Thu.Dec 12, 2019

Cost of data breaches in 2019: The 4 worst hits on the corporate wallet


How national population trajectories will shape our future

Trends in the Living Networks

Global population growth reached its peak of 2.09% in 1968 and has steadily declined since then to its current levels of 1.08%. The United Nations forecasts that in 2050 the growth rate will have slowed further to around 0.3% to give a global population of 9.7

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

How to secure your DNS traffic under Windows


Read Susan Bradley’s article about how to secure your DNS traffic under Windows on CSO Online : Domain Name System (DNS) is such a foundational function in Windows it is too often taken for granted. Think about ways to protect your firm’s DNS traffic both in terms of how attackers can impact your custom domain […].

Impact of Release Automation in DevOps


Gartner has predicted[1] that by 2020 that over 50% of global enterprises will have implemented application release automation, up from less than 15% in 2017.

Business Agile: A Roadmap for Transforming Your Management & Adapting to the VUCA Environment

Speaker: Peter Taylor, Speaker/Author, The Lazy Project Manager

Businesses everywhere are trying to “get business agile”—but it’s not easy to adapt to becoming this adaptive. How can conventional organizations succeed in this transformation? In this webinar, Peter Taylor will walk through the change process step by step, and look at a tried and tested transformation roadmap: benefits are outlined, solutions to common challenges offered, and tried and tested methods and tools provided. It will be a guide towards a decentralized and management style that offers more successful decision making through collaboration.

Security 101: What Is a Man-in-the-Middle Attack?


Specific numbers are hard to pin down on man-in-the-middle (MitM) attacks, but according to IBM’s X-Force Threat Intelligence Index 2018, more than one-third of exploitation of inadvertent weaknesses involved MitM attacks. Exactly how do these hacks play out? How do criminals get in and steal information – and how are their techniques evolving? Here’s a closer […].

IBM 70

More Trending

Your Brand Is a Target: How to Protect Your Reputation With Security Intelligence


Read you can protect your brand reputation with security intelligence on Recorded Future : Your company’s reputation is everything. But as you grow your online presence to connect with new audiences, enhance your customers’ experiences, and extend your services and offerings, your brand can become vulnerable to cybercriminals of all sorts: financially motivated attackers, competitors […].

Automated Knowledge in 2020: What to expect from AI & Machine Learning


The year 2019 will be remembered in the software world as the year when containerization, cloud native architectures, and Machine Learning broke out into the mainstream. As we approach the end of the decade, it’s time to look forward to the year 2020 and make some predictions about where these.

Kitaboo College – Enabling Higher Education with Technology


The requirements of a higher education institution such as a college or a university are quite different from that of a K-12 institution. There are more subjects for students to choose from, subjects that involve a range of complex topics.

The Pitfalls of Change Management

Future of CIO

Change is continuously happening and spiraling up in such a dynamic business environment, it is nevertheless true that change itself has become unpredictable and evolutionary.

More Effective Agile Leadership

Speaker: Steve McConnell, CEO, Construx Software

In this talk, Steve McConnell, CEO of Construx Software, distills hundreds of companies’-worth of real-world experience into the proven Agile leadership practices that work best. Steve will seamlessly thread together traditional approaches, early Agile approaches, modern Agile approaches, and the principles and context that underlie them all—creating an invaluable resource for Agile leaders, their teams, and their organizations.

How to use Firefox's Lockwise password manager

Tech Republic Security

Mozilla has evolved its Lockbox password tool into a more standard password manager. Jack Wallen shows you how to use the Firefox Lockwise password manager

Tools 52

The Best “Business Architecture ” Quotes of “Digital Master” Dec. 2019

Future of CIO

" Digital Master ” is a series of guidebooks (28 + books) to perceive the multi-faceted impact digital is making to the businesses and society, help forward-thinking organizations navigate through the journey in a systematic way, and avoid “rogue digital.”

The secret to winning at customer experience: 3 takeaways

Tech Republic Data Center

If organizations want to be leaders in customer experience, they must start with data, Forrester and Deloitte found

Data 52

The Weekly Insight of the “Future of CIO” 12/12/2019

Future of CIO

Blogging is not about writing, but about thinking, brainstorming, innovating and sharing. The “Future of CIO” Blog has reached 3 million page views with 6300+ blog posting in 59+ different categories of leadership, management, strategy, digitalization, change/talent, etc.

Architect Your Organization for Effectiveness, Productivity, and Joy

Speaker: Ron Lichty, Consultant: Interim VP Engineering, Ron Lichty Consulting, Inc.

As a senior software leader, you likely spend more time working on the architecture of your systems than the architecture of your organization. Yet, structuring our teams and organizations is a critical factor for success. In fact, the impact of software architecture parallels the impact of organizational structure. We are excited to welcome Ron Lichty, co-author of a seminal book on managing software teams and a well-known speaker, he’ll speak to organizing for effectiveness, productivity and joy.

Schneider Electric reveals industry's first chassis-based immersive cooling server rack

Tech Republic Data Center

The liquid-cooled solution promises lower operating costs, better efficiency, silent operation, increased reliability, and a smaller economic footprint

Organizations moving toward more rigorous security testing to ensure compliance

Tech Republic Security

More companies are using third-party vendors and crowdsourced testing to meet their security needs, according to a new survey from Synack

AIOps Vendors Should Prepare for a Litmus Test in 2020

Information Week

Getting past the hype and proving they can automate aspects of DevOps may be crucial in the coming year

Is IT Supporting or Slowing Today’s Mobile Workforce?


If we were to compare the workforce of the past up against today’s, what would we see? Better diversity, improved accessibility and inclusivity, and a more accommodating company culture, for starters

An Adult Conversation About Estimates

Speaker: Beekey Cheung, Software Consultant, Professor Beekums, LLC

Estimates are a contentious topic in software development. Most of our development teams hate providing estimates and many managers are starting to view them as unnecessary. As senior software leaders, how can we determine whether estimates are helpful or harmful to our teams? We are excited to be joined by Beekey Cheung, a software consultant and blogger known as Professor Beekums, who has helped many leaders and teams go from fearing estimates to using them appropriately. He'll walk us through the value of estimates, how to overcome the hesitancy many have in giving them, and how to provide better estimates.

Want a Raise? Don't Ask Mom and Dad for Advice

Information Week

Who should you ask for advice about getting a salary increase? Probably not your parents


Insider Threats, a Cybercriminal Favorite, Not Easy to Mitigate


Read why Lindsey O’Donnell says that insider threats are difficult to detect and mitigate on Threat Post : Insider threats are an ongoing top danger for companies — but when it comes to mitigation efforts, incident-response teams face an array of challenges.