Tesla

Tesla shares dive below $200 after analyst cites distractions from Elon Musk’s ‘sci-fi projects’

Wedbush cut its price target on Tesla shares to $230 from $275 on Monday, citing “major concerns” about the growth plan of Elon Musk’s electric vehicle company, as well as U.S. demand for the key Model 3. “With a code red situation at Tesla, Musk & Co. are expanding
/
France is good at launching tech startups, but not at growing them

France is good at launching tech startups, but not at growing them

“France is maybe the best place to start a company,” said Jean-Rémi Kouchakji, co-founder of PayinTech, a Paris-based fintech firm that was among the 9,000 startups at the Viva Technology conference this year. Paradoxically, he said, it’s a difficult place for small- and medium-sized companies
/

Network and Security Trends

As we came to the beginning of 2018, it can be useful to take a look at trends in networking and security that we may see in the coming year. This way, your organization can compare itself to the industry and benchmark itself against its peers and others in the industry. Here are five trends I predict will carry the IT narrative this year.

1. We will see more organizations treating all endpoints and networks as untrusted.

Instead of treating the firewall as a network security boundary, with the wild west of the Internet sitting out there completely untrusted, while treating all of the devices inside the firewall as totally trusted and secure and believing nothing bad can happen inside the private network, I believe we will see a gradual yet consistent move toward the endpoint being the security boundary and all networks, regardless of firewall status, becoming untrusted. While this makes network administration a little more difficult and less transparent at the start, over time I believe one will find it provides numerous security dividends, such as – in principle – limiting the spread of malware that has already overtaken one system and making centralized management much more powerful, as policy engines understand how to touch systems that were previously considered remote and thus unmanageable with traditional tools.

2. Cybersecurity budgets will continue their rapid rise

While simply throwing money at shiny security objects does not (sadly) make you any safer from threats, there is no denying that improving your security profile in any meaningful way usually does involve spending some budget money on devices and services. Much of the low hanging security fruit has already been plucked; what remains requires forking over cash, either to upgrade operating systems, move workloads to more secure locations, purchase better edge protection and threat modeling devices, or third party software to manage disaster recovery. J. P. Morgan Chase, the large financial institution, recently boasted of their billion-with-a-B cybersecurity budget. Few of us can afford that level of investment, but new technologies, edge devices, and value added services from Internet providers can make a significant difference in your organization’s overall security posture, and I firmly believe we will see, in aggregate, much more spending on security than in years past.

3. Cutting costs elsewhere in IT will find a renewed importance in 2018

To pay, either in part or fully, for the increase in cybersecurity budgets, the new mantra in IT in 2018 will be to do more with less. Whether that means decommissioning legacy servers that are expensive to run and maintain in favor of less expensive cloud services that come out of an operating expense budget as opposed to a capital expense budget, or finding new ways to consolidate operations and remove duplicative or unnecessary applications and services, delivering the same or better results for less money will be one of the fundamental charges for IT directors across the globe in the new year. This could come in the form of increased network virtualization, prioritizing projects that have a more immediate business payoff or return of or on investment, and cutting down on wasteful IT spend, particularly with consultants and service providers.

4. Wide area network (WAN) bandwidth demand will increase

As more services move to the public or hybrid cloud, more data gets synchronized and transmitted to and from different locations around the globe, and more devices and services come online and consume bandwidth (see: Things, the Internet of), your organization’s links to the global Internet will become more saturated. In 2018 demand for more WAN capacity will grow to satisfy this increased need for network capacity and headroom. There are solutions like software defined wide area networking (SD-WAN) which can bring together multiple WAN links of different mediums and providers and intelligently route traffic among those pipes, and I believe these WAN management solutions will enjoy increased popularity in the new year to come. Other services like increased availability of fiber optic service to the premises and direct links to cloud service providers like Microsoft’s Azure ExpressRoute also fall under this category.

5. Ransomware will continue to be a pernicious threat

I predict ransomware will evolve to become even more brazen and attempt to take advantage of serious vulnerabilities in network protocols and software. We may even see ransomware that attacks software bugs without requiring a user to open an e-mail attachment to deliver its payload. Administrators and IT directors everywhere will need to take stock of their current backup and recovery procedures and make sure that they can restore individual files as well as application servers and web services in as minimal amount of time as possible. Perhaps finding new backup software and services are in order: these vendors find themselves fighting against ransomware as well.

Wrapping it up: I see security (and the attendant backup and disaster recovery tools) and bandwidth as the main themes of 2018 while IT continues to try to deliver more value and return on investment at less cost. 

By Doug Hazelman

Doug Hazelman

Doug is the current VP of Technical Marketing with CloudBerry where his responsibilities are to help build a community around their products and solutions.

Previously to CloudBerry, Doug spent over 9 years as the VP of Product Strategy and Chief Evangelist at Veeam Software which specializes backup and management of virtual infrastructures. Prior to joining Veeam Doug was a consultant within the Advanced Infrastructure Group at Bennett Adelson. Doug has over 12 years experience in the IT industry in areas such as IT Infrastructure, Active Directory design, Exchange management, Active Directory and Exchange Migrations, Identity Management, help desk management, consulting and product management.

View Website
Infosec thought leaders

Lessons Learned When Moving to the Cloud

Moving to the Cloud Lessons At Leostream, we work with organizations around the globe that are moving workloads to the ...
Why should SMEs embrace Cloud ERP solutions?

Why should SMEs embrace Cloud ERP solutions?

SMEs & ERP Solutions Remaining competitive in the market is the primary goal of every business. For SMEs, moving to ...
Big Pivot Podcast: How To Become A More Effective CIO

Big Pivot Podcast: How To Become A More Effective CIO

Become A More Effective CIO The Big Pivot podcast, put together by IDG and Informatica, looks at how CIOs are ...
How to Improve the Backup Success Rate of Data Centers?

How to Improve the Backup Success Rate of Data Centers?

Improve Backup Success Rate According to industry analysts, a significant number of backup jobs (from 5 to 25%) are failing ...