IT Weekly


Nov 14, 2018

Every week we bring you more than 40+ relevant online sources that contain articles of interest to IT and DC Professionals at all levels

Browse by Technology
Browse by Year



Category Recent Security Articles Source Posted Date Age
Security How CIOs Can Manage Blockchain Security: 4 Tips (Tips For Managing Blockchain) TechRepublic 11/13/2018 1
Security 10 Top Cybersecurity Predictions for 2019 (Top 10 Predictions) Information Management 11/09/2018 5
Security What is a “Dark Web Scan” and Should You Use One? (Dark Web Scan) How To Geek 11/09/2018 5
Security 5 Things the Most Secure Software Companies Do (and How You Can Be Like Them) (Secure Companies Approaches Dark Reading 11/09/2018 5
Security Zero Trust Security For Dummies (Security Zero Trust, White Paper) Centrify 11/09/2018 5
Security Five Key Considerations When Developing A Security Operations Center (SOC Considerations) HelpNet Security 11/08/2018 6
Security Why the CISSP Remains Relevant to Cybersecurity After 28 Years (Is CISSP Still Relevant) Dark Reading 11/08/2018 6
Security Why Password Management and Security Strategies Fall Short (Rethink Passwords & Strategies) Dark Reading 11/08/2018 6
Security Humans vs Machines: AI and Machine Learning in Cyber Security (Artificial Intelligence Machine Learning) Networks Asia 11/07/2018 7
Security Keeping Your Business Safe: 5 Simple Ways to Provide Cybersecurity Solutions (Keeping Safe) Business 2 Community 11/07/2018 7
Security How Automation Can Fill the Enterprise Cybersecurity Skills Gap (Automation Compliment Skills) TechRepublic 11/06/2018 8
Security Worst Malware and Threat Actors of 2018 (Worst Threats of 2018) Dark Reading 11/05/2018 9
Security 11 Critical Visualizations for SD-WAN Success (Success With SD-WAN) NetworkComputing 11/04/2018 10
Security Tackling Cybersecurity from the Inside Out (Looking From The Inside) Dark Reading 11/04/2018 10
Security Gaining Ground On The Cyber Attacker (White Paper, State of Resilience) Accenture 11/04/2018 10
Security Fighting Email Scammers By Taking A Different View. Literally (Fighting Scammers) Homeland Security News 11/04/2018 10
Security Pinpointing Risky Employee Behaviors Enables IT Leaders to Reduce Risk (Employee Risky Behaviors) SC Magazine 11/02/2018 12
Security Where Is the Consumer Outrage about Data Breaches? (No Outrage From Consumers) Dark Reading 11/02/2018 12
Security The Current State of Cybersecurity Shows Now Is the Time for Zero Trust (Don't Trust Anyone) Business 2 Community 11/02/2018 12
Security Catching all Threats - Known, Unknown, and Unknown Unknown - Before They Can Harm You (The Unknowns) SC Magazine 10/31/2018 14
Security SMEs Ignore Cyber Security at Their Peril (Ransomware, Ignore At Your Peril) IT Web 10/31/2018 14
Security How the FBI Weighs Cybersecurity Risks Against Other Criminal Threats (FBI Risk Weighting) TechRepublic 10/30/2018 15
Security The Need for a Secure Content Sharing Ecosystem with IAM (Secure Sharing) Networks Asia 10/30/2018 15
Security Stay Ahead of Security Threats: Focusing on Your High-Risk Assets (One Step Ahead) Business 2 Community 10/30/2018 15
Security Dark Web: A Cheat Sheet for Business Professionals (Cheat Sheet for the Dark Web) TechRepublic 10/29/2018 16
Security How To Protect Your Organization from Insider Threats, The #1 Risk for Data Loss (Insiders Still #1) HelpNet Security 10/29/2018 16
Security 8 Threats that Could Sink Your Company (Threats That Can Sink You) Dark Reading 10/29/2018 16
Security The Changing Face of Cyber Attacks (White Paper, Cyber's Changing Face) Neustar 10/29/2018 16
Security Internet Security Threat Report (White Paper, Report on Threats) Symantec 10/29/2018 16
Security Recent Security Breaches Come at Great Cost--Including Jobs--Including Jobs (Breach Guillotines) Data Center Knowledge 10/28/2018 17
Security 3 Keys to Reducing the Threat of Ransomware (Reducing Ransomware Threats) Dark Reading 10/28/2018 17
Security Cybersecurity Best Practices - In and Out of the Office (Office Best Practices) Business 2 Community 10/28/2018 17
Security 82% of Security Pros Fear Hackers Using AI to Attack Their Company (Artificial Intelligence, AI Being Used by Hackers) TechRepublic 10/26/2018 19
Security Six Tips to Stop Phishing Attacks (Phishing Stop Tips) SC Magazine 10/26/2018 19
Security Bridging the Cybersecurity Skills Gap Through Artificial Intelligence (Skills Gap) SC Magazine 10/26/2018 19
Security Insiders are Still the Greatest Security Threat Facing Most Organizations Information Management 10/25/2018 20
Security The Five News Headlines You Don't Want to Be About YOUR Organization (White Paper) Juniper Networks 10/25/2018 20
Security Why It's Pivotal to Relook Cybersecurity with a Security-First Approach Networks Asia 10/24/2018 21
Security Giving CISOs The Tools to Measure and Improve Password Security Information Management 10/24/2018 21
Security How Science can Fight Insider Threats HelpNet Security 10/24/2018 21
Security Good Times in Security Come When You Least Expect Them Dark Reading 10/24/2018 21
Security What's Luck Got To Do With Cybersecurity Networks Asia 10/23/2018 22
Security How to Make the CFO Your Best Cybersecurity Friend HelpNet Security 10/23/2018 22
Security Understanding SOCs' 4 Top Deficiencies Dark Reading 10/23/2018 22
Security Blockchain Developer Salaries Now Command As Much as $175K ComputerWorld 10/23/2018 22
Security When Cybersecurity Capabilities are Paid for, But Untapped GCN 10/22/2018 23
Security In Cybersecurity, the A.I. Debate is 'How', Not 'If' (Artificial Intelligence) SC Magazine 10/20/2018 25
Security Computer Security: Preventing Attacks Made Possible by Meltdown/Spectre Science Daily 10/20/2018 25
Security Weighing the Pros and Cons of Data Security Outsourcing Information Management 10/20/2018 25
Security Australia's Encryption-Busting Bill Also after PINs, Passwords IT News 10/19/2018 26
Security How to Protect Your Company from Getting Hacked Business 2 Community 10/19/2018 26
Security Prepping Your SIEM Architecture for the Future Search Security 10/17/2018 28
Security How to Train Your Employees to Avoid Online Scams: 5 Tips TechRepublic 10/16/2018 29
Security Spies Among Us: Tracking, IoT & the Truly Inside Threat Dark Reading 10/16/2018 29
Security 6 Reasons Why Employees Violate Security Policies Dark Reading 10/16/2018 29
Security Tackling Privileged-Access Security GCN 10/16/2018 29
Security Convinced A Cyber Attack is Looming, Many Firm Still Don't Prepare Information Management 10/15/2018 30
Security 4 Ways to Fight the Email Security Threat Dark Reading 10/15/2018 30
Security 6 Security Trends for 2018/2019 Dark Reading 10/15/2018 30
Security We're Killing off Passwords. but Are We Ready for What Will Replace Them? ZDnet 10/14/2018 31
Security Cisco Says Crypto Bill Will Create Backdoors IT News 10/13/2018 32
Security Apple says Decryption Should 'Alarm Every Australian' IT News 10/13/2018 32
Security Pair of Reports Paint Picture of Enterprise Security Struggling to Keep Up Dark Reading 10/12/2018 33
Security Threat Hunters & Security Analysts: A Dynamic Duo Dark Reading 10/12/2018 33
Security 12 Free, Ready-to-Use Security Tools Dark Reading 10/12/2018 33
Security Collaborating for Change in Cybersecurity (White Paper) ATLAS Council 10/12/2018 33
Security Phishing as an Endless Quest for Exploitable Data SC Magazine 10/11/2018 34
Security Security Researchers Struggle with Bot Management Programs Dark Reading 10/10/2018 35
Security Lessons Learned from the Facebook Security Breach Search CIO 10/10/2018 35
Security Vendor Security Assessment: 40 Questions To Address (White Paper) BitSight Technologies 10/10/2018 35
Security Why Blockchain Belongs in Government GCN 10/10/2018 35
Security It's 2018, and Network Middleware Still Can't Handle TLS without Breaking Encryption ZDnet 10/08/2018 37
Security Why Cybersecurity Training Must Become a Priority NetworkComputing 10/05/2018 40
Security Cloud Misconfiguration: the Security Threat Too Often Overlooked InfoWorld 10/05/2018 40
Security Can We Trust Digital Forensic Evidence? HelpNet Security 10/05/2018 40
Security Most Enterprises Highly Vulnerable to Security Events Caused by Cloud Misconfiguration Dark Reading 10/05/2018 40
Security SQL Injection Explained: How These Attacks Work and How to Prevent Them Networks Asia 10/04/2018 41
Security Bridging the Priority Gap Between IT and Security in DevOps HelpNet Security 10/04/2018 41
Security 7 Steps to Start Your Risk Assessment Dark Reading 10/04/2018 41
Security Business Email Compromise Made Easy for Cyber Criminals ComputerWeekly 10/04/2018 41
Security The 6 Most Popular Cyberattack Methods Hackers Use to Attack Your Business TechRepublic 10/03/2018 42
Security Putting Security on Par with DevOps Dark Reading 10/03/2018 42
Security Blockchain 101: NIST Releases Tech Overview GCN 10/03/2018 42
Security CISOs: How to Answer the 5 Questions Boards Will Ask You Dark Reading 10/02/2018 43
Security Edge Computing: The Cyber Security Risks You must Consider ZDnet 10/01/2018 44
Security Healthcare beware: Crypto-mining, malware, and IoT attacks Networks Asia 10/01/2018 44
Security Examining the Skills, Traits and Experiences That Make for a Top CISO Information Management 10/01/2018 44
Security Organizations Need to Shift Strategies, Adopt a Proactive Approach to Cybersecurity HelpNet Security 10/01/2018 44
Security The Right Diagnosis: A Cybersecurity Perspective Dark Reading 10/01/2018 44
Security How Data Security Improves When You Engage Employees in the Process Dark Reading 09/28/2018 47
Security 4 Traits of a Cyber-Resilient Culture Dark Reading 09/28/2018 47
Security The Role 0f Blockchain in Thwarting Data Breaches Information Management 09/27/2018 48
Security To Find the Right Security Tool, Know Thyself Or Navigating the Security Maze SC Magazine 09/26/2018 49
Security USB Drives Remain Critical Cyberthreat Dark Reading 09/26/2018 49
Security Owning Security in the Industrial Internet of Things (IoT) Dark Reading 09/26/2018 49
Security Preparing for Crisis Communications During Cyber Incidents Continuity Central 09/26/2018 49
Security Why Entrusting Security to a Startup May Be Worth the Risk Data Center Knowledge 09/25/2018 50
Security Walmart, Sam's Club Start Mandating Suppliers Use IBM Blockchain Data Center Knowledge 09/25/2018 50
Security Baddies Just Need One Email Account With Clout to Unleash Phishing Hell The Register 09/24/2018 51
Security Too Many Companies are Neglecting Servers in their Endpoint Security Strategy Networks Asia 09/24/2018 51