The ITAM Roundup: 1/28/24

roundup Jan 29, 2024
📰
News

Nvidia CEO Jensen Huang meets with TSMC in Taiwan, discusses AI chip shortage concerns over dinner

Nvidia CEO Jensen Huang met with executives from TSMC in Taiwan to discuss concerns about the shortage of AI hardware chips. He mentioned that Nvidia is "very severely supply-constrained" in the AI hardware sector, emphasizing the efforts of TSMC and supply chain partners to meet the growing demand for AI-related products, particularly GPUs equipped with Tensor cores. Huang's visit to Taiwan and his proactive approach to addressing supply constraints underscore Nvidia's commitment to the market, following a similar visit to mainland China, where the company has been preparing China-specific GPU chips since November 2023.

Nvidia CEO Jensen Huang meets with TSMC in Taiwan, discusses AI chip shortage concerns over dinner
The CEO says Nvidia is “Very severely supply-constrained” in relation to AI hardware, but that all its partners are working hard to meet demand

Google, NVIDIA, Microsoft, and Others Collaborate With U.S. Government for AI Research

Leading tech firms are teaming up with the U.S. government and the National Science Foundation for the National Artificial Intelligence Research Resource (NAIRR) pilot program. This initiative, stemming from President Biden's executive order, aims to provide U.S. educators and researchers with advanced AI resources and support. NVIDIA is contributing $30 million, mainly through access to its DGX platform, while Microsoft is providing $20 million in Azure compute credits, and OpenAI is donating $1 million for AI safety and societal impact research. The program will have a two-year proof-of-concept phase before becoming a comprehensive resource for various AI research aspects.

U.S. Government AI Project Gets Big Tech Support - Spiceworks
Leading artificial intelligence developer companies are collaborating with the U.S. government for AI innovation. Find out more.

Salesforce Laying Off 700 Workers in Latest Tech-Industry Downsizing

The trend continues, this time with Salesforce laying off approximately 700 employees (~1% of its workforce), following a 10% reduction in staff the previous year. This move is seen as part of an ongoing effort to cut costs and focus on growth. Salesforce has 1,000 open positions remaining within the company, suggesting that these layoffs may be more about workforce adjustment than a significant change in strategy, driven by pressure from activist investors to improve profit margins.

https://www.wsj.com/economy/jobs/salesforce-laying-off-700-workers-in-latest-tech-industry-downsizing-6a082fa3

📖
Tips

The State of IT Spend in 2024: Computing Infra and Tech Staffing

This 2024 report analyzed how organizations allocate their budgets across eight major IT spending categories, including hardware, software, cloud-based services, managed services, facilities and power, telecommunications, IT labor, and internal services. The study revealed that most organizations prefer a balanced approach, with less than 5% opting for either a fully in-house or outsourced IT strategy. While cloud-based IT strategies are on the rise, the data highlights the continued significance of in-house capabilities. This analysis aims to offer insights into how organizations make strategic decisions about their IT expenditure.

Computing Infra and Tech Staffing Spend Allocation in 2024 - Spiceworks
Derek Brink of Aberdeen Strategy & Research dives into 2024’s IT Spend trends, focusing on Computing Infrastructure and Technical Staffing.

CIO Talk: Copilots — Dive Right In … Or Wait?

Copilots offer the promise of boosting productivity through AI-powered assistance but come with costs and risks. The author advises prudent executives to carefully analyze the costs, train employees in AI usage, prepare organizational data for protection, and involve risk management teams in Copilot deployment to maximize benefits while minimizing risks.

CIO Talk: Copilots -- Dive Right In … Or Wait?
One in an occasional series on enterprise computing by Directions on Microsoft analyst Barry Briggs, former CTO of Microsoft’s IT unit.

What are the Best Practices for SaaS Security?

Key challenges in SaaS security include limited visibility into SaaS applications, the need for privileged access management, and the risk of insider threats. Implementing some best practices, such as gaining visibility into the SaaS landscape, validating SaaS providers' security certifications and policies, streamlining user lifecycle management, and ensuring data security and compliance, can help organizations protect their data and reputation.

What are the Best Practices for SaaS Security?
SaaS security is a crucial component of SaaS management, which encompasses tasks such as discovering SaaS apps, tracking their usage, eliminating shadow IT, duplicating apps, removing unused licenses, and more.

Use Azure Automation and PowerShell to Create a Daily Microsoft Entra Risk Report

You can use Azure Automation and PowerShell to create a daily Microsoft Entra Risk Report. Microsoft Entra ID Protection features can automatically block sign-ins or force password resets based on risk status, but not all organizations have premium subscriptions. To bridge this gap, you can automate the reporting of risk detections using Azure Automation. By scheduling this script, you can receive daily reports of risk events, risky users, and risky service principals, helping you stay proactive in managing security risks.

Use Azure Automation and PowerShell to Create a Daily Microsoft Entra Risk Report
In this article, Sean McAvinue explains how to use PowerShell and Azure Automation runbook to create a Daily Microsoft Entra Risk Report.

Got Salesforce?

The below 3 articles from Redress Complianceall help elucidate several different types of salesforce licenses, and how to manage them:

Marketing Cloud

A Salesforce Marketing Cloud license grants access to Salesforce's digital marketing platform, providing tools for email, social media, mobile advertising, and personalized marketing campaigns. It also integrates AI for customer insights and engagement strategies.

Salesforce Marketing Cloud License Explained
Unlock the Power of Salesforce Marketing Cloud with a License: Advanced Tools, Personalized Campaigns, and AI Insights for Enhanced Customer Engagement

User Licenses

Salesforce User Licenses are permissions granting access to Salesforce's CRM platform, defining user roles and capabilities. These licenses come in various types, including standard Salesforce License, Salesforce Platform License, and Identity License, allowing organizations to customize access according to their specific needs.

Salesforce User Licenses Demystified: Your Essential Guide
Salesforce User Licenses: Understand Types and Impact on CRM. Learn how different licenses define user roles, customize access levels, and optimize business

Feature Licenses:

Salesforce Feature licenses are supplementary permissions that provide access to specific enhanced functionalities within Salesforce, such as Marketing User or Flow User. These licenses are essential for tailoring user capabilities and optimizing Salesforce to meet specific business requirements and processes.

Salesforce Feature Licenses: How Do They Work?
Discover the Power of Salesforce Feature Licenses: Access specialized functionalities, customize user capabilities, and optimize business operations.

Understanding Cloud Security Posture Management (CSPM)

Cloud Security Posture Management (CSPM) is a set of IT security tools and practices designed to secure cloud infrastructure by identifying misconfigurations and ensuring compliance with security standards. It continuously monitors cloud assets, conducts configuration assessments, and provides automated remediation of security issues. CSPM enhances proactive prevention, strengthens compliance with regulatory frameworks, enables real-time monitoring and rapid incident response, and integrates seamlessly into broader cloud security strategies, complementing other security measures like identity and access management and threat intelligence.

Understanding Cloud Security Posture Management (CSPM)
What is Cloud Security Posture Management or CSPM? Learn how it strengthens cloud security, prevents misconfigurations, and ensures compliance.
🐛
Bugs & Exploits

Mass exploitation of Ivanti VPNs is infecting networks around the globe

The Ivanti VPN vulnerability from several weeks ago is becoming a quite popular attack target. Despite a cybersecurity directive for civilian governmental agencies to address the issue, Ivanti has not yet released patches for the vulnerabilities, urging affected users to follow mitigation and recovery guidance provided by the company.

undefined
Mass exploitation of Ivanti VPNs is infecting networks around the globe
Orgs that haven’t acted yet should, even if it means suspending VPN services.

Tags