IT Weekly


Feb 19, 2019

Every week we bring you more than 40+ relevant online sources that contain articles of interest to IT and DC Professionals at all levels

Browse by Technology
Browse by Year



Category Articles From 2017 Source Posted Date Age
Management Outsourcing Trends to Watch in 2017 Network World 12/30/2017 416
Bit bucket NVMe: The Best Is Yet to Come NetworkComputing 12/29/2017 417
Cloud 3 New Year's Resolutions for the Cloud in 2018 InfoWorld 12/29/2017 417
Bit bucket Avoiding Micro-Segmentation Pitfalls: A Phased Approach to Implementation Dark Reading 12/29/2017 417
Bit bucket 17 Things We Should Have Learned in 2017, but Probably Didn't Dark Reading 12/29/2017 417
Technology IoT Is an Invitation to Ransomware Information Management 12/28/2017 418
Security The Disconnect Between Cybersecurity & the C-Suite Dark Reading 12/28/2017 418
Security IoT Security Using BLE Encryption NetworkComputing 12/27/2017 419
Data Predictions 2018: New Ransomware Threats Lead the Top Trends in Data Security Information Management 12/27/2017 419
Security 2018's Top Cybersecurity Threats Information Management 12/27/2017 419
Security The Coolest Hacks of 2017 Dark Reading 12/27/2017 419
Bit bucket Managing Switches with REST and Thrift APIs NetworkComputing 12/26/2017 420
Compliance Preparing For GDPR: How To Best Meet The New Compliance Requirements Information Management 12/26/2017 420
Management CISOs Play Rising Role in Business Dark Reading 12/26/2017 420
Management What It Takes to Be a Great Project Manager ComputerWorld 12/26/2017 420
Bit bucket Why 4K Isn't Enough: The Case for Higher Resolutions cnet 12/24/2017 422
Connectivity Will 2018 Be the Decisive Year for the Internet of Things? CIO Today 12/24/2017 422
Management 7 Skills Every IT Project Manager Needs Information Management 12/22/2017 424
Security What to Expect in 2018: Online Security Business 2 Community 12/22/2017 424
Bit bucket The 20 Worst Passwords of 2017: Did Yours Make the List? TechRepublic 12/21/2017 425
Data 8 Game-Changing Data Trends that Will Impact Businesses in 2018 TechRepublic 12/21/2017 425
Compliance GDPR: Looking Beyond the Burden NetworkComputing 12/21/2017 425
Bit bucket Beware of Hybrid IT Washing in 2018 InfoWorld 12/21/2017 425
Technology Watch for These 5 Technology Trends in 2018 Business 2 Community 12/21/2017 425
Management Digital Communications Your Business Should Be Encrypting And Securing Business 2 Community 12/21/2017 425
Bit bucket Researchers Find Jack-of-All-Trades Android Malware that Can Destroy Phones v3 co uk 12/20/2017 426
Operations 10 Hard Truths About Succeeding in IT Operations TechRepublic 12/20/2017 426
Technology Using The Dark Side Of Excitons for Quantum Computing Science Daily 12/20/2017 426
Bit bucket The Coldest Chip In the World Science Daily 12/20/2017 426
Bit bucket What is a Hypervisor? Networks Asia 12/20/2017 426
Management Shadow IT: How Today's CIOs Grapple with Unsanctioned Tech Networks Asia 12/20/2017 426
Management Hard Disk Drives Cling to Life as SSDs Take Off NetworkComputing 12/20/2017 426
Security Email has Been Weaponized by Hackers, Results Can Be Deadly CIO Today 12/20/2017 426
Management How To Execute on Strategy: Getting Great Ideas from the Whiteboard to the Boardroom ZDnet 12/20/2017 426
Data Part 1: Best Practices for Managing Enterprise Data Streams Data Center Knowledge 12/20/2017 426
Bit bucket Secret To 'Self-Healing' Glass Accidentally Discovered by Japanese Researchers v3 co uk 12/19/2017 427
Bit bucket 6 Toxic thoughts Successful People Quarantine The Ladders 12/19/2017 427
Bit bucket How to Rebuild Burned Bridges at Work The Ladders 12/19/2017 427
Cloud Cloud Storage Confusion Leading to Major Security Issues TechRepublic 12/19/2017 427
Data Top 10 Data Center Predictions: IDC Network World 12/19/2017 427
Management How to Kill a Dead Project IT World 12/19/2017 427
Data How to Assemble a Highly Effective Analytics Team IT World 12/19/2017 427
Cloud How the End of Net Neutrality Will Affect Enterprise Cloud Computing InfoWorld 12/19/2017 427
Technology Predictions 2018: 5 Trends Driving the IoT and IIoT Information Management 12/19/2017 427
Data Dispelling the 3 Most Common Myths About AI and Big Data Information Management 12/19/2017 427
Security Why Cryptography is Much Harder Than Software Engineers Think HelpNet Security 12/19/2017 427
Compliance Your Palms are Sweaty, Knees Weak, Arms are Heavy - You Forgot About Europe's GDPR Already The Register 12/19/2017 427
Compliance Storage Connection Protocol Testing Offers Lessons for Real-World Implementations TechRepublic 12/18/2017 428
Management How Can CISOs Choose Among Limitless Security Options with a Limited Budget? SC Magazine 12/18/2017 428
Security How to Use Blockchain: 10 Use Cases InformationWeek 12/18/2017 428
Compliance Predictions 2018: GDPR Boosts Interest in Data Governance Information Management 12/18/2017 428
Bit bucket Mastering the Three Top Tenets of Digital Transformation Information Management 12/18/2017 428
Management Five Things CIOs Can Do as IoT Adoption Turns Into a Nightmare HelpNet Security 12/18/2017 428
Management Five Workplace Issues We'll Be Talking About In 2018 Fast Company 12/18/2017 428
Connectivity Data Center Networks are Getting Faster and Smarter Data Center Knowledge 12/18/2017 428
Bit bucket Advanced Deception: How it Works & Why Attackers Hate It Dark Reading 12/18/2017 428
Data Why Do Password Policies Fail to Keep Data Safe? Business 2 Community 12/18/2017 428
Administration All I Want for Christmas is Compute: Enterprise Server Demand Rising The Register 12/18/2017 428
Bit bucket 3D Sensing to Become Mainstream for Smartphones in 2018 DigiTimes 12/18/2017 428
Management How To Futureproof Your Career as a CIO ComputerWeekly 12/18/2017 428
Bit bucket 15 Ways To Combat Cognitive Overload TechRepublic 12/17/2017 429
Security As Cryptocurrencies Soar, Regulators Call for Caution CIO Today 12/17/2017 429
Security Cybersecurity Predictions in the Zero Perimeter World Networks Asia 12/16/2017 430
Connectivity Net Neutrality: What's Next After the FCC Regulation Repeal? TechRepublic 12/15/2017 431
Technology Error-Free Into the Quantum Computer Age Science Daily 12/15/2017 431
Cloud The Network in 2018: Cloud, Containers, and Connections NetworkComputing 12/15/2017 431
Connectivity The Myth of Network Speed NetworkComputing 12/15/2017 431
Bit bucket Consumers Are Ready to Say Goodbye to Passwords HelpNet Security 12/15/2017 431
Bit bucket 10 Research-Proven Tricks that Make You Look Smarter Than You Are The Ladders 12/14/2017 432
Bit bucket Data 'Tsunami' to Absorb 20% of World Electricity Network World 12/14/2017 432
Management Understanding the Role of Information Rights Management Information Management 12/14/2017 432
Administration BlueBorne Attack Highlights Flaws in Linux, IoT Security Dark Reading 12/14/2017 432
Connectivity 5 Reasons Why America's Ctrl-Z on Net Neutrality Rules is a GOOD Thing The Register 12/14/2017 432
Bit bucket Funnily Enough, No, IT Admins Who Trash Biz Machines Can't Claim They Had Permission The Register 12/14/2017 432
Data As the Climate Changes, So Should Data Center Operations Data Center Knowledge 12/14/2017 432
Management Why 0% of US Companies Believe Their Information Security Strategy is Working TechRepublic 12/13/2017 433
Bit bucket Ransomware: A Cheat Sheet for Professionals TechRepublic 12/13/2017 433
Security 99% of Office Workers Threaten Their Company's Cybersecurity TechRepublic 12/13/2017 433
Bit bucket 5 Ways IT Workers Behave Badly And How to Deal With Them TechRepublic 12/13/2017 433
Bit bucket 6 Cutting-Edge Certifications for Infrastructure Pros NetworkComputing 12/13/2017 433
Bit bucket 10 Surprising Ways Machine Learning is Being Used Today InformationWeek 12/13/2017 433
Compliance GDPR and the Human Element of Personal Data Protection Information Management 12/13/2017 433
Data Why Wait to Be Breached? Three Reasons to Secure Your Data Now HelpNet Security 12/13/2017 433
Bit bucket These are the 10 Habits That Drive Recruiters Crazy Fast Company 12/13/2017 433
Data Google Sheds Light on Data Encryption Practices Dark Reading 12/13/2017 433
Storage Thanks To the 'Glassdoor Effect,' Companies Will Never Be the Same Benefit News 12/13/2017 433
Bit bucket Oklahoma's IT Unification Nets Hundreds of Millions in Savings Government Technology 12/13/2017 433
Bit bucket Meet The Machine That Color Sorts Tomatoes All by Itself CiOL 12/13/2017 433
Bit bucket 7 Indispensable Soft Skills To Develop for 2018 The Ladders 12/12/2017 434
Bit bucket Shatter-Proof Mobile Phone Screens a Step Closer Science Daily 12/12/2017 434
Connectivity Machine Learning Will Become the Most Important Technology Since the Internet Networks Asia 12/12/2017 434
Connectivity APIs and Networking: 3 Use Cases NetworkComputing 12/12/2017 434
Cloud Data Integration Is One Thing the Cloud Makes Worse IT World 12/12/2017 434
Data IoT Data Exchange: Building Trust and Value HelpNet Security 12/12/2017 434
Management Talking Blockchain with The Institutes' RiskBlock Alliance leader Digital Insurance 12/12/2017 434
Bit bucket Managing Risk or managing risks? Business 2 Community 12/12/2017 434
Data Algorithms Are Too Complicated, But Also Too Easy to Game, to Open the Black Box The Register 12/12/2017 434
Cloud Minimizing Public Cloud 'Blind Spots' as Apps Multiply Networks Asia 12/11/2017 435
Security McAfee Labs Previews Five Cybersecurity Trends for 2018 Networks Asia 12/11/2017 435
Compliance 7 Enterprise Storage Trends for 2018 NetworkComputing 12/11/2017 435
Bit bucket How to Determine Which Tech Trends Matter IT World Canada 12/11/2017 435
Management 5 Survival Tactics for Enterprise CIOs in 2018 InformationWeek 12/11/2017 435
Cloud AWS Ignites Debate About the Death of IT Ops InformationWeek 12/11/2017 435
Bit bucket The Most Important Quality to Look for When You're Hiring Forbes 12/11/2017 435
Bit bucket The Three Top Emerging IT Trends Continuity Central 12/10/2017 436
Management IT Versus the Organization InformationWeek 12/08/2017 438
Security What Slugs in a Garden Can Teach Us About Security Dark Reading 12/08/2017 438
Bit bucket Prevent Injuries, Death from Arc Flashes by Complying with NFPA Standards Data Center Knowledge 12/08/2017 438
Bit bucket The Etiquette Rule Book on Holiday Gifts for Your Boss TechRepublic 12/07/2017 439
Data What Is NoSQL? NoSQL Databases Explained InfoWorld 12/07/2017 439
Data No, You Shouldn't Keep All that Data Forever InfoWorld 12/07/2017 439
Cloud Hybrid Cloud - You're Doing It Wrong InformationWeek 12/07/2017 439
Bit bucket 4 Predictions for 2018: Data-Driven Decisions Pay Off Information Management 12/07/2017 439
Data 2018 Predictions: 6 Data Security Trends to Expect in the New Year Information Management 12/07/2017 439
Bit bucket Conficker: The Worm that Won't Die Dark Reading 12/07/2017 439
Cloud Disaster Recovery as a Service is Not Cloud Migration Data Center Knowledge 12/07/2017 439
Bit bucket Biggest Enterprise Software Will Soon Be SaaS-Only and It's Time to Worry Data Center Knowledge 12/07/2017 439
Security These 3 Departments are Causing the Biggest Cybersecurity Problems at Your Office TechRepublic 12/06/2017 440
Compliance Towards Data Storage at the Single Molecule Level Science Daily 12/06/2017 440
Data Micro-Modular Data Centers Set to Multiply Networks Asia 12/06/2017 440
Cloud Five Predictions for the Hybrid Cloud Market in 2018 Networks Asia 12/06/2017 440
Management Don't Fight It: Automate Firewall Analysis and Management Networks Asia 12/06/2017 440
Bit bucket 7 Digital Transformation Myths IT World 12/06/2017 440
Bit bucket Beyond NLP: 8 Challenges to Building a Chatbot InfoWorld 12/06/2017 440
Management How CIO/CFO Relationships Are Evolving InformationWeek 12/06/2017 440
Data Using the Scientific Method In Data Analytics for Better Results Information Management 12/06/2017 440
Data Many Organizations Can't Shake Data Security Fears With the IoT Information Management 12/06/2017 440
Bit bucket How Your Coworkers Make Assumptions About You Based on Body Language Fast Company 12/06/2017 440
Technology These Are the Four Biggest Email Problems (And How to Fix Them) Fast Company 12/06/2017 440
Security Why Cybersecurity Must Be an International Effort Dark Reading 12/06/2017 440
Bit bucket 7 Toxic Bosses You Should Avoid Like the Plague The Ladders 12/05/2017 441
Connectivity The Internet of Things is here: What is Your IoT Strategy? Networks Asia 12/05/2017 441
Security 5 Computer Security Facts that Surprise Most People IT World 12/05/2017 441
Security Simulated Attacks Uncover Real-World Problems in IT Security Dark Reading 12/05/2017 441
Bit bucket Improve Signal-to-Noise Ratio with 'Content Curation:' 5 Steps Dark Reading 12/05/2017 441
Bit bucket Real Words or Buzzwords?: Five Nines Security InfoWatch 12/05/2017 441
Data How to Make Big Data Part of a Long-Term Digital Transformation Plan TechRepublic 12/04/2017 442
Bit bucket New Nanowires Are Just a Few Atoms Thick Science Daily 12/04/2017 442
Data 5 Hot Enterprise Backup and Recovery Vendors NetworkComputing 12/04/2017 442
Bit bucket 10 Questions to Ask Your Employees Every Quarter Leadership Now 12/04/2017 442
Bit bucket What Is IFTTT? A Free Platform that Connects Everything as a Service IT World 12/04/2017 442
Management 20 Ways to Kill Your IT Career (Without Knowing It) IT World 12/04/2017 442
Technology Three Email Mistakes to Avoid the Week You Come Back from Vacation Fast Company 12/04/2017 442
Technology The Rising Dangers of Unsecured IoT Technology Dark Reading 12/04/2017 442
Connectivity Cheat Sheet: Two-Factor Authentication TechRepublic 12/01/2017 445
Bit bucket When Good Enough is No Longer Enough NetworkComputing 12/01/2017 445
Security What's New in PHP 7.2: Better Security, Code Handling InfoWorld 12/01/2017 445
Data Using Data to Drive a Smarter Way to Faster Insights Information Management 12/01/2017 445
Bit bucket How to Make Firing Someone During the Holidays Less Horrible Fast Company 12/01/2017 445
Security Security Geek Gift Guide Dark Reading 12/01/2017 445
Data Underground Data Centers are Having a Moment Data Center Knowledge 12/01/2017 445
Bit bucket Entertainment the Most Effective Lure for Phishing Attacks, Claims PhishMe v3 co uk 11/30/2017 446
Security How to Re-Add Yourself to the Sudo Security Group TechRepublic 11/30/2017 446
Bit bucket Amazon's Roadmap for the Future: 4 Signposts for the Tech Industry TechRepublic 11/30/2017 446
Security 35% of IT Professionals See Themselves As the Biggest Security Risk to Their Company TechRepublic 11/30/2017 446
Bit bucket Squeezing Light Into a Tiny Channel Brings Optical Computing a Step Closer Science Daily 11/30/2017 446
Bit bucket The Evil of Vanity Metrics HelpNet Security 11/30/2017 446
Management 6 Tips for Staffing Insurance Transformation Projects Digital Insurance 11/30/2017 446
Security 5 Free or Low-Cost Security Tools for Defenders Dark Reading 11/30/2017 446
Data Data Scientists & Analysts Need Not Apply: The Future of Data Analysis Business 2 Community 11/30/2017 446
Data Protecting Your Data From Ransomware The Register 11/30/2017 446
Administration From Devops to No-Ops: El Reg Chats Serverless Computing with NYT's CTO The Register 11/30/2017 446
Technology Big Step Forward for Quantum Computing Science Daily 11/29/2017 447
Technology A Transistor of Graphene Nanoribbons Science Daily 11/29/2017 447
Operations Data Center Cooling Market Set to Explode in the Coming Years Network World 11/29/2017 447
Data How Artificial Intelligence Will Self-Manage the Data Center Network World 11/29/2017 447
Cloud The Critical NetOps-Devops Tag Team for Multi-Cloud Agility Networks Asia 11/29/2017 447
Bit bucket What are Microservices? Lightweight Software Development Explained InfoWorld 11/29/2017 447
Bit bucket Do This Immediately After Messing Up to Regain Your Boss's Trust Fast Fast Company 11/29/2017 447
Management First US Federal CISO Shares Security Lessons Learned Dark Reading 11/29/2017 447
Bit bucket We Go Live to the Uber-Waymo Court Battle... You Are Not Going to Believe this. The Judge Certainly Doesn't The Register 11/29/2017 447
Bit bucket This Simple, Surprising Mental Trick will Improve Your Life, According to Steve Jobs The Ladders 11/28/2017 448
Connectivity Child-Proofing the Internet of Things Science Daily 11/28/2017 448
Connectivity The Case for Securing the SD-WAN Network World 11/28/2017 448
Cloud When It Comes to the Cloud, Don't Start with Technology InfoWorld 11/28/2017 448
Technology 11 Tech Giants Investing in Artificial Intelligence TechWorld 11/27/2017 449
Connectivity Ready for More Secure Authentication? Try These Password Alternatives and Enhancements Networks Asia 11/27/2017 449
Security Uber's Security Slip-Ups: What Went Wrong Dark Reading 11/27/2017 449
Security Reporting Line of the CISO: What Really Matters Business 2 Community 11/27/2017 449
Bit bucket My Machine Will Call Your Machine? No Jitter 11/27/2017 449
Technology Will Wearables Ever be Cool? Probably Not. But in Field Service, They'll be Useful Business 2 Community 11/26/2017 450
Bit bucket This Is How to Recover from Tragedy: 4 Secrets from Research The Ladders 11/24/2017 452
Technology The 12 Most Unlikely Places to Find Next-Level Technology TechRepublic 11/24/2017 452
Connectivity High-Speed Quantum Encryption May Help Secure the Future Internet Science Daily 11/24/2017 452
Management 10 Ways to Fund the Shift to Digital Business Networks Asia 11/24/2017 452
Cloud How to Diagnose Cloud Performance Issues InfoWorld 11/22/2017 454
Cloud Cloud Pricing Comparison: AWS vs. Microsoft Azure vs. Google Cloud vs. IBM Cloud InfoWorld 11/22/2017 454
Compliance How GDPR will Impact Data Management Practices Information Management 11/22/2017 454
Data 3 Ways to Consolidate Data Security and Disaster Recovery Strategies Information Management 11/22/2017 454
Management Only 12% of Organizations Are Likely to Detect a Sophisticated Cyber Attack HelpNet Security 11/22/2017 454
Data Six Data Security Questions that Every Board Needs to Ask HelpNet Security 11/22/2017 454
Operations Data Center Security: Honey Pots and the Art of Deceiving Hackers Data Center Knowledge 11/22/2017 454
Operations Data Center Standards: Where's the Value? Data Center Knowledge 11/22/2017 454
Cloud Facing the Hybrid Cloud Reality NetworkComputing 11/21/2017 455
Bit bucket Let's Take a Page from the Credit Card Industry's Playbook Dark Reading 11/21/2017 455
Bit bucket Ten Bad Habits You Must Eliminate from Your Daily Routine The Ladders 11/20/2017 456
Storage NASA Shows the World Its 20-Year Virtual Reality Experiment to Train Astronauts: The Inside Story TechRepublic 11/20/2017 456
Data How Law Firms are Protecting Client Data From Cyber Threats TechRepublic 11/20/2017 456
Security How Blockchain Encryption Works: It's all About Math TechRepublic 11/20/2017 456
Bit bucket 21 Weird Tech Job Titles of the Future TechRepublic 11/20/2017 456
Bit bucket RAID Is 30-YearsOld Storage Newsletter 11/20/2017 456
Bit bucket UEFI 101, and Why You Need it Scanned Networks Asia 11/20/2017 456
Technology Pushing IoT to the Edge Networks Asia 11/20/2017 456
Data Resolving the Conflict between Data Security and IT Operations Information Management 11/20/2017 456
Security 2017 Security Predictions IT World 11/20/2017 456
Cloud The Cloud: We're Not in 2012 Any More InformationWeek 11/17/2017 459
Data Why Analytics Will Be the Next Competitive Edge Information Management 11/17/2017 459
Bit bucket IPv6 Migration: 5 Best Practices NetworkComputing 11/16/2017 460
Devops 9 'People Problems' Plaguing DevOps InformationWeek 11/16/2017 460
Bit bucket The 20 Coolest Star Wars Coffee Mugs in Any Galaxy TechRepublic 11/16/2017 460
Security Blockchain is Where Anonymity Meets Transparency The FCPA Blog 11/16/2017 460
Compliance Preparing the Enterprise for GDPR and the Era of Data Compliance and Security Networks Asia 11/15/2017 461
Data Most Data Breaches Start Internally: Blackberry Report IT World Canada 11/15/2017 461
Compliance What Organizations Must Do In the Six Months Leading to GDPR Information Management 11/15/2017 461
Compliance Mobile Devices Present a Significant Risk for GDPR Noncompliance HelpNet Security 11/15/2017 461
Technology Deception Technology: Prevention Reimagined Dark Reading 11/15/2017 461
Security Fred Kwong: The Psychology of Being a CISO Dark Reading 11/15/2017 461
Security Blockchain-as-a-Service Allows Enterprises Test Distributed Ledger Technology ComputerWorld 11/15/2017 461
Bit bucket Several MailChimp Accounts Compromised as Phishing Attack Impersonates Major Brands IT Security Guru 11/15/2017 461
Bit bucket Nifty and Nerdy: 10 Holiday Gifts for IT Pros NetworkComputing 11/14/2017 462
Bit bucket Stop Trying to Be Friends With All Your Coworkers, and Do This Instead Fast Company 11/14/2017 462
Bit bucket Good for You: Eight Habits of Considerate People The Ladders 11/13/2017 463
Bit bucket Thinking We're Being Paid Fairly Matters More than Actually Being Paid Fairly The Ladders 11/13/2017 463
Security Hackers In Hollywood: How Mr. Robot Got it Right TechRepublic 11/13/2017 463
Bit bucket Don't Just Jump On the Bandwagon: Which Emerging Tech is Worth Your Time? Networks Asia 11/13/2017 463
Bit bucket 25 Vendors Making Waves in IT Infrastructure NetworkComputing 11/13/2017 463
Devops 25 DevOps Vendors to Consider in 2018 InformationWeek 11/13/2017 463
Data 25 Data & Analytics Vendors at the Forefront in 2018 InformationWeek 11/13/2017 463
Security Risk Assessment: The First Step in Improving Cyber Security HelpNet Security 11/13/2017 463
Compliance Is Your CCTV System GDPR Compliant? HelpNet Security 11/13/2017 463
Management The Emotionally Intelligent Manager's Guide to Leading Remote Teams Fast Company 11/13/2017 463
Security Emerging IT Security Technologies: 13 Categories, 26 Vendors Dark Reading 11/13/2017 463
Management Cisco: Most IoT Projects are Failing Due to Lack of Experience and Security ZDnet 11/13/2017 463
Bit bucket Yes, You Can Fire Someone for What They Post Online TLNT 11/10/2017 466
Bit bucket 20 Bad Tech Gifts to Avoid Giving During the 2017 Holiday Season TechRepublic 11/10/2017 466
Cloud Everything as a Service: Cloud Providers Solve Problems in-House IT Can't and Do It More Quickly and for Less Money TechRepublic 11/10/2017 466
Security Cybersecurity Predictions for 2018: It's Going to Be "A Lot More of the Same" TechRepublic 11/10/2017 466
Data 85% Of Big Data Projects Fail, but Your Developers Can Help Yours Succeed TechRepublic 11/10/2017 466
Data Most Companies Ill-Prepared for EU Data Protection Requirements Information Management 11/10/2017 466
Management Digital Business is Turning CIOs Into Leaders HelpNet Security 11/10/2017 466
Connectivity Never Start Your Networking Conversations by Saying These 8 Things Fast Company 11/10/2017 466
Security 6 Steps for Sharing Threat Intelligence Dark Reading 11/10/2017 466
Security Customers Punish Breached Companies Dark Reading 11/10/2017 466
Security Why Common Sense is Not so Common in Security: 20 Answers Dark Reading 11/10/2017 466
Compliance Why Europe's GDPR Privacy Regulation is Good for Business ComputerWeekly 11/10/2017 466
Bit bucket How to Improve the ROI of Your Staff Meetings TLNT 11/09/2017 467
Connectivity AI and the Future of Network Security NetworkComputing 11/09/2017 467
Administration Virtualization in the WAN: Where It's Headed NetworkComputing 11/09/2017 467
Management 5 Lessons from New Technology Leaders - Claudio Silvestri, NAV Canada IT World Canada 11/09/2017 467
Management 5 Lessons from New Technology Leaders - Bruce Ross, Royal Bank of Canada IT World Canada 11/09/2017 467
Bit bucket 10 Worries that Should Keep Every Developer Up at Night (2018 Edition) InfoWorld 11/09/2017 467
Devops Are DevOps and Software Quality Incompatible? InformationWeek 11/09/2017 467
Data Why Automation Won't Displace Human Intelligence in Analytics InformationWeek 11/09/2017 467
Compliance Top GDPR Compliance Risks: Breach Notification, Data Mapping, Managing Consent HelpNet Security 11/09/2017 467
Bit bucket Microsoft Offers Mitigation Advice for DDE Attacks Scenarios HelpNet Security 11/09/2017 467
Management These Emotionally Intelligent Habits can Make You a Better Listener Fast Company 11/09/2017 467
Bit bucket 3 Times You Should Say Yes to Office Happy Hour Fast Company 11/09/2017 467
Data Why Insurance CIOs Should Invest in AI, IoT and Big Data All at Once Digital Insurance 11/09/2017 467
Data Cybersecurity Staffing Shortage Tied to Cyberattacks, Data Breaches Dark Reading 11/09/2017 467
Data 8 Steps to Take Within 48 Hours of a Data Breach TechRepublic 11/08/2017 468
Bit bucket Compensation Planning: Your Key to Retaining Top Talent IT World 11/08/2017 468
Security 12 Famous (and Infamous) IT Security Disasters IT World 11/08/2017 468
Security What is Quantum Encryption? It's No Silver Bullet, But could Improve Security IT World 11/08/2017 468
Data How to Choose a Database for Your Microservices InfoWorld 11/08/2017 468
Security IoT Anxiety is Consuming Security Professionals HelpNet Security 11/08/2017 468
Bit bucket This Is the Right Way to "Play Politics" at Work Fast Company 11/08/2017 468
Technology We're Not Saying Uncle Sam Has Lost Control on Twitter, But US Embassy in Riyadh Just Did a Shout Out for Oatmeal The Register 11/08/2017 468
Security The Entertainment Industry Needs to Invest More in Cybersecurity Says Ethical Hacker Ralph Echemendia TechWorld 11/07/2017 469
Security Forrester's Top 6 Cybersecurity Predictions for 2018 TechRepublic 11/07/2017 469
Bit bucket The Role of VNF in NFV Deployments Networks Asia 11/07/2017 469
Data 7 Sure-Fire Ways to Fail at Data Analytics IT World 11/07/2017 469
Compliance How GDPR Affects Your Organization HelpNet Security 11/07/2017 469
Bit bucket Managers: What You Should Do When an Employee Reports Harassment Fast Company 11/07/2017 469
Management These 5 Interview Questions Reveal the Most About Job Candidates Fast Company 11/07/2017 469
Technology How I Infiltrated a Fortune 500 Company with Social Engineering Dark Reading 11/07/2017 469
Security Hiring Outside the Box in Cybersecurity Dark Reading 11/07/2017 469
Bit bucket Who's That Cuddling Up in the Container... *Squints* Wow You're Getting Along Well The Register 11/07/2017 469
Security What is Blockchain? And 5 Other Questions Your Boss Needs Answered ASAP TechRepublic 11/06/2017 470
Data 5 Ways to Build Your Company's Defense Against a Data Breach before It Happens TechRepublic 11/06/2017 470
Connectivity Internet of Things Definitions: A Handy Guide to Essential IoT Terms Networks Asia 11/06/2017 470
Connectivity 7 Enterprise Networking Trends for 2018 NetworkComputing 11/06/2017 470
Management Stay Grounded when Dealing with AI Projects InformationWeek 11/06/2017 470
Bit bucket Majority of Firms Now Adopting AI; More Investments Planned Information Management 11/06/2017 470
Management Ten Important Shifts Impacting IT Organizations Over the Next 36 Months HelpNet Security 11/06/2017 470
Security The Evolution of BYOD Security in a Mobile-First World HelpNet Security 11/06/2017 470
Bit bucket When Ransomware Strikes: 7 Steps You Can Take Now to Prepare Dark Reading 11/06/2017 470
Bit bucket The Death Knell of Passwords? It's Closer than You Think Dark Reading 11/06/2017 470
Management Integrating IT Services and IT Operations: Why Businesses Should Care Data Center Knowledge 11/06/2017 470
Bit bucket This is Where Confidence Comes From The Ladders 11/04/2017 472
Bit bucket Use These 3 Tips to Talk Like a Boss The Ladders 11/03/2017 473
Security Hackers Find An Evil Use for SEO SC Magazine 11/03/2017 473
Management 6 IoT Skills that Will Future-Proof Your Career Network World 11/03/2017 473
Technology Wearables are Showing Their True Worth in the Enterprise Space Networks Asia 11/03/2017 473
Administration Build an Ultra-Secure Microsoft Exchange Server Networks Asia 11/03/2017 473
Bit bucket DNS: Valuable and Vulnerable NetworkComputing 11/03/2017 473
Technology Forrester's Top 10 Technology Trends for 2018 Digital Insurance 11/03/2017 473
Management Consumers Don't Trust Businesses Can Protect their Data Dark Reading 11/03/2017 473
Security 4 Ways the Next Generation of Security Is Changing Dark Reading 11/03/2017 473
Cloud A Myth, Plan, and Test: Cloud-based Backup and Disaster Recovery Data Center Knowledge 11/03/2017 473
Bit bucket Is Credential Creep Strangling Your Hiring? TLNT 11/02/2017 474
Bit bucket 9 Stupid Rules that Make Great People Quit The Ladders 11/02/2017 474
Data How Big Data Won the 2017 World Series TechRepublic 11/02/2017 474
Data End-to-End Data Encryption: Why HTTPS is Not Enough SC Magazine 11/02/2017 474
Bit bucket IPv6 Addressing for Enterprises Network World 11/02/2017 474
Data 6 Trends Shaping the Future of Data Analytics Information Management 11/02/2017 474
Cloud 6 Impacts of GDPR On Organizations That Store Data in the Cloud Information Management 11/02/2017 474
Data 7 Tips to Reduce Risks of Data Breaches HelpNet Security 11/02/2017 474
Bit bucket The Five Things that Trustworthy Bosses Have Mastered Fast Company 11/02/2017 474
Bit bucket Social Engineer Spills Tricks of the Trade Dark Reading 11/02/2017 474
Security 10 Mistakes End Users Make that Drive Security Managers Crazy Dark Reading 11/02/2017 474
Bit bucket Atto, Boy! Eggheads Fire Laser for 43 Attoseconds, Fastest Man-Made Spurt The Register 11/02/2017 474
Bit bucket Hardware Has Never Been Better, But It Isn't a License for Code Bloat The Register 11/02/2017 474
Management Making Sense of the SD-WAN Business Case Network World 11/01/2017 475
Bit bucket Goodbye Legacy Systems, Hello "Composable IT" Networks Asia 11/01/2017 475
Bit bucket AI is not What You Think It Is Networks Asia 11/01/2017 475
Data Steps for Data Center Recovery Following a Natural Disaster Information Management 11/01/2017 475
Bit bucket IT Automation: Where It's Working, Where it's Not ZDnet 11/01/2017 475
Bit bucket So, Tell Us Again How Tech Giants are More Important Than US Govt... The Register 11/01/2017 475
Bit bucket This Is How Important It Is to Have a Supportive Manager The Ladders 10/31/2017 476
Bit bucket 11 Habits of Supremely Happy People The Ladders 10/31/2017 476
Technology The Automated Office: 8 Ways Companies are Using AI to Increase Productivity TechRepublic 10/31/2017 476
Bit bucket How to Identify Every Type of Phishing Attack Networks Asia 10/31/2017 476
Compliance The GDPR and Personal Data ... Help! Information Management 10/31/2017 476
Management 8 Issues Every CIO Needs to Solve about Artificial Intelligence Information Management 10/31/2017 476
Compliance The Clock is Ticking on GDPR: Is Your Business Ready? HelpNet Security 10/31/2017 476
Security Who Says Brilliant Security Engineers Can't be Amazing People Managers? Dark Reading 10/31/2017 476
Bit bucket Stop Counting Vulnerabilities & Start Measuring Risk Dark Reading 10/31/2017 476
Bit bucket Your VPN Needs these Eight Essential Features CIO Today 10/31/2017 476
Bit bucket Why It's a Mistake to Think Managers are Effective Coaches TLNT 10/30/2017 477
Data 59% Of Employed Data Scientists Learned Skills on Their Own or Via a MOOC TechRepublic 10/30/2017 477
Management How the Most (And Least) Successful CEOs Spend Their Workdays Fast Company 10/30/2017 477
Security Preventing Credential Theft: A Security Checklist for Boards Dark Reading 10/30/2017 477
Security It's Time to Change the Cybersecurity Conversation Dark Reading 10/30/2017 477
Technology IoT Won't Take Off Until SoCs Cost 50 Cents or Less - ARM TechCon v3 co uk 10/27/2017 480
Bit bucket Here's How Attractiveness Can Hurt You at Work The Ladders 10/27/2017 480
Bit bucket Detecting and Guarding Against Phishing Attempts Networks Asia 10/27/2017 480
Data 19 Big Data Certifications that Will Pay Off Networks Asia 10/27/2017 480
Bit bucket Secrets of the Most Resilient People Fast Company 10/27/2017 480
Connectivity Passwords Use Alone still Trumps Multi-Factor Authentication Dark Reading 10/27/2017 480
Bit bucket Terrifying Tech to Haunt Your Halloween ComputerWorld 10/27/2017 480
Connectivity Field Of Digital Dreams: Why MLB is Betting Its Future on Big Data, Wi-Fi, Apps, and AR TechRepublic 10/26/2017 481
Bit bucket Why IT Pros Need To Remain Curious NetworkComputing 10/26/2017 481
Data Even Data Scientists are Facing AI Takeover InfoWorld 10/26/2017 481
Security Quantum Computing Brings Promise and Threats InformationWeek 10/26/2017 481
Bit bucket Ask These 9 Questions Before Every Meeting to Avoid Wasting Time Fast Company 10/26/2017 481
Connectivity A Checklist for Securing the Internet of Things Dark Reading 10/26/2017 481
Cloud Security Forecast: Cloudy with Low Data Visibility Dark Reading 10/26/2017 481
Cloud The Huge Security Threat of Misconfigured Cloud and How to Fix It Data Center Knowledge 10/26/2017 481
Cloud Multi-Cloud Approaches Within Reach Data Center Knowledge 10/26/2017 481
Bit bucket 9 Bad Habits You Must Break to Be More Productive The Ladders 10/24/2017 483
Management The CDO and the CIO: Is It a Love or Hate Relationship? Digital Insurance 10/23/2017 484
Bit bucket The Machine Learning Era has Arrived NetworkComputing 10/20/2017 487
Bit bucket 11 Habits of Ridiculously Likeable People The Ladders 10/19/2017 488
Bit bucket Old-School Archiving: Five Bad Habits to Break Information Management 10/19/2017 488
Technology 10 Social Engineering Attacks Your End Users Need to Know About Dark Reading 10/19/2017 488
Bit bucket Flash In The Enterprise Is In a Solid State. Where is it Going Next? The Register 10/19/2017 488
Management How To Conduct a Technical Interview: 5 Questions to Ask TechRepublic 10/18/2017 489
Management 5 Steps Leaders Can Take to Improve Cybersecurity in Their Organization TechRepublic 10/18/2017 489
Management GE CIO: Machines Will Tell Humans What to Do, Not the Other Way Around Network World 10/18/2017 489
Data First Self-Powered Data Center Opens Network World 10/18/2017 489
Cloud What is Hybrid Cloud Computing? Networks Asia 10/18/2017 489
Cloud TCO: Why SISTIC Bought a Ticket for the Private Cloud Train Networks Asia 10/18/2017 489
Security How Containers and Microservices Change Security InfoWorld 10/18/2017 489
Bit bucket How To Make the Case for Hardware and Software Modernization Information Management 10/18/2017 489
Cloud Security Flaws in Children's Smartwatches Make Them Vulnerable to Hackers ZDnet 10/18/2017 489
Bit bucket CERT: These Emerging Technologies Bring New Risks ZDNet 10/18/2017 489
Connectivity 6 AI Ingredients every Wireless Networking Strategy Needs Network World 10/17/2017 490
Devops DevSecOps: Add Security To Complete Your DevOps Process InfoWorld 10/17/2017 490
Technology Create Real Value with Augmented (not Artificial) Intelligence Informationweek 10/17/2017 490
Security IT Execs Must Ensure Key Security Practices are Constantly Observed Information Management 10/17/2017 490
Management Why Security Leaders Can't Afford to Be Just 'Left-Brained' Dark Reading 10/17/2017 490
Security InfoSec Pros Among Worst Offenders of Employer Snooping Dark Reading 10/17/2017 490
Connectivity Here's Every Patch for KRACK Wi-Fi Vulnerability Available Right Now ZDnet 10/17/2017 490
Bit bucket Surprise! Most People Leave Companies, not Managers TLNT 10/16/2017 491
Bit bucket SAML Explained: What it Is, What It's Used for, How it Works Networks Asia 10/16/2017 491
Compliance GDPR: The Role of the DPO - and How to Find One in a Competitive Landscape Information Management 10/16/2017 491
Data Almost Half of Non-IT and Data Pros Don't Understand Blockchain HelpNet Security 10/16/2017 491
Security Printers: The Weak Link in Enterprise Security Dark Reading 10/16/2017 491
Security WPA2 Security In Trouble as KRACK Belgian Boffins Tease Key Reinstallation Bug The Register 10/16/2017 491
Data Keep Your Voice Down in the Data Centre, The HDDs Have Ears! I SAID, KEEP... The Register 10/16/2017 491
Operations Huge Power Imbalance Between Firms and Users Whose Info They Grab The Register 10/16/2017 491
Bit bucket A Look at Firewalls Networks Asia 10/13/2017 494
Management 9 IT Projects Primed for Machine Learning Networks Asia 10/13/2017 494
Cloud 10 Major Cloud Storage Security Slip-Ups (So Far) this Year Dark Reading 10/13/2017 494
Technology 9 Scary Robots That Will Give You the Jitters ZDnet 10/13/2017 494
Technology It's time for a New C-Suite Position: Chief AI Officer ZDnet 10/13/2017 494
Data IT At Sea Makes Data too Easy to See: Ships are Basically Big Floating Security Nightmares The Register 10/13/2017 494
Bit bucket The Looming Showdown: Privacy, Wellness and Productivity TLNT 10/12/2017 495
Bit bucket Ten Uncomfortable Deeds that Will Pay Off Forever The Ladders 10/12/2017 495
Cloud Shadow Cloud Apps Pose Unseen Risks Networks Asia 10/12/2017 495
Security Is Automation the Future of Cyber Security? Networks Asia 10/12/2017 495
Management Tips for Transitioning from the IT Department to CEO Chair InformationWeek 10/12/2017 495
Technology These Common Email Mistakes are Ruining Your Credibility Fast Company 10/12/2017 495
Bit bucket Four Steps Employers Should Take as the Weinstein Scandal Unfolds Fast Company 10/12/2017 495
Compliance Who Will Keep You Out Of Trouble With the GDPR? v3 co uk 10/11/2017 496
Data Your Data is Biased, Here's Why InformationWeek 10/11/2017 496
Compliance 10 Steps Enterprises Need to Take to Comply with GDPR InformationWeek 10/11/2017 496
Cloud 6 Questions Providers Should ask Cloud Vendors Information management 10/11/2017 496
Connectivity IoT: Insecurity of Things or Internet of Threats? Dark Reading 10/11/2017 496
Technology Companies are Investing Millions In AI -- and Facing Big Barriers ZDnet 10/11/2017 496
Cloud Containers Unlock the Cloud Data Center Dynamics 10/11/2017 496
Security Put CISOs On the Board, Urges F-Secure Chief Research Officer Mikko Hyppnen v3 co uk 10/10/2017 497
Connectivity Organisations Must Treat Their Network as a Utility v3 co uk 10/10/2017 497
Cloud Cryptocurrency Miners Put Cloud at Risk with Hacking Efforts v3 co uk 10/10/2017 497
Bit bucket 6 Reasons why Your Boss Doesn't Trust You The Ladders 10/10/2017 497
Bit bucket Autonomous Protection of Applications (and Cars) SC Magazine 10/10/2017 497
Compliance Tape Storage: Past, Present and Future ITProPortal 10/10/2017 497
Cloud Now's the Time To Do Deep Learning in the Cloud InfoWorld 10/10/2017 497
Data Steps for Adapting Data Governance to Modern Analytics Information Management 10/10/2017 497
Security Unstructured Data: The Threat You Cannot See Dark Reading 10/10/2017 497
Devops The Importance of Devops In Digital Transformation Networks Asia 10/09/2017 498
Devops How Devops Changes Monitoring InfoWorld 10/09/2017 498
Bit bucket I Lost My Brother to Opioid Addiction. Here's How Employers Can Address the Crisis Fast Company 10/09/2017 498
Connectivity New 4G, 5G Network Flaw 'Worrisome' Dark Reading 10/09/2017 498
Bit bucket The Future of Mobility: Are We Asking the Right Questions? ComputerWorld 10/09/2017 498
Management What is EMM? Enterprise Mobility Management Explained ComputerWorld 10/09/2017 498
Bit bucket 5 Ways Newer ERP Systems Overcome Traditional Limitations CIO 10/09/2017 498
Bit bucket Data! I Need more Data! Project Management Advisor 10/09/2017 498
Bit bucket How Elon Musk Runs an Efficient Meeting - and You Can, Too The Ladders 10/06/2017 501
Technology Data or Metadata? For the IoT They're Both Important Network World 10/06/2017 501
Cloud The Cloud Computing Wars Have Forgotten the Enterprise InfoWorld 10/06/2017 501
Security Leaving Employees to Manage Their Own Password Security is a Mistake HelpNet Security 10/06/2017 501
Technology Most Decision Makers Expect ROI from Artificial Intelligence Within Two Years HelpNet Security 10/06/2017 501
Security Rise in Insider Threats Drives Shift to Training, Data-Level Security Dark Reading 10/06/2017 501
Security Here's Google's Biggest Secret to Not Failing At Security TechRepublic 10/06/2017 501
Management 10 Ways to Help Get a New IT Leader Up to Speed TechRepublic 10/06/2017 501
Security Blockchain for Banks: Benefits and Implications CiOL 10/06/2017 501
Management 5 Ways You Can Use Exit Interviews to Improve Performance TLNT 10/05/2017 502
Cloud Top 5: Alternatives to Centralized Cloud Services TechRepublic 10/05/2017 502
Connectivity Most Network Endpoints Are in the Dark: Do You Know How to Find Them? HelpNet Security 10/05/2017 502
Technology The Privacy Implications of Email Tracking HelpNet Security 10/05/2017 502
Compliance Beyond GDPR: Data Protection as a Competitive Advantage HelpNet Security 10/05/2017 502
Management Three Ways to Get Everyone in Your Work Life to Like You Better Fast Company 10/05/2017 502
Management How Project Teams can Improve QA Testing TechRepublic 10/05/2017 502
Management 10 Questions Job Seekers Can Expect in a Cybersecurity Interview TechRepublic 10/05/2017 502
Technology IoT Tipping Point: Connection Capacity NetworkComputing 10/05/2017 502
Administration Why Expected Server Lifetime Is in the Eye of the Beholder Data Center Knowledge 10/05/2017 502
Data Making Sense of Unstructured Data with Text Analytics Business 2 Community 10/05/2017 502
Bit bucket How to Read People: 5 Secrets Backed by Research The Ladders 10/04/2017 503
Technology HPC Meets AI - A World of Possibilities Networks Asia 10/04/2017 503
Devops How DevOps Changes Both Dev and Ops InfoWorld 10/04/2017 503
Management AI, Cybersecurity Two Biggest Trends Shaping the CIO Role Information Management 10/04/2017 503
Data Ransomware Will Target Backups: 4 Ways to Protect Your Data Dark Reading 10/04/2017 503
Security What Security Teams Need to Know about the NIAC Report Dark Reading 10/04/2017 503
Bit bucket Pixel, iPhone, Galaxy, Oh My! Why Pay a Premium When Every Phone Runs the Same Apps? ZDnet 10/04/2017 503
Bit bucket Passwords as We Know Them Are Dying, Here's What Will Take Their Place TechRepublic 10/04/2017 503
Bit bucket DNSSEC Key Signing Key Rollover: Are You Ready? Networks Asia 10/03/2017 504
Data Five Big Data Misbeliefs that Could Cost Organizations Millions Information Management 10/03/2017 504
Security 70% of US Employees Lack Security and Privacy Awareness Dark Reading 10/03/2017 504
Cloud DevOpsSec: A Big Step in Cloud Application Security Dark Reading 10/03/2017 504
Technology 10 Ways Technology is Changing Disaster Response TechRepublic 10/03/2017 504
Bit bucket SDN: Time to Move On, Gartner Says NetworkComputing 10/03/2017 504
Bit bucket The 4 Rituals That Will Make You an Expert at Anything The Ladders 10/02/2017 505
Management 20 Harsh, But Necessary, Lessons You Learn in Your 20s The Ladders 10/02/2017 505
Bit bucket Asphalt Helps Lithium Batteries Charge Faster Science Daily 10/02/2017 505
Security How Attackers Can Take Advantage of Encrypted Tunnels HelpNet Security 10/02/2017 505
Connectivity Protecting Networks from DNS Exfiltration HelpNet Security 10/02/2017 505
Compliance How US and UK Companies Address GDPR Data Protection Requirements HelpNet Security 10/02/2017 505
Bit bucket Introvert Or Extrovert? Here's Another Way to Think About Your Personality Fast Company 10/02/2017 505
Bit bucket 5 IT Practices That Put Enterprises at Risk Dark Reading 10/02/2017 505
Bit bucket BYOD Might Be a Hipster Honeypot But It's Rarely Worth the Extra Hassle The Register 10/02/2017 505
Data 6 Big Data Privacy Practices Every Company Should Adopt in 2018 TechRepublic 10/02/2017 505
Compliance Big Data Storage: 7 Key Factors NetworkComputing 10/02/2017 505
Bit bucket 6 Ways to Protect Customer Data Business 2 Community 10/02/2017 505
Connectivity Get Ready for 'Unlimited Data' of 5G Networks in 2019 cnet 10/01/2017 506
Bit bucket America's First Exascale Supercomputer Set for 2021 Debut Network World 09/29/2017 508
Data In Equifax Data Breach, Three Hard Lessons in Risk Networks Asia 09/29/2017 508
Cloud 6 Cloud Cost Management Tips Networks Asia 09/29/2017 508
Data Why AI and Advanced Analytics Benefits Still Elude Most Organizations Information Management 09/29/2017 508
Management CISOs Offer Soup-to-Nuts C-Suite Strategy Dark Reading 09/29/2017 508
Management Best and Worst Security Functions to Outsource Dark Reading 09/29/2017 508
Administration 3 Things Infrastructure Pros Need to Know About Nested Virtualization on Google Cloud TechRepublic 09/29/2017 508
Management Humility Builds Leadership Loyalty TLNT 09/28/2017 509
Bit bucket Try This Trick to Go Straight to Sleep The Ladders 09/28/2017 509
Connectivity Spock's Wise Words for Today's Network Managers Network World 09/28/2017 509
Security 10 Critical Security Skills every IT Team Needs IT World 09/28/2017 509
Management 6 Tips for Negotiating CIO Noncompete Agreements IT World 09/28/2017 509
Connectivity 10 of the Most Dangerous Malware Threats on the Internet Today TechRepublic 09/28/2017 509
Bit bucket 5 Easy Tips to Improve Your Company's Intranet TechRepublic 09/28/2017 509
Data Top 3 Data Center Myths Debunked NetworkComputing 09/28/2017 509
Bit bucket When Disasters Strike, Edge Computing Must Kick In Network World 09/27/2017 510
Connectivity Bossie Awards 2017: The Best Networking and Security Software IT World 09/27/2017 510
Technology Digital Twins and IoT Enable Smart Products and Services InformationWeek 09/27/2017 510
Security Which Security Investments Make a Difference? HelpNet Security 09/27/2017 510
Bit bucket I Went To The Gym for Cardio Training and Left As a Better Boss Fast Company 09/27/2017 510
Cloud Companies Push to Decode Cloud Encryption Dark Reading 09/27/2017 510
Security 7 SIEM Situations that Can Sack Security Teams Dark Reading 09/27/2017 510
Bit bucket Don't Let Lack of All Flash Array Experience Hold You Back The Register 09/27/2017 510
Bit bucket Exploring the Air Gap Myth SC Magazine 09/26/2017 511
Technology Innovative Control System Paves the Way for Large Scale Universal Quantum Computing Science Daily 09/26/2017 511
Data It's a New, Challenging World for Data Governance InformationWeek 09/26/2017 511
Management FBI's Freese Shares Risk Management Tips Dark Reading 09/26/2017 511
Management Why Your Business Must Care about Privacy Dark Reading 09/26/2017 511
Administration Serverless Architecture: 4 Things to Know NetworkComputing 09/26/2017 511
Compliance Comparing Top All-Flash Data Center Storage Arrays Data Center Knowledge 09/26/2017 511
Bit bucket 40 Questions to Ask Before You Accept a Job Offer The Ladders 09/25/2017 512
Data 26 of the Most Infamous Data Breaches TechWorld 09/25/2017 512
Security New Non-Contact, Remote Biometric Tool Could Be Next Advance in Computer Security Science Daily 09/25/2017 512
Technology Physicists Demonstrate Using a Laser to Control a Current In Graphene within Just One Femtosecond Science Daily 09/25/2017 512
Bit bucket New Type of Supercomputer Could Be Based on 'Magic Dust' Combination Of Light and Matter Science Daily 09/25/2017 512