IT Weekly

NEWSLETTER

Feb 19, 2019


Every week we bring you more than 40+ relevant online sources that contain articles of interest to IT and DC Professionals at all levels
Header


Browse by Technology
Browse by Year

Header

Header

Header
Category Articles From 2018 Source Posted Date Age
Security It's The End Of 2018, and This Is Your Year in Security (End Of 2018) The Register 12/31/2018 50
Compliance GDPR: Four Letters That Put Fear Into Firms' Hearts in 2018 (High Profile GDPR, California Consumer Privacy Act) The Register 12/31/2018 50
Storage The Solid State of Storage in 2018 (Storage 2018) The Register 12/31/2018 50
Connectivity Assessing Performance Bottlenecks in Virtualized Networking (Network Virtualization Bottlenecks) Search Networking 12/31/2018 50
Connectivity 100 GbE Switch Market Shifting to Large Enterprises (100 GbE Catching On) Search Networking 12/31/2018 50
Administration What Are the Pros And Cons of Deploying Containers? (Container Pros & Cons) Search Networking 12/31/2018 50
Operations How Do Virtual ADCs Benefit Enterprise Data Centers? (Virtual ADCs, Application Delivery Controllers) Search Networking 12/31/2018 50
Cloud How to Tame a Multicloud Enterprise by Using a Cloud Management Platform (Taming a Multicloud Enterprise) ToolBox 12/31/2018 50
Management How Not to Handle a Data Breach (What Not to Do in a Breach) ToolBox 12/31/2018 50
Security Privacy is the Ultimate Paradox: Why We Can’t Have Privacy Without Intrusion (Doublethink: Privacy with Intrusion, GDPR) ToolBox 12/31/2018 50
Bit bucket The 27 Best Websites for Wasting Time on the Internet in 2018 (Best Goofing Off Sites) HubSpot 12/31/2018 50
Storage Top Storage News of 2018 (2018 Top Stories) TechRepublic 12/29/2018 52
Technology 10 Tech Trends That Will Actually Be Adopted In 2019 (Trends That Will Be Adopted in 2019) TechRepublic 12/29/2018 52
Connectivity One Byte at a Time – Protocol Analysis (Troubleshooting - One Byte At A Time (Video)) NetworkComputing 12/29/2018 52
Management A Roadmap for Becoming a Customer-Centric CIO (Customer-Centric CIO Roadmap) InformationWeek 12/29/2018 52
Bit bucket After 60 Years, IT’s Time for a Name Change (Time for a Name Change) InformationWeek 12/29/2018 52
Devops How to Transition to DevOps in Less Than 30 Days (30 Day Transition) InformationWeek 12/29/2018 52
Compliance A Data Inventory Is Key to Maintaining Data Privacy Compliance (Data Inventory Is Critical to GDPR, GDPR Article 30) Information Management 12/29/2018 52
Data 10 Steps To Success as a Data-Driven Organization (Data-Driven Success) Information Management 12/29/2018 52
Data Artificial Intelligence Enthusiasm Outpacing Adoption, Study Finds (AI Adoption Lags Enthusiasm) Digital Insurance 12/29/2018 52
Security 7 Business Metrics Security Pros Need to Know (Need To Know Metrics) Dark Reading 12/29/2018 52
Connectivity Net Neutrality Battle Heads to Court In 2019 (Net Neutrality Back to Court) cnet 12/29/2018 52
Management When a Corporate Data Breach Happens: Critical Next Steps for 2019 (Critical Steps After A Breach) Business 2 Community 12/29/2018 52
Connectivity How Micro Modular Data Centers Simplify Complex Network Routes (Micro Modulars Simplify Complex Network Routes, Edge Computing) Search Networking 12/29/2018 52
Data Tips to Implement DRaaS Strategy (DRaaS Tips, DR as a Service) Storage Newsletter 12/28/2018 53
Storage Comparing Tape and Cloud Storage for Long-Term Data Preservation (Tape vs Cloud for Long Term Storage, LTO) Storage Newsletter 12/28/2018 53
Cloud Cloud Security Concerns: IT vs. LoB (Security Concerns IT vs LoB) No Jitter 12/28/2018 53
Data Debunking Four Myths about Flow Data (Flow Data Myths, NetFlow, IPFIX) NetworkComputing 12/28/2018 53
Connectivity Debunking Four Myths about Flow Data (Flow Data Myths, NetFlow, IPFIX) NetworkComputing 12/28/2018 53
Operations 2019 Predictions with Infrastructure Implications (Infrastructure Implication Predictions) NetworkComputing 12/28/2018 53
Connectivity 5G E Isn’t Real 5G. Here’s What You Need to Know (5G E Isn’t Real 5G, AT&T 5G E) How To Geek 12/28/2018 53
Data Artificial Intelligence: Future and Trends to Watch (Artificial Intelligence Trends) ciol 12/28/2018 53
Data AI's Dark Secret? A Desire for Data Without Bounds (AI's Dark Secret, Artificial Intelligence) CIO 12/28/2018 53
Compliance What You Need to Know About California’s New IoT Security Law (California’s New IoT Security Law, SB-327) ToolBox 12/28/2018 53
Data Data Management Trends That Will Impact 2019: Dark Data is on the Move (2019 Data Management Trends) ToolBox 12/28/2018 53
Security 3 Ways to Protect Your Employees' Inboxes from Phishing Threats (Phishing Protection) TechRepublic 12/22/2018 59
Management 3 Ways Project Leadership Will Evolve in 2019 (Project Management Will Evolve) TechRepublic 12/22/2018 59
Bit bucket 13 In-Demand Tech Certifications That Will Help You Get a Better Job (13 In-Demand Tech Certifications, Agile, Scrum, AWS, CEH, CISSP, CCNA, CCNP, CompTIA, GIAC, ITIL, ITSM, MCSE, PMP) TechRepublic 12/22/2018 59
Connectivity Which Should You Choose for Your Next Server-Side Application – .NET Framework or .NET Core? (NET Framework vs NET Core) Business 2 Community 12/22/2018 59
Security The First 100 Days of the New CISO: How to Avoid the “Curse of Firefighting”? (CISO's First 100 Days) Business 2 Community 12/22/2018 59
Management 2018 Cost of a Data Breach Study (2018 Breach Cost, White Paper) IBM, Ponemon Institute LLC 12/22/2018 59
Compliance Facebook Like, Social Sharing Buttons on Your Website May Land You In GDPR Hot Water If Data Goes a-Wanderin' (Possible Trouble with Like, Social Sharing Buttons on Your Website, GDPR, CJEU) The Register 12/21/2018 60
Data Google Lens Now Recognizes Over 1 Billion Products (Recognizing Over 1 Billion Products, Augmented Reality) Venture Beat 12/21/2018 60
Cloud The Cloud May Finally be Ready for Your Legacy Apps InformationWeek 12/21/2018 60
Security Why CXOs are Leading the Charge for AI-Based Security (Artificial Intelligence Based Security) TechRepublic 12/20/2018 61
Management What Got You Here won't Get You There (Past History Doesn't Cut It) TechRepublic 12/20/2018 61
Security 5 Biggest Security Vulnerabilities Of 2018 (2018'a Biggest Vulnerabilities) TechRepublic 12/20/2018 61
Security Better Security Achieved with Randomly Generating Biological Encryption Keys (Randomly Generated Biological Encryption Keys) Science Daily 12/20/2018 61
Connectivity Juniper CTO Talks Cloud, High-Speed Networking (Juniper CTO on Networking) Networks Asia 12/20/2018 61
Management Crystal Balling Gazing into 2019 (2019 Crystal Ball) Networks Asia 12/20/2018 61
Data IT Leaders Frustrated With Complexity, Limited Insights of Analytics (Frustrated with Analytics Complexity) Information Management 12/20/2018 61
Administration How to Remotely Brick a Server (Bricking A Server) Dark Reading 12/20/2018 61
Operations Business Technology: 4 Threats to Watch Out For (Future Threats) Business 2 Community 12/20/2018 61
Cloud Serverless Computing: One Step Forward, Two Steps Back (Serverless Pitfalls, White Paper) UC Berkeley 12/20/2018 61
Data Sensored to Death: How Machine Learning In the Cloud Will Destroy All Privacy (The Death of Privacy, IoT, Cloud) ZDnet 12/19/2018 62
Management 'A Very, Very Bad Thing': This Is What a No-Deal Brexit Means for Tech Companies And Jobs (No-Deal Brexit) ZDnet 12/19/2018 62
Security Why 2019 will Introduce Stricter Privacy Regulation (Stricter Privacy In 2019) TechRepublic 12/19/2018 62
Connectivity Two-Thirds of Organizations Plan to Launch 5G by 2020 (66% Launching 5G By 2020) TechRepublic 12/19/2018 62
Technology The Year in IT: Technologies that Shaped 2018 (2018 Centerstage Tech) TechRepublic 12/19/2018 62
Cloud Rethinking Disaster Recovery for the Cloud (Rethinking DR) Networks Asia 12/19/2018 62
Cloud Key Enterprise Cloud Trends for 2019 (2019 Enterprise Trends) Networks Asia 12/19/2018 62
Data Consolidating Data Silos: What Enterprises Need to Know to Harmonize Data (Data Silo Consolidation) Information Management 12/19/2018 62
Compliance Best Practices to Prepare for New Data U.S. Protection Regulations (Prepare For New Data Regulations, GDPR, California Consumer Privacy Act, CCPA) Information Management 12/19/2018 62
Cloud 5 Top Cloud Computing Myths Debunked (Debunking The Myths) Information Management 12/19/2018 62
Devops Risk Based Access Control and the Role of Continuous Authentication (Continuous Authentication, DevOps) ToolBox 12/19/2018 62
Data How to Build And Run a Successful Data Team (Build A Successful Team) GCN 12/19/2018 62
Operations We Asked, You Answered: The Truth About Software Reliability (Software Reliability) The Register 12/18/2018 63
Technology 5 Biggest IoT Security Failures Of 2018 (IoT Security Failures Of 2018) TechRepublic 12/18/2018 63
Security How A Personality Trait Puts You at Risk for Cybercrime (Personality Trait and Cybercrime) Science Daily 12/18/2018 63
Storage Data Storage Using Individual Molecules (Individual Molecules) Science Daily 12/18/2018 63
Security Hiding Images and Information in Plain Sight (Encryption In Plain Sight) Science Daily 12/18/2018 63
Data How Big Data Analytics will Transform UC Migrations (UC Migrations Transformed By Analytics, ETL UCaaS) No Jitter 12/18/2018 63
Connectivity SD-WAN Can Reduce WAN Costs by Half (Reduce WAN Costs by Half With SD-WAN) No Jitter 12/18/2018 63
Security Test-Drive Your Security Approach (Test-Drive Your Approach) Networks Asia 12/18/2018 63
Connectivity VPN: An Essential Tool in Your Security Toolbox (Essential Tool - VPN) Business 2 Community 12/18/2018 63
Technology How Wireless Recharging Works -- and Doesn’t, Yet (Wireless Recharging...Sorta) GCN 12/18/2018 63
Technology Why Email Phishing Persists (Phishing Here to Stay) GCN 12/18/2018 63
Connectivity If Most Punters Are Unlikely to Pay More for 5G, Why All the Rush? (2022 For 5G) The Register 12/17/2018 64
Storage The Future is Bright, The Future is NVMe (The Future is NVMe) The Register 12/17/2018 64
Data Top 5 Questions for Data Scientists (Data Scientists Questions) TechRepublic 12/17/2018 64
Security The Rise of EDR and MDR and What They Mean for Security Teams (The Rise of EDR and MDR) Networks Asia 12/17/2018 64
Security Browser Is the New Endpoint (A New Endpoint: The Browser) Networks Asia 12/17/2018 64
Data Are You Protecting Your Data from Human Error? (Protection From Human Error) Networks Asia 12/17/2018 64
Compliance Why Data Privacy Professionals Need a New Approach to Compliance (New Approach Needed, GDPR, PIA/DPIA) Information Management 12/17/2018 64
Connectivity What’s the Difference Between 5G and 5GHz Wi-Fi? (5G and 5GHz Wi-Fi Difference) How To Geek 12/17/2018 64
Security Cryptojacking: The Hot New Type of Attack on Data Centers (Cryptojacking) Data Center Knowledge 12/17/2018 64
Security 2019 Attacker Playbook (Attacker Playbook 2019) Dark Reading 12/17/2018 64
Bit bucket Is Your Boss Spying on You? (Employee Monitoring) Business 2 Community 12/17/2018 64
Devops DevOps Is Causing Chaos for Enterprises (Causing Problems) SD Times 12/17/2018 64
Operations The Complete Guide To: Hyperconverged Infrastructure (Hyperconverged Infrastructure Guide, White Paper) IDG 12/17/2018 64
Cloud Chaos Engineering Aims to Avert Disasters (Availability Thru Chaos Engineering) ToolBox 12/17/2018 64
Operations The Staying Power of Mainframes (Mainframes Here To Stay) GCN 12/17/2018 64
Cloud Principles of Chaos Engineering (Chaos Engineering Principles0 PRINCIPLES OF CHAOS ENGINEERING 12/17/2018 64
Cloud 6 Cloud Security Predictions for 2019 (2019 Predictions) Dark Reading 12/16/2018 65
Security 6 CISO Resolutions for 2019 (2019 CISO Resolutions) Dark Reading 12/16/2018 65
Management Save the Children Foundation Duped By Hackers into Paying Out $1 Million (BEC Scam) ZDnet 12/15/2018 66
Security How The Industry Expects to Secure Information In a Quantum World (Quantum Encryption, Quantum Computer) ZDnet 12/15/2018 66
Security How One Hacked Laptop Led To An Entire Network Being Compromised (One Hack Brings Disaster) ZDnet 12/15/2018 66
Technology 2018 Technology Trends That Will Matter a Decade from Now (Today's Tech That Will Matter in 10 Years, Cloud Computing, Artificial Intelligence, IoT, Quantum Computing, Digital Transformation) ZDnet 12/15/2018 66
Security The Biggest Phishing Attacks of 2018 and How Companies Can Prevent It in 2019 (Phishing Prevention Tips) TechRepublic 12/15/2018 66
Data How Technology Might Solve our Impending Food Crisis (Technology and Food) TechRepublic 12/15/2018 66
Management 4 Ways Leaders Destroy Team Morale (Morale Busters) TechRepublic 12/15/2018 66
Security 15 Skills You Need to Be a Whitehat Hacker And Make Up to $145K Per Year (Whitehat Hacker Skills) TechRepublic 12/15/2018 66
Data 10 Skills Employers Need In a Data Scientist (Data Scientist Skills) TechRepublic 12/15/2018 66
Bit bucket What Tech Mega Hubs Will Do to East Coast Cities (Mega Hub Issues) InformationWeek 12/15/2018 66
Management Top 10 Tech Predictions for 2019 (Top 10 Predictions 2019) InformationWeek 12/15/2018 66
Management Capital One CIO: We're a Software Company (Becoming A Software Company) InformationWeek 12/15/2018 66
Data 5 Machine Learning Resolutions for 2019 (Machine Learning Considerations) InformationWeek 12/15/2018 66
Data 6 AI Predictions for 2019 (2019 Artificial Intelligence Predictions) Digital Insurance 12/15/2018 66
Security Despite Breaches, Many Organizations Struggle to Quantify Cyber-Risks to Business (Quantifying Risk) Dark Reading 12/15/2018 66
Security Cybercrime Is World's Biggest Criminal Growth Industry ($3 Trillion in 3 Years) Dark Reading 12/15/2018 66
Security Who Are You, Really? A Peek at the Future of Identity (Future of Identity Management) Dark Reading 12/15/2018 66
Technology The State Of Email Security (Email Security, White Paper) Mimecast Limited 12/14/2018 67
Cloud Strategically Achieving Multicloud Success (Multicloud Success Strategy, White Paper) F5/IBM 12/14/2018 67
Cloud Top 10 Public Cloud Security Recommendations (Security Recommendations, White Paper) Palo Alto Networks 12/14/2018 67
Connectivity 6 Things You Should Know About 802.11ax (802.11ax Insight, W-Fi) NetworkComputing 12/13/2018 68
Technology How SDN and Blockchain can help with IoT Privacy and Security? (IoT better With SDN & Blockchain NetworkComputing 12/13/2018 68
Connectivity Big Market for Smart Speakers, other Predictions About 5G, And. . . Radio? (5G Coming with Complications) MediaPost 12/13/2018 68
Security 4 Lessons Die Hard Teaches About Combating Cyber Villains (Lessons From the Movie Die Hard) Dark Reading 12/13/2018 68
Security Worst Password Blunders of 2018 Hit Organizations East and West (Unbelievable Password Blunders) Dark Reading 12/13/2018 68
Devops Forget Shifting Security Left; It's Time to Race Left (DevOps Shift Left) Dark Reading 12/13/2018 68
Operations 36% of Workers Would Rather Go to the DMV than Troubleshoot an IT Issue (DMV or Troubleshoot) TechRepublic 12/11/2018 70
Technology What can we expect from technology in 2019? (2019 Expectations) Networks Asia 12/11/2018 70
Cloud Key Considerations When Migrating Workloads to the Public Cloud (Migrating To The Public Cloud, White Paper) Insight 12/11/2018 70
Data How to Get Beyond AI Myths (Beyond AI Myths, Artificial Intelligence) Washington Technology 12/11/2018 70
Data How to Get Beyond AI Myths (Beyond AI Myths, Artificial Intelligence) GCN 12/11/2018 70
Security US Senate Computers will Use Disk Encryption (Disk Encryption for US Senate) ZDnet 12/03/2018 78
Technology A New Light on Significantly Faster Computer Memory Devices (Faster Computer Memory Devices) Science Daily 12/03/2018 78
Management End Users Are Winning the Shadow IT War (End Users Winning Shadow War) InformationWeek 12/03/2018 78
Connectivity HTTPS Is Almost Everywhere. So Why Isn’t the Internet Secure Now? (Why HTTPS Does Not Mean Secure) How To Geek 12/03/2018 78
Management Your People Problem With Emerging Technology and Innovation (People Problems and Technology) Digital Insurance 12/03/2018 78
Data The Complete Guide To: Data Science (Data Science Guide, White Paper) TechWorld 12/03/2018 78
Technology IoT and the Security Challenges That Tech Companies Face (IoT Security Challenges) TechRepublic 11/30/2018 81
Security How To Protect Your Business from Botnets: 6 Strategies (Botnet Protection Strategies) TechRepublic 11/30/2018 81
Management How Cyber-Attacks Will Change the Face of Company Boards (Cyber Attacks Changing Boards Of Directors) Networks Asia 11/30/2018 81
Security The Season of Fraud is Coming. Are You Prepared? (Checklist on How to Deal With Holiday Fraud) Business 2 Community 11/30/2018 81
Operations What Serverless Is and What it Means for You = Part 2: Challenges and Considerations for Choosing the Right Serverless Solution (Choosing the Right Serverless Solution) Business 2 Community 11/30/2018 81
Data Data Science for Marketers (Part 2): Descriptive v Diagnostic Analytics (Descriptive v Diagnostic Marketing Analytics) Business 2 Community 11/30/2018 81
Connectivity 10 Tips for Diagnosing Slow Applications (Fixing Slow Applications) No Jitter 11/29/2018 82
Connectivity Higher Speed Ethernet Requirements Continue to Grow (Higher Speed Ethernet Growing) NetworkComputing 11/29/2018 82
Connectivity Preparing for 5G's Biggest Security Challenges (5G's Security Challenges) NetworkComputing 11/29/2018 82
Security Encrypted Traffic Reaches a New Threshold (Encrypted Traffic Breaking Point, Encryption) NetworkComputing 11/29/2018 82
Data Three Steps Toward Stronger Data Protection (Stronger Data Protection) Information Management 11/29/2018 82
Security Last Quarter Saw 137M Phishing Attacks, Up Nearly 30 Percent (Phishing Up 30% To 137MM/Qtr) Information Management 11/29/2018 82
Security Is Security the Real Stuff of Nightmares? (CISOs Manage Constant Risk) HelpNet Security 11/29/2018 82
Operations Blind Spots and How to See Them: Observability in a Serverless Environment (Observability in a Serverless Environment, FaaS, DevOps, VPC) HelpNet Security 11/29/2018 82
Data Incorrect Assessments of Data Value Putting Organizations at Risk (Incorrect Data Value Assessments) Dark Reading 11/29/2018 82
Security The "Typical" Security Engineer: Hiring Myths & Stereotypes (Security Engineer: Hiring Myths) Dark Reading 11/29/2018 82
Management 7 Trends Driving Enterprise IT Transformation in 2019 (2019 Trends) ciol 11/29/2018 82
Operations What Serverless is and What it Means for You - Part 1 (What Is Serverless Computing) Business 2 Community 11/29/2018 82
Technology 5 Ways to Help Robots Work Together with People (Robots Working With People) GCN 11/29/2018 82
Compliance Domain Name 'Admin' Role Eyed Up as Latest Victim in Whois System's GDPRrmeggdon (GDPRrmeggdon) The Register 11/28/2018 83
Data How Better Standards can Decrease Data Security Spending Needs (Better Standards Reduce Costs, FedRAMP) Information Management 11/28/2018 83
Connectivity Why You Shouldn't Trust Free VPNs (Don't Trust Free VPNs) How To Geek 11/28/2018 83
Compliance Why Compliance is Never Enough (Never Enough) HelpNet Security 11/28/2018 83
Security Take Cybersecurity Into Your Own Hands: Don't Rely on Tech Giants (Don't Put Your Security Into Someone Else's Hands) HelpNet Security 11/28/2018 83
Security Cybersecurity 2019: Predictions You Can't Ignore (Predictions You Can't Ignore) HelpNet Security 11/28/2018 83
Operations Lessons From This Year's Data Center Outages: Focus On the Fundamentals (Outage Fundamentals) Data Center Knowledge 11/28/2018 83
Security Who's the Weakest Link in Your Supply Chain? (Weakest Link: Third Parties) Dark Reading 11/28/2018 83
Security 8 Tips for Preventing Credential Theft Attacks on Critical Infrastructure (Preventing Credential Theft Attacks) Dark Reading 11/28/2018 83
Data Data Science for Marketers (Part 1): Getting Your Data Ready (Getting Your Data Marketing Ready) Business 2 Community 11/28/2018 83
Cloud Options for Dedicated Cloud Interconnects and Their Benefits (Options for Dedicated Interconnects) Search Networking 11/28/2018 83
Technology Using Blockchain to Support Trustworthy Transactions on the IoT (Blockchain and IoT Trustworthiness) InformationWeek 11/28/2018 83
Security Blockchain Applications for Identity Verification (Blockchain for Identity Verification, White Paper) Evident 11/28/2018 83
Technology Racing Electrons Under Control (Computing At Petahertz Frequencies) Science Daily 11/27/2018 84
Technology Quantum Computing at Scale: Scientists Achieve Compact, Sensitive Qubit Readout (Sensitive Qubit Readout) Science Daily 11/27/2018 84
Data Mass Data Fragmentation Requires a Storage Rethink (Data Fragmentation) Network World 11/27/2018 84
Security The World of Wirearchy: The Future of Security Operation Centres (Wirearchy: The Future of SOCs) Networks Asia 11/27/2018 84
Security Transforming into a CISO Security Leader (Becoming a CISO, Leadership) Dark Reading 11/27/2018 84
Compliance Learning from a $150 Billion Compliance Failure ($150 Billion Compliance Failure) Security Today 11/27/2018 84
Cloud 7 Factors to Consider When Designing a Cloud Migration Plan (Migration Factors) TechRepublic 11/27/2018 84
Technology Building The Tricorder: The Race To Create A Real-Life Star Trek Medical Scanner (Building A Real-Life Tricorder ZDnet 11/26/2018 85
Connectivity Mobile Networks are Killing Wi-Fi for Speed Around the World (Mobile Killing Wi-Fi) The Register 11/26/2018 85
Connectivity A 5G Day May Come When the Courage of Cable and DSL Fails ... But it Is Not This Day (Cable & DSL Face 5G, 5G FWA) The Register 11/26/2018 85
Security Why Military Veterans Might Be Key to Closing the Cybersecurity Jobs Gap (Hire Military Cyber Professionals) TechRepublic 11/26/2018 85
Operations 8 Strategies To Keep Legacy Systems Running (Keep Legacy Systems Running) TechRepublic 11/26/2018 85
Data 6 Ways To Include Dark Data In Analytic Strategies (Using Dark Data) TechRepublic 11/26/2018 85
Technology How to Tell Which IoT Predictions to Pay Attention to (Real Or Fake IoT Predictions, IIoT) Network World 11/26/2018 85
Data Meeting the Intelligent Data Management Needs of 2019 (Data Management In 2019) Networks Asia 11/26/2018 85
Cloud Why Banking Industry Cloud Strategies Lag Behind (Banking Industry Lags Behind) InformationWeek 11/26/2018 85
Security Fundamental Concepts of Cyber Resilience: Introduction and Overview (Fundamentals of Cyber Resistance, White Paper) R&D Center 11/26/2018 85
Security Edge Computing Security Dos and Don'ts (Edge Dos and Don'ts) NetworkComputing 11/24/2018 87
Technology 6 Mobile Security Threats You Should Take Seriously in 2019 (2019 Mobile Threats) Networks Asia 11/23/2018 88
Management Decision Making During Crises And How To Avoid Groupthink (Avoid Groupthink During A Crisis) Continuity Central 11/23/2018 88
Data Gone Phishing: Everything You Need to Know About the Ever Present Threat to Your Data (Ever Present Threat) Business 2 Community 11/23/2018 88
Cloud Closing the Cloud Security Business Gap (Mitigate Data Threats, White Paper) SalesForce 11/23/2018 88
Technology Real Talk: You're Gonna Have to Get Real About Real-Time Analytics If You Wanna Make IoT Work (Making IoT Work) The Register 11/22/2018 89
Connectivity Net Neutrality Is Heading To the Courts (Again): So Will the Current Rules Stand or Be Overturned (Again)? (Net Neutrality Round Three) The Register 11/22/2018 89
Data What is Catastrophic Forgetting and How Does it Affect AI Development? (Catastrophic Forgetting, Artificial Intelligence) TechWorld 11/22/2018 89
Data 5 Trends To Expect For Artificial Intelligence In 2019 (AI Trends in 2019) Digital Insurance 11/22/2018 89
Security How to Stay Safe in a World Where Phishing is More Sophisticated Than Ever (Stay Safe from Phishing) Business 2 Community 11/22/2018 89
Security 3 Steps That Will Lower Your Cybersecurity Risk (Steps to Lower Risk) Business 2 Community 11/22/2018 89
Operations Data Center Power Distribution and Capacity Planning (Understanding Power, White paper) Raritan 11/22/2018 89
Data How Big Data Is Helping To Power Mercedes To F1 Glory (Mercedes + Big Data = F1 Victory) ZDnet 11/21/2018 90
Bit bucket Photos: 25 Bad Tech Gifts to Avoid Giving this Holiday Season (Really Bad Tech Gifts) TechRepublic 11/21/2018 90
Connectivity How 5G Technology will Change Data Centers (5G Impact) TechRepublic 11/21/2018 90
Security 85% of Enterprises Allow Employees to Access Data From Personal Devices, Security Risks Abound (Bad Idea -Employees Accessing Data From Personal Devices) TechRepublic 11/21/2018 90
Data Inside the Chief Data Privacy Officer Role with Barbara Lawler (Data Privacy Officer Role) Information Management 11/21/2018 90
Cloud Why a Multi-Cloud Strategy Is Critical for Enterprise Data Protection (Multi-Cloud Strategy Is Essential) Data Center Knowledge 11/21/2018 90
Management Consumers are Forgiving After a Data Breach, but Companies Need to Respond Well (Consumers Forgive After a Breach; Provided....) Dark Reading 11/21/2018 90
Security What We Can Learn from the Recent Singapore Data Breach (Singapore Data Breach Lessons) Networks Asia 11/20/2018 91
Connectivity Why SDN and IBN Demand Better Network Visibility (Better Visibility for SDN & IBN) NetworkComputing 11/20/2018 91
Storage How Do SSDs Work? (Inside SSDs) ExtremeTech 11/20/2018 91
Security Securities Markets at High Risk of Cyberattack (Highest Risk of Attack) Dark Reading 11/20/2018 91
Security 9 Traits of a Strong InfoSec Resume (Elements of a Strong InfoSec Resume) Dark Reading 11/20/2018 91
Security Can a New Standard Prevent An Encryption Meltdown. (Could Quantum Prevent An Encryption Meltdown) GCN 11/20/2018 91
Management Be Accessible, Not Open-Door (Accessible Not Open-Door) Project Management Advisor 11/20/2018 91
Security A Little Phishing Knowledge May Be a Dangerous Thing (Phishing Is Really Dangerous And Effective) The Register 11/19/2018 92
Technology Securing the IoT Has Become Business-Critical (Business Critical: IoT Security) Network World 11/19/2018 92
Cloud Gotcha Pricing from the Cloud Pushes Workloads Back on Premises (It's Not Cheaper) Network World 11/19/2018 92
Data Tips for Protecting Your Data When Losing an Employee (Protect Your Data When Losing An Employee) Information Management 11/19/2018 92
Technology What Is Augmented Reality, Anyway? (Long Way To Go for Augmented Reality) GCN 11/19/2018 92
Security How to Prepare for Your Next Security Breach (Prepare Now For The Next Breach) PC Magazine 11/18/2018 93
Data Building An Artificial General Intelligence Begins by Asking 'What is Intelligence?' (What is Artificial Intelligence) Information Management 11/18/2018 93
Security Would You Know if You've Been Breached? (Have You Been Breached, White Paper) thycotic 11/18/2018 93
Data Discriminate for Fairness (Fairness) DeadSalmonData 11/18/2018 93
Technology The Impact of Popular IoT Devices on Our Lives (IoT's Impact) Read IT Quick 11/17/2018 94
Technology 7 Questions Boards Need to Ask About Artificial Intelligence (Questions the Board Must Ask About AI) Information Management 11/17/2018 94
Security 95% of Organizations Have Cultural Issues Around Cybersecurity (Embedding Cybersecurity into the Organization) Dark Reading 11/17/2018 94
Cloud 10 Challenges in Taking off on a Bold Multi-Cloud Strategy (Multi-Cloud Strategy Challenges) ciol 11/17/2018 94
Security Artificial Intelligence, Cybersecurity, and Common Sense (Common Sense) Business 2 Community 11/17/2018 94
Operations Bridging the Divide between Software Developers and Operators using Logs (White Pape) Queen’s University, Canada 11/17/2018 94
Bit bucket 31 Books Every Techie Should Read (Must Reads for Techies) TechRepublic 11/16/2018 95
Cloud The Top 5 Myths about Cloud-Based Security (Cloud Security Myths) TechRepublic 11/16/2018 95
Connectivity SD-WAN Puts Traditional Routers on Notice (SD-WAN Is Arriving, Routers, MPLS) Network World 11/16/2018 95
Cloud Cloud Security: The Essential Checklist (Essential Security Checklist, IAM, LDAP) InfoWorld 11/16/2018 95
Storage Performance Benefits of NVMe over Fibre Channel (NVMe vs Fibre, White Paper) Demartek 11/16/2018 95
Technology How to Choose a Safer Analytics SDK for Your Mobile App (Safer Analytics SDK) Business 2 Community 11/16/2018 95
Connectivity OM5 and OM4+ Fiber (OM5 vs OM4+ fiber , White Paper) Commscope 11/16/2018 95
Security AI and Cybersecurity for Dummies (Artificial Intelligence & Cybersecurity For Dummies, White Paper) IBM 11/16/2018 95
Operations Six Critical Systems, Four Months To Brexit - And No Completed Testing (Brexit: Four Months Not Looking Good) The Register 11/15/2018 96
Technology How to Improve Enterprise IoT Security: 5 Tips (5 Tips for IoT Security) TechRepublic 11/15/2018 96
Connectivity 5G Mobile Networks: A Cheat Sheet (5G Cheat Sheet, eMBB, URLCC, mMTC) TechRepublic 11/15/2018 96
Connectivity Performance Testing: WinPcap versus Npcap (WinPcap vs Npcap, Wireshark) NetworkComputing 11/15/2018 96
Connectivity 5 Tips to Harden Network Security in a Connected Enterprise (Harden Security, IoT, Zero Trust) NetworkComputing 11/15/2018 96
Data Employees Aren't Taking The Proper Steps To Keep Information Safe While Traveling (Safe While Traveling) HelpNet Security 11/15/2018 96
Security What's Keeping Europe's Top Infosec Pros Awake at Night? (Keeping Europe Awake At Night, GDPR) HelpNet Security 11/15/2018 96
Compliance Practical Guidance for Complying with Canada's New Privacy Breach Rules (Complying with Canada's PIPEDA) Data Center Dynamics 11/15/2018 96
Security To Click or Not to Click: The Answer Is Easy (Spearphishing Works) Dark Reading 11/15/2018 96
Devops Security Teams Struggle with Container Security Strategy (Strategy for Container Security) Dark Reading 11/15/2018 96
Security Understanding Evil Twin AP Attacks and How to Prevent Them (Evil Twin AP Attacks, MitM, 802.11b, SSID) Dark Reading 11/15/2018 96
Security Why Cryptojacking Malware Is a Bigger Threat to Your PC Than You Realize (Huge Threat: Cryptojacking Malware) ZDnet 11/14/2018 97
Management CEOs are the Least Tech-Savvy Executives, Harming Enterprise Digital Transformation (Least Tech-Savvy Executives) TechRepublic 11/14/2018 97
Bit bucket 10 Signs You May Not Be Cut Out for IT (Decide if IT Is Your Career) TechRepublic 11/14/2018 97
Security Don't Underestimate the Power of Privilege (Danger From Privileged Accounts) SC Magazine 11/14/2018 97
Security RIP, 'IT Security' (Making Sense) Dark Reading 11/14/2018 97
Data Who is Your Data Expert? (Expert For Data) Business 2 Community 11/14/2018 97
Devops DevOps Done Right (Barriers To Success, White Paper) New Relic 11/14/2018 97
Cloud An Introduction To the New IT Approach Called Hybrid IT (Hybrid Introduction, White Paper) WEI 11/14/2018 97
Storage When You Play the Game Of Storage Arrays, You Win or You - Where are the Visionaries? (Gartner's Magical Square) The Register 11/13/2018 98
Technology Why 5G, AI, Cloud, and Blockchain Will Dominate The Digital Future Of The Enterprise (Dominating The Future, Artificial Intelligence) TechRepublic 11/13/2018 98
Security How CIOs Can Manage Blockchain Security: 4 Tips (Tips For Managing Blockchain) TechRepublic 11/13/2018 98
Cloud 5 Ways Cloud Computing Will Change In the Next Year (2019 Changes) TechRepublic 11/13/2018 98
Operations Making the Right Hyperconvergence Choice: HCI Hardware or Software? (HW Or SW For HCI, Hyperconverged Infrastructure) Network World 11/13/2018 98
Connectivity What is Transport Layer Security (TLS)? (TLS 1.3 Improvements, SSL) Network World 11/13/2018 98
Data Fix Your Data Before You Move It To The Cloud (Migrating To The Cloud with Bad Data) InfoWorld 11/13/2018 98
Data Data Silos: Now and Forever? (Data Silos Forever) InformationWeek 11/13/2018 98
Operations What Special Ops Taught Me about TechOps (TechOps Lessons From Special Ops) InformationWeek 11/13/2018 98
Data Are You Sure You Want to Build that Data Warehouse? (Building A Data Warehouse - Bad Idea) Business 2 Community 11/13/2018 98
Cloud What Are Likely to Be the Key Barriers to Embracing Serverless Computing? (Serverless Barriers) ZDnet 11/12/2018 99
Cloud Hybrid Cloud's Growing Pains - And How To Beat Them: a Guide To Raising a Good Platform, So You Can Raise a Glass Later (Hybrid's Growing Pains) The Register 11/12/2018 99
Technology 10 Predictions for How the Tech Industry Will Change In 2019 and Beyond (2019 And Beyond Predictions) TechRepublic 11/12/2018 99
Data Big Data Used to Predict the Future (Predicting The Future) Science Daily 11/12/2018 99
Storage Making Steps Toward Improved Data Storage (Improved Data Storage) Science Daily 11/12/2018 99
Management Trends that CTOs should pay attention to in 2019 (Trends for CTOs in 2019) Networks Asia 11/12/2018 99
Technology 12 Certifications for Enterprise Architects (Enterprise Architect Certifications) Networks Asia 11/12/2018 99
Cloud Don't Make Your Cloud Migration a House of Cards (Cruddy In, Cruddy Out) InfoWorld 11/12/2018 99
Connectivity How to Improve Wireless Network Capacity And Performance in 3 Steps (Improve Wireless Capacity) Search Networking 11/12/2018 99
Operations Vulnerabilities in Our Infrastructure: 5 Ways to Mitigate the Risk (Mitigate the Risk) Dark Reading 11/11/2018 100
Data Disaster Recovery on AWS, Azure and Google Cloud: Head to Head (Head to Head Cloud DR Comparison, Cloud DR) Business 2 Community 11/11/2018 100
Management Google, Microsoft, Amazon: When Employees are Mad, Make Sure They Feel Heard (Make Sure They Feel Heard) ToolBox 11/11/2018 100
Bit bucket The Best Holiday Gifts for Co-Workers (Co-Worker Holiday Gifts) TechRepublic 11/10/2018 101
Operations Not Just for Google: ML-Assisted Data Center Cooling You Can Do Today (Over Cooling, Machine Learning, Artificial Intelligence) Data Center Knowledge 11/10/2018 101
Data Forrester's 2019 AI Predictions Include Pragmatic AI (Artificial Intelligence Predictions) TechRepublic 11/09/2018 102
Security 10 Top Cybersecurity Predictions for 2019 (Top 10 Predictions) Information Management 11/09/2018 102
Security What is a 'Dark Web Scan' and Should You Use One? (Dark Web Scan) How To Geek 11/09/2018 102
Technology What Is A Solid-State Battery and Will They Solve Our Battery Life Problems? (Solid State Battery) How To Geek 11/09/2018 102
Security 5 Things the Most Secure Software Companies Do (and How You Can Be Like Them) (Secure Companies Approaches Dark Reading 11/09/2018 102
Data Five Steps For Successfully Implementing An ISO 27001 Risk Assessment Framework (Implementing ISO 27001) Continuity Central 11/09/2018 102
Management Leading Through a Crisis: How to Pass the Acid Test Of Management (Passing the Acid Test) Continuity Central 11/09/2018 102
Security Zero Trust Security For Dummies (Security Zero Trust, White Paper) Centrify 11/09/2018 102
Administration We Don't Want to Spoil All of This Article, But Have You Patched, Taken Away Admin Rights, Made Backups Yet? (Ahead Of the Game, Threats, Patching) The Register 11/08/2018 103
Technology Dollar for Dollar, Crafting Cryptocurrency Sucks Up 'More Energy' Than Mining Gold, Copper, etc. (Bitcoin Is Expensive to Mine) The Register 11/08/2018 103
Technology Batteryless Smart Devices Closer To Reality (Batteryless IoT Devices Science Daily 11/08/2018 103
Bit bucket Scientists Theorize New Origin Story for Earth's Water (Origins of Water) Science Daily 11/08/2018 103
Management Trends That CIOs Should Pay Attention to In 2019 (Trends For CIOs) Networks Asia 11/08/2018 103
Security Five Key Considerations When Developing A Security Operations Center (SOC Considerations) HelpNet Security 11/08/2018 103
Storage NVMe: Four Key Trends Set to Drive Its Adoption in 2019 and Beyond (NVMe Trends) DCIG 11/08/2018 103
Security Why the CISSP Remains Relevant to Cybersecurity After 28 Years (Is CISSP Still Relevant) Dark Reading 11/08/2018 103
Security Why Password Management and Security Strategies Fall Short (Rethink Passwords & Strategies) Dark Reading 11/08/2018 103
Data Why Disaster Recovery Should Become A Thing of the Past…(DR is Passé) Continuity Central 11/08/2018 103
Cloud 4 Mistakes Cloud Users Make when Purchasing Amazon Reserved Instances (Amazon Reserved Instances Mistakes) Business 2 Community 11/08/2018 103
Operations A 6-Step Approach For ITSM And ITOM To Work Better Together (Getting ITSM & ITOM Working Together, White Paper) servicenow 11/08/2018 103
Compliance Updates to PIPEDA, Canada's Own 'GDPR' (PIPEDA Canada's GDPR) Risk Management Monitor 11/08/2018 103
Bit bucket Why Your First Programming Language doesn't Really Matter (First Language Doesn't Matter) TechRepublic 11/07/2018 104
Security Humans vs Machines: AI and Machine Learning in Cyber Security (Artificial Intelligence Machine Learning) Networks Asia 11/07/2018 104
Data 5 Best Practices For Third-Party Data Risk Management (Third-Party Risk Management) Information Management 11/07/2018 104
Devops DevOps and Security: How to Make Disjointed Security and DevOps Teams Work Effectively (DevOps Working With Security) HelpNet Security 11/07/2018 104
Data 3 Leading AI Concerns for Insurers (Artificial Intelligence Machine Learning) Digital Insurance 11/07/2018 104
Security Keeping Your Business Safe: 5 Simple Ways to Provide Cybersecurity Solutions (Keeping Safe) Business 2 Community 11/07/2018 104
Data A Chilling Tale: Data and Vendors Gone Wrong (Vendors Gone Wrong) Business 2 Community 11/07/2018 104
Management Hire Great Talent, Train Them, Then Get Out of Their Way (Get Out Of Their Way, Hiring) TLNT 11/06/2018 105
Security How Automation Can Fill the Enterprise Cybersecurity Skills Gap (Automation Compliment Skills) TechRepublic 11/06/2018 105
Technology Coping With Errors In The Quantum Age (Correcting Quantum Errors) Science Daily 11/06/2018 105
Storage Physicists Create New, Simpler-than-Ever Quantum 'Hard Drive for Light' (Quantum Hard Drive) Science Daily 11/06/2018 105
Cloud The 'Born In the Cloud' Advantage Is Real, But Not Absolute (Cloud From the Start) InfoWorld 11/06/2018 105
Cloud How to Get Your Company to Handle the Cloud Truth (Cloud Culture Change) InfoWorld 11/06/2018 105
Compliance Post Implementation, GDPR Costs Higher than Expected (GDPR Higher Costs) HelpNet Security 11/06/2018 105
Management After the Breach: Tracing the 'Smoking Gun' (Find the Smoking Gun Dark Reading 11/06/2018 105
Management Five Winning Strategies for Attracting Top Talent (Attracting Talent, Hiring) Washington Technology 11/06/2018 105
Cloud Vendors Tell OMB to Keep It Simple in Cloud (Keeping The Cloud Simple) FCW 11/06/2018 105
Storage NVMe in the Data Centre (NVMe, White Paper) architectingIT 11/06/2018 105
Devops Time to Marry DevOps, Agile and Lean IT, Advocates Urge (Time To Get Hitched) ZDnet 11/05/2018 106
Operations Data Center Automation: 2 Acronyms You Should Know (Data Center Acronyms) ZDnet 11/05/2018 106
Operations Data Center Automation: 10 Vendors You should Know (10 Automation Vendors) ZDnet 11/05/2018 106
Cloud Cloud Computing will Virtually Replace Traditional Data Centers Within Three Years (95% in Three Years) ZDnet 11/05/2018 106
Management The True Value of a Project Management Professional TechRepublic 11/05/2018 106
Data 5 Reasons Why Your Company Doesn't Take Analytics Seriously, and 5 Ways to Change That (Taking Analytics Seriously) TechRepublic 11/05/2018 106
Connectivity SD-WAN: The Inside Scoop from Real-World Deployments (Real World SD-WAN) Network World 11/05/2018 106
Connectivity What Is WPA3? And Some Gotchas to Watch Out for In This Wi-Fi Security Upgrade (WPA3 Gotchas, WPA2) Network World 11/05/2018 106
Compliance Not Ready for New Reporting Obligations Yet? Here's Five Things to Think About (Canada's Breach Law, Compliance) IT World Canada 11/05/2018 106
Devops Companies Implementing DevSecOps Address Vulnerabilities Faster Than Others (Faster Vulnerability Solutions, DevOps) HelpNet Security 11/05/2018 106
Management Top 10 Predictions and Key Drivers for the IT Industry for the Next Five Years (5 Year Predictions & Drivers) HelpNet Security 11/05/2018 106
Technology Most CIOs say IoT will become a Major Burden (IoT To Become Burden) HelpNet Security 11/05/2018 106
Security Worst Malware and Threat Actors of 2018 (Worst Threats of 2018) Dark Reading 11/05/2018 106
Data Embedded Analytics: Easier to Create, More Accurate Than Ever (Embedded Analytics) SD Times 11/05/2018 106
Operations Six Pillars Of Monitoring Automation (Automation Monitoring) SD Times 11/05/2018 106
Security 11 Critical Visualizations for SD-WAN Success (Success With SD-WAN) NetworkComputing 11/04/2018 107
Cloud Is a Cloud-Native Strategy Right for You? (Correct Strategy) NetworkComputing 11/04/2018 107
Management 5 Lessons from New Technology Leaders: Alex Benay, CIO of the Government of Canada (Leadership Lessons) IT World Canada 11/04/2018 107
Security Tackling Cybersecurity from the Inside Out (Looking From The Inside) Dark Reading 11/04/2018 107
Security Gaining Ground On The Cyber Attacker (White Paper, State of Resilience) Accenture 11/04/2018 107
Security Fighting Email Scammers By Taking A Different View. Literally (Fighting Scammers) Homeland Security News 11/04/2018 107
Security Pinpointing Risky Employee Behaviors Enables IT Leaders to Reduce Risk (Employee Risky Behaviors) SC Magazine 11/02/2018 109
Connectivity What to expect from Wi-Fi 6 in 2019 (Wi-Fi 6 Expectations, 802.11ax) Network World 11/02/2018 109
Connectivity What is WPA3? Wi-Fi Security Protocol Strengthens Connections (Strength From WPA3) Network World 11/02/2018 109
Technology What's New in IoT: Trends for 2019 (IoT Trends) Networks Asia 11/02/2018 109
Security Where Is the Consumer Outrage about Data Breaches? (No Outrage From Consumers) Dark Reading 11/02/2018 109
Devops DevOps Done Right: How To Break Down The IT Department Silos without Alienating Developers (Doing It Right) ComputerWeekly 11/02/2018 109
Security The Current State of Cybersecurity Shows Now Is the Time for Zero Trust (Don't Trust Anyone) Business 2 Community 11/02/2018 109
Administration Grasp Container Basics To Plan Enterprise Adoption (Basics of Containers) Search IT Operations 11/02/2018 109
Technology Present and Future of Quantum Computing (Quantum Future) ToolBox 11/02/2018 109
Connectivity Optical Networking Breakthrough Will Run Networks 100x Faster (Spiral Fiber 100 Times Faster) Network World 11/01/2018 110
Technology Your Wearable is Always Watching You v3 co uk 10/31/2018 111
Connectivity It's Been a Week Since Engineers Approved a New DNS Encryption Standard and Everyone is Still Yelling (RFC 8484; DoH, Encryption Standard Under Fire) The Register 10/31/2018 111
Security Catching all Threats - Known, Unknown, and Unknown Unknown - Before They Can Harm You (The Unknowns) SC Magazine 10/31/2018 111
Technology Integrated Quantum Chip Operations Possible, Tests Show (Quantum Possibilities) Science Daily 10/31/2018 111
Connectivity Users Tell What You Need to Know About SD-WAN (SD-WAN from Users) Network World 10/31/2018 111
Operations Infrastructure Monitoring Software: Can You Afford It? (White Paper, Monitoring the Infrastructure) NetApp 10/31/2018 111
Security SMEs Ignore Cyber Security at Their Peril (Ransomware, Ignore At Your Peril) IT Web 10/31/2018 111
Data 15 Top Platforms for MDM And Data Governance (Top MDM Platforms) Information Management 10/31/2018 111
Devops The Case for MarDevSecOps (Security in DevOps) Dark Reading 10/31/2018 111
Compliance How Security, Compliance Standards Prevent OSI Layer Vulnerabilities Search Compliance 10/31/2018 111
Data 10 Ways to Use Machine Learning and AI in ITSM to Improve Processes (ITSM, 10 Ways for Artificial Intelligence) Search CIO 10/31/2018 111
Cloud Gartner Symposium 2018: Enterprise Cloud Strategy Mistakes to Avoid (Avoiding Mistakes) Search CIO 10/31/2018 111
Operations Hyperconverged Infrastructure as a Catalyst for Change (White Paper, Hyperconverged Catalyst for Change) Freeform Dynamics/VMware 10/31/2018 111
Technology US Rubber Stamps Right to Repair: What It Means for IT, SMBs, and Tinkerers TechRepublic 10/30/2018 112
Security How the FBI Weighs Cybersecurity Risks Against Other Criminal Threats (FBI Risk Weighting) TechRepublic 10/30/2018 112
Compliance 1 Billion Reasons Why Compliance Matters (GDPR, Non-Compliance Expensive) SC Magazine 10/30/2018 112
Technology IoT Security by Design (Security in IoT) No Jitter 10/30/2018 112
Technology What's the IoT Doing to Your Data Center? (Data Center IoT) Network World 10/30/2018 112
Security The Need for a Secure Content Sharing Ecosystem with IAM (Secure Sharing) Networks Asia 10/30/2018 112
Cloud Application Security - A Shared Responsibility in the Cloud? NetworkComputing 10/30/2018 112
Cloud How to Deal With Big Cloud Acquisitions Like IBM's Red Hat Purchase InfoWorld 10/30/2018 112
Devops A Wake-Up Call for Software Development Practices?(SW Wakeup Call) Informationweek 10/30/2018 112
Cloud Rethinking IT for Cloud Computing Informationweek 10/30/2018 112
Data 21% of All Files in the Cloud Contain Sensitive Data (Cloud Holds Sensitive Data) HelpNet Security 10/30/2018 112
Technology IoT Now Top Internet Attack Target (White Paper, IoT Attacks) F5 10/30/2018 112
Security Stay Ahead of Security Threats: Focusing on Your High-Risk Assets (One Step Ahead) Business 2 Community 10/30/2018 112
Bit bucket Best Gifts: 20 Luxury Gadgets for the Billionaire Who Has Everything (Billionaire Gadgets) ZDnet 10/29/2018 113
Connectivity Scientists to Create 'Truly Unhackable' Network Based on Quantum Physics (Unhackable Quantum) v3 co uk 10/29/2018 113
Connectivity Why 5G (And Even 6G) Could Put Your Business at Risk for a Cyberattack (Cyberattack from 5G/6G) TechRepublic 10/29/2018 113
Security Dark Web: A Cheat Sheet for Business Professionals (Cheat Sheet for the Dark Web) TechRepublic 10/29/2018 113
Technology 21 New Tech Jobs That Will Define the Next Decade of IT Work (Future Tech Jobs) TechRepublic 10/29/2018 113
Connectivity Meet the Professor Who Was There When the Internet Was Turned On (Day One of the Internet) PC Magazine 10/29/2018 113
Security How To Protect Your Organization from Insider Threats, The #1 Risk for Data Loss (Insiders Still #1) HelpNet Security 10/29/2018 113
Data Organizations Feel Ready to Put Highly Sensitive Data in the Cloud (Sensitive Data to the Cloud) HelpNet Security 10/29/2018 113
Security 8 Threats that Could Sink Your Company (Threats That Can Sink You) Dark Reading 10/29/2018 113
Connectivity How 5G Aims to End Network Delays That Slow Everything Down (5G Ends Delays) cnet 10/29/2018 113
Connectivity Be Prepared for SD-WAN Implementation Complexities Search SDN 10/29/2018 113
Security The Changing Face of Cyber Attacks (White Paper, Cyber's Changing Face) Neustar, Inc. 10/29/2018 113
Cloud Containers At-Risk: A Review of 21,000 Cloud Environments (White Paper, Risky Containers) Lacework, Inc. 10/29/2018 113
Security Internet Security Threat Report (White Paper, Report on Threats) Symantec 10/29/2018 113
Connectivity Highest Recommended SIP Trunk Providers, Friend to Friend (Providers for SIP) No Jitter 10/28/2018 114
Connectivity Preparing Your Workplace for 5G (Get Ready for 5G) NetworkComputing 10/28/2018 114
Connectivity Preparing for the Intent-Based Network (Networks Based on Intent) NetworkComputing 10/28/2018 114
Cloud Cloudy with a Chance of Threats (Threats) NetworkComputing 10/28/2018 114
Security Recent Security Breaches Come at Great Cost--Including Jobs--Including Jobs (Breach Guillotines) Data Center Knowledge 10/28/2018 114
Security 3 Keys to Reducing the Threat of Ransomware (Reducing Ransomware Threats) Dark Reading 10/28/2018 114
Security Cybersecurity Best Practices - In and Out of the Office (Office Best Practices) Business 2 Community 10/28/2018 114
Management 3 Factors Marginalizing the Historical Role of the CISO (Marginalizing the CISO) Business 2 Community 10/28/2018 114
Bit bucket The Best Tech Gifts for 2018 (Gifts for Your Techie) TechRepublic 10/27/2018 115
Data Should a Robo-Car Run Over A Kid or a Grandad? The Register 10/26/2018 116
Security 82% of Security Pros Fear Hackers Using AI to Attack Their Company (Artificial Intelligence, AI Being Used by Hackers) TechRepublic 10/26/2018 116
Data 3 Steps to Improve The Quality of Your Organization's Data (Data Improvement) TechRepublic 10/26/2018 116
Security Six Tips to Stop Phishing Attacks (Phishing Stop Tips) SC Magazine 10/26/2018 116
Compliance The Privacy Professional: A Modern Day Renaissance Man (GDPR, Renaissance Man & Privacy) SC Magazine 10/26/2018 116
Security Bridging the Cybersecurity Skills Gap Through Artificial Intelligence (Skills Gap) SC Magazine 10/26/2018 116
Technology Spinning the Light: The World's Smallest Optical Gyroscope (Smallest Gyroscope) Science Daily 10/26/2018 116
Data Artificial Intelligence Controls Quantum Computers (Quantum Computers and AI) Science Daily 10/26/2018 116
Technology What's the IoT Doing to Your Data Center? Network World 10/26/2018 116
Management Top Data and Analytics Risks that Will Concern Audit Executives in 2019 (Auditor Concerns About Data) HelpNet Security 10/26/2018 116
Cloud Securing Serverless: Defend or Attack? (Best Defense) Dark Reading 10/26/2018 116
Operations 10 Must-Have Skills for ITSM Pros (ITSM Skills) CIO 10/26/2018 116
Cloud Cloud Smart: Practical Considerations on Where To Focus (Smart Considerations) GCN 10/26/2018 116
Bit bucket Scientists Develop Cell-Sized Robots to Seek Out Disease While Floating In the Bloodstream v3 co uk 10/25/2018 117
Operations Edge Data Centers (White Paper) TIA 10/25/2018 117
Bit bucket 20 Most Important Tech Inventions of the Past 100 Years TechRepublic 10/25/2018 117
Technology Quantum Computing: A Cheat Sheet TechRepublic 10/25/2018 117
Connectivity One Simple Change in Fiber Optics Could Boost Your Internet Speed by 100x TechRepublic 10/25/2018 117
Cloud Hybrid Cloud: A Cheat Sheet TechRepublic 10/25/2018 117
Administration How to Detect Hardware-Based Server Bugs TechRepublic 10/25/2018 117
Connectivity 10 Things Your Next Firewall Must Do (White Paper) Palo Alto Networks 10/25/2018 117
Operations The Importance of Hyper-Availability for Critical Infrastructure Networks Asia 10/25/2018 117
Management Winning Board Presentations for CIOs InformationWeek 10/25/2018 117
Management Bridging the IT Talent Gap: Find Scarce Experts Informationweek 10/25/2018 117
Security Insiders are Still the Greatest Security Threat Facing Most Organizations Information Management 10/25/2018 117
Management AI, Cybersecurity Top CIO List of Most Disruptive Technologies (Artificial Intelligence) Digital Insurance 10/25/2018 117
Storage The State of Software-Defined Storage, Hyperconverged and Cloud Storage (White Paper) DataCore Software 10/25/2018 117
Storage Storage Availability, Vendor Lock-In Remain Pain Points for IT Pros Channel Partners 10/25/2018 117
Operations Software-Defined Data Center - Get The Most Out of Today's Infrastructure (White Paper) IBM 10/25/2018 117
Security The Five News Headlines You Don't Want to Be About YOUR Organization (White Paper) Juniper Networks 10/25/2018 117
Connectivity The Inmates Have Taken Over the Asylum: DNS Godfather Blasts DNS Over HTTPS Adoption (RFC 8484) The Register 10/24/2018 118
Bit bucket The 25 most Underappreciated Science Fiction/Fantasy Characters TechRepublic 10/24/2018 118
Security Why It's Pivotal to Relook Cybersecurity with a Security-First Approach Networks Asia 10/24/2018 118
Data Real-Time Social Media Location Data Used to Predict Crime IT News 10/24/2018 118
Security Giving CISOs The Tools to Measure and Improve Password Security Information Management 10/24/2018 118
Management Giving CISOs The Tools to Measure and Improve Password Security Information Management 10/24/2018 118
Security How Science can Fight Insider Threats HelpNet Security 10/24/2018 118
Security Good Times in Security Come When You Least Expect Them Dark Reading 10/24/2018 118
Connectivity With 5G, You Won't Just be Watching Video. It'll Be Watching You, Too cnet 10/24/2018 118
Administration Why It's Important to Assign User Rights Business 2 Community 10/24/2018 118
Data Do You Really Need Online Data Backups? (White Paper) Enterprise Technology Services 10/24/2018 118
Technology How Rants On Social Media Can Come Back to Haunt You Science Daily 10/23/2018 119
Operations Wave Energy to Power Undersea Data Centers Network World 10/23/2018 119
Security What's Luck Got To Do With Cybersecurity Networks Asia 10/23/2018 119
Compliance Privacy as a Business Practice (GDPR) Networks Asia 10/23/2018 119
Cloud The Forced March to Cloud Computing InfoWorld 10/23/2018 119
Technology The Coming Wave of Regulation over Facial Recognition Informationweek 10/23/2018 119
Security How to Make the CFO Your Best Cybersecurity Friend HelpNet Security 10/23/2018 119
Management 10 Tech Predictions for 2019 Digital Insurance 10/23/2018 119
Security Understanding SOCs' 4 Top Deficiencies Dark Reading 10/23/2018 119
Security Blockchain Developer Salaries Now Command As Much as $175K ComputerWorld 10/23/2018 119
Technology Congress Takes First Steps Toward Regulating Artificial Intelligence GCN 10/23/2018 119
Data Start The Long Journey To AI Gains Now, Or Risk Missing Out On The Benefits (Artificial Intelligence) IT World Canada 10/22/2018 120
Connectivity What is WiGig, and How is It Different from Wi-Fi 6? How To Geek 10/22/2018 120
Management Seven Key Digital Disruptions CIOs May not Seeing Coming HelpNet Security 10/22/2018 120
Data A Data Protection System Plus Management Creates Value, Risk Search Data Backup 10/22/2018 120
Storage How Do Secondary Storage and Primary Storage Differ? Search Data Backup 10/22/2018 120
Security When Cybersecurity Capabilities are Paid for, But Untapped GCN 10/22/2018 120
Security In Cybersecurity, the A.I. Debate is 'How', Not 'If' (Artificial Intelligence) SC Magazine 10/20/2018 122
Connectivity Roadmap for Quantum Internet Development Science Daily 10/20/2018 122
Security Computer Security: Preventing Attacks Made Possible by Meltdown/Spectre Science Daily 10/20/2018 122
Storage Tape vs. Disk Storage: Why isn't Tape Dead Yet? Network World 10/20/2018 122
Operations Uptime Institute Issues a Weather Warning for Data Centers Network World 10/20/2018 122
Connectivity What to Look for in a Network Monitoring Application NetworkComputing 10/20/2018 122
Connectivity The Network Automation Paradox: Why People are Key to Its Success NetworkComputing 10/20/2018 122
Devops Devops Is Mandatory for Multicloud Deployments InfoWorld 10/20/2018 122
Cloud Devops Is Mandatory for Multicloud Deployments InfoWorld 10/20/2018 122
Data How TiDB Combines OLTP and OLAP in a Distributed Database InfoWorld 10/20/2018 122
Management Amazon's HR Gaffe Demonstrates Important Points InformationWeek 10/20/2018 122
Security Weighing the Pros and Cons of Data Security Outsourcing Information Management 10/20/2018 122
Data Weighing the Pros and Cons of Data Security Outsourcing Information Management 10/20/2018 122
Data I'm Sorry, Dave: 9 Real Times AI Has Given Us the Creeps (Artificial Intelligence) ZDnet 10/19/2018 123
Compliance Ding Ding! Round Two: Second Annual Review for Transatlantic Data Flow Deal Privacy Shield The Register 10/19/2018 123
Operations 20 Innovative Data Centers That Give Us A Glimpse Into the Future of Computing TechRepublic 10/19/2018 123
Management CIOs Watch Out: Here are 7 Disruptions You Might Not See Coming TechRepublic 10/19/2018 123
Technology First Proof of Quantum Computer Advantage Science Daily 10/19/2018 123
Data The Big Problem of Small Data: A New Approach Science Daily 10/19/2018 123
Data Conquering the Five Deadly Data Sins Networks Asia 10/19/2018 123
Security Australia's Encryption-Busting Bill Also after PINs, Passwords IT News 10/19/2018 123
Connectivity How 5G Pits Big Carriers and Government Against Small Towns cnet 10/19/2018 123
Security How to Protect Your Company from Getting Hacked Business 2 Community 10/19/2018 123
Data What 5 Skills Should a Disaster Recovery Team Leader Have? Search Disaster Recovery 10/18/2018 124
Data Inline Deduplication vs. Post-Processing: Data Dedupe Best Practices Search Data Backup 10/18/2018 124
Data Data Backup Planning: 10 Best Practices for Protection Search Data Backup 10/18/2018 124
Bit bucket Supermassive Black Holes and Supercomputers Science Daily 10/17/2018 125
Cloud Why Switch to the Cloud? Networks Asia 10/17/2018 125
Management 10 Top Strategic Predictions for 2019 InformationWeek 10/17/2018 125
Cloud Avoiding Reputational Risk When Moving To the Cloud Data Center Dynamics 10/17/2018 125
Connectivity 5G is Almost a Reality. Here's What It'll Really Feel Like cnet 10/17/2018 125
Storage The Future of the Cloud Depends on Magnetic Tape Bloomberg 10/17/2018 125
Cloud The Future of the Cloud Depends on Magnetic Tape Bloomberg 10/17/2018 125
Security Prepping Your SIEM Architecture for the Future Search Security 10/17/2018 125
Data Can Common Sense Be Built into AI? (Artificial Intelligence) GCN 10/17/2018 125
Management Don't Wait For a Lawsuit to Close Your Pay Gaps TLNT 10/16/2018 126
Security How to Train Your Employees to Avoid Online Scams: 5 Tips TechRepublic 10/16/2018 126
Technology Here Are the 10 Top Tech Trends You Need to Understand Right Now TechRepublic 10/16/2018 126
Cloud What Is a Private Cloud? (and Some Things That It's Not) Network World 10/16/2018 126
Data Does China Have the Answer To Closing the AI Skills Gap? (Artificial Intelligence) Networks Asia 10/16/2018 126
Cloud Steel Yourself for the Cloud Hangover InfoWorld 10/16/2018 126
Cloud Solving the Cloud Infrastructure Misconfiguration Problem HelpNet Security 10/16/2018 126
Technology Spies Among Us: Tracking, IoT & the Truly Inside Threat Dark Reading 10/16/2018 126
Security Spies Among Us: Tracking, IoT & the Truly Inside Threat Dark Reading 10/16/2018 126
Security 6 Reasons Why Employees Violate Security Policies Dark Reading 10/16/2018 126
Security Tackling Privileged-Access Security GCN 10/16/2018 126
Technology IoT Security: Follow These Rules to Protect Your Users from Hackers, Gadget Makers Told ZDnet 10/15/2018 127
Bit bucket The 51 Coolest Laptop Stickers of All Time TechRepublic 10/15/2018 127
Connectivity Security Vulnerabilities in Terahertz Data Links Science Daily 10/15/2018 127
Technology Lift Off for World-First Ultrasound Levitation that Bends Around Barriers Science Daily 10/15/2018 127