ITNE: Storage, Platform Engineering, AI, IoT, ESET, Microsoft, OneTrust, Check Point, Webinars (328.5.7) Thursday AM
Volume 328, Issue 5: Articles Posted Week: Jul 28th, 2025 — Aug 3rd, 2025
IT News You Can Use - Full Weekly Issue - Vol 328 Issue 5
Storage
Platform Engineering
AI
IoT
ESET News
Microsoft News
OneTrust News
Check Point News
JSCEAL Targets Crypto App Users - A New Threat in the Cyber Security Landscape
Proactive Security For MSPs: 4 Steps To Reduce Risk And Improve Margins
Ransomware In Q2 2025: AI Joins The Crew, Cartels Rise, And Payment Rates Collapse
Check Point Software Leads Email Security Rankings in 2025 GigaOm Radar Anti-Phishing Report
There is no one way to build a cybersecurity program. Every CISO has their own approach, and every organization has its own unique blend of culture, technical infrastructure, and risk appetite. Register
Storage
What Is Data In Use?
Data in use is data that is currently being updated, processed, erased, accessed or read by a system, application, user or device. This type of data is not being passively stored, but is instead actively moving through parts of an IT infrastructure....more
Platform Engineering
Is Platform Engineering Only For The 1%?
The phrase 'Platform Engineering' gets thrown around a lot these days - usually alongside glowing case studies from Fortune 100 giants and tech unicorns. For these companies, spinning up a dedicated platform team, building golden paths, and managing an internal developer portal (IDP) is just another day at the digital factory....more
Platform Engineering: Managing The Ambiguity Of A Fast-Growing Discipline
Ask 10 developers to define platform engineering, and you may get 10 different answers. Is it a tool? A set of techniques? A job title?...more
AI
The Rise Of Multi-Agent AI Systems: What CIOs Should Know
The world of technology is rapidly evolving with the advent of AI. 2025 is shaping up to be a milestone year in the evolution of AI agents, with multi-agent systems poised to redefine enterprise automation....more
Increase Adoption Through AI-Powered Personalization
We've all had that moment recently. You open up an app, head over to an e-commerce site, or scroll through ads on social media and get recommendations that are just a little too perfect. It's as though your inner shopping thoughts were exposed. It felt like the technology just got you....more
Healthcare's AI Agent Reality Check
Keebler Health CEO Isaac Park dives into the impact artificial intelligence (AI) is having across the healthcare sector....more
Is AI Overhyped Or Underhyped? 6 Tips To Separate Fact From Fiction
Two leading authorities on the AI wave disagree on its potential impact....more
IoT
Top 10 Industries Benefiting From IoT In 2025
Today, Internet of Things (IoT) is not a futuristic idea, but it has become a fundamental driver of digital transformation. Industries using IoT 2025 have gradually started adopting new tech and they are reshaping the entire operational models. They are streamlining their supply chains, improving customer experiences as well as unlocking billions in value of course....more
What Is Internet Of Things Device Management (IoT Device Management)?
Internet of things device management (IoT device management) refers to the processes and tools used to remotely register, configure, provision, maintain and monitor connected devices from a centralized platform....more
Satellite IoT Competitive Landscape: 5 Notable Insights
More than 100 vendors are currently active in the satellite IoT market landscape, according to IoT Analytics' Satellite IoT Market Report 2025-2030 (published June 2025)....more
In a world of AI-driven software creation, microservices, and cloud-native architectures, traditional AppSec methods can't keep pace. This webinar builds on our latest ESG whitepaper to explore how Agentic AI is transforming AppSec from reactive to proactive. Register
ESET News
Ok, Computer: How To Clean Out Your PC After Malware
Cleaning your PC post-incident? Here are a few tips and tricks that should make your PC run like a well-oiled machine....more
Jailbreaking And Rooting Exposed: Understanding Hidden Mobile Security Risks
If you decide to jailbreak or root your device, it could make you a target....more
Microsoft News
Discover The Potential Of Agentic AI In Higher Education
At Microsoft Build 2025, we unveiled a new wave of agentic innovations that are reshaping how higher education institutions use AI. From intelligent agents to unified data platforms, these advancements empower higher education leaders to confidently accelerate digital transformation....more
A Ladder Of Reasoning: Testing The Power Of Imagination In LLMs
Reasoning systems have emerged as a focus of research on language models (LMs), as the field moves beyond surface-level language ability to target deeper cognitive skills. Reasoning, in this context, can be defined as the ability to follow a coherent sequence of steps in order to draw logical inferences, synthesize information, and construct solutions - rather than merely recalling facts or patterns....more
OneTrust News
CCPA Adopts New CCPA Regulations: What Businesses Need To Know
California's latest privacy updates introduce major compliance obligations for businesses using automated decision-making, conducting risk assessments, and performing cybersecurity audits...more
Check Point News
JSCEAL Targets Crypto App Users - A New Threat in the Cyber Security Landscape
At Check Point, we continuously monitor emerging cyber security threats to help protect our users from evolving risks. In this blog, we delve into the JSCEAL campaign, which has been actively targeting crypto app users since March 2024....more
Proactive Security For MSPs: 4 Steps To Reduce Risk And Improve Margins
As an MSP, you're increasingly expected to deliver more than just uptime and availability. Customers now rely on you for security, compliance, and risk reduction. That creates a tremendous opportunity: by evolving your offerings to include proactive security services, you don't just protect your customers - you lead....more
Ransomware In Q2 2025: AI Joins The Crew, Cartels Rise, And Payment Rates Collapse
In Check Point Research's latest Ransomware Threat Intelligence Report, we break down how the ransomware ecosystem is rapidly transforming. This quarter's shift includes AI-generated malware, collapsing trust in decryption, affiliate-powered cartels, and a fragmented threat landscape that's harder than ever to track....more
Check Point Software Leads Email Security Rankings in 2025 GigaOm Radar Anti-Phishing Report
Check Point stands out for its advanced phishing and malware prevention capabilities, driven by innovations like Infinity AI Copilot and a forward-looking security roadmap...more
Securing the Age of Agentic AI: Autonomy, Risk, and Resilience Register