IT News and Events  
February 12th, 2024 — February 18th, 2024
Volume 311, Issue 2
 
  
 
 
Fortinet News
February 15, 2024
Article #139331
Volume 311
Issue 2
Fortinet News
 

Android/Spynote Moves To Crypto Currencies
Fortinet News, Thursday, February 15th, 2024

Since then, it has grown into one of the most common families of malware for Android, with multiple samples, integration of other RATs (e.g. CypherRat), and a large family of over 10,000 samples. There are multiple variants and integrations of other RATs, and since 2023 there has been a growing interest in financial institutions. more

February 14, 2024
Article #139332
Volume 311
Issue 2
Fortinet News
 

TicTacToe Dropper
Fortinet News, Wednesday, February 14th, 2024

Droppers within this group employ multiple stages of obfuscated payloads loading reflectively in memory. Some of the final stage payloads we identified include Leonem, AgentTesla, SnakeLogger, RemLoader, Sabsik, LokiBot, Taskun, Androm, Upatre, and Remcos. We have named this group of payloads 'TicTacToe dropper' due to a common Polish language string, 'Kolko_i_krzyzyk,' found in multiple earlier samples of the dropper, which translates to TicTacToe in English. While not all versions of this group of droppers contain this string, commonalities in their behavior led us to this grouping. more

IT News - CxO
February 17, 2024
Article #139284
Volume 311
Issue 2
IT News - CxO
 

5 Top Enterprise Risk Management Trends We're Tracking In 2024
theCUBE research, Wednesday, February 7th, 2024

Enterprise Risk Management from the 30,000-Foot View

Business continuity, risk mitigation, and enterprise risk management processes might not be sexy terms, but they all work together and play an outsized role in business success.

Before we dig into the trends shaping 2024, here's a 30,000-foot view of Enterprise Risk Management and what it does. For starters, ERM solutions are gaining ground as people understand their vital role in risk management and protection. Global News Wire reports that the enterprise risk management market size is expected to surge from $10.58 billion in 2023 to $11.89 billion in 2024, boasting in impressive CAGR of 12.5%. more

February 17, 2024
Article #139285
Volume 311
Issue 2
IT News - CxO
 

AI High On Agenda For CIOs In 2024
Techstrong.ai, Friday, February 9th, 2024

According to the report's key findings, an overwhelming 94% of surveyed CIOs express intentions to ramp up their investments in AI technologies.

Despite this enthusiastic embrace of AI, 84% of respondents had trouble sorting through with the over-abundance of AI tools saturating the market - this inundation poses a significant hurdle for CIOs seeking to pinpoint the optimal solutions tailored to their specific requirements.

Moreover, the report highlights a pressing concern among nearly three-quarters (72%) of CIOs regarding the phenomenon of application sprawl within their organizations. more

February 17, 2024
Article #139288
Volume 311
Issue 2
IT News - CxO
 

Risk In 2024
Cyber Defense Magazine, Tuesday, February 6th, 2024

CISOs are leading the data privacy charge for their organizations. In a constantly changing environment, security leaders are always on the lookout for IT solutions that will shore up customer confidence and ensure regulatory compliance. And CISOs know best of all that failure to do so can have disastrous consequences.

In 2024, CISOs will need to adapt to a wave of new risks. Chief among these will be the challenges associated with AI, regulation and enforcement, and the very role of the CISO itself. more

February 17, 2024
Article #139289
Volume 311
Issue 2
IT News - CxO
 

Server And Storage Spending Growth Looks Rosy Out To 2027
The Next Platform, Wednesday, February 7th, 2024

We like feeds and speeds, but we like dollars and sense, too.

The latest datacenter infrastructure spending track from IDC is out for the third quarter of 2023, and its forecast for all of 2023 allow us to take a pretty good stab at figuring out what spending on servers and storage looked like in the final quarter of 2023. (It's just the addition of three numbers quarterly subtracted from the bigger annual forecast. It's not rocket science, and we know because we studied rocket science.) more

February 17, 2024
Article #139290
Volume 311
Issue 2
IT News - CxO
 

What CIOs Stand To Gain In A Tech M&A Revival
CIODIVE, Friday, February 9th, 2024

Tech sector merger and acquisition activity is heating up again after a year-long economic freeze, punctuated in March by the alarming collapse of Silicon Valley Bank.

IBM announced in January it would acquire Advanced's mainframe modernization unit for an undisclosed sum, expanding a portfolio that includes the $4.6 billion purchase of business management software company Apptio announced in June. more

IT News - Security
February 17, 2024
Article #139299
Volume 311
Issue 2
IT News - Security
 

5 Trends & Advances That Are Set To Define Cloud Security In 2024
Data Science Centrsl, Monday, February 5th, 2024

We're looking at the big players, the game changers, the trends that are going to set the stage for how we protect our digital skies.

So, grab your virtual umbrella (or shield, for that matter), and let's explore these five trends set to redefine cloud security in 2024.

1. AI & ML: The dynamic duo of defense

2. Zero Trust architecture

3. Enhanced encryption techniques

4. Regulatory compliance as a baseline, not a ceiling

5. The rise of cloud security platforms more

February 17, 2024
Article #139300
Volume 311
Issue 2
IT News - Security
 

6 Multi-Cloud Identity Management Tips And Best Practices
Search Security, Monday, February 5th, 2024

It's common for organizations to use multiple clouds, including a mix of public, private and hybrid. The multi-cloud model introduces added complexity to cloud identity and access management, however, especially with identity now at the forefront of the modern security perimeter.

A number of tips and best practices have emerged that help alleviate these challenges and ensure identities and access controls are secure and effective across cloud environments. more

February 17, 2024
Article #139301
Volume 311
Issue 2
IT News - Security
 

Beyond The Basics: Advanced Insights Into Secrets Management Challenges
Security Boulevard, Monday, February 5th, 2024

But let's not beat around the bush; this isn't your typical 'lock it and leave it' scenario; it's about maintaining an impenetrable defense in an era where threats evolve as rapidly as technology.

Whether cloud-based platforms like Kubernetes or traditional IT infrastructures, each presents its unique battlefield. Missteps in managing secrets aren't just errors; they are breaches waiting to happen - a scenario every leader strives to avoid. more

February 17, 2024
Article #139302
Volume 311
Issue 2
IT News - Security
 

Deepfake Video Call Scam Cons Company Out Of $25 Million
readwrite, Monday, February 5th, 2024

In what police described as the first scam of its kind in Hong Kong, scammers used deepfake technology to digitally recreate company executives and impersonate them on a video conference call. The technology allowed the scammers to generate fake but convincing representations of targeted individuals that replicated their voices and appearances.

The scam began in mid-January when an employee in the Hong Kong branch's finance department received a phishing message, seemingly from the company's UK-based chief financial officer, reports the South China Moring Post. The message claimed a secret transaction had to be conducted. Although initially doubtful, the employee was convinced after being invited to a video call in which the CFO and other familiar employees appeared to be present. more

February 17, 2024
Article #139303
Volume 311
Issue 2
IT News - Security
 

Hackers Are Lying Low In Networks To Wage Critical Infrastructure Attacks - Here's How They Do It
ITPro, Friday, February 9th, 2024

In their attempts to gain access to systems the attackers are paying particular attention to network and IT staff who often hold the keys to the system.

The warning from the National Security Agency (NSA), FBI and the US Cybersecurity and Infrastructure Agency (CISA) is a remarkably detailed breakdown of how a Chinese state-backed group, known as Volt Typhoon, has compromised the networks of multiple critical infrastructure organizations across communications, energy, transportation systems, and water sectors. more

February 17, 2024
Article #139304
Volume 311
Issue 2
IT News - Security
 

Identity Management Is The New Perimeter
Solutions Review, Monday, February 5th, 2024

Recent SEC charges against the CISO of SolarWinds shook many in the cybersecurity industry as they made real the long-lasting consequences of cyber incidents. The charges also focused attention on the method used to leverage compromised SolarWinds systems way back in 2020: abuse of privileged accounts. Once attackers gained access to the privileged account status of SolarWinds deployments, they were able to do essentially whatever they wanted within numerous SolarWinds customers. more

February 17, 2024
Article #139305
Volume 311
Issue 2
IT News - Security
 

Ransomware Payments In 2023 Hit $1 Billion: Chainalysis
Security Boulevard, Thursday, February 8th, 2024

'2023 marks a major comeback for ransomware, with record-breaking payments and a substantial increase in the scope and complexity of attacks - a significant reversal from the decline observed in 2022,' researchers with Chainalysis wrote in a report this week. 'Although 2022 saw a decline in ransomware payment volume, the overall trend line from 2019 to 2023 indicates that ransomware is an escalating problem.'

The report from the blockchain analysis firm echoes themes of the growing number and sophistication of ransomware attacks other cybersecurity vendors saw in 2023. Unit 42, Palo Alto Networks' threat intelligence arm, said in a report this week that the number of victims reported on ransomware leak site in 2023 jumped 49% year-over-year and that at least two dozen new groups emerged, driven by the amount of money to be had. more

February 17, 2024
Article #139306
Volume 311
Issue 2
IT News - Security
 

Top 2024 Scams: The Top Predicted Scams For This Year
Click Armor, Monday, February 5th, 2024

2023 was an intense year for cyber security, with big companies being hit by malware and AI increasing the number of opportunities for cyber criminals. Unfortunately, cyber criminals and scams are only going to get smarter and more common this year.

Whether you are part of the security world or just interested in protecting your personal data, here are the top scams for the year that you should be aware of:

  • Deep fakes
  • Social engineering
  • Trusted organizations phishing scam
  • Job listing scam
  • The Grandparents Scam

In the ever-evolving landscape of digital threats, awareness and vigilance are our greatest defences. more

IT News - Gestalt IT
February 17, 2024
Article #139294
Volume 311
Issue 2
IT News - Gestalt IT
 

We Need AI To Enable Everything (25 Minutes)
Gesalt IT, Wednesday, February 7th, 2024

They also focus on issues with opaque algorithms and how AI can actually be useful in helping professionals with their daily work.

Podcast Information:

Tom Hollingsworth is a Networking and Security Specialist at Gestalt IT and Event Lead for Tech Field Day. You can connect with Tom on LinkedIn and X/Twitter. Find out more on his blog or on the Tech Field Day website.

Zoe Rose is a security team lead specializing in SecOps and cohost of the Imposter Syndrome Network Podcast. You can connect with Zoe on LinkedIn or on X/Twitter and listen to the Imposter Syndrome Network Podcast.

Dominik Pickhardt is an InfoSec Architect. You can connect with Dominik on LinkedIn or on X/Twitter, or read more on his website. more

IT News - Edge
February 17, 2024
Article #139291
Volume 311
Issue 2
IT News - Edge
 

Edge AI In Data Centers: Revolutionizing Data Processing
Techstrong.ai, Monday, February 5th, 2024

Edge AI is deploying AI algorithms and models directly on local edge devices such as sensors or Internet of Things (IoT) devices. Organizations can achieve faster processing speeds and detect issues in real-time by running AI algorithms on local devices with edge computing capacity. This integration allows for the deployment of AI at the edge, enabling insights and intelligence without relying on distant data centers. more

IT News - MFA
February 17, 2024
Article #139296
Volume 311
Issue 2
IT News - MFA
 

MFA Isn't Always Keeping Businesses Safe From Cyberattack
techradar, Friday, February 9th, 2024

If you think multi-factor authentication (MFA) is the be-all and end-all security solution for your business, you might want to think again. New research from IDEE found that despite having MFA deployed, many firms still suffered devastating data breaches.

The company recently surveyed more than 500 IT and cybersecurity professionals working within UK businesses. Of that number, 95% have deployed some form of MFA. Still, less than half (44%) did not suffer a cybersecurity incident in the past year. more

IT News - Storage
February 17, 2024
Article #139307
Volume 311
Issue 2
IT News - Storage
 

GigaOM Radar For Primary Storage For Large Enterprises
StorageNewsletter.com, Monday, February 5th, 2024

We're in a transition phase, moving from storage systems designed to be deployed in data centers to hybrid and multicloud solutions, with similar functionalities provided on physical or virtual appliances, as well as through managed services.

The concepts of primary storage, data, and workloads have radically changed over the past few years. Mission- and business-critical functions in enterprise organizations used to be concentrated in a few monolithic applications based on traditional relational databases. In that scenario, block storage was often synonymous with primary storage, and performance, availability, and resiliency were prioritized, usually at the expense of flexibility, ease of use, and low cost. more

IT News - AI
February 17, 2024
Article #139272
Volume 311
Issue 2
IT News - AI
 

Shadow AI Poses New Generation Of Threats To Enterprise IT
SearchSecurity, Tuesday, February 6th, 2024

Large language model AI is the new black, at least for now.

But, even if the IT industry has hit the peak of AI hype -- and it is not clear that it yet has -- the world is still a long way from understanding how to use this newly powerful AI category responsibly, safely, effectively and efficiently. And unsanctioned AI, also known as shadow AI, poses even more challenges. more

IT News - BI
February 17, 2024
Article #139273
Volume 311
Issue 2
IT News - BI
 

Business Intelligence And Analytics Trends In 2024
Dataversity, Tuesday, February 6th, 2024

Here are some general trends for data analytics and BI:

  • Use of Advanced Algorithms in Data Analysis
  • Automated Predictive Analytics
  • Big Data for Enhanced BI Strategies
  • Emerging Technologies Shaping the Future of Data Analytics and BI
  • Top Six Data Analytics Trends in 2024
  • Top Six BI Trends for 2024
  • What Is the Future of Data Analytics and BI?

Read on for details. more

IT News - ERP
February 17, 2024
Article #139293
Volume 311
Issue 2
IT News - ERP
 

Cloud ERP Vs. On-Premises ERP: Key Differences
SearchERP, Friday, February 9th, 2024

In the ERP world, the debate is over, and the cloud has won. Leading ERP vendors, including Oracle, SAP and Microsoft, have shifted their focus almost entirely to the cloud, and their on-premises versions only get token attention, mostly for bug fixes.

"Vendors are putting their innovation efforts toward their cloud-based solutions rather than on-prem," said Tim Crawford, president of Avoa, an IT consultancy. "Some innovations will be added to the on-prem version, but it's not feasible for things like generative AI to try and add capabilities locally." more

IT News - Operations
February 17, 2024
Article #139297
Volume 311
Issue 2
IT News - Operations
 

8 Dangers Of Shadow IT And How To Manage Them
SearchCIO, Tuesday, February 6th, 2024

If an ounce of prevention is worth a pound of cure, then CIOs and their teams should be aware that allowing shadow IT can weaken an organization in more ways than one. But there are ways to minimize or eliminate the dangers.

Shadow IT occurs when employees get frustrated by the IT department's slow response to trouble reports, refusal to update a system or another situation where IT is not accommodating user requests or complaints. This frustration can result in the creation of an invisible or "shadow" IT activity, usually by employees with IT skills willing to bypass IT policies and procedures to get what they want. more

February 17, 2024
Article #139298
Volume 311
Issue 2
IT News - Operations
 

Data Center Sustainability Predictions, Hopes, And Questions For 2024
DataCenter Knowledge, Tuesday, February 6th, 2024

Amid the rapid growth of AI and video-streaming sectors, analysts look ahead to some of the most promising data center sustainability developments and forecast what work will need to be done for the industry to move closer to reaching its green aspirations.

Expect Innovations in Liquid Cooling Products and AI

Greater adoption of liquid cooling solutions is one of the innovations Dan Thompson, Principal Research Analyst for Data Centers at S&P Global Market Intelligence, believes will drive energy efficiency across the industry. more

IT News - Cloud
February 17, 2024
Article #139278
Volume 311
Issue 2
IT News - Cloud
 

A Tale Of Three Cloud Builders, All Seeking Dominance
The Next Platform, Monday, February 5th, 2024

And the threat is ever-present, and has been for the past several years, which is why you see the AWS share of the cloud revenue stream hovering around a third. At some price and some level of function, customers will move, and moreover, there are customers who love the Microsoft's Windows Server platform, its development tools, and its application software and there are other customers who think Google has the smartest infrastructure on the planet and is the safest place to invest in the future of compute and storage. more

February 17, 2024
Article #139279
Volume 311
Issue 2
IT News - Cloud
 

Enterprise Cloud Spend Jumped In Q4, Nudged Upward By AI
CIODIVE, Monday, February 5th, 2024

As annual enterprise cloud spend hurtled past the $500 billion threshold last year, AI investments began to feed growth in the infrastructure services market. The immediate impact on overall IT spend has been modest, according to analyst firm Gartner, but generative AI investments registered in cloud.

'It takes a lot to move the needle, but AI has done just that,' the SRG report said. more

February 17, 2024
Article #139280
Volume 311
Issue 2
IT News - Cloud
 

Why Companies Are Leaving The Cloud
InfoWorld, Friday, February 9th, 2024

Don't look now, but 25% of organizations surveyed in the United Kingdom have already moved half or more of their cloud-based workloads back to on-premises infrastructures. This is according to a recent study by Citrix, a Cloud Software Group business unit.

The survey questioned 350 IT leaders on their current approaches to cloud computing. The survey also showed that 93% of respondents had been involved with a cloud repatriation project in the past three years. That is a lot of repatriation. Why? more

IT News - Wireless
February 17, 2024
Article #139314
Volume 311
Issue 2
IT News - Wireless
 

What Is Wi-Fi Halow, And Do I Need It?
How-To Geek, Thursday, February 8th, 2024

Although Wi-Fi 7, being the newest and fastest Wi-Fi, is getting all the attention, an emerging wireless technology called Wi-Fi HaLow is quietly poised to transform the Internet of Things (IoT) landscape. Here's everything you need to know about Wi-Fi HaLow.

What Is Wi-Fi HaLow?

Wi-Fi HaLow is a wireless technology specification that is based on the IEEE 802.11ah protocol. It was first introduced in 2016 and runs on sub-1GHz frequencies, unlike the traditional Wi-Fi 5, Wi-Fi 6, Wi-Fi 6E, and Wi-Fi 7 protocols, which use 2.4GHz, 5GHz, and 6GHz frequencies. more

IT News - IoT
February 17, 2024
Article #139295
Volume 311
Issue 2
IT News - IoT
 

Industrial IoT And Open Source Apps: Shaping The Future Of Manufacturing
OpenSourceForU, Wednesday, February 7th, 2024

The Industrial Internet of Things (IIoT) is revolutionising the manufacturing landscape, ushering in an era of increased automation, efficiency, and data-driven decision-making. At the heart of this transformation lies the seamless integration of physical machines with digital technologies, resulting in smart factories and industrial processes. One critical component of this evolution is the utilisation of open source applications in the realm of IIoT. more

IT News - Compliance
February 17, 2024
Article #139281
Volume 311
Issue 2
IT News - Compliance
 

How To Comply With GDPR Requirements
wallarm, Monday, February 5th, 2024

This regulation highlights the EU's unified approach to bolster the control of its citizens over their personal details, while synchronizing numerous security methods across all EU nations under a single common benchmark. Corporations all over the world dealing with sensitive details of EU inhabitants need to adhere to the GDPR guidelines. This prerequisite equally applies to American companies that offer services to clients based in the EU. more

IT News - Email
February 17, 2024
Article #139292
Volume 311
Issue 2
IT News - Email
 

EasyDMARC VS Proofpoint DMARC
EasyDMARC, Wednesday, February 7th, 2024

We've reviewed features on EasyDMARC and Proofpoint's Email Fraud Defense products and considered user reviews to help you choose the best solution for your needs. more

IT News - Big Data
February 17, 2024
Article #139274
Volume 311
Issue 2
IT News - Big Data
 

Navigating The Evolution: Transitioning From Traditional Analytics To AI
insideBIGDATA, Monday, February 5th, 2024

While this approach, which relies on predefined rules and static models, has served organizations well, it has limitations. Traditional analytics excels at providing insights into past performance, but falls short in predicting future trends or prescribing optimal actions and, in a rapidly changing world, this retrospective view can be a significant disadvantage.

Artificial intelligence, on the other hand, represents a quantum leap in the world of data-driven decision-making. Unlike traditional analytics, AI can analyze vast amounts of data in real-time, allowing businesses to detect emerging patterns and trends that would be impossible to identify through traditional means. This predictive capability empowers organizations to proactively respond to market shifts and consumer behavior, staying one step ahead of the competition. more

February 17, 2024
Article #139275
Volume 311
Issue 2
IT News - Big Data
 

Sony AI Big Data Industry Predictions For 2024
insideBIGDATA, Monday, February 5th, 2024

The Sony AI team is comprised of researchers and leaders with backgrounds in deep reinforcement learning, data science, law, privacy and security, and more. They each offer different perspectives on topics related to AI ethics and policy, the use of AI to augment creativity and scientific research, emerging AI training methods, and more. From the company's point of view 2024 should be quite a year! Enjoy these special perspectives from one of our industry's best known movers and shakers. more

February 17, 2024
Article #139276
Volume 311
Issue 2
IT News - Big Data
 

What Is Data Classification? Your Ultimate Guide
Data, Tuesday, February 6th, 2024

This process typically includes identifying and categorizing data types and implementing security measures accordingly. Generally, data management teams and executives or IT professionals must work together to classify data and ensure its alignment with business policies.

Despite its technical nature, understanding how to perform data classification is a must for organizations, as it is a key element of a comprehensive data governance strategy. more