Wed.Dec 05, 2018

CIOs Are Discovering That Humans Are Important Too

The Accidental Successful CIO

It turns out that humans are an important part of every IT department Image Credit: Black Knights. As the person with the CIO job, you have a very important question that you have to find the answer to. What is more important to your IT department: people or technology.

The Future Of Mobility Is Data, Not Cars

Forrester IT

Having worked in and with the automotive industry for around 25 years, the challenges that OEMs face given their size and structures often inhibit the business agility needed to provide lasting customer value in an age of digital disruption.

Mobile 185

Indicators To Watch: 7 warning signs of an insider threat


Read Dan Swinhoe list seven signs which should warn you about an insider threat to your organization on CSO Online : Employees conducting attacks on their own employees – known as insider threats – are becoming increasingly common and costly. According to a CA report, over 50 percent of organizations suffered an insider threat-based attack […]. Cyber Security News

Report 176

The TV Industry is Stumbling Toward Customer Centricity

Forrester IT

I’ve just returned from a few days in the sun, having once again participated in Beet.TV’s s annual BeetRetreat. Wonderfully, we returned to Puerto Rico this year*.) The theme was “It’s Consumer First in TV Land,” which I really hoped the conference would pay off. Well, we know that consumer attitudes about advertising are not […]. advertising advertising agencies marketing & strategy media media buying omnichannel advertising television tv video

Team Leadership in the Age of Agile

Speaker: Roy Osherove, Technology and Leadership Consultant

Why is implementing new frameworks, from SCRUM to self-organized teams, so much harder than understanding them? Roy Osherove has the solution. Tune in and learn to recognize what state your team is in, to support them accordingly, and to help them adopt the best practices given where they are today.

Marriott’s breach response is so bad, security experts are filling in the gaps — at their own expense


There are lessons here for all of us: Last Friday, Marriott sent out millions of emails warning of a massive data breach — some 500 million guest reservations had been stolen from its Starwood database. One problem: the email sender’s domain didn’t look like it came from Marriott at all. Marriott sent its notification email from “,” […].

Data 146

More Trending

Hacking The Cloud: Kubernetes’ first major security hole discovered


Kubernetes has become the most popular cloud container orchestration system by far, so it was only a matter of time until its first major security hole was discovered. And the bug, CVE-2018-1002105, aka the Kubernetes privilege escalation flaw, is a doozy. It’s a CVSS 9.8 critical security hole. With a specially crafted network request, any user […]. CTO Cyber Security News

Quantifying Vendor Efficacy Using The MITRE ATT&CK Evaluation

Forrester IT

I’ve been extremely excited about the MITRE ATT&CK evaluation since it decided to open it up to vendors earlier this year. The endpoint detection and response (EDR) market represents the direction of endpoint security, yet the state of endpoint efficacy testing has been underwhelming. Antimalware testing has become a standard part of the endpoint […]. endpoint security security & risk

SMEs: Small in Business, But Need To Get Big on Cybersecurity


Maybe at this point this is stating the obvious. But interesting that this still has to be said. Small and medium businesses need to take more action regarding cybersecurity. Read why Pankit Desai says that small and medium enterprises have to shore up their cybersecurity on Entrepreneur : Cyber insecurity is no longer just a […]. Cyber Security News

Take Your Analytics Maturity to the Next Level


For all the hype surrounding advanced analytics , machine learning and other data innovations, a remarkable number of organizations are still using spreadsheets for analysis and arguing about data quality. In a recent Gartner survey, 87.5% of respondents had low data and analytics maturity, falling into “basic” or “opportunistic” categories. A good data and analytics strategy starts with a clear vision.

Best Practices for Micro-Services Management, Traceability and Visualization

Speaker: Robert Starmer, Cloud Advisor, Founding Partner at Kumulus Technologies

Moving to micro-services, or even working with distributed applications in a traditional environment, brings with it a host of interactions that are often difficult to understand. This session will provide an overview of service mesh, a review of the Istio service mesh itself, and dive into best practices and integration models for integrating the traceability model into a distributed application.

What If Leadership Matters In Cybersecurity: Hackers are not main cause of health data breaches


Most health information data breaches in the U.S. in recent years haven’t been the work of hackers but instead have been due to mistakes or security lapses inside healthcare organizations, a new study suggests. Researchers examined data released by the U.S. Department of Health and Human Services on 1,138 health data breaches affecting a total of […]. Cyber Security News

Harness the Power of Storytelling to Increase IT's Influence

Information Week

Remember three key techniques to be more effective in telling IT's story to audiences such as line managers and top executives


Intune Win32 App Troubleshooting Client Side Process Flow


In my previous post part 1, we the created Intune Win32 app and deployed as “available” for users. In this post, we will Deep dive intune client-side events. Intune Win32 app troubleshooting details are explained in this post.

The “Soft Touches” in Digital Transformation

Future of CIO

Organizations across the industrial sectors are on the journey of digitalization. Being “digital ready” goes beyond just applying the latest digital technology, it is a holistic effort and multifaceted discipline.

Daimler Financial Services CIO Says: Don't Get Comfortable

Information Week

Daimler Financial Services CIO Udo Neumann says you may be successful today, but unless you transform and innovate, that success will be gone

Playing Innovation Oddball: Break Through Conventional Wisdom

Future of CIO

People do have their own beliefs and practices, which one can call as Conventional Mind. And they have the right to live with the same mindset. With age, they tend to become risk-averse, so they have a tendency to stick to conventional wisdom.

Catching Cheaters on Exams: Hi-Tech vs Traditional Methods


Information Technology Blog - - Catching Cheaters on Exams: Hi-Tech vs Traditional Methods - Information Technology Blog. While not recommended, cheating to pass an exam is as old as the school itself. 21st century students use lentil-sized headphones, and hidden cameras in the glasses or the pen.

The Monthly “Digital Maturity” Book Tuning: Digital Fluidity Dec. 2018

Future of CIO

Digital makes a significant impact on every aspect of the business from people, process to technology, both horizontally and vertically. The digitalization flattens the organizational hierarchy and blurs the functional, organizational and geographical borders in the business ecosystem.

New framework: The six elements of Platform Strategy

Trends in the Living Networks

Tomorrow I am giving the keynote on Platform Strategy: Creating Exponential Value in Connected Times at the Digital Single Market Cloud Stakeholder Conference in Vienna, Austria.

Money Making Apps


Information Technology Blog - - Money Making Apps - Information Technology Blog. While travelling, waiting or doing nothing, the best thing we choose to do is to browse through our mobile phones.

Intune Win32 App Troubleshooting Client Side Process Flow


Subscribe YouTube Channel [link]. and Facebook Page to get latest updates. link]. In my previous post part 1, we the created Intune Win32 app and deployed as “available” for users. In this post, we will Deep dive intune client-side events.