Page 2,260«..1020..2,2592,2602,2612,262..2,2702,280..»

After turbulent cyber year, agencies enter 2022 with fresh security crisis on hand – Federal News Network

A year after the SolarWinds compromise, federal agencies are once again entering the new year in the middle of a cybersecurity emergency, with IT offices racing to identify and patch instances of widely used software code on their networks.

But after 12 months of blocking and tackling, experts say the federal enterprise is better positioned to handle cybersecurity incidents and primed for more progress in 2022.

Agencies had until Dec. 23 to identify and patch instances of Log4j on their Internet-facing systems, according to an emergency directive issued by the Cybersecurity and Infrastructure Security Agency last week. The vulnerability in the widely used Apache open source logging software emerged earlier this month.

The directive also tells agencies to report all affected software applications to CISA by Dec. 28.

CISA is very pleased with the urgency with which agencies are addressing Log4j vulnerabilities, a CISA official told Federal News Network on-background. The official said CISA has hosted multiple calls attended by thousands of staff across civilian agencies, including chief information officers and chief information security officers, as well as IT operations and security operations center personnel.

Federal IT and Cybersecurity leaderships commitment to urgently addressing these vulnerabilities as a cohesive enterprise has been clear since the onset, the official said. We have no confirmed compromises across federal civilian networks relating to the Log4j vulnerability.

Efforts to address Log4j will bridge 2022 to a year that saw the creation of the National Cyber Directors office, the establishment of CISAs Joint Cyber Defense Collaborative, and efforts to implement President Joe Bidens cybersecurity executive order, among other federal developments.

Mark Montgomery, senior advisor to the recently shuttered Cyberspace Solarium Commission, said 2020 was a watershed year in cybersecurity, when lawmakers included 26 of the commissions recommendations in the annual defense bill, including the creation of the NCD.

2021 was much, much more of blocking and tackling, Montgomery said. More changes to CISA authorities, the establishment of a Response and Recovery Fund, building better public-private partnership programs in the Department of Defense and Department of Homeland Security. Those are smaller issues, but important issues that that help in in getting the cybersecurity agenda moving forward.

Chris Cummiskey, a consultant and former Department of Homeland Security under secretary for management, said it was a rebuilding year for federal cybersecurity after the Trump administration did away with the former White House national cybersecurity coordinator position.

Theres much better coordination now between the White House key cyber functions, the National Security Agency, the FBI, and CISA, Cummiskey said. When you have that coming together on all cylinders, its a much more effective response.

Bidens May cybersecurity executive order, spurred on by the SolarWinds breach, also set tight deadlines for agencies to begin improving their cyber practices, including through the shift to zero trust architectures. Chris DeRusha, federal chief information security officer, recently said that agencies are now entering the execution phase of the EO.

Cummiskey said past cyber executive actions have lacked sufficient accountability and performance tracking measures. But he believes officials like National Cyber Director Chris Inglis, CISA Director Jen Easterly and DeRusha will hold agencies accountable to the latest EO.

The difference this time is that youve got a lot of seasoned veterans in leadership roles that are helping other agencies kind of understand that if were going to move to zero trust architecture, or if were going to strengthen the enterprise, cybersecurity functions at agencies, its got to be more than just a reporting requirement through FITARA, Cummiskey said, referring to the Federal Information Technology Acquisition Reform Act that requires annual reports from agencies on IT inventories and plans.

The executive order put CISA in charge of multiple action items to improve federal cybersecurity, including the designation of critical software and the establishment of a Cyber Safety Review board.

CISA also saw continued support from Congress this year, especially funding. The American Rescue Plan added $650 million in emergency funds on top of CISAs $2 billion annual budget. Lawmakers are proposing increasing CISAs budget to $2.4 billion in fiscal year 2022.

However, in spite of a scourge of ransomware attacks, including incidents that shut down Colonial Pipeline and a major meatpacking plant, Congress could not come to an agreement on including cyber incident reporting requirements in legislation by the end of the year.

Tatyana Bolton, former cyber policy lead at CISA, said the continued policy of voluntary reporting for critical incidents leaves a major hole in the U.S. approach to cybersecurity. Bolton was also on the staff of the Solarium Commission and directs cyber policy for the R Street Institute.

The fact that we couldnt have that very simple provision into law is very unfortunate, and I think were going to see over the course of the next year how not having that tool in the toolbox for the federal government is going to be a weakness of our cyber strategy, Bolton said.

But she and Montgomery expect lawmakers will make another strong to pass reporting requirements in 2022.

Bolton also predicts Inglis and the National Cyber Directors office will make progress next year on efforts to introduce more resilience into the U.S. cybersecurity approach, taking a wider view of incidents like ransomware attacks and Log4j.

His efforts on resilience is focusing on the broader picture, she said. Its the forest for the trees.

Meanwhile, CISAs emergency directive shows the agency will continue to monitor the Log4j situation into the new year. CISA is planning to provide a report by Feb. 15 to both DHS Secretary Alejandro Mayorkas and the White House on identifying cross-agency status and outstanding issues, according to the directive.

Here is the original post:
After turbulent cyber year, agencies enter 2022 with fresh security crisis on hand - Federal News Network

Read More..

Chinese Police Hunt Overseas Critics With Advanced Tech – The New York Times

For Chinese security forces, the effort is a daring expansion of a remit that previously focused on Chinese platforms and the best-known overseas dissidents. Now, violations as simple as a post of a critical article on Twitter or in the case of 23-year-old Ms. Chen, quoting, I stand with Hong Kong can bring swift repercussions.

Actions against people for speaking out on Twitter and Facebook have increased in China since 2019, according to an online database aggregating them. The database, compiled by an anonymous activist, records cases based on publicly available verdicts, police notices and news reports, although information is limited in China.

The net has definitely been cast wider overseas during the past year or so, said Yaxue Cao, editor of ChinaChange.org, a website that covers civil society and human rights. The goal is to encourage already widespread self-censorship among Chinese people on global social media, she said, likening the purging of critics to an overactive lawn mower.

They cut down the things that look spindly and tall the most outspoken, she said. Then they look around, the taller pieces of grass no longer cover the lower ones. They say, Oh these are problematic too, lets mow them down again.

Chinese security authorities are bringing new technical expertise and funding to the process, according to publicly available procurement documents, police manuals and the government contractor, who is working on overseas internet investigations.

In 2020, when the police in the western province of Gansu sought companies to help monitor international social media, they laid out a grading system. One criterion included a companys ability to analyze Twitter accounts, including tweets and lists of followers. The police in Shanghai offered $1,500 to a technology firm for each investigation into an overseas account, according to a May procurement document.

Read the rest here:
Chinese Police Hunt Overseas Critics With Advanced Tech - The New York Times

Read More..

Unwrapped new gadgets? 10 ways to protect your privacy and security – USA TODAY

Kim Komando| Special to USA TODAY

Ah, a shiny new tech toy. In the eyes of a hacker, thats a great way into your homes network.

Most people dont realize how important it is to properly secure your internet connection and router from snoops, hackers, and moochers. Tap or click for five smart steps to keep hackers out of your home network and sensitive files.

You need to keep bad actors out of your devices too. Your phone contains a ton of personal information, and you need to do more than just setting up facial recognition or fingerprint scanning to lock it. Tap or click for important ways to lock down your new (or old) smartphone.

When it comes to the rest of your tech, its never too late to adjust your settings and get back just a little privacy. Lets dive in.

When you unwrap a new gadget, you're trying to get it up and running as quickly as possible. You might not usually spend much time poking around the settings. The security and privacy settings should be your first stop.

Chances are, your internet-connected gadgets are keeping track of your every move and that data gets packed up and sold. Start with your location data.

Keep in mind, disabling location services altogether may impact your device's ability to work the way you want it.

Heres how to turn off location settings on iPhone:

Go to Settings > Privacy > Location Services.

Here you can switch off location sharing or adjust access to only certain apps.

Adjust location settings on Android:

Swipe down from the top of your screen and tap Location.

If you dont see it in your pulldown menu, click the edit button and add it to your quick settings.

Note: Steps may differ depending on your Android model.

Your location is just one way advertisers and others track where you are and what interests you. Tap or click for hidden maps and trackers in your smartphone you can switch off.

Depending on how long your new device sat on a shelf or in a warehouse, it might need an update or two.

Again, pop into the settings and look for any software or firmware updates. You'll need to complete multiple updates from time to time, so make sure to knock them all out.

After that, my recommendation is to check each of your devices monthly. It only takes a few minutes, but it could save you a huge hassle down the line. Wherever you can, enable automatic updates, so you have one less thing to remember.

TRUE OR FALSE: Its OK to restart your computer by holding down the power button. Tap or click for my ruling.

Do you register your new tech with the manufacturer? It takes a few minutes, but it's a way to recoup your device if a hacker somehow takes it over. The manufacturer has proof the device is yours no matter what changes a hacker makes to it.

It's also an essential step if something breaks down the road and still under warranty.

Wi-Fi fix: How to improve a poor internet connection

A slow Wi-Fi connection is incredibly frustrating. But here are some easy things that can help get your computer or devices back up to speed.

ProblemSolved, USA TODAY

What's the first thing you do after setting up a new device? Usually, you'll connect it to your home's wireless internet.

Unfortunately, every connected device is a potential way in for bad actors. By creating a separate guest network for all your smart home gadgets and IoT devices, youll protect your main network.

Heres how to get started:

Open your routers admin page and look for a section labeled Guest Network or Guest Networks.

Enable your Guest Network and make sure SSID Broadcast is turned on.

To get to your router admin page, youll need the devices IP address and admin password. Tap or click here for a list of default passwords for 548 router brands then be sure to change yours.

Once youre in your routers settings, dont click any options that say something like: Allow guests to see each other and access my local network.

RELATED: Its easy to lose track of whats connected to your Wi-Fi. Worried you forgot something? Tap or click here for steps to see all the devices connected to your network.

Once you get your tech set up, make sure to set a strong, unique password for the associated account. Never stick with the default, even if it appears random.

When I say "strong" and "unique," I'm not talking about your kid's birthday or your pet's name. Randomly generated strings of letters, numbers and characters are best, but they are impossible to remember. Use a password manager or even a notebook to write your passwords down.

I like this password book on Amazon thats under $10.

When you swipe your credit card and enter your ZIP code, thats an example of two-factor authentication. Basically, youre providing an extra bit of proof that you are who you say you are.

You'll generally receive a text message or email with a code from the website or service you're trying to access. Tap or click here to set up two-factor authentication on your social media accounts.

If you're security conscious, you can skip the text or email codes altogether. Google Authenticator is an app that generates random codes for your accounts and no one can intercept those like they could a text. Tap or click here for more info and options other than Google.

If you bought a new smartphone or tablet, take a moment to add your emergency contacts. Its not just a good idea it can potentially save your life.

When you add emergency contacts to your phone, the best way to make them stand out from your other contacts is to set them as Favorites. Youll have them on speed dial for whenever you need them most.

On an iPhone, select a contact, scroll down and tap Add to Favorites.

On Android, open the Contacts app, and tap the contact you want to add to your favorites. At the top, tap Favorite.

Got a new phone? 9 safety apps you'll want on hand in an emergency

How to stop Amazon Fire, Sony, Vizio smart TVs from spying on you

Smart TVs have settings for adjusting your preferences. You can take control and tell the TV manufacturers not to sell your data.

USA TODAY

Did you unwrap a new TV? Most smart TVs use ACR, or Automatic Content Recognition. ACR scans the programs you watch and sends the data back to analytics services and marketing firms. Then, your data is crunched and studied so they can advertise to you based on your habits.

This is annoying and intrusive, but ACR does have an upside: It makes smart TVs cheaper.

Even better, you can turn the feature off altogether. The steps will be different for every brand.

Tap or click here to find out how to disable ACR on your smart TV.

Smart speakers are always listening for a wake word. You can review and delete your recordings. You can also opt out of having your data saved and recorded.

If youre concerned about privacy on your new Echo, tap or click here for 10 must-do security steps. This is definitely something you should do.

Smart speakers arent the only gadgets listening to you. Tap or click to stop the other big offenders.

Much like smart TVs, streaming devices keep tabs on what you watch. Fortunately, you can turn this off no matter which brand you use.

Roku:

From the Roku main menu, open Settings.

Open Privacy. Then click Advertising.

Check Limit ad tracking.

Apple TV:

Open Settings from the main menu. Then, choose General.

Choose Privacy, then toggle the Limit Ad Tracking option to On.

Amazon Fire Sticks:

From the Fire TV main menu, choose Settings.

Click Preferences, followed by Privacy Settings.

In the menu that opens, turn Device Usage Data, Collect App Data Usage, and Interest-based Ads off.

Bonus Tip: Essential tech cleanups to do before 2022

Is your digital life in need of a little TLC? Listen to the podcast to learn a few cleaning secrets, along with simple methods of sorting the clutter, clearing out junk and freeing up space on your devices. Looks like you just found your new holiday project.

Check out my podcast Kim Komando Explains on Apple, Google Podcasts, or your favorite podcast player.

Listen to the podcast here or wherever you get your podcasts. Just search for my last name, Komando.

Learn about all the latest technology on theKim Komando Show, the nation's largest weekend radio talk show. Kim takes calls and dispenses advice on today's digital lifestyle, from smartphones and tablets to online privacy and data hacks. For her daily tips, free newsletters and more, visit her website atKomando.com.

The views and opinions expressed in this column are the authors and do not necessarily reflect those of USA TODAY.

Here is the original post:
Unwrapped new gadgets? 10 ways to protect your privacy and security - USA TODAY

Read More..

AV-Comparatives Reveals Results of Long-Term Tests of 19 Leading Endpoint Security Solutions – PRNewswire

The Business Security Test is the most comprehensive investigation of corporate endpoint security solutions on the market. To be named as an Approved Business Product, antivirus solutions must achieve a 90% score on the Malware Protection Test, with zero false alarms, and 90% in the Real-World Protection Test, with less than one hundred false alarms.

To earn AV-Comparative's certification, tested products must also be free of major performance issues, with an impact score below 40, and fix all reported bugs.

The 19 solutions which were recognised with an Approved Business Product Award are: Acronis, Avast, Bitdefender, Cisco, CrowdStrike, Cybereason, Elastic, ESET, FireEye, Fortinet, G Data, K7, Kaspersky, Malwarebytes, Microsoft, Panda, Sophos, VIPRE and VMware.

Peter Stelzhammer, Co-Founder of AV-Comparatives, said: "We congratulate the vendors whose products have qualified for an Approved Business Product Award. AV-Comparatives is fully independent and provides an unparalleled assessment of the antivirus products available on the market."

"In times of home offices and targeted attacks, protection against cyber crime is becoming increasingly important. Businesses looking for antivirus and endpoint security solutions should regard our test as a guide to the best products on the market. The threat landscape is constantly changing, so it is important to understand the performance of solutions that exist to keep organisations safe from external threats."

The latest Business Main-Test contains the results of the Business Real-World Protection Test conducted between August and November, as well as the Business Malware Protection Test in September, Business Performance Test from November. It also incorporates Product Reviews.

Here are details of the AV-Comparatives tests:

Real-World Protection Test: This mimics online malware attacks that a typical business user might encounter when surfing the internet.

Malware Protection Test: This assessment considers a scenario in which the malware pre-exists on the disk or enters the test system via a local area network or removable device, rather than directly from the internet.

Performance Test: An examination of the impact each product has on the system's performance, such as how much it slows down normal use of the PC while performing tasks.

A False Positives Test is also conducted to discover if the product incorrectly identifies legitimate software as harmful.

Each product that was involved in the test was also reviewed. Some are suitable for small businesses, whilst others are designed for large enterprises.

Like all AV-Comparatives' public test reports, the Enterprise and Business Endpoint Security Report is available to everyone for free: https://www.av-comparatives.org/tests/business-security-test-2021-august-november/#management-summary

About AV-Comparatives: AV-Comparatives is an independent organisation offering systematic testing to examine the efficacy of security software products and mobile security solutions. Using one of the largest sample collection systems worldwide, it has created a real-world environment for truly accurate testing.

AV-Comparatives offers freely accessible av-test results to individuals, news organisations and scientific institutions. Certification by AV-Comparatives provides a globally recognised official seal of approval for software performance.

Media Contact: Peter Stelzhammerphone: +43 720115542e-mail: [emailprotected]

SOURCE AV-Comparatives

Go here to see the original:
AV-Comparatives Reveals Results of Long-Term Tests of 19 Leading Endpoint Security Solutions - PRNewswire

Read More..

Remove all your personal info from the internet: 6 steps to disappear for good – CNET

Finally ready to get off the grid? It's not quite as simple as it should be.

If you're reading this, it's likely your personal information is available to the public. And by "public" I mean everyone everywhere. The start of a new year is a good time to get your internet privacy ducks in a row and effectively "delete" yourself from the internet. But how can deleting yourself from the internet stop companies from getting hold of your info? Short answer: It can't.

Unfortunately, you can never completely remove yourself from the internet, but there are ways to minimize your digital footprint, which would lower the chances of your personal data being out there. Be forewarned, however: Removing your information from the internet, as I've outlined below, could adversely affect your ability to communicate with potential employers. Still interested? Here are some ways to disappear your digital self.

Think about which networks you have social media profiles on. Aside from the big ones(Facebook, Instagram, Twitter, LinkedIn), do you still have old accounts on sites like Tumblr? MySpace? What about your Reddit account? Which shopping sites have you registered on? Common ones might include information stored on Amazon, Gap.com, Macys.com and others.

Receive expert tips on using phones, computers, smart home gear and more. Delivered Tuesdays and Thursdays.

Using a service like DeleteMe can make removing yourself from the internet less of a headache.

To get rid of these accounts, go to your account settings and look for an option to either deactivate, remove or close your account. Depending on the account, you may find it under Privacy or Security, or something similar.

If you're having trouble with a particular online account, try searching online for "How to delete," followed by the name of the account you wish to delete. You should be able to find some instructions on how to delete that particular account. (Here's how to permanently delete your Facebook account without losing your photos.)

If for some reason there are any undeletable accounts, change the info in the account to something other than your actual info. Something fake or completely random.

Read more:Best VPN service of 2021

Now playing: Watch this: Get off the grid

3:43

There are companies out there that collect your information. They're called data brokers, and they have names like Spokeo, Whitepages.com and PeopleFinder, as well as plenty of others. They collect data from everything you do online and then sell that data to interested parties, mostly in order to more specifically advertise to you and sell stuff.

Now you could search for yourself on these sites and then deal with each site individually to get your name removed. Problem is, the procedure for opting out from each site is different and sometimes involves sending faxes and filling out actual physical paperwork. Physical. Paperwork. What year is this, again?

Anyway, an easier way to do it is to use a service like DeleteMe atjoindeleteme.com.For just $129 per year, the service will jump through all those monotonous hoops for you. It'll even check back every few months to make sure your name hasn't been re-added to these sites.

Be warned: If you remove yourself from these data broker sites, you'll also mostly remove yourself from Google search results, therefore making it much harder for people to find you. DeleteMe also gives you a set of DIY guides on how to remove yourself from each individual data broker if you'd like to do the process yourself.

First, check with your phone company or cell provider to make sure you aren't listed online and have them remove your name if you are.

If you want to remove an old forum post or an old embarrassing blog you wrote back in the day, you'll have to contact the webmaster of those sites individually. You can either look at the About us or Contacts section of the site to find the right person to contact or go to http://www.whois.com and search for the domain name you wish to contact. There you should find information on who exactly to contact.

Unfortunately, private website operators are under no obligation to remove your posts. So, when contacting these sites be polite and clearly state why you want the post removed. Hopefully they'll actually follow through and remove it.

If they don't, tip No. 4 is a less effective, but viable option.

If someone's posted sensitive information of yours such as a Social Security number or a bank account number and the webmaster of the site where it was posted won't remove it, you can send a legal removal request to Google to have it removed.

You may have to exercise Google's legal powers to get your personal information removed from a stubborn site.

The removal process could take some time, and there's no guarantee it'll be successful, but it's also your best recourse if you find yourself in this vulnerable situation.

Google's URL removal tool is handy for erasing evidence of past mistakes from the internet.

Let's say there's a webpage with information about you on it you'd like to get rid of -- like your former employer's staff page, months after you've changed jobs. You reach out to get them to update the page. They do, but when you Google your name, the page still shows up in your search results -- even though your name isn't anywhere to be found when you click the link. This means the old version of the page is cached on Google's servers.

Here's where this tool comes in. Submit the URL to Google in hopes it'll update its servers, deleting the cached search result so you're no longer associated with the page. There's no guarantee Google will remove the cached info for reasons, but it's worth a try to exorcise as much of your online presence as possible from the internet.

Depending on the type of email account you have, the number of steps this will take will vary.

You'll have to sign into your account and find the option to delete or close the account. Some accounts will stay open for a certain amount of time if you want to reactivate them.

An email address is necessary to complete the previous steps, so make sure this one is your last.

Remember to be patient when going through this process, and don't expect to complete it in one day. You may also have to accept that there are some things you won't be able to permanently delete from the internet.

Read the original here:
Remove all your personal info from the internet: 6 steps to disappear for good - CNET

Read More..

What is hybrid cloud? – Red Hat

Every cloud is unique. Private clouds are one-of-a-kind and there are thousands of public cloud providers. There's no one-size-fits-all cloud architecture. The way you organize your cloud resources and build a hybrid cloud will be as unique as your fingerprint. But there are a few basic principles that correspond to 2 general ways of building a hybrid cloud environment: The traditional way and the modern way.

Hybrid clouds used to be the result of literally connecting a private cloud envrionment to a public cloud environment using massive, complex iterations of middleware. You could build that private cloud on your own, or you could use prepackaged cloud infrastructure like OpenStack. You would also need a public cloud, like one of the few listed below:

Finally, you would need to link the public cloud to the private cloud. Moving huge amounts of resources among these environments require powerful middleware, or a preconfigured VPN that many cloud service providers give customers as part of their subscription packages:

Todays hybrid clouds are architected differently. Instead of connecting the environments themselves, modern IT teams build hybrid clouds by focusing on the portability of the apps that run in the environments.

Think about it like this: Instead of building a local 2-lane road (fixed middleware instances) to connect 2 interstate highways (a public cloud and a private cloud), you could instead focus on creating an all-purpose vehicle that can drive, fly, and float. Either strategy still gets you from one place to another, but there's a lot less permitting, construction, permanancy, and ecological impact if you focus on a universally capable vehicle.

Modern IT teams build hybrid clouds by focusing on the carthe app. They develop and deploy apps as collections of small, independent, and loosely coupled services. By running the same operating system in every IT environment and managing everything through a unified platform, the app's universality is extended to the environments below it. In more practical terms, a hybrid cloud can be the result of:

Using the same operating system abstracts all the hardware requirements, while the orchestration platform abstracts all the app requirements. This creates an interconnected, consistent computing environment where apps can be moved from one environment to another without maintaining a complex map of APIs that breaks every time apps are updated or you change cloud providers.

This interconnectivity allows development and operations teams to work together in a DevOps model: A process by which teams work collaboratively across integrated environments using a microservice architecture supported by containers.

Originally posted here:
What is hybrid cloud? - Red Hat

Read More..

Cloud Computing for the Little Guy Is a Big Deal – Motley Fool

DigitalOcean Holdings, Inc (NYSE:DOCN) operates a cloud computing platform that services customers worldwide.

The company went public in March of 2021, and the stock has risen in price well over 50% since the initial public offering (IPO). Despite the overall success, the stock is down more than 40% from its recent 52-week high. Growth stocks have fallen out of favor based on macroeconomic fears of interest rate hikes, faster tapering, and general concern over valuations. DigitalOcean has been unfairly caught in this net, which offers investors a compelling entry point.

DOCN data by YCharts

The cloud-services market is dominated by major players from Big Tech. Amazon (NASDAQ:AMZN), Microsoft (NASDAQ:MSFT), and Google (NASDAQ:GOOG) hold sway over 61% of the market. Going head-to-head with these highly successful giants would be foolish, which is why DigitalOcean's business model focuses on the needs of small and medium-sized businesses (SMBs). While large corporations need the complex, expensive solutions that Big Tech can provide, SMBs are more focused on cost, ease of use, and customer service. DigitalOcean prides itself on its straightforward billing structure, simplicity, and world-class customer service.

SMBs are also a very fertile market that has been overlooked by larger companies in the industry. DigitalOcean estimates that there are 100 million companies with less than 500 employees worldwide, with 14 million new SMBs formed each year. It estimates that the total addressable market will grow to $116 billion by 2024. This is a gigantic opportunity to become the go-to solution for these smaller companies.

Image source: Getty Images.

DigitalOcean is growing revenue steadily, and the growth is accelerating. As shown below, top-line revenue is expected to grow 34% to $427 million in fiscal 2021. The growth rate is well above the prior year's 25% growth rate, which is a terrific sign for things to come. In addition, while the company is not yet profitable in terms of generally accepted accounting principles (GAAP), it is both cash-from-operations (CFO) and earnings before interest, taxes, depreciation, and amortization (EBITDA) positive. For fiscal 2021, the company expects to make close to $130 million in adjusted EBITDA.

Image source: DigitalOcean.

The revenue growth comes from two sources: new customers and existing customers spending more each period with the company. DigitalOcean reports a net retention rate of 116% for the third quarter of 2021. A rate over 100% means that existing customers are spending more each period in excess of any customers who leave the platform. In fact, monthly revenue per unit has grown from $48.6 in Q3 2020 to nearly $62 in Q3 2021, an annual gain of 28%.

In addition to growth, DigitalOcean has attractive margins which indicates scaling to profitability is likely. First, the adjusted gross margin reached 80% in Q3 2021. The adjusted EBITDA margin for full fiscal 2021 is expected to be over 30%. This allows the company to be cash flow positive in its growth phase. Positive cash flow is great for investors. It suggests that the company will not need to raise cash through either debt or equity financing to pay for general operations. The company also has a significant cash balance from which to make acquisitions. DigitalOcean posted over $589 million in cash and equivalents on hand with no long-term debt at last report.

DOCN Cash and Equivalents (Quarterly) data by YCharts

The high-quality margins and fortress balance sheet indicate that DigitalOcean has a distinct path to healthy profits in the coming years.

DigitalOcean has found a terrific way to coexist in a sector with some of the largest companies on the planet; it simply doesn't compete with them. Instead, it focuses on those customers that don't interest the big tech companies much: independent developers and SMBs. And millions of these will be transitioning to cloud-based operations in the coming periods. Those who may have thought they missed the boat on DigitalOcean have seen the stock come back to port. Revenue is growing at an impressive and accelerating clip. The company is investing in growth and has a stated, and attainable, goal of reaching $1 billion in revenue by fiscal 2024.

DigitalOcean is also not a "growth at all costs" type of stock. The company has quality margins and is cash flow positive, which indicates an inherent route to GAAP profitability in the coming years. All of this, combined with an extremely solid balance sheet, make DigitalOcean stock a strong candidate to consider for long-term growth investors.

This article represents the opinion of the writer, who may disagree with the official recommendation position of a Motley Fool premium advisory service. Were motley! Questioning an investing thesis -- even one of our own -- helps us all think critically about investing and make decisions that help us become smarter, happier, and richer.

The rest is here:
Cloud Computing for the Little Guy Is a Big Deal - Motley Fool

Read More..

How Distributed Cloud Computing Drives IT Automation | eWEEK – eWeek

Recently, I was the keynote speaker at the AppViewX digital event, Simplify Application Delivery 2021. While there were many sub-themes to the event, the one I focused on is automation, as I believe this is the single most important capability for application delivery moving forward.

The application delivery landscape is evolving rapidly and shifting from a vertically integrated hardware stack to a set of cloud native capabilities. While this significantly increases agility, it does raise the bar on complexity, driving the need for automation.

I used the first part of my keynote to describe how the rise of distributed computing is changing application delivery. Its important to understand why distributed clouds are fundamentally different than every other compute model, including traditional cloud computing.

Looking back at on-premises, hosted and cloud computing, while the financial model for these shifted from CAPEX to OPEX, the operating model did not, as they were all based on a centralized compute function. In this case, IT pros would run workloads in a data center or cloud and front-end it with an application delivery controller (ADC). If the location was the businesss own data center, the product of choice was a physical ADC. With cloud, virtual ADCs were used.

With distributed computing, applications are created by accessing workloads or data from public clouds, private clouds, and edge location, giving rise to the concept of composability.

Applications are no longer vertically integrated stacks but rather lightweight, cloud native services that are composed, which increases business speed and agility. With distributed clouds, the primary unit of compute evolves from a virtual machine to a container, which is ephemeral in nature. Containers can be spun up, run for a few minutes, and then deprecated just as quickly.

The problem with traditional application delivery is that even a virtual ADC can take hours to load far too long for cloud native systems. This is driving the evolution of ADCs into a number of new form factors, such as a set of containerized services or even API-level ADCs where the functions can be called by an application when needed. Now ADC functions can be spun up when a container might require it.

But how is this to be managed? With cloud native systems and distributed computing, events happen far too fast for people to manage application delivery. This is the role that automation plays, eventually leading to an AIOps model where artificial intelligence is used make decisions on what changes are needed and when.

For IT pros, its important to evolve their thinking around automation from being task oriented to intent-based. While its true, IT automation has existed for some time, the effectiveness of automation frameworks such as a Puppet, Chef and even Python are limited. In this case, these tools are used to automate specific tasks, and this works fine in static systems. Task automation wont work in highly dynamic environments because the scripts would need to be upgraded constantly.

Automation needs to evolve to an AI-based, closed loop model, where the intent of rules is continually being analyzed and applied. This enables true zero touch automation as the machines will run the network.

A couple years ago, IT pros often scoffed at the idea of fully autonomous IT operations, but that attitude has changed. I recently ran an AIOps study and found that 97% of respondents would trust AI to run their IT environments and 99% believe AI is important for managing cloud and application performance.

During the panel I did at the event, one of the topics we discussed was using automation to implement zero trust and this is a perfect use case for AIOPs. With zero trust, policies are created to allow specific devices or workloads to connect with others only when explicitly allowed.

Task-based automation would be sufficient in a static environment as the policies could be set up once and then applied. In dynamic environments, such as a distributed cloud, where workloads are constantly being created and then shut down, people could not update the zero trust policies fast enough to comply, but machines can.

IT is at an inflection point where we are evolving from centralized clouds to distributed clouds and this will enable businesses to digitally transform faster than ever. As this happens, IT pros need to embrace closed loop automation for application delivery. This will ensure that the right ADC services are deployed as per business policy, without having to introduce the long lead times created by manual operations.

Follow this link:
How Distributed Cloud Computing Drives IT Automation | eWEEK - eWeek

Read More..

2022 Cloud Computing Predictions: What Vendors, Partners Have to Say – Channel Futures

Whats on the horizon for cloud in the coming year? Check out this slideshow for thoughts from a range of experts.

Organizations rush to adopt more cloud computing amid pandemic conditions is, by now, old news. Yet the effects of that shift continue to ripple, and will for a long time. The coming year will mark just the start of some new evolutions in the cloud market.

2020, of course, was defined by COVID-19-fueled moves to the cloud. Organizations were forced to implement cloud computing so they could support remote work despite global lockdowns. This frantic shift led to many messy deployments and shadow IT that posed threats to security and privacy. (And hackers took great advantage as a result.)

2021 marked the year of cleanup understanding which cloud applications and services resided within organizations, making sure they fit strategies and budgets, and tightening security measures. Throughout all that activity, channel partners remained pivotal even as they faced the same technology and staffing challenges as their customers.

Heading into 2022, SMBs, enterprises, government agencies, nonprofits and other entities will keep evaluating and implementing cloud computing. Indeed, Gartner predicts end-user spending on public cloud services alone will grow 21.7% to $482 billion next year. Whats different for 2022 is that executives and their channel partners will invest with more intent and expertise than perhaps they have so far. Thats because business leaders better understand the value of cloud computing, as well as its challenges. As such, they likely will make some changes to shore up spending, spend in the right areas and support company initiatives.

In the slideshow above, we examine a number of the trends expected to arise in 2022. And we share, alongside our own analysis, industry experts predictions for the coming year in cloud.

More:
2022 Cloud Computing Predictions: What Vendors, Partners Have to Say - Channel Futures

Read More..

Why organisations are flocking to serverless cloud computing – ETCIO.com

Serverless cloud addresses the shift in application architecture from a server-based architecture to an event-driven architecture by enabling a simpler, more cost-effective way to build and operate cloud-native applications.

In other words, applications are run virtually on any node within a distributed network, with limited amounts of resources allocated for these apps to perform their background operations. This way application code is executed on-demand as a response to triggers that app developers configure ahead of time.

Serverless functions are usually used to implement discrete units of application functionality, says Chanakya Levaka, VP-Global Sales & Marketing, Cloud4C Services.

One of the reasons why people are flocking towards using this type of application architecture is because they do not need to go through the steps of setting up and maintaining infrastructure when deploying their applications - with an increase in serverless-friendly use cases, this technology promises almost limitless potential, he adds.

Given the spectrum of benefits, serverless is leveraged across a wide range of applications, including customer relationship management (CRM); analytics and business intelligence; finance; Database, HR and streaming media applications; engineering and enterprise resource planning.

The key advantages of serverless cloud include:

Faster time to marketAccording to Girish Dhanakshirur, IBM Distinguished Engineer & CTO, IBM India Software Labs, serverless removes the burden of infrastructure management tasks from enterprise engineers allowing them to spend their time on developing richly featured applications while securing company and customer data.

Cost-effectiveCompared to all other service models, this generally is the most cost-effective approach as clients dont need to incur any idle expenses for the infra. The same is being paid only when specific functions in an application are invoked and resources are allocated.

With serverless, customers pay for the resources required to run their applications, and only when those applications are running and not during idle time. This provides companies with the scope to innovate freely, roll out new features and respond to the market faster leading to better customer experiences while being cost effective, avers Girish.

Offload Infrastructure and Operations management tasks

Application development is riddled with backend cloud infrastructure and operations tasks like provisioning, scheduling, scaling, patching and more. Serverless offloads these tasks to the cloud provider and tools which helps enterprise engineers to focus on higher value work, says Girish.

Chanakya adds serverless helps in freeing up developers time as all underlying server and infrastructure is managed by the cloud provider or Managed Services Provider and assigned to the client automatically only when a deployed app/software function is called to action.

As a result, developers can spend more time focusing on developing the code architecture and the frontend end-user experiences rather than worrying about tweaking, modifying the backend server and infra.

See the article here:
Why organisations are flocking to serverless cloud computing - ETCIO.com

Read More..