Wed.Mar 13, 2019

How SMBs can bolster cybersecurity efforts


Keeping current with cyber threats is an imposing logistics problem facing small- and medium-sized businesses (SMBs)—cybercriminals are constantly changing their tactics. If something stops working or fails to provide sufficient return for their effort, the bad guys move on. That may work well for the criminal element, but how are those in charge of cybersecurity […].


Security Breech At The SEC Causes A Headache For Their CIO

The Accidental Successful CIO

The SEC Wants To Check On Every Trade – Is This Safe To Do? Image Credit: Philip McMaster. Let’s face it, when it comes to money, people can quickly become very greedy.

Businesses lag on data breach response times


Businesses in the UK took an average of 21 days to report personal data breaches they had identified to the Information Commissioner’s Office (ICO) during the year up to 31 March 2018, according to information disclosed by the watchdog. The UK’s data protection authority revealed details of how businesses that voluntarily reported data breaches handled […].

Report 126

Video Blog: Forrester’s Asia Pacific Managed Security Services Wave Identifies The 11 Most Important Vendors

Forrester IT

CISOs in Asia Pacific must justify their spending and articulate the business value of often expensive investments in managed security to a largely non-security audience of executives.

Video 126

Team Leadership in the Age of Agile

Speaker: Roy Osherove, Technology and Leadership Consultant

Why is implementing new frameworks, from SCRUM to self-organized teams, so much harder than understanding them? Roy Osherove has the solution. Tune in and learn to recognize what state your team is in, to support them accordingly, and to help them adopt the best practices given where they are today.

Dozens of companies leaked sensitive data thanks to misconfigured Box accounts


Security researchers have found dozens of companies inadvertently leaking sensitive corporate and customer data because staff are sharing public links to files in their Box enterprise storage accounts that can easily be discovered. The discoveries were made by Adversis, a cybersecurity firm, which found major tech companies and corporate giants had left data inadvertently exposed. Although […].

More Trending

Phishing attacks: Half of organisations have fallen victim in last two years


Almost half of all organizations have fallen victim to phishing attacks in the last two years, with larger businesses Research by security company Sophos has found that 45 percent of UK organizations were compromised by phishing attacks between 2016 and 2018 — and that 54 percent had identified instances of employees replying to unsolicited emails […].

Digital CIOs with Five Contemporary Intelligence

Future of CIO

Digital transformation represents a break from the past, with a high level of impact and complexity. IT plays a crucial role in leading changes and catalyzing innovation.

Weighing Opinions on Going Multicloud versus Vendor Lock-In

Information Week

Advantages and limitations separate these two camps when it comes to choosing a strategy for cloud transformation

Windows 10 Azure AD Join Manual Process – CYOD


Subscribe YouTube Channel [link]. and Facebook Page to get latest updates. link]. I’ve explained the manual process of Windows 10 Intune enrollment for BYOD scenario. In the post, you will how to manually join Windows 10 1809 device to Azure AD. Yes, you can perform Windows 10 Azure AD join manually. Helpful Post – Learn Intune Device Management (Intune Starter Kit)? – Manual Intune enrollment process […].

Best Practices for Micro-Services Management, Traceability and Visualization

Speaker: Robert Starmer, Cloud Advisor, Founding Partner at Kumulus Technologies

Moving to micro-services, or even working with distributed applications in a traditional environment, brings with it a host of interactions that are often difficult to understand. This session will provide an overview of service mesh, a review of the Istio service mesh itself, and dive into best practices and integration models for integrating the traceability model into a distributed application.

Celebrate 5500 Blog Posting: Blog the Way to Lead Digital Transforamtion

Future of CIO

It’s time to celebrate the #5500 blog posting. Blogging is to pursue the digital way to communicate for envisioning, brainstorming, sharing, debating, and making a continuous delivery by practicing thought leadership and spurring innovation.

Create a Canary Release Deployment with API Gateway | AWS DevOps Pro

Linux Academy

As I detailed in my last blog post, I’m continuing to update the Linux Academy AWS DevOps Pro certification course. The course has three new sections: Deployment Pipelines. AWS Lambda, and. AWS API Gateway.

The Monthly “Digitizing Boardroom” Book Tuning: The Digital Competency of the Board Mar. 2019

Future of CIO

Modern corporate boards play significant roles in guiding businesses in the right direction and achieve expected business results.

Agile 52

Amazon Aurora ascendant: How we designed a cloud-native relational database

All Things Distributed

Relational databases have been around for a long time. The relational model of data was pioneered back in the 1970s by E.F. The core technologies underpinning the major relational database management systems of today were developed in the 1980–1990s.

The AWK Command | BASH Basics

Linux Academy

The need to know the basics. When I was first starting out as a sysadmin and I wanted to know what it took to get promoted , one of the things that I was told was that I needed to know the BASH utilities such as AWK. I am not sure that AWK is actually a utility, it was originally intended to be a data-driven programming language when Alfred Aho, Peter Weinberger and Brian Kernighan wrote it at Bell Labs.