Monday, 3 January 2022

VB Daily | January 3 -Endpoint security in 2022: Where to invest💰

Daily Roundup
Presented by   
The Lead
The Follow
[1]  For chief information security officers (CISOs) and their teams, there's no shortage of directions to pursue when it comes to endpoint security in 2022. Identifying the trends that will accelerate positive business outcomes from endpoint investments is a good starting point. Proving endpoint security's business case sets the foundation for CISOs to win budget approvals in 2022 and beyond. With that goal in mind, the following are the trends that will most improve endpoint security in 2022
  1. Zero-trust security's contributions to endpoint security accelerate in 2022
  2. CISOs will focus more on consolidating endpoint systems, starting with UEM
  3. Self-healing endpoints will have a breakout year in 2022
  4. AI, behavioral analytics, and firmware-embedded technologies redefine endpoint management
  5. Enterprises will turn to AI and ML-based approaches for battling ransomware
>> Read more.
[2] Technical decision-makers at companies, whether big or small, try to look for flexible ways to speed up application development and ensure long-term scalability for their engineering teams. Configuring solutions such as AWS requires a team of in-house experts, which is expensive and takes time to build. In fact, more than 77% of tech companies run into DevOps challenges across the board, including cost, risks, security, optimization of the deployment pipeline, and scaling. 
That's where San Francisco-based Zeet, a platform that solves DevOps challenges and accelerates application deployment for startups, comes in.
To use the platform, developers bring their code to Zeet from a GitHub or Docker Hub repository. Once that is done, the solution analyzes the underlying source code and defines the elements required for processing, including which codebase to use for development. Then, it automatically builds the application without requiring the user to cobble together continuous integration (CI) tools such as AWS CodeBuild, Jenkins, and Travis CI.
The application can then be transparently deployed across multiple clouds and configured for active monitoring using enterprise tools such as PagerDuty, Datadog, or Dynatrace.
In the deployment tooling space, Zeet goes against players such as HashiCorp, Netlify, Render.com, and Heroku. However, Dallas claims its platform is different from typical platform-as-a-service (PaaS) providers because it allows customers to deploy into their own cloud provider. >> Read more.
[3] It has been a busy year in the open source software sphere, from high-profile license changes to critical zero-day vulnerabilities that sent businesses into meltdown. But in among all the usual excitement that permeates the open source world, countless open source startups launched new products, attracted venture capitalist's (VC) money, and generally reminded us of the role that open source plays in today's technological landscape – including the data sovereignty and digital autonomy it promises companies of all sizes.
Join us in taking a look at some fledgling commercial open source companies that gained traction in the past year, revealing where enterprises and investors are betting on the power of community-driven software. >> Read more.
Maximize the New Event Marketing Opportunity

 

The Buzz
UCLPartners
New Blog: @jacqui_gath who sits on the Patient and Public Involvement and Engagement Group for @data_can_hub has written about the importance of #DiverseData for creating better, fairer treatment for all.

https://t.co/fJ1KAaufqg https://t.co/fswRCK2397
Deb Raji
There are *so* many things to think about when it comes to ML evaluation - some of which the field has yet to investigate properly!

Glad I could be a part of this project, led by Thomas Liao, and with @rtaori13 & @lschmidt3. I learnt a lot!

Paper here: https://t.co/uotjMGAcl2 https://t.co/vOF20UBDwe
Maximize the New Event Marketing Opportunity
On This Day
On this day in 2009, the first 50 Bitcoins were mined by Satoshi Nakamoto, a pseudonym for an identity that is unknown. Throughout the years, several individuals have both claimed to be Satoshi Nakamoto, and/or have claimed to know his true identity. However, nothing about his true identity has ever been confirmed. 
The first 50 Bitcoins ever mined were known as the Genesis Block — and were mined six days before the launch of the cryptocurrency network. A network that has grown rapidly and immensely since. Because no one single entity or governmental body can regulate or control Bitcoin, it has become widely known for its popularity and private, secure transactions.
VB Lab
VB Lab is VentureBeat's strategic thought leadership consultancy and branded content studio. We offer exceptional business results for our strategic partners using proven processes where we listen, ideate, and create innovative opportunities and custom marketing solutions.
For additional info, reach out directly to: vblab@venturebeat.com
Are you registered yet?
 
Did someone share VB Daily with you because they knew you'd love it? Sign up to get top data, AI, and tech news delivered to your inbox every weekday >>
Did you enjoy this issue?
VentureBeat
By VentureBeat

Catch up on VentureBeat's latest top stories.

In order to unsubscribe, click here.
Powered by Revue
500 Sansome St. #404, San Francisco, CA 94111

No comments:

Post a Comment

[New post] Giants

...