Whistlin’ Wednesday! No need to put on NSync and wistfully sing, “It’s gonna be May”...it already is.
In today’s edition:
EU vs. E2EE
Krakow cloud
Intelligent design
—Tom McKay, Amanda Florian, Billy Hurley, Patrick Lucas Austin
|
|
Sakkmesterke/Getty Images
Another day, another call from law enforcement to build back doors into encrypted products.
An association of European police chiefs has issued a joint declaration saying end-to-end encryption (E2EE) undermines capabilities “crucial to supporting online safety.” The statement says E2EE prevents tech firms from complying with “lawful access” orders during police investigations, as well as the “ability of technology companies proactively to identify illegal and harmful activity on their platforms.”
The declaration says European police are “deeply concerned” that tech firms are rolling out E2EE products “in a way that will undermine both of these capabilities.”“Our societies have not previously tolerated spaces that are beyond the reach of law enforcement, where criminals can communicate safely and child abuse can flourish,” the letter continued. “They should not now.”
The chiefs also called for tech firms to build “security by design” into their products, though didn’t offer any specifics as to what that would entail.
Read more here.—TM
Do you work in IT or have information about your IT department you want to share? Email [email protected]. Want to go encrypted? Ask Tom for his Signal.
|
|
Edge deployments that support AI applications are the perfect storm of IT complications. Space constraints, distributed infrastructure, intensive energy and computing needs…it’s a lot to handle. Luckily, Eaton mapped out how to power a flexible, resilient, and efficient edge architecture.
Eaton’s AI at the Edge infographic shows how Eaton’s solutions go beyond simple backup power. Its products are designed to offer easy installation and maintenance, improve security, and allow intelligent, remote monitoring and maintenance. And they can handle those large power requirements.
When you’re ready to upgrade, Eaton’s solutions make it simple. No matter what industry you’re in, Eaton helps take your IT environment to the next level—so you can stay ahead of the curve.
Optimize your edge IT for AI.
|
|
John M Lund Photography Inc/Getty Images
Microsoft, Google, and Amazon. Those are just a few of the household names that have invested in Poland’s cloud and data industries. The cloud computing market in the country is forecast to grow with an increase of 24% year on year to around $1.2 billion USD this year, the Warsaw Business Journal reported April 18, and by 2030, Poland’s widespread adoption of cloud tech could produce a value equal to 4% of the country's annual GDP, or around $28.9 billion, according to a 2021 report from McKinsey Digital.
Weather report. Marta Różańska—who was named one of the Top 10 Women in Cloud Computing in Poland in 2023, told IT Brew in an email that Polish companies are “focused on innovation,” with cloud tech integrated “into their digital transformation strategies.” Besides strategy, the economy also plays a major role.
“Poland has the biggest and most stable economy in middle-Eastern Europe,” Różańska, who now works as a postdoc researcher in AI for Security at IDEAS NCBR, a Warsaw-based research and development center, said. “Poland’s economy is still growing, but the labor cost is still relatively lower than that of other European countries. It is no surprise that Big Tech companies find this region interesting.”
Read more here.—AF
Do you work in IT or have information about your IT department you want to share? Email [email protected].
|
|
Pugun Sj/Getty Images
Following alerts of threat actors exploiting vulnerabilities in IT services company Ivanti’s Connect Secure and Policy Secure gateway products, CEO Jeff Abbott wrote an open letter on April 3 committing to a philosophy increasingly touted by government and industry: secure by design.
The framework—one supported by CISA, the Biden administration, and tech giants like Google—embeds security in all phases of the development process. Targeted companies like Ivanti and SolarWinds, which have faced attacks on their own products, hope that their emphasis on secure by design builds trust in code and trust with their customer base.
“When there was a swirl around us like there was, it did necessitate a strong response,” Abbott told IT Brew.
In the open letter, Abbott emphasized the company’s path down a “new era,” emphasizing a critical look at all phases of development and pledging a revamp of vulnerability management practices, partnerships with cyber agencies, and information-sharing efforts with customers.
Keep reading here.—BH
Do you work in IT or have information about your IT department you want to share? Email [email protected].
|
|
TOGETHER WITH BETTERCLOUD
|
Point, set, match. CFOs can be slightly…resistant to change. Does your IT team need to make the case for new SaaS management software? BetterCloud’s CFO Advocacy Kit has all the deets on creating a winning value prop and winning over hearts and minds up in the C-suite. See how it’s done.
|
|
APIs are the real MVPs of digital hustle, but as the world goes app-crazy, it’s time to tighten up security like never before. Join us for a virtual event on May 9 to discuss strategies on how to stay one step ahead of hackers. We’ve got the insider scoop from experts. Plus, hear from Rupesh Chokshi from Akamai, who will be sharing some serious wisdom on API security.
Register now.
|
|
Francis Scialabba
Today’s top IT reads.
Stat: 36%. That’s how much above analyst’s estimates Amazon’s operating income increased year over year, as the company pivots to spend more on AI. (the Wall Street Journal)
Quote: “I’d like to help fund small research labs with the aim of curing diseases once and for all, as well as providing medical access to billions in the world using blockchain technologies.”—Binance founder Changpeng Zhao on his plans for next steps after his conviction on a number of federal charges (the New York Times)
Read: How LinkedIn is using games to get users to spend more time on the feed. (TechCrunch)
Ahead of the curve: Next-level edge deployments are totally doable. Seriously. With Eaton’s infographic, you’ll learn how to power a resilient, AI-ready edge architecture. Ready to bring your environment into the future? Here’s your map.* *A message from our sponsor.
|
|
Share IT Brew with your coworkers, acquire free Brew swag, and then make new friends as a result of your fresh Brew swag.
We’re saying we’ll give you free stuff and more friends if you share a link. One link.
Your referral count: 2
Click to Share
Or copy & paste your referral link to others: itbrew.com/r/?kid=9ec4d467
|
|
ADVERTISE
//
CAREERS
//
SHOP
//
FAQ
Update your email preferences or unsubscribe
.
View our privacy policy
.
Copyright ©
2024
Morning Brew. All rights reserved.
22 W 19th St, 4th Floor, New York, NY 10011
|
|