Security, CxO Security Events, ESG, HR, Email, AWS, Lenovo, Microsoft (295.4.Friday)

Security, CxO Security Events, ESG, HR, Email, AWS, Lenovo, Microsoft (295.4.Friday)

Please share this newsletter with your IT friends and colleagues and encourage them to become subscribers!

The most popular articles posted to this newsletter become the basis of ITNE’s white-label, enterprise IT newsletter service which is designed to help Enterprise IT sales reps keep their name and information in front of customers and prospects by providing them with trusted news and insights.

Please contact [email protected] for details.

No alt text provided for this image

Security

CxO Security Events

ESG

HR

Email

AWS News

Lenovo News

Microsoft News

No alt text provided for this image

Security

Cybersecurity Risks & Stats This Spooky Season

From ransomware to remote workers to cyber-extortion gangs to Fred in shipping who clicks on the wrong link, cybersecurity concerns can keep you awake this season and all seasons.

Autumn is here and with it, pumpkins, Halloween, and scary movies. And despite the horrors that accompany the season, for many people, nothing is more terrifying than . cybersecurity risks... more

Establishing A Strong Information Security Policy

There are several considerations for companies creating an information security policy. So, how can organisations ensure they have a strong policy in place which reflects the needs of the business?

There is a well-used saying in cyber security: cyber-attacks aren't a matter of if, but when. Over the last few years, companies have started to build their risk management strategies in line with this ... more

What Is Vulnerability Scanning & Why Should You Do It?

Vulnerability scanning is software that finds cybersecurity vulnerabilities in a company's infrastructure, network, and software.

Vulnerability scanning can also detect and patch these vulnerabilities, so cybercriminals cannot access a company's network, according to a post by the cybersecurity company Rapid7... more

No alt text provided for this image

CxO Security Events

NETWORKComputing: Technology Alone Can't Stop Cyberattacks: Your Guide to Human-Led Threat Hunting (Nov. 2nd)

In this online event, you'll learn why both technology and people are critical for an effective cybersecurity strategy.

Technology solutions alone cannot prevent every cyberattack. Ransomware actors are increasingly exploiting legitimate IT tools, stolen credentials, and unpatched vulnerabilities to penetrate organizations without being detected.

Hosted by NETWORKComputing ... more

CSO: Achieving Cyber Resilience Despite Persistent Email Attacks (Nov 9th)

Join Bob Bragdon, SVP/Managing Director Worldwide, CSO and subject-matter experts from our sponsor, Cyren, for a private, hour-long, interactive, virtual roundtable where we'll discuss how adding an additional layer of security can eliminate the time your security teams spend manually hunting and removing email threats.

Cyber resilience allows organizations to maintain operations in the face of constant cyber attacks. Despite massive investments into email perimeter defenses and user education, 75 malicious messages per 100 mailboxes continue to reach employee mailboxes per month.

Hosted by CSO ... more

Security Boulevard: Debunking Common Myths About XDR (eXtended Detection and Response) (Nov. 10th)

Join us on Thursday, November 10 at 10:00 a.m. PDT/1:00 p.m. EDT as experts break down some common XDR myths and answer questions

There has been tremendous buzz across the cybersecurity community around emerging technology known as extended detection and response (XDR). But many security professionals are unable to agree on a single definition of XDR that's accepted by analysts and vendors purporting to be knowledgeable on the subject.

Hosted by Security Boulevard ... more

No alt text provided for this image

ESG

Compliance Shortfalls Signal Increased Security Concerns

A report by Arctic Fox flagged alarming trends in regulatory compliance, citing the complexity of an evolving risk landscape and budgetary constraints as principal challenges.

Adherence to regulatory compliance standards such as HIPAA and PCI is critical in an era of heightened cyber risk. A new report by Arctic Fox shows that while software supply chain compromises have tripled in the last year, it remains a challenge for many companies to identify the compliance rules they must follow, implement the appropriate controls, and devote sufficient resources to adopting security and compliance frameworks... more

Green Data Center Market To Surpass $300 Billion By 2031

With the increase in advanced technologies and the need to make data center operations more sustainable, the green data center market is expected to surpass $300 billion by 2031, according to Allied Market Research.

The report looks at the green data center market by component, enterprise size, and industry. Allied Market Research says the market will grow by a CAGR of 20% from 2022 through 2031 and be valued at a total of $303.9 billion, up from $49.7 billion in 202 ... more

Sustainable IT: An Environmental And Social Approach To Business Tech

Applying environmental, social, and governance goals to enterprise IT practices can lower operating costs, improve resiliency, and bolster brand image.

Sustainable or green IT is not new. In fact, it has been a topic of discussion among IT leaders for decades. But the concept of sustainability in general, which the United Nations defines as 'meeting the needs of the present without compromising the ability of future generations to meet their own needs,' is something people and organizations are prioritizing more than ever - and for good reason ... more

No alt text provided for this image

HR

10 HR Horror Stories For A Spine-Chilling Halloween

From deepfake job applicants to a false kidnapping claim, 2022 had no shortage of nightmares for HR pros.

To mark Halloween, we're revisiting those stories and others, taking you on a horrifying journey of this year's most spine-chilling HR headlines. Read on for words of caution and some scary lessons learned. ... more

HR Departments Play A Key Role In Cybersecurity

A more secure organization starts with stronger alignment between HR and the IT operation.

A common shortcoming of human resources (HR) departments is that - despite being an operation designed to put humans at the center of how an organization is run - they often fail to adequately align with their IT counterparts and the core technology systems that define how a business is run and protected from cyber-risk ... more

Skills-Based Hiring An HR Strategy For IT Talent Woes

The global IT labor shortage will persist through 2023, and to compete, employers should consider skills-based hiring and compensation, according to Gartner.

One of the themes at Gartner's annual HR conference is the problem of employee turnover. It is particularly acute in IT because of high demand for workers with technical skills. But a potential approach to improving retention and hiring prospects is skills-based compensation, according to the research firm... more

No alt text provided for this image

Email

7 Ways To Increase Email Security With Automated Encryption (Infographic)

Email encryption implementation can be confusing. We have answers.

Every day we hear about a new ransomware attack. Ransomware attacks now occur about 2,000 times each day, almost every 11 seconds around the world ... more

SPF, DKIM, DMARC and BIMI for Email Security

Phishing attacks have been increasing rapidly year on year, and surged as a result of COVID-19. Research shows that 96% of phishing attacks are sent by email.

A common technique used in these attacks is to impersonate well known or trusted brands to entice users to open links and attachments. One way to achieve this is to 'spoof' the email address that is shown to users in their email client. Due to the way email protocols were designed in the 1970s, this can be as trivial as inserting a malicious value into the 'from' or 'reply to' fields, as email security was not a primary concern. This became problematic during the 1990s and 2000s as it was used to deliver spam and phishing emails. ... more

No alt text provided for this image

AWS News

AWS Announces Amazon Neptune Serverless

New serverless option for Amazon Neptune automatically scales graph database workloads to hundreds of thousands of queries-saving up to 90% compared to the cost of provisioning for peak capacity

AWS announced Amazon Neptune Serverless, a new serverless option for Amazon Neptune that automatically scales to support unpredictable and business-critical graph database workloads. Amazon Neptune is a fast, reliable, and fully managed service that makes it easy to build and run applications that need a graph database to efficiently store and query complex and highly connected datasets... more

AWS Named As A Leader In The 2022 Gartner Cloud Infrastructure & Platform Services (CIPS) Magic Quadrant For The 12th Consecutive Year

We believe this report validates AWS's ability to innovate and deliver the broadest and deepest set of services for cloud computing. I encourage you to read the full report to appreciate the details.

This year, and for the twelfth consecutive year, AWS has been named as a Leader in the 2022 Magic Quadrant for Cloud Infrastructure and Platform Services (CIPS). Per Gartner, AWS is the longest-running CIPS Magic Quadrant Leader... more

Lenovo News

Digital Transformation Imperatives Drive Demand For As-A-Service IT

Lenovo TruScale infrastructure as-a-service offerings expand in collaboration with Veeam, Nutanix and Red Hat, gaining traction with customers

Lenovo has announced enhancements to its Lenovo TruScale portfolio, as demand grows from CIOs and IT leaders for the flexibility and value that as-a-service technology solutions deliver throughout the enterprise. New infrastructure offerings include backup and hybrid cloud solutions, delivered in partnership with industry leaders Veeam, Nutanix and Red Hat, which will be made available worldwide in 2023. ... more

No alt text provided for this image

Microsoft News

2022 Diversity & Inclusion Report: Driving Progress Through Greater Accountability And Transparency

Today I am sharing Microsoft's 2022 Global Diversity & Inclusion Report, our fourth annual report and our ninth year of releasing our global workforce demographic data.

This year's data shows that globally we are a more diverse Microsoft overall today than we have ever been, with the highest year-over-year representation progress of the past five-year period for many employee communities. We're motivated by our ongoing progress, and this year's growth feels particularly meaningful in the context of significant challenges around the world. ... more

Microsoft Cloud Strength Drives First Quarter Results

Microsoft Corp. today announced the following results for the quarter ended September 30, 2022, as compared to the corresponding period of last fiscal year

  • Revenue was $50.1 billion and increased 11% (up 16% in constant currency)
  • Operating income was $21.5 billion and increased 6% (up 15% in constant currency)
  • Net income was $17.6 billion and decreased 14% (down 8% in constant currency)
  • Diluted earnings per share was $2.35 and decreased 13% (down 7% in constant currency)

'In a world facing increasing headwinds, digital technology is the ultimate tailwind,' said Satya Nadella, chairman and chief executive officer of Microsoft. 'In this environment, we're focused on helping our customers do more with less, while investing in secular growth areas and managing our cost structure in a disciplined way.' ... more

No alt text provided for this image


To view or add a comment, sign in

Insights from the community

Others also viewed

Explore topics