Sat.Jun 08, 2024 - Fri.Jun 14, 2024

article thumbnail

Fortinet grabs cloud security player Lacework

Network World

Fortinet has reached an agreement to buy cloud security company Lacework for an undisclosed amount. Founded in 2015, Lacework is known for its cloud-based machine learning, AI and automation technology that lets customers manage and secure cloud workflows. Its security technology looks for, filters out and shares details about abnormal or uncharacteristic activity that could indicate critical security problems, according to the company.

Cloud 483
article thumbnail

Quantum Computing and AI: A Perfect Match?

Information Week

What happens when you link together the two leading disruptive IT technologies? A new field with almost unlimited research and development potential.

Research 510
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

InfoSecurity Europe 2024: Next-Gen & AI Dominate The Show Floor

Forrester IT

InfoSecurity, once known as the RSA of Europe, annually brings together around 20,000 and 500 exhibitors to share knowledge in over 200 sessions, network and showcase the latest solutions.

Travel 465
article thumbnail

UK Trails Behind Europe in Technical Skills Proficiency, Coursera Report Finds

Tech Republic Security

The U.K. is the 25th most technically proficient country in Europe, with Switzerland, Germany and the Netherlands taking the top three places.

Report 441
article thumbnail

The Ultimate Contact Center Buyers Guide: A Crucial Decision

Harness the True Power of your Contact Center In today’s fast-paced business environment, selecting the right contact center solution is critical for enhancing customer experience, improving operational efficiency, and optimizing costs. This comprehensive guide will walk you through the essential factors to consider when choosing a contact center software that aligns with your business needs.

article thumbnail

Backup lessons learned from 10 major cloud outages

Network World

I’ve always called for independent backups of everything. Whether it’s in your data center, an IaaS vendor like AWS, or a SaaS vendor like Microsoft 365, it needs independent backup. However, some people believe we should trust the cloud vendors to do the right thing. What’s the worst that could happen? Fifteen years of cloud data-loss incidents gives a pretty good idea of how bad a cloud outage can be.

Backup 461
article thumbnail

11 Ways Cybersecurity Threats are Evolving

Information Week

The cybersecurity threat landscape is getting bigger. InformationWeek takes a look at how security and threats are evolving.

Security 479

More Trending

article thumbnail

6 Best VPNs for Australia in 2024

Tech Republic Security

What's the best VPN to use in Australia? Discover the pricing, features, pros and cons of our recommended VPNs for Australia.

Security 440
article thumbnail

Ransomware, zero-day exploits keep network security pros scrambling

Network World

The networks that enable today’s hyper-distributed enterprises face persistent and emerging security challenges. One of those challenges is ransomware. While it’s not a new problem, “attacks are getting more and more sophisticated,” said Neil Anderson, vice president of cloud, infrastructure and AI with technology services provider World Wide Technology.

Network 450
article thumbnail

To End Burnout, Cybersecurity Must Tolerate Failure

Information Week

At Gartner Security and Management Summit, speakers explained that you can't buy your way out of cybersecurity burnout. They discussed how a shift from a protection-focused program to a response-focused security strategy can help.

article thumbnail

TIER: Tech Leaders Must Adapt To The Evolving US Developer Labor Market

Forrester IT

Despite the uncertain economic climate and continued layoffs, competition for skilled developers will remain high. Forrester’s Priorities Survey, 2024, reveals that 73% of respondents stated that their organization plans on significantly increasing their budget for software development in the coming year – suggesting continued demand for developers.

article thumbnail

How to Achieve High-Accuracy Results When Using LLMs

Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage

When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m

article thumbnail

5 Tips for Making the Most Out of Your Next Business Trip

Tech Republic Security

From saving on flights and hotels to protecting your data when working online, these tips could save you money in the long run.

Hotels 431
article thumbnail

Netskope secures SaaS apps with genAI

Network World

Netskope recently introduced generative AI and software-as-a-service security enhancements in its Netskope One secure access security edge (SASE) platform, which industry watchers say will help enterprise IT organizations reduce genAI data leakage and better categorize SaaS applications. The enhanced platform includes features that can secure the usage of generative AI applications, the company says, and provide information on specific risks.

Security 436
article thumbnail

Could Antitrust Probes Lead to AI Market Upheaval?

Information Week

The DOJ and FTC are launching antitrust investigations into AI market titans Microsoft, OpenAI, and Nvidia.

Microsoft 470
article thumbnail

First-Line Sales Managers: Promote Or Hire?

Forrester IT

Today Forrester is publishing new research revealing that, all else being equal, B2B sales leaders achieve better revenue results when they hire first-line sales managers (FLSMs) externally, rather than promoting individual contributors (ICs). This runs counter to standard practice and tradition, but the data is clear: Externally hired managers and their teams perform better.

B2B 407
article thumbnail

Future-Proof IT: Cost-Saving Strategies Every IT Leader Needs in 2025

With IT budgets projected to grow 9.8% in 2025, leaders must invest wisely—not just cut blindly. This whitepaper introduces The Future-Proof IT Cost Optimization Model, a framework to reduce costs while maintaining service quality. Learn how Cloud Efficiency, AI-Powered Workforce Automation, Vendor Optimization, Cybersecurity Resilience, and Unified Communications can drive savings and improve efficiency.

article thumbnail

How Your Business Can Benefit from a Network Security Policy

Tech Republic Security

A company’s network must be secured to ensure the safety of its data against the risks of cyberthreats.

Network 433
article thumbnail

NYC Department of Education builds the pipeline for future cybersecurity professionals

Network World

There’s been a lot of talk over the past few years about a shortage of skilled cybersecurity talent , but from where we sit at the NYC DOE Division of Information and Instructional Technology (DIIT), we see budding security pros all around us. As cybersecurity leaders of the DIIT, we work with 1,800 schools and approximately 1 million students across NYC to ensure secure internet access and offer innovative solutions in education technology.

Education 418
article thumbnail

Key Skills to Look for in an AI Developer

Information Week

AI developers are in high demand. Here's how to separate talented pros from the swarm of wannabes.

article thumbnail

Deepfakes: Coming soon to a company near you

CIO Business Intelligence

AI-powered deepfake technology is rapidly advancing, and it’s only a matter of time before cybercriminals find a business model they can use, some security experts say.

Company 353
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Crowdstrike vs Trellix (2024): What Are The Main Differences?

Tech Republic Security

Endpoint detection and response software protects against a variety of threats and attacks. Learn about two of the most popular EDR options, CrowdStrike and Trellix, and how to protect your network.

Software 431
article thumbnail

Download the cloud access security broker (CASB) enterprise buyer’s guide

Network World

From the editors of our sister publication CSO, this enterprise buyer’s guide helps network and security IT staff understand what cloud access security brokers (CASBs) can do for their organizations and how to choose the right solution.

article thumbnail

The Most Crucial Elements of Any Cyber-Resilience Testing Plan

Information Week

By taking a methodical approach to resiliency testing, organizations can vastly improve their ability to bounce back quickly and securely.

Security 465
article thumbnail

Gen AI can be the answer to your data problems — but not all of them

CIO Business Intelligence

There are currently 143 million people waiting for surgeries in lower income countries. And there are organizations ready to bring in doctors and resources — but there’s an information gap between the two, says Joan LaRovere, associate chief medical officer at Boston Children’s Hospital, a professor at Harvard medical School, and co-founder of the Virtue Foundation, an NGO dedicated to solving this information problem.

Data 352
article thumbnail

The 2025 Annual ProcureCon CPO Report

Procurement leaders are at a pivotal moment. With CPOs playing an increasingly strategic role, it’s time to leverage innovation and technology to drive resilience and efficiency. Download The 2025 Annual ProcureCon CPO Report to uncover key insights to thrive in a dynamic procurement landscape. What’s Inside: How CPOs are driving strategic decision-making and technology adoption The top priorities and challenges for procurement in 2025 Why AI, sustainability, and data analytics are essential for

article thumbnail

How to Use 1Password: A Guide for Beginners

Tech Republic Security

Learn how to use 1Password to securely store and manage your passwords. This step-by-step guide will help you get started.

How To 402
article thumbnail

There’s a new difficulty in tech hiring: how to recognize a good candidate

Network World

Being on the leading edge of network and information systems technology comes with its challenges, and enterprises say one challenge, in particular, is growing every year. What is it? It’s difficulty hiring and retaining skilled workers. Enterprises are competing for talent in the job market with vendors, cloud providers, and startups – competition that can often offer not only higher salaries but also better advancement.

How To 398
article thumbnail

Changes on the Network Could Drive Application Demand

Information Week

The rollout of Wi-Fi 6 will enable more devices to work simultaneously on networks. This could drive application development demands to new heights. Are CIOs ready?

article thumbnail

Ethics of generative AI: To be innovative, you must first be trustworthy

CIO Business Intelligence

Over the past year, generative AI – artificial intelligence that creates text, audio, and images – has moved from the “interesting concept” stage to the deployment stage for retail, healthcare, finance, and other industries. By generating new content in seconds, identifying patterns in large datasets, automating repetitive tasks, improving customer interactions, and reducing costs, GenAI can improve any company’s bottom line.

article thumbnail

The 2025 Recruitment Playbook

The 2025 Recruitment Playbook by Procom is a strategic guide tailored for hiring managers to navigate the evolving talent landscape. Highlighting innovations like AI-driven tools and data analytics, the playbook empowers leaders to streamline processes, enhance candidate experiences , and foster diversity and inclusion. It provides actionable insights for every recruitment stage—from sourcing and screening to onboarding and retention.

article thumbnail

Innovate for the Customer: The Key to Competitive, Lasting Differentiation

IT Toolbox

Learn why AI solutions should address customer pain points, drive user experience, and provide benefits to build trust. The post Innovate for the Customer: The Key to Competitive, Lasting Differentiation appeared first on Spiceworks Inc.

article thumbnail

How to print from the Linux command line: double-sided, landscape and more

Network World

Getting your Linux system to send print jobs to your local printer might seem like a challenge, especially when you want to print double-sided or in landscape mode, but it’s really a lot easier than you might imagine. Know your printer If you’re just starting to use the printer, you might first want to make sure that the lp command is in your search path with a command like this: $ which lp /usr/bin/lp You can then check the status of your printer with an lpstat command like this one: $ lpstat -

Linux 398
article thumbnail

What Is the Future of AI-Driven Employee Monitoring?

Information Week

Workplace monitoring isn’t new, but AI is giving employers new powers to sift through employee data and analyze their work performance.

Data 465
article thumbnail

Rebranding IT for the modernized IT mission

CIO Business Intelligence

A 1958 Harvard Business Review article coined the term information technology, focusing their definition on rapidly processing large amounts of information, using statistical and mathematical methods in decision-making, and simulating higher order thinking through applications. That definition was well ahead of its time and forecasted the current era’s machine learning and generative AI capabilities.

article thumbnail

Activating Intent Data for Sales and Marketing

Sales and marketing leaders have reached a tipping point when it comes to using intent data — and they’re not looking back. More than half of all B2B marketers are already using intent data to increase sales, and Gartner predicts this figure will grow to 70 percent. The reason is clear: intent can provide you with massive amounts of data that reveal sales opportunities earlier than ever before.