulted in a $4.5 million ransom pay-out.
"The Colonial Pipeline ransomware attack, which saw one of the largest pipelines in the US shut down its servers and raised the price of oil to $3 per gallon, began with a compromised VPN account, investigators have found.

As reported by multiple media sources, including The Verge, the VPN service the company used did not have two-factor authentication set up. Once the login credentials for the VPN were obtained, criminals gained easy access to the network..."

ITProPortal, June 7th, 2021
(Get More Information . .) open to premium members only

The Importance Of Identity And Access Management (IAM) In Cloud Infrastructure
The widespread adoption of cloud infrastructure has turned identity into the new perimeter. Indeed, many IAM solutions have evolved to offer management of human identities and entitlements
"But first-generation cloud IAM lacks the granularity, visibility and security capabilities required to manage the complex entitlements of service identities - which make up the bulk of identities in cloud infrastructure environments. CIEM bridges this gap by providing advanced identity mapping, risk assessment and anomaly detection for cloud infrastructure services. Read on to learn how to easily and securely manage human and service identities, and their entitlements, to secure your organization's cloud infrastructure..."
Security Boulevard, June 7th, 2021
(Get More Information . .) open to premium members only

IT News - Linux
Lenovo's Thinkpad X1 Carbon Gen 9 Laptop Now Comes With Fedora Linux Or Ubuntu
Fedora Project's leader Matthew Miller announced today on Twitter that the ThinkPad X1 Carbon Gen 9 laptop from Lenovo now comes with Fedora Linux pre-installed.
Marius Nestor writes in 9to5linux, "Lenovo is keeping to its promise of delivering more and more Linux laptops, and now the hardware giant is selling the 9th Generation of the ThinkPad X1 Carbon notebook with the Fedora Linux or Ubuntu as default operating systems.

Last year in August, Lenovo was selling the ThinkPad X1 Gen 8 with Fedora Linux, but now you can buy the newer model, which features ultra-thin and ultra-light redesigned chassis, an impressive 16:10 display, a wider touchpad, and larger battery..."

9to5linux, June 7th, 2021
(Get More Information . .) open to premium members only

CloudLinux Simplifies & Enhances Linux Security With Its TuxCare Unified Enterprise Support Services
CloudLinux, the sponsor of the forever-free AlmaLinux OS enterprise Linux distribution, is now automating, simplifying and securing Linux operations with its TuxCare unified enterprise support services
Brittany Day writes in LinuxSecurity, "An expansion of CloudLinux's KernelCare and Extended Lifecycle Support brands, Tuxcare provides comprehensive, fully-managed support, maintenance, and security for enterprise Linux systems, empowering businesses with greater flexibility, reduced maintenance costs and enhanced security. LinuxSecurity researchers spoke with CloudLinux President and Chief Revenue Officer Jim Jackson to gain further insight into how TuxCare is revolutionizing Linux security for the enterprise. This article will explore the services that TuxCare provides to optimize the level of security and convenience that business experience using Linux..."
LinuxSecurity, June 7th, 2021
(Get More Information . .) open to premium members only

IT News - FOSS
Nginx Is Now The World'S #1 Web Server, Overtaking Apache
W3Techs announced that after many years of steady growth in market share, Nginx is now the most popular web server in the world, edging out Apache HTTP Server
Bobby Borisov writes in linuxiac, "Back in 2009, Nginx had a market share of 3.7%, Apache had over 73% and Microsoft-IIS had around 20%, but the web server field today has changed significantly. According to Netcraft's statistics, now Nginx is leading with just over one third of the market, at 33.8%. Apache is basically head-to-head at the moment, but declining. The gap between Apache and Nginx was still 6.6% one year ago.

In addition to, according to the W3Techs' statistics, the top 3 web servers are Nginx (34.1%), Apache (33.2%), and Cloudflare Server (18.7%). The Cloudflare Server at rank 3 is particularly interesting in that context, as it is derived from Nginx..."

linuxiac, June 11th, 2021
(Get More Information . .) open to premium members only

New Google Tool Reveals Dependencies For Open Source Projects
Google has been working on a new, experimental tool to help developers discover the dependencies of the open source packages/libraries they use and known security vulnerabilities they are currently sporting
"Open Source Insights is a Google Cloud Platform-hosted tool that's accessible via a website into which users can enter the name of specific open source packages and get an overview of how they are put together.

It shows:

  • Information about the package (description, ownership, links)
  • Dependencies (components the package depends on)
  • Dependents (packages that depend on it)
  • Security advisories (known vulnerabilities in the package and dependencies, unmanaged dependencies, etc.)
  • License information

Read on

HelpNet Security, June 7th, 2021
(Get More Information . .) open to premium members only

Sections in this issue:
click to jump to section