Articles From 2019

Header
1: Security
How CISOs Can Gain a Better Understanding of Their Cybersecurity Attack Surface
Published by: TechRepublic
Publish Date: 03/11/2019 | Posted 40 Days Ago
2: Technology
This Year, Cellular Changes Forever
Published by: GCN
Publish Date: 03/11/2019 | Posted 40 Days Ago
3: Security
That Marketing Email Database that Exposed 809 Million Contact Records? Maybe Make that Two-BILLION-Plus
Published by: The Register
Publish Date: 03/10/2019 | Posted 40 Days Ago
4: Connectivity
If You Plan on Installing a Ton of Smarthome Devices, Skip Wi-Fi
Published by: How To Geek
Publish Date: 03/10/2019 | Posted 40 Days Ago
5: Technology
Putting Qubits to Work and Play
Published by: TechRepublic
Publish Date: 03/09/2019 | Posted 41 Days Ago
6: Connectivity
Wi-Fi 6 is Coming: It’s Not Too Early to Plan for 802.11ax
Published by: NetworkComputing
Publish Date: 03/09/2019 | Posted 41 Days Ago
7: Operations
Introduction to Composable Infrastructure and its Use Cases
Published by: NetworkComputing
Publish Date: 03/09/2019 | Posted 41 Days Ago
8: Management
It's Time to Rethink Your Vendor Questionnaire
Published by: Dark Reading
Publish Date: 03/09/2019 | Posted 41 Days Ago
9: Technology
6 Questions to Ask While Buying a Connected Car
Published by: Dark Reading
Publish Date: 03/09/2019 | Posted 41 Days Ago
10: Security
Facebook's Two-Factor Authentication Puts Security and Privacy at Odds
Published by: cnet
Publish Date: 03/09/2019 | Posted 41 Days Ago
11: Operations
What is SAM Maturity and How Do You Measure It?
Published by: Business 2 Community
Publish Date: 03/09/2019 | Posted 41 Days Ago
12: Bit bucket
Top 5 Resume Mistakes to Avoid
Published by: TechRepublic
Publish Date: 03/08/2019 | Posted 42 Days Ago
13: Administration
6 Critical Factors to Consider When Deploying Containers
Published by: TechRepublic
Publish Date: 03/08/2019 | Posted 42 Days Ago
14: Connectivity
5G Cybersecurity Concerns and Physical Challenges: What You Need to Know
Published by: TechRepublic
Publish Date: 03/08/2019 | Posted 42 Days Ago
15: Connectivity
Unlocking the Untapped Potential of Light in Optical Communications
Published by: Science Daily
Publish Date: 03/08/2019 | Posted 42 Days Ago
16: Bit bucket
A Slice of Pi History: How π Took Over The World
Published by: Poplular Mechanics
Publish Date: 03/08/2019 | Posted 42 Days Ago
17: Management
A Beginner’s Guide to Project Management Offices
Published by: PMWorld 360
Publish Date: 03/08/2019 | Posted 42 Days Ago
18: Compliance
9 Ways Insurers Can Prep for New Privacy Laws
Published by: Digital Insurance
Publish Date: 03/08/2019 | Posted 42 Days Ago
19: Security
Debunking 5 Myths About Zero Trust Security
Published by: Dark Reading
Publish Date: 03/08/2019 | Posted 42 Days Ago
20: Cloud
Cutting Costs in 2019 Can Be as Easy as Moving to a Cloud
Published by: Business 2 Community
Publish Date: 03/08/2019 | Posted 42 Days Ago
21: Management
How to Overcome the Risk of Overcorrecting
Published by: TechRepublic
Publish Date: 03/07/2019 | Posted 43 Days Ago
22: Compliance
3 Ways To Manage Regulatory and Compliance Changes
Published by: TechRepublic
Publish Date: 03/07/2019 | Posted 43 Days Ago
23: Technology
1 + 1 Does Not Equal 2 for Graphene-Like 2D Materials
Published by: Science Daily
Publish Date: 03/07/2019 | Posted 43 Days Ago
24: Bit bucket
Can Entangled Qubits Be Used to Probe Black Holes?
Published by: Science Daily
Publish Date: 03/07/2019 | Posted 43 Days Ago
25: Connectivity
A Practical Approach to IBN and Improved IT Automation
Published by: NetworkComputing
Publish Date: 03/07/2019 | Posted 43 Days Ago
26: Management
Data Points: 5 Technology Executives Share the Metrics They Can’t Ignore
Published by: IT World Canada
Publish Date: 03/07/2019 | Posted 43 Days Ago
27: Devops
Q&A: DevOps Institute’s Jayne Groll on the Future of DevOps
Published by: InformationWekk
Publish Date: 03/07/2019 | Posted 43 Days Ago
28: Storage
Caching vs Tiering with Storage Class Memory and NVMe – A Tale of Two Systems
Published by: DCIG
Publish Date: 03/07/2019 | Posted 43 Days Ago
29: Security
To Improve Security, We Must Focus on Its People
Published by: Dark Reading
Publish Date: 03/07/2019 | Posted 43 Days Ago
30: Data
Augmented Analytics Tools, NLP Search, Graph are Trending
Published by: Search Business Analytics
Publish Date: 03/07/2019 | Posted 43 Days Ago
31: Technology
What is the IIoT? Everything you Need to Know about the Industrial Internet of Things
Published by: ZDnet
Publish Date: 03/06/2019 | Posted 44 Days Ago
32: Security
How to Make People Sit Up and Use 2-Factor Authorization
Published by: The Register
Publish Date: 03/06/2019 | Posted 44 Days Ago
33: Connectivity
5G is 'Ready' Once You Redefine 'Ready'... And Then Redefine 'Reality'
Published by: The Register
Publish Date: 03/06/2019 | Posted 44 Days Ago
34: Storage
Western Digital Sees Storage Sun Rise In NVMe Land... and Slowly Set on SATA, SAS SSDs
Published by: The Register
Publish Date: 03/06/2019 | Posted 44 Days Ago
35: Connectivity
10 Enterprise Network Mistakes That Open the Door to Hackers
Published by: TechRepublic
Publish Date: 03/06/2019 | Posted 44 Days Ago
36: Security
What is a Botnet? And Why They Aren't Going Away Anytime Soon
Published by: Networks Asia
Publish Date: 03/06/2019 | Posted 44 Days Ago
37: Cloud
The Ugly Truth About Cloud Computing In the Enterprise
Published by: Networks Asia
Publish Date: 03/06/2019 | Posted 44 Days Ago
38: Operations
Three Cabling Factors that Affect Data Centre Deployment
Published by: Networks Asia
Publish Date: 03/06/2019 | Posted 44 Days Ago
39: Management
How CIOs Can Influence the Board
Published by: InformationWekk
Publish Date: 03/06/2019 | Posted 44 Days Ago
40: Security
IoT Automation Platforms Open Smart Buildings to New Threats
Published by: HelpNet Security
Publish Date: 03/06/2019 | Posted 44 Days Ago
41: Management
A CEO Cheat Sheet For The Cybersecurity Big One
Published by: Forbes
Publish Date: 03/06/2019 | Posted 44 Days Ago
42: Bit bucket
Consumers Care About Privacy, but Not Enough to Act on It
Published by: Dark Reading
Publish Date: 03/06/2019 | Posted 44 Days Ago
43: Technology
Google, Microsoft, Amazon Race for Augmented-Reality Glasses
Published by: ToolBox
Publish Date: 03/06/2019 | Posted 44 Days Ago
44: Connectivity
USB-IF Announces USB4 with Native Thunderbolt at 40Gbps Transfers
Published by: The Inquirer
Publish Date: 03/05/2019 | Posted 45 Days Ago
45: Devops
7 Must-Have Skills for Enterprise DevOps Practitioners
Published by: TechRepublic
Publish Date: 03/05/2019 | Posted 45 Days Ago
46: Security
3 Reasons Businesses Are Still Failing at Strong Cybersecurity
Published by: TechRepublic
Publish Date: 03/05/2019 | Posted 45 Days Ago
47: Storage
Why RAID Systems Dangerous and Why You Should Stop Using Them, According to WD
Published by: Storage Newsletter
Publish Date: 03/05/2019 | Posted 45 Days Ago
48: Storage
Transforming Magnetic Storage
Published by: Science Daily
Publish Date: 03/05/2019 | Posted 45 Days Ago
49: Connectivity
SD-WAN: Yes, It's a Revolution Alright
Published by: No Jitter
Publish Date: 03/05/2019 | Posted 45 Days Ago
50: Connectivity
Cisco Log Tip
Published by: NetworkDataPedia
Publish Date: 03/05/2019 | Posted 45 Days Ago
51: Security
SSL/TLS-Based Data Security Threats Are On the Rise
Published by: Information Management
Publish Date: 03/05/2019 | Posted 45 Days Ago
52: Devops
The Patterns of Elite DevSecOps Practices
Published by: HelpNet Security
Publish Date: 03/05/2019 | Posted 45 Days Ago
53: Storage
All-Flash vs. Hybrid Flash – Choosing What's Right for You
Published by: Data Center Knowledge
Publish Date: 03/05/2019 | Posted 45 Days Ago
54: Security
Blockchain White Paper
Published by: National Archives
Publish Date: 03/05/2019 | Posted 45 Days Ago
55: Connectivity
WPA3 Protocol: Should Enterprises Implement the Changes?
Published by: Search Security
Publish Date: 03/05/2019 | Posted 45 Days Ago
56: Technology
Smartphones Replicate 3D Objects for Virtual Reality
Published by: GCN
Publish Date: 03/05/2019 | Posted 45 Days Ago
57: Technology
Want A Foldable Phone? Hold Out for Real Glass
Published by: Wired
Publish Date: 03/04/2019 | Posted 46 Days Ago
58: Cloud
A Multi-Cloud Approach – What’s In It for Me?
Published by: IT World Canada
Publish Date: 03/04/2019 | Posted 46 Days Ago
59: Data
9 Steps Organizations Can Take to Get Ahead Of New Data Privacy Laws
Published by: Information Management
Publish Date: 03/04/2019 | Posted 46 Days Ago
60: Management
3 Things Every CIO Should Know Before They Migrate to the Cloud
Published by: Digital Insurance
Publish Date: 03/04/2019 | Posted 46 Days Ago
61: Operations
Lithium-Ion Batteries Offer A Definitive, Sustainable and Cost-Effective Advantage for UPS
Published by: Data Center Dynamics
Publish Date: 03/04/2019 | Posted 46 Days Ago
62: Security
Here's What Happened When a SOC Embraced Automation
Published by: Dark Reading
Publish Date: 03/04/2019 | Posted 46 Days Ago
63: Security
Security Experts, Not Users, Are the Weakest Link
Published by: Dark Reading
Publish Date: 03/04/2019 | Posted 46 Days Ago
64: Management
The First 100 Days of the New CISO: Expectations vs. Reality
Published by: Business 2 Community
Publish Date: 03/04/2019 | Posted 46 Days Ago
65: Connectivity
Network Operating System Advantages Extend to White Box Switching
Published by: Search Networking
Publish Date: 03/04/2019 | Posted 46 Days Ago
66: Connectivity
What Are the Pros And Cons of Machine Learning In Network Security?
Published by: Search Networking
Publish Date: 03/04/2019 | Posted 46 Days Ago
67: Security
Encryption Offers Safe Haven for Criminals and Malware
Published by: Dark Reading
Publish Date: 03/03/2019 | Posted 47 Days Ago
68: Cloud
Security Pros Agree: Cloud Adoption Outpaces Security
Published by: Dark Reading
Publish Date: 03/03/2019 | Posted 47 Days Ago
69: Technology
6 Major Challenges Foldable Phones Need to Overcome to Prove They're Not a Fad
Published by: Mashable
Publish Date: 03/03/2019 | Posted 47 Days Ago
70: Technology
Moving Closer to Practical Photonic Quantum Computing
Published by: Science Daily
Publish Date: 03/01/2019 | Posted 49 Days Ago
71: Bit bucket
Hiding Black Hole Found
Published by: Science Daily
Publish Date: 03/01/2019 | Posted 49 Days Ago
72: Data
Is Dark Data Putting Your Business at Risk?
Published by: IT Web
Publish Date: 03/01/2019 | Posted 49 Days Ago
73: Data
The Future of AI in America: What All Leaders Should Consider
Published by: InformationWeek
Publish Date: 03/01/2019 | Posted 49 Days Ago
74: Security
Enterprises Are Blind to Over Half Of Malware Sent to Their Employees
Published by: HelpNet Security
Publish Date: 03/01/2019 | Posted 49 Days Ago
75: Cloud
Survey: Most Companies are Failing at Cloud Cost Management
Published by: Data Center Knowledge
Publish Date: 03/01/2019 | Posted 49 Days Ago
76: Security
Solving Security: Repetition or Redundancy?
Published by: Dark Reading
Publish Date: 03/01/2019 | Posted 49 Days Ago
77: Management
The Caregivers Among You Need Help
Published by: TLNT
Publish Date: 03/01/2019 | Posted 49 Days Ago
78: Operations
Safeguarding Hardware from Cyberattack
Published by: Science Daily
Publish Date: 02/28/2019 | Posted 50 Days Ago
79: Technology
Universal Entangler For New Quantum Tech
Published by: Science Daily
Publish Date: 02/28/2019 | Posted 50 Days Ago
80: Technology
Immunizing Quantum Computers Against Errors
Published by: Science Daily
Publish Date: 02/28/2019 | Posted 50 Days Ago
81: Cloud
Don’t Forget the Distance When Looking Up to the Clouds
Published by: Networks Asia
Publish Date: 02/28/2019 | Posted 50 Days Ago
82: Management
How to Become a Master Scrum Master
Published by: InformationWeek
Publish Date: 02/28/2019 | Posted 50 Days Ago
83: Connectivity
What Are USB Gen 1, Gen 2, and Gen 2×2?
Published by: How To Geek
Publish Date: 02/28/2019 | Posted 50 Days Ago
84: Storage
What are NVMe Drives, and Should You Buy One?
Published by: How To Geek
Publish Date: 02/28/2019 | Posted 50 Days Ago
85: Operations
The New Need to Create a Secondary Perimeter to Detect for Malware’s Presence
Published by: DCIG
Publish Date: 02/28/2019 | Posted 50 Days Ago
86: Connectivity
Do Smart Network Cards Have a Future Outside the Hyperscale Data Center?
Published by: Data Center Knowledge
Publish Date: 02/28/2019 | Posted 50 Days Ago
87: Management
CTO? Why Updating Your Backup Strategy Should Be on Your 2019 to-Do List
Published by: Continuity Central
Publish Date: 02/28/2019 | Posted 50 Days Ago
88: Compliance
The Right to Be Forgotten Versus the Need to Backup
Published by: Continuity Central
Publish Date: 02/28/2019 | Posted 50 Days Ago
89: Cloud
Avoid Turbulence When Shifting to Data Analytics In the Cloud
Published by: Search Business Analytics
Publish Date: 02/28/2019 | Posted 50 Days Ago
90: Security
Payroll Provider Gives Extortionists a Payday
Published by: Krebs on Security
Publish Date: 02/28/2019 | Posted 50 Days Ago
91: Technology
Get Ready for USB 3.2: Super-Fast 20Gbps Transfer Speeds But Tons of Confusion
Published by: ZDnet
Publish Date: 02/27/2019 | Posted 51 Days Ago
92: Administration
Containers, Explained
Published by: PC Magazine
Publish Date: 02/27/2019 | Posted 51 Days Ago
93: Data
Trends That Will Rule Data Protection in 2019
Published by: Networks Asia
Publish Date: 02/27/2019 | Posted 51 Days Ago
94: Security
Firms Not Taking Privileged Access Management Seriously Enough, Says Vendor Report
Published by: IT World Canada
Publish Date: 02/27/2019 | Posted 51 Days Ago
95: Data
Your Future Requires You to Define Your Real Master Data
Published by: Information Management
Publish Date: 02/27/2019 | Posted 51 Days Ago
96: Cloud
Security Is Battling to Keep Pace with Cloud Adoption
Published by: ComputerWeekly
Publish Date: 02/27/2019 | Posted 51 Days Ago
97: Data
Why Datafication is Key for the Organisation of Tomorrow
Published by: Mark van Rijmenam
Publish Date: 02/27/2019 | Posted 51 Days Ago
98: Security
How AI Cybersecurity Thwarts Attacks -- and How Hackers Fight Back
Published by: Search CIO
Publish Date: 02/27/2019 | Posted 51 Days Ago
99: Compliance
US Legal Eagle: Well Done, You Bought Privacy Compliance Tools. Doesn't Mean You Comply with Anything
Published by: The Register
Publish Date: 02/26/2019 | Posted 52 Days Ago
100: Security
5 Ways to Avoid Top Malware Threats
Published by: TechRepublic
Publish Date: 02/26/2019 | Posted 52 Days Ago
101: Cloud
Checklist for a Successful Cloud UCC Implementation
Published by: No Jitter
Publish Date: 02/26/2019 | Posted 52 Days Ago
102: Connectivity
Survey Says: 5G Developments Vary
Published by: No Jitter
Publish Date: 02/26/2019 | Posted 52 Days Ago
103: Security
Should Organizations Consider Enhancing Security With an MSSP?
Published by: Networks Asia
Publish Date: 02/26/2019 | Posted 52 Days Ago
104: Security
Removing the Cyber Criminal’s Mask of Anonymity
Published by: Networks Asia
Publish Date: 02/26/2019 | Posted 52 Days Ago
105: Compliance
7 Ways the New California Privacy Law Will Impact All Organizations
Published by: Information Management
Publish Date: 02/26/2019 | Posted 52 Days Ago
106: Connectivity
What Is DHCP
Published by: How To Geek
Publish Date: 02/26/2019 | Posted 52 Days Ago
107: Technology
Most IoT Devices are Being Compromised by Exploiting Rudimentary Vulnerabilities
Published by: HelpNet Security
Publish Date: 02/26/2019 | Posted 52 Days Ago
108: Management
RLI CIO Bryan Fowler on Insurtech, Cloud
Published by: Digital Insurance
Publish Date: 02/26/2019 | Posted 52 Days Ago
109: Security
The Business Value of Software Security Updates
Published by: Business 2 Community
Publish Date: 02/26/2019 | Posted 52 Days Ago
110: Devops
4 Must-Have DevOps Tools in 2019
Published by: Business 2 Community
Publish Date: 02/26/2019 | Posted 52 Days Ago
111: Management
The Executive’s Practical Guide to Thriving In the Face of Evolving Cyber Risks
Published by: Kip Boyle
Publish Date: 02/26/2019 | Posted 52 Days Ago
112: Security
Why IoT Devices Pose a Bigger Cybersecurity Risk Than Most Realize
Published by: ZDnet
Publish Date: 02/25/2019 | Posted 53 Days Ago
113: Cloud
Containers May Be Leading to Cloud Computing Cost Overruns
Published by: ZDnet
Publish Date: 02/25/2019 | Posted 53 Days Ago
114: Data
Artificial Intelligence: You Know it Isn't Real, Yeah?
Published by: The Register
Publish Date: 02/25/2019 | Posted 53 Days Ago
115: Cloud
Exponential Growth of SaaS Deployment Exposes Hidden Vulnerabilities
Published by: Information Management
Publish Date: 02/25/2019 | Posted 53 Days Ago
116: Security
Accidental Data Breaches are Often Compounded By a Failure to Encrypt
Published by: HelpNet Security
Publish Date: 02/25/2019 | Posted 53 Days Ago
117: Connectivity
6 Tips for Getting the Most from Your VPN
Published by: Dark Reading
Publish Date: 02/25/2019 | Posted 53 Days Ago
118: Security
Can Quantum Key Distribution Secure The Grid?
Published by: FCW
Publish Date: 02/25/2019 | Posted 53 Days Ago
119: Management
The Complete Guide to the Biggest Tech Trends in 2019
Published by: TechWorld
Publish Date: 02/25/2019 | Posted 53 Days Ago
120: Technology
The Top 10 Alternatives to the Apple Watch
Published by: TechRepublic
Publish Date: 02/24/2019 | Posted 54 Days Ago
121: Security
To Mitigate Advanced Threats, Put People Ahead of Tech
Published by: Dark Reading
Publish Date: 02/24/2019 | Posted 54 Days Ago
122: Management
What is Change Management?
Published by: PMWorld 360
Publish Date: 02/22/2019 | Posted 56 Days Ago
123: Operations
Why Disk Beat Tape In the Backup Wars
Published by: Network World
Publish Date: 02/22/2019 | Posted 56 Days Ago
124: Management
No One-Size-Fits-All Competencies for Project Management
Published by: IT Web
Publish Date: 02/22/2019 | Posted 56 Days Ago
125: Compliance
How and Why the Data Privacy Mandate is Expanding
Published by: Information Management
Publish Date: 02/22/2019 | Posted 56 Days Ago
126: Security
92% of Organizations Rank Users as Their Primary Security Concern
Published by: HelpNet Security
Publish Date: 02/22/2019 | Posted 56 Days Ago
127: Data
10 Top Data and Analytics Trends for 2019
Published by: Digital Insurance
Publish Date: 02/22/2019 | Posted 56 Days Ago
128: Security
Why Cybersecurity Burnout Is Real and What to Do About It
Published by: Dark Reading
Publish Date: 02/22/2019 | Posted 56 Days Ago
129: Management
Why Agency Holding Companies Need to Standardize Their Software
Published by: Business 2 Community
Publish Date: 02/22/2019 | Posted 56 Days Ago
130: Cloud
Estimate Cloud Computing Costs Prior to App Migration
Published by: Search Cloud Computing
Publish Date: 02/22/2019 | Posted 56 Days Ago
131: Devops
Containers, Cloud Orchestration Tools Rattle DevOps Foundation
Published by: Search Cloud Computing
Publish Date: 02/22/2019 | Posted 56 Days Ago
132: Operations
Evaluating Backup Bandwidth with a Portable Wan Emulator
Published by: NetworkComputing
Publish Date: 02/21/2019 | Posted 57 Days Ago
133: Cloud
Searching for a Cloud-Native App Strategy Amid the Chaos
Published by: InformationWeek
Publish Date: 02/21/2019 | Posted 57 Days Ago
134: Data
AI is Not Magic – It’s Time to Demystify and Apply
Published by: InformationWekk
Publish Date: 02/21/2019 | Posted 57 Days Ago
135: Security
Security Spills: 9 Problems Causing the Most Stress
Published by: Dark Reading
Publish Date: 02/21/2019 | Posted 57 Days Ago
136: Security
Security Leaders Are Fallible, Too
Published by: Dark Reading
Publish Date: 02/21/2019 | Posted 57 Days Ago
137: Management
Strategies for Developing the Reluctant Rising Star and the Expectant Executive
Published by: TLNT
Publish Date: 02/20/2019 | Posted 58 Days Ago
138: Security
How is Cybersecurity Changing Ii the Mobile and Cloud-First World
Published by: TechWorld
Publish Date: 02/20/2019 | Posted 58 Days Ago
139: Bit bucket
10 Soft Skills Tech Pros Need to Land a Job
Published by: TechRepublic
Publish Date: 02/20/2019 | Posted 58 Days Ago
140: Technology
In The Blink of an Eye: Team Uses Quantum of Light to Create New Quantum Simulator
Published by: Science Daily
Publish Date: 02/20/2019 | Posted 58 Days Ago
141: Bit bucket
New Therapeutic Approach to Treating Osteoarthritis
Published by: Science Daily
Publish Date: 02/20/2019 | Posted 58 Days Ago
142: Technology
tor Graphene-Based Electronics
Published by: Science Daily
Publish Date: 02/20/2019 | Posted 58 Days Ago
143: Management
There is No Greater Currency Than Trust
Published by: Networks Asia
Publish Date: 02/20/2019 | Posted 58 Days Ago
144: Cloud
Serverless: The future Of Cloud Computing?
Published by: Networks Asia
Publish Date: 02/20/2019 | Posted 58 Days Ago
145: Management
AI, Cloud, and Security are Top Priorities for Enterprise Legal Departments
Published by: Networks Asia
Publish Date: 02/20/2019 | Posted 58 Days Ago
146: Security
Should There Be ‘Safe Harbor’ Against Data-Breach Lawsuits?
Published by: Data Center Knowledge
Publish Date: 02/20/2019 | Posted 58 Days Ago
147: Data
Data is the New Oil: Five Reasons That’s Not Necessarily a Good Thing
Published by: Data Center Knowledge
Publish Date: 02/20/2019 | Posted 58 Days Ago
148: Security
AI and ML: Harnessing the Next Big Thing in Information Security
Published by: ToolBox
Publish Date: 02/20/2019 | Posted 58 Days Ago
149: Security
You Have Around 20 Minutes to Contain a Russian APT Attack
Published by: ZDnet
Publish Date: 02/19/2019 | Posted 59 Days Ago
150: Storage
Number of HDDs Shipped Worldwide From 1976 to 2018
Published by: Storage Newsletter
Publish Date: 02/19/2019 | Posted 59 Days Ago
151: Security
Removing the Cyber Criminal’s Mask of Anonymity
Published by: Networks Asia
Publish Date: 02/19/2019 | Posted 59 Days Ago
152: Management
Project Prospects: A Systems View of Risk
Published by: IT World Canada
Publish Date: 02/19/2019 | Posted 59 Days Ago
153: Security
Indicators of Poor Password Hygiene Exposed
Published by: HelpNet Security
Publish Date: 02/19/2019 | Posted 59 Days Ago
154: Management
Privacy Ops: The New Nexus for CISOs & DPOs
Published by: Dark Reading
Publish Date: 02/19/2019 | Posted 59 Days Ago
155: Management
Take Your Best Practices and Shove Them . . . Into the Trashcan
Published by: Business 2 Community
Publish Date: 02/19/2019 | Posted 59 Days Ago
156: Data
Are You Throwing Money Away?
Published by: Security Today
Publish Date: 02/19/2019 | Posted 59 Days Ago
157: Data
Worried About Your Data Security? Consider Hardware-Based Encryption
Published by: ToolBox
Publish Date: 02/19/2019 | Posted 59 Days Ago
158: Management
As Your Company Evolves, So Should Your Values
Published by: TLNT
Publish Date: 02/18/2019 | Posted 60 Days Ago
159: Technology
The Complete Guide to: Drones
Published by: TechWorld
Publish Date: 02/18/2019 | Posted 60 Days Ago
160: Security
Most Businesses Aren't Ready For Generation 6 Cyberthreats
Published by: Networks Asia
Publish Date: 02/18/2019 | Posted 60 Days Ago
161: Storage
Unstructured Data and Its Storage Needs
Published by: ComputerWeekly
Publish Date: 02/18/2019 | Posted 60 Days Ago
162: Operations
5 Crucial Multi-Cloud Disaster Recovery Principles
Published by: Search Disaster Recovery
Publish Date: 02/18/2019 | Posted 60 Days Ago
163: Technology
Autonomous Cars Are Not Ready for Public Deployment
Published by: TechRepublic
Publish Date: 02/16/2019 | Posted 62 Days Ago
164: Connectivity
Low-Power WANs Energize High-Priority Applications
Published by: NetworkComputing
Publish Date: 02/16/2019 | Posted 62 Days Ago
165: Cloud
Private Cloud 3.0 is Here
Published by: IT Web
Publish Date: 02/16/2019 | Posted 62 Days Ago
166: Management
Three Reasons Employee Monitoring Software is Making A Comeback
Published by: HelpNet Security
Publish Date: 02/16/2019 | Posted 62 Days Ago
167: Security
Post-Quantum Crypto Standards Aren’t All About the Math
Published by: Dark Reading
Publish Date: 02/16/2019 | Posted 62 Days Ago
168: Compliance
How GDPR Affects Background Checking
Published by: TLNT
Publish Date: 02/15/2019 | Posted 63 Days Ago
169: Data
Big Data, IoT Will Drive World's Data To Grow 5X By 2025
Published by: TechRepublic
Publish Date: 02/15/2019 | Posted 63 Days Ago
170: Management
Cybersecurity Mental Health Warning -- 1 In 6 CISOs Now Medicate or Use Alcohol
Published by: Forbes
Publish Date: 02/15/2019 | Posted 63 Days Ago
171: Security
Security Orchestration and Incident Response
Published by: TechRepublic
Publish Date: 02/15/2019 | Posted 63 Days Ago
172: Management
What to Do When Your Project Manager Isn't Performing
Published by: TechRepublic
Publish Date: 02/14/2019 | Posted 64 Days Ago
173: Management
Why IT's Image Needs a Makeover
Published by: TechRepublic
Publish Date: 02/14/2019 | Posted 64 Days Ago
174: Management
Four Skills CISOs Should Develop to Succeed In 2019
Published by: Networks Asia
Publish Date: 02/14/2019 | Posted 64 Days Ago
175: Connectivity
2019: The Dawn of 5G
Published by: Networks Asia
Publish Date: 02/14/2019 | Posted 64 Days Ago
176: Security
Most Companies Anticipate a Critical Breach In 2019, CISOs Need to Prioritize Threats
Published by: HelpNet Security
Publish Date: 02/14/2019 | Posted 64 Days Ago
177: Cloud
Tips to Selecting the Best Cloud Backup Solution
Published by: DCIG
Publish Date: 02/14/2019 | Posted 64 Days Ago
178: Operations
The Next Milestone: Quantum Data Centers
Published by: Data Center Dynamics
Publish Date: 02/14/2019 | Posted 64 Days Ago
179: Operations
DRaaS Benefits that Make Ditching Traditional DR Worth it
Published by: Search Disaster Recovery
Publish Date: 02/14/2019 | Posted 64 Days Ago
180: Storage
After 1 to 6, New RAID Level, PentaRAID, From Start-Up Xoralgo
Published by: Storage Newsletter
Publish Date: 02/13/2019 | Posted 65 Days Ago
181: Technology
Questions in Quantum Computing: How to Move Electrons with Light
Published by: Science Daily
Publish Date: 02/13/2019 | Posted 65 Days Ago
182: Compliance
Navigating the Digital Landscape Beyond Data Protection Regulations
Published by: Networks Asia
Publish Date: 02/13/2019 | Posted 65 Days Ago
183: Cloud
Tightening the Belt on Excess Spending for Cloud
Published by: InformationWeek
Publish Date: 02/13/2019 | Posted 65 Days Ago
184: Operations
Devastating Cyberattack on Email Provider Destroys 18 Years of Data
Published by: Dark Reading
Publish Date: 02/13/2019 | Posted 65 Days Ago
185: Storage
Cloud and Backup Top Storage Priorities for 2019
Published by: ComputerWeekly
Publish Date: 02/13/2019 | Posted 65 Days Ago
186: Technology
We Spoke To Neuroscientists About the Future of Brain-Computer Interfaces
Published by: TechWorld
Publish Date: 02/12/2019 | Posted 66 Days Ago
187: Management
Management Lessons from the Super Bowl
Published by: TechRepublic
Publish Date: 02/12/2019 | Posted 66 Days Ago
188: Operations
Data Center Glossary: 12 Terms You Should know
Published by: TechRepublic
Publish Date: 02/12/2019 | Posted 66 Days Ago
189: Technology
Engineers Develop Room Temperature, Two-Dimensional Platform for Quantum Technology
Published by: Science Daily
Publish Date: 02/12/2019 | Posted 66 Days Ago
190: Cloud
You Have a Multi-Cloud Environment -- Now What?
Published by: No Jitter
Publish Date: 02/12/2019 | Posted 66 Days Ago
191: Management
Prepare for Fourth Industrial Revolution Tech
Published by: InformationWekk
Publish Date: 02/12/2019 | Posted 66 Days Ago
192: Security
Is 2019 the Year National Privacy Law is Established in the US?
Published by: HelpNet Security
Publish Date: 02/12/2019 | Posted 66 Days Ago
193: Bit bucket
15 Top-Paying IT Certifications for 2019
Published by: Global Knowledge
Publish Date: 02/12/2019 | Posted 66 Days Ago
194: Administration
Container Bug Allows Attackers to Gain Root Access on Host Machine
Published by: Data Center Knowledge
Publish Date: 02/12/2019 | Posted 66 Days Ago
195: Technology
IBM's AI Loses Debate to a Human, But It's Got Worlds to Conquer
Published by: cnet
Publish Date: 02/12/2019 | Posted 66 Days Ago
196: Operations
Dos and Don'ts When Working In a Data Center
Published by: Cabling Installation & Maintenance
Publish Date: 02/12/2019 | Posted 66 Days Ago
197: Security
Advanced Customer Verification – Are You Ready For That?
Published by: Business 2 Community
Publish Date: 02/12/2019 | Posted 66 Days Ago
198: Administration
5 Ways to Get Started with Container Optimization for Automation and Cost Savings
Published by: Business 2 Community
Publish Date: 02/12/2019 | Posted 66 Days Ago
199: Cloud
5 Best Ways to Minimize Cloud Scaling Costs
Published by: Search Cloud Computing
Publish Date: 02/12/2019 | Posted 66 Days Ago
200: Management
An IT Leader’s Biggest Pain Points in the Next 3 Years
Published by: ToolBox
Publish Date: 02/12/2019 | Posted 66 Days Ago
201: Security
Weather the Security Storms Ahead by Knowing Your Data
Published by: Networks Asia
Publish Date: 02/11/2019 | Posted 67 Days Ago
202: Security
How Can We Improve Adoption and ROI on Security Investments?
Published by: HelpNet Security
Publish Date: 02/11/2019 | Posted 67 Days Ago
203: Security
6 Reasons to Be Wary of Encryption in Your Enterprise
Published by: Dark Reading
Publish Date: 02/11/2019 | Posted 67 Days Ago
204: Connectivity
8 Common Questions About the New Wi-Fi 6 Standard
Published by: Search Networking
Publish Date: 02/11/2019 | Posted 67 Days Ago
205: Devops
7 Essential Best Practices to Follow When Adopting a DevOps Model
Published by: SD Times
Publish Date: 02/11/2019 | Posted 67 Days Ago
206: Data
Can Developers make AI’s “Black Box” Transparent?
Published by: SD Times
Publish Date: 02/11/2019 | Posted 67 Days Ago
207: Storage
The High Cost of Data Center Clutter
Published by: Data Center Knowledge
Publish Date: 02/10/2019 | Posted 68 Days Ago
208: Management
Four Things Every CEO Should Know About Cybersecurity
Published by: CSO Online
Publish Date: 02/10/2019 | Posted 68 Days Ago
209: Technology
New Phenomenon Discovered That Fixes a Common Problem in Lasers: Wavelength Splitting
Published by: Science Daily
Publish Date: 02/09/2019 | Posted 69 Days Ago
210: Connectivity
SQL Packet Analysis Using Dynamic Baselining
Published by: NetworkComputing
Publish Date: 02/09/2019 | Posted 69 Days Ago
211: Cloud
Identifying Cloud Migraines before Migration
Published by: NetworkComputing
Publish Date: 02/09/2019 | Posted 69 Days Ago
212: Security
We Need More Transparency in Cybersecurity
Published by: Dark Reading
Publish Date: 02/09/2019 | Posted 69 Days Ago
213: Security
Large Firms: What Role for the Group CISO?
Published by: Business 2 Community
Publish Date: 02/09/2019 | Posted 69 Days Ago
214: Technology
Top 10 Ways Internet of Things and Blockchain Strengthen Supply Chains
Published by: Business 2 Community
Publish Date: 02/09/2019 | Posted 69 Days Ago
215: Management
3 Steps to Creating a Project Portfolio Roadmap
Published by: PMWorld 360
Publish Date: 02/08/2019 | Posted 70 Days Ago
216: Management
What is Project Management?
Published by: PMWorld 360
Publish Date: 02/08/2019 | Posted 70 Days Ago
217: Cloud
More Data and Cloud for IT Demands in 2019
Published by: Networks Asia
Publish Date: 02/08/2019 | Posted 70 Days Ago
218: Security
Weak Passwords, Poor Web Code Among Vulnerabilities that Help Pen Testers
Published by: IT World Canada
Publish Date: 02/08/2019 | Posted 70 Days Ago
219: Data
Data Can Make or Break an Organization
Published by: IT World Canada
Publish Date: 02/08/2019 | Posted 70 Days Ago
220: Management
Now It's Time for the Hybrid IT Worker
Published by: InformationWeek
Publish Date: 02/08/2019 | Posted 70 Days Ago
221: Security
Best Practices for Thwarting DNS Hijacking Attacks
Published by: Information Management
Publish Date: 02/08/2019 | Posted 70 Days Ago
222: Security
Here’s What Cybersecurity Experts Worry About this Year
Published by: Data Center Knowledge
Publish Date: 02/08/2019 | Posted 70 Days Ago
223: Security
Ransomware Attack Via MSP Locks Customers Out of Systems
Published by: Dark Reading
Publish Date: 02/08/2019 | Posted 70 Days Ago
224: Bit bucket
Five Things to Consider Before Buying LED Bulbs
Published by: cnet
Publish Date: 02/08/2019 | Posted 70 Days Ago
225: Cloud
Future Trends in Cloud Computing All Point to Optimization
Published by: Business 2 Community
Publish Date: 02/08/2019 | Posted 70 Days Ago
226: Technology
5 Tips for Successful IoT App Development
Published by: Business 2 Community
Publish Date: 02/08/2019 | Posted 70 Days Ago
227: Operations
Developer Search Prompts a Migration to Microservices
Published by: Search Microservices
Publish Date: 02/08/2019 | Posted 70 Days Ago
228: Technology
Top 5 Ways to Avoid Notification Stress
Published by: TechRepublic
Publish Date: 02/07/2019 | Posted 71 Days Ago
229: Cloud
$14.1 Billion in Cloud Spending to be Wasted in 2019
Published by: ParkMyCloud
Publish Date: 02/07/2019 | Posted 71 Days Ago
230: Cloud
Is Public Cloud for Everyone?
Published by: Networks Asia
Publish Date: 02/07/2019 | Posted 71 Days Ago
231: Connectivity
4 Trends Driving Accelerated SD-WAN Adoption
Published by: NetworkComputing
Publish Date: 02/07/2019 | Posted 71 Days Ago
232: Technology
The Problem with Vulnerable IoT Companion Apps
Published by: HelpNet Security
Publish Date: 02/07/2019 | Posted 71 Days Ago
233: Storage
Number of Appliances Dedicated to Deduplicating Backup Data Shrinks even as Data Universe Expands
Published by: DCIG
Publish Date: 02/07/2019 | Posted 71 Days Ago
234: Security
4 Practical Questions to Ask Before Investing in AI
Published by: Dark Reading
Publish Date: 02/07/2019 | Posted 71 Days Ago
235: Security
Best Practices for Choosing Good Security Questions
Published by: Business 2 Community
Publish Date: 02/07/2019 | Posted 71 Days Ago
236: Operations
Disaster Recovery Plan: How to Ensure Business Continuity
Published by: Business 2 Community
Publish Date: 02/07/2019 | Posted 71 Days Ago
237: Data
Big Data Processing Could Be the Way All Data is Processed
Published by: Search IT Operations
Publish Date: 02/07/2019 | Posted 71 Days Ago
238: Operations
Data Backup Types Explained: Full, Incremental, Differential and More
Published by: Search Data Backup
Publish Date: 02/07/2019 | Posted 71 Days Ago
239: Cloud
Implement Cloud Failover, Replication For Workload Protection
Published by: Search Cloud Computing
Publish Date: 02/07/2019 | Posted 71 Days Ago
240: Data
Prepping the Enterprise for the AI Apocalypse
Published by: InformationWeek
Publish Date: 02/06/2019 | Posted 72 Days Ago
241: Cloud
Mitigating the Security Risks of Cloud-Native Applications
Published by: Dark Reading
Publish Date: 02/06/2019 | Posted 72 Days Ago
242: Management
Building an Effective Computer Security Incident Response Team
Published by: Continuity Central
Publish Date: 02/06/2019 | Posted 72 Days Ago
243: Cloud
Protecting Your Data in Public Cloud Services
Published by: Continuity Central
Publish Date: 02/06/2019 | Posted 72 Days Ago
244: Bit bucket
The CRISPR Machines that Can Wipe Out Entire Species
Published by: cnet
Publish Date: 02/06/2019 | Posted 72 Days Ago
245: Administration
Troubleshooting Application Issues - SQL Server
Published by: Profitap
Publish Date: 02/06/2019 | Posted 72 Days Ago
246: Bit bucket
How to Make Your Tech Resume More Appealing to Hiring Managers
Published by: TechRepublic
Publish Date: 02/05/2019 | Posted 73 Days Ago
247: Security
Why Vaporworms Might Be the Scourge Of 2019
Published by: HelpNet Security
Publish Date: 02/05/2019 | Posted 73 Days Ago
248: Connectivity
Researchers Devise New Method of Intrusion Deception for SDN
Published by: Dark Reading
Publish Date: 02/05/2019 | Posted 73 Days Ago
249: Security
IoT Security's Coming of Age Is Overdue
Published by: Dark Reading
Publish Date: 02/05/2019 | Posted 73 Days Ago
250: Operations
The Intent Data is In: Backup is Making a Comeback
Published by: Business 2 Community
Publish Date: 02/05/2019 | Posted 73 Days Ago
251: Devops
Strive for Real-World Technical Debt Management in DevOps Orgs
Published by: Search IT Operations
Publish Date: 02/05/2019 | Posted 73 Days Ago
252: Management
Keep IT Project Planning On Track with 5 Principles
Published by: Search IT Operations
Publish Date: 02/05/2019 | Posted 73 Days Ago
253: Security
Quantum Supremacy and the Path to Encryption Chaos
Published by: Search IT Operations
Publish Date: 02/05/2019 | Posted 73 Days Ago
254: Connectivity
5G's Biggest Challenge Is Making Sure It Actually Works as Promised
Published by: Mashable
Publish Date: 02/05/2019 | Posted 73 Days Ago
255: Compliance
Bill Package Looks to Strengthen Data Protections in California
Published by: Government Technology
Publish Date: 02/05/2019 | Posted 73 Days Ago
256: Security
$145 Million Funds Frozen After Death of Cryptocurrency Exchange Admin
Published by: ZDnet
Publish Date: 02/04/2019 | Posted 74 Days Ago
257: Security
Investigation or Exasperation? The State of Security Operations
Published by: IDC
Publish Date: 02/04/2019 | Posted 74 Days Ago
258: Management
How Two Agencies Handled Expired Credentials After Historic Shutdown
Published by: NextGov
Publish Date: 02/04/2019 | Posted 74 Days Ago
259: Cloud
More Data and Cloud for IT Demands In 2019
Published by: Networks Asia
Publish Date: 02/04/2019 | Posted 74 Days Ago
260: Technology
Bluetooth 5.1’s Presence Detection Could Be the Future of Smarthome
Published by: How To Geek
Publish Date: 02/04/2019 | Posted 74 Days Ago
261: Security
7 Privacy Mistakes That Keep Security Pros on Their Toes
Published by: Dark Reading
Publish Date: 02/04/2019 | Posted 74 Days Ago
262: Security
Access Control Lists: 6 Key Principles to Keep in Mind
Published by: Dark Reading
Publish Date: 02/04/2019 | Posted 74 Days Ago
263: Data
Differentiate Intent Data Analysis with Advanced Analytics
Published by: Business 2 Community
Publish Date: 02/04/2019 | Posted 74 Days Ago
264: Storage
Key Steps to Destroy an SSD and Protect Your Data
Published by: Search Storage
Publish Date: 02/04/2019 | Posted 74 Days Ago
265: Devops
Why Teams Create DevOps Platforms To Match Projects
Published by: Search IT Operations
Publish Date: 02/04/2019 | Posted 74 Days Ago
266: Operations
Business Continuity Policy
Published by: Search Disaster Recovery
Publish Date: 02/04/2019 | Posted 74 Days Ago
267: Security
Beware: Internet-Facing Printers Targeted by Hacking Attacks
Published by: ToolBox
Publish Date: 02/04/2019 | Posted 74 Days Ago
268: Data
Before AI Is A Human Right, Shouldn't We Make It Work First?
Published by: TechRepublic
Publish Date: 02/02/2019 | Posted 76 Days Ago
269: Connectivity
CDNs Evolve: Four Trends to Watch in 2019
Published by: NetworkComputing
Publish Date: 02/02/2019 | Posted 76 Days Ago
270: Security
KISS, Cyber & the Humble but Nourishing Chickpea
Published by: Dark Reading
Publish Date: 02/02/2019 | Posted 76 Days Ago
271: Technology
Selling Fake Followers and Likes Is Illegal, Landmark Settlement Finds
Published by: cnet
Publish Date: 02/02/2019 | Posted 76 Days Ago
272: Data
Using Customer Data to Benefit and Not Abuse Them
Published by: Business 2 Community
Publish Date: 02/02/2019 | Posted 76 Days Ago
273: Management
Data Breach Insurance: A Three-Part Problem
Published by: IAPP
Publish Date: 02/02/2019 | Posted 76 Days Ago
274: Technology
Facebook Hires Up Three of Its Biggest Privacy Critics
Published by: Wired
Publish Date: 02/01/2019 | Posted 77 Days Ago
275: Management
Leaders Need Grit, But It’s Not Enough for Success
Published by: TLNT
Publish Date: 02/01/2019 | Posted 77 Days Ago
276: Security
Security Crisis at the Network Edge
Published by: IT Web
Publish Date: 02/01/2019 | Posted 77 Days Ago
277: Security
Who Is Responsible for IOT Security?
Published by: IT Web
Publish Date: 02/01/2019 | Posted 77 Days Ago
278: Management
When Marketers Run Technology, Where Does IT Fit?
Published by: InformationWeek
Publish Date: 02/01/2019 | Posted 77 Days Ago
279: Compliance
How Organizations Need To React To New Data Privacy Challenges
Published by: Information Management
Publish Date: 02/01/2019 | Posted 77 Days Ago
280: Security
8 Cybersecurity Myths Debunked
Published by: Dark Reading
Publish Date: 02/01/2019 | Posted 77 Days Ago
281: Technology
5 Steps To A New IoT Support Strategy
Published by: TechRepublic
Publish Date: 01/31/2019 | Posted 78 Days Ago
282: Technology
Taking Ethical Action In Identity: 5 Steps For Better Biometrics
Published by: HelpNet Security
Publish Date: 01/31/2019 | Posted 78 Days Ago
283: Administration
Leading Hyperconverged Infrastructure Solutions Diverge Over QoS
Published by: DCIG
Publish Date: 01/31/2019 | Posted 78 Days Ago
284: Cloud
Rubrik Data Leak is Another Cloud Misconfiguration Horror Story
Published by: Dark Reading
Publish Date: 01/31/2019 | Posted 78 Days Ago
285: Security
Massive DDoS Attack Generates 500 Million Packets per Second
Published by: Dark Reading
Publish Date: 01/31/2019 | Posted 78 Days Ago
286: Devops
How to Use 9 Cloud DevOps Best Practices For Cost Control
Published by: Business 2 Community
Publish Date: 01/31/2019 | Posted 78 Days Ago
287: Technology
Court's Biometrics Ruling Poses Risk to Technology Companies
Published by: Security Today
Publish Date: 01/31/2019 | Posted 78 Days Ago
288: Operations
Disaster Recovery Procedures Deserve Daily Attention
Published by: Search IT Operations
Publish Date: 01/31/2019 | Posted 78 Days Ago
289: Operations
How To Ensure A Secure Disaster Recovery Operation
Published by: Search Disaster Recovery
Publish Date: 01/31/2019 | Posted 78 Days Ago
290: Technology
Can You Trust the Personal Internet of Things?
Published by: ZDnet
Publish Date: 01/30/2019 | Posted 79 Days Ago
291: Management
CIO, IT Roles Poised for a Revolution
Published by: InformationWeek
Publish Date: 01/30/2019 | Posted 79 Days Ago
292: Cloud
Cloud Migration Opportunities to Be Aware of in 2019
Published by: InformationWeek
Publish Date: 01/30/2019 | Posted 79 Days Ago
293: Security
The Biggest Cybersecurity Challenge? Communicating Threats Internally
Published by: HelpNet Security
Publish Date: 01/30/2019 | Posted 79 Days Ago
294: Cloud
Enterprises are Struggling with Cloud Complexity and Security
Published by: HelpNet Security
Publish Date: 01/30/2019 | Posted 79 Days Ago
295: Bit bucket
The Workplace Implications of the Impostor Phenomenon
Published by: Portman Partners
Publish Date: 01/30/2019 | Posted 79 Days Ago
296: Data
5 Keys for Eliminating Data Silos
Published by: ToolBox
Publish Date: 01/30/2019 | Posted 79 Days Ago
297: Connectivity
The 5G Skills Gap: What Does Government Need?
Published by: GCN
Publish Date: 01/30/2019 | Posted 79 Days Ago
298: Cloud
Study: Most Cloud Attacks are Opportunistic
Published by: GCN
Publish Date: 01/30/2019 | Posted 79 Days Ago
299: Operations
Computing Steps Closer to the Network's Edge
Published by: GCN
Publish Date: 01/30/2019 | Posted 79 Days Ago
300: Cloud
How to Become a Cloud Engineer: A Cheat Sheet
Published by: TechRepublic
Publish Date: 01/29/2019 | Posted 80 Days Ago
301: Security
Defending Against Cyberattacks by Giving Attackers 'False Hope'
Published by: Science Daily
Publish Date: 01/29/2019 | Posted 80 Days Ago
302: Connectivity
Speed of Light: Toward a Future Quantum Internet
Published by: Science Daily
Publish Date: 01/29/2019 | Posted 80 Days Ago
303: Data
Weather the Security Storms Ahead By Knowing Your Data
Published by: Networks Asia
Publish Date: 01/29/2019 | Posted 80 Days Ago
304: Technology
Stepping Up Security for an IoT World
Published by: Networks Asia
Publish Date: 01/29/2019 | Posted 80 Days Ago
305: Security
The Importance of Formal Verification in Smart Contracts
Published by: Networks Asia
Publish Date: 01/29/2019 | Posted 80 Days Ago
306: Compliance
13 Questions You Need to Ask to Close The Information Governance Gap
Published by: Information Management
Publish Date: 01/29/2019 | Posted 80 Days Ago
307: Technology
How Do Foldable Phones Work, And When Will I Get One?
Published by: How To Geek
Publish Date: 01/29/2019 | Posted 80 Days Ago
308: Compliance
3 Ways Companies Mess Up GDPR Compliance the Most
Published by: Dark Reading
Publish Date: 01/29/2019 | Posted 80 Days Ago
309: Security
Why Privacy Is Hard Work
Published by: Dark Reading
Publish Date: 01/29/2019 | Posted 80 Days Ago
310: Bit bucket
US Law Enforcement Shuts Down Massive Marketplace for Compromised Servers
Published by: Dark Reading
Publish Date: 01/29/2019 | Posted 80 Days Ago
311: Administration
Application Container Security Guide
Published by: NIST
Publish Date: 01/29/2019 | Posted 80 Days Ago
312: Cloud
Rise of Multicloud: 58% of Businesses Using Combination of AWS, Azure, or Google Cloud
Published by: TechRepublic
Publish Date: 01/28/2019 | Posted 81 Days Ago
313: Data
6 Ways Data Analytics Are Advancing The Enterprise
Published by: TechRepublic
Publish Date: 01/28/2019 | Posted 81 Days Ago
314: Security
5 Ways to Enforce Company Security
Published by: TechRepublic
Publish Date: 01/28/2019 | Posted 81 Days Ago
315: Storage
The State of Software-Defined Storage, Hyperconverged and Cloud Storage
Published by: DataCore Software
Publish Date: 01/28/2019 | Posted 81 Days Ago
316: Management
The 5 Stages of CISO Success, Past & Future
Published by: Dark Reading
Publish Date: 01/28/2019 | Posted 81 Days Ago
317: Security
Internet Society to Issue Privacy Code of Conduct
Published by: Dark Reading
Publish Date: 01/28/2019 | Posted 81 Days Ago
318: Security
5 Security Vulnerabilities That Leave The Protectors Unprotected
Published by: Executive Channel Magazine
Publish Date: 01/28/2019 | Posted 81 Days Ago
319: Security
Hackers Are Still Using Cloud Services to Mask Attack Origin and Build False Trust
Published by: TechRepublic
Publish Date: 01/27/2019 | Posted 82 Days Ago
320: Technology
Breakthrough Reported in Fabricating Nanochips
Published by: Science Daily
Publish Date: 01/27/2019 | Posted 82 Days Ago
321: Security
Did Australia Hurt Phone Security Around the World?
Published by: NY Times
Publish Date: 01/27/2019 | Posted 82 Days Ago
322: Operations
Why Serverless is Set to Grow in 2019
Published by: NetworkComputing
Publish Date: 01/27/2019 | Posted 82 Days Ago
323: Devops
A New Breed of IT Pro: The Hybrid Engineer
Published by: NetworkComputing
Publish Date: 01/27/2019 | Posted 82 Days Ago
324: Data
In an AI World, Drop the Idea that Empathy is Feminine
Published by: InformationWeek
Publish Date: 01/27/2019 | Posted 82 Days Ago
325: Data
What You Need to Know About Augmented Analytics
Published by: InformationWeek
Publish Date: 01/27/2019 | Posted 82 Days Ago
326: Bit bucket
What Are the Different Self-Driving Car “Levels” of Autonomy?
Published by: How To Geek
Publish Date: 01/27/2019 | Posted 82 Days Ago
327: Data
Finding Structure in an Unstructured Data World
Published by: Data Center Knowledge
Publish Date: 01/27/2019 | Posted 82 Days Ago
328: Compliance
Maximizing the Value of Your Data Privacy Investments
Published by: Cisco Sytems
Publish Date: 01/27/2019 | Posted 82 Days Ago
329: Technology
IoT Made Easy: 6 Options for Local Government
Published by: GCN
Publish Date: 01/27/2019 | Posted 82 Days Ago
330: Cloud
In Wake of Snowden, U.S. Cloud Providers Face Calls to Wall Off Data
Published by: IT World
Publish Date: 01/27/2019 | Posted 82 Days Ago
331: Technology
Do Crypto-Currencies Fuel Ransomware?
Published by: IEEE
Publish Date: 01/25/2019 | Posted 84 Days Ago
332: Devops
Why Developers and DevOps Pros Spend Most of Their Days Troubleshooting
Published by: TechRepublic
Publish Date: 01/24/2019 | Posted 85 Days Ago
333: Cloud
Security Is the No. 1 IT Barrier to Cloud and SaaS Adoption
Published by: TechRepublic
Publish Date: 01/24/2019 | Posted 85 Days Ago
334: Security
Phishing and Spearphishing: A Cheat Sheet For Business Professionals
Published by: TechRepublic
Publish Date: 01/24/2019 | Posted 85 Days Ago
335: Management
3 Enterprise Cybersecurity Trends CISOs Must Pay Attention To
Published by: TechRepublic
Publish Date: 01/24/2019 | Posted 85 Days Ago
336: Administration
10 Ways for System Admins to Remain Relevant
Published by: TechRepublic
Publish Date: 01/24/2019 | Posted 85 Days Ago
337: Connectivity
Why 56% of Large Businesses Are Turning to SDN for Cybersecurity
Published by: Networks Asia
Publish Date: 01/24/2019 | Posted 85 Days Ago
338: Connectivity
Considerations for the Use of 5G in the Enterprise
Published by: NetworkComputing
Publish Date: 01/24/2019 | Posted 85 Days Ago
339: Technology
Could Blockchain be the Key to Securing IoT?
Published by: NetworkComputing
Publish Date: 01/24/2019 | Posted 85 Days Ago
340: Data
Three Critical Data Considerations for IoT Analytics Success
Published by: Information Management
Publish Date: 01/24/2019 | Posted 85 Days Ago
341: Data
6 Top Analytics Trends and How to Act On Them
Published by: Information Management
Publish Date: 01/24/2019 | Posted 85 Days Ago
342: Storage
The Early Implications of NVMe/TCP on Ethernet Network Designs
Published by: DCIG
Publish Date: 01/24/2019 | Posted 85 Days Ago
343: Management
Think Twice Before Paying a Ransom
Published by: Dark Reading
Publish Date: 01/24/2019 | Posted 85 Days Ago
344: Security
Rushing to Patch? Here's How to Prioritize Your Security Efforts
Published by: TechRepublic
Publish Date: 01/23/2019 | Posted 86 Days Ago
345: Management
How to Be a More Efficient Leader: 5 Tips
Published by: TechRepublic
Publish Date: 01/23/2019 | Posted 86 Days Ago
346: Management
How Intel Closed the Gender Pay Gap for Employees Worldwide
Published by: TechRepublic
Publish Date: 01/23/2019 | Posted 86 Days Ago
347: Technology
Promising Steps Towards Large Scale Production of Graphene Nanoribbons for Electronics
Published by: Science Daily
Publish Date: 01/23/2019 | Posted 86 Days Ago
348: Operations
Edge Computing Best Practices
Published by: Networks Asia
Publish Date: 01/23/2019 | Posted 86 Days Ago
349: Devops
CISOs Provide Tips for Protecting Privileged Access In DevOps, Cloud Environments
Published by: Networks Asia
Publish Date: 01/23/2019 | Posted 86 Days Ago
350: Cloud
Cloud Container Services Comparison
Published by: Business 2 Community
Publish Date: 01/23/2019 | Posted 86 Days Ago
351: Operations
5 Ways to Reduce Downtime with Proactive IT Maintenance
Published by: Business 2 Community
Publish Date: 01/23/2019 | Posted 86 Days Ago
352: Security
Why We Need To Rip Off The Cybersecurity Band-Aids
Published by: ITProPortal
Publish Date: 01/22/2019 | Posted 87 Days Ago
353: Management
4 Governance Warning Signs When Reviewing Presented Analytics
Published by: Information Management
Publish Date: 01/22/2019 | Posted 87 Days Ago
354: Security
Agents of Disruption: Four Testing Topics Argue the Case for Agentless Security
Published by: HelpNet Security
Publish Date: 01/22/2019 | Posted 87 Days Ago
355: Security
2018's Most Common Vulnerabilities Include Issues New and Old
Published by: Dark Reading
Publish Date: 01/22/2019 | Posted 87 Days Ago
356: Cloud
Shadow IT, IaaS & the Security Imperative
Published by: Dark Reading
Publish Date: 01/22/2019 | Posted 87 Days Ago
357: Administration
Best Practices for Container Security
Published by: Alert Logic
Publish Date: 01/22/2019 | Posted 87 Days Ago
358: Security
What's Next for Mainframe Security?
Published by: GCN
Publish Date: 01/22/2019 | Posted 87 Days Ago
359: Cloud
In Cloud Security, Automation does *Not* Mean Automatic
Published by: GCN
Publish Date: 01/22/2019 | Posted 87 Days Ago
360: Technology
4 Brands That Realize the Potential of Augmented Reality
Published by: Advertising Week
Publish Date: 01/22/2019 | Posted 87 Days Ago
361: Bit bucket
Attitude Isn’t Everything, But It Is a ‘Difference Maker’
Published by: TLNT
Publish Date: 01/21/2019 | Posted 88 Days Ago
362: Bit bucket
Photos: The Best Smart Office Tech at CES 2019
Published by: TechRepublic
Publish Date: 01/21/2019 | Posted 88 Days Ago
363: Administration
How to Connect to VNC Using SSH
Published by: TechRepublic
Publish Date: 01/21/2019 | Posted 88 Days Ago
364: Connectivity
How Different Platforms Will Impact the Growth Of 5G
Published by: TechRepublic
Publish Date: 01/21/2019 | Posted 88 Days Ago
365: Security
5 Blockchain Trends to Expect In 2019
Published by: TechRepublic
Publish Date: 01/21/2019 | Posted 88 Days Ago
366: Connectivity
A New Low-Latency Congestion Control for Cellular Networks
Published by: Science Daily
Publish Date: 01/21/2019 | Posted 88 Days Ago
367: Management
Stress Advancement Opportunities And Work-Life Balance To Lure Top Data Talent
Published by: Information Management
Publish Date: 01/21/2019 | Posted 88 Days Ago
368: Cloud
Beware The Man In The Cloud: How To Protect Against A New Breed Of Cyberattack
Published by: HelpNet Security
Publish Date: 01/21/2019 | Posted 88 Days Ago
369: Administration
What's The Difference Between Type 1 And Type 2 Hypervisors?
Published by: Search Server Virtualization
Publish Date: 01/21/2019 | Posted 88 Days Ago
370: Data
Gartner's Top Data and Analytics Predicts for 2019
Published by: Gartner
Publish Date: 01/21/2019 | Posted 88 Days Ago
371: Operations
A Pragmatic Approach to Automation
Published by: NetworkComputing
Publish Date: 01/20/2019 | Posted 89 Days Ago
372: Technology
How to Secure Edge Computing in an Industrial IoT Network
Published by: NetworkComputing
Publish Date: 01/20/2019 | Posted 89 Days Ago
373: Security
Police Can't Force You to Unlock Your Phone By Iris, Face or Finger
Published by: TechRepublic
Publish Date: 01/19/2019 | Posted 90 Days Ago
374: Compliance
The Rx for HIPAA Compliance in the Cloud
Published by: Dark Reading
Publish Date: 01/19/2019 | Posted 90 Days Ago
375: Devops
PCI Council Releases New Software Framework for DevOps Era
Published by: Dark Reading
Publish Date: 01/19/2019 | Posted 90 Days Ago
376: Management
What Makes a Great IT Leader?
Published by: Business 2 Community
Publish Date: 01/19/2019 | Posted 90 Days Ago
377: Security
Why Vendor Security Practices are Causing Heartburn for Enterprise Pros
Published by: TechRepublic
Publish Date: 01/18/2019 | Posted 91 Days Ago
378: Compliance
4 Ways to Prepare for GDPR And Similar Privacy Regulations
Published by: TechRepublic
Publish Date: 01/18/2019 | Posted 91 Days Ago
379: Security
4 Strategies For Your IT Wearables Policy
Published by: TechRepublic
Publish Date: 01/18/2019 | Posted 91 Days Ago
380: Security
'We Want IoT Security Regulation,' Say 95% of IT Decision-Makers
Published by: Dark Reading
Publish Date: 01/18/2019 | Posted 91 Days Ago
381: Cloud
Top 10 Public Cloud Security Recommendations
Published by: Palo Alto Networks
Publish Date: 01/18/2019 | Posted 91 Days Ago
382: Bit bucket
The Race To Create A Real-Life Star Trek Medical Scanner
Published by: ZDnet
Publish Date: 01/17/2019 | Posted 92 Days Ago
383: Technology
2019: The Year AR Finally Goes From 'Unsexy' To Cool?
Published by: ZDnet
Publish Date: 01/17/2019 | Posted 92 Days Ago
384: Connectivity
Top 5 Terms to Know About 5G
Published by: TechRepublic
Publish Date: 01/17/2019 | Posted 92 Days Ago
385: Devops
DevOps: Big Effort, Big Benefits
Published by: InformationWeek
Publish Date: 01/17/2019 | Posted 92 Days Ago
386: Data
The Future of Data Infrastructure
Published by: Data Center Knowledge
Publish Date: 01/17/2019 | Posted 92 Days Ago
387: Security
Are You Listening to Your Kill Chain?
Published by: Dark Reading
Publish Date: 01/17/2019 | Posted 92 Days Ago
388: Compliance
The Complete Guide to GDPR
Published by: TechWorld
Publish Date: 01/17/2019 | Posted 92 Days Ago
389: Storage
Hard Disk Drive Unit Shipments Slowly Spinning Down
Published by: The Register
Publish Date: 01/16/2019 | Posted 93 Days Ago
390: Security
Five APAC Cyber Security Predictions For 2019
Published by: Networks Asia
Publish Date: 01/16/2019 | Posted 93 Days Ago
391: Data
Is Data Meeting Decision-Makers' Needs?
Published by: Networks Asia
Publish Date: 01/16/2019 | Posted 93 Days Ago
392: Management
The Costs of Cyberattacks Increased 52% to $1.1 Million
Published by: HelpNet Security
Publish Date: 01/16/2019 | Posted 93 Days Ago
393: Storage
NVMe Over Fabrics
Published by: Mellanox
Publish Date: 01/16/2019 | Posted 93 Days Ago
394: Storage
NVMe Over Fabrics Agenda
Published by: nvm EXPRESS
Publish Date: 01/16/2019 | Posted 93 Days Ago
395: Management
Why Cyberattacks Are the No. 1 Risk
Published by: Dark Reading
Publish Date: 01/16/2019 | Posted 93 Days Ago
396: Technology
10 Wearable Devices That Stole The Show At CES 2019
Published by: CRN
Publish Date: 01/16/2019 | Posted 93 Days Ago
397: Management
Spear Phishing: Targeting Executives to Steal the Most Critical Data
Published by: Business 2 Community
Publish Date: 01/16/2019 | Posted 93 Days Ago
398: Cloud
Cloud Native – Design, Delivery And Management of Applications
Published by: Cloud Tweaks
Publish Date: 01/16/2019 | Posted 93 Days Ago
399: Management
How To Know When to Let Someone Go
Published by: TechRepublic
Publish Date: 01/15/2019 | Posted 94 Days Ago
400: Technology
Breakthrough in Organic Electronics
Published by: Science Daily
Publish Date: 01/15/2019 | Posted 94 Days Ago
401: Security
Highlight These 4 Areas in Your Malware Incident Response Plan
Published by: Search Disaster Recovery
Publish Date: 01/15/2019 | Posted 94 Days Ago
402: Technology
10 Technology Trends You Should Be Worried about This Year
Published by: SD Times
Publish Date: 01/15/2019 | Posted 94 Days Ago
403: Management
How The Right Team Organization Helps to Survive a Microservices-Based Project
Published by: SD Times
Publish Date: 01/15/2019 | Posted 94 Days Ago
404: Bit bucket
Cops Told: No, You Can't Have A Warrant to Force A Big Bunch Of People to Unlock Their Phones by Fingerprint, Face Scans
Published by: The Register
Publish Date: 01/14/2019 | Posted 95 Days Ago
405: Security
If You Wanna Learn from the IT Security Blunders Committed By Hacked Hospital Group, Here's Some Weekend Reading
Published by: The Register
Publish Date: 01/14/2019 | Posted 95 Days Ago
406: Data
Top 5 Ways Humans Bias Machine Learning
Published by: TechRepublic
Publish Date: 01/14/2019 | Posted 95 Days Ago
407: Technology
Quantum Computer Components: Learn the Basics
Published by: TechRepublic
Publish Date: 01/14/2019 | Posted 95 Days Ago
408: Cloud
69% Of Enterprises Moving Business-Critical Applications To the Cloud
Published by: TechRepublic
Publish Date: 01/14/2019 | Posted 95 Days Ago
409: Security
A Lesson On The Need For Incident Playbooks Learned The Hard Way
Published by: IT World Canada
Publish Date: 01/14/2019 | Posted 95 Days Ago
410: Security
Phishing: The Simple Attack That Shreds The Defenses Of Sensitive Networks
Published by: Forrester
Publish Date: 01/14/2019 | Posted 95 Days Ago
411: Devops
Why Security By Design and Security Devops Are So Critical to Success
Published by: HelpNet Security
Publish Date: 01/14/2019 | Posted 95 Days Ago
412: Technology
IoT Community Announces Formation of Security, Privacy & Trust IoT Center of Excellence
Published by: HelpNet Security
Publish Date: 01/14/2019 | Posted 95 Days Ago
413: Security
Battling Ransomware: How To Prevent A Ransomware Incident
Published by: Forbes
Publish Date: 01/14/2019 | Posted 95 Days Ago
414: Security
Kudos to the Unsung Rock Stars of Security
Published by: Dark Reading
Publish Date: 01/14/2019 | Posted 95 Days Ago
415: Technology
The Complete Guide to Internet of Things, White Paper
Published by: Tech World Insights
Publish Date: 01/14/2019 | Posted 95 Days Ago
416: Data
Moving Data to the Cloud –Best Practices
Published by: Virtual Instruments
Publish Date: 01/13/2019 | Posted 96 Days Ago
417: Bit bucket
8K TV Has Arrived. Here’s What You Need to Know
Published by: How To Geek
Publish Date: 01/13/2019 | Posted 96 Days Ago
418: Cloud
The One Thing You Need More than Cloud Visibility
Published by: Business 2 Community
Publish Date: 01/13/2019 | Posted 96 Days Ago
419: Operations
Moving your Infrastructure to the Cloud
Published by: Diversity Limited
Publish Date: 01/13/2019 | Posted 96 Days Ago
420: Security
How To Tackle Phishing With Machine Learning
Published by: TechRepublic
Publish Date: 01/12/2019 | Posted 97 Days Ago
421: Technology
3D Printing 100 Times Faster with Light
Published by: Science Daily
Publish Date: 01/12/2019 | Posted 97 Days Ago
422: Operations
Identifying the Hidden Challenges Facing IT Infrastructure
Published by: No Jitter
Publish Date: 01/12/2019 | Posted 97 Days Ago
423: Cloud
Who Takes Responsibility for Cyberattacks in the Cloud?
Published by: Dark Reading
Publish Date: 01/12/2019 | Posted 97 Days Ago
424: Technology
Do Hidden Robots Need Guiding Standards Too?
Published by: Business 2 Community
Publish Date: 01/12/2019 | Posted 97 Days Ago
425: Management
NotPetya an ‘Act of War,’ Cyber Insurance Firm Taken to Task for Refusing to Pay Out
Published by: ZDnet
Publish Date: 01/11/2019 | Posted 98 Days Ago
426: Technology
Spintronics 'Miracle Material' Put To the Test
Published by: Science Daily
Publish Date: 01/11/2019 | Posted 98 Days Ago
427: Security
Why Computer Passwords Are Still a Problem in 2019
Published by: NextGov
Publish Date: 01/11/2019 | Posted 98 Days Ago
428: Data
The Problem With AI: Machines Are Learning Things, But Cant Understand Them
Published by: How To Geek
Publish Date: 01/11/2019 | Posted 98 Days Ago
429: Management
Four Cybersecurity Trends Every CIO Should Know
Published by: HelpNet Security
Publish Date: 01/11/2019 | Posted 98 Days Ago
430: Security
Don't Bite That Phishing Bait: Bet On These Five Simple Safety Rules
Published by: Forbes
Publish Date: 01/11/2019 | Posted 98 Days Ago
431: Security
A New Type of Network Is on the Rise to Combat the Quantum Threat to Encryption
Published by: Data Center Knowledge
Publish Date: 01/11/2019 | Posted 98 Days Ago
432: Security
Four Risks to Physical Data Security That Data Centers Must Consider
Published by: Data Center Knowledge
Publish Date: 01/11/2019 | Posted 98 Days Ago
433: Technology
Consumers Demand Security from Smart Device Makers
Published by: Dark Reading
Publish Date: 01/11/2019 | Posted 98 Days Ago
434: Bit bucket
The Best of CES 2019: Highlights and Top Products
Published by: CRN
Publish Date: 01/11/2019 | Posted 98 Days Ago
435: Operations
DARPA Probes Tech to Solve Supply Chain Uncertainty
Published by: FCW
Publish Date: 01/11/2019 | Posted 98 Days Ago
436: Technology
Meet Your New Colleague: Artificial Intelligence
Published by: Workforce
Publish Date: 01/10/2019 | Posted 99 Days Ago
437: Connectivity
Overtones Can Provide Faster Data Communication
Published by: Science Daily
Publish Date: 01/10/2019 | Posted 99 Days Ago
438: Technology
IoT Momentum Continues as Edge Computing Gains Traction
Published by: Networks Asia
Publish Date: 01/10/2019 | Posted 99 Days Ago
439: Connectivity
How Far Can 5G Go In the Enterprise?
Published by: Networks Asia
Publish Date: 01/10/2019 | Posted 99 Days Ago
440: Compliance
GDPR: Five Tips For Organizations to Remain Compliant
Published by: HelpNet Security
Publish Date: 01/10/2019 | Posted 99 Days Ago
441: Technology
Email Security Predictions: What We Can Expect In 2019
Published by: HelpNet Security
Publish Date: 01/10/2019 | Posted 99 Days Ago
442: Devops
Container Deployments Bring Security Woes at DevOps Speed
Published by: Dark Reading
Publish Date: 01/10/2019 | Posted 99 Days Ago
443: Management
Insight 2019 Technology Predictions
Published by: ComputerWeekly
Publish Date: 01/10/2019 | Posted 99 Days Ago
444: Data
Focus More On Disaster Recovery Strategy In 2019
Published by: Search Disaster Recovery
Publish Date: 01/10/2019 | Posted 99 Days Ago
445: Data
Essential Guide to Business Continuity and Disaster Recovery Plans
Published by: Search Disaster Recovery
Publish Date: 01/10/2019 | Posted 99 Days Ago
446: Data
What Are 3 Best Practices for Compressed Backups?
Published by: Search Data Backup
Publish Date: 01/10/2019 | Posted 99 Days Ago
447: Operations
Does AI Require High-End Infrastructure?
Published by: GCN
Publish Date: 01/10/2019 | Posted 99 Days Ago
448: Security
9 Essential Traits for a New Age CISO
Published by: ETCISO
Publish Date: 01/10/2019 | Posted 99 Days Ago
449: Security
Holographic Color Printing for Optical Security
Published by: Science Daily
Publish Date: 01/09/2019 | Posted 100 Days Ago
450: Cloud
How Security Operations Centers Are Adapting to the Cloud Era
Published by: Networks Asia
Publish Date: 01/09/2019 | Posted 100 Days Ago
451: Devops
Mastering The 12 Agile Software Development Principles
Published by: Information Management
Publish Date: 01/09/2019 | Posted 100 Days Ago
452: Compliance
Blockchain and GDPR: Not Mutually Exclusive But Can Be A Toxic Blend
Published by: Information Management
Publish Date: 01/09/2019 | Posted 100 Days Ago
453: Connectivity
Wi-Fi 6: What’s Different, and Why it Matters
Published by: How To Geek
Publish Date: 01/09/2019 | Posted 100 Days Ago
454: Management
Modern CISO Challenges: Implementing DevSecOps, Improving Security Operations
Published by: HelpNet Security
Publish Date: 01/09/2019 | Posted 100 Days Ago
455: Security
Encryption Backdoors Open a Pandora’s Box for Cybersecurity
Published by: HelpNet Security
Publish Date: 01/09/2019 | Posted 100 Days Ago
456: Operations
Data Center Power and Cooling Trends to Watch in 2019
Published by: Data Center Knowledge
Publish Date: 01/09/2019 | Posted 100 Days Ago
457: Security
Security Matters When It Comes to Mergers & Acquisitions
Published by: Dark Reading
Publish Date: 01/09/2019 | Posted 100 Days Ago
458: Operations
The Complete Guide to Hyperconverged Infrastructure
Published by: Tech World Insights
Publish Date: 01/09/2019 | Posted 100 Days Ago
459: Connectivity
Hacking Attacks On Your Router: Why the Worst Is Yet to Come
Published by: ZDnet
Publish Date: 01/08/2019 | Posted 101 Days Ago
460: Connectivity
CES 2019: Are these Newly Launched ‘5G’ Services Truly 5G Wireless?
Published by: ZDnet
Publish Date: 01/08/2019 | Posted 101 Days Ago
461: Bit bucket
CES 2019: A First Look At the Cool Tech of CES Unveiled
Published by: TechRepublic
Publish Date: 01/08/2019 | Posted 101 Days Ago
462: Administration
Enterprise Container Platform Software Suites, Q4 2018
Published by: Forrester
Publish Date: 01/08/2019 | Posted 101 Days Ago
463: Technology
Stepping Up Security for an IoT World
Published by: Networks Asia
Publish Date: 01/08/2019 | Posted 101 Days Ago
464: Technology
Experian Exec Says Biometrics Won’t Save You from Mobile Hacks
Published by: Networks Asia
Publish Date: 01/08/2019 | Posted 101 Days Ago
465: Administration
Remotely Stopping Wireshark
Published by: NetworkDataPedia
Publish Date: 01/08/2019 | Posted 101 Days Ago
466: Management
Emerging Tech Adoption Hindered By Yesterday's Systems and Skills
Published by: Information Management
Publish Date: 01/08/2019 | Posted 101 Days Ago
467: Connectivity
Why You (Probably) Don’t Want a 5G Router (No 5G Routers Yet)
Published by: How To Geek
Publish Date: 01/08/2019 | Posted 101 Days Ago
468: Connectivity
What Is 5G, and How Fast Will It Be?
Published by: How To Geek
Publish Date: 01/08/2019 | Posted 101 Days Ago
469: Security
Stronger DNS Security Stymies Would-Be Criminals
Published by: Dark Reading
Publish Date: 01/08/2019 | Posted 101 Days Ago
470: Bit bucket
The Best of CES So Far
Published by: cnet
Publish Date: 01/08/2019 | Posted 101 Days Ago
471: Security
The Challenges With Preventing Phishing Attacks: an Insider's Perspective
Published by: TechRepublic
Publish Date: 01/07/2019 | Posted 102 Days Ago
472: Connectivity
5G Outlook: What's To Come In 2019 and Beyond
Published by: TechRepublic
Publish Date: 01/07/2019 | Posted 102 Days Ago
473: Data
8 Top Artificial Intelligence and Analytics Trends for 2019
Published by: Digital Insurance
Publish Date: 01/07/2019 | Posted 102 Days Ago
474: Bit bucket
30 Hot Products And Technologies At CES 2019
Published by: CRN
Publish Date: 01/07/2019 | Posted 102 Days Ago
475: Bit bucket
25 Cutting-Edge Products at CES Unveiled 2019
Published by: CRN
Publish Date: 01/07/2019 | Posted 102 Days Ago
476: Connectivity
At CES 2019, 5G Rides One Last Wave of Hype Before Reality Kicks In
Published by: cnet
Publish Date: 01/07/2019 | Posted 102 Days Ago
477: Management
2019: The Year of the Value Stream
Published by: SD Times
Publish Date: 01/07/2019 | Posted 102 Days Ago
478: Technology
LA Taps Augmented Reality for Specialized Repairs
Published by: GCN
Publish Date: 01/07/2019 | Posted 102 Days Ago
479: Security
Ohio Law Creates Cybersecurity 'Safe Harbor' for Businesses
Published by: TechRepublic
Publish Date: 01/05/2019 | Posted 104 Days Ago
480: Management
Project Communication Plan: How To Effectively Communicate Change
Published by: PMWorld 360
Publish Date: 01/05/2019 | Posted 104 Days Ago
481: Compliance
Managing Security in Today's Compliance and Regulatory Environment
Published by: Dark Reading
Publish Date: 01/05/2019 | Posted 104 Days Ago
482: Technology
Here Are The 3 Biggest Trends To Watch In Mobile This Year
Published by: Business 2 Community
Publish Date: 01/05/2019 | Posted 104 Days Ago
483: Cloud
Open Stack Operations Guide
Published by: O'Reilly
Publish Date: 01/05/2019 | Posted 104 Days Ago
484: Compliance
The Glorious Brexit Uncertainty: The Only Dead Cert On Data Rules for Tech Biz in 2019
Published by: The Register
Publish Date: 01/04/2019 | Posted 105 Days Ago
485: Connectivity
Software-Defined WAN for Dummies
Published by: velocloud
Publish Date: 01/03/2019 | Posted 106 Days Ago
486: Management
When It's Time To Disagree And Commit
Published by: TechRepublic
Publish Date: 01/03/2019 | Posted 106 Days Ago
487: Security
What To Expect from Blockchain In 2019
Published by: TechRepublic
Publish Date: 01/03/2019 | Posted 106 Days Ago
488: Connectivity
The Internet is the Future of the WAN, but MPLS will Persist
Published by: NetworkComputing
Publish Date: 01/03/2019 | Posted 106 Days Ago
489: Data
Smart Data: The Secret Weapon Underpinning the Cloud
Published by: NetworkComputing
Publish Date: 01/03/2019 | Posted 106 Days Ago
490: Management
7 Key IT Investments for 2019
Published by: CIO
Publish Date: 01/03/2019 | Posted 106 Days Ago
491: Administration
Meet Hyper-V Cluster Requirements to Maintain High Availability
Published by: Search Server Virtualization
Publish Date: 01/03/2019 | Posted 106 Days Ago
492: Devops
DevOps Security Model Hits Organizational Snags
Published by: Search IT Operations
Publish Date: 01/03/2019 | Posted 106 Days Ago
493: Connectivity
5G Market Predictions for 2019
Published by: TechRepublic
Publish Date: 01/02/2019 | Posted 107 Days Ago
494: Management
The Year Ahead: Technologies That Will Shake the IT Industry In 2019
Published by: Networks Asia
Publish Date: 01/02/2019 | Posted 107 Days Ago
495: Technology
5 Technology Trends for 2019
Published by: Networks Asia
Publish Date: 01/02/2019 | Posted 107 Days Ago
496: Technology
Top 10 IoT Vulnerabilities of 2018
Published by: IT World Canada
Publish Date: 01/02/2019 | Posted 107 Days Ago
497: Security
Making Staff an Effective First Line of Defense In Data Security
Published by: Information Management
Publish Date: 01/02/2019 | Posted 107 Days Ago
498: Security
7 Best Practices for Combating Cybersecurity Risks
Published by: Digital Insurance
Publish Date: 01/02/2019 | Posted 107 Days Ago
499: Technology
2018 Augmented and Virtual Reality Survey Report
Published by: Perkins Coie
Publish Date: 01/01/2019 | Posted 108 Days Ago
500: Security
4 Interesting Trends to Watch in The Applications of Blockchain Technology in 2019
Published by: ToolBox
Publish Date: 01/01/2019 | Posted 108 Days Ago

56 Articles Added in the Last 7 Days
12,852 Articles with 15,514 subscribers
3,392 C-Level and 7,495 LinkedIn Connections


People ask the difference between a leader and a boss. The leader leads, and the boss drives.
- Theodore Roosevelt – (1858-1919) 26th president of the U.S. -
The only IT and Data Center Newsletter that is 100% unbiased in its content and delivery. We cut through the spin and get to the facts. Clean, unvarnished and fresh. Every week there are more than 400 online sources that contain articles of interest to IT and DC Professionals at all levels. Every week the IT Weekly Newsletter compiles 40+ of the absolute best technical articles with no product, company or press release bias, no pop-up ads, no sales angles. addressing everyday IT and Data Center issues involving:
  • Reducing Business and IT Risk
  • Improving Infrastructure Quality of Service
  • Increasing Availability and Reliability
  • Reducing Application Response Time
  • Increasing Business Productivity and Agility
  • Improving Server, Storage and Networks
  • Improving Security and Compliance
  • Protecting, Preserving and Restoring Data
  • Improving Regulatory Compliance
  • Reducing Audit Errors
  • Reducing IT and DC Costs
  • Developing Proactive Business Solutions
Header
Copyright © 2019 Promethean Data Solutions, Inc.   -   Warren Avery   -   602-463-6558   -   wavery@ITWeeklyNewsletter.com