Thu.Dec 12, 2019

Cost of data breaches in 2019: The 4 worst hits on the corporate wallet

CTOvision

Read Taylor Armerding list four worst data breaches of 2019 on Security Boulevard : Corporations that don’t keep their data secure may soon long for the good old days when the “only” expenses they had to worry about from a data breach were recovery costs, brand damage, lawyers’ fees, and potential class-action lawsuits. Because soon […]. News

Impact of Release Automation in DevOps

Flexagon

Gartner has predicted[1] that by 2020 that over 50% of global enterprises will have implemented application release automation, up from less than 15% in 2017.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Security 101: What Is a Man-in-the-Middle Attack?

CTOvision

Specific numbers are hard to pin down on man-in-the-middle (MitM) attacks, but according to IBM’s X-Force Threat Intelligence Index 2018, more than one-third of exploitation of inadvertent weaknesses involved MitM attacks. Exactly how do these hacks play out? How do criminals get in and steal information – and how are their techniques evolving? Here’s a closer […].

IBM 174

The secret to winning at customer experience: 3 takeaways

Tech Republic Data Center

If organizations want to be leaders in customer experience, they must start with data, Forrester and Deloitte found

Data 122

Facebook Causes Continue to Show Little Promise as Fundraising Tools

Your Brand Is a Target: How to Protect Your Reputation With Security Intelligence

CTOvision

Read you can protect your brand reputation with security intelligence on Recorded Future : Your company’s reputation is everything. But as you grow your online presence to connect with new audiences, enhance your customers’ experiences, and extend your services and offerings, your brand can become vulnerable to cybercriminals of all sorts: financially motivated attackers, competitors […].

Schneider Electric reveals industry's first chassis-based immersive cooling server rack

Tech Republic Data Center

The liquid-cooled solution promises lower operating costs, better efficiency, silent operation, increased reliability, and a smaller economic footprint

More Trending

How national population trajectories will shape our future

Trends in the Living Networks

Global population growth reached its peak of 2.09% in 1968 and has steadily declined since then to its current levels of 1.08%. The United Nations forecasts that in 2050 the growth rate will have slowed further to around 0.3% to give a global population of 9.7

AIOps Vendors Should Prepare for a Litmus Test in 2020

Information Week

Getting past the hype and proving they can automate aspects of DevOps may be crucial in the coming year

How to use Firefox's Lockwise password manager

Tech Republic Security

Mozilla has evolved its Lockbox password tool into a more standard password manager. Jack Wallen shows you how to use the Firefox Lockwise password manager

Tools 107

Want a Raise? Don't Ask Mom and Dad for Advice

Information Week

Who should you ask for advice about getting a salary increase? Probably not your parents

78

Why Distributed Tracing is Essential for Performance and Reliability

Speaker: Daniel "spoons" Spoonhower, CTO and Co-Founder at Lightstep

Many engineering organizations have now adopted microservices or other loosely coupled architectures, often alongside DevOps practices. Together these have enabled individual service teams to become more independent and, as a result, have boosted developer velocity. However, this increased velocity often comes at the cost of overall application performance or reliability. Worse, teams often don’t understand what’s affecting performance or reliability – or even who to ask to learn more. Distributed tracing was developed at organizations like Google and Twitter to address these problems and has also come a long way in the decade since then. By the end of this presentation, you’ll understand why distributed tracing is necessary and how it can bring performance and reliability back under control.

Organizations moving toward more rigorous security testing to ensure compliance

Tech Republic Security

More companies are using third-party vendors and crowdsourced testing to meet their security needs, according to a new survey from Synack

Survey 100

Kitaboo College – Enabling Higher Education with Technology

Kitaboo on EdTech

The requirements of a higher education institution such as a college or a university are quite different from that of a K-12 institution. There are more subjects for students to choose from, subjects that involve a range of complex topics.

The Pitfalls of Change Management

Future of CIO

Change is continuously happening and spiraling up in such a dynamic business environment, it is nevertheless true that change itself has become unpredictable and evolutionary.

Automated Knowledge in 2020: What to expect from AI & Machine Learning

Dataconomy

The year 2019 will be remembered in the software world as the year when containerization, cloud native architectures, and Machine Learning broke out into the mainstream. As we approach the end of the decade, it’s time to look forward to the year 2020 and make some predictions about where these.

Nine Developer Enablement Practices to Achieve DevOps at Enterprise Scale

In this eBook, Christian Oestreich, a senior software engineering leader with experience at multiple Fortune 500 companies, shares how a metrics-driven mindset can dramatically improve software quality and enable DevOps at enterprise scale.

The Best “Business Architecture ” Quotes of “Digital Master” Dec. 2019

Future of CIO

" Digital Master ” is a series of guidebooks (28 + books) to perceive the multi-faceted impact digital is making to the businesses and society, help forward-thinking organizations navigate through the journey in a systematic way, and avoid “rogue digital.”

Insider Threats, a Cybercriminal Favorite, Not Easy to Mitigate

CTOvision

Read why Lindsey O’Donnell says that insider threats are difficult to detect and mitigate on Threat Post : Insider threats are an ongoing top danger for companies — but when it comes to mitigation efforts, incident-response teams face an array of challenges.

The Weekly Insight of the “Future of CIO” 12/12/2019

Future of CIO

Blogging is not about writing, but about thinking, brainstorming, innovating and sharing. The “Future of CIO” Blog has reached 3 million page views with 6300+ blog posting in 59+ different categories of leadership, management, strategy, digitalization, change/talent, etc.

The Current Themes in Banking According to Industry Executives

Perficient

Previously I reviewed post-digital transformation in banking. This blog analyzes the current themes in banking according to executives. In recent years, several themes (and rightly so) generally dominated what bank executives paid attention to and invested in: Generational Relevance.

Data Analytics in the Cloud for Developers and Founders

Speaker: Javier Ramírez, Senior AWS Developer Advocate, AWS

You have lots of data, and you are probably thinking of using the cloud to analyze it. But how will you move data into the cloud? In which format? How will you validate and prepare the data? What about streaming data? Can data scientists discover and use the data? Can business people create reports via drag and drop? Can operations monitor what’s going on? Will the data lake scale when you have twice as much data? Is your data secure? In this session, we address common pitfalls of building data lakes and show how AWS can help you manage data and analytics more efficiently.

Is IT Supporting or Slowing Today’s Mobile Workforce?

Nutanix

If we were to compare the workforce of the past up against today’s, what would we see? Better diversity, improved accessibility and inclusivity, and a more accommodating company culture, for starters