Industry News: March 1-5 – Navisite’s Board Expands, Female Role Models in Technology, How COVID Has Permanently Changed IT
Every week we highlight cloud computing and technology news of interest. This week we’re covering an introduction to Navisite’s newest board members, a lack of female role models in technology, how the pandemic has changed IT forever, unauthorized access to cloud resources and how cybercriminals are taking advantage of cloud applications.
Let’s get started…
Navisite’s board of directors is expanding with the addition of three veteran technology executives: Dorothy Copeland, Earl Newsome, and Gerhard Bette. Together, the new members will “provide key guidance as we develop new service offerings, reach new markets and help global brands accelerate their IT transformation,” said CEO Mark Clayman. Read more about each new member in AiThority here.
When it comes to inspiring more women to pursue a career in technology, a lack of female role models remains an issue. A new study found that just 19% of women working in technology today were motivated by a female role model. Just how much of a difference could an increased presence of female role models make in diversifying the workforce? Learn more in VMblog here.
The pandemic has accelerated digital transformation for many organizations over the past year. And in many ways, IT has been changed forever. What will the IT landscape look like going forward post-COVID, and which priorities have risen to the top of the list? Find out in CIO here.
Just how big of a problem is unauthorized access to cloud resources? According to one new report, 32% of enterprises have experienced it, with 19% reporting they didn’t know if unauthorized access had occurred. Explore what this means for cloud governance in BetaNews here.
As cloud adoption continues to increase, cybercriminals are looking to take advantage. New research reveals that the majority (61%) of malware is now delivered through cloud applications. What do enterprises need to do to protect their cloud environments? Dive into the details with Help Net Security here.