If you had a busy week and need to catch up, here’s our recap of tech stories you may have missed the week of 05/01/22!
IT Operations
-
A waterfall regress: Agile momentum limited by issues of scale
-
9 emerging technologies shaping corporate strategies in 2022
-
Security and compliance rank as the top challenges for deploying cloud-native apps
-
The pace of digital transformation may be slowing, but there's still a lot of work ahead
-
Best Predictive Analytics Tools and Software 2022
-
C-suite shifts: CTOs team with CIOs to confront IT challenges
Microsoft
-
Kraft Heinz taps Microsoft to boost supply chain visibility
-
Microsoft Teams new features: Here's what has been added in the past month
-
Microsoft Surface in 2022: What do we want, and what do we expect?
Dell
-
Dell's multi-cloud bet boils down to this: Compute will follow data
-
Dell targets multi-cloud ecosystem with cyber recovery and data analytics
HPE
-
Hewlett Packard Enterprise accelerates RAN deployments with automation and simplified management for both open and traditional networks
Cisco
-
Announcing the public availability of the Cisco Cloud Controls Framework (CCF)
-
The future of healthcare is here and Wi-Fi 6E is accelerating its advancement
-
Cisco StarOS Forensic Guide Published
AWS
-
How to control access to AWS resources based on AWS account, OU, or organization
-
Introducing Kubernetes Resource View in Amazon EKS console
-
Let’s Architect! Serverless architecture on AWS
Security
-
A security researcher easily found my passwords and more: How my digital footprints left me surprisingly over-exposed
-
Russian hacker group APT29 targeting diplomats
-
Hackers used the Log4j flaw to gain access before moving across a company's network, say security researchers
-
VM escape and root access bugs fixed in Cisco NFV infrastructure software
-
This unpatched DNS bug could put 'well-known' IoT devices at risk
-
Security researchers: Here's how the Lazarus hackers start their attacks
-
'Once they have access to your screen, they have complete control'. Watch out for these screen-sharing scams
-
UNC3524: The nearly invisible cyberespionage threat sitting on network appliances
-
This sneaky hacking group hid inside networks for 18 months without being detected
Thanks for checking out our tech news recap!
By Jake Cryan, Digital Marketing Specialist