Wed.Jan 02, 2019

You’ve Still Got Mail

Forrester IT

It has been more than two decades since AOL popularized email with the catchy “you’ve got mail” greeting. So ubiquitous was it in its heyday that it was the title of a romcom starring Tom Hanks and Meg Ryan.

How IT can regain ownership of cloud computing

David Linthicum

At the board of directors’ meeting, the CEO is presenting the forecast for the next year. This time, he or she is discussing the use of cloud-based technology to launch a new product, including the ability to use this technology as a “force multiplier” and a platform to launch new products and/or services that will change the industry, increase shareholder value, and just make the company current. The CIO is just sitting there, looking sad.

Best Practice Response Can Mitigate Data Breaches Quickly

CTOvision

Read why Sue Poremba says that best practice response can help companies mitigate data breaches quickly on Security Boulevard : Data breaches are fairly common nowadays but it is the time that the company takes to identify the breach and notify its users that counts. It generally takes about six months for a company to […]. Cyber Security News

How IT can regain ownership of cloud computing

David Linthicum

At the board of directors’ meeting, the CEO is presenting the forecast for the next year. This time, he or she is discussing the use of cloud-based technology to launch a new product, including the ability to use this technology as a “force multiplier” and a platform to launch new products and/or services that will change the industry, increase shareholder value, and just make the company current. The CIO is just sitting there, looking sad.

An Adult Conversation About Estimates

Speaker: Beekey Cheung, Software Consultant, Professor Beekums, LLC

Estimates are a contentious topic in software development. Most of our development teams hate providing estimates and many managers are starting to view them as unnecessary. As senior software leaders, how can we determine whether estimates are helpful or harmful to our teams? We are excited to be joined by Beekey Cheung, a software consultant and blogger known as Professor Beekums, who has helped many leaders and teams go from fearing estimates to using them appropriately. He'll walk us through the value of estimates, how to overcome the hesitancy many have in giving them, and how to provide better estimates.

How to Build a Balanced Healthcare Cybersecurity Budget

CTOvision

Read Jessica Davis’ tips to healthcare firms for building a balanced cybersecurity budget on Health IT Security : The majority of healthcare security stakeholders agree that cybersecurity budgets are underfunded. And frankly, health organizations aren’t keeping pace with hackers who are continuously improving in sophistication. Data security programs are still often underfunded and understaffed, according to a […]. Cyber Security News

Budget 119

More Trending

How SMBs can minimize damage from ransomware attacks

CTOvision

There has been a lot written about how businesses can avoid being digitally defrauded by ransomware. “A ransomware infection often starts with someone clicking on what looks like an innocent attachment, and it can be a headache for companies of all sizes if vital files and documents (think spreadsheets and invoices) are suddenly encrypted and […]. Cyber Security News

FIX – SCCM Upgrade Issue – SQL Based Replication

Anoop

Subscribe YouTube Channel [link]. and Facebook Page to get latest updates. link]. My name is Deb and this is my first post in this blog. I will try to share my experience with SCCM, OSD, and Task Sequence more frequently with you all. Recently, I faced an issue during SCCM CB in-place upgrade. I will try to explain the issue and resolution in this post. SCCM CB […].

The 3 Biggest Challenges for Tech

CTOvision

Read why Susan Fowler says that privacy, security, and cyber warfare are the top risks to American businesses in 2019 on New York Times : The biggest challenges for US tech firms in 2019: GDPR-like privacy protections, large security breaches becoming routine, and anti-government employee protests. If you thought 2018 was a bad year for tech, 2019 might […]. Cyber Security News

What Do Tech's Most Powerful Women Have in Common?

Information Week

When the IBM Watson Personality API analyzed these female tech leader's words, it identified nine traits as being most dominant

IBM 87

The Six Principles of Persuasion

Speaker: Michael Carducci, CTO, Mago:Tech

As senior tech leaders, we often fall prey to thinking that a “good idea” and logical case is sufficient to get the desired response and result. We might be trying to get our CEO on-board with investment in a new technology or a rearchitecture effort, or we might want culture or process changes by our team. Our “good idea” is simply the beginning. An idea must be communicated; a case must be made; and ultimately other people must be persuaded to get onboard. Michael Carducci brings a fascinating background to this webinar. He’s a technologist and regularly works to help senior leaders improve their results. He’s also a professional mentalist and has been a student of psychology, human behavior and the principles of influence for nearly two decades.

Insider Threats & Insider Objections

CTOvision

Read Richard Ford’s article about why CISO’s find it difficult to implement robust insider threat prevention program on Dark Reading : There’s no shortage of good coverage in the media on the important topic of insider threats. Yet despite the headlines, according to a 2018 report by CA , only 36% of companies surveyed say […]. Cyber Security News

The New Year Contemplation: Is IT Organization an “Afterthought or Forethought” in your Company

Future of CIO

The digital ecosystem is complex and volatile, the information potential directly impacts the business's potential of the organization.

Sum Up: The Most Popular Blogs about IT Leadership 2018

Future of CIO

The prominence of the CIO role has risen greatly as IT has become an increasingly important success factor of the digital organization. The CIO position has a shorter history, but a more dynamic role to play due to the continuous changes in information and technology.