If you had a busy week and need to catch up, here’s our recap of tech stories you may have missed the week of 03/07/22!
On-Demand CIO Webcast: Why Cybersecurity Must Start at the Top
IT Operations
-
A CIO's guide to going cloud native
-
How IT can support security in the event of a cyberattack
-
Report: SMBs are making serious investments in the cloud
-
Ukraine war tests cyber insurance exclusions
-
8 takeaways for CISOs from the NSTAC zero-trust report
-
Rush to cloud computing is outpacing organizations' ability to adapt
-
How to prepare employees for elevated cyber risk from the Ukraine crisis
-
Security strategies evolve while spending flatlines
Microsoft
-
Microsoft March 2022 Patch Tuesday: 71 vulnerabilities fixed
-
Microsoft Security delivers new multicloud capabilities
-
Cloud computing: Microsoft fixes Azure flaw that could have allowed access to other accounts
-
Microsoft Azure ups the pressure on AWS
VMware
-
VMware Cloud on AWS now available in AWS Marketplace
- AWS and VMware collaborate across 5G and Edge Computing solutions
Cisco
-
Stay on target: How accurate threat detection leads to better defense
-
Introducing the new 'Defending Against Critical Threats' report
AWS
-
New – Amazon EC2 X2idn and X2iedn Instances for Memory-Intensive Workloads with Higher Network Bandwidth
-
AWS delivers a new unified service health dashboard
-
AWS Week in Review - March 7, 2022
-
New Amazon RDS for MySQL & PostgreSQL Multi-AZ Deployment Option: Improved Write Performance & Faster Failover
Security
-
Bugcrowd's top bug bounty reward increases to $1 million
-
It's time to stop hoping that cybersecurity problems will just go away
-
FBI warns of online scammers impersonating government officials, law enforcement
-
In-the-wild DDoS attack can be launched from a single packet to create terabytes of traffic
-
New cyberattacks emerge in Ukraine targeting government and industry
-
Botnets, data wiping malware spread as Ukraine incursion begins
-
Cyberattack on Nvidia results in data leak, credential theft
-
Within hours of the Log4j flaw being revealed, these hackers were using it
-
This ransomware group has gone after critical infrastructure firms again and again