CIO Influence
Automation CIO Influence News Cloud Data Management Digital Transformation Featured IT and DevOps Networking SaaS Security

This Week at CIOInfluence: Vital Insights, Trends, and Reading for CIOs (2nd Sep – 6th Sep)

Weekly Round Up Image (2nd Sep - 6th Sep)

Learn the latest IT insights with CIOInfluence this week, highlighting key advancements in the IT industry. Stay informed with updates, news, and trends across critical areas such as cloud computing, data management, cybersecurity, and emerging technologies. Explore our curated selection of top articles by industry experts and gain exclusive insights from C-suite executives. Additionally, get a sneak peek into upcoming global IT events and the latest trends shaping the future of technology.

Must-know IT Stories of the Week

New Appointments by the IT Businesses

HackerOne Appoints Kara Sprague as CEO

HackerOne, the leader in human-powered security, announced that it has appointed Kara Sprague to succeed Marten Mickos as Chief Executive Officer.

More about Marten:  Previously Marten was the CEO of Eucalyptus Systems, acquired by Hewlett-Packard where he served as head of the cloud business. As the CEO of MySQL AB from 2001 to 2008, Marten grew that company from a garage start-up to the second largest open source company in the world. Marten holds a M.Sc. in technical physics from Helsinki University of Technology in his native Finland.

Marketing Executive Lisa Campbell Appointed to the Dynatrace Board of Directors

Dynatrace, the leader in end-to-end observability and security, announced the appointment of Lisa Campbell to its Board of Directors effective September 4, 2024. Campbell brings to the Board over 25 years of experience in leading business and marketing strategydigital transformation, and revenue growth for global software companies.

“We are thrilled to have Lisa join the Dynatrace Board,” said Rick McConnell, Dynatrace CEO and a member of the Board of Directors. “Lisa’s extensive SaaS experience will be a great addition to our distinguished Board as we deliver end-to-end observability analytics, AI, and automation to enable business transformation of the world’s most successful companies.”

Oomnitza Appoints Robert Potter as CEO

Oomnitza, a leader in Enterprise Technology Management (ETM), has announced the appointment of Robert Potter as its new CEO, succeeding Arthur Lozinski, the company’s founding CEO.

More to know: 

  • Leadership Changes: Victor Hwei and Donna Wilczek have been recently appointed as CFO and CPO, respectively.
  • Potter’s Experience: Potter brings over 25 years of executive experience and previously served as Oomnitza’s interim chief revenue officer.
  • Lozinski’s Transition: Arthur Lozinski, the company’s founder, will remain as a board member after stepping down as CEO.
  • Ongoing Roles for Co-Founders: Ramin Ettehad and Trent Seed will continue in their key roles, contributing to Oomnitza’s strategic direction and innovation.

Data Management News and Updates

InfluxData Brings Higher Performance and New Features to InfluxDB 3.0 to Power Massive Time Series Workloads at Scale

InfluxData, creator of the leading time series platform InfluxDB, today announced new capabilities in the InfluxDB 3.0 product suite that simplify time series data management at scale. InfluxData also announced the general availability of InfluxDB Clustered, its self-managed time series database for on-premises or private cloud deployments.

New Features in InfluxDB Cloud Dedicated:

  • Enhanced Operational Dashboard: Offers visual insights into cluster performance and health for better workload management.
  • Single Sign-On (SSO) Integration: Simplifies access with existing credentials.
  • New APIs: For managing users, databases, and tokens, enabling automation of administrative tasks.
Duos Edge AI Launches First Edge Data Center

Duos Technologies launches its first Edge Data Center (EDC) at the Region 16 Education Service Center in Amarillo, Texas.

News Highlights:

  • Purpose: The EDC will provide high-speed internet and scalable IT resources to enhance educational tools and local business connectivity.
  • Impact: Aims to improve educational outcomes and support economic growth in the Texas Panhandle by closing the digital divide.
  • Operational Timeline: The EDC is set to be operational by mid-September, with plans for further expansion.

Current Trends in Cybersecurity

Cyber Attacks per Employee Up 24Percent in H1 2024, with Email Compromise Soaring 44%-66Percent.

Perception Point, a leading provider of advanced email and workspace security solutions, today released its H1 2024 Cybersecurity Trends & Insights report, revealing a significant increase in the volume and sophistication of cyber attacks targeting businesses globally.

Key findings from the report include:

  • Business Email Compromise (BEC) Attacks Surge: BEC attacks saw a 42% increase in H1 2024 compared to the same period in 2023.
  • Vendor Email Compromise (VEC) on the Rise: VEC attacks, a subset of BEC targeting supply chain communications, rose by 66% in H1 2024.
  • Phishing Remains Dominant: Phishing continues to be the top threat across the modern workspace, representing 75% of all email-based attacks and 89% of browser-based threats in H1 2024.
  • Malware Targeting Microsoft 365: Attacks targeting Microsoft 365 web applications, such as SharePoint, OneDrive, and Teams, were predominantly malware-based, accounting for 68% of all incidents in this channel.
ThreatHunter.ai Introduces ThreatAssessment.ai: A No-Cost Tool for Real-World Cybersecurity Proof of Concept

ThreatHunter.ai, a leader in cybersecurity threat detection and mitigation, is launching ThreatAssessment.ai, a free tool designed to give organizations a clear and precise look at their network traffic and firewall security. This tool provides a straightforward proof of concept, enabling businesses to validate their cybersecurity defenses using real data.

“Our goal with ThreatAssessment.ai is to give companies a clear and unfiltered view of their cybersecurity status,” said James McMurry, CEO of ThreatHunter.ai. “This tool delivers the information you need to take decisive action. And for those who sign up for our First Eyes with Mitigation service after trying ThreatAssessment.ai, we’re offering up to 10% off the first year of services and a chance to win one of two FlipperZero’s.”

IT Recommended Reads

How Can Open Data Revolutionize Decision-Making and Strategy

Discover how open data can transform decision-making and strategy in CIO Influence’s latest article. As data becomes increasingly integral to daily life, the shift from centralized control to open data platforms promises greater transparency, collaboration, and innovation.

This piece delves into the origins of open data, its benefits for decision-makers, and the challenges of implementing effective open data initiatives. IT staff write highlights how open data supports transparency, drives economic development, and fosters educational opportunities, while also addressing critical issues such as legal frameworks and data quality. Gain insights into how embracing open data can enhance your IT strategy and support broader societal advancements.

Mastering API Security: Essential Principles for Success

In his insightful article, Eric Schwake, Director of Cyber Security Strategy at Salt Security, underscores the escalating challenges of API security amidst the rapid adoption of APIs and Generative AI (GenAI). Schwake details how the explosive growth in API usage and the sophistication of GenAI are amplifying security risks, exemplified by recent attacks such as the Dell breach affecting 49 million records. He emphasizes that traditional security measures are falling short, with many organizations still struggling at basic or intermediate levels of API security.

The article outlines essential principles for developing a robust API security strategy, including comprehensive discovery and governance of API assets. Schwake advocates for proactive posture governance, which involves continuous monitoring, categorization, and intelligence gathering on APIs to preemptively address vulnerabilities. Readers will gain valuable insights into the necessity of integrating advanced threat protection measures and posture governance to enhance their API security and mitigate potential threats effectively.

Securing Software Supply Chains: How Technology Leaders Can Build a Unified Front

In his article, Aran Azarzan, JFrog’s Chief Information Officer, delves into the critical issue of software supply chain (SSC) security amidst a rapidly evolving digital landscape. With the growing use of open-source components and the complexity of software ecosystems, SSC vulnerabilities have become a prime target for cybercriminals. Azarzan highlights the alarming 241% increase in SSC attacks, emphasizing that only 30% of organizations prioritize these vulnerabilities.

Key Points:

  1. Complexity and Risk: The software supply chain, integral to modern operations, faces severe risks from breaches, which can lead to data loss, financial damage, and diminished trust.
  2. Inadequate Traditional Methods: Manual code scanning and traditional security measures are increasingly insufficient.
  3. The Shift Left Strategy: Emphasizing early integration of security measures into the software development lifecycle (SDLC) is crucial.

As cyber threats evolve, security and IT leaders must adopt comprehensive strategies to protect the software supply chain. By focusing on advanced automation, universal security solutions, and enhanced communication, organizations can better safeguard their assets and maintain resilience in a complex digital world.

IT Voice of this Week

Todd Cramer, Director of Business Development- Security Ecosystem at Intel CCG-Commercial Client Group

Todd Cramer

Todd Cramer, Director of Business Development for the Security Ecosystem at Intel CCG-Commercial Client Group discusses the compelling advantages of Intel vPro, highlighting why it is considered a top choice for IT teams in his latest Interview at Tech-IT Times by CIOInfluence.com.

Discussion Points Include:

  • Intel vPro Overview: A deep dive into Intel vPro, exploring its core features.
  • Performance and Security Features: How vPro’s built-in capabilities enhance performance, hardware-based security, manageability, and stability, making it an ideal tool for IT management.
  • Enhanced Security Measures: The multilayered security offered by vPro and its effectiveness in protecting business data and devices through advanced remote management.
  • Impact of AI on Security: The influence of AI on commercial security strategies and Intel’s approach to adapting to these changes.
  • Real-World Applications: An examination of industries and organizations that extensively use Intel vPro.

Popular IT Industry Phrases

  • Holochain:  Holochain is an open-source framework for creating decentralized applications (dApps) that are secure, reliable, and fast.
  • Multi-Access Edge Computing (MEC): A network architecture concept that enables cloud computing capabilities at the edge of the network, closer to end-users.
  • Federated Learning: A machine learning approach that allows multiple decentralized devices to collaboratively train a model without sharing raw data.

Brand Shoutout of the Week by CIO Influence

Online Press Kit - Check Point Software

Check Point is a prominent cybersecurity company known for its comprehensive security solutions, including threat prevention, cloud security, and endpoint protection. Established in 1993 and headquartered in Tel Aviv, Israel, Check Point utilizes advanced threat intelligence and AI to safeguard organizations from evolving cyber threats.

CEOGil Shwed

Recent Launch – Check Point recently introduced its new Portal designed for both managed security service providers (MSSPs) and distributors. This platform significantly simplifies service delivery and enhances the ease of doing business with Check Point.

Key IT Events to Watch for

1. TECHSPO Amsterdam 2024

Date: Sep. 12 to 13
Location: Amsterdam, Netherlands

TECHSPO Amsterdam brings together developers, brands, marketers, technology providers, designers, innovators, and evangelists looking to set the pace in our advanced world of technology.

2. Infobip Shift

Date: Sep. 16 to 17
Location: Croatia

This event is an experience that brings together the global tech community for two days of learning, networking, and creating new memories. This is a gathering of professionals, founders, leaders, disruptors, and dreamers. This is Shift.

3. SPIE Sensors + Imaging 2024

Date: Sep. 16 to 19
Location: Edinburgh, Scotland

The premier yearly European event showcases the latest sensor and photonic technologies for imaging and monitoring the Earth’s atmosphere and environment, as well as sensor technologies that address homeland security, defense, and counterterrorism.

4. Info-Tech LIVE

Date: September 17
Location: Las Vegas, NV

Info-Tech LIVE gives a practical, real-world perspective on how IT can take a leading role, as new technologies including generative AI cause major disruption to business models and technology solutions.

[To share your insights with us as part of editorial or sponsored content, please write to psen@itechseries.com]

Related posts

Intel 471 Introduces Geopolitical Intelligence for Real-Time Cyber Threat Insights

Business Wire

Datadog Releases Data Streams Monitoring to Assess Streaming Data Pipeline Performance

PR Newswire

Microsoft Editor in Outlook Promotes More Inclusive and Professional Email

CIO Influence News Desk