CIO Influence
CIO Influence News Cloud Data Management Datacentre Featured IT and DevOps Networking Security

CIO Influence Weekly Brief: Top Highlights and Must-Reads from September 16-20

CIO Influence Weekly Brief: Top Highlights and Must-Reads from September 16-20

CIO Influence brings you weekly insights from the top IT leaders. Learn about the advancements and innovations that happened from the week of starts 9th of September until the 20th of September. Stay updated about the IT industry’s trends, news, and insights across topics including  cloud computingdata managementcybersecurity, and transformative technologies. Get to know IT experts’ perspectives on the latest trends and also learn about the upcoming IT events and key phrases.

This Week’s Top IT Stories You Can’t Miss

Innovations about Cloud Technologies

Firebolt Introduces Industry-First Low Latency Cloud Data Warehouse

Firebolt announced the next-generation Cloud Data Warehouse (CDW) that delivers low latency analytics with drastic efficiency gains. Built across five years of relentless development, it reflects continuous feedback from users and real-world use cases. Data engineers can now deliver customer-facing analytics and data-intensive applications (data apps) more cost-effectively and with greater simplicity.

Benefits of Low Latency Cloud Data Warehouse

  • High Efficiency: Engineered for millisecond query performance at the lowest cost, delivering real-time insights to data apps without compromises.
  • Concurrency at Scale: Supports high query per second (QPS) rates, ideal for applications requiring high performance under heavy load.
  • Flexible Infrastructure: Fully decoupled and scalable architecture brings granular and multidimensional scaling to the right size compute resources for dynamic workload needs. Running diverse tasks and mixed workloads — such as data loading, ELT, and low-latency analytics — on isolated engines ensures predictable performance across all workloads while preserving transaction integrity and global consistency.
  • SQL Simplicity: From provisioning to querying, everything in Firebolt is SQL. PostgreSQL-compliance enables integration with existing workflows and tools while offering support for both structured and semi-structured data analytics to meet diverse needs.
New Hitachi EverFlex Transforms IT Operations with Scalable, Cost-Efficient Hybrid Cloud and Infrastructure-as-a-Service Solutions

Hitachi Vantara, the data storage, infrastructure, and hybrid cloud management subsidiary of Hitachi, Ltd. is reinforcing its commitment to enhancing IT operations with its new generation of the Hitachi EverFlex infrastructure-as-a-service (IaaS) portfolio. Hitachi EverFlex is designed to simplify and optimize IT capacity and operations by managing diverse and distributed infrastructure through advanced heterogeneous automation and flexible service options, meeting the evolving needs of enterprises seeking scalable, adaptable, and economical IT infrastructure for business outcomes.

Key Features include: 

  • EverFlex Control
  • EverFlex Service Catalog
  • EverFlex Services Solutions

Essential Data Developments to Know

Caddis Cloud Solutions Partners with IP3 Corporation to Enhance Sustainable Energy Integration for Data Centers

Caddis Cloud Solutions, a leader in cloud infrastructure and data center development, announces a strategic partnership with IP3 Corporation (IP3), a lead U.S. integrator for the development and operations of peaceful and secure nuclear power in the global marketplace. This collaboration aims to advance the integration of nuclear energy, particularly through the use of innovative small modular reactors (SMRs), to power data centers, addressing the critical need for reliable and sustainable energy sources in the industry.

“This partnership with IP3, born out of a shared vision to address the pressing need for reliable power in data centers, marks a significant advancement for the industry,” said Scott Jarnagin, founder and CEO of Caddis Cloud Solutions.

HCLSoftware Completes Acquisition of Metadata Management Software Provider Zeenea

HCLSoftware, the software business division of HCLTech, announced that it completed the acquisition of Zeenea, an innovator in data catalog and governance solutions based in Paris, France. The acquisition of Zeenea enables Actian, a division of HCLSoftware, to offer a unified data intelligence and governance solution that empowers customers to seamlessly discover, govern, and maximize the value of their data assets. It also further extends Actian’s presence, workforce, and customer base in Europe.

According to ISG Research, 85% of enterprises believe that investment in generative AI technology in the next 24 months is  critical. Data governance and data quality work in tandem to ensure the data feeding the GenAI solutions is accurate, complete, fit-for-purpose, and used according to governance policies.

Recent Advances in Cybersecurity

Zscaler and CrowdStrike Announce New AI and Zero Trust Cybersecurity Integrations

Zscaler announced new AI and Zero Trust integrations with the CrowdStrike Falcon cybersecurity platform, aimed at enhancing security operations through the Zscaler Zero Trust Exchange, Zscaler Data Fabric for Security, and CrowdStrike Falcon Next-Gen SIEM. These integrations improve threat detection, response, and risk management for security teams.

Key Highlights:

  • Enhanced threat detection and response via coordinated threat sharing and pre-built SOAR workflows.
  • Improved cyber risk visualization through Zscaler Risk360’s integration with CrowdStrike’s platform.
  • Unified vulnerability management with real-time insights into enterprise vulnerabilities.
  • Strengthened adaptive access policies by integrating CrowdStrike’s security signals with Zscaler’s zero trust access control.
Forescout for OT Security: First Solution to Cover Managed and Unmanaged Devices Across All Purdue Levels Securing Cloud, Air-Gapped, and Hybrid Environments

Forescout Technologies, Inc., a global cybersecurity leader, today announced its new SaaS Operational Technologies (OT) solution. Forescout for OT Security is the first security solution that allows organizations to secure complex, heterogeneous OT, IoT/IoMT, and IT environments whether they are fully in cloud, completely air-gapped, or hybrid.

Key Features include: 

  • Comprehensive threat detection for OT, IoT, and IT hybrid environments
  • Expanded OT discovery capabilities, including network and wireless infrastructure
  • AI-enhanced asset intelligence to track response effectiveness and reduce risk
  • AI-driven reporting with contextual insights on devices, incident causes, and remediation steps
  • Role-specific dashboards for operations, security, SOC analysts, and executives
  • Actionable vulnerability prioritization using FS Vedere Labs’ Known Exploited Vulnerabilities (VL-KEV)
  • Extensive asset classification with 18.7 million unique device profiles from Forescout’s Vedere Labs database.

IT Must-Reads: Essential Insights

The Impact of Open Source on Software Supply Chain Security

The article delves into the growing importance of open-source software (OSS) in modern technology and its implications for software supply chain security. It explores the benefits OSS brings, such as cost efficiency, innovation, and flexibility, while highlighting critical security risks like vulnerabilities, dependency management, and supply chain attacks. Readers will gain insights into how organizations can mitigate these risks through regular updates, automated tools, and community engagement. It is a must-read for IT leaders navigating the challenges of open-source adoption and security.

The article covers – 

  • The rising use of open-source software (OSS) drives innovation, reduces costs, and enables faster development.
  • Potential vulnerabilities, lack of accountability, and risks related to dependency management and supply chain attacks in OSS.
  • Best practices for securing the software supply chain, including regular updates, automated security tools, and strict access controls.
  • Importance of participating in open-source communities to stay informed on security issues and ensure proactive risk management.
  • Need for organizations to carefully manage OSS adoption while addressing its unique security challenges.

GPU – CPU – NPU: Understanding the Differences and Their Strategic Importance

This article provides a comprehensive comparison of CPUs, GPUs, and NPUs, explaining how each processor type plays a crucial role in modern computing and AI-driven technologies. It offers insights into the unique architectures, use cases, and strengths of these processors, empowering technology leaders to make informed decisions about optimizing their AI infrastructure. Readers will gain a deeper understanding of how these processing units influence performance, cost-efficiency, and the strategic deployment of AI in business environments.

Article Brief – 

  • A comparative overview of CPU, GPU, and NPU functionalities.
  • Breakdown of how each processor supports AI tasks.
  • Guidance on selecting the best processor for specific business needs.
  • Overview of top manufacturers and technologies in CPUs, GPUs, and NPUs.

This Week’s Best Insights from Thought Leaders

CIO Influence Interview with Jimmy Xu, Field CTO at Cycode

Jimmy Xu discusses the features and benefits of Cycode’s Application Security Posture Management (ASPM) platform, the challenges companies face with DevSecOps implementation, and Cycode’s approach to solving these issues. Readers will gain insights into modern application security practices and how Cycode enables seamless digital transformation while managing cyber risks.

Key Topics Covered:

  1. Cycode’s ASPM Platform Features and Benefits
  2. Risk Intelligence Graph (RIG)
  3. DevSecOps Challenges and Solutions
  4. Client Success Stories
  5. Future Innovations in ASPM

 

CIO Influence Interview with Kevin Campbell, CEO at Syniti

In this Q&A, Kevin Campbell discusses the crucial role of data governance and cloud technology in modern organizations, highlighting Syniti’s solutions. Readers will gain insights into current data management trends, the challenges businesses face with bad data, and best practices for overcoming these hurdles.

Key Topics Covered:

  1. Cloud Technology’s Role in Data Governance: Kevin explains how cloud technology supports Syniti’s solutions by streamlining digital infrastructure and improving data governance while emphasizing the importance of clean data.
  2. Challenges in Data Management: He addresses the common issues organizations face with poor data quality, which impacts decision-making and productivity, and how Syniti’s tools help cleanse and contextualize data.
  3. Future Trends in Data Management: Kevin predicts that data quality will be increasingly critical as organizations adopt emerging technologies like AI, and Syniti’s strategies to prepare for this evolution.
  4. Top Data Management Best Practices: He shares five essential best practices, including starting data cleansing early, maintaining governance, and fostering a data-driven culture.

This interview offers actionable insights on improving data governance, managing cloud infrastructure, and aligning business goals with data strategies for optimal results.

IT Buzzwords: What You Need to Know

Web of Things

Web of Things describes a set of standards by the World Wide Web Consortium for the interoperability of different Internet of Things platforms and application domains.

DaaS

Desktop as a service (DaaS) is a way of delivering complete virtual desktop environments to users, which include operating systems, applications, files and user preferences from the cloud.

Greyware

Greyware refers to software that may not contain identifiable malware but can still be harmful or disruptive to the user.

CIO Influence Brand Highlight: Weekly Edition

AWS Marketplace: CrowdStrike

CrowdStrike is a global leader in cybersecurity, specializing in endpoint protection, threat intelligence, and cyberattack response. Founded in 2011 and headquartered in Sunnyvale, California, CrowdStrike’s cloud-native Falcon platform delivers real-time visibility and protection across organizations, preventing breaches through advanced AI, machine learning, and behavioral analysis.

CEOGeorge Kurtz

Recent Launch – CrowdStrike Unveils Falcon Platform Innovations Unify End-to-End Security and IT Operations to Remove Complexity and Stop Breaches

Preview of Upcoming IT Events and Conferences

AI & Big Data Expo Europe

Date: Oct. 1 to 2
Location: Amsterdam, Netherlands

AI & Big Data Expo Europe 2024 will have dozens of speakers from across various industries and will discuss the latest developments in the world of AI & Big Data.

Cyber Security & Cloud Expo Europe

Date: Oct. 1 to 2
Location: Amsterdam, Netherlands

Hear from leading industry experts and discover key strategies in the world of Cyber Security & Cloud.

Data Pioneers Summit

Date: Oct. 1 to 2
Location: Berlin, Germany

Innovations in Generative AI and cloud data ecosystems hold the promise of rapid transformation in unlocking value from your data. Yet enterprises are grappling with managing vast volumes of data to achieve a true data-driven enterprise.

[To share your insights with us as part of editorial or sponsored content, please write to psen@itechseries.com]

Related posts

Airspan Networks Completes Successful End-to-End Open RAN Tests Connected to HPE’s 5G Core Stack

CIO Influence News Desk

Backblaze B2 Platform Grows Depth, Ease With Spring Release

CIO Influence News Desk

Snow Software Achieves Oracle Database and Oracle Database Options Verification