Security, CxO Podcasts, Big Data, Cloud, Developer, Red Hat (321.2.9) Friday AM

Security, CxO Podcasts, Big Data, Cloud, Developer, Red Hat (321.2.9) Friday AM

John J. McLaughlin

Security

CxO Podcasts

Big Data

Cloud

Developer

Red Hat News


Security

62 Cybersecurity Predictions From Industry Experts For 2025

As part of Solutions Review's annual Insight Jam LIVE event, we called for the industry's best and brightest to share their SIEM, endpoint, and cybersecurity predictions for 2025 and beyond....more

Websites And Hipaa: Navigating Online Tracking Technologies

Today, healthcare providers, insurers, and other HIPAA-covered entities are increasingly relying on websites to share information, engage with patients, and streamline operations....more

9 Identity And Access Management Trends To Watch In 2025

Identity threats continue to change and so, too, do the defenses developed to address those security challenges. Be ready for what's coming next in IAM....more

CxO Podcasts

On theCube Pod: The Latest AWS AI Announcements From Re:Invent And Thoughts On Intel's CEO Stepping Aside

It's been full-throttle coverage for theCUBE Research team during our exclusive coverage of AWS re:Invent 2024, and analysts John Furrier (pictured, left) and Dave Vellante (right) broke down all the breaking news on the latest episode of the CUBE Podcast....more

When Security And It Collide: The Startup Challenge With Paul Knight #338

Currently serving as VP of Information Technology and CISO at Turntide Technologies, Paul Knight brings 25 years of experience across various IT disciplines. His unique background includes roles in defense, aerospace, and automotive manufacturing, bringing both operational and security expertise to startup environments....more

Big Data

Data Protection Predictions From Experts For 2025

As we step into 2025, the evolving landscape of enterprise technology and artificial intelligence continues to shape how organizations approach data protection. In an era defined by rapid innovation and heightened cybersecurity threats, staying ahead requires insights from those who build, implement, and innovate at the cutting edge of these technologies....more

Big Data And Cloud Computing: How They Converge And Their Benefits

Today's business environment has led to the rise of many technologies, including Big Data and cloud computing. These technologies have individual impacts on how business owners acquire, store, and execute data....more

Unlock The Full Potential Of Your Data

As data grows in volume, AI becomes increasingly vital for analytical tasks within organizations. However, for AI to provide reliable and meaningful insights, it must be built with a comprehensive understanding of this data....more

Cloud

Navigating Cloud Security For Future Proofing Your Assets

As businesses increasingly migrate their operations to the cloud, the demand for effective cloud security strategies gains precedence. The criticality of this requirement becomes glaringly obvious when one considers asset protection....more

How To Calculate Cloud Migration Costs

It's important to calculate the total cost of a cloud migration before making the move. Heer's how to compare your on-premises expenses to what you'll spend on the migration....more

Building A Virtual Private Cloud On AWS Cloud

A virtual private cloud (VPC) has become increasingly popular, driven by its ability to provide secure, flexible, and scalable networking environments in the cloud. Here's a step-by-step guide to setting up a VPC service and deploying a web server using the Amazon Web Services (AWS) platform....more

Developer

18 Top Free And Open Source Rust Frontend Web Frameworks

One of the types of software that's important for a web developer is the web framework. A framework 'is a code library that makes a developer's life easier when building reliable, scalable, and maintainable web applications' by providing reusable code or extensions for common operations....more

Feeling Reassured with Top-Tier API Security Measures

If you're a CISO or a cybersecurity professional, you understand the importance of robust API security measures. But, do these measures ensure optimum protection when non-human identities (NHIs) are involved?...more

7 Trends That Helped Shape Software Development In 2024

From widespread developer layoffs to the mainstreaming of AI-assisted coding and the rise of platform engineering, 2024 reshaped software development in unexpected ways....more

Red Hat News

Friday Five - December 13, 2024

The Friday Five is a weekly Red Hat blog post with 5 of the week's top news items and ideas from or about Red Hat and the technology industry. Consider it your we ekly digest of things that caught our eye....more

3 Key Features In Red Hat Advanced Cluster Security For Kubernetes 4.6

Red Hat Advanced Cluster Security for Kubernetes and Red Hat Advanced Cluster Security for Kubernetes Cloud Service versions 4.6 are now available....more

AI Use Cases: Not Sure How AI Can Help Your Organization? Start Here.

Artificial intelligence (AI) has moved from speculative fiction to everyday reality seemingly overnight. Anywhere you look, there are companies promoting their latest AI and machine learning (ML) products or features, ranging from text generators to chatbots to automated podcast editors and everything else under the sun....more

Infusing AI Into IT Operations

An automation strategy is the foundation for AI adoption and is critical for success. Let's explore some examples of this....more


Upcoming Webinars

Thursday, January 2nd, 2025

Thursday, January 9th, 2025

Tuesday, January 14th, 2025

Wednesday, January 15th, 2025


"Enterprise IT News and Events" is a weekly curation of Enterprise IT News and Events articles from a wide range of Industry publications and Vendors. Insights, Best Practices, Webinars, Strategy, Humor, Guidelines, Podcasts, Technology, Leadership, IT Security, Analysis, Operations, Reviews, Trends, etc.

Learn about our Crowd-Selected, Custom, Curated, Enterprise IT Content for your Company's LinkedIn Newsletter

To view or add a comment, sign in

More articles by John J. McLaughlin

Insights from the community

Others also viewed

Explore topics