Trending Articles

Trending Sources

3 Bear Essential Digital Risk Vulnerabilities in the Cyber War of Influence


Crystal Lister. election process. election process. government Joint Analysis Report. CTO Cyber Security News Cognitio

New products of the week 1.16.17

Network World

New products of the week Image by GSX Our roundup of intriguing new products.

Update On The Megatrend of CloudComputing


Bob Gourley. There are seven key MegaTrends driving the future of enterprise IT. Will the future Internet be “walled gardens?

Digital Realty Signals the Gloves are Coming Off in 2017

Data Center Knowledge

After two years of austerity, the REIT is planning to spend up to $1B on data center construction this year Read More.

How To Hold On To Your Best IT Workers

The Accidental Successful CIO

Hiring the best workers is just the start, now you have to get them to stay Image Credit: Matt McGee. Why The Best Leave. – Dr. Jim Anderson.

More Trending

How much is a data breach going to cost you?

Network World

It is going to cost ya Image by Thinkstock A recent IBM study found that the average cost of a data breach has hit $4 million—up from $3.8

IBM 31

Hackers steal 900 GB of data from phone hacking company Cellebrite

Tech Republic Security

Hackers have taken records of customer information and technical resources from Cellebrite, an organization which sells hardware designed to extract data from secured smartphones

Data 24

Travelers are Finding Ways to Save Money with Big Data


Rick Delgado. We’d all love to see the world. It’s on our bucket list to travel more, and we always brag to friends and families about the day where we’ll get to pack a suitcase and take off to explore the globe. But let’s face it. Who really has the cash? At least – not without big data it isn’t. In fact, it can become the new normal. Big Data

Managed AWS Cloud ‘Fastest Growing Business Rackspace Has Ever Had’, President Says

Data Center Knowledge

A veteran with Rackspace, Jeff Cotten has a lot to say about the cloud and where it's going Read More. Shared

Cloud 29
Cloud 29

Tech skills shortage: Amazon trains veterans to fill the gap

Tech Republic Cloud

While debate still continues over the extent of the digital skills shortage, Amazon has launched a program that will provide tech industry training and job placements

As authentication options blossom, startup tries to simplify deployment, maintain flexibility

Network World

A startup with a strong pedigree is trying to address the problem that businesses have keeping up with the ever-increasing options for authentication.

Amazon Echo murder case raises IoT privacy questions for enterprise users

Tech Republic Security

Police in Arkansas want to access an alleged murderer's Amazon Echo recordings, raising new privacy issues around the Internet of Things

What's the Shelf-Life of a Wi-Fi Network Design?

IT Toolbox

Wireless network design is a combination of knowing how WLAN technology works, the ability to understand the environment that the WLAN will be deployed in, experience, and critical thought. Good tools help, as does a sound methodology. One designer may recommend

Who’s Responsible for Airflow Management in Colocation Data Centers?

Data Center Knowledge

The demand for colocation space and services is primarily driven by cost. This will eventually shift the conversation to both tenants and owners being more concerned about data center airflow management. Read More. Industry Perspectives

Data 26

3 reasons why 2017 will see massive cloud migration

David Linthicum

How many Global 2000 enterprise applications are on the public cloud right now? You’ll see estimates of 20 to 30 percent, but that overstates the reality. When all outsourced hosting is taken into account—which includes SaaS, IaaS, and PaaS—many analysts estimate that 20 to 30 percent of workloads are currently on the cloud.

Geeky ways to celebrate Friday the 13th

Network World

You're in luck We've cobbled together a slew of things for the geeky among you to do on Jan. 13 -- Friday the 13 th that is th. 13, 2017.

Mobile 28

49% of businesses fell victim to cyber ransom attacks in 2016

Tech Republic Security

Ransom is the top motivation behind cyber attacks, according to a report from Radware, and IT professionals are most concerned about data loss. Here's what you need to know

Digital Customer Experience ROI: (How To) Show Me The Money

Forrester IT

Forrester's clients frequently ask us how to build the business case for customer journey mapping, particularly for digital experiences and digital products. We have proven that better customer experiences drive revenue in industries with low switching costs. But what about investments in customer journey mapping? Application Development

Here’s What’s Next for CenturyLink’s Data Center Business

Data Center Knowledge

Unit prepares for becoming a platform for new owners’ cybersecurity-focused solution Read More. CenturyLink Colocation Deals Featured

2017 Outlook - 3 Things to Watch for with the Contact Center

IT Toolbox

To close out this short series previewing 2017, it’s important to look at the contact center space, even if you don’t currently have this in your organization. In fact, my analysis here will be especially interesting for these businesses given how things are evolving. Before getting

GoDaddy revokes nearly 9,000 SSL certificates issued without proper validation

Network World

GoDaddy, one of the world's largest domain registrars and certificate authorities, revoked almost 9,000 SSL certificates this week after it learned that its domain validation system has had a serious bug for the past five months. As a result, the system might have validated some domains when it shouldn't have, opening the possibility of abuse.

Get ready for the rise of spymail, the hottest trend in email hacking

Tech Republic Security

A dramatic spike in malicious email code that monitors user behavior used in phishing attacks has cost business over $3 billion in recent years. Learn how to discover who's snooping on your email

Former DHS head urges Trump to see economic dangers from cyberattacks

ComputerWorld IT Management

Last week's U.S. intelligence report tracing Russia's cyber-meddling with the 2016 presidential election is a timely reminder of the cybersecurity risks that the government and private companies face, said Tom Ridge, the nation's first secretary of Homeland Security. It's a reminder of how serious and permanent the risk is.

Report: IBM in Talks About Takeover of Lloyds Data Centers

Data Center Knowledge

Move seen as way to raise cash by financial services giant going through restructuring Read More. Data Center Strategies IBM

Mapping the Customer Journey

IT Toolbox

Every interaction between your company and a customer can be viewed as a journey. To provide the best possible service to your customer you need to understand the steps in the journey and what you can do to improve your customer's overall experience. useful tool to understand the process is a customer journey map.

Tools 22

Thoughts on incident response automation and orchestration

Network World

Just this week, I was reviewing several interviews I conducted with cybersecurity professionals on their organizations’ processes and tools for incident response (IR) automation and orchestration. Here are a few things that jumped out at me: 1.   IR is still often anchored by basic tools, manual processes, and key personnel.

Tools 23

England’s largest NHS trust investigates cyber attack

Computer Weekly

A cyber attack on England's largest NHS trust has underlined the importance of cyber security at healthcare organisations and has raised renewed fears about NHS legacy IT systems

Step-By-Step: Displaying info regarding previous logons on Windows 10


The Consumer Electronics Show has always been a blur of innovative device launches from a multitude of manufactures.

IBM’s Leading Data Center Storage Line Gets All-Flash Upgrade

Data Center Knowledge

One more swift kick toward the exit door of history for rotating hard disk drives Read More. Featured IBM Storage flash storage IBM Data Systems Levi Norman Power8

IBM 21

Benchmarking for Operational Excellence: Part Three - Metrics

IT Toolbox

Yesterday we looked at six types of benchmarks used in Benchmarking for Operational Excellence. We will now look at the types of metrics that can be applied in the measurement of internal, competitive, best-in-class, process, vertical and strategic benchmarks as they apply to operational excellence


Google Cloud Key Management Service could help more enterprises encrypt data

Network World

Attackers are increasingly able to penetrate perimeter defenses, compromise accounts and mine data without targets even being aware of the attack, as the Democratic National Committee breach proved. Encrypting data is the best defense. Strong encryption of complex data structures requires a Key Management System (KMS).

Data 22

Top fintech trends in Sweden in 2017

Computer Weekly

The Nordic region is a hotspot for IT startups and Sweden is a country punching above its weight in financial technology

Too late, PaaS, you missed your shot in the cloud

David Linthicum

PaaS simply isn’t used as much by enterprises as initially predicted. Although PaaS offerings vary greatly, most provide facilities for application design, deployment, testing, and self-provisioned hosting. It’s best described as a turnkey development and deployment solution. Why hasn’t PaaS taken off? I see several reasons.

New Investors Aboard, CEO Expects Compass to Scale by Order of Magnitude

Data Center Knowledge

New ownership structure gives developer access to capital that will fuel next stage of growth Read More. Compass Datacenters Deals