ITNE: Storage, AI, Developer, Veeam, Fortinet, CxO Security Events (313.2.4)
Volume 313, Issue 2: Apr 8th, 2024 — Apr 14th, 2024
Storage
AI
Developer
Veeam News
Fortinet News
CxO Security Events
Protect Your Attack Vectors From Emerging Threats (Apr 25th)
Beyond the Hype: Understanding Security Risks in Public LLMs (May 9th)
A Pain in the NAS: Exploiting Cloud Connectivity to PWN Your NAS (May 16th)
Storage
How Storage Migration Tools Can Help Enterprises
Storage migrations are common but can be challenging. But enterprises don't have to go it alone. Tools can aid the many different kinds of migrations and their circumstances....more
New Storage Software Company Leil Storage Developing Saunafs, Distributed File System Inspired By Google
For their own usage, hyperscalers developed their own file system because they didn't find commercial or other solutions on the market that can address their needs both in terms of scalability, throughput and resiliency with a very low cost....more
Storage Technology Explained: AI And Data Storage
In this guide, we examine the data storage needs of artificial intelligence, the demands it places on data storage, the suitability of cloud and object storage for AI, and key AI storage products...more
AI
The 10 Best AI Courses In 2024
Today's options for best AI courses offer a wide variety of hands-on experience with generative AI, machine learning and AI algorithms....more
Top 10 AI Tools For Business Optimization: April Edition
In this edition we researched the top 10 AI tools that are set to reinvent business operations...more
Top 5 AI Trends To Watch In 2024
Generative AI is finding its niches within business in 2024, with multimodal models providing new capabilities. At the same time, artists glaze their work against AI scraping....more
Developer
Most Programmers Will Be Using AI Coders By 2028
Coders need to get used to AI, report claims...more
Why You Need An SBOM (Software Bill Of Materials)
SBOMs are security analysis artifacts becoming required by more companies due to internal policies and government regulation. If you sell or buy software, you should know the what, why, and how of the SBOM....more
Veeam News
VeeamON 2024 to Showcase the Future of Intelligent Data Protection and Ransomware Recovery
Registration is now open for the year's most exciting event for data protection, intelligence, and cyber security....more
Fortinet News
Fortinet Wins Two Google Cloud Technology Partner Of The Year Awards For Security
Fortinet announced it has received two 2024 Google Cloud Technology Partner of the Year Awards for Security in the Application and Infrastructure categories....more
Unified Sase: The Third Era Of Network Security
It should come as no surprise that the three largest cybersecurity markets today are endpoint security, network security, and identity. Yes, there are other large cybersecurity markets, such as email security, web security, cloud security, SIEM, and SOC, but the three I singled out account for over 50% of the cybersecurity market and are a big part of any customer's budget....more
CxO Security Events
Protect Your Attack Vectors From Emerging Threats (Apr 25th)
Exposure can result in inbound threats, like DDoS attacks or zero day exploits, or users can encounter these threats while browsing the Internet. Join Lauren Guerra, Head of Threat Intelligence, and Catherine Newcomb, Product Marketing Manager for Application Security to discuss...more
Beyond the Hype: Understanding Security Risks in Public LLMs (May 9th)
In this webinar, join Shiri Arad Ivtsan, Senior Director of Product Management Unveiling Security, as she delves into the crucial strategies for mitigating security risks associated with public LLMs. This discussion is essential to understanding the evolving landscape of LLMs and ensuring their responsible development and deployment....more
A Pain in the NAS: Exploiting Cloud Connectivity to PWN Your NAS (May 16th)
In this talk, we will explain the pairing process of WD and Synology NAS. We will elaborate on the overall architecture of their cloud offering and focus on the vulnerabilities we found including ways to enumerate and impersonate all edge devices using certificate transparency log (CTL), and steal cloud proxy auth tokens....more