TechTarget News - Week of Apr 15, 2018

Ethics key to AI development, says Lords committee

House of Lords Select Committee calls for government to draw up an ethical code of conduct, which organisations developing AI can sign up to

Singtel, VMware to set up hybrid cloud sandbox

The hybrid cloud sandbox environment will let companies test their cloud workloads and software-defined networks

UK businesses urged to ensure they do cyber security basics

The cyber threat to business has never been greater, so the National Cyber Security Centre is urging UK companies to ensure they have implemented all the basic, best-practice cyber security controls and processes

Channel roundup: Who's gone where?

Another busy week in the channel as some fresh faces join various resellers and vendors to try and keep the growth flowing

Not too late to help users deal with GDPR

There might only be a matter of weeks until the data regulations come into force but resellers can help deliver some common sense support to help users get prepared

How IBM's data science team quickens users' AI projects

In this Q&A, IBM's Seth Dobrin discusses the rising user interest in machine learning and AI projects and the help inexperienced users need to launch those projects.

Nuix hacker survey shows how easy it is to breach perimeters

The second annual Black Report -- a hacker survey aimed at getting a different perspective on cybersecurity -- detailed how long it takes to breach a perimeter and what attacks are easiest.

Microsoft, Google polish cloud budgeting tools

Recently added Google and Microsoft cloud cost control tools are critical for users who want to gain insight into how corporate cloud budgets are spent.

CrowdStrike Falcon X takes aim at incident response

CrowdStrike introduced a new component for the vendor's cloud-based security platform -- dubbed Falcon X -- that looks to speed up enterprises' incident response times.

SSH announces new key and certificate management service

A new key and certificate management service is now offered by SSH, which teamed up with AppViewX to provide a way to administer cryptographic keys and digital certificates.

Flashpoint researchers warn of new VBS Loader

Researchers have issued warnings about a new VBScript downloader that behaves like a remote access Trojan, is designed to run undetected and can update and delete itself

Huawei wants to unlock ASEAN’s digital potential

The Chinese technology supplier is working with communications service providers such as Converge in the Philippines to bolster their networks to support new digital services

Targeted cyber attacks doubled in past year, study shows

The number of targeted attacks has doubled in the past year compared with the previous 12 months, despite improvements in detecting and blocking them, a cyber resilience study shows

VMware pulls vSAN 6.7 deeper into vSphere

By giving the vSAN 6.7 release more of a vSphere look and common management, VMware hopes to lure more of its customers to use its hyper-converged storage software.

China’s ZTE a national security risk, UK telcos warned

UK national cyber security authority has warned telecommunications companies against using equipment and services from Chinese network equipment supplier ZTE, citing national security risks

ISACA: Cybersecurity skills gap still hurting enterprises

ISACA's State of Cybersecurity 2018 report offered good news and bad news about the cybersecurity skills gap and also shed light on gender disparity in the infosec profession.

Compromised cloud credentials still plaguing enterprises

Why are enterprises still struggling with identity and access management in the cloud? Experts at RSA Conference discuss the issue and the risks posed by compromised credentials.

Teradata applies time series analytics tools to IoT data

Data warehouse pioneer Teradata looks to ease IoT data analysis with capabilities that address skills gaps on time series analytics techniques, which are coming more to the fore.

At Accenture, benefits of public cloud are business benefits

In this Q&A, infrastructure chief Merim Becirovic reports on the consulting company's cloud journey, discusses new technologies cloud will make possible and offers some getting-started advice.

Bold cloud computing plan puts Accenture on fast track

Three years ago, the consulting company aimed to go from 10% in the public cloud to 90%. How's it faring? Infrastructure chief Merim Becirovic tells in this interview.

Device wars: Researchers track new IoT botnet DDoS attacks

A variant of the Mirai IoT botnet is the suspected cause of distributed denial-of-service attacks on financial services companies earlier this year, according to Recorded Future.

Top tech firms take cyber security pledge

Top tech firms have committed to protecting customers worldwide from cyber attacks and prevent the misuse of their technology

UK identity fraud reaches record level

The level of identity fraud has reached its highest level to date, a UK fraud report shows

APAC is becoming a hotspot for DDoS attacks

The region’s largest and most-connected economies are most vulnerable to distributed denial-of-service attacks, according to CenturyLink

Security budgets up, but talent scarce, says Isaca

Security budgets are increasing, but qualified cyber talent remains difficult to find with positions taking at least three months to fill, an industry association report on the state of cyber security reveals

Twilio offers IoT developers programmable mobile connectivity

Developers of internet of things applications and devices will be able to use the Twilio Programmable Wireless mobile communications platform to build mobile connectivity into their services

DDoS attacks cost up to £35,000

Despite the direct financial impact of DDoS attacks, this is not considered to be the most damaging effect on companies targeted this way, a survey shows

Jigsaw24 increases focus on enterprise market

The growing number of Apple products being used in the workplace have triggered a response from one of the vendor's largest resellers

Backup 101: Incremental vs differential backup

In this Backup 101 article, we look at incremental versus differential backup and walk through the advantages and disadvantages of these two key backup strategies

Collaborate 18 to track progress of Oracle cloud database, apps

The Collaborate 18 conference will shine a light on Oracle cloud adoption and migration issues, and on the impact that such moves can have on the careers of DBAs and other IT professionals.

Banks investing in cloud and digital

An insight into the IT investment priorities in the finance sector has revealed a market keen to keep on top of cloud and cyber security

IBM's Cindy Compert cooks up a batch of GDPR preparation

GDPR preparation, with practical tips and recipes, was on the menu at RSAC 2018, as IBM CTO Cindy Compert offered practical advice for compliance with the EU privacy regulation.

Failure to secure open source code spurs DevSecOps boom

A survey of over 2,000 IT pros shows that fear of data breaches is increasing investments in DevSecOps tools, particularly automated security tools and oversight of open source software.

Google Cloud speech-to-text service gets revamp

Google Cloud speech-to-text service has been updated for improved accuracy through machine learning. The company is also releasing a tool for automatically adding punctuation to transcripts.

Good time to be in data protection, says information commissioner

There has never been a better time to be in data protection, Elizabeth Denham has told an IAPP data protection conference in London, addressing some key questions about the changing data protection regulatory landscape

VxRack Flex at the center of Medicity's SaaS cloud

Hungry for power, healthcare SaaS provider Medicity installed Dell EMC VxRack Flex rack-scale HCI for private cloud to store petabytes of data for its customer network.

Santa Fe's ERP implementation project fix stirs debate

ERP implementation projects may be IT's most challenging, something the city of Santa Fe, N.M., found out. City officials needed a fix and considered three options.

IBM's new AI toolbox is designed to protect AI systems

IBM has made a new open source AI toolbox that's designed to provide practical defenses for real-world AI systems based on how threat actors can attack AI models.

Cisco DNA Center gets access to more IoT devices

Cisco DNA Center can now access an additional 620 IoT device profiles. Cisco also introduced this week a couple of Catalyst 9500 switches, including one with 100 GbE ports.

Microsoft takes holistic approach to IoT security concerns

Azure Sphere extends security from the cloud to the device. It's the most holistic approach on the market and provides another example of Microsoft abandoning its insular past.

Cisco Webex Teams to replace Spark platform

Cisco plans to combine Spark and Webex to provide a single platform for team collaboration and web conferencing. Cisco Webex Teams and Webex Meetings will rely on the same cloud infrastructure and user interface for online meetings.

UK and Indian governments agree tech partnership

Agreement aims to identify organisations in the two countries that can work together and open up opportunities for tech entrepreneurs

Cofense chooses to go 100% indirect

Security player revamps partner programme as it pledges to go 100% through the channel

UK Commonwealth cyber security funding welcomed

The security community has welcomed the UK government announcement of funding to help Commonwealth countries strengthen their cyber security capabilities

Passive DNS techniques can reduce DNS abuse

Presenting at RSAC 2018, Farsight Security's Merike Kaeo explains how defenders can adopt passive techniques to reduce DNS abuse and stop attacks before they happen.

Blockchain technology use in networking? Not so fast

Blockchain technology use has little value in networking, according to one IT analyst. Analysts also examine IoT security and what might happen to AI if disasters occur.

Actifio backup makes the grade for digital learning provider

With cyberattacks a constant threat, Actifio provides protection through a data-centric approach and an air gap. Customers can recover to a safe point in time in minutes.

Schneier talks cyber regulations, slams U.S. lawmakers

Speaking at RSA Conference 2018, Bruce Schneier slammed U.S. lawmakers and Facebook in discussions on internet security regulations and technology policy.

CNCF wants to make Kubernetes ‘boring’

CNCF is about to kick off its its Copenhagen conference. The organisation wants to make containers less exciting and more straightforward

Alibaba to set up digital hub in Thailand

Chinese e-commerce and technology giant Alibaba is expanding its Southeast Asian footprint with a new digital hub east of Bangkok that is expected to boost Thailand’s digital credentials

Data protection is a business issue, says IAPP

Data privacy is a rapidly maturing profession as organisations around the world increasingly see data protection as a business issue, according to an industry association

MIT Sloan: Finding your digital business model

Companies may understand the threats and opportunities a digital economy presents, but research from MIT Sloan suggests many don't have a clear sense of how to make digital revenue.

Account takeover up tenfold in past year

The incidence of online account takeover and the proportion of high-risk account access attempts underlines the need for improved authentication, says fraud detection firm

Experts describe how hacking back can be done right

A panel of experts at the RSA Conference all expressed support for the idea of hacking back against threat actors, but each offered caveats in hopes of minimizing collateral damage.

Marketing for MSP companies: Still a struggle

While managed service providers continue to struggle with marketing, the list of vendors committing to the channel sales model continues to grow; more news from the week.

8base targets blockchain for no-code app development

The popularity of blockchain and demand for blockchain applications has spurred the creation of a no-code application development platform for building blockchain apps.

Global cyber crime worth $1.5tn a year, study reveals

Cyber criminal operations worldwide are generating revenues that equal the GDP of Russia though a web of profit that involves legitimate businesses, research has revealed

Cloud Foundry PaaS shops hone software delivery process

Enterprises that have deployed Cloud Foundry platform as a service found it catalyzed new thinking about the application delivery process and other organizational practices.

Another misconfigured Amazon S3 bucket exposes 48M records

News roundup: A misconfigured Amazon S3 bucket led to the exposure of 48 million records collected by a private data analytics firm. Plus, PCI SSC updated its cloud guidelines, and more.

Twilio SIM cards simplify IoT connectivity

Twilio has released programmable SIM cards for IoT connectivity. The Twilio SIM cards connect to the vendor's APIs for voice, text and data communications.

Digital factory strategy needed to support omnipresent IT

Digital factories, framed as a business process re-engineering strategy for our tech-centric economy, reflect how the IT function continues to evolve to meet business demands.

Router security options advised following U.S. hacker alert

A rare government alert that Russian hackers are targeting routers in the United States and the United Kingdom has security experts debating router security options.

Government hacking tactics questioned at OURSA

The ACLU's Jennifer Granick took government hacking to task at the OURSA Conference this week, calling out mass surveillance techniques and the limited scope of search warrants.

Contact Sales