Sat.Jan 27, 2018 - Fri.Feb 02, 2018

Don’t worry about selecting the ‘wrong’ public cloud

David Linthicum

When I speak in public about cloud architecture, I’m often asked a question with no right answer: “Which public cloud should we use?” Not knowing much about what “we” is, there is no right answer. While I can list the top two players, they may be wrong for “we’s” problem domain when taking into account special issues such as performance requirements, security, and compliance.

Skyhigh Networks: CASB Security

CTOvision

Skyhigh is now part of McAfee. Smart move there McAfee! Skyhigh is a leader in CASB, and are known for their focus on making cloud services safe for the enterprise while meeting security, compliance and government requirements.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Security Frameworks…Useless?

Doctor Chaos

I was recently in a very high-cost (around $6K), one-week security course in San Francisco. You can infer the institution. The instructor was dynamic, and the topic was focused on technical hacking. A how-to for breaking into computers, detecting the break-in, etc. At the end of the week there was a little ‘capture the flag’ […]. InfoSec compliance framework NIST PCI

CIOs Struggle To Deal With The Challenge Of Doxing

The Accidental Successful CIO

Your emails are safe from prying eyes, aren’t they? Image Credit: AJC1.As CIO, we are aware of the importance of information technology and all of the threats that our firms are facing on an almost daily basis.

Budget 163

Data Analytics in the Cloud for Developers and Founders

Speaker: Javier Ramírez, Senior AWS Developer Advocate, AWS

You have lots of data, and you are probably thinking of using the cloud to analyze it. But how will you move data into the cloud? In which format? How will you validate and prepare the data? What about streaming data? Can data scientists discover and use the data? Can business people create reports via drag and drop? Can operations monitor what’s going on? Will the data lake scale when you have twice as much data? Is your data secure? In this session, we address common pitfalls of building data lakes and show how AWS can help you manage data and analytics more efficiently.

One cloud accounting dilemma will soon be fixed

David Linthicum

You know cloud computing is here to stay when the accountants take notice. The Financial Accounting Standards Board’s Emerging Issues Task Force plans to propose new rules for how to deal with cloud computing service costs. The updated guidance means that a customer under contract with a cloud computing provider would consider the current processes of leveraging internal-use software to determine how to recognize implementation costs as an asset.

Netskope: A leading provider of cloud security and CASB

CTOvision

Netskope is a highly regarded provider of Cloud Application Service Broker (CASB) capabilities. Their focus is cloud security. They help organizations understand online activities, protect data, stop threats, and respond to incidents.

More Trending

Overview of Client Online Status in SCCM Console

Anoop

I provided bit more details about Client online status & Types in SCCM console, related component, SQL tables, and Logs. As we all know, Client online status indicates whether the computer is online of offline.

Security Frameworks…Useless?

Doctor Chaos

I was recently in a very high-cost (around $6K), one-week security course in San Francisco. You can infer the institution. The instructor was dynamic, and the topic was focused on technical hacking. A how-to for breaking into computers, detecting the break-in, etc. At the end of the week there was a little ‘capture the flag’ […]. Cyber compliance framework NIST

Course 100

QuintessenceLabs Introduces Stronger Key Management Appliances

CTOvision

QuintessenceLabs (QLabs), in partnership with PKWARE, launched four virtual and hardware key management appliances as part of the company’s line of Smartcrypt appliances. These Smartcrpyt appliances are integrated with the QLabs' Trusted Security Foundation (TSF) solution, which includes a high speed random number generator, an advanced key and policy manager and an embedded FIPS 140-2 […]. Cyber Security PKWARE QuintessenceLabs

IoT and the law of unintended consequences

Network World

You’ve probably already heard about the latest Internet of Things (IoT) security fiasco — coverage has gone far beyond the tech press into the mainstream TV news.

The Best Sales Forecasting Models for Weathering Your Goals

Every sales forecasting model has a different strength and predictability method. It’s recommended to test out which one is best for your team. This way, you’ll be able to further enhance – and optimize – your newly-developed pipeline. Your future sales forecast? Sunny skies (and success) are just ahead!

The CIO as a Cloud Supply Chain Manager

Fountainhead

Transforming IT from engineers and builders. to assemblers and integrators Preface About 5 years ago, I wrote a GigaOm article, The CIO as the IT Supply Chain Manager. The focus was how cloud services would transform how CIOs shifted from Technology Builders to become Service Assemblers.

Agile 141

5 Awesome Data Science Subscriptions To Keep You Informed

Datacponomy

If you ask a data scientist how to start or advance your data career, one of the first things they might tell you is to read. Not the answer you’d expect? You’d be surprised! The rapidly evolving nature of data science calls for professionals to keep a close eye on.

How To 138

CTOvision Tech News 30 Jan 2018

CTOvision

This week we learned that Apple is working on new Macs. And this is exciting for us Mac fans. But story after story this week reminded us that we are living in a mobile world. Reports below cover a range of mobile stories including reports on how fitness tracking was revealing secret military installations, details […]. Artificial Intelligence Big Data Cloud Computing Cryptocurrency CTO Cyber Security News

Apple 186

Reassign DPs Offset Days Phased Deployments with SCCM 1801

Anoop

Microsoft SCCM product group released SCCM CB preview 1801 with loads of new features. I think they are getting all set for big bang SCCM CB 1802 production release with loads of new features.

How to Choose the Best Embedded Analytics Solution to Modernize Your Application

If you are looking to modernize your application to improve competitiveness, then one of the quickest wins you can have is to embed sophisticated analytics that will wow your existing and prospective customers.

How to Raise Your Series A

The Investing Edge

Early stage investing has remained exciting and seen healthy, even increasing , capital flows since 2010. While it is defined differently by different venture industry participants, at Ascent, we separate angel and seed into a separate category that comes before the early stage.

B2B 91

How to eliminate the default route for greater security

Network World

If portions of enterprise data-center networks have no need to communicate directly with the internet, then why do we configure routers so every system on the network winds up with internet access by default? Part of the reason is that many enterprises use an internet perimeter firewall performing port address translation (PAT) with a default policy that allows access the internet, a solution that leaves open a possible path by which attackers can breach security.

IPv6 84

Garrison Technology CTO will Present on Network Isolation at Cross Domain Forum

CTOvision

Cross Domain Solutions (CDSs) enable secure transfer and receipt of data, information, and intelligence products on separate networks with different security levels. These services leverage capabilities, or solutions, that already exist throughout Defense (DoD) and the Intelligence Community (IC). There are many CDSs throughout the DoD and IC safely and securely protecting data as it […].

Download eBook on SCOM Reporting

Anoop

SCOM comes with a verity of default reports. SCOM default reports will be available for you when you install a management group. These reports help you to review the operational telemetry and configurations.

eBook 84

Machine Learning for Builders: Tools, Trends, and Truths

Speaker: Rob De Feo, Startup Advocate at Amazon Web Services

Machine learning techniques are being applied to every industry, leveraging an increasing amount of data and ever faster compute. But that doesn’t mean machine learning techniques are a perfect fit for every situation (yet). So how can a startup harness machine learning for its own set of unique problems and solutions, and does it require a warehouse filled with PhDs to pull it off?

Big data basics for tech beginners

Datacponomy

Despite big data currently ranking among top business intelligence and data analytics trends, businesses continue to suffer from a lack of data-savvy talent. Research from BARC shows half of respondents reporting a lack of analytical or technical know-how for big data analytics. This is good news for tech beginners, however, The post Big data basics for tech beginners appeared first on Dataconomy. Big Data Resources

What to do when the CIO still doesn’t “Get it”?

Social, Agile and Transformation

I was asked this question twice last year as a keynote speaker, one time by Chief Data Officers and the other by millenials working in marketing and other digital roles. Their sentiment was that their CIO was too slow to implement modernized digital platforms, hadn't instrumented collaborative practices, or was just perceived as a "no person" when presented with new ideas and needs. Here's.

Agile 116

Update on Cloud Access Security Brokers (CASB)

CTOvision

Cloud Access Security Brokers (CASB) have been hot for the last 5 years. It has gotten to the point where every firm is either using one, evaluating one, or studying how to use them. This makes sense, since any successful cloud transition strategy should including appropriate attention being placed on how to secure, control and […]. CTO Cyber Security News

Cosmetic Issue with SCCM 1710 Service Manager GUI

Anoop

There is a cosmetic issue with SCCM 1710 and Hotfix Rollup KB 4057517 service manager. The Service Manager console GUI had a GUI bug in the SCCM CB 1710 version. But it’s not fixed with roll-up hotfix released recently.

B2B Pocket Playbook: End-to-End Guide to Sales Enablement

Sales enablement is the strategic process of providing sales teams with the content, guidance, and mentorship needed to engage targeted buyers. It’s all about equipping sales professionals with the tools they need to put their best-selling foot forward. And if sales teams want to continuously sell better -- and faster -- their sales enablement process must have a game-winning strategy. It's time for you to start selling smarter - and hitting your sales number - with the best B2B database in the market. Get started today.

Collaboration Helps Advance Energy Industry

Perficient - Digital Transformation

Energy companies continue to collaborate with other organizations to further research. For example, Shell recently opened a mobility research center at Tsinghua University in China.

Digital Transformation & Intelligent Automation

Cloud Musings

By Kevin Jackson & Dez Blanchfield Digital Transformation often needs Intelligent Automation. This type of change is the focus of a recent “ Pioneers of Possible ” podcast.

IBM 106

Bitglass: Next-Gen CASB

CTOvision

Wow we just started tracking CASB about 5 years ago. Now the market has evolved to the point where next-gen CASB are required. Could this be marketing speak? Maybe, but on the other hand, we are hearing good things about Bitglass and definitely consider them one worth tracking.

AMD plans silicon fix for Spectre vulnerability

Network World

Comeback kid AMD announced on its quarterly earnings call that it intends to have a silicon fix for the variant 2 of the Spectre exploit, the only one of the Meltdown and Spectre exploits it’s vulnerable to, by 2019 with its new Zen 2 core. The company also said it will ramp up GPU card production to meet the insane demand these days thanks to cryptominers, although it said the biggest challenge will be to find enough memory to make the cards.

Microservices: The Dark Side

Speaker: Prem Chandrasekaran

A few years ago, Barclays embarked on a journey to migrate its legacy services to a modern tech stack with the objective of achieving a high level of scale, resilience, and reliability. During the incremental, iterative move towards an ecosystem of focused, distributed services, it’s fair to say that the company discovered the challenges of distributing objects. Join us for an episode you can’t miss if you’re finding it a lot harder to architect in practice than in theory, and learn how you can shed light on the dark side of microservices.

Digitalization Will Help Telecom, Cable, and Satellite Win Big

Perficient - Digital Transformation

As it stands, the outlook for broadcast, cable, and telecommunications providers looks very bright. In a Q3 2017 earnings call, John J. Stephens, senior executive vice president and chief financial officer of AT&T, said: “We continue to track well against our full-year guidance, and we continue to invest for the growth of our business and remain focused and optimistic about our long-term opportunities.”

My Service Design origin story

I'm not lost, I'm wondering

My background is more technical than what is traditionally considered “creative”, having received my B.S. in Electrical Engineering and spent the bulk of my career as an Army communications officer or a systems engineer designing comms and network systems. What you could call “old school high tech.” ” Most of my work was in text or technical system diagrams; the most visual aspect of my work and thought processes were expressed through mind maps.

Film 58

Which DNA test kit should you get?

Mashable Tech

DNA test kits like AncestryDNA and 23andMe have become increasingly popular over the past few years — some 26 million people have taken them — and were a big gift item during the holiday season.

How to eliminate the default route for greater security

Network World

If portions of enterprise data-center networks have no need to communicate directly with the internet, then why do we configure routers so every system on the network winds up with internet access by default? Part of the reason is that many enterprises use an internet perimeter firewall performing port address translation (PAT) with a default policy that allows access the internet, a solution that leaves open a possible path by which attackers can breach security.

IPv6 63

Pressure Points: How to Ensure Your B2B Pipeline Passes Inspection

This eBook highlights best practices for developing a pipeline management process that helps sales leaders and their team C.L.O.S.E (you’ll see what we mean in this eBook) more revenue through data-driven prospecting, stage analysis, and subsequent sales enablement.