Trending Articles

13 Tech Experts Share What Facebook Should Do Post-Data Breach


Facebook has had a harrowing 2018. First the Cambridge Analytica data breach scandal and then the issue of selling personal user information to Chinese smartphone companies for profit. And now, the recent data breach which could have affected millions of its users. When a business experiences a security breach, there are a lot of steps […]. Cyber Security News Facebook

How Can A CIO Help To Transform WebMD Into An Action Center

The Accidental Successful CIO

Everyone already knows about WebMD Image Credit: Peter Morville. In this modern age in which we are living, what do you do when you start to feel not so good?

Predictions 2019: Transformation Goes Pragmatic

Forrester IT

Our Predictions 2019 guide, “Transformation Goes Pragmatic,” is live. What do we mean by pragmatism? A sense of realism, practical steps, a desire for tangible outcomes.

2018 AT&T Business Summit: Security “in” and “of” the Cloud

Cloud Musings

While public cloud is undoubtedly an outsized piece of the conversation, news headlines of the latest data breach can make this move a very frightening proposition.

Fix your data before you move it to the cloud

David Linthicum

Data seems to be a forgotten component of a good system architecture. In cloud migrations, I’m often taken back how the data that was bad on-premises is worse in the cloud. What does bad data look like? Poor data structures, redundant data, no single source of truth, and security and compliance issues all top the list. Indeed, too many enterprises have just kicked the data can down the road using cloud computing camouflage. InfoWorld explains: What is cloud-native?

Examine The Cybersecurity Risk Ratings Market With The Forrester New Wave™ Evaluation

Forrester IT

The Forrester New Wave™: Cybersecurity Risk Ratings, Q4 2018 Earlier today, we published “The Forrester New Wave™: Cybersecurity Risk Ratings, Q4 2018” evaluation.

More Trending

Turn your data geeks into customer geeks

Eric D. Brown

What would you do if you had so much data about your customers that you know could know (almost) everything about your customer when they contacted you?

Data 130

My Brush with Royalty: Queen Latifah

Cloud Musings

Queen Latifah! Hip Hop Icon. Movie Star. Television Star. Fashion Model. Songwriter. Producer. Entrepreneurial Genius!?

Film 130

Don’t make your cloud migration a house of cards

David Linthicum

I’m often taken aback by the number of mistakes IT made with on-premises traditional systems that it’s now replicating in the cloud. If you have a cruddy applications design or overall architecture and relocate it the cloud, you end up with cruddy IT assets that are now in the cloud. Fact: The cloud is not an automated change agent for bad IT decisions.

Your People Problem With Emerging Technology And Innovation

Forrester IT

Nearly half of the firms we survey are prioritizing innovation as key to their business strategy. When I step back and think about it, the why is easy to understand; exponential changes like Moore’s Law in the past and Metacalfe’s Law today are accelerating the pace of business.

Survey 142

Everyone Should Patch, Always: Microsoft patches Windows zero-day used by multiple cyber-espionage groups


Microsoft has patched a zero-day escalation of privilege bug in Windows after Kaspersky Lab researchers noticed multiple cyber-espionage groups exploiting it. The zero-day, tracked as CVE-2018-8589, impacts the Windows Win32k component. Microsoft classified the issue as an “elevation of privilege” vulnerability and says that before an attacker could use this zero-day to gain elevated privileges, they’ll […]. Cyber Security News Microsoft

Groups 136

Improving Customer Experience by Automating Incident Response

Social, Agile and Transformation

The tools and practices of IT Operations have to get better and easier. Every IT Ops engineer has the job of responding to alerts when a website is down or unresponsive. To restore service, the engineer follows a certain procedure to restart the web server and validate that the website is operational. Maybe it happens again a few days later and another engineer repeats the procedure to restore. AI cio cloud computing crisis management customer experience DevOps it management

Ciao Milano! – An AWS Region is coming to Italy!

All Things Distributed

Today, I am happy to announce our plans to open a new AWS Region in Italy! The AWS Europe (Milan) Region is the 25th AWS Region that we've announced globally.

Sports 113

SCCM Management Insights – Healthy SCCM Infra


I shared my experience about SCCM Management insights in the previous post. In this post, you will what are the management insight rules probably be coming soon with SCCM 1810 production release. SCCM 1810 production release is due for Nov 2018. Before the end of Nov 2018, I’m expecting the fast ring production version of […]. The post SCCM Management Insights – Healthy SCCM Infra appeared first on SCCM Intune Real World Enterprise Experience Blog by Anoop C Nair.

eCommerce Will Account for 36% of Global Fashion Retail Sales by 2022

Forrester IT

Fashion is the second largest retail category after grocery. The eCommerce shift is a significant, palpable movement in most economies. A quarter of clothing, accessories, and footwear (fashion) spending already occurs online and is still rapidly growing.

FTC Launches New Cyber Security Tools for Small Business


The Federal Trade Commission (FTC) has launched a resource to raise awareness about the vital role cybersecurity plays for the 32+ million small businesses in the US. This effort was part of the National Cyber Security Awareness Month (NCSAM) in October, which has been recognized every month since 2003. The NCSAM was established with the collaboration […]. Cyber Security

GPUs are vulnerable to side-channel attacks

Network World

Computer scientists at the University of California at Riverside have found that GPUs are vulnerable to side-channel attacks, the same kinds of exploits that have impacted Intel and AMD CPUs. Two professors and two students, one a computer science doctoral student and a post-doctoral researcher, reverse-engineered a Nvidia GPU to demonstrate three attacks on both graphics and computational stacks, as well as across them.

Intel 74

Consider Our Vets and One Younger Source as Tech Pros

Information Week

Veterans Day is an appropriate time to remember that the millions of US vets represent a talented tech workforce. At the same time, maybe there's a second way to help close the tech talent gap


Kubernetes Meets Big Data


Organizations yearn order and simplicity over chaos and confusion, but the data-driven era we live in challenges these desires on a daily basis. Seemingly every day, massive amounts of transactional and streaming data is being introduced into enterprises.

Rethink The In-House Agency Hype

Forrester IT

CMOs Should Rethink Their Efficiency Argument For An Effectiveness Strategy Headlines blustering about in-house agencies have marketers buzzing and agencies fretting. While the in-house trend has grown in popularity, it still lacks in maturity.

Trends 142

Bob Gourley Interviews Cyber Tech Titan Richard Bejtlich On Enterprise Cybersecurity Lessons Learned


Carahsoft and Corelight are sponsoring a webinar 13 December 2018 which features an interview of Cybersecurity Pioneer Richard Bejtlich by CTOvision publisher Bob Gourley. For more and to register see: Lessons Learned from a Tech Titan. Few defenders have seen as much action in cyberspace as Richard Bejtlich. His career in network security started in the […]. Artificial Intelligence CTO Cyber Security Cyber War Events News

What is Transport Layer Security (TLS)?

Network World

Despite the goal of keeping Web communications private, flaws in the design and implementation of Transport Layer Security have led to breaches, but the latest version – TLS 1.3 – is an overhaul that strengthens and streamlines the crypto protocol. What is TLS? TLS is a cryptographic protocol that provides end-to-end communications security over networks and is widely used for internet communications and online transactions.

Repurpose Existing Devices to Windows Autopilot – SCCM or MDT?


Repurposing of existing devices is one of the decisions that you want to make while you are getting ready with Windows Autopilot. I’m trying to help you to decide how to repurpose devices to Windows Autopilot? Is it best use MDT or SCCM? Related Posts – Step by Step Guide Windows AutoPilot Process with Intune & Beginners Guide Setup […]. The post Repurpose Existing Devices to Windows Autopilot – SCCM or MDT?

5 Reasons To Keep Up With Technology In Business


Information Technology Blog - - 5 Reasons To Keep Up With Technology In Business - Information Technology Blog. There is a lot to think about when you’re a business owner.

Transform Your Organization From Data-Driven To Insights-Driven

Forrester IT

Over the last five years, most large enterprises have slowly but surely matured from being data-aware to data-driven. They all collect data from operational and transactional applications; process the data into data lakes, data hubs, data warehouses, and data marts; and build business intelligence (BI) and analytics applications to understand what the data is telling […]. advanced analytics analytics applications big data business intelligence IoT analytics AI artificial intelligence IoT

The importance of maintaining cyber security in your business


Read why Scott Bordoni says that maintaining cybersecurity is important for any business – big or small on IT Pro Portal : Technology over the past few decades has become an increasingly integral aspect of the workplace. From email correspondence and financial transactions to professional networking and collaborative work documents, businesses rely on technology to be […].

Top Service Challenges Enterprises Face in 2019

Perficient - Digital Transformation

Migrating from one technology to another always has its unique challenges, and migrating to Salesforce Service Cloud is no exception.

What Special Ops Taught Me About TechOps

Information Week

A look at how a day of special forces-style training delivered benefits in the technology realm

Restrict Personal Email Sync On Windows Devices


Intune has an out of box option to setup email profile. However, I couldn’t find any out of the box option to restrict personal eMail sync. So the only option left to deploy custom Windows 10 CSP policy to block personal email sync from the business device.

AI Tech Shines A Path To Empathetic Triggers

Forrester IT

I’ve always been attracted to the power of empathy. That being said, I’m a longtime fan of “soft” skills — skills that are helpful in relationship-building, making me a better friend and (presumably) a more tolerable colleague. Empathy clearly fits squarely there. But a more savvy marketer?