If you had a busy week and need to catch up, here’s our recap of tech stories you may have missed the week of 07/18/22!
IT Operations
-
5 experts demystify post-cloud migration challenges
-
Gartner worldwide IT spend forecast dips as economy quakes
-
6 hot IT leadership trends — and 6 going cold
-
The new CIO playbook: 7 tips for success from day one
-
Cloud computing: Oracle and Microsoft make your database look like it's part of Azure
-
What is a virtual machine, and why are they so useful?
-
Network automation, SASE, 5G rank among enterprise priorities
-
The emergence of multi-cloud networking software
-
CIOs contend with rising cloud costs
Microsoft
-
Microsoft Inspire 2022: Introducing Excel Live
-
How to increase productivity by using new Microsoft 365 dashboard in Microsoft Edge
-
Microsoft has these Windows 11 simulations to show you what to expect
-
Windows 11 is getting a new security setting to block ransomware attacks
-
Microsoft Teams is getting all these new hybrid work features
-
Microsoft adds 'Cloud for Sovereignty' to its line-up
-
Microsoft fills in more details on its Digital Contact Center Platform featuring Nuance AI
HPE
-
HPE’s Transformation Was On Full Display At Discover 2022
-
ITbuyers respond to HPE GreenLake cloud pitch
-
HPE Wants to Build and Manage Your Private Cloud
Cisco
-
High Availability – Features in Cisco IOS XE Software Makes It Appear Seamless
-
Cisco DNA Center is now FIPS 140-2 certified
-
Get Comprehensive Insights into Your Network with Secure Analytics and MITRE Mappings
AWS
-
AWS Lambda announces support for Attribute-Based Access Control (ABAC)
-
AWS Single Sign-On (AWS SSO) adds support for AWS Identity and Access Management (IAM) customer managed policies (CMPs)
-
AWS Backup adds support for Amazon RDS Multi-AZ clusters
-
New – Amazon EC2 R6a Instances Powered by 3rd Gen AMD EPYC Processors for Memory-Intensive Workloads
Security
-
Sophos unifies threat analysis and response units into X-Ops team
-
Ransomware attacks slowing as 2022 wears on
-
Cybersecurity is a constant fire drill—that’s not just bad, it’s dangerous
-
MITRE Engage: a framework for deception
-
The Five Pillars of Cloud Security
-
Cyber Safety Review Board classifies Log4j as ‘endemic vulnerability’
-
LinkedIn and Microsoft are the most impersonated brands in phishing attacks
-
These moonlighting hackers are using ransomware against 'random' targets
-
The next big security threat is staring us in the face. Tackling it is going to be tough
-
Hackers turn to cloud storage services in attempt to hide their attacks
-
The biggest cyber-crime threat is also the one that nobody wants to talk about
-
Google Chrome security update fixes 'high risk' flaws
-
Threat actors use Google Drive, Dropbox to launch cyberattacks
-
Are you doing enough to secure your network infrastructure?
Thanks for checking out our tech news recap!
By Jake Cryan, Digital Marketing Specialist