By Andy Nallappan, Chief Technology Officer and Head of Software Business Operations, Broadcom Software – The Artificial Intelligence (AI) transformation is taking place even faster than anticipated, with increasing numbers of enterprise companies incorporating AI software into their development process. As I mentioned in my previous predictions blog from December 2021, about what to expect in 2022, AI is not only based in the future — it is here.
Cybersecurity strategies for years have been grounded in protecting the perimeter of the corporate network. Yet, as nearly every organization learned during the COVID-19 crisis, that perimeter no longer exists. Nearly all new software functionality is now deployed as a service (SaaS) that people access from a multitude of locations and devices. No company has the luxury of containing the enterprise IT environment within its four walls anymore.
Western businesses are taking cues from China’s successes as they look to transform their own businesses. As the world’s attention turns towards the country’s digital opportunity, many foreign companies are looking to expand their footprint into the Chinese market.
By George Trujillo, Principal Data Strategist, DataStax – If, as Gartner puts it, an operating model brings the broader business model to life, then execution patterns are an important part of breathing life into an operating model. Patterns maintain consistency when executing on the operating model. Mike Tyson is often quoted as saying, “Everyone has a plan until they get punched in the mouth.”
Not long ago, security concerns were the number one reason IT executives hesitated to move workloads to the cloud. Much has changed since then. Security is now considered one of the great strengths of both cloud infrastructure and software-as-a-service (SaaS) platforms. But that doesn’t mean total security is assured. The most hardened platforms in the world are only as effective as the people who use them.
By Tarun Khandelwal, an executive security advisor to the financial services industry and the former Head of Security Architecture at CIBC, and a Palo Alto Networks customer – We’ve all seen movies and TV shows where SWAT teams or military forces take heroic steps to safeguard lives and property in the event of a bomb threat. Chief among the defensive efforts they put in place are ways to reduce the impact of a potential explosion—reducing the blast surface. Often, they use machines such as remote-controlled robots to safeguard their human team members. Obviously, they want to prevent the blast from happening in the first place, but at the very least, they want to ensure they can mitigate its impact as much as possible.
By Derrick Lowe, Chief Information Security Officer at Orlando Health, a Palo Alto Networks customer – On the surface, cybersecurity in healthcare may not seem all that different from cybersecurity in other verticals such as financial services, retail, manufacturing, or education. Several of these are highly regulated, have exacting data governance mandates and deal with huge and growing volumes of data essential to their daily and long-term business operations.
By Matt Chiodi, Chief Security Officer, Public Cloud, Palo Alto Networks – Supply chain security has become top-of-mind for many leaders, as incident after incident has revealed supply chain vulnerabilities that expose significant organizational risk. Security challenges like Log4j and SolarStorm have battered organizations of all sizes with risks they likely didn’t even know they had. With a supply chain attack, a vulnerability in one component of a software stack can expose an entire organization to potential exploitation.
By Jeff Henry, head of product strategy – Mainframe, Broadcom Software – Think about the importance of a single second in sports. In F1 racing, the average pit stop is just two to three seconds. The driver and crew know that getting the car in and out that quickly is what it takes to beat the competition to the checkered flag. How many basketball games or other sports competitions come down to a critical moment that makes all the difference? Queue the half court “buzzer beater,” last-second “Hail Mary” touchdown, or “photo finish” at the Kentucky Derby. Clearly, time matters!
By Ilias Chantzos, Global Privacy Officer and Head of EMEA Government Affairs, Broadcom Inc. – When it comes to avoiding ransomware attacks, no sector remains safe anymore. Yet, the financial services sector in particular remains a favorite target for cyber criminals. Indeed, financial institutions were disproportionately affected by ransomware in 2021, and the early indications for the New Year point to more of the same for 2022. n
By Andy Nallappan, Chief Technology Officer and Head of Software Business Operations, Broadcom Software – Perimeter defenses are a relic of the past, and it’s time for CIOs to reexamine dated assumptions — not the least of them being an over-reliance upon VPNs to protect company security. Even before the pandemic forced companies, seemingly overnight, to shift to remote work, the migration of business to the cloud raised new questions about the ability of conventional perimeter-based defenses to protect critical systems and data. Those questions can’t be put off any longer.
By: Phil Mottram, Executive Vice President and General Manager of HPE’s Intelligent Edge business. Network as a service (NaaS) is vital for those who are looking for a networking solution that is more aligned with their requirement to have an agile and dynamic network.
The strategic use of big data analytics has grown nearly impossible without AI. Combining the two technologies enables organizations to make accurate predictions and act accordingly—in other words, to become truly data-driven. Here’s how to get there from here.
Private 5G can offer an integrated, controllable, organization-wide approach to networking. This allows healthcare organizations to evolve their network quickly and securely—without losing existing investment in technology or assets—to deliver better communications to its staff and care to its patients.
We interviewed Hank Stokbroekx, vice-president of Huawei Digitization and Technical Services Department at EBG to find out how Huawei is helping enterprises and governments worldwide with their digital transformation and technology.
By Andy Nallappan, Chief Technology Officer and Head of Software Business Operations, Broadcom Software – As the end of 2021 approached, the process of digital acceleration remains in a world turned upside down by a lingering global pandemic. Even if Covid-19 recedes from the headlines, ongoing digital transformation at scale looks set to continue to accelerate well into 2022, with organizations looking to reap the full benefits of technology to become more productive and more efficient.
By Tom Thorpe, Vice President International Markets, Broadcom Software – Businesses responded to the historic challenge by accelerating their rate of cloud adoption and in relatively short order, the enterprise world went entirely remote. This was the epitome of digital transformation, as companies seemingly overnight adjusted their work routines, putting measures in place that allowed their employees to securely access data and telecommute full-time.
UKCloud is the only Sovereign Cloud Provider recognized by the government as a Strategic Cloud Provider able to address the significant compliance and certification requirements associated with important and sensitive data.
By Cori Land, Corporate Strategist, DataStax – Data creates the context for decision-making. As you approach data saturation, your decisions become more likely to win. If you have anything less than data saturation, your decisions are made with more uncertainty than need be. That could be acceptable if the risk of getting it wrong is acceptable. But if precision matters, you’ll need more context. There are two dimensions to data saturation: breadth and depth of coverage.