Trending Articles

Trending Sources

HIPPA and Ransomware in the Healthcare Sector: “Your PHI or your life”

CTOvision

Bob Gourley. The threat of ransomware is hitting every sector of the economy. Healthcare has been especially hard hit. The U.S.

PowerShell: MSI Function that Installs, Uninstalls, and Repairs with Verification

Mick's IT Blog

With the enormous help of Sapien's PowerShell Studio , I wrote this is an all encompassing MSI update to the MSI-By-Name Uninstaller I published.

The State of Digital Currency: A discussion with Ed Scheidt

CTOvision

He and I get together and typically it’s a free-ranging discussion that covers a lot of topics, math, current events, technology and life in general.

Cognitive Business: When Cloud and Cognitive Computing Merge

Cloud Musings

Cloud computing has taken over the business world! This rapid shift is, in fact, accelerating. Figure 1- ComputerWins on ‘Jeopardy!’:

Netflix Closed Their Last Data Center – Should You Do The Same?

The Accidental Successful CIO

Netflix now runs everything in the cloud, should you be doing this? Image Credit: Televisione Streaming. How Netflix Moved To The Cloud.

More Trending

Gartner: Cloud Shift to Account for $1 Trillion in Spending by 2020

Data Center Knowledge

In 2016, the aggregate amount of cloud shift will reach $111 billion, ballooning to $216 billion in 2020, according to analysts Read More. Shared

Cloud 35
Cloud 35

How Can CIOs Deal With The Challenge Of Creating Very Large Networks?

The Accidental Successful CIO

As the person with the CIO job, it’s going to be your job to find ways for the company to keep building out its network without going broke.

PowerShell: Retrieving File Details

Mick's IT Blog

I have been writing a new script and was in need of getting the product name from the file details. split("="))[1].Trim()

Unilever Buys Dollar Shave Club To Become Digital Direct

Forrester IT

Unilever is the latest in a long string of enterprise giants to acquire digital. It acquired the digital-native startup, Dollar Shave Club, for $1 billion. I've been telling the Dollar Shave story lately as a way to describe the disruption possible when a company uses digital technology to establish a direct relationship with a customer.

New Microsoft Data Center in Iowa Will Be 1.7M Square Feet

Data Center Knowledge

Company expects to spend up to $2B on its third West Des Moines facility Read More. Cloud Computing Data Center Strategies Iowa Microsoft SaaS Site Selection

Ransomware 2.0 is around the corner and it's a massive threat to the enterprise

Tech Republic Security

The profits from ransomware are making it one of the fastest growing types of malware and new versions could negatively impact entire industries, according to a Cisco report

At Black Hat: A free tool for spear phishing Twitter

Network World

A spear phishing tool to automate the creation of phony tweets - complete with malicious URLs – with messages victims are likely to click on will be released at Black Hat by researchers from ZeroFOX. Then it writes a tweet loaded up with a link to a site containing malware and sends it.

Discovering and proactively blocking malicious infrastructure

CTOvision

Bob Gourley. PassiveTotal is designed to provide analysts with a single view into all the data they need. It is also designed to be easy to use.

Protecting Your VoIP System from Security Threats

IT Toolbox

In today's technology-driven world, a major concern for many IT departments is securing confidential and important business data. Breaches are common and can be a disaster for companies, and securing VoIP lines is no exception.

VOIP 28

Equinix Data Center Outage in London Blamed on Faulty UPS

Data Center Knowledge

Outage causes disruptions for London Internet Exchange, connectivity problems for BT customers Read More. Colocation Connectivity Downtime Equinix London Networking Peering Power Telecity

Almost half of UK's largest councils lack cloud strategy, Eduserv FOI study reveals

Computer Weekly

Eduserv study into cloud take-up inside local authorities suggests council CIOs are still over-invested in on-premise technology

Study 36

Big data paper shows stock market trades behave like light bulbs

Network World

In the stock market, electronic trading (AKA “etrading”) originally started so people could buy and sell stocks and other financial instruments more easily. No more hanging out on the floor of a stock exchange or calling your orders into your broker; you could do it all from your desktop.

Analyzing an Organization’s Vulnerability Footprint from an Adversary’s Perspective Can Enable Proactive Detection and Efficient Mitigation of Cyber Threats

CTOvision

Charles Hall. NEW YORK, July 20, 2016 –  Deloitte Advisory Cyber Risk Services and Cray Inc. Nasdaq: CRAY), the global supercomputing leader, introduced today the first commercially available high-speed, supercomputing threat analytics service,  Cyber Reconnaissance and Analytics. What do you look like to your adversary?” commented  About Cray.

Video: How ForeScout Technologies fends off cyberattacks at the RNC and DNC

Tech Republic Security

TechRepublic's Dan Patterson talked with ForeScout VP Katherine Gronberg about the biggest cyber threats facing the conventions, and what goes on in the command center where those threats are monitored

Video 24
Video 24

Why Salesforce Bought Coolan, a Data Center Optimization Startup

Data Center Knowledge

Deal gives cloud giant powerful infrastructure optimization platform and webscale-minded team Read More. Blades Cloud Computing Deals Featured Infrastructure Management SaaS Salesforce

OpenStack embraces Kubernetes to become a whole lot more like Google

Tech Republic Cloud

A new partnership between Mirantis, Intel, and Google promises to remake OpenStack in Google's image, containerizing OpenStack services and managing them in Kubernetes

Intel 20

The history of ransomware

Network World

Suprisingly long history Image by Thinkstock Ransomware has been the most pervasive cyber threat since 2005.

Data 29
Data 29

Zero Days by Alex Gibney: A documentary examining a watershed event in cyber conflict

CTOvision

Bob Gourley. If it failed then that war could have even led to a wider, global conflict. Success was critical. Watch it at: Zero Days.

UK government needs 2,800 extra digital staff to deliver current plans

Computer Weekly

Head of the National Audit Office highlights risks from a 'digital capability' gap across Whitehall

Google Launches Its First Cloud Data Center on West Coast

Data Center Knowledge

Says users in West Coast cities should expect much faster cloud Read More. Cloud Computing Data Center Strategies Google Oregon Site Selection

10 tips to avoid ransomware attacks

Tech Republic Security

As ransomware increasingly targets healthcare organizations, schools and government agencies, security experts offer advice to help IT leaders prepare and protect

New products of the week 7.25.16

Network World

New products of the week Our roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.

Changing Government Requirement For Market Research to Continuous Market Assessment

CTOvision

Bob Gourley. During interview today with GovMatters.tv  I'll be discussing an observation many of us in the enterprise technology community have been discussing lately. There is a growing consensus in the enterprise tech community (CIO, CTO, CISO) regarding the Cambrian Explosion of great capabilities in the tech sector. Not going to happen.

Tech firms tackle IoT security with management protocol

Computer Weekly

A group of tech firms have joined forces to develop a management protocol for IoT devices that could pave the way to an open, interoperable standard to address security and privacy risks

Equinix + Arrow Deal Boosts Azure

Data Center Knowledge

Read More.

Forrester's 2016 ECM Panel Survey Is Open - Call for Participation

Forrester IT

Forrester's survey for ECM decision-makers is open, and we're looking for your participation! Take this opportunity to provide your perspectives on the key vendors, the challenges, and the opportunities you see in this technology market. This survey is intended for ECM decision-makers or influencers in end user organizations.

German shooter hacked Facebook account to lure victims, bought gun on dark net

Network World

The media is delving into the digital life of the teenage shooter who opened fire at McDonald’s in Munich Germany’s Olympia Mall. Nine people were killed and 27 others were injured in the tragic rampage. In the end, he killed himself. To read this article in full or to leave a comment, please click here

Microsoft adds new cloud-based tools and machine learning features to Office apps

Tech Republic Cloud

Microsoft Word, Outlook, and PowerPoint are getting intelligent updates to help improve productivity and performance with the addition of machine learning and natural language processing

Tools 17

Estonia seeks UK datacentre to protect citizens' personal data from hackers - report

Computer Weekly

The Baltic state is reportedly in early stage talks with the UK and Luxembourg governments about setting up a backup site in either country to protect citizens’ data from risk of hackers