January, 2021

10 CIO Resolutions for 2021

CEB IT

In January of 2020, New Year’s resolutions could not have taken into account the rollercoaster of events that year would bring.

SAP 291

Top IT Skills in Demand in 2021

CompTIA on Cybersecurity

2021 will be a challenging but exciting year for IT pros. Here are the top skills in demand they will need in order to gain ground in their career

108
108
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

CIOs to Accelerate Digital Business Transformation in 2021

Information Week

With 2020 in the rearview mirror, finally, CIOs are looking at bigger budgets and an acceleration in their digital transformations

Mind the (skills) gap: Cybersecurity talent pool must expand to take advantage of quantum computing opportunities

CTOvision

The “second age” of quantum computing is poised to bring a wealth of new opportunities to the cybersecurity industry – but in order to take full advantage of these benefits, […]. News QuintessenceLabs

The Unexpected Cost of Data Copies

This paper will discuss why organizations frequently end up with multiple data copies and how a secure "no-copy" data strategy enabled by the Dremio data lake service can help reduce complexity, boost efficiency, and dramatically reduce costs.

Tech Trends and Your IT Career: How to Level Up in 2021

Association of Information Technology Professional

2021 will offer many opportunities for you to advance your IT career and gain new IT skills. Set yourself up for success with these tech tips

Trends 278

The Proper Way to Watch Star Wars

Doctor Chaos

Many of us have stress in our lives. We have our jobs to worry about, we need to think about our retirement, and we have to figure out what the health care law means to us. However, a few of us know there are more immediate concerns that must be dealt with.

153
153

More Trending

Cisco tags critical security holes in SD-WAN software

Network World

Cisco has noted and fixed two critical and a number of high-degree vulnerabilities in its SD-WAN software portfolio.

WAN 148

Why DevOps Will Have To Change This Year

Information Week

Rocked by COVID in 2020, DevOps teams will face new challenges -- and opportunities -- over the next 12 months. Here's a look at what to expect

Devops 171

Palo Alto: You think you’re prepared for the next SolarWinds? You Are Not!

CTOvision

Instead of winding down at the end of the year, already strapped security teams were scrambling over the last week to ensure their organizations are safe in the wake of […]. News Palo Alto Networks SolarWinds

How to Get a CompTIA A+ Certification

Association of Information Technology Professional

Find out how to get a CompTIA A+ certification. Get a CompTIA A+ certification and start your IT career today

How To 270

Does Your Company Need Help Solving These 4 Common eLearning Challenges?

If you want to know how to get ahead of the game and avoid the common mishaps in selling your eLearning courses, you’ve come to the right place! Lambda Solutions has identified the most common and costly challenges faced by eLearning providers today.

Automating the Deletion of Windows.old

Mick's IT Blog

It is the beginning of 2021 and my first project for the new year is upgrading all systems to Windows 10 20H2. At the end of the upgrades comes the cleanup and there is no clean way to do this for system admins. Cleanmgr.exe is now deprecated as of Windows 10 2004.

Combine, Cluster, Complement: 3 Fundamentals of Combinatorial Digital Innovation

CEB IT

The digital industrial revolution has changed the world in profound ways — and it’s far from over. A global digital society infrastructure continues to expand, fueled by increasing digitalization of data, ubiquitous connectivity, decreasing computing costs and readily available storage.

Trends 271

Beware of the Surge in Covid-19 Vaccine Phishing Scams

Doctor Chaos

As the world makes steady progress towards ending the pandemic, the road ahead is still a long one. Previously unforeseen obstacles can pop up at any time and skew the trajectory of how the world handles Covid-19. One obstacle, in particular, that is on the rise currently is phishing scams.

Digital Transformation: How Leaders Can Stand Out

Information Week

Here are three things leaders in digital transformation are doing to set themselves ahead of the competition in 2021 and beyond

170
170

Insights on Choosing an Identity Verification Solution Provider

Sort through today’s crowded identity verification solutions landscape with our guide, designed to help you choose the right provider based on your unique needs.

RiskIQ CEO on the SolarWinds Attack: ‘This Hit the Security Community Hard’

CTOvision

The SolarWinds breach is a case study in how attackers can subvert a widely used piece of software to turn it to their advantage, says Lou Manousos, CEO of RiskIQ. “The […]. News RiskIQ SolarWinds

Most Popular IT Certifications for 2021

Association of Information Technology Professional

You know the value of IT certification. But do you know which ones will get you where you want to go? These are the most popular certifications

229
229

3 Digital Transformation Strategies in SMB

Social, Agile and Transformation

Digital transformation requires leaders to reconsider their business models in the face of market disruptions, changing customer needs, new technology capabilities, greater security threats, and new opportunities to empower a digital workforce.

SMB 195

5 Key Predictions for Identity and Access Management and Fraud Detection

CEB IT

Security and risk management leaders are experiencing widespread disruption in identity and access management (IAM) solutions for many reasons, most notably because of the increased drive to customer-facing interactions on digital channels and the sudden and rapid expansion of the remote workforce because of the pandemic.

Cassandra Data Modeling Guide to Best Practices

Are you a developer, database architect, or database administrator that's new to Cassandra but have been tasked with developing a Cassandra schema design? Learn the basic rules to keep in mind when designing your schema for Cassandra.

LISP Multihop Extended Subnet Mode

Doctor Chaos

(This blog posting was written with the understanding that the reader already understands how standard LISP operates from a control and data plane perspective.). Overview.

Are No Code and Low Code Answers to the Dev Talent Gap?

Information Week

An expected escalation of low-code app development might mean more IT duties could be shifted to citizen developers

Learning From Leaders: The OODA Loop Member Profile Series

CTOvision

One of my great joys of being the CTO at OODA is being able to continuously learn from a community that includes our own analysts and researchers but also a […].

Fortifying Your Cloud: Mitigation Techniques for Cloud Security Flaws

Association of Information Technology Professional

To benefit from the cloud, you must be able to anticipate these common security flaws and know how to mitigate them

Cloud 209

Open Source & Open Standards: Navigating the Intricacies of a Symbiotic Partnership

Speaker: Guy Martin, Executive Director of OASIS Open

The COVID-19 global pandemic has raised the already bright visibility of technology to an even higher level. Join Guy Martin, Executive Director at OASIS Open, as he presents this webinar that will discuss how we can make open source and open standards even more effective by helping them recapture their strong partnership.

Gartner: The future of AI is not as rosy as some might think

Tech Republic Security

A Gartner report predicts that the second-order consequences of widespread AI will have massive societal impacts, to the point of making us unsure if and when we can trust our own eyes

Report 171

How to Respond to a Supply Chain Attack

CEB IT

In late December, software company SolarWinds became aware of a supply chain attack on one of its software systems. The attackers added malware to signed versions of the supplier’s software, which was then used to infiltrate 18,000 private government and private organizations.

How To 219

ConfigMgr 2010 Known Issues Fixes | SCCM

Anoop

Subscribe YouTube Channel [link]. and Facebook Page to get latest updates. link]. In this post, you will learn more about ConfigMgr 2010 known issues. The production version of 2006 is generally available. Let’s understand the fixes already issued for SCCM 2010.

How To 170

10 Things IT Leaders Learned in 2020

Information Week

The pandemic had a lot of negative effects, but it also resulted in some unexpected benefits for enterprise technology leaders and teams

Leading Advertising and Analytics Company Outperforms With a Graph Database

Xandr, a division of AT&T, has built an identity graph that connects information on people, households, and more. The company is using this graph to provide advertisers an ability to deliver commercials more successfully than ever before. Learn more.

Ping Identity wins Glassdoor Employees’ Choice Award with employees voting it as a Best Place to Work in 2021

CTOvision

Ping Identity, the Intelligent Identity solution for the enterprise, has been honored with a Glassdoor Employees’ Choice Award, recognizing it as a Best Place to Work in 2021. The annual […]. News Ping Identity Ping Identity Corporation

The Best UK City for IT Pros to Work and Live (It's Not London!)

Association of Information Technology Professional

Finding the best city for you is about more than a job. Learn how growth, cost of living and lifestyle contribute to the best UK cities for IT pros

179
179

SolarWinds attack: Cybersecurity experts share lessons learned and how to protect your business

Tech Republic Security

The highly sophisticated SolarWinds attack was designed to circumvent threat detection—and it did, for much too long. Two cybersecurity experts share some valuable lessons learned from the attack

How To 170

The 4 Pillars of Privileged Access Management

CEB IT

No matter how good the features and functionalities of a privileged access management (PAM) tool are, they can never replace the need for a comprehensive PAM vision.

Tools 204

Cloud-Scale Monitoring With AWS and Datadog

In this eBook, find out the benefits and complexities of migrating workloads to AWS, and services that AWS offers for containers and serverless computing.