CIO Influence
Cloud Cognitive Featured HR Technology IT and DevOps Networking Security

This Week in CIO Influence: Top Trends and Stories (13th – 17th Jan)

This Week in CIO Influence: Top Trends and Stories (13th – 17th Jan)

The IT world is on a fast track of transformation, setting the tone for a year packed with groundbreaking advancements and strategic evolution. As we close the week ending January 17th, 2025, the digital space is alive with innovation and disruptive technologies poised to revolutionize business landscapes.

This week, the spotlight is on the skyrocketing adoption of cloud solutions and the remarkable influence of AI-driven automation, as organizations adapt to stay competitive and future-ready. Meanwhile, the growing urgency around cybersecurity takes center stage, reminding us of the ever-present challenge of safeguarding data in a hyper-connected environment. These dynamic shifts hint at a year where IT events and breakthroughs will shape how industries navigate an increasingly digital future.

In this edition, we bring you a curated selection of impactful CIO insights and transformative tech trends driving change. Whether you’re leading a digital overhaul or keeping an eye on market shifts, these highlights offer valuable direction and strategic clarity to keep you ahead in an ever-evolving industry.

Essential CIO Updates: Key Trends Shaping This Week

IT Security Updates: Top Developments You Need to Know

AvePoint Expands AI-Driven Cybersecurity and IT Management Capabilities with Ydentic Acquisition

AvePoint the global leader in data security, governance and resilience, today entered into an agreement to acquire Ydentic, a SaaS company specializing in centralized multi-tenant management for Microsoft Managed Services Providers (MSPs). This strategic acquisition will drive the continued evolution of Elements, AvePoint’s MSP Platform for greater MSP profitability, increased operational efficiency, scalability, and new security-centric recurring revenue streams.

Ransomware Victims and Threat Groups Have Reached An All-Time High, GuidePoint Security Finds

GuidePoint Security, a cybersecurity solutions leader enabling organizations to make smarter decisions and minimize risk, announced today the release of the GuidePoint Research and Intelligence Team’s (GRIT) annual Ransomware & Cyber Threat Report.

“The GRIT 2025 Ransomware & Cyber Threat Report reveals the resilience and persistence of the ransomware-as-a-service (RaaS) model, highlighting the difficulty of disrupting it,” said Jason Baker, Lead Threat Analyst at GuidePoint Security

What’s New in Cloud Tech

DoiT Acquires LiveDiagrams to Accelerate Cloud Infrastructure Optimization

DoiT, a leading global cloud optimization company offering DoiT Cloud Intelligence™ – a comprehensive multicloud platform powered by industry-defining expertise – is pleased to announce the acquisition of LiveDiagrams, a cloud infrastructure visualization and analysis software. This strategic acquisition provides DoiT Cloud Intelligence customers with advanced functionality to map, monitor, and optimize their cloud architectures and further strengthens DoiT’s ability to deliver true cloud transformation for those customers.

“Acquiring LiveDiagrams aligns with our mission to empower DoiT Cloud Intelligence customers with intelligent solutions for cloud optimization,” said Vadim Solovey, chief executive officer of DoiT.

AI-Driven Data Creation to Spur Next-Wave Cloud Storage Growth, According to New Survey Commissioned by Seagate

According to a recent, global Recon Analytics survey commissioned by Seagate Technology, business leaders from across 15 industry sectors and 10 countries expect that adoption of artificial intelligence (AI) applications will generate unprecedented volumes of data, driving a boom in demand for data storage, in particular cloud-based storage.

Key Findings:

  • 72% surveyed say they use AI today.
  • 61% of respondents who predominately use cloud storage say their cloud-based storage will increase by over 100% over the next 3 years.
  • Storage ranks as the second most important component of AI infrastructure, with Security ranking #1.
    • In order of importance: Security, Storage, Data Management, Network Capacity, Compute, Regulations, LLM Viability, Energy
  • Of those businesses who’ve adopted AI technology, 90% believe longer data retention improves the quality of AI outcomes.
  • 88% of respondents who use AI today believe the adoption of Trustworthy AI requires an increased need to store more data for longer periods.

Transformations in Data Management

Alchemi Data Management Awarded Patent for Ground-Breaking File-Based Protections

Alchemi Data Management Inc., a leading provider of holistic insider threat protection, today announced it has been granted a patent by the U.S. Patent and Trademark Office (USPTO) for game-changing protection technologies that serve as the foundation for its ShieldCRS insider threat protection platform.

“This patent underscores the uniqueness of ShieldCRS’s approach to insider threat protection and the innovation behind our file-based security capabilities,” said Rob Sims, founder and CTO at Alchemi Data Management

Pure Storage and Kioxia Collaborate to Drive Scalability, Efficiency, and Performance in Hyperscale Data Centers

Pure Storage, the IT pioneer that delivers the world’s most advanced data storage technology and services, today announced a collaboration with Kioxia Corporation (“Kioxia”), a world leader in memory solutions, to develop cutting-edge technology that addresses the growing demand for high-performance, scalable storage infrastructure among today’s hyperscale environments.

News Highlights:

With the combination of Pure Storage’s advanced data storage platform with Kioxia’s industry-leading QLC flash memory, hyperscalers can now keep pace with growing data demands without sacrificing performance. Benefits include:

  • Increased Performance: Ultra-fast, low-latency performance for handling massive, data-intensive workloads, while enabling greater reliability to keep pace with rapidly growing customer demands.
  • Improved Cost Efficiency: Optimized storage costs and lower overall total cost of ownership (TCO) by reducing the need for extensive physical resources, while offering better scalability.
  • Lower Power and Waste: Reduced energy consumption significantly compared to traditional HDDs, lowering operational costs, leading to a smaller overall physical footprint, cutting hardware waste and supporting more sustainable data center operations.

Essential IT Reads of the Week

Next-Generation Firewalls: Beyond Packet Filtering to Intelligent Threat Prevention

This article explores the transformative role of Next-Generation Firewalls (NGFWs) in modern cybersecurity. It highlights the limitations of traditional firewalls, which rely on basic packet filtering, and explains how NGFWs address these shortcomings through advanced features like deep packet inspection (DPI), application awareness, and integrated threat prevention.

Key features of NGFWs discussed include:

  • Application awareness and control: Blocking unauthorized or malicious applications.
  • Integrated intrusion prevention systems (IPS): Detecting and mitigating advanced threats.
  • Advanced threat protection (ATP): Leveraging machine learning and sandboxing for real-time analysis.
  • SSL/TLS inspection: Uncovering threats hidden within encrypted traffic.
  • User identity integration: Enforcing policies based on user profiles for enhanced control.

The article also delves into the benefits NGFWs bring, such as comprehensive protection, improved operational efficiency, enhanced visibility, and scalability. Looking forward, it outlines how NGFWs will evolve with advancements in artificial intelligence, IoT integration, and edge computing, solidifying their position as a cornerstone of enterprise security.

Cloud Storage Services vs. Traditional On-Premise Storage: Why the Shift Matters for Your Business

The article explores the ongoing shift from traditional on-premises storage to cloud storage services, offering a comparative analysis to help businesses make informed decisions. It highlights the flexibility, scalability, and cost-efficiency of cloud solutions, making them ideal for dynamic workloads, collaboration, and disaster recovery. Conversely, it recognizes the relevance of on-premises storage for mission-critical applications, stringent compliance, and environments requiring complete control. By outlining the pros and cons of both options, the article provides actionable insights and strategic guidance for aligning storage decisions with business needs, workloads, and long-term growth objectives.

Voices of Innovation: Industry Leaders Share Their Vision

In this engaging interview, Brett Walkenhorst, CTO of Bastille, delves into the critical role of radio frequency (RF) systems in modern cybersecurity, offering a comprehensive look at how Bastille is pioneering advanced solutions to secure enterprises in the often-overlooked RF spectrum.

Key Highlights of the Interview:

  1. Bastille’s Expertise in RF Systems
    Brett explains his focus on building and maintaining an expansive threat library to stay ahead of evolving cyber threats. His insights shed light on the importance of using software-defined radio (SDR) combined with machine learning to detect anomalies, unauthorized transmissions, and potential RF threats in real-time.
  2. IoT Threat Landscape and Bastille’s Role
    With the IoT market booming, Brett identifies the vulnerabilities IoT devices introduce, particularly in the RF spectrum. He discusses Bastille’s commitment to continuously monitor RF signals, adapt to diverse IoT protocols, and enhance predictive threat detection, ensuring enterprises can mitigate risks posed by emerging IoT technologies.
  3. Cultivating Innovation and Promoting Diversity
    Brett highlights Bastille’s innovative culture, emphasizing the value of collaboration and diversity in driving creative problem-solving. He outlines initiatives that promote inclusion within the team and the broader technology landscape, positioning Bastille as a leader in fostering equitable and innovative solutions.
  4. Implications of the SECDEF Memo and Government Compliance
    Brett elaborates on how Bastille supports government agencies in meeting newly mandated security requirements. By utilizing certified, passive RF monitoring solutions, Bastille ensures high detection confidence while eliminating false alarms, effectively securing classified areas against cellular and wireless threats.
  5. Emerging Threats in RF Security
    Brett provides an insightful analysis of how adversaries repurpose existing technologies for innovative attack methods, citing examples like drone-based Wi-Fi attacks and remote pivots through RF vulnerabilities. His forward-looking perspective underscores the growing reliance on wireless components in attack chains and the need for proactive defense mechanisms.

Emerging Brand of the Week

Qualys Web Application Scanning (WAS) Reviews, Ratings & Features 2025 | Gartner Peer Insights

Qualys is a global leader in cloud-based security and compliance solutions, empowering organizations to protect their digital assets and maintain robust cybersecurity postures. Renowned for its integrated platform, Qualys provides a comprehensive suite of tools for vulnerability management, continuous monitoring, compliance auditing, and endpoint detection. By leveraging advanced cloud technologies, Qualys delivers real-time visibility into IT environments, enabling businesses to identify and mitigate risks effectively. With a strong focus on automation and scalability, Qualys helps enterprises streamline security operations, reduce complexities, and achieve compliance across diverse industries.

CEO – Sumedh Thakar

Recent Launch – Qualys Introduces Cloud-Native Security Solution for Comprehensive Threat Detection and Remediation

What’s Coming in 2025: Top Events to Mark on Your Calendar

MicroConf Americas ’25

Date: Mar. 16-18, 2025

Location: New Orleans, LA

An event designed for entrepreneurs and startup founders who are looking for efficient sales tactics. The conference includes keynotes as well as practical examples to equip you with the knowledge and tools needed to generate revenue.

Enterprise Connect

Date: Mar. 17-20, 2025

Location: Orlando, FL

Enterprise Connect brings corporate IT decision-makers together with the industry’s vendors, channel partners, analysts, and consultants to focus on the issues central to enterprise communications and collaboration.

Chief Product Officer Summit New York

Date: Mar. 18, 2025

Location: New York, NY

Join this exclusive network of Chief Product Officers to address challenges in scaling strategy, aligning teams, and driving innovation—and leave with actionable insights to elevate your leadership

[To share your insights with us as part of editorial or sponsored content, please write to psen@itechseries.com]

Related posts

Fuze Expands Microsoft Teams Integration to Drive Deeper Enterprise Collaboration

CIO Influence News Desk

Airbyte Bolsters Enterprise-Level Security with ISO 27001 Security Standard Certification

CIO Influence News Desk

SquareX Appoints John Carse as Field Chief Information Security Officer (CISO)

PR Newswire