article thumbnail

Haunted by repeated breaches, Microsoft is ‘putting security above all else,’ vows CEO Satya Nadella

GeekWire

(GeekWire File Photo / Todd Bishop) Satya Nadella has made a habit on Microsoft’s earnings calls of touting the revenue growth in the company’s security technology business. The company has been here before, more than two decades ago. “It would be transparent about breaches. “It would be transparent about breaches.

Microsoft 112
article thumbnail

What is TOGAF? An enterprise architecture methodology for business

CIO Business Intelligence

The Open Group Architecture Framework (TOGAF) is an enterprise architecture methodology that offers a high-level framework for enterprise software development. TOGAF helps organizations implement software technology in a structured and organized way, with a focus on governance and meeting business objectives. TOGAF definition.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

14 essential book recommendations by and for IT leaders

CIO Business Intelligence

This book is mind-bending because it translates the complex theories behind the socio-technical aspects of software development and delivery into a set of easy-to-understand patterns. In the book, Willink and Babin write of being sent to Ramadi, Iraq — a violent war zone at the time — to secure the city.

Devops 124
article thumbnail

Tech Blogs – Best Must Read Tech Resources 2019

Galido

These areas of tech include general IT and technology, security, IT feeds, cloud computing, data center, mobile, social media, tips and tricks, virtualization, and operating system and software blogs. Security Tech Blogs. Techworld Security Blog. They offer useful relevant topics on security and tech security news.

Resources 107
article thumbnail

Best Tech Blogs – Must Read Tech Resources 2019

Galido

These areas of tech include general IT and technology, security, IT feeds, cloud computing, data center, mobile, social media, tips and tricks, virtualization, and operating system and software blogs. Security Tech Blogs. Techworld Security Blog. They offer useful relevant topics on security and tech security news.

Resources 107
article thumbnail

Top Tech Websites 2019

Galido

These areas of tech include general IT and technology, security, IT feeds, cloud computing, data center, mobile, social media, tips and tricks, virtualization, and operating system and software blogs. Security Tech Blogs. Techworld Security Blog. They offer useful relevant topics on security and tech security news.

Mobile 77
article thumbnail

When least privilege is the most important thing

CIO Business Intelligence

In the ever-evolving realm of information security, the principle of Least Privilege stands out as the cornerstone of safeguarding sensitive data. Organizations that follow the principle of least privilege can improve their security posture by significantly reducing their attack surface and risk of malware spread.

Backup 128