The IT world is on a fast track of transformation, setting the tone for a year packed with groundbreaking advancements and strategic evolution. As we close the week ending January 17th, 2025, the digital space is alive with innovation and disruptive technologies poised to revolutionize business landscapes.
This week, the spotlight is on the skyrocketing adoption of cloud solutions and the remarkable influence of AI-driven automation, as organizations adapt to stay competitive and future-ready. Meanwhile, the growing urgency around cybersecurity takes center stage, reminding us of the ever-present challenge of safeguarding data in a hyper-connected environment. These dynamic shifts hint at a year where IT events and breakthroughs will shape how industries navigate an increasingly digital future.
In this edition, we bring you a curated selection of impactful CIO insights and transformative tech trends driving change. Whether you’re leading a digital overhaul or keeping an eye on market shifts, these highlights offer valuable direction and strategic clarity to keep you ahead in an ever-evolving industry.
Essential CIO Updates: Key Trends Shaping This Week
IT Security Updates: Top Developments You Need to Know
AvePoint Expands AI-Driven Cybersecurity and IT Management Capabilities with Ydentic Acquisition
AvePoint the global leader in data security, governance and resilience, today entered into an agreement to acquire Ydentic, a SaaS company specializing in centralized multi-tenant management for Microsoft Managed Services Providers (MSPs). This strategic acquisition will drive the continued evolution of Elements, AvePoint’s MSP Platform for greater MSP profitability, increased operational efficiency, scalability, and new security-centric recurring revenue streams.
Ransomware Victims and Threat Groups Have Reached An All-Time High, GuidePoint Security Finds
GuidePoint Security, a cybersecurity solutions leader enabling organizations to make smarter decisions and minimize risk, announced today the release of the GuidePoint Research and Intelligence Team’s (GRIT) annual Ransomware & Cyber Threat Report.
“The GRIT 2025 Ransomware & Cyber Threat Report reveals the resilience and persistence of the ransomware-as-a-service (RaaS) model, highlighting the difficulty of disrupting it,” said Jason Baker, Lead Threat Analyst at GuidePoint Security
What’s New in Cloud Tech
DoiT Acquires LiveDiagrams to Accelerate Cloud Infrastructure Optimization
DoiT, a leading global cloud optimization company offering DoiT Cloud Intelligence™ – a comprehensive multicloud platform powered by industry-defining expertise – is pleased to announce the acquisition of LiveDiagrams, a cloud infrastructure visualization and analysis software. This strategic acquisition provides DoiT Cloud Intelligence customers with advanced functionality to map, monitor, and optimize their cloud architectures and further strengthens DoiT’s ability to deliver true cloud transformation for those customers.
“Acquiring LiveDiagrams aligns with our mission to empower DoiT Cloud Intelligence customers with intelligent solutions for cloud optimization,” said Vadim Solovey, chief executive officer of DoiT.
AI-Driven Data Creation to Spur Next-Wave Cloud Storage Growth, According to New Survey Commissioned by Seagate
According to a recent, global Recon Analytics survey commissioned by Seagate Technology, business leaders from across 15 industry sectors and 10 countries expect that adoption of artificial intelligence (AI) applications will generate unprecedented volumes of data, driving a boom in demand for data storage, in particular cloud-based storage.
Key Findings:
- 72% surveyed say they use AI today.
- 61% of respondents who predominately use cloud storage say their cloud-based storage will increase by over 100% over the next 3 years.
- Storage ranks as the second most important component of AI infrastructure, with Security ranking #1.
- In order of importance: Security, Storage, Data Management, Network Capacity, Compute, Regulations, LLM Viability, Energy
- Of those businesses who’ve adopted AI technology, 90% believe longer data retention improves the quality of AI outcomes.
- 88% of respondents who use AI today believe the adoption of Trustworthy AI requires an increased need to store more data for longer periods.
Transformations in Data Management
Alchemi Data Management Awarded Patent for Ground-Breaking File-Based Protections
Alchemi Data Management Inc., a leading provider of holistic insider threat protection, today announced it has been granted a patent by the U.S. Patent and Trademark Office (USPTO) for game-changing protection technologies that serve as the foundation for its ShieldCRS insider threat protection platform.
“This patent underscores the uniqueness of ShieldCRS’s approach to insider threat protection and the innovation behind our file-based security capabilities,” said Rob Sims, founder and CTO at Alchemi Data Management
Pure Storage and Kioxia Collaborate to Drive Scalability, Efficiency, and Performance in Hyperscale Data Centers
Pure Storage, the IT pioneer that delivers the world’s most advanced data storage technology and services, today announced a collaboration with Kioxia Corporation (“Kioxia”), a world leader in memory solutions, to develop cutting-edge technology that addresses the growing demand for high-performance, scalable storage infrastructure among today’s hyperscale environments.
News Highlights:
With the combination of Pure Storage’s advanced data storage platform with Kioxia’s industry-leading QLC flash memory, hyperscalers can now keep pace with growing data demands without sacrificing performance. Benefits include:
- Increased Performance: Ultra-fast, low-latency performance for handling massive, data-intensive workloads, while enabling greater reliability to keep pace with rapidly growing customer demands.
- Improved Cost Efficiency: Optimized storage costs and lower overall total cost of ownership (TCO) by reducing the need for extensive physical resources, while offering better scalability.
- Lower Power and Waste: Reduced energy consumption significantly compared to traditional HDDs, lowering operational costs, leading to a smaller overall physical footprint, cutting hardware waste and supporting more sustainable data center operations.
Essential IT Reads of the Week
Next-Generation Firewalls: Beyond Packet Filtering to Intelligent Threat Prevention
This article explores the transformative role of Next-Generation Firewalls (NGFWs) in modern cybersecurity. It highlights the limitations of traditional firewalls, which rely on basic packet filtering, and explains how NGFWs address these shortcomings through advanced features like deep packet inspection (DPI), application awareness, and integrated threat prevention.
Key features of NGFWs discussed include:
- Application awareness and control: Blocking unauthorized or malicious applications.
- Integrated intrusion prevention systems (IPS): Detecting and mitigating advanced threats.
- Advanced threat protection (ATP): Leveraging machine learning and sandboxing for real-time analysis.
- SSL/TLS inspection: Uncovering threats hidden within encrypted traffic.
- User identity integration: Enforcing policies based on user profiles for enhanced control.
The article also delves into the benefits NGFWs bring, such as comprehensive protection, improved operational efficiency, enhanced visibility, and scalability. Looking forward, it outlines how NGFWs will evolve with advancements in artificial intelligence, IoT integration, and edge computing, solidifying their position as a cornerstone of enterprise security.
Cloud Storage Services vs. Traditional On-Premise Storage: Why the Shift Matters for Your Business
In this engaging interview, Brett Walkenhorst, CTO of Bastille, delves into the critical role of radio frequency (RF) systems in modern cybersecurity, offering a comprehensive look at how Bastille is pioneering advanced solutions to secure enterprises in the often-overlooked RF spectrum.
Key Highlights of the Interview:
- Bastille’s Expertise in RF Systems
Brett explains his focus on building and maintaining an expansive threat library to stay ahead of evolving cyber threats. His insights shed light on the importance of using software-defined radio (SDR) combined with machine learning to detect anomalies, unauthorized transmissions, and potential RF threats in real-time. - IoT Threat Landscape and Bastille’s Role
With the IoT market booming, Brett identifies the vulnerabilities IoT devices introduce, particularly in the RF spectrum. He discusses Bastille’s commitment to continuously monitor RF signals, adapt to diverse IoT protocols, and enhance predictive threat detection, ensuring enterprises can mitigate risks posed by emerging IoT technologies. - Cultivating Innovation and Promoting Diversity
Brett highlights Bastille’s innovative culture, emphasizing the value of collaboration and diversity in driving creative problem-solving. He outlines initiatives that promote inclusion within the team and the broader technology landscape, positioning Bastille as a leader in fostering equitable and innovative solutions. - Implications of the SECDEF Memo and Government Compliance
Brett elaborates on how Bastille supports government agencies in meeting newly mandated security requirements. By utilizing certified, passive RF monitoring solutions, Bastille ensures high detection confidence while eliminating false alarms, effectively securing classified areas against cellular and wireless threats. - Emerging Threats in RF Security
Brett provides an insightful analysis of how adversaries repurpose existing technologies for innovative attack methods, citing examples like drone-based Wi-Fi attacks and remote pivots through RF vulnerabilities. His forward-looking perspective underscores the growing reliance on wireless components in attack chains and the need for proactive defense mechanisms.
Emerging Brand of the Week
Qualys is a global leader in cloud-based security and compliance solutions, empowering organizations to protect their digital assets and maintain robust cybersecurity postures. Renowned for its integrated platform, Qualys provides a comprehensive suite of tools for vulnerability management, continuous monitoring, compliance auditing, and endpoint detection. By leveraging advanced cloud technologies, Qualys delivers real-time visibility into IT environments, enabling businesses to identify and mitigate risks effectively. With a strong focus on automation and scalability, Qualys helps enterprises streamline security operations, reduce complexities, and achieve compliance across diverse industries.
CEO – Sumedh Thakar
Recent Launch – Qualys Introduces Cloud-Native Security Solution for Comprehensive Threat Detection and Remediation
What’s Coming in 2025: Top Events to Mark on Your Calendar
MicroConf Americas ’25
Date: Mar. 16-18, 2025
Location: New Orleans, LA
An event designed for entrepreneurs and startup founders who are looking for efficient sales tactics. The conference includes keynotes as well as practical examples to equip you with the knowledge and tools needed to generate revenue.
Enterprise Connect
Date: Mar. 17-20, 2025
Location: Orlando, FL
Enterprise Connect brings corporate IT decision-makers together with the industry’s vendors, channel partners, analysts, and consultants to focus on the issues central to enterprise communications and collaboration.
Chief Product Officer Summit New York
Date: Mar. 18, 2025
Location: New York, NY
Join this exclusive network of Chief Product Officers to address challenges in scaling strategy, aligning teams, and driving innovation—and leave with actionable insights to elevate your leadership