In 1999, beneath the digital gleam of Keanu Reeves in “The Matrix,” IT groups both sat confidently with the modifications they made to resolve the Y2K bug or waited with bated breath to see if the fixes held.
The arrival of the yr 2000 didn’t convey concerning the feared digital apocalypse because of fixes to make software program and {hardware} to know what appeared like a easy, but essential change thus far codecs.
Now, multiple era later, IT infrastructure faces a menagerie of different potential dangers that might result in systemic disruptions — some attributed to errors, others that stem from dangerous actors.
This episode of DOS Received’t Hunt noticed Greg Rivera, vice chairman of product at CAST; Paul Davis, discipline CISO at JFrog; and Theresa Lanowitz, chief evangelist at LevelBlue, focus on how pc infrastructure advanced within the 25 years since worries about Y2K launched IT groups into motion.
Are there guidelines and norms that had been a part of legacy tech from the Y2K period that now not apply within the time of cloud, edge, and all else? Would the mass IT mobilization that occurred to resolve Y2K be simpler or tougher to drag off at the moment to deal with infrastructure points? Did dangerous actors study any tips from Y2K for potential systemwide cyberattacks?