Wed.Jul 31, 2019

Cybersecurity Risk Ratings Are Here To Stay – Learn To Work With Them

Forrester IT

Cyber security risk rating solutions are a polarizing topic for security leaders. We meet promoters and detractors in roughly equal measure in the customer that we speak to.

Chatbots Will Appeal to Modern Workers

CEB IT

Chatbots continue to be a hot topic among media, end users and vendor communities. This is no surprise, as chatbot technology — which uses artificial intelligence (AI) to mimic human conversations — is beginning to mature and offer more sophisticated solutions.

Microsoft Intune for SCCM Admins Part 2

Anoop

Subscribe YouTube Channel [link]. and Facebook Page to get latest updates. link]. In post 1, I covered the basics tips to start learning Microsoft Intune for SCCM admins. As mentioned in the previous post, this series includes a Windows device management perspective for Intune admin.

Remote code execution is possible by exploiting flaws in Vxworks

Network World

Eleven zero-day vulnerabilities in WindRiver’s VxWorks, a real-time operating system in use across an advertised 2 billion connected devices have been discovered by network security vendor Armis.

An Adult Conversation About Estimates

Speaker: Beekey Cheung, Software Consultant, Professor Beekums, LLC

Estimates are a contentious topic in software development. Most of our development teams hate providing estimates and many managers are starting to view them as unnecessary. As senior software leaders, how can we determine whether estimates are helpful or harmful to our teams? We are excited to be joined by Beekey Cheung, a software consultant and blogger known as Professor Beekums, who has helped many leaders and teams go from fearing estimates to using them appropriately. He'll walk us through the value of estimates, how to overcome the hesitancy many have in giving them, and how to provide better estimates.

How Your Product Team Can Integrate Security Throughout Software Development Lifecycles

CTOvision

Read Harshit Agarwal explain how you can integrate security throughout software development lifecycle on Information Security Buzz : Integrating security into DevOps to deliver DevSecOps is no easy task: It requires changing the team’s mindset, processes, and technology. Each company’s ultimate goal should be to keep DevOps collaborative and agile, which means making security silent […].

More Trending

Multiple Paths to Cloud: Taking a Cloud Native Approach

Perficient - Digital Transformation

Cloud technologies support an increasing amount of digital transformation initiatives. While cloud isn’t the ultimate goal of transformation, it provides speed, innovation, and scale to re-imagine business in the digital age.

Cloud 81

The latest large-scale data breach: Capital One | TECH(feed)

Network World

Just a few days after Equifax settled with the FTC over its 2017 data breach, Capital One announced it was the target of a March attack. Identifying information and bank account numbers are among some of the data breached in the attack that affects 100 million people.

Top Hashtag Analytics Tools You Might Not Know About

Galido

Information Technology Blog - - Top Hashtag Analytics Tools You Might Not Know About - Information Technology Blog. Several top social networks use hashtags to facilitate conversations. Knowing this, brands can increase awareness and connect with their target market.

Tools 67

Does NoOps Signal the End for Infrastructure Employees?

Information Week

Will AI and automation eliminate the need for the people who now keep IT infrastructures in operation? Not if those people take charge of their own futures

94

The Six Principles of Persuasion

Speaker: Michael Carducci, CTO, Mago:Tech

As senior tech leaders, we often fall prey to thinking that a “good idea” and logical case is sufficient to get the desired response and result. We might be trying to get our CEO on-board with investment in a new technology or a rearchitecture effort, or we might want culture or process changes by our team. Our “good idea” is simply the beginning. An idea must be communicated; a case must be made; and ultimately other people must be persuaded to get onboard. Michael Carducci brings a fascinating background to this webinar. He’s a technologist and regularly works to help senior leaders improve their results. He’s also a professional mentalist and has been a student of psychology, human behavior and the principles of influence for nearly two decades.

5 Ways Technology Impacts Your Business

Galido

Information Technology Blog - - 5 Ways Technology Impacts Your Business - Information Technology Blog. Anyone who owns or manages a business in today’s hi-tech world understands that technology has a huge impact on literally every aspect of running their company.

IT Careers: How to Get a Job as a Site Reliability Engineer

Information Week

If you have a passion for development and systems, site reliability engineering might be a good career path for you

How to Manage SEO for Your E-commerce Business

Galido

Information Technology Blog - - How to Manage SEO for Your E-commerce Business - Information Technology Blog. Without search engine optimization, websites will struggle to get noticed online. For any business website, this can be disastrous.

Just Exactly How Much Of A Risk Are Hacks?

The Accidental Successful CIO

Hackers are coming. Will you be ready? Image Credit: CoRTeZ VpN.

Schema Evolution Patterns

Speaker: Alex Rasmussen, CEO, Bits on Disk

If you want to make your development team squirm, ask them about database schema changes or API versioning. Most development teams struggle with changing database schemas and updating API versions without breaking existing code. Alex Rasmussen is an expert in helping teams through these struggles. His talk will examine database schema changes and API versioning as two instances of schema evolution: how your systems respond when the structure of your structured data changes.

Banking on the Public Cloud?

Information Week

Financial institutions and banks can no longer risk letting their business models become outdated. Here's how CIOs can build a business case for the C-suite

Search for Disruptive Innovation to Build Long Term Business Advantages

Future of CIO

Innovation is the core activity of human evolution to changing the environment for making collective progress. In the business setting, innovation is what differentiates the leader from followers.

Study 56

Decoding a Kubernetes Service Account Token

Scott Lowe

Recently, while troubleshooting a separate issue, I had a need to get more information about the token used by Kubernetes Service Accounts. In this post, I’ll share a quick command-line that can fully decode a Service Account token. Service Account tokens are stored as Secrets in the “kube-system” namespace of a Kubernetes cluster.

The Best “Criticism” Quotes of “Digital Master” July 2019

Future of CIO

" Digital Master ” i s the series of guidebooks (28 + books) to perceive the multi-faceted impact digital is making to the businesses and society, help forward-thinking organizations navigate through the journey in a systematic way, and avoid “rogue digital.”

Team Leadership in the Age of Agile

Speaker: Roy Osherove, Technology and Leadership Consultant

Why is implementing new frameworks, from SCRUM to self-organized teams, so much harder than understanding them? Roy Osherove has the solution. Tune in and learn to recognize what state your team is in, to support them accordingly, and to help them adopt the best practices given where they are today.

Why Cloud Computing Cyber Security Risks Are On The Rise: Report

CTOvision

Computer security company Skybox?

The Monthly Communication Brief: Creative Communication July 2019

Future of CIO

The great communicators are the high-quality leaders or professionals who can communicate objectively with strong logic, clarity, and understanding; the great communicators are the great artists who are fluent in creative expression or metaphorical description. Communication is both art and science.

Four emerging digital payments standards you don’t want to catch you by surprise

CTOvision

According to 451 Research, digital payment channels are expected to grow from $2.8 trillion in 2018 to $5.8 trillion in 2022. That’s seven times the rate of in-store growth. Within digital payments, mobile payment transactions are expected to overtake e-commerce transactions in 2019 and represent 55% of transactions by 2022. So, if there was any […].

We know you already heard this one, but here is more context: A hacker gained access to 100 million Capital One credit card applications and accounts

CTOvision

In one of the biggest data breaches ever, a hacker gained access to more than 100 million Capital One customers’ accounts and credit card applications earlier this year. Paige Thompson is accused of breaking into a Capital One server and gaining access to 140,000 Social Security numbers, 1 million Canadian Social Insurance numbers and 80,000 bank […].

Architect Your Organization for Effectiveness, Productivity, and Joy

Speaker: Ron Lichty, Consultant: Interim VP Engineering, Ron Lichty Consulting, Inc.

As a senior software leader, you likely spend more time working on the architecture of your systems than the architecture of your organization. Yet, structuring our teams and organizations is a critical factor for success. In fact, the impact of software architecture parallels the impact of organizational structure. We are excited to welcome Ron Lichty, co-author of a seminal book on managing software teams and a well-known speaker, he’ll speak to organizing for effectiveness, productivity and joy.

How MIT’s Fiat Cryptography might make the web more secure

CTOvision

One of the most common uses of public-key cryptography is securing data on the move. The process used to produce the code that scrambles that data as it travels over the internet has been labor-intensive. That’s changed, however, with a new system developed by MIT researchers for creating that code. Called Fiat Cryptography, the system […].