Download C2010-530 free PDF Braindumps with bootcamp

killexams.com IBM Maximo Asset Management v7.6 Infrastructure and Implementation Certification exam guides are setup by IT specialists. We have a group of C2010-530 guaranteed individuals that cooperate to make a tremendous assortment of C2010-530 actual test inquiries for the possibility to simply go through and finish their test. Simply retaining the C2010-530 Exam dumps that we give is adequate to finish the C2010-530 test at the absolute first endeavor.

Exam Code: C2010-530 Practice test 2022 by Killexams.com team
C2010-530 IBM Maximo Asset Management v7.6 Infrastructure and Implementation

Exam Name : IBM Certified Infrastructure Deployment Professional - Maximo Asset Management V7.6
Exam Code : C2010-530
Duration : 120 mins
Number of Questions : 73
Passing Score : 64%

- Define the logical sequence of events for a successful Maximo installation
- Explain the Java Enterprise Edition configuration concepts
- Identify the functionality in IBM Maximo Asset Management that can be separated across Application Servers (JVMs)
- Explain application server (JVM) performance concepts and optimization settings
- Explain the database requirements and configuration
- Identify initial configuration data and define proper input sequence
- Explain the different security features and options available
- Explain the IBM Maximo Asset Management upgrade process from 7.5 to 7.6
- Demonstrate the configuration of security needed to install IBM Maximo Asset Management
- Demonstrate IBM Maximo Asset Management installation sequence
- Prepare IBM Maximo Asset Management database schema
- Prepare IBM Maximo Asset Management application server
- Use the different IBM Maximo Asset Management installation components and tools
- Demonstrate installation troubleshooting
- Verify which version of IBM Maximo Asset Management has been installed
- Validate the installation using the installValidation utility and the TPAE configuration tool
- Validate middleware installation and configuration
- Enable Application Server Security
- Configure the Maximo Integration Framework
- Configure the IBM Maximo Asset Management system properties
- Build and deploy Maximo EAR files
- Configure Cron Tasks
- Configure a Workflow Process
- Configure IBM Maximo Asset Management logging
- Configure the database objects
- Create new or configure an existing application
- Configure Conditional Expressions
- Configure Item and Company Sets
- Configure Organization and Site
- Configuration of the General Ledger (GL) component structure
- Configure a Security Group
- Describe the implentation of Automation Scripting
- Configure Domains
- Configure Start Center
- Configure attached documents
- Discuss the usage of Migration Manager and creation of Migration Packages
- Identify the reporting options available and configuration tools
- Describe the Organization and Site settings
- Administer Security Groups
- Manage Administration Resources for Labor assignment
- Manage Escalations
- Manage Workflows
- Administer Maximo Integration Framework
- Use of Report Administration
- Managing Adhoc Reports
- Assess application server performance
- Analyze database performance issues
- Analyze query efficiency
- Review Start Center portlets
- Define IBM Maximo Asset Management log settings and analyze log files
- Explain Diagnostic Tools

IBM Maximo Asset Management v7.6 Infrastructure and Implementation
IBM Infrastructure test Questions
Killexams : IBM Infrastructure test Questions - BingNews https://killexams.com/pass4sure/exam-detail/C2010-530 Search results Killexams : IBM Infrastructure test Questions - BingNews https://killexams.com/pass4sure/exam-detail/C2010-530 https://killexams.com/exam_list/IBM Killexams : Answering the top 10 questions about supercloud

As we exited the isolation economy last year, we introduced supercloud as a term to describe something new that was happening in the world of cloud computing.

In this Breaking Analysis, we address the ten most frequently asked questions we get on supercloud. Today we’ll address the following frequently asked questions:


1. In an industry full of hype and buzzwords, why does anyone need a new term?

2. Aren’t hyperscalers building out superclouds? We’ll try to answer why the term supercloud connotes something different from a hyperscale cloud.

3. We’ll talk about the problems superclouds solve.

4. We’ll further define the critical aspects of a supercloud architecture.

5. We often get asked: Isn’t this just multicloud? Well, we don’t think so and we’ll explain why.

6. In an earlier episode we introduced the notion of superPaaS  – well, isn’t a plain vanilla PaaS already a superPaaS? Again – we don’t think so and we’ll explain why.

7. Who will actually build (and who are the players currently building) superclouds?

8. What workloads and services will run on superclouds?

9. What are some examples of supercloud?

10. Finally, we’ll answer what you can expect next on supercloud from SiliconANGLE and theCUBE.

Why do we need another buzzword?

Late last year, ahead of Amazon Web Services Inc.’s re:Invent conference, we were inspired by a post from Jerry Chen called Castles in the Cloud. In that blog he introduced the idea that there were submarkets emerging in cloud that presented opportunities for investors and entrepreneurs, that the big cloud vendors weren’t going to suck all the value out of the industry. And so we introduced this notion of supercloud to describe what we saw as a value layer emerging above the hyperscalers’ “capex gift.”

It turns out that we weren’t the only ones using the term, as both Cornell and MIT have used the phrase in somewhat similar but different contexts.

The point is something new was happening in the AWS and other ecosystems. It was more than infrastructure as a service and platform as a service and wasn’t just software as a service running in the cloud.

It was a new architecture that integrates infrastructure, unique platform attributes and software to solve new problems that the cloud vendors in our view weren’t addressing by themselves. It seemed to us that the ecosystem was pursuing opportunities across clouds that went beyond conventional implementations of multi-cloud.

In addition, we felt this trend pointed to structural change going on at the industry level that supercloud metaphorically was highlighting.

So that’s the background on why we felt a new catchphrase was warranted. Love it or hate it… it’s memorable.

Industry structures have always mattered in tech

To that last point about structural industry transformation: Andy Rappaport is sometimes credited with identifying the shift from the vertically integrated mainframe era to the horizontally fragmented personal computer- and microprocessor-based era in his Harvard Business Review article from 1991.

In fact, it was actually David Moschella, an International Data Corp. senior vice president at the time, who introduced the concept in 1987, a full four years before Rappaport’s article was published. Moschella, along with IDC’s head of research Will Zachmann, saw that it was clear Intel Corp., Microsoft Corp., Seagate Technology and other would replace the system vendors’ dominance.

In fact, Zachmann accurately predicted in the late 1980s the demise of IBM, well ahead of its epic downfall when the company lost approximately 75% of its value. At an IDC Briefing Session (now called Directions), Moschella put forth a graphic that looked similar to the first two concepts on the chart below.

We don’t have to review the shift from IBM as the epicenter of the industry to Wintel – that’s well-understood.

What isn’t as widely discussed is a structural concept Moschella put out in 2018 in his book “Seeing Digital,” which introduced the idea of the Matrix shown on the righthand side of this chart. Moschella posited that a new digital platform of services was emerging built on top of the internet, hyperscale clouds and other intelligent technologies that would define the next era of computing.

He used the term matrix because the conceptual depiction included horizontal technology rows, like the cloud… but for the first time included connected industry columns. Moschella pointed out that historically, industry verticals had a closed value chain or stack of research and development, production, distribution, etc., and that expertise in that specific vertical was critical to success. But now, because of digital and data, for the first time, companies were able to jump industries and compete using data. Amazon in content, payments and groceries… Apple in payments and content… and so forth. Data was now the unifying enabler and this marked a changing structure of the technology landscape.

Listen to David Moschella explain the Matrix and its implications on a new generation of leadership in tech.

So the term supercloud is meant to imply more than running in hyperscale clouds. Rather, it’s a new type of digital platform comprising a combination of multiple technologies – enabled by cloud scale – with new industry participants from financial services, healthcare, manufacturing, energy, media and virtually all industries. Think of it as kind of an extension of “every company is a software company.”

Basically, thanks to the cloud, every company in every industry now has the opportunity to build their own supercloud. We’ll come back to that.

Aren’t hyperscale clouds superclouds?

Let’s address what’s different about superclouds relative to hyperscale clouds.

This one’s pretty straightforward and obvious. Hyperscale clouds are walled gardens where they want your data in their cloud and they want to keep you there. Sure, every cloud player realizes that not all data will go to their cloud, so they’re meeting customers where their data lives with initiatives such Amazon Outposts and Azure Arc and Google Anthos. But at the end of the day, the more homogeneous they can make their environments, the better control, security, costs and performance they can deliver. The more complex the environment, the more difficult to deliver on their promises and the less margin left for them to capture.

Will the hyperscalers get more serious about cross cloud services? Maybe, but they have plenty of work to do within their own clouds. And today at least they appear to be providing the tools that will enable others to build superclouds on top of their platforms. That said, we never say never when it comes to companies such as AWS. And for sure we see AWS delivering more integrated digital services such as Amazon Connect to solve problems in a specific domain, call centers in this case.

What problems do superclouds solve?

We’ve all seen the stats from IDC or Gartner or whomever that customers on average use more than one cloud. And we know these clouds operate in disconnected silos for the most part. That’s a problem because each cloud requires different skills. The development environment is different, as is the operating environment, with different APIs and primitives and management tools that are optimized for each respective hyperscale cloud. Their functions and value props don’t extend to their competitors’ clouds. Why would they?

As a result, there’s friction when moving between different clouds. It’s hard to share data, move work, secure and govern data, and enforce organizational policies and edicts across clouds.

Supercloud is an architecture designed to create a single environment that enables management of workloads and data across clouds in an effort to take out complexity, accelerate application development, streamline operations and share data safely irrespective of location.

Pretty straightforward, but nontrivial, which is why we often ask company chief executives and execs if stock buybacks and dividends will yield as much return as building out superclouds that solve really specific problems and create differentiable value for their firms.

What are the critical attributes of a supercloud?

Let’s dig in a bit more to the architectural aspects of supercloud. In other words… what are the salient attributes that define supercloud?

First, a supercloud runs a set of specific services, designed to solve a unique problem. Superclouds offer seamless, consumption-based services across multiple distributed clouds.

Supercloud leverages the underlying cloud-native tooling of a hyperscale cloud but it’s optimized for a specific objective that aligns with the problem it’s solving. For example, it may be optimized for cost or low latency or sharing data or governance or security or higher performance networking. But the point is, the collection of services delivered is focused on unique value that isn’t being delivered by the hyperscalers across clouds.

A supercloud abstracts the underlying and siloed primitives of the native PaaS layer from the hyperscale cloud and using its own specific platform-as-a-service tooling, creates a common experience across clouds for developers and users. In other words, the superPaaS ensures that the developer and user experience is identical, irrespective of which cloud or location is running the workload.

And it does so in an efficient manner, meaning it has the metadata knowledge and management that can optimize for latency, bandwidth, recovery, data sovereignty or whatever unique value the supercloud is delivering for the specific use cases in the domain.

A supercloud comprises a superPaaS capability that allows ecosystem partners to add incremental value on top of the supercloud platform to fill gaps, accelerate features and innovate. A superPaaS can use open tooling but applies those development tools to create a unique and specific experience supporting the design objectives of the supercloud.

Supercloud services can be infrastructure-related, application services, data services, security services, users services, etc., designed and packaged to bring unique value to customers… again that the hyperscalers are not delivering across clouds or on-premises.

Finally, these attributes are highly automated where possible. Superclouds take a page from hyperscalers in terms of minimizing human intervention wherever possible, applying automation to the specific problem they’re solving.

Isn’t supercloud just another term for multicloud?

What we’d say to that is: Perhaps, but not really. Call it multicloud 2.0 if you want to invoke a commonly used format. But as Dell’s Chuck Whitten proclaimed, multicloud by design is different than multicloud by default.

What he means is that, to date, multicloud has largely been a symptom of multivendor… or of M&A. And when you look at most so-called multicloud implementations, you see things like an on-prem stack wrapped in a container and hosted on a specific cloud.

Or increasingly a technology vendor has done the work of building a cloud-native version of its stack and running it on a specific cloud… but historically it has been a unique experience within each cloud with no connection between the cloud silos. And certainly not a common developer experience with metadata management across clouds.

Supercloud sets out to build incremental value across clouds and above hyperscale capex that goes beyond cloud compatibility within each cloud. So if you want to call it multicloud 2.0, that’s fine.

We choose to call it supercloud.

Isn’t plain old PaaS already supercloud?

Well, we’d say no. That supercloud and its corresponding superPaaS layer gives the freedom to store, process, manage, secure and connect islands of data across a continuum with a common developer experience across clouds.

Importantly, the sets of services are designed to support the supercloud’s objectives – e.g., data sharing or data protection or storage and retrieval or cost optimization or ultra-low latency, etc. In other words, the services offered are specific to that supercloud and will vary by each offering. OpenShift, for example, can be used to construct a superPaaS but in and of itself isn’t a superPaaS. It’s generic.

The point is that a supercloud and its inherent superPaaS will be optimized to solve specific problems such as low latency for distributed databases or fast backup and recovery and ransomware protection — highly specific use cases that the supercloud is designed to solve for.

SaaS as well is a subset of supercloud. Most SaaS platforms either run in their own cloud or have bits and pieces running in public clouds (e.g. analytics). But the cross-cloud services are few and far between or often nonexistent. We believe SaaS vendors must evolve and adopt supercloud to offer distributed solutions across cloud platforms and stretching out to the near and far edge.

Who is building superclouds?

Another question we often get is: Who has a supercloud and who is building a supercloud? Who are the contenders?

Well, most companies that consider themselves cloud players will, we believe, be building superclouds. Above is a common Enterprise Technology Research graphic we like to show with Net Score or spending momentum on the Y axis and Overlap or pervasiveness in the ETR surveys on the X axis. This is from the April survey of well over 1,000 chief executive officers and information technology buyers. And we’ve randomly chosen a number of players we think are in the supercloud mix and we’ve included the hyperscalers because they are the enablers.

We’ve added some of those nontraditional industry players we see building superclouds such as Capital One, Goldman Sachs and Walmart, in deference to Moschella’s observation about verticals. This goes back to every company being a software company. And rather than pattern-matching an outdated SaaS model we see a new industry structure emerging where software and data and tools specific to an industry will lead the next wave of innovation via the buildout of intelligent digital platforms.

We’ve talked a lot about Snowflake Inc.’s Data Cloud as an example of supercloud, as well as the momentum of Databricks Inc. (not shown above). VMware Inc. is clearly going after cross-cloud services. Basically every large company we see is either pursuing supercloud initiatives or thinking about it. Dell Technologies Inc., for example, showed Project Alpine at Dell Technologies World – that’s a supercloud in development. Snowflake introducing a new app dev capability based on its SuperPaaS (our term, of course, it doesn’t use the phrase), MongoDB Inc., Couchbase Inc., Nutanix Inc., Veeam Software, CrowdStrike Holdings Inc., Okta Inc. and Zscaler Inc. Even the likes of Cisco Systems Inc. and Hewlett Packard Enterprise Co., in our view, will be building superclouds.

Although ironically, as an aside, Fidelma Russo, HPE’s chief technology officer, said on theCUBE she wasn’t a fan of cloaking mechanisms. But when we spoke to HPE’s head of storage services, Omer Asad, we felt his team is clearly headed in a direction that we would consider supercloud. It could be semantics or it could be that parts of HPE are in a better position to execute on supercloud. Storage is an obvious starting point. The same can be said of Dell.

Listen to Fidelma Russo explain her aversion to building a manager of managers.

And we’re seeing emerging companies like Aviatrix Systems Inc. (network performance), Starburst Data Inc. (self-service analytics for distributed data), Clumio Inc. (data protection – not supercloud today but working on it) and others building versions of superclouds that solve a specific problem for their customers. And we’ve spoken to independent software vendors such as Adobe Systems Inc., Automatic Data Processing LLC and UiPath Inc., which are all looking at new ways to go beyond the SaaS model and add value within cloud ecosystems, in particular building data services that are unique to their value proposition and will run across clouds.

So yeah – pretty much every tech vendor with any size or momentum and new industry players are coming out of hiding and competing… building superclouds. Many that look a lot like Moschella’s matrix with machine intelligence and artificial intelligence and blockchains and virtual reality and gaming… all enabled by the internet and hyperscale clouds.

It’s moving fast and it’s the future, in our opinion, so don’t get too caught up in the past or you’ll be left behind.

What are some examples of superclouds?

We’ve given many in the past, but let’s try to be a bit more specific. Below we cite a few and we’ll answer two questions in one section here: What workloads and services will run in superclouds and what are some examples?

Analytics. Snowflake is the furthest along with its data cloud in our view. It’s a supercloud optimized for data sharing, governance, query performance, security, ecosystem enablement and ultimately monetization. Snowflake is now bringing in new data types and open-source tooling and it ticks the attribute boxes on supercloud we laid out earlier.

Converged databases. Running transaction and analytics workloads. Take a look at what Couchbase is doing with Capella and how it’s enabling stretching the cloud to the edge with Arm-based platforms and optimizing for low latency across clouds and out to the edge.

Document database workloads. Look at MongoDB – a developer-friendly platform that with Atlas is moving to a supercloud model running document databases very efficiently. Accommodating analytic workloads and creating a common developer experience across clouds.

Data science workloads. For example, Databricks is bringing a common experience for data scientists and data engineers driving machine intelligence into applications and fixing the broken data lake with the emergence of the lakehouse.

General-purpose workloads. For example, VMware’s domain. Very clearly there’s a need to create a common operating environment across clouds and on-prem and out to the edge and VMware is hard at work on that — managing and moving workloads, balancing workloads and being able to recover very quickly across clouds.

Network routing. This is the primary focus of Aviatrix, building what we consider a supercloud and optimizing network performance and automating security across clouds.

Industry-specific workloads. For example, Capital One announcing its cost optimization platform for Snowflake – piggybacking on Snowflake’s supercloud. We believe it’s going to test that concept outside its own organization and expand across other clouds as Snowflake grows its business beyond AWS. Walmart Inc. is working with Microsoft to create an on-prem to Azure experience – yes, that counts. We’ve written about what Goldman is doing and you can bet dollars to donuts that Oracle Corp. will be building a supercloud in healthcare with its Cerner acquisition.

Supercloud is everywhere you look. Sorry, naysayers. It’s happening.

What’s next from theCUBE?

With all the industry buzz and debate about the future, John Furrier and the team at SiliconANGLE have decided to host an event on supercloud. We’re motivated and inspired to further the conversation. TheCUBE on Supercloud is coming.

On Aug. 9 out of our Palo Alto studios we’ll be running a live program on the topic. We’ve reached out to a number of industry participants — VMware, Snowflake, Confluent, Sky High Security, Hashicorp, Cloudflare and Red Hat — to get the perspective of technologists building superclouds.

And we’ve invited a number of vertical industry participants in financial services, healthcare and retail that we’re excited to have on along with analysts, thought leaders and investors.

We’ll have more details in the coming weeks, but for now if you’re interested please reach out to us with how you think you can advance the discussion and we’ll see if we can fit you in.

So mark your calendars and stay tuned for more information.

Keep in touch

Thanks to Alex Myerson, who does the production, podcasts and media workflows for Breaking Analysis. Special thanks to Kristen Martin and Cheryl Knight, who help us keep our community informed and get the word out, and to Rob Hof, our editor in chief at SiliconANGLE.

Remember we publish each week on Wikibon and SiliconANGLE. These episodes are all available as podcasts wherever you listen.

Email david.vellante@siliconangle.com, DM @dvellante on Twitter and comment on our LinkedIn posts.

Also, check out this ETR Tutorial we created, which explains the spending methodology in more detail. Note: ETR is a separate company from Wikibon and SiliconANGLE. If you would like to cite or republish any of the company’s data, or inquire about its services, please contact ETR at legal@etr.ai.

Here’s the full video analysis:

All statements made regarding companies or securities are strictly beliefs, points of view and opinions held by SiliconANGLE media, Enterprise Technology Research, other guests on theCUBE and guest writers. Such statements are not recommendations by these individuals to buy, sell or hold any security. The content presented does not constitute investment advice and should not be used as the basis for any investment decision. You and only you are responsible for your investment decisions.

Disclosure: Many of the companies cited in Breaking Analysis are sponsors of theCUBE and/or clients of Wikibon. None of these firms or other companies have any editorial control over or advanced viewing of what’s published in Breaking Analysis.

Image: Rawpixel.com/Adobe Stock

Show your support for our mission by joining our Cube Club and Cube Event Community of experts. Join the community that includes Amazon Web Services and Amazon.com CEO Andy Jassy, Dell Technologies founder and CEO Michael Dell, Intel CEO Pat Gelsinger and many more luminaries and experts.

Sat, 09 Jul 2022 05:06:00 -0500 en-US text/html https://siliconangle.com/2022/07/09/answering-top-10-questions-supercloud/
Killexams : IBM Report: Data Breach Costs Reach All-Time High

For the twelfth year in a row, healthcare saw the costliest breaches among all industries with the average cost reaching $10.1 million per breach.

CAMBRIDGE, Mass. — IBM (NYSE: IBM) Security released the annual Cost of a Data Breach Report, revealing costlier and higher-impact data breaches than ever before, with the global average cost of a data breach reaching an all-time high of $4.35 million for studied organizations. With breach costs increasing nearly 13% over the last two years of the report, the findings suggest these incidents may also be contributing to rising costs of goods and services. In fact, 60% of studied organizations raised their product or services prices due to the breach, when the cost of goods is already soaring worldwide amid inflation and supply chain issues.

The perpetuality of cyberattacks is also shedding light on the “haunting effect” data breaches are having on businesses, with the IBM report finding 83% of studied organizations have experienced more than one data breach in their lifetime. Another factor rising over time is the after-effects of breaches on these organizations, which linger long after they occur, as nearly 50% of breach costs are incurred more than a year after the breach.

The 2022 Cost of a Data Breach Report is based on in-depth analysis of real-world data breaches experienced by 550 organizations globally between March 2021 and March 2022. The research, which was sponsored and analyzed by IBM Security, was conducted by the Ponemon Institute.

Some of the key findings in the 2022 IBM report include:

  • Critical Infrastructure Lags in Zero Trust – Almost 80% of critical infrastructure organizations studied don’t adopt zero trust strategies, seeing average breach costs rise to $5.4 million – a $1.17 million increase compared to those that do. All while 28% of breaches amongst these organizations were ransomware or destructive attacks.
  • It Doesn’t Pay to Pay – Ransomware victims in the study that opted to pay threat actors’ ransom demands saw only $610,000 less in average breach costs compared to those that chose not to pay – not including the cost of the ransom. Factoring in the high cost of ransom payments, the financial toll may rise even higher, suggesting that simply paying the ransom may not be an effective strategy.
  • Security Immaturity in Clouds – Forty-three percent of studied organizations are in the early stages or have not started applying security practices across their cloud environments, observing over $660,000 on average in higher breach costs than studied organizations with mature security across their cloud environments.
  • Security AI and Automation Leads as Multi-Million Dollar Cost Saver – Participating organizations fully deploying security AI and automation incurred $3.05 million less on average in breach costs compared to studied organizations that have not deployed the technology – the biggest cost saver observed in the study.

“Businesses need to put their security defenses on the offense and beat attackers to the punch. It’s time to stop the adversary from achieving their objectives and start to minimize the impact of attacks. The more businesses try to perfect their perimeter instead of investing in detection and response, the more breaches can fuel cost of living increases.” said Charles Henderson, Global Head of IBM Security X-Force. “This report shows that the right strategies coupled with the right technologies can help make all the difference when businesses are attacked.”

Over-trusting Critical Infrastructure Organizations

Concerns over critical infrastructure targeting appear to be increasing globally over the past year, with many governments’ cybersecurity agencies urging vigilance against disruptive attacks. In fact, IBM’s report reveals that ransomware and destructive attacks represented 28% of breaches amongst critical infrastructure organizations studied, highlighting how threat actors are seeking to fracture the global supply chains that rely on these organizations. This includes financial services, industrial, transportation and healthcare companies amongst others.

Despite the call for caution, and a year after the Biden Administration issued a cybersecurity executive order that centers around the importance of adopting a zero trust approach to strengthen the nation’s cybersecurity, only 21% of critical infrastructure organizations studied adopt a zero trust security model, according to the report. Add to that, 17% of breaches at critical infrastructure organizations were caused due to a business partner being initially compromised, highlighting the security risks that over-trusting environments pose.

Businesses that Pay the Ransom Aren’t Getting a “Bargain”

According to the 2022 IBM report, businesses that paid threat actors’ ransom demands saw $610,000 less in average breach costs compared to those that chose not to pay – not including the ransom amount paid. However, when accounting for the average ransom payment, which according to Sophos reached $812,000 in 2021, businesses that opt to pay the ransom could net higher total costs – all while inadvertently funding future ransomware attacks with capital that could be allocated to remediation and recovery efforts and looking at potential federal offenses.

The persistence of ransomware, despite significant global efforts to impede it, is fueled by the industrialization of cybercrime. IBM Security X-Force discovered the duration of studied enterprise ransomware attacks shows a drop of 94% over the past three years – from over two months to just under four days. These exponentially shorter attack lifecycles can prompt higher impact attacks, as cybersecurity incident responders are left with very short windows of opportunity to detect and contain attacks. With “time to ransom” dropping to a matter of hours, it’s essential that businesses prioritize rigorous testing of incident response (IR) playbooks ahead of time. But the report states that as many as 37% of organizations studied that have incident response plans don’t test them regularly.

Hybrid Cloud Advantage

The report also showcased hybrid cloud environments as the most prevalent (45%) infrastructure amongst organizations studied. Averaging $3.8 million in breach costs, businesses that adopted a hybrid cloud model observed lower breach costs compared to businesses with a solely public or private cloud model, which experienced $5.02 million and $4.24 million on average respectively. In fact, hybrid cloud adopters studied were able to identify and contain data breaches 15 days faster on average than the global average of 277 days for participants.

The report highlights that 45% of studied breaches occurred in the cloud, emphasizing the importance of cloud security. However, a significant 43% of reporting organizations stated they are just in the early stages or have not started implementing security practices to protect their cloud environments, observing higher breach costs2. Businesses studied that did not implement security practices across their cloud environments required an average 108 more days to identify and contain a data breach than those consistently applying security practices across all their domains.

Additional findings in the 2022 IBM report include:

  • Phishing Becomes Costliest Breach Cause – While compromised credentials continued to reign as the most common cause of a breach (19%), phishing was the second (16%) and the costliest cause, leading to $4.91 million in average breach costs for responding organizations.
  • Healthcare Breach Costs Hit Double Digits for First Time Ever– For the 12th year in a row, healthcare participants saw the costliest breaches amongst industries with average breach costs in healthcare increasing by nearly $1 million to reach a record high of $10.1 million.
  • Insufficient Security Staffing – Sixty-two percent of studied organizations stated they are not sufficiently staffed to meet their security needs, averaging $550,000 more in breach costs than those that state they are sufficiently staffed.

To get a copy of the 2022 Cost of a Data Breach Report, visit https://www.ibm.com/security/data-breach.

Fri, 29 Jul 2022 02:16:00 -0500 CS Staff en text/html https://www.campussafetymagazine.com/research/ibm-report-data-breach-costs-reach-all-time-high/
Killexams : The autism advantage - why businesses are hiring autistic people

Autism is known as a spectrum disorder because every autistic person is different, with unique strengths and challenges.

Varney says many autistic people experienced education as a system that focused on these challenges, which can include social difficulties and anxiety.

Many autistic children found education focused on their deficits rather than their strengths.Credit:Rodger Cummins

He is pleased this is changing, with accurate reforms embracing autistic students’ strengths.

But the unemployment rate of autistic people remains disturbingly high. ABS data from 2018 shows 34.1 per cent of autistic people are unemployed – three times higher than that of people with any type of disability and almost eight times that of those without a disability.

“A lot of the time people hear that someone’s autistic and they assume incompetence,” says Varney, who was this week appointed the chair of the Victorian Disability Advisory Council.

“But we have unique strengths, specifically hyper focus, great creativity, and we can think outside the box, which is a great asset in workplaces.”

In Israel, the defence force has a specialist intelligence unit made up exclusively of autistic soldiers, whose skills are deployed in analysing, interpreting and understanding satellite images and maps.

Locally, organisations that actively recruit autistic talent include software giant SAP, Westpac, IBM, ANZ, the Australian Tax Office, Telstra, NAB and PricewaterhouseCoopers.

Chris Pedron is a junior data analyst at Australian Spatial Analytics, a social enterprise that says on its website “neurodiversity is our advantage – our team is simply faster and more precise at data processing”.

He was hired after an informal chat. (Australian Spatial Analytics also often provides interview questions 48 hours in advance.)

Pedron says the traditional recruitment process can work against autistic people because there are a lot of unwritten social cues, such as body language, which he doesn’t always pick up on.

Australian Spatial Analytics founder Geoff Smith (right) with data analyst Chris Pedron.Credit:Glenn Hunt

“If I’m going in and I’m acting a bit physically standoffish, I’ve got my arms crossed or something, it’s not that I’m not wanting to be there, it’s just that new social interaction is something that causes anxiety.”

Pedron also finds eye contact uncomfortable and has had to train himself over the years to concentrate on a point on someone’s face.

Australian Spatial Analytics addresses a skills shortage by delivering a range of data services that were traditionally outsourced offshore.

Projects include digital farm maps for the grazing industry, technical documentation for large infrastructure and map creation for land administration.

Pedron has always found it easy to map things out in his head. “A lot of the work done here at ASA is geospatial so having autistic people with a very visual mindset is very much an advantage for this particular job.”

Pedron listens to music on headphones in the office, which helps him concentrate, and stops him from being distracted. He says the simpler and clearer the instructions, the easier it is for him to understand. “The less I have to read between the lines to understand what is required of me the better.”

Australian Spatial Analytics is one of three jobs-focused social enterprises launched by Queensland charity White Box Enterprises.

It has grown from three to 80 employees in 18 months and – thanks to philanthropist Naomi Milgrom, who has provided office space in Cremorne – has this year expanded to Melbourne, enabling Australian Spatial Analytics to create 50 roles for Victorians by the end of the year.

Chief executive Geoff Smith hopes they are at the front of a wave of employers recognising that hiring autistic people can make good business sense.

In 2017, IBM launched a campaign to hire more neurodiverse people.Credit:AP

“Rather than focus on the deficits of the person, focus on the strengths. A quarter of National Disability Insurance Scheme plans name autism as the primary disability, so society has no choice – there’s going to be such a huge number of people who are young and looking for jobs who are autistic. There is a skills shortage as it is, so you need to look at neurodiverse talent.”

In 2017, IBM launched a campaign to hire more neurodiverse (a term that covers a range of conditions including autism, Attention Deficit Hyperactivity Disorder, or ADHD, and dyslexia) candidates.

The initiative was in part inspired by software and data quality engineering services firm Ultranauts, who boasted at an event “they ate IBM’s lunch at testing by using an all-autistic staff”.

The following year Belinda Sheehan, a senior managing consultant at IBM, was tasked with rolling out a pilot at its client innovation centre in Ballarat.

“IBM is very big on inclusivity,” says Sheehan. “And if we don’t have diversity of thought, we won’t have innovation. So those two things go hand in hand.”

Eight things workplaces can do for autistic employees

  • Recruit differently. Send applicants interview questions in advance or use work trials and practical assessments
  • Offer flexible hours
  • Provide noise cancelling headphones and quiet spaces
  • Give clear and direct instructions and feedback 
  • Have mentors or a buddy system
  • Don’t make assumptions about autistic people
  • Provide managers with autism training
  • Partner with autism employment experts

Sheehan worked with Specialisterne Australia, a social enterprise that assists businesses in recruiting and supporting autistic people, to find talent using a non-traditional recruitment process that included a week-long task.

Candidates were asked to work together to find a way for a record shop to connect with customers when the bricks and mortar store was closed due to COVID.

Ten employees were eventually selected. They started in July 2019 and work in roles across IBM, including data analysis, testing, user experience design, data engineering, automation, blockchain and software development. Another eight employees were hired in July 2021.

Sheehan says clients have been delighted with their ideas. “The UX [user experience] designer, for example, comes in with such a different lens. Particularly as we go to artificial intelligence, you need those different thinkers.”

One client said if they had to describe the most valuable contribution to the project in two words it would be “ludicrous speed”. Another said: “automation genius.”

IBM has sought to make the office more inclusive by creating calming, low sensory spaces.

It has formed a business resource group for neurodiverse employees and their allies, with four squads focusing on recruitment, awareness, career advancement and policies and procedures.

And it has hired a neurodiversity coach to work with individuals and managers.

Sheehan says that challenges have included some employees getting frustrated because they did not have enough work.

“These individuals want to come to work and get the work done – they are not going off for a coffee and chatting.”

Increased productivity is a good problem to have, Sheehan says, but as a manager, she needs to come up with ways they can enhance their skills in their downtime.

There have also been difficulties around different communication styles, with staff finding some autistic employees a bit blunt.

Loading

Sheehan encourages all staff to do a neurodiversity 101 training course run by IBM.

“Something may be perceived as rude, but we have to turn that into a positive. It’s good to have someone who is direct, at least we all know what that person is thinking.”

Chris Varney is delighted to see neurodiversity programs in some industries but points out that every autistic person has different interests and abilities.

Some are non-verbal, for example, and not all have the stereotypical autism skills that make them excel at data analysis.

“We’ve seen a big recognition that autistic people are an asset to banks and IT firms, but there’s a lot more work to be done,” Varney says.

“We need to see jobs for a diverse range of autistic people.”

The Morning Edition newsletter is our guide to the day’s most important and interesting stories, analysis and insights. Sign up here.

Fri, 05 Aug 2022 07:00:00 -0500 en text/html https://www.smh.com.au/business/workplace/the-autism-advantage-why-businesses-are-hiring-autistic-people-20220804-p5b767.html
Killexams : IBM Acquires Observability Platform Databand.ai

IBM has announced the acquisition of data observability software vendor Databand.ai. Today’s announcement marks IBM’s fifth acquisition of 2022. The company says the acquisition “further strengthens IBM’s software portfolio across data, AI, and automation to address the full spectrum of observability and helps businesses ensure that trustworthy data is being put into the right hands of the right users at the right time.”

Data observability is an expanding sector in the big data market, spurred by explosive growth in the amount of data organizations are producing and managing. Data quality issues can arise with large volumes, and Gartner shows that poor data quality costs businesses $12.9 million a year on average.

“Data observability takes traditional data operations to the next level by using historical trends to compute statistics about data workloads and data pipelines directly at the source, determining if they are working, and pinpointing where any problems may exist,” said IBM in a press release. “When combined with a full stack observability strategy, it can help IT teams quickly surface and resolve issues from infrastructure and applications to data and machine learning systems.”

IBM says this acquisition will extend Databand.ai’s resources for expanding its observability capabilities for broader integration across more open source and commercial solutions, and enterprises will have flexibility in how they run Databand.ai, either with a subscription or as-a-Service.

IBM has made over 25 strategic acquisitions since Arvind Krishna took the helm as CEO in April 2020. The company mentions that Databand.ai will be used with IBM Observability by Instana APM, another observability acquisition, and IBM Watson Studio, its data science platform, to address the full spectrum of observability across IT operations. To provide a more complete view of a data platform, Databand.ai can alert data teams and engineers when data they are working with is incomplete or missing, while Instana can explain which application the missing data originates from and why the application service is failing.

A dashboard view of Databand.ai’s observability platform. Source: Databand.ai

“Our clients are data-driven enterprises who rely on high-quality, trustworthy data to power their mission-critical processes. When they don’t have access to the data they need in any given moment, their business can grind to a halt,” said Daniel Hernandez, General Manager for Data and AI, IBM. “With the addition of Databand.ai, IBM offers the most comprehensive set of observability capabilities for IT across applications, data and machine learning, and is continuing to provide our clients and partners with the technology they need to deliver trustworthy data and AI at scale.”

Databand.ai is headquartered in Tel Aviv, and its employees will join IBM’s Data and AI division to grow its portfolio of data and AI products, including Watson and IBM Cloud Pak for Data.

“You can’t protect what you can’t see, and when the data platform is ineffective, everyone is impacted –including customers,” said Josh Benamram, co-founder and CEO of Databand.ai. “That’s why global brands such as FanDuel, Agoda and Trax Retail already rely on Databand.ai to remove bad data surprises by detecting and resolving them before they create costly business impacts. Joining IBM will help us scale our software and significantly accelerate our ability to meet the evolving needs of enterprise clients.”

Related Items:

VCs Open Up the Checkbook for Observability Startups

Building Continuous Data Observability at the Infrastructure Layer

Data Quality Study Reveals Business Impacts of Bad Data

Wed, 06 Jul 2022 00:02:00 -0500 text/html https://www.datanami.com/2022/07/06/ibm-acquires-observability-platform-databand-ai/
Killexams : 2022 ThinkPad X1 Carbon or MacBook Pro: Which Work Laptop Should You Push Your Boss to Buy You?

Maybe your work laptop is getting a bit slow. Maybe you’ve been closely watching our coverage, and have seen our reviews of the 2022 Lenovo ThinkPad X1 Carbon Gen 10 and the M2-based Apple MacBook Pro 13-Inch in accurate weeks. Or maybe you just know that you want the best company-issued laptop you can get, and you don’t have it now. Well, if you’re making the case to your boss for a premium notebook, you’d better come prepared. 

Top performance and features often command top dollar, but getting the best business laptop isn’t just about scoring the model with the biggest price tag. If you want a more premium work machine, you also want to sell the boss on the productivity benefits you can get for that larger chunk of the budget.

We’re here to break down the specs, compare the features, and answer the questions you and your boss will have when making a choice between these two choice business laptops.


2022 MacBook Pro vs. ThinkPad X1 Carbon Gen 10: Spec Comparison

While the X1 Carbon and the MacBook Pro 13-Inch both offer top-of-the-line components, they’re far from identical.

The most obvious difference is the old Mac vs. PC debate. The MacBook Pro is an Apple machine, running Apple MacOS Monterey. The Lenovo ThinkPad X1 Carbon is a Windows laptop, running Windows 11 Pro. We’ll get to the key differences later, but if you’re already tied to one operating system, or your IT infrastructure allows for only one or the other, it makes your decision pretty easy.

The other major difference is Apple’s use of the M2 chip, the latest Apple Silicon processor. In test after test, we found the M2 offers great performance—just not better than the M1 Pro and M1 Max offered on the more premium 14-inch MacBook Pro. It’s all part of Apple’s move away from Intel processors, but it comes with complications around supported software, even for older Mac programs. The X1 Carbon, on the other hand, sticks with Intel, and is outfitted with the latest 12th Generation ("Alder Lake") Core i7 CPU, one of the best options available for any laptop.


2022 MacBook Pro vs. ThinkPad X1 Carbon Gen 10: Configuration and Pricing

It’s worth noting that while this comparison refers to the units we were able to test for our reviews, they aren’t the only options offered for either model. Both systems have a range of configuration options, and your choices for customizable features can dramatically change the price.

Apple offers several configurations of the 13-Inch MacBook Pro. Our test unit is stepped up from the base model, outfitted with 16GB of memory and 1TB of SSD storage, and sells for $1,899. The base model is a bit more modest, with the same Apple M2 eight-core processor and 10 GPU cores, but only 8GB of RAM and a 256GB SSD for storage. The price for that starter version is $1,299. The top model ($2,499) peaks with 24GB of memory and a 2TB drive.

With the 2022 Lenovo ThinkPad X1 Carbon Gen 10, you have a choice between the midrange Core i5 and the more powerful Core i7 in our review unit. Both options rely on integrated graphics—no discrete GPU option for this machine—but you have lots of other choices in hardware. 

Screenshot of Lenovo ThinkPad X1 Carbon configuration options

The base model, which starts at $1,439, has 8GB of RAM, but you can opt for more memory, like our 16GB model or the top 32GB system. Storage, similarly, starts at 256GB and scales up to 1TB of SSD storage. Display options abound, ranging from a simple 1,920-by-1,200-pixel IPS panel up to an OLED display or 4K IPS option, with several choices in between.


The Age-Old Question: Windows or Mac?

While we don’t want to stir up any old fights, the question of operating systems looms large over any comparison of Apple and Lenovo products. With the MacBook Pro using Apple’s latest version of macOS and the Lenovo running Windows 11 Pro, both machines offer the best respective versions of today’s Windows and Mac software.

It’s a discussion we’ve been having at PCMag since, well, forever, but despite technically being a PC, Apple’s Mac line has always been a different breed. Today the differences are less about the interface and more centered on app availability. 

Apple MacBook Pro 13-Inch (2022, M2)

Is one better than the other? It’s easier to answer whether one is better for you. We will say, however, that Apple’s tightly integrated approach to hardware and software makes it a formidable combination, provided you don’t need to use any Windows-only software. (Check out our take on which OS is really the best.)

And many businesses rely completely on Windows software, or at least they depend on Windows’ broad support for all sorts of programs, scripts, and customizations. If you work in an office where everything is Windows, your IT folks will appreciate you going with the flow, and it makes your decision easy: Just pick the X1 Carbon.

For graphics professionals, it’s even easier than that—Apple is the preferred choice for most photo and video editors and graphic designers, by far. That doesn’t mean much if you’re working in a Windows-powered shop, but it’s a pretty big deal when collaborating with others in the industry. If that sounds like you, then the MacBook Pro 13-Inch is the better choice.


2022 MacBook Pro vs. ThinkPad X1 Carbon Gen 10 Design: Thin Is In

Even at a cursory glance, these are very different machines. The designs are premium, but they speak to very different sensibilities, with the MacBook Pro sticking to its iconic bare-metal design and the X1 Carbon taking its name from the carbon fiber and magnesium alloy chassis it uses. Both are solid and sturdy designs, but only the Lenovo is rated to survive hazards like shock, vibration, and temperature extremes, passing MIL-STD 810H tests for ruggedness.

Apple MacBook Pro 13-Inch (2022, M2) closed

Both systems are impressively thin. Lenovo’s approach is all angles, with a geometric look that’s aggressive but professional. Apple’s design uses gentle curves instead, but is no less business-like. And while Apple uses the recognizable mirrored-fruit logo in the center of the lid, Lenovo keeps it subtle, with a demure ThinkPad logo in the corner of the X1 Carbon’s lid.

But the differences are more than chassis-deep. From the display to the keyboard, from ports to performance, these are very different and distinct laptops.


2022 MacBook Pro vs. ThinkPad X1 Carbon Gen 10: Screen Options

It’s hard to point to any one aspect of a display and declare it better than another, and both the X1 Carbon and the MacBook Pro offer some good-looking screens. The MacBook Pro is 13.3 inches, and it has Apple’s Retina display, a 2,560-by-1,600-pixel panel that has great brightness and covers the wide P3 color gamut.

Lenovo ThinkPad X1 Carbon Gen 10 (2022) display

The Lenovo ThinkPad Carbon X1, on the other hand, is a little larger, with a 14-inch panel available in your choice of resolutions. As is common with Windows machines, the Lenovo offers a touch screen as an option, while the MacBook Pro does not—instead, it has a narrow OLED strip called the Touch Bar forward of the keyboard for limited touch interaction.

X1 Carbon screen options include a higher-resolution 2,240-by-1,400-pixel IPS with anti-glare finish and low blue-light emissions for improved comfort and eye health, or a luxe 2,880-by-1,800-pixel OLED panel (albeit, one without touch capability). Or, you could ask your boss to go all-out with a 14-inch 3,840-by-2,400 IPS display with all the extras: anti-reflective, anti-smudge, Dolby Vision HDR, 500 nits of brightness, and low blue light.


2022 MacBook Pro vs. ThinkPad X1 Carbon Gen 10: Webcam, Keyboard and Touchpad

So much of our work life is now handled through apps like Zoom and Google Meet that looking your best for work is as much about camera quality as it is your wardrobe. A good webcam and decent lighting are the differences between looking alive in an important meeting or looking flat and dull. 

Here the Lenovo wins, with the ThinkPad X1 Carbon boasting a 1080p webcam that easily beats the lower-resolution 720p camera found in the MacBook Pro. But pixels aren’t the whole story, as both Apple and Lenovo apply image-enhancing processing to their webcams. The X1 Carbon also has a built-in privacy shutter, so you know hackers aren't snooping when you think the camera is off. 

Both the MacBook Pro and the X1 Carbon have multiple microphone arrays for clearer dialog in virtual meetings, but the Lenovo again leads the MacBook Pro by using a four-mic system with Dolby Voice to filter out ambient noise, while Apple outfits the MacBook Pro with three mics.

That answers the webcam question. Whether you wear pants while working from home is entirely up to you.

As for the traditional inputs, lots of people love Apple’s Magic Keyboard on the MacBook Pro. It’s a capable laptop keyboard, and the accompanying Force Touch haptic trackpad is very, very good.

Lenovo ThinkPad X1 Carbon Gen 10 (2022) keyboard

But Lenovo has the best laptop keyboards in the industry, offering a more comfortable typing experience, with better spring-back from key presses, more depth of key travel, and sculpted keycaps. Plus, the ThinkPad X1 Carbon boasts not one, but two pointing devices: a gesture-capable touchpad and the iconic red pointing stick in the middle of the keyboard, a constant since the earliest IBM ThinkPads. Not everyone uses the red stick, but those who do find it to be indispensable, especially in environments like airplane seating, where limited elbow room can make swiping around on a big trackpad less comfortable.


2022 MacBook Pro vs. ThinkPad X1 Carbon Gen 10: Ports and Connectivity

When it comes to physical ports and wireless connections, the ThinkPad is the winner. The X1 Carbon has two Thunderbolt 4 ports, a USB 3.2 Type-A port, and a full-size HDMI video output. A second USB-A port joins an audio jack, a nano SIM card slot, and a security lock slot on the right side of the laptop.

Lenovo ThinkPad X1 Carbon Gen 10 (2022) ports

The MacBook Pro offers only a pair of Thunderbolt 4 ports and a headphone jack, but by connecting any of our favorite MacBook docking stations, you can still get a full complement of USB-A ports and HDMI output, and even Ethernet, if the included Wi-Fi 6 doesn’t do it for you.

Apple MacBook Pro 13-Inch (2022, M2) ports

2022 MacBook Pro vs. ThinkPad X1 Carbon Gen 10: Weight and Portability

When it comes to the best work laptops, portability is essential. Whether you’re working from home, commuting to an office, or taking your work on the road, you need a laptop that can provide all the power you need, but that is also light, thin, and easy to pack around. And these are two of the best, with slim designs that won’t weigh you down.

Of the two, the X1 Carbon is the lighter option, due largely to the light-yet-strong materials used in the construction. Despite having a nearly identical thickness (0.6 inch for the Lenovo and 0.61 inch for the Apple), the X1 Carbon is a full half-pound lighter than the 3-pound MacBook Pro.

Lenovo ThinkPad X1 Carbon

The other part of the portability equation is battery life, which lets you work longer without having to also lug around the power brick and cables for charging the laptop. Here, the Apple MacBook Pro wins by a large margin, lasting nearly 22 hours in our battery test, compared with the Lenovo’s 12 hours. Granted, 12 hours of battery life should be plenty to get you through your workday and well into the evening on one charge, but it’s just over half of what the MacBook Pro provides.


Testing the 2022 X1 Carbon and MacBook Pro: A Productivity Performance Face-Off

Last, we have to consider performance when comparing the two business laptops. All the features or battery life in the world won’t mean much if you’re always waiting for a spreadsheet to finish running the numbers, or find yourself bogged down whenever you try to edit some photos to a presentation.

When it comes to everyday productivity, these are two very well-appointed machines, outclassing most of the competition without any trouble. But when you compare the numbers directly, there’s no denying that the Apple MacBook Pro 13-Inch has an advantage with its M2 chip. It lead in every test—or, at least, every test that it's possible to run on both Windows and Mac. (See how we test laptops.)

Whether it was our Handbrake video transcode tests, a processor-pushing rendering test like Cinebench R23, or a multitasking productivity gauntlet like Geekbench, the MacBook Pro maintained an edge over the X1 Carbon every step of the way.

The big asterisk in this comparison is our Photoshop trial. While the latest versions of Photoshop run natively on Apple Silicon (just as they do on Windows machines), our benchmark test does not, and it requires us to use an older version that supports the third-party testing macros we use to measure performance. For Apple machines, this makes it more of a test in running software with Apple’s Rosetta 2 emulation layer than a true photo-editing benchmark. But even with those caveats, the M2 MacBook Pro leads the Intel Core i7-powered X1 Carbon.

Graphics prowess is a similar story. While neither system uses a dedicated GPU—the Lenovo uses Intel’s Xe Graphics solution, and Apple’s M2 system-on-a-chip includes 10 GPU cores in our test configuration—they both offer superb support for basic visual processing. If you need more than these machines deliver, you’re probably better served by a mobile workstation, or just the higher-level processing choices offered on the 14-inch MacBook Pro.

But again, the M2 MacBook Pro squeezes more performance out of its wafer-thin silicon than the Lenovo does, even as both deliver category-leading results. One of the few graphics benchmarks that runs on both platforms is GFXBench, a cross-platform rendering test that runs on both OpenGL and Apple’s Metal API. Many Apple benchmarks don't offer Windows compatibility, and vice versa for the Windows tests we usually use. Compatibility is always a bit of a question mark for Apple products, but the performance lead is clear.

We've already discussed the MacBook Pro’s superior battery life, but it bears repeating: The ThinkPad X1 Carbon offers very good battery life, but the Apple MacBook Pro nearly doubles it with a fantastic 22 hours of endurance.

Aside from the battery, there's the question of the display. Setting aside questions of touch capability and screen size, the Apple MacBook Pro offers slightly better color quality and higher peak brightness than our Lenovo test unit does. However, panel performance on the Lenovo will depend entirely upon which screen option you choose (as noted in our review, for example, OLED's an option with the Gen 10 model), and everything we've seen is still very, very good.


Verdict: Should You Press for the ThinkPad X1 Carbon, or for the MacBook Pro?

The Lenovo ThinkPad X1 Carbon earned a perfect five-star score, making it one of the best laptops we’ve ever seen. The 2022 Apple MacBook Pro 13-Inch, on the other hand, scored a more modest four stars, despite the better performance, longer battery life, and equally impressive pedigree of past models.

Why? Because the MacBook Pro isn’t even the best MacBook to get the M2 chip—that honor goes to the redesigned Apple MacBook Air. And for better performance, we still recommend the 14-inch MacBook Pro mentioned earlier, or the truly premium (but less totable) 16-inch MacBook Pro. Both of those offer more potent processing and beefier graphics, along with updated designs.

Ultimately, the question of which premium business laptop is "better" is a question of which system is better for you. The issues of performance versus compatibility, or battery life versus portability, are questions that can only be answered in the context of your specific needs.

In fact, your best bet may be to pick the one that fits you best, and if your boss says no, suggest the other in its place. Regardless of which way the coin flip goes, you'll still be getting one of the best laptops on the market.

Wed, 03 Aug 2022 19:35:00 -0500 en-au text/html https://au.pcmag.com/laptops/95213/2022-thinkpad-x1-carbon-or-macbook-pro-which-work-laptop-should-you-push-your-boss-to-buy-you
Killexams : Bear of the Day: International Business Machines (IBM)

International Business Machines (IBM) is a Zacks Rank #5 (Strong Sell) provides advanced information technology solutions, computer systems, quantum computing and super computing solutions, enterprise software, storage systems and microelectronics.

“Big Blue” has struggled over the last decade, so they have tried to adjust and pivot to the cloud. Their acquisition of Red Hat helped this idea, but a accurate earnings report has disappointed investors.

The stock is now trending lower and looks like it might challenge 2022 lows.  

About the Company

IBM is headquartered in Armonk, New York. The company was incorporated in 1911 and employs over 280,000 people.

The company operates through four business segments: Software, Consulting, Infrastructure, and Financing.

IBM is valued at $114 billion and has a Forward PE of 13. The stock holds a Zacks Style Score of “C” in Value, “B” in Growth and “B” in Momentum. The stock pays a dividend of 5%.

Q2 Earnings

The company reported EPS last week, seeing Q2 at $2.31 v the $2.29 expected. Revenues came in at $15.5B v the $15.1B. IBM affirmed FY22 at the high end of its mid-single digit model, but narrowed the FY22 FCF to $10B from $10-10.5B.

Margins were down year over year, from 55.2% to 53.4%. While software, consulting and infrastructure revenues were all higher year over year.

Here are some comments from CEO Arvind Krishna:

"In the quarter we delivered good revenue performance with balanced growth across our geographies, driven by client demand for our hybrid cloud and AI offerings. The IBM team executed our strategy well.”

Estimates

Analyst are already starting to drop estimates as a result of the earnings report.

After stabilizing over the last few months, estimate have fallen off a cliff over the last 7 days. For the current quarter, estimates have fallen from $2.57 to 2.07, or 20%.

Things look to Strengthen next quarter, but we see estimates tracking lower again for next year. Over the last 60 days, numbers have been lowered from $10.81 to $10.26, or 5%.

Technical Take

The stock was holding up well before earnings, as it was seeing support at the 50-day moving average. But IBM is now trading under all its moving averages after the earnings report, slicing right through the 200-day at $130.50.

The lows of the year are just under $120. These should be taken out if the momentum continues and the bears could possibly target the 2021 lows around $113.

Looking at Fibonacci levels, a 61.8% retracement drawn from May lows to June highs was holding at $133. However, this support was broken and bears should target the 161.8% extension at $113. This lines up with that 2021 low support.

In Summary

While big blue had some positive aspects to the quarter, investors were disappointed overall. The stock fell over 8% after earnings and looks like it could take out 2022 lows on any market weakness.

The stock pays a nice dividend, but with cash flow being taken down, investors might start to lose faith in that payout

For now, a better option in the sector might be Agilysys (AGYS). The stock is a Zacks Rank #2 (Buy) and has held up relatively well over the last six months.     


Want the latest recommendations from Zacks Investment Research? Today, you can get 7 Best Stocks for the Next 30 Days. Click to get this free report
 
International Business Machines Corporation (IBM) : Free Stock Analysis Report
 
Agilysys, Inc. (AGYS) : Free Stock Analysis Report
 
To read this article on Zacks.com click here.

Mon, 25 Jul 2022 00:10:00 -0500 en-US text/html https://finance.yahoo.com/news/bear-day-international-business-machines-103010352.html
Killexams : Pyongyang's [un]H0lyGh0st. Devlopments in the criminal underworld. $10m for troll-farmer info. Hacktivism in a hybrid war.

Dateline Moscow and Kyiv: A shift in momentum during an operational pause.

Ukraine at D+155: A shift in momentum? (The CyberWire) Russia's difficulties filling its depleted ranks (down nearly 50%, the US Intelligence Community is said to have told Congress) and its inability to advance (during what looks more like exhaustion and neutralization than it does operational pause) appear to have given Ukraine an opportunity to take back the initiative in the North, East, and, especially, the South. A look at hacktivism in the Ukrainian interest.

Russia-Ukraine war: List of key events, day 156 (Al Jazeera) As the Russia-Ukraine war enters its 156th day, we take a look at the main developments.

Russia-Ukraine war latest: what we know on day 156 of the invasion (the Guardian) Ukraine steps up campaign to retake Russian-controlled regions in south; Kyiv accuses Russia of a war crime over the deaths of more than 40 prisoners of war

Ukraine steps up counteroffensive against Russian forces (Al Jazeera) Ukrainian officials say campaign to retake parts of Kherson, Zaporizhia oblasts has begun, urging civilians to leave.

Russia-Ukraine war: Zelenskiy says grain exports ready to start; Kyiv and Moscow both launch investigations into PoW deaths – live (the Guardian) Ukraine’s president says Black Sea ports ready to export grain; Kyiv calls on world leaders to condemn Russia over attack that led to death of 40 PoWs

Ukraine could be turning the tide of war again as Russian advances stall (Washington Post) Russian advances in Ukraine have slowed almost to a standstill as newly delivered Western weapons help Ukrainian forces reclaim much of the advantage they had lost in accurate months, opening a window of opportunity to turn the tide of the war in their favor again.

Ukraine war: Russian Kalibr cruise missiles strike military base near Kyiv (The Telegraph) Russian forces have struck a military base north of the capital Kyiv, Ukraine has said in a rare admission of a successful attack by Moscow on its military infrastructure.

Northern Ukraine Comes Under Burst of Russian Attacks Far From Front Lines (Wall Street Journal) Missiles and rockets rained down on northern Ukraine, marking the first time in weeks that the Kyiv region, far from the fighting in the country’s east and south, has been hit.

Ukraine war: West's modern weapons halt Russia's advance in Donbas (BBC News) Ukrainian soldiers credit the arrival of modern Western weapons for a sharp fall in Russia's attacks.

‘Half of Russian troops’ sent into Ukraine have been killed or injured (The Telegraph) According to US intelligence, casualties have rocketed to more than 75,000 – a loss equivalent to almost the entire British Army

Russia, Ukraine trade blame for deadly attack on POW prison (AP NEWS) Russia and Ukraine accused each other Friday of shelling a prison in a separatist region of eastern Ukraine, an attack that reportedly killed dozens of Ukrainian prisoners of war who were captured after the fall of a key southern city in May.

The Kremlin’s Plans to Annex Southeastern Ukraine Go into Effect (Wilson Center) After five months of all-out war, the Kremlin appears to have refined its plans for the future of the temporarily occupied territories in southeastern Ukraine.

Climbing the escalation ladder in Ukraine: A menu of options for the West (Atlantic Council) Our experts have assembled a list of possible policy responses the West ought to consider if Russia escalates its war against Ukraine.

Cascading Impacts of the War in Ukraine: Mental, Maternal, and Newborn Health (New Security Beat) This article was originally published as part of the summer 2022 issue of the Wilson Quarterly: Ripples of War.Ukraine and its people will feel the effects of the Russian invasion for years to [...]

Long Read: Russian Youth against War (Wilson Center) Young Russians strongly oppose the war in Ukraine. It is increasingly clear to them that the war is stealing their future and was started only to keep Vladimir Putin, his friends, and their heirs in power for as long as possible.

WSJ News Exclusive | New Group to Promote Open-Source Intelligence, Seen as Vital in Ukraine War (Wall Street Journal) A group of ex-U.S. national security officials has formed a professional association to promote the tradecraft of ‘open-source’ intelligence, the analysis of publicly available data that has helped Western powers understand and track Russia’s war on Ukraine.

Why Russia’s War in Ukraine Is a Genocide (Foreign Affairs) It’s not just a land grab, but a bid to expunge a nation.

Putin believed his own propaganda and fatally underestimated Ukraine (Atlantic Council) Russian President Vladimir Putin likes to pose as an unrivalled expert on Ukrainian history and identity politics. However, it is now apparent that his understanding of Ukraine has been hopelessly distorted by the wishful thinking of his own propaganda. When the Russian dictator gave the order to invade Ukraine five months ago, he seems to have genuinely believed his army would be met with cakes and flowers by a grateful population. Instead, he has plunged Russia into a disastrous war and turned his country’s closest neighbour into an implacable enemy.

Long Read: Russian Youth against War (Wilson Center) Young Russians strongly oppose the war in Ukraine. It is increasingly clear to them that the war is stealing their future and was started only to keep Vladimir Putin, his friends, and their heirs in power for as long as possible.

The Paradoxes of Escalation in Ukraine (Foreign Affairs) Slowly but surely, Russia and the West are drawing their redlines.

Climbing the escalation ladder in Ukraine: A menu of options for the West (Atlantic Council) Our experts have assembled a list of possible policy responses the West ought to consider if Russia escalates its war against Ukraine.

Can Putin Survive? (Foreign Affairs) The lessons of the Soviet collapse.

Is Viktor Orban right about the Ukraine war? (The Telegraph) The Hungarian leader's call for peace may make sense for Hungary now - but long-term it would cripple his country and the West

Putin 'embarrassed' as hackers launch cyber war on Russian President over Ukraine invasion (Express.co.uk) HACKERS are targeting and "embarrassing" Vladimir Putin in a bid to crush the Russian cybersecurity regime as it continues to wage its illegal war on Ukraine.

Is Anonymous Rewriting the Rules of Cyberwarfare? Timeline of Their Attacks Against the Russian Government (Website Planet) Jeremiah Fowler, together with the Website Planet research team, took an in depth look at how the hacker collective has changed the landscape of what

Ukraine’s tech excellence is playing a vital role in the war against Russia (Atlantic Council) Russia’s invasion of Ukraine is now in its sixth month with no end in sight to what is already Europe’s largest conflict since WWII. In the months following the outbreak of hostilities on February 24, the courage of the Ukrainian nation has earned admiration around the world. Many international observers are encountering Ukraine for the first time and are learning that in addition to their remarkable resilience, Ukrainians are also extremely innovative with high levels of digital literacy.

Russia’s pulling the plug on space cooperation. Should the world be worried? (Atlantic Council) Our experts break down Moscow’s extraplanetary plans after it pulls out of the International Space Station.

Crops ‘Stored Everywhere’: Ukraine’s Harvest Piles Up (New York Times) Farmers who have lived under the risk of Russian missile attacks have their doubts about an international agreement to ease a blockade on grain shipments through the Black Sea.

Ukraine to double energy exports amid Russian gas cuts to Europe (Fox Business) Ukraine will double its energy exports to Europe as EU nations cope with an energy standoff with Russia amid an international gas crisis.

Russian economy ‘crippled at every level’ despite Putin’s propaganda (The Telegraph) Country in ‘dire straits’ as exodus of Western firms knocks out 40pc of GDP

Isolation complication? US finds it's hard to shun Russia (AP NEWS) The Biden administration likes to say Russia has become isolated internationally because of its invasion of Ukraine . Yet Moscow's top officials have hardly been cloistered in the Kremlin.

‘Merchant of Death’ offered up by US in exchange for jailed citizens held in Russia (The Telegraph) Viktor Bout has been in US custody for 10 years for running a major arms smuggling operation

Russia has slowed flows of gas to Europe to a trickle - and the energy crisis could drag on until 2025, Goldman Sachs says (Markets Insider) Natural gas prices finally eased Thursday but have soared 145% since the start of June - and the crisis could continue for years, strategists said.

If Putin is using gas prices to fight Europe, how can it fight back? (the Guardian) Analysis: in this massive hybrid war, Europe is preparing its defences before winter and hoping sanctions bite

Attacks, Threats, and Vulnerabilities

How Threat Actors Are Adapting to a Post-Macro World (Proofpoint) In response to Microsoft’s announcements that it would block macros by default in Microsoft Office applications, threat actors began adopting new tactics, techniques, and procedures (TTPs).

CISA Releases Log4Shell-Related MAR (CISA) From May through June 2022, CISA responded to an organization that was compromised by an exploitation of an unpatched and unmitigated Log4Shell vulnerability in a VMware Horizon server. CISA analyzed five malware samples obtained from the organization’s network and released a Malware Analysis Report of the findings. Users and administrators are encouraged to review MAR 10386789-1.v1 for more information. For more information on Log4Shell, see:

MAR-10386789-1.v1 – Log4Shell (CISA) Since December 2021, multiple threat actor groups have exploited Log4Shell on unpatched, public-facing VMware Horizon and Unified Access Gateway (UAG) servers. From May through June 2022, CISA provided remote incident support at an organization where CISA observed suspected Log4Shell PowerShell downloads. During remote support, CISA confirmed the organization was compromised by malicious cyber actors who exploited Log4Shell in a VMware Horizon server that did not have patches or workarounds applied. CISA analyzed five malware samples obtained from the organization’s network: two malicious PowerShell files, two Extensible Markup Language (XML) files, and a 64-bit compiled Python Portable Executable (PE) file.

Threat Advisory: Hackers Are Selling Access to MSPs (Huntress) We’re currently monitoring a situation that entails a hacker selling access to an MSP with access to 50+ customers, totaling 1,000+ servers.

Experts warn of hacker claiming access to 50 U.S. companies through breached MSP (The Record by Recorded Future) Experts have raised alarms about a post on a hacker forum by someone claiming to have access to 50 different U.S. companies through an unknown managed service provider.

Exploit of Log4Shell Vulnerability Leads to Compromise of Major South American Vaccine Distributor (SecurityScorecard) Exploit of Log4Shell Vulnerability Leads to Compromise of Major South American Vaccine Distributor

Exploitation of accurate Confluence Vulnerability Underway (SecurityWeek) Security researchers are already seeing the accurate Questions for Confluence hardcoded password vulnerability being exploited in attacks.

Moxa NPort Device Flaws Can Expose Critical Infrastructure to Disruptive Attacks (SecurityWeek) Vulnerabilities found in Moxa’s NPort devices could allow attackers to cause significant disruption, including in critical infrastructure organizations.

Nuki Smart Lock Vulnerabilities Allow Hackers to Open Doors (SecurityWeek) NCC Group security researchers have identified 11 vulnerabilities impacting Nuki smart lock products, including some that allow attackers to open doors.

Vulnerability in Dahua’s ONVIF Implementation Threatens IP Camera Security (Nozomi Networks) Nozomi Networks Labs publishes a vulnerability in Dahua's ONVIF standard implementation, which can be abused to take over IP cameras.

Protestware on the rise: Why developers are sabotaging their own code (TechCrunch) A wave of software developers have self-sabotaged their code to protest big corporations to Russia's war in Ukraine.

Italian Insurer's Data Breach Uncovered Sensitive Staff Documents (Website Planet) Italian Insurer's Data Breach Uncovered Sensitive Staff Documents Vittoria Assicurazioni's open buckets exposed hundreds of thousands of files contai

Security Patches, Mitigations, and Software Updates

Google announces new Play Store policies around intrusive ads, impersonation and more (TechCrunch) Google announced new Play Store policies for developers on Wednesday that aim to address issues with intrusive ads, alarms, VPNs and impersonation of brands and other apps. The company said these policies will go into effect during different timeframes so developers have ample time to make changes …

Mitsubishi Electric Factory Automation Engineering Software (Update B) (CISA) 1. EXECUTIVE SUMMARY CVSS v3 8.3 ATTENTION: Exploitable remotely Vendor: Mitsubishi Electric Equipment: Mitsubishi Electric, Multiple Factory Automation Engineering Software products Vulnerability: Permission Issues 2.

Mitsubishi Electric FA Engineering Software (CISA) 1. EXECUTIVE SUMMARY CVSS v3 5.5 ATTENTION: Low attack complexity Vendor: Mitsubishi Electric Equipment: FA Engineering Software Vulnerabilities: Out-of-bounds Read, Integer Underflow 2. RISK EVALUATION Successful exploitation of these vulnerabilities may cause a denial-of-service condition.

Rockwell Products Impacted by Chromium Type Confusion (CISA) 1. EXECUTIVE SUMMARY CVSS v3 4.0 ATTENTION: Low attack complexity/public exploits are available Vendor: Rockwell Automation Equipment: FactoryTalk Software, Enhanced HIM for PowerFlex, Connected Components Workbench Vulnerability: Type Confusion 2. RISK EVALUATION Successful exploitation of this vulnerability could cause a denial-of-service condition.

2022 ForgeRock Consumer Identity Breach Report (ForgeRock) ForgeRock’s Consumer Identity Breach Report found that unauthorized access was the leading cause of breaches, accounting for 50% of all records compromised during 2021. To learn about the current threat landscape, get the report.

The State of Vulnerability Intelligence: 2022 Midyear Edition (Flashpoint) The State of Vulnerability Intelligence report empowers organizations to focus on what matters most, helping them to keep workloads manageable.

Software Supply Chain Risk (Coalfire) Coalfire, in conjunction with survey partner Cyber Risk Alliance, has developed our latest report to advance the cybersecurity community by researching and analyzing the risks currently facing the software supply chain.

Cyberattacks on satellites may only be getting more worrisome (Washington Post) Space is a burgeoning battleground for cyberattacks

It’s Not Just Loot Boxes: Predatory Monetization Is Everywhere (Wired) The UK recently declined to regulate prize draws as a form of gambling, but does it matter? The industry has moved on to more problematic ways to make money.

Marketplace

Cyber insurance is on the rise, and organizational security postures must follow suit (VentureBeat) When it comes to cyber insurance, much like other types of insurance, organizations should know what to look for — as well as what is expected of them. 

Cyber Insurance Price Hike Hits Local Governments Hard (Pew Trusts) Some rates have more than doubled, and many insurers require new security protections.

Cybersecurity Growth Investment Flat, M&A Activity Strong for 2022 (SecurityWeek) While global markets have suffered, sales of cybersecurity software have remained strong. VC investment in cybersecurity has adapted to the world economy rather than stalled.

Decentralized data platform Space and Time raises $10 million in seed round (The Block) Funds raised in the Framework Ventures-led round will be used to expand Space and Time's engineering team and decentralized network.

ThreatX Recognized as a sample Vendor in the 2022 Gartner® Hype Cycle™ for Application Security (Business Wire) ThreatX today announced the company has been acknowledged twice as a sample Vendor in the Gartner Hype Cycle for Application Security, 2022 report.

Axis Named Most Innovative Security Services Company at 2022 Golden Bridge Business and Innovation Awards (PR Newswire) Axis announced today that it has been named Most Innovative Security Services Company at the 2022 Golden Bridge Business and Innovation Awards...

Gartner Magic Quadrant PAM | Delinea Positioned as a Leader (Delinea) Download a complimentary copy of Gartner’s 2020 report on the PAM market and vendors to see why Delinea is recognized as a leader.

Axonius Appoints Tom Kennedy as Vice President of Axonius Federal Systems (Axonius) Axonius today announced it has appointed Tom Kennedy as its Vice President of Axonius Federal Systems LLC, the company’s government-focused subsidiary.

Products, Services, and Solutions

Fastly Partners with HUMAN Security to Protect Customers from Bot Attacks and Fraud (Business Wire) Fastly Partners with HUMAN Security to Protect Customers from Bot Attacks and Fraud

Everything Blockchain Inc. Launches EB Control (Business Wire) Everything Blockchain Inc., (OTCMKTS: OBTX), a technology company that enables real-world use of blockchain to solve critical business issues, today a

Technologies, Techniques, and Standards

Cyber grades bring down agencies’ scores in FITARA 14 (Federal News Network) The 14th version of the FITARA scorecard shows one agency increased their score, while eight earned lower scores, mostly due to cybersecurity shortcomings.

Legislation, Policy, and Regulation

EU to Open San Francisco Office Focused on Tech Regulation (Wall Street Journal) The European Commission is opening a San Francisco office, an effort to Strengthen trans-Atlantic tech policy relations after years of tension between European regulators and U.S. tech firms.

Why Indonesia Has Embraced Huawei (Foreign Policy) If the U.S. wants to compete with China in developing countries, our research shows it needs to offer tangible assistance in response to real needs.

Victim of Private Spyware Warns It Can be Used Against US (SecurityWeek) Months after her father was lured back to Rwanda under false pretenses and jailed, Carine Kanimba discovered her own phone had been hacked using private spyware.

House Passes Cybersecurity Bills Focusing on Energy Sector, Information Sharing (SecurityWeek) The House has passed two cybersecurity bills: the Energy Cybersecurity University Leadership Act and the RANSOMWARE Act.

House Passes Chips Act to Boost U.S. Semiconductor Production (Wall Street Journal) The $280 billion bill passed despite a late push by Republican leaders to block the legislation over a separate Democratic spending proposal.

CHIPS Act clears Congress, ensuring $52 billion boost to US foundries (The Verge) The vote was the long-awaited bill’s final hurdle before Biden.

Congressional Democrats Introduce Net Neutrality Bill (CNET) Senate and House Democrats introduce a bill to reinstate Obama-era net neutrality rules and to provide the FCC authority over broadband networks.

Top White House cyber official says Congress should push for digital security mandates (The Record by Recorded Future) A senior White House official on Thursday said Congress could do more to set basic cybersecurity standards for critical infrastructure sectors to better protect them against digital threats.

Litigation, Investigation, and Law Enforcement

Police to share coding of AN0M app used in Operation Ironside arrests (ABC) Experts for alleged criminals charged in one of Australia's biggest criminal sting operations will be given access to the coding of a messaging app built by the Australian Federal Police to catch those allegedly involved in organised crime.

Rewards for Justice – Reward Offer for Information on Russian Interference in U.S. Elections (United States Department of State) The U.S. Department of State’s Rewards for Justice (RFJ) program, administered by the Diplomatic Security Service, is offering a reward of up to $10 million for information on foreign interference in U.S. elections. The reward offer seeks information leading to the identification or location of any foreign person, including a foreign entity, who knowingly engaged […]

Crackdown on BEC Schemes: 100 Arrested in Europe, Man Charged in US (SecurityWeek) Authorities in Europe announce the arrests of 100 individuals for invoice fraud as the US indicts a Florida man for role in BEC scheme.

U.S. Justice Department probing cyber breach of federal court records system (Reuters) The U.S. Justice Department is investigating a cyber breach involving the federal court records management system, the department's top national security attorney told lawmakers on Thursday.

US DoJ probing 'incredibly significant' breach of federal records (Computing) The breach dates back to early 2020

Justice Department investigating data breach of federal court system (POLITICO) House Judiciary Committee Chair Jerrold Nadler described a "system security failure" of the U.S. Courts' document management system.

France Closes 'Cookies' Case Against Facebook (SecurityWeek) French privacy regulators on Thursday closed a case against Facebook after determining the US tech giant had changed the way it collected user data to comply with the law.

Fri, 29 Jul 2022 04:26:00 -0500 text/html https://thecyberwire.com/newsletters/daily-briefing/11/145
Killexams : Public Cloud Infrastructure as a Service Market 2022 Emerging Trends, Comprehensive Study With Top Companies and Key Players till 2030

The MarketWatch News Department was not involved in the creation of this content.

Jun 24, 2022 (Alliance News via COMTEX) -- Key Companies Covered in the Public Cloud Infrastructure as a Service Market Research are Amazon Web Services, Rackspace, Google, Microsoft, Tecent, Alibba Group, Kingsoft, China Telecom, IBM, Fujitsu, and other key market players.

Report Ocean published the latest research report on the Public Cloud Infrastructure as a Servicemarket. In order to comprehend a market holistically, a variety of factors must be evaluated, including demographics, business cycles, and microeconomic requirements that pertain precisely to the market under study. In addition, the Public Cloud Infrastructure as a Servicemarket study demonstrates a detailed examination of the business state, which represents creative ways for company growth, financial factors such as production value, key regions, and growth rate.

The global Public Cloud Infrastructure as a Service market is expected to reach US$ $ Million by 2030, with a CAGR of $% from 2022 to 2030.

The digital economy affects the world's trajectory and the societal well-being of common citizens. In addition, it influences everything from resource assignment to income allocation and economic growth. The adoption of the Internet of Things is pushing significant market growth. Additionally, in 5-10 years, the latest technologies such as robotics, AI, and augmented reality can illustrate around 27% of ICT spending. Consumer demand for access to content and products at any time and from any location is propelling the ICT market forward. The ICT sector is lucrative for vendors since it has about 7 billion mobile subscribers and 3 billion Internet, users.

Download Free sample of This Strategic Report :-https://reportocean.com/industry-verticals/sample-request?report_id=HNY302045

The prime objective of this report is to provide the insights on the post COVID-19 impact which will help market players in this field evaluate their business approaches. Also, this report covers market segmentation by major market verdors, types, applications/end users and geography(North America, East Asia, Europe, South Asia, Southeast Asia, Middle East, Africa, Oceania, South America).

By Types:

Disaster Recovery as a Service (DRaaS)

Compute as a Service (CaaS)

Data Center as a Service (DaaS)

Desktop as a Service (DaaS)

Application hosting as a service

Storage as a Service (STaaS)

By Applications:

Game Industry

E-commerce

Financial Industry

Video Industry

Mobile Phone Industry

Internet Media

Government

Industry

Other

Key Indicators Analyzed

Market Players & Competitor Analysis:The report covers the key players of the industry including Company Profile, Product Specifications, Production Capacity/Sales, Revenue, Price and Gross Margin 2016-2027 & Sales with a thorough analysis of the markets competitive landscape and detailed information on vendors and comprehensive details of factors that will challenge the growth of major market vendors.

Global and Regional Market Analysis:The report includes Global & Regional market status and outlook 2016-2027. Further the report provides break down details about each region & countries covered in the report. Identifying its sales, sales volume & revenue forecast. With detailed analysis by types and applications.

Market Trends: Market key trends which include Increased Competition and Continuous Innovations.

Opportunities and Drivers:Identifying the Growing Demands and New Technology

Porters Five Force Analysis:The report provides with the state of competition in industry depending on five basic forces: threat of new entrants, bargaining power of suppliers, bargaining power of buyers, threat of substitute products or services, and existing industry rivalry.

Key Reasons to Purchase

To gain insightful analyses of the market and have comprehensive understanding of the global market and its commercial landscape.

Assess the production processes, major issues, and solutions to mitigate the development risk.

To understand the most affecting driving and restraining forces in the market and its impact in the global market.

Learn about the market strategies that are being adopted by leading respective organizations.

To understand the future outlook and prospects for the market.

Besides the standard structure reports, we also provide custom research according to specific requirements.

Download sample Report, SPECIAL OFFER (Avail an Up-to 30% discount on this report :-https://reportocean.com/industry-verticals/sample-request?report_id=HNY302045

What are the aspects of this report that relate to regional analysis?

The report's geographical regions include North America, Europe, Asia Pacific, Latin America, the Middle East, and Africa.

The report provides a comprehensive analysis of market trends, including information on usage and consumption at the regional level.

Reports on the market include the growth rates of each region, which includes their countries, over the coming years.

How are the key players in the market assessed?

This report provides a comprehensive analysis of leading competitors in the market.

The report includes information about the key vendors in the market.

The report provides a complete overview of each company, including its profile, revenue generation, cost of goods, and products manufactured.

The report presents the facts and figures about market competitors, alongside the viewpoints of leading market players.

A market report includes details on accurate market developments, mergers, and acquisitions involving the key players mentioned.

Get 20% Off On Various License Types When Buy Now At :-https://reportocean.com/industry-verticals/sample-request?report_id=HNY302045

The extent of the Report

The market attributes segment of the report characterizes and clarifies the market.

The market size area gives the market size ($b) covering both the notable development of the market, the effect of the Covid 19 infection, and guaging its recuperation.

Market divisions separate business sectors into submarkets.

The territorial and country breakdowns segment gives an examination of the market in every topography and the size of the market by geology and looks at their memorable and gauge development. It covers the effect and recuperation direction of Covid 19 for all areas, key created nations, and major developing business sectors.

A serious scene gives a portrayal of the cutthroat idea of the market, pieces of the pie, and a depiction of the main organizations. Key monetary arrangements which have molded the market lately are recognized.

The patterns and procedures segment investigations the state of the market as it rises out of the emergency and proposes how organizations can develop as the market recuperates.

The weighty trucks market part of the report gives a set. It contrasts the weighty trucks market and different sections of the weighty trucks market by size and development, noteworthy, and figure.

Motivations to Purchase this Report :https://reportocean.com/industry-verticals/sample-request?report_id=HNY302045

We share definite and precise data about the market estimate.

Our reports have been analyzed by proficient specialists of the business, which makes them helpful for the organization to augment their profit from the venture.

The investigation recognizes that the area players and key drivers of the two contentions and development evaluate the effect of impediments just as the open doors on the area.

Information with respect to the business share by each thing piece, close by their sensible worth, have been served in the report.

We provide measurable data, vital and investigation device results to provide a complex scene and target key market players. This will assist the organization with expanding its proficiency.

Our report assists perusers with translating the current and future requirements of the market and ideal business systems to Strengthen market advancement.

Access full Report Description, TOC, Table of Figure, Chart, etc :-https://reportocean.com/industry-verticals/sample-request?report_id=HNY302045

Key Questions Answered in the Market Report

? How did the COVID-19 pandemic impact the adoption of by various pharmaceutical and life sciences companies?
? What is the outlook for the impact market during the forecast period 2021-2030?
? What are the key trends influencing the impact market? How will they influence the market in short-, mid-, and long-term duration?
? What is the end user perception toward?
? How is the patent landscape for pharmaceutical quality? Which country/cluster witnessed the highest patent filing from January 2014-June 2021?
? What are the key factors impacting the impact market? What will be their impact in short-, mid-, and long-term duration?
? What are the key opportunities areas in the impact market? What is their potential in short-, mid-, and long-term duration?
? What are the key strategies adopted by companies in the impact market?
? What are the key application areas of the impact market? Which application is expected to hold the highest growth potential during the forecast period 2021-2030?
? What is the preferred deployment model for the impact? What is the growth potential of various deployment models present in the market?
? Who are the key end users of pharmaceutical quality? What is their respective share in the impact market?
? Which regional market is expected to hold the highest growth potential in the impact market during the forecast period 2021-2030?
? Which are the key players in the impact market?

About Report Ocean:
We are the best market research reports provider in the industry. Report Ocean believes in providing quality reports to clients to meet the top line and bottom line goals which will boost your market share in today's competitive environment. Report Ocean is a 'one-stop solution' for individuals, organizations, and industries that are looking for innovative market research reports.

Get in Touch with Us:
Report Ocean:
Email: sales@reportocean.com
Address: 500 N Michigan Ave, Suite 600, Chicago, Illinois 60611 - UNITED STATES
Tel: +1 888 212 3539 (US - TOLL FREE)
Website: https://www.reportocean.com

COMTEX_409158871/2796/2022-06-24T05:33:54

The MarketWatch News Department was not involved in the creation of this content.

Thu, 23 Jun 2022 17:33:00 -0500 en-US text/html https://www.marketwatch.com/press-release/public-cloud-infrastructure-as-a-service-market-2022-emerging-trends-comprehensive-study-with-top-companies-and-key-players-till-2030-2022-06-24
Killexams : IBM Report: Consumers Pay the Price as Data Breach Costs Reach All-Time High

60% of breached businesses raised product prices post-breach; vast majority of critical infrastructure lagging in zero trust adoption; $550,000 in extra costs for insufficiently staffed businesses

CAMBRIDGE, Mass., July 27, 2022 /PRNewswire/ -- IBM (NYSE: IBM) Security today released the annual Cost of a Data Breach Report,1 revealing costlier and higher-impact data breaches than ever before, with the global average cost of a data breach reaching an all-time high of $4.35 million for studied organizations. With breach costs increasing nearly 13% over the last two years of the report, the findings suggest these incidents may also be contributing to rising costs of goods and services. In fact, 60% of studied organizations raised their product or services prices due to the breach, when the cost of goods is already soaring worldwide amid inflation and supply chain issues.

60% of breached businesses studied stated they increased the price of their products or services due to the data breach

The perpetuality of cyberattacks is also shedding light on the "haunting effect" data breaches are having on businesses, with the IBM report finding 83% of studied organizations have experienced more than one data breach in their lifetime. Another factor rising over time is the after-effects of breaches on these organizations, which linger long after they occur, as nearly 50% of breach costs are incurred more than a year after the breach.

The 2022 Cost of a Data Breach Report is based on in-depth analysis of real-world data breaches experienced by 550 organizations globally between March 2021 and March 2022. The research, which was sponsored and analyzed by IBM Security, was conducted by the Ponemon Institute.

Some of the key findings in the 2022 IBM report include:

  • Critical Infrastructure Lags in Zero Trust – Almost 80% of critical infrastructure organizations studied don't adopt zero trust strategies, seeing average breach costs rise to $5.4 million – a $1.17 million increase compared to those that do. All while 28% of breaches amongst these organizations were ransomware or destructive attacks.
  • It Doesn't Pay to Pay – Ransomware victims in the study that opted to pay threat actors' ransom demands saw only $610,000 less in average breach costs compared to those that chose not to pay – not including the cost of the ransom. Factoring in the high cost of ransom payments, the financial toll may rise even higher, suggesting that simply paying the ransom may not be an effective strategy.
  • Security Immaturity in Clouds – Forty-three percent of studied organizations are in the early stages or have not started applying security practices across their cloud environments, observing over $660,000 on average in higher breach costs than studied organizations with mature security across their cloud environments.
  • Security AI and Automation Leads as Multi-Million Dollar Cost Saver – Participating organizations fully deploying security AI and automation incurred $3.05 million less on average in breach costs compared to studied organizations that have not deployed the technology – the biggest cost saver observed in the study.

"Businesses need to put their security defenses on the offense and beat attackers to the punch. It's time to stop the adversary from achieving their objectives and start to minimize the impact of attacks. The more businesses try to perfect their perimeter instead of investing in detection and response, the more breaches can fuel cost of living increases." said Charles Henderson, Global Head of IBM Security X-Force. "This report shows that the right strategies coupled with the right technologies can help make all the difference when businesses are attacked."

Over-trusting Critical Infrastructure Organizations
Concerns over critical infrastructure targeting appear to be increasing globally over the past year, with many governments' cybersecurity agencies urging vigilance against disruptive attacks. In fact, IBM's report reveals that ransomware and destructive attacks represented 28% of breaches amongst critical infrastructure organizations studied, highlighting how threat actors are seeking to fracture the global supply chains that rely on these organizations. This includes financial services, industrial, transportation and healthcare companies amongst others.

Despite the call for caution, and a year after the Biden Administration issued a cybersecurity executive order that centers around the importance of adopting a zero trust approach to strengthen the nation's cybersecurity, only 21% of critical infrastructure organizations studied adopt a zero trust security model, according to the report. Add to that, 17% of breaches at critical infrastructure organizations were caused due to a business partner being initially compromised, highlighting the security risks that over-trusting environments pose.

Businesses that Pay the Ransom Aren't Getting a "Bargain"
According to the 2022 IBM report, businesses that paid threat actors' ransom demands saw $610,000 less in average breach costs compared to those that chose not to pay – not including the ransom amount paid. However, when accounting for the average ransom payment, which according to Sophos reached $812,000 in 2021, businesses that opt to pay the ransom could net higher total costs - all while inadvertently funding future ransomware attacks with capital that could be allocated to remediation and recovery efforts and looking at potential federal offenses.

The persistence of ransomware, despite significant global efforts to impede it, is fueled by the industrialization of cybercrime. IBM Security X-Force discovered the duration of studied enterprise ransomware attacks shows a drop of 94% over the past three years – from over two months to just under four days. These exponentially shorter attack lifecycles can prompt higher impact attacks, as cybersecurity incident responders are left with very short windows of opportunity to detect and contain attacks. With "time to ransom" dropping to a matter of hours, it's essential that businesses prioritize rigorous testing of incident response (IR) playbooks ahead of time. But the report states that as many as 37% of organizations studied that have incident response plans don't test them regularly.

Hybrid Cloud Advantage
The report also showcased hybrid cloud environments as the most prevalent (45%) infrastructure amongst organizations studied. Averaging $3.8 million in breach costs, businesses that adopted a hybrid cloud model observed lower breach costs compared to businesses with a solely public or private cloud model, which experienced $5.02 million and $4.24 million on average respectively. In fact, hybrid cloud adopters studied were able to identify and contain data breaches 15 days faster on average than the global average of 277 days for participants.

The report highlights that 45% of studied breaches occurred in the cloud, emphasizing the importance of cloud security. However, a significant 43% of reporting organizations stated they are just in the early stages or have not started implementing security practices to protect their cloud environments, observing higher breach costs2. Businesses studied that did not implement security practices across their cloud environments required an average 108 more days to identify and contain a data breach than those consistently applying security practices across all their domains.

Additional findings in the 2022 IBM report include:

  • Phishing Becomes Costliest Breach Cause – While compromised credentials continued to reign as the most common cause of a breach (19%), phishing was the second (16%) and the costliest cause, leading to $4.91 million in average breach costs for responding organizations.
  • Healthcare Breach Costs Hit Double Digits for First Time Ever– For the 12th year in a row, healthcare participants saw the costliest breaches amongst industries with average breach costs in healthcare increasing by nearly $1 million to reach a record high of $10.1 million.
  • Insufficient Security Staffing – Sixty-two percent of studied organizations stated they are not sufficiently staffed to meet their security needs, averaging $550,000 more in breach costs than those that state they are sufficiently staffed.

Additional Sources

  • To get a copy of the 2022 Cost of a Data Breach Report, please visit: https://www.ibm.com/security/data-breach.
  • Read more about the report's top findings in this IBM Security Intelligence blog.
  • Sign up for the 2022 IBM Security Cost of a Data Breach webinar on Wednesday, August 3, 2022, at 11:00 a.m. ET here.
  • Connect with the IBM Security X-Force team for a personalized review of the findings: https://ibm.biz/book-a-consult.

About IBM Security
IBM Security offers one of the most advanced and integrated portfolios of enterprise security products and services. The portfolio, supported by world-renowned IBM Security X-Force® research, enables organizations to effectively manage risk and defend against emerging threats. IBM operates one of the world's broadest security research, development, and delivery organizations, monitors 150 billion+ security events per day in more than 130 countries, and has been granted more than 10,000 security patents worldwide. For more information, please check www.ibm.com/security, follow @IBMSecurity on Twitter or visit the IBM Security Intelligence blog.

Press Contact:

IBM Security Communications
Georgia Prassinos
gprassinos@ibm.com

1 Cost of a Data Breach Report 2022, conducted by Ponemon Institute, sponsored, and analyzed by IBM
2 Average cost of $4.53M, compared to average cost $3.87 million at participating organizations with mature-stage cloud security practices

IBM Corporation logo. (PRNewsfoto/IBM)

Cision View original content to get multimedia:https://www.prnewswire.com/news-releases/ibm-report-consumers-pay-the-price-as-data-breach-costs-reach-all-time-high-301592749.html

SOURCE IBM

Tue, 26 Jul 2022 17:00:00 -0500 en-US text/html https://fox8.com/business/press-releases/cision/20220727NY26218/ibm-report-consumers-pay-the-price-as-data-breach-costs-reach-all-time-high/
Killexams : IBM Report: Consumers Pay the Price as Data Breach Costs Reach All-Time High

60% of breached businesses raised product prices post-breach; vast majority of critical infrastructure lagging in zero trust adoption; $550,000 in extra costs for insufficiently staffed businesses

CAMBRIDGE, Mass., July 27, 2022 /PRNewswire/ -- IBM (NYSE: IBM) Security today released the annual Cost of a Data Breach Report,1 revealing costlier and higher-impact data breaches than ever before, with the global average cost of a data breach reaching an all-time high of $4.35 million for studied organizations. With breach costs increasing nearly 13% over the last two years of the report, the findings suggest these incidents may also be contributing to rising costs of goods and services. In fact, 60% of studied organizations raised their product or services prices due to the breach, when the cost of goods is already soaring worldwide amid inflation and supply chain issues.

60% of breached businesses studied stated they increased the price of their products or services due to the data breach

The perpetuality of cyberattacks is also shedding light on the "haunting effect" data breaches are having on businesses, with the IBM report finding 83% of studied organizations have experienced more than one data breach in their lifetime. Another factor rising over time is the after-effects of breaches on these organizations, which linger long after they occur, as nearly 50% of breach costs are incurred more than a year after the breach.

The 2022 Cost of a Data Breach Report is based on in-depth analysis of real-world data breaches experienced by 550 organizations globally between March 2021 and March 2022. The research, which was sponsored and analyzed by IBM Security, was conducted by the Ponemon Institute.

Some of the key findings in the 2022 IBM report include:

  • Critical Infrastructure Lags in Zero Trust – Almost 80% of critical infrastructure organizations studied don't adopt zero trust strategies, seeing average breach costs rise to $5.4 million – a $1.17 million increase compared to those that do. All while 28% of breaches amongst these organizations were ransomware or destructive attacks.

  • It Doesn't Pay to Pay – Ransomware victims in the study that opted to pay threat actors' ransom demands saw only $610,000 less in average breach costs compared to those that chose not to pay – not including the cost of the ransom. Factoring in the high cost of ransom payments, the financial toll may rise even higher, suggesting that simply paying the ransom may not be an effective strategy.

  • Security Immaturity in Clouds – Forty-three percent of studied organizations are in the early stages or have not started applying security practices across their cloud environments, observing over $660,000 on average in higher breach costs than studied organizations with mature security across their cloud environments.

  • Security AI and Automation Leads as Multi-Million Dollar Cost Saver – Participating organizations fully deploying security AI and automation incurred $3.05 million less on average in breach costs compared to studied organizations that have not deployed the technology – the biggest cost saver observed in the study.

"Businesses need to put their security defenses on the offense and beat attackers to the punch. It's time to stop the adversary from achieving their objectives and start to minimize the impact of attacks. The more businesses try to perfect their perimeter instead of investing in detection and response, the more breaches can fuel cost of living increases." said Charles Henderson, Global Head of IBM Security X-Force. "This report shows that the right strategies coupled with the right technologies can help make all the difference when businesses are attacked."

Over-trusting Critical Infrastructure Organizations
Concerns over critical infrastructure targeting appear to be increasing globally over the past year, with many governments' cybersecurity agencies urging vigilance against disruptive attacks. In fact, IBM's report reveals that ransomware and destructive attacks represented 28% of breaches amongst critical infrastructure organizations studied, highlighting how threat actors are seeking to fracture the global supply chains that rely on these organizations. This includes financial services, industrial, transportation and healthcare companies amongst others.

Despite the call for caution, and a year after the Biden Administration issued a cybersecurity executive order that centers around the importance of adopting a zero trust approach to strengthen the nation's cybersecurity, only 21% of critical infrastructure organizations studied adopt a zero trust security model, according to the report. Add to that, 17% of breaches at critical infrastructure organizations were caused due to a business partner being initially compromised, highlighting the security risks that over-trusting environments pose.

Businesses that Pay the Ransom Aren't Getting a "Bargain"
According to the 2022 IBM report, businesses that paid threat actors' ransom demands saw $610,000 less in average breach costs compared to those that chose not to pay – not including the ransom amount paid. However, when accounting for the average ransom payment, which according to Sophos reached $812,000 in 2021, businesses that opt to pay the ransom could net higher total costs - all while inadvertently funding future ransomware attacks with capital that could be allocated to remediation and recovery efforts and looking at potential federal offenses.

The persistence of ransomware, despite significant global efforts to impede it, is fueled by the industrialization of cybercrime. IBM Security X-Force discovered the duration of studied enterprise ransomware attacks shows a drop of 94% over the past three years – from over two months to just under four days. These exponentially shorter attack lifecycles can prompt higher impact attacks, as cybersecurity incident responders are left with very short windows of opportunity to detect and contain attacks. With "time to ransom" dropping to a matter of hours, it's essential that businesses prioritize rigorous testing of incident response (IR) playbooks ahead of time. But the report states that as many as 37% of organizations studied that have incident response plans don't test them regularly.

Hybrid Cloud Advantage
The report also showcased hybrid cloud environments as the most prevalent (45%) infrastructure amongst organizations studied. Averaging $3.8 million in breach costs, businesses that adopted a hybrid cloud model observed lower breach costs compared to businesses with a solely public or private cloud model, which experienced $5.02 million and $4.24 million on average respectively. In fact, hybrid cloud adopters studied were able to identify and contain data breaches 15 days faster on average than the global average of 277 days for participants.

The report highlights that 45% of studied breaches occurred in the cloud, emphasizing the importance of cloud security. However, a significant 43% of reporting organizations stated they are just in the early stages or have not started implementing security practices to protect their cloud environments, observing higher breach costs2. Businesses studied that did not implement security practices across their cloud environments required an average 108 more days to identify and contain a data breach than those consistently applying security practices across all their domains.

Additional findings in the 2022 IBM report include:

  • Phishing Becomes Costliest Breach Cause – While compromised credentials continued to reign as the most common cause of a breach (19%), phishing was the second (16%) and the costliest cause, leading to $4.91 million in average breach costs for responding organizations.

  • Healthcare Breach Costs Hit Double Digits for First Time Ever– For the 12th year in a row, healthcare participants saw the costliest breaches amongst industries with average breach costs in healthcare increasing by nearly $1 million to reach a record high of $10.1 million.

  • Insufficient Security Staffing – Sixty-two percent of studied organizations stated they are not sufficiently staffed to meet their security needs, averaging $550,000 more in breach costs than those that state they are sufficiently staffed.

Additional Sources

  • To get a copy of the 2022 Cost of a Data Breach Report, please visit: https://www.ibm.com/security/data-breach.

  • Read more about the report's top findings in this IBM Security Intelligence blog.

  • Sign up for the 2022 IBM Security Cost of a Data Breach webinar on Wednesday, August 3, 2022, at 11:00 a.m. ET here.

  • Connect with the IBM Security X-Force team for a personalized review of the findings: https://ibm.biz/book-a-consult.

About IBM Security
IBM Security offers one of the most advanced and integrated portfolios of enterprise security products and services. The portfolio, supported by world-renowned IBM Security X-Force® research, enables organizations to effectively manage risk and defend against emerging threats. IBM operates one of the world's broadest security research, development, and delivery organizations, monitors 150 billion+ security events per day in more than 130 countries, and has been granted more than 10,000 security patents worldwide. For more information, please check www.ibm.com/security, follow @IBMSecurity on Twitter or visit the IBM Security Intelligence blog.

Press Contact:

IBM Security Communications
Georgia Prassinos
gprassinos@ibm.com

1 Cost of a Data Breach Report 2022, conducted by Ponemon Institute, sponsored, and analyzed by IBM
2 Average cost of $4.53M, compared to average cost $3.87 million at participating organizations with mature-stage cloud security practices

IBM Corporation logo. (PRNewsfoto/IBM)

Cision

View original content to get multimedia:https://www.prnewswire.com/news-releases/ibm-report-consumers-pay-the-price-as-data-breach-costs-reach-all-time-high-301592749.html

SOURCE IBM

Tue, 26 Jul 2022 21:33:00 -0500 en-AU text/html https://au.news.yahoo.com/ibm-report-consumers-pay-price-040100294.html
C2010-530 exam dump and training guide direct download
Training Exams List