Thu.Feb 13, 2020

Cloud Threat Report Shows Need for Consistent DevSecOps

Information Week

Organizations continue to make choices for the sake of speed in innovation, which can leave them unnecessarily vulnerable

Report 123

Chinese cyber criminals are getting more organized and dangerous

Tech Republic Security

Hackers are adopting organized crime tactics to make billions from victims all over the globe


This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Why password management is critical to mitigating data breaches

Tech Republic Data Center

The Identity Theft Resource Center warns that businesses of all sizes should be vigilant about data security. The COO offers advice about passwords, cloud security, and patch management

Key components of the CEO's agenda for the digital enterprise

Tech Republic Security

CEOs are generally from a finance/business track, rather than a technology one--why their traditional agenda and practices must change

Facebook Causes Continue to Show Little Promise as Fundraising Tools

How to quickly spin up MicroK8s with Multipass

Tech Republic Cloud

If you're looking for a way to spin up a fast Microk8s dev environment, Multipass makes this incredibly easy

How To 117

Report: 9 times out of 10, hackers can attack website visitors

Tech Republic Security

A Positive Technologies study finds 82% of web application vulnerabilities lie in the source code

Study 163

More Trending

Only 17% of global organizations are considered cyber resilience "leaders"

Tech Republic Security

New Accenture study says organizations need to think beyond securing just their own enterprises and take better steps to secure their vendor ecosystems

Study 139

The Best “Popularity” Quotes of “Digital Master” Feb, 2020

Future of CIO

" Digital Master ” is a series of guidebooks (28 + books) to perceive the multi-faceted impact digital is making to the businesses and society, help forward-thinking organizations navigate through the journey in a systematic way, and avoid “rogue digital.”

IoT device security: 5 tips for enterprises

Tech Republic Security

There are now billions of IoT devices in businesses across the world, prompting the need for increased security measures to protect them

The Monthly “Digital Fit” Book Tuning: The “Perfect” Fit Feb. 2020

Future of CIO

Building Like Amazon

Speaker: Leo Zhadanovsky, Principal Solutions Architect, Amazon Web Services

Amazon's journey to its current modern architecture and processes provides insights for all software development leaders. To get there, Amazon focused on decomposing for agility, making critical cultural and operational changes, and creating tools for software delivery. The result was enabling developers to rapidly release and iterate software while maintaining industry-leading standards on security, reliability, and performance. Whether you're developing for a small startup or a large corporation, learning the tools for CI/CD will make your good DevOps team great. We are excited to be joined by Leo Zhadanovsky, a Principal Solutions Architect at Amazon Web Services.

Man tries to sell Jimmy Wales on blockchain for Wikipedia's security problems--Wales doesn't buy it

Tech Republic Security

Commentary: It takes hubris to tell Jimmy Wales, the founder of Wikipedia, how to store data

How To 100

The Power Of Technology-Driven Innovation

Forrester's Customer Insights

Peter F. Drucker once said, “If you want to do something new, you have to stop doing something old”, and yet most firms stick with what they know and focus on incremental improvements.


Difference between WCAG, Section 508 and ADA – Tools of Web Accessibility 


The web is for everyone. No matter what geographic location, language or nationality one belongs to. A web accessibility policy refers to extending differently-abled persons the same access to digital services, products, and resources, as an able-bodied person.

RSA Conference 2020: An Intelligence Nerd’s Shopping List

Forrester's Customer Insights

RSA Conference is an incredible opportunity for vendors to showcase their products and services to the security and risk community. Vendors, my shopping list does not include vaporware or snake oil. Everyone attending knows the internet is a scary place and threats are around every digital corner.

Why Distributed Tracing is Essential for Performance and Reliability

Speaker: Daniel "spoons" Spoonhower, CTO and Co-Founder at Lightstep

Many engineering organizations have now adopted microservices or other loosely coupled architectures, often alongside DevOps practices. Together these have enabled individual service teams to become more independent and, as a result, have boosted developer velocity. However, this increased velocity often comes at the cost of overall application performance or reliability. Worse, teams often don’t understand what’s affecting performance or reliability – or even who to ask to learn more. Distributed tracing was developed at organizations like Google and Twitter to address these problems and has also come a long way in the decade since then. By the end of this presentation, you’ll understand why distributed tracing is necessary and how it can bring performance and reliability back under control.

Rock ‘N’ Role — The Art Of Managing Employee Roles And Access For Dynamic Business Models

Forrester's Customer Insights

The highly orchestrated symphony of grouping employees into well-defined roles with specific and granular access to enterprise apps/services is breaking down under the frenetic rock n’ roll era of dynamic business.

RSA Conference 2020: What I’m Looking for this Year

Forrester's Customer Insights

Counting down the days! My RSA Conference schedule is set, and I’ve stocked up on hand sanitizer. Here’s my game plan: · Look for innovation in data security.