Security, CxO Podcasts, Gestalt IT, Technology, Operations, Networks, Backup, Developer, Google, Veeam, IBM, Red Hat, CxO Security Events (318.4.Fri)

Security, CxO Podcasts, Gestalt IT, Technology, Operations, Networks, Backup, Developer, Google, Veeam, IBM, Red Hat, CxO Security Events (318.4.Fri)

Security

CxO Podcasts

Gestalt IT

Technology

Operations

Networks

Backup

Developer

Google News

Veeam News

IBM News

Red Hat News

CxO Security Events

This webinar will cover how API Gateways simplify security, optimize performance, and handle traffic from various clients while seamlessly integrating a variety of services, including your own microservices and external services from third-party vendors.
Oct. 8th
This webinar will cover how API Gateways simplify security, optimize performance, and handle traffic from various clients while seamlessly integrating a variety of services, including your own microservices and external services from third-party vendors. Register

Security

How To Prepare A System Security Plan, With Template

To help keep your systems and applications secure, a system security plan is essential. Learn how to create a plan and keep it up to date....more

How The NIST Cybersecurity Framework Is Enhanced By Identity Continuity

As recent events have shown, our technology systems are so connected that any interruption can cause global chaos. Organizations need robust defenses to protect their data and operations, and it starts with identity....more

Developing An Effective Cyberwarfare Response Plan

In this Help Net Security interview, Nadir Izrael, CTO at Armis, discusses how AI has transformed cyberwarfare by amplifying attacks' scale and sophistication. Izrael emphasizes the need for AI-powered defenses and proactive cybersecurity strategies to combat these evolving threats....more

Complete Your Kubernetes Security With Runtime Protection

Kubernetes today is the de facto standard for container orchestration, deployment automation, scaling, and management of containerized apps. The robustness and scalability of this open-source platform make it a valuable tool for businesses leveraging cloud-native technologies and DevOps practices....more

Best Practices For Implementing A Zero Trust Security Model

7 Essential Practices for a Zero Trust Security Model...more

CxO Podcasts

Thomas Dewar On IT Leadership, Building Trust, Communication, And Problem-Solving Part-1 #326

How can IT leaders improve communication, build trust, and solve business problems?...more

Thomas Dewar On Mistake-Proofing IT And Understanding Business Needs - #327

How can IT leaders create more reliable systems and align technology with business needs? In this episode, Thomas Dewar, CIO at Acupath Laboratories, shares insights on applying the concept of poka-yoke (mistake-proofing) to IT, understanding business processes, and creating user-friendly solutions....more

What Is Agentic AI? Intelligent Agents And Autonomous Workflows

Explore the transformative potential of agentic AI with Praveen Akkiraju, Managing Director at Insight Partners. Discover how AI agents automate tasks, improve efficiency, and drive innovation while addressing concerns about trust, transparency, and the future of work. Learn practical strategies for evaluating and implementing agentic AI in your organization....more

Join us for this upcoming webinar that focuses on these dangerous entities and introduces the blueprint to fend them off, based on his new book, 'Fighting Phishing: Everything You Can Do to Fight Social Engineering and Phishing'
Oct. 15th
Join us for this upcoming webinar that focuses on these dangerous entities and introduces the blueprint to fend them off, based on his new book, 'Fighting Phishing: Everything You Can Do to Fight Social Engineering and Phishing' Register

Gestalt IT

Navigating Modern Cybersecurity Challenges In An AI World With Jack Poller

Stephen Foskett and Jack Poller discuss the evolving challenges in cybersecurity. Jack explains how the shift to modern computing environments, such as the cloud, AI, and DevOps, changes the landscape while highlighting the importance of fundamental security principles....more

AI And Cloud Demand A New Approach To Cyber Resilience Featuring Commvault

As companies are exposed to more and more attackers, they're realizing that cyber resilience is increasingly important. On this episode of the Tech Field Day Podcast, presented by Commvault, Senior Director of Product and Ecosystem Strategy Michael Stempf joins Justin Warren, Karen Lopez, and Stephen Foskett to discuss the growing challenges companies face in today's cybersecurity landscape....more

Qiskit And IBM's New Quantum Innovations

We're happy to have Dr. Bob Sutor joining us this week on the Rundown, since he covers quantum and advanced computing for The Futurum Group. IBM made two important announcements in the quantum space this week....more

Technology

With All The Technology Choices Out There, How Do You Decide?

It is never easy for enterprise customers to decide on the correct technology decisions. Here's some guidance to streamline the process....more

Project Managers Increasingly Rely On Emotional Intelligence To Navigate The Rise Of AI

From the ongoing antitrust investigations into NVIDIA to major updates from Intel and Broadcom to the rise of AI-powered hardware, Daniel Newman and Patrick Moorhead explore the complexities of today's tech landscape in the latest episode of The Six Five Podcast, with a strong focus on AI, semiconductors, and the ever-evolving tech market....more

AI PCs Will Take Over The Enterprise By 2026: Gartner

The analyst firm projects laptops equipped with neural processing units will command more than half of total shipments next year....more

Our DevOps and software experts roundtable discusses software testing and observability and how these tools can significantly impact QA's quality assurance and testing approach.
Oct. 16th
Our DevOps and software experts roundtable discusses software testing and observability and how these tools can significantly impact QA's quality assurance and testing approach. Register

Operations

Harnessing Business Automation: The Key To Accelerating Digital Transformation And Growth

In today's fast-paced world of technology, CEOs are constantly challenged to improve business efficiency, innovate, drive growth and expand in markets. Ideally, we should be faster and more efficient than the competition. At worst, at least on par with them....more

Driving IT Sustainability In Datacentres

Europe's datacentre operators need to get their power report cards to comply with the European Commission's drive to greener EU datacentres...more

2024 NIST Password Guidelines: Enhancing Security Practices

The NIST password guidelines have come a long way, adapting to the forever changing cybersecurity space and, just as importantly, to how people actually behave....more

Networks

Navigating The IPv6 Transition: Lessons From The 'World's Fastest Temporary Network'

Angie Asmus, SCinet chair for this year's SC Conference, offers guidance on transitioning networks to IPv6....more

Ethernet Surpasses Infiniband: The Cost-Effective, Scalable Solution Powering AI's Distributed Future

As technological innovations take center stage in the enterprise world, networking issues are springing up, making Ethernet an ideal choice for scenarios that demand secure, stable and high-speed connectivity....more

Backup

The Pros And Cons Of Public Cloud Storage For Data Center Backups

Is public cloud storage the right solution for your data center backups? Weigh the benefits of flexibility and cost savings against the potential risks....more

Designing An Effective Backup Strategy For Ransomware Protection

In today's cybersecurity landscape, having a robust backup strategy for ransomware is no longer optional - it's a necessity....more

This webinar will discuss the latest trends in social engineering attacks and provide practical strategies to defend against them.
Oct. 22nd
This webinar will discuss the latest trends in social engineering attacks and provide practical strategies to defend against them. Register

Developer

A Complete Guide To Software Development Project Management

Learn what a project manager to a software development team does, the different methodologies available, and the best tools to take a development project to completion with TechRepublic's comprehensive guide....more

SBOM as a Cornerstone of Secure Software Development

In the ever-evolving world of software development, security has become more critical than ever. Applications are now more complex and interconnected, which means there are numerous potential entry points for vulnerabilities....more

Google News

Your Ultimate Guide To The Latest In Generative AI On Vertex AI

The world of generative AI is evolving at a pace that's nothing short of mind-blowing. It feels like just yesterday we were marveling at AI-generated images, and now we're having full-fledged conversations with AI chatbots that can write code, craft poetry, and even serve our customers...more

The Overwhelmed Person's Guide To Google Cloud: Week Of September 19

A weekly curation of the most helpful blogs, exciting new features, and useful events coming out of Google Cloud....more

Redefining Work With Gemini, From The Browser To The Device

In today's fast-paced digital landscape, organizations are constantly seeking ways to enhance productivity, foster collaboration, and drive innovation. Google offers a comprehensive set of products that empower businesses to do just that....more

Veeam News

Veeam Announces A New Integration With Palo Alto Networks To Streamline Security Operations And Deliver Data Resilience For Customers

New Veeam Apps integrated with Palo Alto Networks Cortex platform help organizations identify and respond to cyberattacks faster, ensuring the resilience of business-critical backup data...more

This webinar will help engineering leaders learn how to effectively encourage secure coding practices without unduly increasing cognitive load on developers that already have to think about more stuff than ever.
Oct. 22nd
This webinar will help engineering leaders learn how to effectively encourage secure coding practices without unduly increasing cognitive load on developers that already have to think about more stuff than ever. Register

IBM News

IBM Expands Quantum Data Center In Poughkeepsie, New York To Advance Algorithm Discovery Globally

Latest IBM Quantum system, powered by an IBM Quantum Heron processor, achieves reduced error rates at 16 times better performance, and 25-fold increase in speed over 2022 IBM Quantum systems....more

IBM And Nasa Release Open-Source AI Model On Hugging Face For Weather And Climate Applications

New AI foundation model offers insights beyond forecasting for scientists, developers, and businesses to better understand and analyze weather and climate data...more

How To Design An Operating Model For A Unicorn

As the starting point of the value chain for almost all enterprises, procurement is a vital business function. Although it's often overlooked, it can make or break a business's success, helping organizations control costs, enhance quality, improve supply chain effectiveness and comply with rules and regulations....more

Red Hat News

Accelerating Adoption Of Automation Through A Community Of Practice

Every solution starts with sharing a problem. At Red Hat, when we talk about the open source way, we're talking about a proven way of collaborating to create technology....more

Friday Five - September 27, 2024

The Friday Five is a weekly Red Hat blog post with 5 of the week's top news items and ideas from or about Red Hat and the technology industry. Consider it your we ekly digest of things that caught our eye....more

When LLMs Day Dream: Hallucinations And How To Prevent Them

Most general purpose large language models (LLM) are trained with a wide range of generic data on the internet....more

Reimagining The Cable Industry By Unlocking The Power Of Software-Defined Networking, AI And Edge Computing

The cable industry has evolved from being an aggregator of broadcast channels to a distributor of streaming, becoming a major force in media and entertainment....more

Unveil the power of automation in enhancing cyber resilience with Rubrik, a leader in enterprise data backup and protection.
Oct. 24th
Unveil the power of automation in enhancing cyber resilience with Rubrik, a leader in enterprise data backup and protection. Register

CxO Security Events

The DevOps VPN - Streamlining Cloud Networking with AWS (Oct 16th)

In this webinar, we'll explore how Tailscale empowers DevOps teams to overcome networking challenges in AWS environments, enabling them to focus on innovation instead of infrastructure....more

DevOps.com: Elevate Software Quality: Integrating Observability into Your Testing Process (Oct. 16th)

Our DevOps and software experts roundtable discusses software testing and observability and how these tools can significantly impact QA's quality assurance and testing approach....more

DevOps.com: The Transformations Needed to Scale DevSecOps (Oct. 16th)

In this webinar, Larry Maccherone, Dev(Sec)Ops Transformation Architect at Contrast Security, and Brono Korenko, IT Specialist at BMW Group, discuss how to effectively implement and scale DevSecOps....more

Blackhat: Elevate Your Security Analytics With LLMS (Oct. 17th)

For many teams, security analytics were restricted to out-of-the-box reporting templates from specific vendor tools....more

DARKReading: Social Engineering: New Tricks, New Threats, New Defenses (Oct. 22nd)

This webinar will discuss the latest trends in social engineering attacks and provide practical strategies to defend against them....more

In a world of surging data demands, how can we reduce the environmental toll of storage solutions? Discover the power of the circular economy to reshape the storage industry for a greener tomorrow
Oct. 29th
In a world of surging data demands, how can we reduce the environmental toll of storage solutions? Discover the power of the circular economy to reshape the storage industry for a greener tomorrow Register


Through three in-depth sessions, our panelists will discuss why these tools are essential, how to manage them effectively, and how to navigate the complex landscape of regulatory compliance.
Oct 31st
Through three in-depth sessions, our panelists will discuss why these tools are essential, how to manage them effectively, and how to navigate the complex landscape of regulatory compliance. Register

To view or add a comment, sign in

More articles by John J. McLaughlin

Insights from the community

Others also viewed

Explore topics