- Welcome Guest
- Sign In
A cadre of tech giants have created the Rust Foundation. This is neither the first nor largest contribution to an open-source project by private tech vendors. Still, the creation of this new body marks another noteworthy instance in which proprietary software companies took the initiative to found a...
In a recent Linux Foundation blog post titled "Preventing Supply Chain Attacks like SolarWinds," the foundation's Director of Open Source Supply Chain Security, David A. Wheeler, adamantly pushed the need for software developers to embrace the LF's security recommendations. Given the magnitude of th...
Cybersecurity experts predict that in 2021 there will be a cyberattack incident every 11 seconds. This is nearly twice what it was in 2019, and four times the rate five years ago in 2016. The rapidly growing increase in cyberattacks worldwide comes at a hefty cost for businesses in order to better p...
I participated in a group analyst event several weeks ago about companies converting their offices into collections of meeting rooms. We couldn't picture people who have been meeting remotely for so many months suddenly concluding that the long commute to and from the office was worth meeting in per...
Cyberattacks are increasing in frequency, ramping up the data privacy threats they pose to government agencies and businesses alike. Governments both domestic and foreign need to step up efforts to pass legislation that bolsters technological defenses this year, warn privacy groups. Stiffer privacy ...
In the early part of 2020, the pandemic forced companies around the world to rethink their practices and determine how to accelerate the adoption of technologies that would enable remote work. After closing out on a tumultuous year, many business leaders admit where they may have gone wrong. Here a...
More than 80 percent of 650 cybersecurity and IT professionals surveyed by Check Point Software Technologies in July said their traditional security solutions either do not work at all, or only provide limited functions in the cloud. This indicates that organizations' cloud migrations and deployment...
More than 90 percent of IT leaders surveyed for a recent report expect to expand their cloud services in the next one to three years. Despite this testament to the benefits of cloud adoption, enterprises may find a lack of qualified IT workers to fill those positions. A majority of cloud team leader...
Powerful events and product launches by Cisco, Lenovo, Microsoft, and Qualcomm promise to make our future brighter. From more effective courts and legislators, to flexible and intelligent robots, to tools we can use to improve remote productivity, to validation that our justice system works -- last ...
The BizOps Coalition hopes to bridge the gap between technology investments and business outcomes through an effort called the BizOps Manifesto. The BizOps movement has gained traction with leading organizations, helping them to better align IT with business outcomes. But more needs to be done. That...
The Linux Foundation last month announced its intent to form the Linux Foundation Climate Finance Foundation to empower investors, banks, insurers, companies, governments, NGOs, and academia with AI-enhanced open-source analytics and open data to address climate risk and opportunity. Allianz, Amazon...
Instead of legacy security models that differentiate a "trusted" interior from an untrusted external one, zero trust instead assumes that all networks and hosts are equally untrustworthy. Once this fundamental shift in assumptions is made, you start to make different decisions about what, who, and w...
At Microsoft Ignite last week, the breadth and focus that Microsoft demonstrated were arguably well beyond what any other company is capable of doing. This lesson is worth remembering because Microsoft, unlike its peers facing antitrust action, is showing how to become powerful without becoming a th...
Surely spurred by the work-from-home necessities of 2020, people have connected a multitude of non-business devices to their corporate networks, making it progressively difficult to implement cybersecurity because every device is a potential weak point. So, who will ultimately be responsible for cyb...