The ITAM Roundup: 7/29/24

roundup Jul 29, 2024

šŸ“° News

Oracle's Java pricing brews bitter taste, subscribers spill over to OpenJDK

Following Oracle's introduction of an employee-based subscription model, only 14% of Oracle Java subscribers plan to stay with Oracle's runtime environment, with 86% moving to alternatives like OpenJDK. This shift is primarily due to the significant price increase associated with the new model, with costs projected to be two to five times higher than the previous usage-based model. Additionally, 47% of respondents prefer open source solutions, and 38% are deterred by the uncertainty surrounding Oracle's pricing, licensing, and support changes.

Stampede for alternatives among Oracle Java users
Following licensing changes, 86% of users head for the door. Coincidence?

Microsoft: Our licensing terms do not meaningfully raise cloud rivals' costs

In response to the UK's Competition and Markets Authority (CMA) investigation, Microsoft claims that its licensing terms do not significantly increase costs for cloud rivals. The company argues that Amazon remains the leading hyperscaler in the UK, with Google growing steadily, and asserts that using Microsoft products on Azure is perceived as cheaper than on competitors' platforms. Critics, including Google and AWS, contend that Microsoft's licensing practices restrict customer choice and innovation, potentially driving customers towards Azure by making it more expensive to use Microsoft software on other cloud services.

Microsoft: Our licensing terms donā€™t raise rivalsā€™ costs
Redmond comes out swinging as it files response to Competition and Markets Authority

Wiz walks away from Googleā€™s $23B acquisition offer: Read the CEOā€™s note to employees

Cybersecurity startup Wiz declined a $23 billion acquisition offer from Alphabet, Google's parent company, despite it being a significant premium over its $12 billion valuation. CEO Assaf Rappaport informed Wiz's 1,200 employees that the decision to remain independent was made with the support of investors, emphasizing confidence in their exceptional team. Founded in 2020 by four former Israeli military officers, Wiz's notable backers include Index Ventures, Sequoia Capital, and Thrive Capital.

Wiz walks away from Googleā€™s $23B acquisition offer: Read the CEOā€™s note to employees | TechCrunch
Cybersecurity startup Wiz has turned down a $23 billion acquisition offer from Alphabet, Googleā€™s parent company, according to a source familiar with

Microsoft Calls for Windows Kernel Access Restrictions Following Major CrowdStrike Outage

Microsoft is considering restricting third-party cybersecurity vendors from accessing the Windows kernel following a major CrowdStrike outage caused by a faulty update, which led to widespread system crashes. In response, Microsoft deployed over 5,000 IT support engineers to assist affected customers and emphasized the need for close cooperation with partners to enhance Windows security. Additionally, Microsoft is exploring modern security innovations, such as Azure Attestation and Virtualization-Based Security (VBS), and incorporating Rust into the Windows kernel to improve system resilience without relying on kernel access.

https://petri.com/microsoft-windows-changes-crowdstrike/

Nvidia works with Accenture to pioneer custom Llama large language models

Accenture, in collaboration with Nvidia, has introduced the Accenture AI Refinery framework, enabling enterprises to develop custom large language models using Nvidia's AI Foundry service and Llama 3.1 models. This framework allows businesses to refine and personalize AI models with their own data to create domain-specific solutions, enhancing productivity by automating repetitive tasks. The initiative underscores the strategic importance of generative AI in driving innovation, with companies like Amdocs, Capital One, and ServiceNow already integrating AI Foundry into their workflows for competitive advantages.

Nvidia works with Accenture to pioneer custom Llama large language models - SiliconANGLE
Nvidia works with Accenture to pioneer custom Llama large language models - SiliconANGLE

šŸ“– Tips

The Critical Role of the CMDB in Security and Vulnerability Management

The Configuration Management Database (CMDB) is essential for effective security and vulnerability management, offering a centralized view of an organization's IT infrastructure to help identify and address risks. It tracks IT assets and their relationships, enabling better decision-making, prioritization of critical vulnerabilities, and efficient remediation. Integrating the CMDB with security tools enhances cybersecurity efforts by providing a unified view, facilitating incident response, and ensuring compliance with governance and regulatory requirements.

CMDB Security & Vulnerability Management | Ivanti
Learn how configuration management database (CMDB) security and vulnerability play a crucial role in protecting organizations from an ever-evolving threat landscape.

Microservices vs. Monoliths: Which Are More Secure?

Microservices offer security benefits by isolating application components, but they also introduce complexities and vulnerabilities that can outweigh these advantages. While a breach in one microservice may not necessarily compromise the entire application, improper access controls, shared vulnerabilities, and increased complexity can lead to significant security risks. Thus, the security advantages of microservices are often counterbalanced by the heightened security challenges they present compared to monolithic architectures.

Are Microservices More Secure Than Monoliths?
Microservices offer security advantages by isolating application components, but also introduce complexities and vulnerabilities that may outweigh the benefits.

Uniquely Licensed Salesforce Products and the Pitfalls to Avoid

Salesforce offers many additional products with unique licensing models, such as Success Cloud and Commerce Cloud, which require careful consideration during adoption or renewal to avoid pitfalls. These products may follow a percentage of net fee structure or a metric-based fee structure, each with specific recommendations to minimize costs and secure favorable terms. Organizations should conduct thorough due diligence, negotiate renewal protections and overage rates, and reassess all product pricing to achieve a cost-effective Salesforce deal.

Unique Salesforce Licensing Models and Pitfalls to Avoid
This blog outlines products with unique Salesforce licensing models and key recommendations to help reduce overall costs for these products.

šŸ›Bugs & Exploits

Microsoft: Ransomware gangs exploit VMware ESXi auth bypass in attacks

Microsoft has warned that ransomware gangs are exploiting a VMware ESXi authentication bypass vulnerability, CVE-2024-37085, to gain full administrative privileges on ESXi hypervisors. This flaw allows attackers to create an 'ESX Admins' group with administrative rights, enabling them to steal data, move laterally within networks, and encrypt the ESXi hypervisor's file system. The vulnerability has been used by ransomware operators, including Storm-0506 and Black Basta, in attacks that compromise organizations by targeting ESXi virtual machines critical to business operations.

Microsoft: Ransomware gangs exploit VMware ESXi auth bypass in attacks
Microsoft warned today that ransomware gangs are actively exploiting a VMware ESXi authentication bypass vulnerability in attacks.

Tags