Trending Articles

Are you ready for state-sponsored zombie malware attacks?

CTOvision

On January 4, 2017 CTO Vision published a blog post titled “Are you ready for a state-sponsored cyber attack?” In hindsight, the blog post should have been titled “Are you ready for state-sponsored zombie malware attacks?” Zombie malware combines the most deadly aspects of malware and zombie computers into one horrible mess. Typically malware gets […]. Artificial Intelligence CTO Cyber Security Cyber Threats Internet of Things News Robots Cybersecurity Malware

Make The Case That CX Transformation Is Both Important And Urgent

Forrester IT

Customer experience (CX) is finally gaining the attention it deserves, with 84% of companies seeing CX as a higher priority than they did two years ago. But there’s a disconnect when it comes to executing CX transformation, and the underlying issue is a lack of executive buy-in.

Trending Sources

CIOs Start To Become More Important

The Accidental Successful CIO

Companies are starting to realize the value of their CIOs Image Credit: las – initially. The importance of a CIO can be measured in a number of different ways. One such way is how often the CEO seeks out the CIO for consultation.

Docker Can Now Containerize Legacy Apps Running on Mainframes

Data Center Knowledge

Latest Enterprise Edition release also beefs up security Read More. DevOps Docker Security

More Trending

7 free tools every network needs

Network World

In the real estate world, the mantra is location, location, location. In the network and server administration world, the mantra is visibility, visibility, visibility. If you don't know what your network and servers are doing at every second of the day, you're flying blind. Sooner or later, you're going to meet with disaster. Fortunately, many good tools, both commercial and open source, are available to shine much-needed light into your environment.

World’s Largest IPv6 Network Reaches a Milestone

Data Center Knowledge

Hurricane Electric world's first to interconnect 4,000 IPv6 networks Read More. Networks

IPv6 43

Top UK directors lack training to deal with cyber attacks

Computer Weekly

The UK’s top firms and charities urgently need to do more to protect themselves from online threats, according to a government-backed audit

3 lessons for collaboration

ComputerWorld IT Management

It’s wonderful that organizations today have access to a treasure trove of powerful software tools designed to enhance, amplify and optimize benefits accruing from collaboration. But having access to, and even acquiring, such tools isn’t sufficient to realize the benefits. Your organization will not unlock the full value of this treasure trove unless it makes collaboration a strategic priority. From research I have done on the new collaboration space, I see three lessons for today’s leaders.

Tools 22

How Should Insurers Unleash Their Digital Businesses? By Mastering The Digital Basics

Forrester IT

Canadian and US insurers have a lot on their plates this year. They’re not just grappling with extreme weather, substantial underwriting losses from all those motor vehicle claims, but also rising customer expectations and an onslaught of fintech disruptors. These disruptors are spurring lots of activity in insurance digital labs, insurance venture capital arms, and […].

How to improve IoT security

Network World

The tsunami-sized trend to add intelligence with sensors and actuators and to connect devices, equipment and appliances to the internet poses safety, security and privacy risks.

Ambitious One-Gigawatt Data Center Planned in Norway

Data Center Knowledge

US-Norwegian company Kolos secures land for what it says will be world’s largest data center Read More. Colocation Europe

Munich Re puts data analytics into services for a ‘riskier world’

Computer Weekly

Re-insurer combines a Hadoop data lake, SAS analytics and SAP Hana to create new cyber and other insurance services

What is DeOS?

IT Toolbox

In these days of organized cyber attacks, you need security companies to be thinking one step ahead of the hackers, and now Cisco has come out with a new acronym to keep us awake at nights. No longer is DDoS (Distributed Denial of Service) our only worry, Cisco suggests that we need to think about Destruction Of Service (DeOS) attacks

US Ruling Creates A Privacy Nightmare For US Cloud Providers Overseas

Forrester IT

On August 14th, Judge Richard Seeborg of the U.S. District Court for the Northern District of California upheld a ruling requiring Google to turn over Gmail data stored overseas. The ruling seems to be in conflict with a U.S. Court of Appeals ruling in Microsoft v. United States where the court ruled that Microsoft does […]. privacy security & risk GDRP public cloud Security & Risk

IDG Contributor Network: SDN and a life beyond the death of the internet

Network World

For decades, enterprises have relied on the public internet for business-critical SaaS applications and data traffic. The reason why is pretty simple: it’s cost-efficient, it’s easy to use and it’s already there. Compare that to the logistical, financial and implementation challenges of installing an alternative private network, and it’s clear why enterprises have been pretty content with the internet for their entire digital lives. But, it’s 2017.

Equinix: Private Data Exchange is Outpacing Internet’s Growth

Data Center Knowledge

Businesses’ digital transformation expected to result in skyrocketing private interconnection bandwidth Read More. Colocation Equinix

Huddle in trouble: Did the journey from startup to scaleup cause the UK cloud firm to lose its way?

Computer Weekly

What does the future hold for cloud collaboration firm Huddle, once a darling of the UK tech startup scene but now seemingly in need of a financial bailout

Leveraging Social Media to Expand Business Data Globally

CTOvision

Social media has become an integral part of society, and having a presence on these platforms is a must for businesses in the present world. Barely a decade ago, only a small proportion of the globe were exposed to social media. A few years later, the list of social media networks has continued to grow […]. CTO Cyber Threats News

The Data Digest: Understand Emotion To Drive Technology Engagement

Forrester IT

Thanks to the rise of empowered consumers, products and experiences that once seemed improbable, such as (literally) instant delivery, are now integral to our lives.

Want to improve cybersecurity? Try phishing your own employees

Tech Republic Security

Employees are a company's weakest security link. Here's why running internal phishing attacks can strengthen your cybersecurity posture

Equinix Makes Big Bet on Fuel Cell-Powered Data Centers

Data Center Knowledge

Strikes deal with utility to deploy Bloom fuel cells at 12 additional US data centers. Read More. Energy Equinix Featured

AI tipped as top tech trend of next decade

Computer Weekly

In 2010, social, cloud, analytics and mobile were tipped as megatrends – now Gartner sees artificial intelligence as the emerging tech trend with the biggest potential

A Few More Ubiquiti Discoveries

IT Toolbox

Maybe discovery is actually realization in this case, but no matter- this week a learned several interesting things about Ubiquiti as a company and as a networking solution. If you look at past IT Toolbox and wirednot.wordpress.com blogs, you’ll find I’ve given Ubiquiti a fair amount of coverage. The company and their products are interesting to write about, and

Are You A Customer-Obsessed B2B Marketer? A Sneak Peek Of Our Forum

Forrester IT

Customer-Obsessed B2B firms are 2X more likely to report revenue growth of 10% or more in the last fiscal year. Now there’s a headline! These firms are also more likely to have loyal customers (who spend money with them) and happier employees (who are more productive). If you’ve listened to Forrester anytime during the past […]. B2B marketing

B2B 25

Cloud computing reversal: From ‘go away’ to ‘I can’t miss out’

David Linthicum

Isaac Asimov once said, “I do not fear computers. I fear the lack of them.” That quote has stuck with me to this day. There’s no doubt that computers and computing have changed our lives. Without them, we would be slaves to processes and paper. I was reminded of Asimov’s quote when I saw the results of a recent poll done by Comvault of 100 IT leaders. More than two thirds said that they were worried about keeping up to date with the latest products and iterations across the major cloud providers.

DCK Investor Edge: Why CoreSite is REIT Royalty

Data Center Knowledge

A new research report crowns CoreSite Realty the top REIT for total returns for the past three and five-year periods. Read More. Business Colocation CoreSite Investing

Leaked SMB exploits make malware powerful, warns Cylance

Computer Weekly

Four key exploits at the heart of hacking tools leaked by the Shadow Brokers have given malware authors a lot of power, say security researchers

Hacker claims to have decrypted Apple's Secure Enclave, destroying key piece of iOS mobile security

Tech Republic Security

iOS users beware: A hacker has just published a decryption key for the Apple Secure Enclave, which is responsible for processing Touch ID transactions

Apple 23