Wed.Mar 13, 2019

How SMBs can bolster cybersecurity efforts

CTOvision

Keeping current with cyber threats is an imposing logistics problem facing small- and medium-sized businesses (SMBs)—cybercriminals are constantly changing their tactics. If something stops working or fails to provide sufficient return for their effort, the bad guys move on. That may work well for the criminal element, but how are those in charge of cybersecurity […].

153
153

Security Breech At The SEC Causes A Headache For Their CIO

The Accidental Successful CIO

The SEC Wants To Check On Every Trade – Is This Safe To Do? Image Credit: Philip McMaster. Let’s face it, when it comes to money, people can quickly become very greedy.

Businesses lag on data breach response times

CTOvision

Businesses in the UK took an average of 21 days to report personal data breaches they had identified to the Information Commissioner’s Office (ICO) during the year up to 31 March 2018, according to information disclosed by the watchdog. The UK’s data protection authority revealed details of how businesses that voluntarily reported data breaches handled […].

Report 128

Video Blog: Forrester’s Asia Pacific Managed Security Services Wave Identifies The 11 Most Important Vendors

Forrester IT

CISOs in Asia Pacific must justify their spending and articulate the business value of often expensive investments in managed security to a largely non-security audience of executives.

Video 124

Schema Evolution Patterns

Speaker: Alex Rasmussen, CEO, Bits on Disk

If you want to make your development team squirm, ask them about database schema changes or API versioning. Most development teams struggle with changing database schemas and updating API versions without breaking existing code. Alex Rasmussen is an expert in helping teams through these struggles. His talk will examine database schema changes and API versioning as two instances of schema evolution: how your systems respond when the structure of your structured data changes.

Dozens of companies leaked sensitive data thanks to misconfigured Box accounts

CTOvision

Security researchers have found dozens of companies inadvertently leaking sensitive corporate and customer data because staff are sharing public links to files in their Box enterprise storage accounts that can easily be discovered. The discoveries were made by Adversis, a cybersecurity firm, which found major tech companies and corporate giants had left data inadvertently exposed. Although […].

More Trending

Phishing attacks: Half of organisations have fallen victim in last two years

CTOvision

Almost half of all organizations have fallen victim to phishing attacks in the last two years, with larger businesses Research by security company Sophos has found that 45 percent of UK organizations were compromised by phishing attacks between 2016 and 2018 — and that 54 percent had identified instances of employees replying to unsolicited emails […].

Digital CIOs with Five Contemporary Intelligence

Future of CIO

Digital transformation represents a break from the past, with a high level of impact and complexity. IT plays a crucial role in leading changes and catalyzing innovation.

Weighing Opinions on Going Multicloud versus Vendor Lock-In

Information Week

Advantages and limitations separate these two camps when it comes to choosing a strategy for cloud transformation

Celebrate 5500 Blog Posting: Blog the Way to Lead Digital Transforamtion

Future of CIO

It’s time to celebrate the #5500 blog posting. Blogging is to pursue the digital way to communicate for envisioning, brainstorming, sharing, debating, and making a continuous delivery by practicing thought leadership and spurring innovation.

Team Leadership in the Age of Agile

Speaker: Roy Osherove, Technology and Leadership Consultant

Why is implementing new frameworks, from SCRUM to self-organized teams, so much harder than understanding them? Roy Osherove has the solution. Tune in and learn to recognize what state your team is in, to support them accordingly, and to help them adopt the best practices given where they are today.

Create a Canary Release Deployment with API Gateway | AWS DevOps Pro

Linux Academy

As I detailed in my last blog post, I’m continuing to update the Linux Academy AWS DevOps Pro certification course. The course has three new sections: Deployment Pipelines. AWS Lambda, and. AWS API Gateway.

The Monthly “Digitizing Boardroom” Book Tuning: The Digital Competency of the Board Mar. 2019

Future of CIO

Modern corporate boards play significant roles in guiding businesses in the right direction and achieve expected business results.

Agile 52

Windows 10 Azure AD Join Manual Process – CYOD

Anoop

Subscribe YouTube Channel [link]. and Facebook Page to get latest updates. link]. I’ve explained the manual process of Windows 10 Intune enrollment for BYOD scenario. In the post, you will how to manually join Windows 10 1809 device to Azure AD. Yes, you can perform Windows 10 Azure AD join manually. Helpful Post – Learn Intune Device Management (Intune Starter Kit)? – Manual Intune enrollment process […].

Amazon Aurora ascendant: How we designed a cloud-native relational database

All Things Distributed

Relational databases have been around for a long time. The relational model of data was pioneered back in the 1970s by E.F. The core technologies underpinning the major relational database management systems of today were developed in the 1980–1990s.

The Six Principles of Persuasion

Speaker: Michael Carducci, Tech Leader, VUE Expert, and Full Stack Developer

As senior tech leaders, we often fall prey to thinking that a “good idea” and logical case is sufficient to get the desired response and result. We might be trying to get our CEO on-board with investment in a new technology or a rearchitecture effort, or we might want culture or process changes by our team. Our “good idea” is simply the beginning. An idea must be communicated; a case must be made; and ultimately other people must be persuaded to get onboard. Michael Carducci brings a fascinating background to this webinar. He’s a technologist and regularly works to help senior leaders improve their results. He’s also a professional mentalist and has been a student of psychology, human behavior and the principles of influence for nearly two decades.

The AWK Command | BASH Basics

Linux Academy

The need to know the basics. When I was first starting out as a sysadmin and I wanted to know what it took to get promoted , one of the things that I was told was that I needed to know the BASH utilities such as AWK. I am not sure that AWK is actually a utility, it was originally intended to be a data-driven programming language when Alfred Aho, Peter Weinberger and Brian Kernighan wrote it at Bell Labs.