Today’s IP news roundup highlights some of the latest headlines in network security, IT management and more:
- According to an Accenture study, only 11% of CIOs and 13% of CMOs feel that there is enough collaboration between IT and marketing. In the study, 49% of CIOs stated that marketing brings in new technology without considering IT standards, while only 51% of CMOs believe that IT understands their requirements. For more information on the lack of alignment between IT and marketing, see ITworld.
- IT must focus on network security. According to an article on the CSO Data Protection blog, there is no silver bullet that will protect organizations from cyber threats. The article states, “It is important to acknowledge the need for more robust planning and to understand that simply throwing the latest ‘magic box’ at the problem is not going to outsmart the sophisticated cyber criminals we face today. This is especially true as points of entry into our networks expand to a mobile workforce and a vast collection of new devices and sensors — what we refer to as the Internet of Things.” The article suggests taking a deeper look at your network to identify possible threats and better protect your data. For more information on safeguarding your organization against cyber threats, see the CSO Data Protection blog.
- A new Microsoft paper states that fuel cells may soon eliminate the need for electrical-powered data centres. According to CIO.com, the paper “investigates fuel cells as a centralized power source and as distributed power generation technology with fuel cells used at the rack or single server cabinet level.” Fuel cells can provide data centres with a number of benefits, such as improved reliability and lower costs. However, they have a number of technology issues that must be overcome before they become mainstream. For more information on fuel cell power, see CIO.com.
- Traffic hijacking is on the rise. Internet monitoring firm Renesys revealed that “unknown attackers have successfully hijacked and redirected Internet traffic belonging to financial services companies, VoIP providers and governments many times over the past year.” Hackers are using “man in the middle” attacks to reroute traffic to another location before sending it back on its original path. Often, victims do not notice a lag time when this occurs. For more information on traffic hijacking, see Computerworld.
- And finally … if you’re going to a massive tech conference, ITworld has some advice on how you can get the most from it. Using the example of Dreamforce 2013, ITworld suggests that you take advantage of the higher-level technical sessions that aren’t available at many smaller conferences. It also recommends that you schedule time after the conference to download slide presentations from sessions that you wanted to attend but missed. For more information on getting the most from a tech conference, see ITworld.
What is your take on today’s news? Please share your opinions below.