IT Weekly

NEWSLETTER

Mar 24, 2019


Every week we bring you more than 40+ relevant online sources that contain articles of interest to IT and DC Professionals at all levels
Header


Browse by Technology
Browse by Year

Header

Header

Header
Category Articles From 2019 Source Posted Date Age
Technology The Enterprise Prepares for IoT (Preparing for IoT) NetworkComputing 03/24/2019 New
Connectivity Zero Trust is Not Enough: The Case for Intent-Based Segmentation (Zero Trust is Not Enough) NetworkComputing 03/24/2019 New
Security Security Lessons from My Game Closet (Lesson's from Old Board Games) Dark Reading 03/24/2019 New
Bit bucket These Are Shark Tank's Greatest Tech Successes ... and Flops (Shark Tank Flips & Flops) TechRepublic 03/23/2019 New
Data The Next Stage of Intent Data – Part 1 (Intent Data – Part 1) Business 2 Community 03/23/2019 New
Data What is Machine Learning? (What is Machine Learning) Business 2 Community 03/23/2019 New
Storage Flash Storage: A Cheat Sheet (Cheat Sheet for Flash) TechRepublic 03/22/2019 New
Management 3 Ways Businesses Can Help Project Managers Succeed (Helping PMs Succeed, Project Management, PMTQ) TechRepublic 03/22/2019 New
Data Unlocking the Real Value of Data (Unlocking Value) Networks Asia 03/22/2019 New
Security It’s Early for Artificial Intelligence in ICS Cybersecurity (Too Early for Cyber AI, Incident Command System, ICS) IoT World Today 03/22/2019 New
Management 7 Disruptions CIOs Need to Watch (Disruptive Technologies) InformationWeek 03/22/2019 New
Data Lead with Purpose: Data, Analytics Cultural Challenges (Analytic Challenges) InformationWeek 03/22/2019 New
Security Businesses Have Cybersecurity Best Practice Guidelines But Fail in Practice (Best Practices - Theory vs Reality) HelpNet Security 03/22/2019 New
Security Hacker AI vs. Enterprise AI: A New Threat (Artificial Intelligence: Hacker vs Enterprise) Dark Reading 03/22/2019 New
Security TLS 1.3: A Good News/Bad News Scenario (TLS 1.3: Good News/Bad Encryption News) Dark Reading 03/22/2019 New
Operations Cloud Based Backup vs Physical On-Site Backup (Cloud Based vs On-Site Backups) Business 2 Community 03/22/2019 New
Security Why 91% of IT And Security Pros Fear Insider Threats (91% Fear Insider Threats) TechRepublic 03/21/2019 New
Connectivity 5G Will Impact These 10 Industries the Most (Industries Impacted by 5G) TechRepublic 03/21/2019 New
Management 4 Reasons to Offer Interns Full-Time Jobs, and 3 Ways to Make Sure They Want to Accept (Why Hiring Interns is Grea) TechRepublic 03/21/2019 New
Technology Toilet Seat that Detects Congestive Heart Failure Getting Ready to Begin Commercialization (IoT Toilet Seat Monitors Heart Failure) Science Daily 03/21/2019 New
Security Distributed Denial Of Service Threats: Risks, Mitigation, and Best Practices (Distributed Denial Of Service Threats, White Paper) Cisco Sytems 03/21/2019 New
Devops 6 Ways Mature DevOps Teams Are Killing It in Security (Mature DevOps Teams Are Hitting Home Runs in Security) Dark Reading 03/21/2019 New
Technology IBM Demos Quantum Leap in Artificial Intelligence (Quantum Leap in Artificial Intelligence, Machine Learning) ComputerWeekly 03/21/2019 New
Security What is Zero Trust Identity Security? How Can You Implement It? (What is Zero Trust Identity) Solutions Review 03/21/2019 New
Connectivity Predictive Networks: How Realistic are They? (Predictive Networks) Search Networking 03/21/2019 New
Data Big Data Adoption Exploding, But Companies Struggle to Extract Meaningful Information (Companies Struggling with Meaningful Big Data) TechRepublic 03/20/2019 4
Cloud Public Cloud: Real-World Examples of Strategic Success (Real-World Examples of Public Cloud Success) Networks Asia 03/20/2019 4
Management Who's Responsible When IT Goes Awry? (Where Does the Buck Stop) InformationWeek 03/20/2019 4
Technology Success With the IoT Starts With Understanding 'Thing Management' (IoT Starts with 'Thing Management') Information Management 03/20/2019 4
Technology The 8 Biggest IoT Security Mistakes and How to Avoid Them (IoT Security Mistakes, White Paper) Praetorian 03/20/2019 4
Operations Relationship Between Virtualization & HCI, White Paper Hitachi 03/20/2019 4
Devops DevOps Done Right (DevOps Done Right, White Paper) New Relic 03/20/2019 4
Cloud 3 Common Multi-Cloud Challenges – and How to Solve Them (Multi-Cloud Challenges, White Paper) BT 03/20/2019 4
Storage How Lasers are Changing Hard Drive Technology (Laser HDD for 40TB) Information Age 03/20/2019 4
Operations The Complete Guide To IT Monitoring (IT Monitoring Guide, White Paper) TechWorld 03/20/2019 4
Management Boeing 737 Max: Software Patches can Only Do So Much (Software Can't Fix a Bad Design) ZDnet 03/19/2019 5
Connectivity Selling 5G Needs Steak, Not just Sizzle (Talk About Real 5G) The Register 03/19/2019 5
Connectivity Overhyped 5G is Being 'Rushed', Britain's Top Comms Boffin Reckons (5G Is Not Ready, Massive MIMO, M-MIMO) The Register 03/19/2019 5
Management How Managers can Prevent Developer Burnout: 10 Tips (Preventing Burnout) TechRepublic 03/19/2019 5
Security DDoS Attacks on the Rise: Largest Attack Ever Hit 1.7 Tb/second (1.7 Tb/second DDoS Attacks) TechRepublic 03/19/2019 5
Security Nine Essential Elements for a Strong Privileged Account Management Strategy (Privileged Account Management Strategy, PAM) Networks Asia 03/19/2019 5
Technology The Race to Exascale: A Story of Superpowers and Supercomputers (Exascale Race Is On) Data Center Dynamics 03/19/2019 5
Security Top 5 Must-Learn Cybersecurity Courses and Certifications (Top Certifications) CBR 03/19/2019 5
Connectivity What's the Difference Between Network Availability and Reliability? (Availability vs Reliability) Search Networking 03/19/2019 5
Connectivity What Are the 3 Most Common Network Issues to Troubleshoot? (3 Common Issues To Troubleshoot) Search Networking 03/19/2019 5
Management IT Predictions and Anti-Predictions for 2019: Networking, Security, Cloud Communications (Predictions and Anti-Predictions for 2019, White Paper) Masergy 03/19/2019 5
Bit bucket UK Code Breakers Release Enigma War Machine Simulator (Enigma War Machine Simulator, Bombe, Typex, Turing, Bletchley Park) ZDnet 03/18/2019 6
Security What To Include in an Enterprise Cybersecurity Plan (Cybersecurity Plan) TechRepublic 03/18/2019 6
Operations Top 5 Data Recovery Tips (Data Recovery Tips, Backup, Disaster Recovery, BU, DR) TechRepublic 03/18/2019 6
Data Why Cybersecurity Alone is Not Enough to Protect Private Data (Cybersecurity Alone is Not Enough) TechRadar 03/18/2019 6
Security A New Privacy Constitution for Facebook (What Facebook Needs To Do) Schneier on Security 03/18/2019 6
Management Does Experience Equal Competency? (Project Management Competency) PMWorld 360 03/18/2019 6
Data Not spending on AI yet? Don’t worry, you probably will (Artificial Intelligence WILL become a Budget Item) IT World Canada 03/18/2019 6
Cloud Tips to Protect Your User Experience During Cloud Migration (Protecting Users During Migration) Information Management 03/18/2019 6
Security Anomaly Detection Techniques: Defining Normal (Define Normal for Anomaly Detection) Dark Reading 03/18/2019 6
Security 7 Low-Cost Security Tools (Low-Cost Tools) Dark Reading 03/18/2019 6
Cloud The 12 Worst Serverless Security Risks (Worst Serverless Security Risks) Dark Reading 03/18/2019 6
Data 19 Data and Analytics Predictions Through 2025 (Analytics Predictions Through 2025) Business 2 Community 03/18/2019 6
Connectivity Take Steps Now To Ready Your Network For 802.11ax Specification (Getting Read for 802.11ax) Search Networking 03/18/2019 6
Connectivity 3 Developing 5G Trends That Differentiate it from 4G LTE (Differentiating 5G from 4G LTE) Search Networking 03/18/2019 6
Connectivity Wi-Fi 6: How does OFDMA work? (What is OFDMA) Search Networking 03/18/2019 6
Connectivity What 4 Questions Can Help Prepare Your Network for IoT? (Preparing For IoT) Search Networking 03/18/2019 6
Storage Top 8 Reasons For LTO-8 Technology (LTO-8 Benefits) Ultrium LTO 03/18/2019 6
Management How Continuous Monitoring is Revolutionizing Risk Management (Revolutionizing Risk Management, White Paper) BitSight Technologies 03/18/2019 6
Management How IT Must Adapt to the Office of the Future (Adapting to f the Future) ToolBox 03/18/2019 6
Data What the Heck is Time-Series Data (and Why Do I Need a Time-Series Database)? (What is a Time-Series Database, TSDB, ) TimeScale 03/18/2019 6
Bit bucket Researchers Eye Huge Supply of Rare-Earth Elements From Mining Waste (Rare Earth Elements from Mining Waste. REE) Science Daily 03/17/2019 7
Technology Reversing the Flow of Time On a Quantum Computer (Reversing Time) Science Daily 03/17/2019 7
Connectivity The 5G Future Will Be Powered By AI (Artificial Intelligence Will Power 5G) NetworkComputing 03/17/2019 7
Management How to Find a Qualified Developer in a Hurry (Hiring Qualified Developer Quickly) InformationWeek 03/17/2019 7
Security The Quantum Sea Change: Navigating the Impacts for Cryptography (Impact Of Quantum Encryption) HelpNet Security 03/17/2019 7
Security Ransomware's New Normal (New Normal for Ransomware) Dark Reading 03/17/2019 7
Security 4 Reasons to Take an 'Inside Out' View of Security (Reasons to Take an 'Inside Out' View) Dark Reading 03/17/2019 7
Connectivity Six Degrees of Network Security (Common Network Security Pitfalls, Infographic PDF) Cisco Sytems 03/17/2019 7
Cloud Survey: Cloud Monitoring, Management Tools Come Up Short (Management & Monitoring Tools Come Up Short) Networks Asia 03/15/2019 9
Management 9 Ways To Address the IT Retirement Boom (Address the IT Retirement Boom) CIO 03/15/2019 9
Operations Data Backup & Recovery – Back Up Critical Business Data (Back Up Critical Business Data) Business 2 Community 03/15/2019 9
Connectivity Hands On: Broadcast Analysis of UPNP and SSDP Packets (Tuning UPNP and SSDP Packets) NetworkComputing 03/14/2019 10
Management 4 Ways to Keep Employees from Quitting (Reduce Turnover) TechRepublic 03/13/2019 11
Bit bucket The Ups and Downs of Sit-Stand Desks (Pros & Cons of Sit-Stand Desks) Science Daily 03/13/2019 11
Data How Intelligent is Artificial Intelligence? (Is AI Really Intelligent) Science Daily 03/13/2019 11
Management CIO Survey Shows Shifts in IT Leadership Role (CIO Role Changing) InformationWeek 03/13/2019 11
Data 5 Steps to Performing an Effective Data Security Risk Assessment (Performing a Security Risk Assessment) Information Management 03/13/2019 11
Data 5 Steps to Performing an Effective Data Security Risk Assessment (Performing a Security Risk Assessment) Information Management 03/13/2019 11
Operations 4 Business Continuity Planning Essentials (Business Continuity Essentials, White Paper) Datto 03/13/2019 11
Operations Backup vs. Business Continuity (Backup vs. Business Continuity, White Paper) Datto 03/13/2019 11
Operations The Do's and Don'ts of Establishing SLAs (Establishing a Service Level Agreement, White Paper) ConnectWise 03/13/2019 11
Cloud The Biggest Cloud Security Challenges Enterprises Face (Biggest Cloud Security Challenges) TechRepublic 03/12/2019 12
Security Quantum Computing: The Biggest Cybersecurity Threats (Quantum Threats, RSA Key, Quantum Key Distribution) TechRepublic 03/12/2019 12
Security When Will AI Become A Reality In Security? (When Will Artificial Intelligence Become Real) Security InfoWatch 03/12/2019 12
Cloud Real Words or Buzzwords?: Fog Computing (Fog Computing Explained) Security InfoWatch 03/12/2019 12
Technology One Step Closer to a Clock That Could Replace GPS and Galileo (Portable Atomic Clock for GPS, Laser Cavity Soliton) Science Daily 03/12/2019 12
Data A Robotic Leg, Born Without Prior Knowledge, Learns to Walk (Artificial Intelligence Learns to Walk) Science Daily 03/12/2019 12
Cloud Juggling Cloud Security Pros and Cons has CIOs Looking to Managed Services (Juggling Security Pros and Cons, MSP, Hybrid) Networks Asia 03/12/2019 12
Security IT Managers Can’t Ignore Endpoints because Most Cyberattacks Start There (Most Attacks Start Here) HelpNet Security 03/12/2019 12
Administration The Reality of Container Escapes (Container Escapes) HelpNet Security 03/12/2019 12
Security 3 Places Security Teams are Wasting Time (Time Wasting Areas) Dark Reading 03/12/2019 12
Compliance Software Compliance Risks in the Age of Digital Transformation (Software Risks, SAM, EULA) Business 2 Community 03/12/2019 12
Operations Best IT Infrastructure Monitoring Tools in 2019 (Best Monitoring Tools) Business 2 Community 03/12/2019 12
Devops The Complete Guide to: DevOps (DevOps Complete Guide, White Paper) TechWorld 03/12/2019 12
Cloud Cloud Native – Design, Delivery and Management of Applications (Cloud Native Management) Cloud Tweaks 03/12/2019 12
Security How CISOs Can Gain a Better Understanding of Their Cybersecurity Attack Surface (Understanding Your Attack Surface) TechRepublic 03/11/2019 13
Security Top-Clicked Phishing Subject Lines (Top-Phishing Lines) KnowBe4 03/11/2019 13
Security The Impact 0f Spear Phishing On Organizations and How to Combat This Growing Threat (Spear Phishing Impact) HelpNet Security 03/11/2019 13
Security Cybersecurity Skills Gap Worsens, Security Teams are Understaffed (Skills Gap Worsens) HelpNet Security 03/11/2019 13
Bit bucket Why No One Hears what You’re Really Saying (Listening is Complicated) Fast Company 03/11/2019 13
Data Business Leaders Love AI -- in Theory (Artificial Intelligence- Reality vs Theory) Digital Insurance 03/11/2019 13
Devops NetOps vs. DevOps vs. NetSecOps: What's the difference? (NetOps vs. DevOps vs. NetSecOps) Search Networking 03/11/2019 13
Connectivity Use The Right Performance Monitoring Strategy for Automated Networks (Automated Networks Monitoring Strategy) Search Networking 03/11/2019 13
Connectivity The Switch to 400 Gbe May Be Closer Than You Think (400 GbE May be Close) Search Networking 03/11/2019 13
Technology This Year, Cellular Changes Forever (Cellular Changes Coming) GCN 03/11/2019 13
Security That Marketing Email Database that Exposed 809 Million Contact Records? Maybe Make that Two-BILLION-Plus (Closer to Two BILLION-Plus Exposed) The Register 03/10/2019 13
Connectivity If You Plan on Installing a Ton of Smarthome Devices, Skip Wi-Fi (Wi-Fi Has Limits for Smarthomes, Wi-Fi 6, Z-Wave, ZigBee) How To Geek 03/10/2019 13
Technology Putting Qubits to Work and Play (Quantum Computers Explained) TechRepublic 03/09/2019 14
Connectivity Wi-Fi 6 is Coming: It’s Not Too Early to Plan for 802.11ax (Start Planning for Wi-Fi 6) NetworkComputing 03/09/2019 14
Operations Introduction to Composable Infrastructure and its Use Cases (Intro to Composable Infrastructure) NetworkComputing 03/09/2019 14
Management It's Time to Rethink Your Vendor Questionnaire (Vendor Questionnaire) Dark Reading 03/09/2019 14
Technology 6 Questions to Ask While Buying a Connected Car (Connected Car Questions) Dark Reading 03/09/2019 14
Security Facebook's Two-Factor Authentication Puts Security and Privacy at Odds (Facebook and Privacy at Odds) cnet 03/09/2019 14
Operations What is SAM Maturity and How Do You Measure It? (SAM Maturity, Software Asset Management) Business 2 Community 03/09/2019 14
Bit bucket Top 5 Resume Mistakes to Avoid (Resume Mistakes) TechRepublic 03/08/2019 15
Administration 6 Critical Factors to Consider When Deploying Containers (Container Deployment Factors, Containers) TechRepublic 03/08/2019 15
Connectivity 5G Cybersecurity Concerns and Physical Challenges: What You Need to Know (5G Concerns and Challenges) TechRepublic 03/08/2019 15
Connectivity Unlocking the Untapped Potential of Light in Optical Communications (Unlocking Lights Potential) Science Daily 03/08/2019 15
Bit bucket A Slice of Pi History: How π Took Over The World (History of Pi) Poplular Mechanics 03/08/2019 15
Management A Beginner’s Guide to Project Management Offices (PMOs) (Beginner’s Guide to PMOs) PMWorld 360 03/08/2019 15
Compliance 9 Ways Insurers Can Prep for New Privacy Laws (Prepare for Privacy Laws) Digital Insurance 03/08/2019 15
Security Debunking 5 Myths About Zero Trust Security (Zero Trust Security Myths) Dark Reading 03/08/2019 15
Cloud Cutting Costs in 2019 Can Be as Easy as Moving to a Cloud (Cost Cutting) Business 2 Community 03/08/2019 15
Management How to Overcome the Risk of Overcorrecting (Overcome Overcorrecting) TechRepublic 03/07/2019 16
Compliance 3 Ways To Manage Regulatory and Compliance Changes (Managing Changes) TechRepublic 03/07/2019 16
Technology 1 + 1 Does Not Equal 2 for Graphene-Like 2D Materials (1 + 1 # 2 for Graphene) Science Daily 03/07/2019 16
Bit bucket Can Entangled Qubits Be Used to Probe Black Holes? (Probing Black Holes with Qubits, Quantum Computing) Science Daily 03/07/2019 16
Connectivity A Practical Approach to IBN and Improved IT Automation (Practical Approach to IBN) NetworkComputing 03/07/2019 16
Management Data Points: 5 Technology Executives Share the Metrics They Can’t Ignore (Can't Ignore Metrics) IT World Canada 03/07/2019 16
Devops Q&A: DevOps Institute’s Jayne Groll on the Future of DevOps (Future of DevOps) InformationWekk 03/07/2019 16
Storage Caching vs Tiering with Storage Class Memory and NVMe – A Tale of Two Systems (Tale of Two Systems: Caching vs Tiering) DCIG 03/07/2019 16
Security To Improve Security, We Must Focus on Its People (Focus on People for Improvement) Dark Reading 03/07/2019 16
Data Augmented Analytics Tools, NLP Search, Graph are Trending (Augmented Analytics Trending) Search Business Analytics 03/07/2019 16
Technology What is the IIoT? Everything you Need to Know about the Industrial Internet of Things (IIoT Explained) ZDnet 03/06/2019 17
Security How to Make People Sit Up and Use 2-Factor Authorization (MFA - Risk Communication Is Key) The Register 03/06/2019 17
Connectivity 5G is 'Ready' Once You Redefine 'Ready'... And Then Redefine 'Reality' (5G - Minimum of 18 Months of Debugging) The Register 03/06/2019 17
Storage Western Digital Sees Storage Sun Rise In NVMe Land... and Slowly Set on SATA, SAS SSDs (Slow Goodbye to SATA, SAS SSDs) The Register 03/06/2019 17
Connectivity 10 Enterprise Network Mistakes That Open the Door to Hackers (Network Mistakes that Open the Doors) TechRepublic 03/06/2019 17
Security What is a Botnet? And Why They Aren't Going Away Anytime Soon (Why Aren't Botnets Going Away) Networks Asia 03/06/2019 17
Cloud The Ugly Truth About Cloud Computing In the Enterprise (Lack of Strategy is the Ugly Truth) Networks Asia 03/06/2019 17
Operations Three Cabling Factors that Affect Data Centre Deployment (Deployment Cabling Factors) Networks Asia 03/06/2019 17
Management How CIOs Can Influence the Board (Influencing the Board, BoD, Board of Directors) InformationWekk 03/06/2019 17
Security IoT Automation Platforms Open Smart Buildings to New Threats (Building Threats from IoT) HelpNet Security 03/06/2019 17
Management A CEO Cheat Sheet For The Cybersecurity Big One (CEO Security Cheat Sheet) Forbes 03/06/2019 17
Bit bucket Consumers Care About Privacy, but Not Enough to Act on It (Consumers Don't Really Care about Privacy) Dark Reading 03/06/2019 17
Technology Google, Microsoft, Amazon Race for Augmented-Reality Glasses (The Race for AR Glasses) ToolBox 03/06/2019 17
Connectivity USB-IF Announces USB4 with Native Thunderbolt at 40Gbps Transfers (USB4 With Native 40Gbps) The Inquirer 03/05/2019 18
Devops 7 Must-Have Skills for Enterprise DevOps Practitioners (Must Have Enterprise Skills) TechRepublic 03/05/2019 18
Security 3 Reasons Businesses Are Still Failing at Strong Cybersecurity (Businesses Still Failing at Cybersecurity) TechRepublic 03/05/2019 18
Storage Why RAID Systems Dangerous and Why You Should Stop Using Them, According to WD (RAID No Longer the Choice) Storage Newsletter 03/05/2019 18
Storage Transforming Magnetic Storage (Ultrafast Magnetic Storage Devices, Femtomagnetism) Science Daily 03/05/2019 18
Connectivity SD-WAN: Yes, It's a Revolution Alright (SD-WAN:Revolution) No Jitter 03/05/2019 18
Connectivity Cisco Log Tip (Cisco Log Tip) NetworkDataPedia 03/05/2019 18
Security SSL/TLS-Based Data Security Threats Are On the Rise (SSL/TLS Threats Rising) Information Management 03/05/2019 18
Devops The Patterns of Elite DevSecOps Practices (DevSecOps Practices Patterns) HelpNet Security 03/05/2019 18
Storage All-Flash vs. Hybrid Flash – Choosing What's Right for You (Flash vs. Hybrid Flash) Data Center Knowledge 03/05/2019 18
Security Blockchain White Paper (Blockchain White Paper) National Archives 03/05/2019 18
Connectivity WPA3 Protocol: Should Enterprises Implement the Changes? (Should You Implement WPA3)) Search Security 03/05/2019 18
Technology Smartphones Replicate 3D Objects for Virtual Reality (3D VR from Smartphone) GCN 03/05/2019 18
Technology Want A Foldable Phone? Hold Out for Real Glass (Needed Glass for Foldable Phone) Wired 03/04/2019 19
Cloud A Multi-Cloud Approach – What’s In It for Me? (Multi-Cloud Approach) IT World Canada 03/04/2019 19
Data 9 Steps Organizations Can Take to Get Ahead Of New Data Privacy Laws (Stay Ahead of Privacy Laws) Information Management 03/04/2019 19
Management 3 Things Every CIO Should Know Before They Migrate to the Cloud (Before You Migrate to the Cloud) Digital Insurance 03/04/2019 19
Operations Lithium-Ion Batteries Offer A Definitive, Sustainable and Cost-Effective Advantage for UPS (Lithium-Ion Batteries for UPS, Li-ion) Data Center Dynamics 03/04/2019 19
Security Here's What Happened When a SOC Embraced Automation (SOC Embraces Automation) Dark Reading 03/04/2019 19
Security Security Experts, Not Users, Are the Weakest Link (Experts Are the Weakest Link) Dark Reading 03/04/2019 19
Management The First 100 Days of the New CISO: Expectations vs. Reality (CISOs First 100 Days) Business 2 Community 03/04/2019 19
Connectivity Network Operating System Advantages Extend to White Box Switching (White Box Network Operating Systems, NOS, Open Apis) Search Networking 03/04/2019 19
Connectivity What Are the Pros And Cons of Machine Learning In Network Security? (Security Pros and Cons of Machine Learning) Search Networking 03/04/2019 19
Security Encryption Offers Safe Haven for Criminals and Malware (Encryption Provides Safe Refuge of Bad Guys) Dark Reading 03/03/2019 20
Cloud Security Pros Agree: Cloud Adoption Outpaces Security (Adoption Outpacing Security) Dark Reading 03/03/2019 20
Technology 6 Major Challenges Foldable Phones Need to Overcome to Prove They're Not a Fad (Foldable Phone Challenges) Mashable 03/03/2019 20
Technology Moving Closer to Practical Photonic Quantum Computing (One Step Closer to Practical Quantum Computing) Science Daily 03/01/2019 22
Bit bucket Hiding Black Hole Found (Black Hole Found) Science Daily 03/01/2019 22
Data Is Dark Data Putting Your Business at Risk? (Dark Data Risk) IT Web 03/01/2019 22
Data The Future of AI in America: What All Leaders Should Consider (The Future of Artificial Intelligence) InformationWeek 03/01/2019 22
Security Enterprises Are Blind to Over Half Of Malware Sent to Their Employees (Employers Blind to 50% of Malware) HelpNet Security 03/01/2019 22
Cloud Survey: Most Companies are Failing at Cloud Cost Management (Cost Control Failure) Data Center Knowledge 03/01/2019 22
Security Solving Security: Repetition or Redundancy? (Examine Strengths and Weaknesses) Dark Reading 03/01/2019 22
Management The Caregivers Among You Need Help (Your Employees are Caregivers Too) TLNT 03/01/2019 22
Operations Safeguarding Hardware from Cyberattack (Safeguarding HW) Science Daily 02/28/2019 23
Technology Universal Entangler For New Quantum Tech (Quantum Universal Entangler) Science Daily 02/28/2019 23
Technology Immunizing Quantum Computers Against Errors (Immunizing Quantum Computers) Science Daily 02/28/2019 23
Cloud Don’t Forget the Distance When Looking Up to the Clouds (Proximity is Important) Networks Asia 02/28/2019 23
Management How to Become a Master Scrum Master (Becoming a Master Scrum Master) InformationWeek 02/28/2019 23
Connectivity What Are USB Gen 1, Gen 2, and Gen 2×2? (Know the Difference in USB Connections, USB Gen 1, USB Gen 2, and USB Gen 2×2, USB SuperSpeed) How To Geek 02/28/2019 23
Storage What are NVMe Drives, and Should You Buy One? (NVMe Drives) How To Geek 02/28/2019 23
Operations The New Need to Create a Secondary Perimeter to Detect for Malware’s Presence (Backups and Malware Perimeter Protection) DCIG 02/28/2019 23
Connectivity Do Smart Network Cards Have a Future Outside the Hyperscale Data Center? (The Future of SmartNICs, Smart NICs) Data Center Knowledge 02/28/2019 23
Management CTO? Why Updating Your Backup Strategy Should Be on Your 2019 to-Do List (Strategy Backups for CTO Consideration) Continuity Central 02/28/2019 23
Compliance The Right to Be Forgotten Versus the Need to Backup (Backup and the Right to Be Forgotten, GDPR, CCPS AB 375) Continuity Central 02/28/2019 23
Cloud Avoid Turbulence When Shifting to Data Analytics In the Cloud (Avoid Turbulence When Migrating Analytics) Search Business Analytics 02/28/2019 23
Security Payroll Provider Gives Extortionists a Payday (Paying Ransomware As Last Resort) Krebs on Security 02/28/2019 23
Technology Get Ready for USB 3.2: Super-Fast 20Gbps Transfer Speeds But Tons of Confusion (Confusion Surrounds USB3.2, USB3.1, USB3.0, USB-IF, USB Gen 2x2) ZDnet 02/27/2019 24
Administration Containers, Explained (Containers Explained) PC Magazine 02/27/2019 24
Data Trends That Will Rule Data Protection in 2019 (Protection Trends in 2019) Networks Asia 02/27/2019 24
Security Firms Not Taking Privileged Access Management Seriously Enough, Says Vendor Report (Privileged Access Management is a Problem, PAM) IT World Canada 02/27/2019 24
Data Your Future Requires You to Define Your Real Master Data (Define Your Real Master Data) Information Management 02/27/2019 24
Cloud Security Is Battling to Keep Pace with Cloud Adoption (Security Battling to Keep Pace) ComputerWeekly 02/27/2019 24
Data Why Datafication is Key for the Organisation of Tomorrow (Datafication is Key for Tomorrow, MDM) Mark van Rijmenam 02/27/2019 24
Security How AI Cybersecurity Thwarts Attacks -- and How Hackers Fight Back (Artificial Intelligence and Hackers) Search CIO 02/27/2019 24
Compliance US Legal Eagle: Well Done, You Bought Privacy Compliance Tools. Doesn't Mean You Comply with Anything (Tools Don't Mean Compliant) The Register 02/26/2019 25
Security 5 Ways to Avoid Top Malware Threats (Avoiding Top Malware Threats) TechRepublic 02/26/2019 25
Cloud Checklist for a Successful Cloud UCC Implementation (Successful UCC Implementation) No Jitter 02/26/2019 25
Connectivity Survey Says: 5G Developments Vary (5G Deployments Varied) No Jitter 02/26/2019 25
Security Should Organizations Consider Enhancing Security With an MSSP? (Time for MSSP Assistance) Networks Asia 02/26/2019 25
Security Removing the Cyber Criminal’s Mask of Anonymity (Removing the Mask of Anonymity) Networks Asia 02/26/2019 25
Compliance 7 Ways the New California Privacy Law Will Impact All Organizations (Impact of California Privacy Law, CCPS AB 375) Information Management 02/26/2019 25
Connectivity What Is DHCP (Dynamic Host Configuration Protocol)? (What Is DHCP) How To Geek 02/26/2019 25
Technology Most IoT Devices are Being Compromised by Exploiting Rudimentary Vulnerabilities (IoT Compromised by Exploiting Rudimentary Vulnerabilities) HelpNet Security 02/26/2019 25
Management RLI CIO Bryan Fowler on Insurtech, Cloud (CIO Interview on Priorities) Digital Insurance 02/26/2019 25
Security The Business Value of Software Security Updates (Value of Software Updates) Business 2 Community 02/26/2019 25
Devops 4 Must-Have DevOps Tools in 2019 (Must-Have Tools) Business 2 Community 02/26/2019 25
Management The Executive’s Practical Guide to Thriving In the Face of Evolving Cyber Risks (Practical Guide to Evolving Cyber Risks, White Paper, Free E-Book) Kip Boyle 02/26/2019 25
Security Why IoT Devices Pose a Bigger Cybersecurity Risk Than Most Realize (IoT Poses Huge Problems) ZDnet 02/25/2019 26
Cloud Containers May Be Leading to Cloud Computing Cost Overruns (Containers Leading to Cost Overruns) ZDnet 02/25/2019 26
Data Artificial Intelligence: You Know it Isn't Real, Yeah? (AI Isn't Real) The Register 02/25/2019 26
Cloud Exponential Growth of SaaS Deployment Exposes Hidden Vulnerabilities (SaaS Hidden Vulnerabilities) Information Management 02/25/2019 26
Security Accidental Data Breaches are Often Compounded By a Failure to Encrypt (Breaches Often By a Failure to Encrypt, Encryption) HelpNet Security 02/25/2019 26
Connectivity 6 Tips for Getting the Most from Your VPN (VPN Tips) Dark Reading 02/25/2019 26
Security Can Quantum Key Distribution Secure The Grid? (Quantum Key Distribution, QKD, Encryption) FCW 02/25/2019 26
Management The Complete Guide to the Biggest Tech Trends in 2019 (2019 Tech Trends, White Paper) TechWorld 02/25/2019 26
Technology The Top 10 Alternatives to the Apple Watch (Apple Watch Alternatives) TechRepublic 02/24/2019 27
Security To Mitigate Advanced Threats, Put People Ahead of Tech (People First Tech Second) Dark Reading 02/24/2019 27
Management What is Change Management? (Change Management) PMWorld 360 02/22/2019 29
Operations Why Disk Beat Tape In the Backup Wars (Disc Beats Tape for Backup) Network World 02/22/2019 29
Management No One-Size-Fits-All Competencies for Project Management (No One-Size-Fits-All for Project Managers, PM, OPM) IT Web 02/22/2019 29
Compliance How and Why the Data Privacy Mandate is Expanding (Privacy is Expanding) Information Management 02/22/2019 29
Security 92% of Organizations Rank Users as Their Primary Security Concern (Users Are Primary Security Concern) HelpNet Security 02/22/2019 29
Data 10 Top Data and Analytics Trends for 2019 (Top 2019 Analytic Trends) Digital Insurance 02/22/2019 29
Security Why Cybersecurity Burnout Is Real and What to Do About It (Burnout Is Real) Dark Reading 02/22/2019 29
Management Why Agency Holding Companies Need to Standardize Their Software (Standardizing Software) Business 2 Community 02/22/2019 29
Cloud Estimate Cloud Computing Costs Prior to App Migration (Pre Migration App Cost Estimate) Search Cloud Computing 02/22/2019 29
Devops Containers, Cloud Orchestration Tools Rattle DevOps Foundation (Undermining the Foundation) Search Cloud Computing 02/22/2019 29
Operations Evaluating Backup Bandwidth with a Portable Wan Emulator (Evaluating Backup Bandwidth) NetworkComputing 02/21/2019 30
Cloud Searching for a Cloud-Native App Strategy Amid the Chaos (Maintaining Order Amid the Chaos) InformationWeek 02/21/2019 30
Data AI is Not Magic – It’s Time to Demystify and Apply (Demystify, Experiment and Apply Artificial Intelligence) InformationWekk 02/21/2019 30
Security Security Spills: 9 Problems Causing the Most Stress (9 of the Most Frustrating Problems) Dark Reading 02/21/2019 30
Security Security Leaders Are Fallible, Too (Leaders are not Infallible) Dark Reading 02/21/2019 30
Management Strategies for Developing the Reluctant Rising Star and the Expectant Executive (Developing the Reluctant Rising Star) TLNT 02/20/2019 31
Security How is Cybersecurity Changing Ii the Mobile and Cloud-First World (Changes In the Mobile and Cloud-World) TechWorld 02/20/2019 31
Bit bucket 10 Soft Skills Tech Pros Need to Land a Job (Important Soft Skills) TechRepublic 02/20/2019 31
Technology In The Blink of an Eye: Team Uses Quantum of Light to Create New Quantum Simulator (Using Quantum's Superposition Principle) Science Daily 02/20/2019 31
Bit bucket New Therapeutic Approach to Treating Osteoarthritis (New Osteoarthritis Treatment) Science Daily 02/20/2019 31
Technology tor Graphene-Based Electronics (Breakthrough In Graphene-Based Electronics) Science Daily 02/20/2019 31
Management There is No Greater Currency Than Trust (Trust Is the Best Currency) Networks Asia 02/20/2019 31
Cloud Serverless: The future Of Cloud Computing? (The Future is Serverless) Networks Asia 02/20/2019 31
Management AI, Cloud, and Security are Top Priorities for Enterprise Legal Departments (Legal Departments Top Priorities, Artificial Intelligence) Networks Asia 02/20/2019 31
Security Should There Be ‘Safe Harbor’ Against Data-Breach Lawsuits? (Data Breach Safe Harbors) Data Center Knowledge 02/20/2019 31
Data Data is the New Oil: Five Reasons That’s Not Necessarily a Good Thing (Data is the New Oil) Data Center Knowledge 02/20/2019 31
Security AI and ML: Harnessing the Next Big Thing in Information Security (Harnessing AI & ML, Artificial Intelligence, Machine Learning) ToolBox 02/20/2019 31
Security You Have Around 20 Minutes to Contain a Russian APT Attack (20 Minutes to Contain a Russian APT Attack) ZDnet 02/19/2019 32
Storage Number of HDDs Shipped Worldwide From 1976 to 2018 (HDD Shipments for the Last 42 Years) Storage Newsletter 02/19/2019 32
Security Removing the Cyber Criminal’s Mask of Anonymity (Removing Criminal’s Anonymity) Networks Asia 02/19/2019 32
Management Project Prospects: A Systems View of Risk (Project Management View of Risk) IT World Canada 02/19/2019 32
Security Indicators of Poor Password Hygiene Exposed (Poor Password Hygiene) HelpNet Security 02/19/2019 32
Management Privacy Ops: The New Nexus for CISOs & DPOs (Privacy Ops for CISOs & DPOs) Dark Reading 02/19/2019 32
Management Take Your Best Practices and Shove Them . . . Into the Trashcan (Throw Your Best Practices in the Trash) Business 2 Community 02/19/2019 32
Data Are You Throwing Money Away? (Video Surveillance Data Collection) Security Today 02/19/2019 32
Data Worried About Your Data Security? Consider Hardware-Based Encryption (Hardware-Based Encryption) ToolBox 02/19/2019 32
Management As Your Company Evolves, So Should Your Values (Growth Means Values Evolve) TLNT 02/18/2019 33
Technology The Complete Guide to: Drones (Drone Guide, White Paper) TechWorld 02/18/2019 33
Security Most Businesses Aren't Ready For Generation 6 Cyberthreats (Are You Ready for Gen 6 Threats) Networks Asia 02/18/2019 33
Storage Unstructured Data and Its Storage Needs (Unstructured Needs) ComputerWeekly 02/18/2019 33
Operations 5 Crucial Multi-Cloud Disaster Recovery Principles (Crucial Multi-Cloud DR Principles) Search Disaster Recovery 02/18/2019 33
Technology Autonomous Cars Are Not Ready for Public Deployment (Autonomous Cars Not Ready, Self Driving Cars) TechRepublic 02/16/2019 35
Connectivity Low-Power WANs Energize High-Priority Applications (Low-Power WANs, LoRaWAN, LoRa, 5G) NetworkComputing 02/16/2019 35
Cloud Private Cloud 3.0 is Here (Cloud 3.0 Arrives, Cloud 1.0, Cloud 2.0)) IT Web 02/16/2019 35
Management Three Reasons Employee Monitoring Software is Making A Comeback (Why Employee Monitoring is Reviving) HelpNet Security 02/16/2019 35
Security Post-Quantum Crypto Standards Aren’t All About the Math (Quantum Crypto Standards, Encryption) Dark Reading 02/16/2019 35
Compliance How GDPR Affects Background Checking (Background Checking & GDPR) TLNT 02/15/2019 36
Data Big Data, IoT Will Drive World's Data To Grow 5X By 2025 (5X Growth Fueled By IoT TechRepublic 02/15/2019 36
Management Cybersecurity Mental Health Warning -- 1 In 6 CISOs Now Medicate or Use Alcohol (CISOs Self Medicating to Cope) Forbes 02/15/2019 36
Security Security Orchestration and Incident Response (Orchestration and Incident Response, White Paper) TechRepublic 02/15/2019 36
Management What to Do When Your Project Manager Isn't Performing (Poor Performing Project Manager) TechRepublic 02/14/2019 37
Management Why IT's Image Needs a Makeover (Time for a Makeover) TechRepublic 02/14/2019 37
Management Four Skills CISOs Should Develop to Succeed In 2019 (CISO Must Have Skills) Networks Asia 02/14/2019 37
Connectivity 2019: The Dawn of 5G (5G Coming of Age, 4G Evo, 5GCN) Networks Asia 02/14/2019 37
Security Most Companies Anticipate a Critical Breach In 2019, CISOs Need to Prioritize Threats (Prioritize Threats) HelpNet Security 02/14/2019 37
Cloud Tips to Selecting the Best Cloud Backup Solution (Selecting Backup Solutions) DCIG 02/14/2019 37
Operations The Next Milestone: Quantum Data Centers (Quantum Data Centers) Data Center Dynamics 02/14/2019 37
Operations DRaaS Benefits that Make Ditching Traditional DR Worth it (Switching to DRaaS) Search Disaster Recovery 02/14/2019 37
Storage After 1 to 6, New RAID Level, PentaRAID, From Start-Up Xoralgo (Beyond RAID 6 & 7) Storage Newsletter 02/13/2019 38
Technology Questions in Quantum Computing: How to Move Electrons with Light (Moving Electrons With Light) Science Daily 02/13/2019 38
Compliance Navigating the Digital Landscape Beyond Data Protection Regulations (Beyond Data Protection Regulations, GDPR) Networks Asia 02/13/2019 38
Cloud Tightening the Belt on Excess Spending for Cloud (Tighten the Belt on Excess Spending) InformationWeek 02/13/2019 38
Operations Devastating Cyberattack on Email Provider Destroys 18 Years of Data (18 Years of Data Destroyed in Cyberattack) Dark Reading 02/13/2019 38
Storage Cloud and Backup Top Storage Priorities for 2019 (2019 Top Priorities: Cloud & Backup) ComputerWeekly 02/13/2019 38
Technology We Spoke To Neuroscientists About the Future of Brain-Computer Interfaces (Brain-Computer Interfaces) TechWorld 02/12/2019 39
Management Management Lessons from the Super Bowl (Super Bowl Lessons) TechRepublic 02/12/2019 39
Operations Data Center Glossary: 12 Terms You Should know (Glossary Terms) TechRepublic 02/12/2019 39
Technology Engineers Develop Room Temperature, Two-Dimensional Platform for Quantum Technology (Room Temperature Quantum Technology) Science Daily 02/12/2019 39
Cloud You Have a Multi-Cloud Environment -- Now What? (Multi-Cloud Environment -- Now What?) No Jitter 02/12/2019 39
Management Prepare for Fourth Industrial Revolution Tech (Fourth Industrial Revolution Preparation, 4IR) InformationWekk 02/12/2019 39
Security Is 2019 the Year National Privacy Law is Established in the US? (US National Privacy Law In 2019, CCPA, GDPR) HelpNet Security 02/12/2019 39
Bit bucket 15 Top-Paying IT Certifications for 2019 (Top paying Certifications) Global Knowledge 02/12/2019 39
Administration Container Bug Allows Attackers to Gain Root Access on Host Machine (Container Bug) Data Center Knowledge 02/12/2019 39
Technology IBM's AI Loses Debate to a Human, But It's Got Worlds to Conquer (Artificial Intelligence Debates with Human) cnet 02/12/2019 39
Operations Dos and Don'ts When Working In a Data Center (Cabling Dos and Don'ts) Cabling Installation & Maintenance 02/12/2019 39
Security Advanced Customer Verification – Are You Ready For That? (Customer Verification, SCA, PSD2, 3DS 2.0) Business 2 Community 02/12/2019 39
Administration 5 Ways to Get Started with Container Optimization for Automation and Cost Savings (Container Optimization) Business 2 Community 02/12/2019 39
Cloud 5 Best Ways to Minimize Cloud Scaling Costs (Minimize Scaling Costs) Search Cloud Computing 02/12/2019 39
Management An IT Leader’s Biggest Pain Points in the Next 3 Years (3 Year Pain Points) ToolBox 02/12/2019 39
Security Weather the Security Storms Ahead by Knowing Your Data (Know Your Data to Weather a Storm) Networks Asia 02/11/2019 40
Security How Can We Improve Adoption and ROI on Security Investments? (Improve Adoption and ROI on Investments) HelpNet Security 02/11/2019 40
Security 6 Reasons to Be Wary of Encryption in Your Enterprise (Reasons to Be Wary of Encryption) Dark Reading 02/11/2019 40
Connectivity 8 Common Questions About the New Wi-Fi 6 Standard (Wi-Fi 6 Questions) and Answers) Search Networking 02/11/2019 40
Devops 7 Essential Best Practices to Follow When Adopting a DevOps Model (Essential Best Practices for Adoption) SD Times 02/11/2019 40
Data Can Developers make AI’s “Black Box” Transparent? (Making Artificial Intelligence “Black Box” Transparent) SD Times 02/11/2019 40
Storage The High Cost of Data Center Clutter (High Cost of Storage Clutter) Data Center Knowledge 02/10/2019 41
Management Four Things Every CEO Should Know About Cybersecurity (4 Things Every CEO Should Know About Security) CSO Online 02/10/2019 41
Technology New Phenomenon Discovered That Fixes a Common Problem in Lasers: Wavelength Splitting (Correcting Laser Wavelength Splitting) Science Daily 02/09/2019 42
Connectivity SQL Packet Analysis Using Dynamic Baselining (SQL Packet Analysis) NetworkComputing 02/09/2019 42
Cloud Identifying Cloud Migraines before Migration (Identifying Migration Migraines) NetworkComputing 02/09/2019 42
Security We Need More Transparency in Cybersecurity (More Transparency Needed) Dark Reading 02/09/2019 42
Security Large Firms: What Role for the Group CISO? (Large Firms CISO Role) Business 2 Community 02/09/2019 42
Technology Top 10 Ways Internet of Things and Blockchain Strengthen Supply Chains (IoT & Blockchain Strengthen Supply Chains) Business 2 Community 02/09/2019 42
Management 3 Steps to Creating a Project Portfolio Roadmap (Creating a Project Roadmap) PMWorld 360 02/08/2019 43
Management What is Project Management? (What is Project Management) PMWorld 360 02/08/2019 43
Cloud More Data and Cloud for IT Demands in 2019 (More in 2019) Networks Asia 02/08/2019 43
Security Weak Passwords, Poor Web Code Among Vulnerabilities that Help Pen Testers (Vulnerabilities that Help Pen Testers, Penetration Test) IT World Canada 02/08/2019 43
Data Data Can Make or Break an Organization (Unlocking the Power) IT World Canada 02/08/2019 43
Management Now It's Time for the Hybrid IT Worker (Time for Hybrid IT Workers) InformationWeek 02/08/2019 43
Security Best Practices for Thwarting DNS Hijacking Attacks (Thwarting DNS Hijacking Attacks) Information Management 02/08/2019 43
Security Here’s What Cybersecurity Experts Worry About this Year (Top Worries this Year) Data Center Knowledge 02/08/2019 43
Security Ransomware Attack Via MSP Locks Customers Out of Systems (Ransomware Attack Via MSP) Dark Reading 02/08/2019 43
Bit bucket Five Things to Consider Before Buying LED Bulbs (LED vs Incandescent Lumen Comparison) cnet 02/08/2019 43
Cloud Future Trends in Cloud Computing All Point to Optimization (Optimization is the Future Trend) Business 2 Community 02/08/2019 43
Technology 5 Tips for Successful IoT App Development (Successful IoT App Tips) Business 2 Community 02/08/2019 43
Operations Developer Search Prompts a Migration to Microservices (Migration to Microservices) Search Microservices 02/08/2019 43
Technology Top 5 Ways to Avoid Notification Stress (Avoiding Notification Stress) TechRepublic 02/07/2019 44
Cloud $14.1 Billion in Cloud Spending to be Wasted in 2019 ($14.1 Billion Wasted) ParkMyCloud 02/07/2019 44
Cloud Is Public Cloud for Everyone? (Anyone For Public) Networks Asia 02/07/2019 44
Connectivity 4 Trends Driving Accelerated SD-WAN Adoption (SD-WAN Adoption Accelerating) NetworkComputing 02/07/2019 44
Technology The Problem with Vulnerable IoT Companion Apps (IoT Companion App Vulnerabilities) HelpNet Security 02/07/2019 44
Storage Number of Appliances Dedicated to Deduplicating Backup Data Shrinks even as Data Universe Expands (Deduplicating Appliances Shrinking) DCIG 02/07/2019 44
Security 4 Practical Questions to Ask Before Investing in AI (Artificial Intelligence Security Questions) Dark Reading 02/07/2019 44
Security Best Practices for Choosing Good Security Questions (Security Questions Best Practices) Business 2 Community 02/07/2019 44
Operations Disaster Recovery Plan: How to Ensure Business Continuity (Ensuring Business Continuity) Business 2 Community 02/07/2019 44
Data Big Data Processing Could Be the Way All Data is Processed (The Way All Data Could Be Processed) Search IT Operations 02/07/2019 44
Operations Data Backup Types Explained: Full, Incremental, Differential and More (Backup Types Explained) Search Data Backup 02/07/2019 44
Cloud Implement Cloud Failover, Replication For Workload Protection (Implement Cloud Failover) Search Cloud Computing 02/07/2019 44
Data Prepping the Enterprise for the AI Apocalypse (Artificial Intelligence Apocalypse) InformationWeek 02/06/2019 45
Cloud Mitigating the Security Risks of Cloud-Native Applications (Container Security & Compliance Challenges) Dark Reading 02/06/2019 45
Management Building an Effective Computer Security Incident Response Team (Building An Effective CSIRT Team) Continuity Central 02/06/2019 45
Cloud Protecting Your Data in Public Cloud Services (Protecting Your Data In Public) Continuity Central 02/06/2019 45
Bit bucket The CRISPR Machines that Can Wipe Out Entire Species (The Ethics of CRISPR) cnet 02/06/2019 45
Administration Troubleshooting Application Issues - SQL Server (Troubleshooting SQL Server) Profitap 02/06/2019 45
Bit bucket How to Make Your Tech Resume More Appealing to Hiring Managers (Appealing Resumes) TechRepublic 02/05/2019 46
Security Why Vaporworms Might Be the Scourge Of 2019 (The Scourge of Vaporworms) HelpNet Security 02/05/2019 46
Connectivity Researchers Devise New Method of Intrusion Deception for SDN (New Intrusion Deception for Storage Defined Networks) Dark Reading 02/05/2019 46
Security IoT Security's Coming of Age Is Overdue (Coming of Age for IoT Security) Dark Reading 02/05/2019 46
Operations The Intent Data is In: Backup is Making a Comeback (Comeback of Backup) Business 2 Community 02/05/2019 46
Devops Strive for Real-World Technical Debt Management in DevOps Orgs (Technical Debt Management) Search IT Operations 02/05/2019 46
Management Keep IT Project Planning On Track with 5 Principles (Principles of Project Planning, Project Management) Search IT Operations 02/05/2019 46
Security Quantum Supremacy and the Path to Encryption Chaos (Quantum Encryption Chaos) Search IT Operations 02/05/2019 46
Connectivity 5G's Biggest Challenge Is Making Sure It Actually Works as Promised (Making Sure 5G Works) Mashable 02/05/2019 46
Compliance Bill Package Looks to Strengthen Data Protections in California (California to Strengthen Data Protections, AB 288) Government Technology 02/05/2019 46
Security $145 Million Funds Frozen After Death of Cryptocurrency Exchange Admin ($145 Million Cryptocurrency Funds Frozen) ZDnet 02/04/2019 47
Security Investigation or Exasperation? The State of Security Operations (Investigation or Exasperation?, White Paper) IDC 02/04/2019 47
Management How Two Agencies Handled Expired Credentials After Historic Shutdown (Handling Expired Credentials After a Shutdown) NextGov 02/04/2019 47
Cloud More Data and Cloud for IT Demands In 2019 (More Data and Cloud) Networks Asia 02/04/2019 47
Technology Bluetooth 5.1’s Presence Detection Could Be the Future of Smarthome (Smarthome Future is Bluetooth 5.1) How To Geek 02/04/2019 47
Security 7 Privacy Mistakes That Keep Security Pros on Their Toes (Privacy Mistakes) Dark Reading 02/04/2019 47
Security Access Control Lists: 6 Key Principles to Keep in Mind (ACL Key Principles) Dark Reading 02/04/2019 47
Data Differentiate Intent Data Analysis with Advanced Analytics (Differentiate Intent and Advanced Analytics) Business 2 Community 02/04/2019 47
Storage Key Steps to Destroy an SSD and Protect Your Data (Secure SSD Disposal) Search Storage 02/04/2019 47
Devops Why Teams Create DevOps Platforms To Match Projects (Creating DevOps Platforms) Search IT Operations 02/04/2019 47
Operations Business Continuity Policy (Defining BC Policy) Search Disaster Recovery 02/04/2019 47
Security Beware: Internet-Facing Printers Targeted by Hacking Attacks (Targeting Internet Facing Printers) ToolBox 02/04/2019 47
Data Before AI Is A Human Right, Shouldn't We Make It Work First? (Getting Artificial Intelligence to Work First) TechRepublic 02/02/2019 49
Connectivity CDNs Evolve: Four Trends to Watch in 2019 (CDN Trends, Content Delivery Networks) NetworkComputing 02/02/2019 49
Security KISS, Cyber & the Humble but Nourishing Chickpea (KISS & the Chickpea) Dark Reading 02/02/2019 49
Technology Selling Fake Followers and Likes Is Illegal, Landmark Settlement Finds (Selling Fake Followers Is Illegal) cnet 02/02/2019 49
Data Using Customer Data to Benefit and Not Abuse Them (Use Don't Abuse Customer Data) Business 2 Community 02/02/2019 49
Management Data Breach Insurance: A Three-Part Problem (Problems with Data Breach Insurance) IAPP 02/02/2019 49
Technology Facebook Hires Up Three of Its Biggest Privacy Critics (Facebook Getting Serious About Privacy) Wired 02/01/2019 50
Management Leaders Need Grit, But It’s Not Enough for Success (Grit is Not Enough for Success) TLNT 02/01/2019 50
Security Security Crisis at the Network Edge (Crisis at the Edge) IT Web 02/01/2019 50
Security Who Is Responsible for IOT Security? (Who Owns IoT Security) IT Web 02/01/2019 50
Management When Marketers Run Technology, Where Does IT Fit? (Marketing and IT) InformationWeek 02/01/2019 50
Compliance How Organizations Need To React To New Data Privacy Challenges (Data Privacy Challenges) Information Management 02/01/2019 50
Security 8 Cybersecurity Myths Debunked (Debunking Myths) Dark Reading 02/01/2019 50
Technology 5 Steps To A New IoT Support Strategy (Support Strategy for IoT) TechRepublic 01/31/2019 51
Technology Taking Ethical Action In Identity: 5 Steps For Better Biometrics (Better Biometrics Ethics) HelpNet Security 01/31/2019 51
Administration Leading Hyperconverged Infrastructure Solutions Diverge Over QoS (HCI Solutions Diverge Over QoS) DCIG 01/31/2019 51
Cloud Rubrik Data Leak is Another Cloud Misconfiguration Horror Story (Misconfigured Server Horror Story) Dark Reading 01/31/2019 51
Security Massive DDoS Attack Generates 500 Million Packets per Second (500 Million Attack Packets per Second) Dark Reading 01/31/2019 51
Devops How to Use 9 Cloud DevOps Best Practices For Cost Control (Best Practices for Cloud Cost Control) Business 2 Community 01/31/2019 51
Technology Court's Biometrics Ruling Poses Risk to Technology Companies (Biometrics Legal Setback, BIPA, Facial Recognition, Fingerprints) Security Today 01/31/2019 51
Operations Disaster Recovery Procedures Deserve Daily Attention (Daily Attention to DR) Search IT Operations 01/31/2019 51
Operations How To Ensure A Secure Disaster Recovery Operation (Disaster Recovery Security) Search Disaster Recovery 01/31/2019 51
Technology Can You Trust the Personal Internet of Things? (Personal IoT Trust) ZDnet 01/30/2019 52
Management CIO, IT Roles Poised for a Revolution (Prepare for a Revolution) InformationWeek 01/30/2019 52
Cloud Cloud Migration Opportunities to Be Aware of in 2019 (2019 Migration Opportunities) InformationWeek 01/30/2019 52
Security The Biggest Cybersecurity Challenge? Communicating Threats Internally (Internal Communications is Biggest Challenge) HelpNet Security 01/30/2019 52
Cloud Enterprises are Struggling with Cloud Complexity and Security (Struggling with Complexity and Security) HelpNet Security 01/30/2019 52
Bit bucket The Workplace Implications of the Impostor Phenomenon (Impostor Phenomenon) Portman Partners 01/30/2019 52
Data 5 Keys for Eliminating Data Silos (Eliminate Data Silos) ToolBox 01/30/2019 52
Connectivity The 5G Skills Gap: What Does Government Need? (5G Skills Gap) GCN 01/30/2019 52
Cloud Study: Most Cloud Attacks are Opportunistic (Opportunistic Attacks) GCN 01/30/2019 52
Operations Computing Steps Closer to the Network's Edge (Closer to the Network's Edge) GCN 01/30/2019 52
Cloud How to Become a Cloud Engineer: A Cheat Sheet (Cheat Sheet for Becoming a Cloud Engineer) TechRepublic 01/29/2019 53
Security Defending Against Cyberattacks by Giving Attackers 'False Hope' (Defense by Pretense, Artificial Intelligence) Science Daily 01/29/2019 53
Connectivity Speed of Light: Toward a Future Quantum Internet (Toward a Quantum Internet) Science Daily 01/29/2019 53
Data Weather the Security Storms Ahead By Knowing Your Data (Know Your Data) Networks Asia 01/29/2019 53
Technology Stepping Up Security for an IoT World (Stepping Up IoT Security) Networks Asia 01/29/2019 53
Security The Importance of Formal Verification in Smart Contracts (Formal Verification in Smart Contracts, Cryptocurrency) Networks Asia 01/29/2019 53
Compliance 13 Questions You Need to Ask to Close The Information Governance Gap (Information Governance Questions) Information Management 01/29/2019 53
Technology How Do Foldable Phones Work, And When Will I Get One? (Foldable Phones) How To Geek 01/29/2019 53
Compliance 3 Ways Companies Mess Up GDPR Compliance the Most (How to Mess Up GDPR) Dark Reading 01/29/2019 53
Security Why Privacy Is Hard Work (Privacy is Hard Work) Dark Reading 01/29/2019 53
Bit bucket US Law Enforcement Shuts Down Massive Marketplace for Compromised Servers (Massive Dark Marketplace Shutdown) Dark Reading 01/29/2019 53
Administration Application Container Security Guide (Container Security Guide, White Paper) NIST 01/29/2019 53
Cloud Rise of Multicloud: 58% of Businesses Using Combination of AWS, Azure, or Google Cloud (Rise of Multicloud) TechRepublic 01/28/2019 54
Data 6 Ways Data Analytics Are Advancing The Enterprise (Analytics Advancing The Enterprise, Artificial Intelligence, Machine Learning) TechRepublic 01/28/2019 54
Security 5 Ways to Enforce Company Security (Enforce Company Security) TechRepublic 01/28/2019 54
Storage The State of Software-Defined Storage, Hyperconverged and Cloud Storage (State of SDS, White Paper) DataCore Software 01/28/2019 54
Management The 5 Stages of CISO Success, Past & Future (5 CISO Stages from Past Lessons) Dark Reading 01/28/2019 54
Security Internet Society to Issue Privacy Code of Conduct (Privacy Code of Conduct) Dark Reading 01/28/2019 54
Security 5 Security Vulnerabilities That Leave The Protectors Unprotected (5 Security Vulnerabilities) Executive Channel Magazine 01/28/2019 54
Security Hackers Are Still Using Cloud Services to Mask Attack Origin and Build False Trust (Building False Trust with the Cloud) TechRepublic 01/27/2019 55
Technology Breakthrough Reported in Fabricating Nanochips (Nanochips Fabrication Breakthrough) Science Daily 01/27/2019 55
Security Did Australia Hurt Phone Security Around the World? (Australian Encryption Backdoor Law) NY Times 01/27/2019 55
Operations Why Serverless is Set to Grow in 2019 (Serverless Set to Grow, FaaS) NetworkComputing 01/27/2019 55
Devops A New Breed of IT Pro: The Hybrid Engineer (New Breed of IT Pro, DevOps) NetworkComputing 01/27/2019 55
Data In an AI World, Drop the Idea that Empathy is Feminine (Empathy in an Artificial Intelligence World) InformationWeek 01/27/2019 55
Data What You Need to Know About Augmented Analytics (Augmented Analytics) InformationWeek 01/27/2019 55
Bit bucket What Are the Different Self-Driving Car “Levels” of Autonomy? (Different Self-Driving Car Levels) How To Geek 01/27/2019 55
Data Finding Structure in an Unstructured Data World (Structure in an Unstructured World) Data Center Knowledge 01/27/2019 55
Compliance Maximizing the Value of Your Data Privacy Investments (Fewer Breaches at GDPR-Ready Firms, White Paper) Cisco Sytems 01/27/2019 55
Technology IoT Made Easy: 6 Options for Local Government (IoT Made Easy) GCN 01/27/2019 55
Cloud In Wake of Snowden, U.S. Cloud Providers Face Calls to Wall Off Data IT World 01/27/2019 55
Technology Do Crypto-Currencies Fuel Ransomware? (Crypto-Currencies Fueling Ransomware?, White Paper) IEEE 01/25/2019 57
Devops Why Developers and DevOps Pros Spend Most of Their Days Troubleshooting (Troubleshooting : One of Top Three Daily Tasks) TechRepublic 01/24/2019 58
Cloud Security Is the No. 1 IT Barrier to Cloud and SaaS Adoption (No. 1 IT Barrier) TechRepublic 01/24/2019 58
Security Phishing and Spearphishing: A Cheat Sheet For Business Professionals (Phishing and Spearphishing Cheat Sheet) TechRepublic 01/24/2019 58
Management 3 Enterprise Cybersecurity Trends CISOs Must Pay Attention To (Enterprise Cybersecurity Trends) TechRepublic 01/24/2019 58
Administration 10 Ways for System Admins to Remain Relevant (Skills To Remain Relevant, System Administrator, Sys Admins, Sysadmins) TechRepublic 01/24/2019 58
Connectivity Why 56% of Large Businesses Are Turning to SDN for Cybersecurity (Cybersecurity via SDN) Networks Asia 01/24/2019 58
Connectivity Considerations for the Use of 5G in the Enterprise (5G Considerations) NetworkComputing 01/24/2019 58
Technology Could Blockchain be the Key to Securing IoT? (Securing IoT with Blockchain) NetworkComputing 01/24/2019 58
Data Three Critical Data Considerations for IoT Analytics Success (IoT Analytic Considerations) Information Management 01/24/2019 58
Data 6 Top Analytics Trends and How to Act On Them (Top Analytics Trends) Information Management 01/24/2019 58
Storage The Early Implications of NVMe/TCP on Ethernet Network Designs (NVMe/TCP on Network Designs) DCIG 01/24/2019 58
Management Think Twice Before Paying a Ransom (Paying Ransom NOT the Best Response, Ransomware, Cryptocurrency) Dark Reading 01/24/2019 58
Security Rushing to Patch? Here's How to Prioritize Your Security Efforts (Prioritize Patches TechRepublic 01/23/2019 59
Management How to Be a More Efficient Leader: 5 Tips (Tips to Become an Efficient Leader, Leadership) TechRepublic 01/23/2019 59
Management How Intel Closed the Gender Pay Gap for Employees Worldwide (Intel Closes Gender Pay Gap Worldwide) TechRepublic 01/23/2019 59
Technology Promising Steps Towards Large Scale Production of Graphene Nanoribbons for Electronics (Graphene Nanoribbons) Science Daily 01/23/2019 59
Operations Edge Computing Best Practices (Best Practices for Edge Computing) Networks Asia 01/23/2019 59
Devops CISOs Provide Tips for Protecting Privileged Access In DevOps, Cloud Environments (Tips for Cloud Environments) Networks Asia 01/23/2019 59
Cloud Cloud Container Services Comparison (Comparing Container Services, AWS Container Service, Azure Container Services, Google Container Services) Business 2 Community 01/23/2019 59
Operations 5 Ways to Reduce Downtime with Proactive IT Maintenance (Proactive IT Maintenance Reduces Downtime) Business 2 Community 01/23/2019 59
Security Why We Need To Rip Off The Cybersecurity Band-Aids (Rip Off the Band-Aids) ITProPortal 01/22/2019 60
Management 4 Governance Warning Signs When Reviewing Presented Analytics (Beware Sweetened Data Presentations) Information Management 01/22/2019 60
Security Agents of Disruption: Four Testing Topics Argue the Case for Agentless Security (The Case For Agentless Security) HelpNet Security 01/22/2019 60
Security 2018's Most Common Vulnerabilities Include Issues New and Old (Most Common Vulnerabilities in 2018) Dark Reading 01/22/2019 60
Cloud Shadow IT, IaaS & the Security Imperative (Cloud Infrastructure Imperatives, Cloud Security) Dark Reading 01/22/2019 60
Administration Best Practices for Container Security (Container Security Guide, Containers, White Paper) Alert Logic 01/22/2019 60
Security What's Next for Mainframe Security? (Mainframe Threats, Mainframes) GCN 01/22/2019 60
Cloud In Cloud Security, Automation does *Not* Mean Automatic (Automation Does *Not* Mean Automatic Security, Cloud Security) GCN 01/22/2019 60
Technology 4 Brands That Realize the Potential of Augmented Reality (AR Implementations) Advertising Week 01/22/2019 60
Bit bucket Attitude Isn’t Everything, But It Is a ‘Difference Maker’ (Is Attitude A Difference Maker) TLNT 01/21/2019 61
Bit bucket Photos: The Best Smart Office Tech at CES 2019 (CES 2019 Office Tech Photos) TechRepublic 01/21/2019 61
Administration How to Connect to VNC Using SSH (VNC Using SSH) TechRepublic 01/21/2019 61
Connectivity How Different Platforms Will Impact the Growth Of 5G (5G Platform Impact) TechRepublic 01/21/2019 61
Security 5 Blockchain Trends to Expect In 2019 (Blockchain Trends) TechRepublic 01/21/2019 61
Connectivity A New Low-Latency Congestion Control for Cellular Networks (Cellular Low-Latency Congestion Control) Science Daily 01/21/2019 61
Management Stress Advancement Opportunities And Work-Life Balance To Lure Top Data Talent (Luring Top Data Talent) Information Management 01/21/2019 61
Cloud Beware The Man In The Cloud: How To Protect Against A New Breed Of Cyberattack (Beware The Man In The Cloud Cyberattack, MitC) HelpNet Security 01/21/2019 61
Administration What's The Difference Between Type 1 And Type 2 Hypervisors? (Type 1 vs Type 2 Hypervisors) Search Server Virtualization 01/21/2019 61
Data Gartner's Top Data and Analytics Predicts for 2019 (Predictions for Data and Analytics) Gartner 01/21/2019 61
Operations A Pragmatic Approach to Automation (Automaton Pragmatism) NetworkComputing 01/20/2019 62
Technology How to Secure Edge Computing in an Industrial IoT Network (IoT Edge Security) NetworkComputing 01/20/2019 62
Security Police Can't Force You to Unlock Your Phone By Iris, Face or Finger (Fifth Amendment Protection for Mobile Devices0 TechRepublic 01/19/2019 63
Compliance The Rx for HIPAA Compliance in the Cloud (HIPAA In the Cloud) Dark Reading 01/19/2019 63
Devops PCI Council Releases New Software Framework for DevOps Era (PCI Council Releases New SW, PA-DSS) Dark Reading 01/19/2019 63
Management What Makes a Great IT Leader? (Qualities of a Great Leader) Business 2 Community 01/19/2019 63
Security Why Vendor Security Practices are Causing Heartburn for Enterprise Pros (Heartburn From Vendor Practices) TechRepublic 01/18/2019 64
Compliance 4 Ways to Prepare for GDPR And Similar Privacy Regulations (Prepare for GDPR and Similar) TechRepublic 01/18/2019 64
Security 4 Strategies For Your IT Wearables Policy (Wearables Policy, Smartwatches, Smart Glasses, Wearable Scanners) TechRepublic 01/18/2019 64
Security 'We Want IoT Security Regulation,' Say 95% of IT Decision-Makers (IoT Security Regulations Needed Dark Reading 01/18/2019 64
Cloud Top 10 Public Cloud Security Recommendations (Top Public Cloud Recommendations, White Paper) Palo Alto Networks 01/18/2019 64
Bit bucket The Race To Create A Real-Life Star Trek Medical Scanner (Building the Tricorder) ZDnet 01/17/2019 65
Technology 2019: The Year AR Finally Goes From 'Unsexy' To Cool? (AR Finally Goes Cool, Augmented Reality) ZDnet 01/17/2019 65
Connectivity Top 5 Terms to Know About 5G (5G Terms, 3GPP, mmWave, MIMO, small cells, 5G NR) TechRepublic 01/17/2019 65
Devops DevOps: Big Effort, Big Benefits (Big Effort, Big Benefits) InformationWeek 01/17/2019 65
Data The Future of Data Infrastructure (Data Infrastructure, HCI) Data Center Knowledge 01/17/2019 65
Security Are You Listening to Your Kill Chain? (Listen To Your Kill Chain, CKC ) Dark Reading 01/17/2019 65
Compliance The Complete Guide to GDPR (GDPR Complete Guide, White Paper) TechWorld 01/17/2019 65
Storage Hard Disk Drive Unit Shipments Slowly Spinning Down (HDD Shipments Down) The Register 01/16/2019 66
Security Five APAC Cyber Security Predictions For 2019 (Security Predictions For 2019) Networks Asia 01/16/2019 66
Data Is Data Meeting Decision-Makers' Needs? (Data Decision-Makers' Needs) Networks Asia 01/16/2019 66