Wed.Aug 16, 2017

CIOs Start To Become More Important

The Accidental Successful CIO

Companies are starting to realize the value of their CIOs Image Credit: las – initially. The importance of a CIO can be measured in a number of different ways. One such way is how often the CEO seeks out the CIO for consultation.

Do You Want To Be A Channel Chief?

Forrester IT

[begin sarcasm] The head of indirect channels for an organization is the best job an individual could hope for!

Trending Sources

Equinix: Private Data Exchange is Outpacing Internet’s Growth

Data Center Knowledge

Businesses’ digital transformation expected to result in skyrocketing private interconnection bandwidth Read More. Colocation Equinix

Regulation and impact of cyber attacks driving security spending

Computer Weekly

Awareness of the impact of cyber attacks on business and regulation are expected to be the top drivers of continued and increased spending on cyber security, according to research firm Gartner

More Trending

6 Ways ERP Makes Manufacturing More Profitable

IT Toolbox

To make it in the digital enterprise, manufacturers must push themselves further in innovation and develop a strategy to stay ahead of the competition. This won’t happen instantly, however. If manufacturers haven’t begun thinking beyond a simple enterprise resource planning (ERP) solution with bare-bones features, they may soon be obsolete. Many people realize that ERP solutions streamline

A decade of IT change since banking meltdown

Computer Weekly

With 10 years passing since Northern Rock had to be bailed out by the government, we look at how banking IT has changed since the financial crisis

Madtech Convergence Is Ongoing – With Or Without You

Forrester IT

For marketers, the struggle is real: you want to provide your customers and prospects cohesive cross-channel experiences that demonstrate you actually know them (without freaking them out) — all while reducing the number of vendors in your tech stack. There are positive signs with the marketing technology ecosystem rapidly consolidating — and millions of dollars […].

UK workers interested in cyber security, survey shows

Computer Weekly

Many UK workers are interested in cyber security and would consider a career in the field, a survey has revealed, which could help close the skills gap

Going high tech with IBM Cloud at Atlanta's new Mercedes-Benz stadium

Tech Republic Data Center

The newest professional sports stadium opens next week in Atlanta, and it's filled with new tech to improve the fan experience as a result of the team's partnership with IBM

GDPR drives cloud firm’s Cloudian S3 object storage deployment

Computer Weekly

Interoute deployed Cloudian Hyperstore because it believes customers want object storage to help gain compliance with the forthcoming European GDPR regulations

How to prevent phishing attacks in Microsoft Outlook and Office 365: 3 methods

Tech Republic Security

Phishing attacks are a major source of worry for businesses. Here are a few tips on keeping malicious messages out of your users' inboxes and minimizing the risk when they make it there

London Leads in Private Data Center Interconnection Ahead of Brexit

Data Center Knowledge

Network capacity cements firms to UK Read More. Colocation Europe

Insuring Your VoIP Network

IT Toolbox

Save $700 Billion with Incident Management-as-a-Service. The latest Digital Global Overview report from We Are Social and Hootsuite notes that there are over five billion unique mobile numbers and some 2.7 billion mobile social users. Over half the world’s population now uses the Internet, and digital communication and connectivity is changing the way

RBS to cut 880 IT staff in London

Computer Weekly

Royal Bank of Scotland aims to reduce London-based IT workforce by 40

3 Ways Mobile Apps Change VoIP/UC Choices for Businesses

IT Toolbox

Mobile devices have hugely influenced voice over IP (VoIP) and unified communications (UC) over the past few years. As mobile apps for VoIP and UC mature, in many cases they drive the solution that works best for many businesses. With maturity comes tighter and more seamless integration, better security, ease of use, and the incredible convenience benefits of aligning with fast-moving mobile technology.

Warning: These 8 Google Chrome extensions have been hijacked by a hacker

Tech Republic Security

Proofpoint research has found that certain Chrome extensions have been taken over in order to spread malicious ads and steal money from users

NotPetya attack cost up to $300m, says Maersk

Computer Weekly

Danish shipping line Maersk estimates that the NotPetya cyber attack in June cost the company up to $300m

4 Reasons Why You Shouldn't Always Customize ERP Software

IT Toolbox

Enterprise resource planning (ERP) vendors talk up the benefits of customized software. They say these programs save you cash and protect your business from external threats. But, the truth is, out-of-the-box ERP software often costs less money and provides you with the same security advantages as bespoke tools. Here are four reasons why customized ERP software doesn't always make financial sense.

Hackers hit Holyrood with Westminster-style brute-force attack

Computer Weekly

The Scottish parliament has been hit by a cyber attack similar to the one that struck Westminster in June

17

US Sec. Mattis pushes military AI, experts warn of hijacked 'killer robots'

Tech Republic Security

AI has the potential to revolutionize warfare, but its growth in the private sector far outpaces that of the government, according to a recent Harvard report

PowerShell Basics: Azure AD Management Commands

CanITPro

Now that we’ve covered the basics in my previous post, Step-By-Step: Intro to Managing Azure AD via PowerShell , we’ll take a look at the commands available to further manage you Azure AD deployment.

Cybersecurity IT pros vs. policy wonks: How to bridge the communication gap

Tech Republic Security

IT pros and policymakers focusing on cybersecurity often don't speak the same language and seem to be at odds with each other. Discover how these cybersecurity experts can find common ground

Female students less likely than male students to consider tech roles

Computer Weekly

Research by KPMG finds many female students have never considered applying for a graduate tech role, and male students are more confident in their tech skills

Exploit leaks led to 5M cybersecurity attacks in Q2, report says

Tech Republic Security

Malicious attacks rose in Q2, due in large part to an increase in exploit packages in-the-wild, according to a Kaspersky Lab report

ClickMechanic uses GitHub to streamline coding to production

Computer Weekly

Digital service that connects car mechanics and garages to customers sees GitHub as a core part of its coding lifecycle

10

Prevention is a key defense, says chief of UN Global Programme on Cybercrime

Tech Republic Security

Chief of the United Nations Office on Drugs and Crime Global Programme on Cybercrime Neil Walsh details how to defend against cybercrime

Swagger Becomes OAS3

IT Toolbox

The OpenAPI Specification v3 (OAS3) has now become official. As with many things in the industry though, I am sure that people will continue to refer to it as swagger just because we have called it that for so many years now. But this is a much welcome change and update to the specification. APIs have continued to grow in popularity, and with it, the need to document and specify the operations of

31% off WD 4TB My Passport Portable External USB 3.0 Hard Drive - Deal Alert

Network World

Safely store massive amounts of photos, videos and music with this 4TB external drive from WD. It comes equipped with WD Backup software so you can automatically back up photos, videos, music and documents on your preferred schedule. And built-in 256-bit AES hardware encryption with WD Security software helps keep your content private and safe. The 4TB My Passport model is currently priced just $10 higher than its 3TB counterpart with this 31% off deal. See it now on Amazon.