Security Think Tank: Patching is vital and essentially a risk management exercise

Computer Weekly

How should organisations address the need to keep software up to date with security patches without it costing too much or being too labour intensive

A “Powerful” Board: How to Exercise “Supervisory” Power Effectively

Future of CIO

A “powerful” board can exercise supervisory power and co-determine of which powers are retained by the governing body and which are delegated to management, along with constraints that may apply. The “sovereign” power: Generally, the shareholders of the company exercise this third power.

British navy sends robots to sea in military exercise

Network World

The Royal Navy is testing just how much robot craft can do by themselves in military exercises off the British coast. Operation Unmanned Warrior 16 is a chance for allied nations and the defense industry to show off their latest maritime autonomous systems, as part of a broader military exercise called Joint Warrior.

Security Think Tank: How to maximise the value or red team exercises

Computer Weekly

How can organisations use red teaming to identify security gaps

Security Think Tank: How to get the best out of red team exercises

Computer Weekly

How can organisations use red teaming to identify security gaps

Is A “Walk And Talk” The Best Way To Connect With Your Direct Reports?

The Accidental Successful CIO

Communication daily step counts exercise meetings mental moderate-intensity aerobic activity more active obesity physical set route type 2 diabetes walk and talkThe best kind of meetings are the ones that leave you breathless Image Credit: Pero Kvrzica.

Flawed GoDaddy security certificates show need for control

Computer Weekly

Vulnerabilities in digital security certificates highlight the need for organisations to be able to exercise more control over those certificates

AWS Outage that Broke the Internet Caused by Mistyped Command

Data Center Knowledge

Amazon says Tuesday’s mayhem resulted from mistake during a routine debugging exercise. Read More. Amazon Cloud Computing Downtime

Europol hosts simulated cyber attack on retail sector

Computer Weekly

Europol and MasterCard hold a retail cyber attack simulation exercise to raise awareness of the issue and how to respond to attacks, as well as promote information sharing in the sector

Retail 189

EU-backed fund to encourage data-sharing between startups and enterprises launches

Computer Weekly

Three-year project seeks to encourage enterprises to embark on information-sharing exercises with startups and SMEs to bolster data-led innovation

Twitter adds USB key verification, Florida names first Crypto Officer, Comcast’s data breach, WPA3 is finally here and why rebranding cybersecurity is necessary

CTOvision

Twitter said that the above exercise was a part of a two-factor authentication process and will protect Twitter accounts from being hacked. [.]. Twitter adds support for login verification with a USB key Twitter has taken a step towards providing better security by adding support for login verification through physical USB security keys, such as YubiKey.

“Right-Sizing” The Data Center: A Fool’s Errand?

Data Center Knowledge

For many, the quest to right-size turns into an exercise akin to a dog chasing its tail. So, we constantly ask ourselves the question: Is right-sizing a fool’s errand? Read More. Data Center Design Featured Resources

Zero Trust Technology Works, Excuses Don’t

Forrester IT

I have done a few exercises on implementing Zero Trust and ZTX in enterprises. The impetus for the strategy days was that those organizations had leaders that are Forrester clients and had read, or at least breezed through, the research that has been published on the topic of Zero Trust, and they are bought in […]. security & risk cybersecurity digital strategy digital transformation S&R pros Security & Risk

TIBER-EU Framework Offers An Opportunity To Improve FinServ Cyber Resilience

Forrester IT

In short, there is a new voluntary framework for threat intelligence-led red-teaming exercises that has been published by the European Central Bank (the Central Bank for eurozone economies). The European Central Bank yesterday launched its TIBER-EU (Threat Intelligence-Based Ethical Red Teaming for the European Union) framework for financial institutions regulated within the EU.

Choosing the Right CRM for SMB

IT Toolbox

Selecting the right CRM system for a small or medium size business is essentially an exercise in reduction. You need to decide which features are important to you and limit yourself accordingly. The modern CRM landscape is crowded with CRM systems with various prices and capabilities. Winnowing down the field is an important part of choosing the right system.

SMB 122

Understanding Collaboration - Disrupt, or be Disrupted

IT Toolbox

This could well be a futile exercise since the scope keeps expanding with everyThere are many scenarios to consider for collaboration, and I’ve been writing about this lately, both for internal use cases among workers, and external use cases to support end customers. A big challenge facing decision-makers is building a fence around collaboration so everyone understands what’s involved.

Simplicity is a strategy that works.

Forrester IT

This last week I was fortunate enough to be invited out to Hollywood to participate in a large exercise for the entertainment industry focusing on cyber security planning and threat management.

Using webinar metrics to blast CRM data to the next level

IT Toolbox

Frequently, that vital information is distilled into a simple e-mail-harvesting exercise, with customer details folded into an automated email routine. Webinars are becoming a highly popular component of the digital marketing tool box, but harnessing the rich customer data they yield is still a missed opportunity. Yet, there are more effective outcomes available.

Paxata: Adaptive Data Preparation

CTOvision

The company’s technology dramatically reduces the most painful and manual steps of any analytic exercise, turning raw data into ready data for analytics, and empowering analysts to drive greater value for the business.

Data 240

Governments and nation states are now officially training for cyberwarfare: An inside look

Tech Republic Security

Europe, Canada, USA, Australia, and others are now running training exercises to prepare for the outbreak of cyberwar. Locked Shields is the largest simulation and we take you inside

Do you collaborate more than 25%?

IT Toolbox

I've been wanting to get back into riding my bike as a way to break up my day, get a little exercise andIt's Sunday night and I just finished reviewing the week ahead at work. I have no unread emails, but I also have no unencumbered lunches. Just about every day something is going on that pinches into what should be my lunch hour.

Growing in a Down Economy

SPF13

This exercise of fat trimming should be an ongoing exercise, quarterly. Trimming the Fat I am all in favor of trimming the fat. Every company has inefficiencies and employees that aren’t adding value to the company. If a company larger than 200 employees is firing 10% or more of their employees they have a serious management issue. No well run company can operate efficiently with 10%+ of “fat”, and no company can expect to grow while letting go 10%+ of their staff

Corporate IT: 5 Mistakes to Avoid in Your 2017 Strategic Plan

CEB IT

” Too often, the strategic planning exercise is limited to a tightly bounded vacuum known as the leadership offsite. Done well, IT strategic planning does two things.

6 Reasons Why Unity is the Best Game Engine Out There!

Cloud Musings

Unity 2017 Game Development Essentials is an end-to-end exercise in game development, covering environments, physics, sound, particles, and otherkey concepts to get you up and running. What makes Unity the most popular game engine? Find out below.

IT Enterprise Architecture: How to Become a Digital Strategy Consultant to the Business

CEB IT

EA’s goal in this exercise is to document a wide range of possibilities, rather than trying to pick which assumptions are most likely to occur (see chart 1). In this exercise, EA specifically avoids grouping the most popular assumptions into a single scenario.

Some server storage I/O benchmark tools, workload scripts and examples

IT Toolbox

There are various tools and workloads for server I/O benchmark testing, validation and exercising different storage devices (or systems and appliances) such as Non-Volatile Memory (NVM This is part one of a two-part series of posts about using some common server storage I/O benchmark tools and workload scripts. View part II here which includes the workload scripts and where to view sample results.

Digital Risk of Data Increases When Employees Leave

CTOvision

Ultimately, the company may decide to pursue legal action against the former employee, a costly and unwanted exercise for everyone involved. Crystal Lister.

Corporate IT: Why Your IT Scorecard Isn’t Impressing People

CEB IT

This refocusing exercise doesn’t mean that IT teams need to spend time and money identifying and tracking new metrics, but rather creating composite metrics that measure outcomes, instead of inputs.

Step-by-Step: Deploying Windows 8 Apps with System Center 2012.

IT Pros Rock!

After building your lab environment, follow these steps to configure boundaries, boundary groups and the Application Catalog site system roles prior to beginning the exercises below. As part of this process, we’ll organize the steps into the following exercises: Exercise 1: Create Application for an internal Windows 8 app package (.appx Exercise 2: Create Application for a published Windows Store app ( deep link on Windows Store ). Sign in. IT Pros ROCK!

System 159

Top Local Apps - Get a Great Workout Anywhere with Bodeefit!

IT Pros Rock!

Bodeefit – Step-by-Step Workouts with Prescriptive Exercises and Videos. It seems like I’m always traveling in my current role, and getting to the gym for a real workout is always a challenge.

Hotels 139

To unlock phones, feds demand all occupants surrender fingerprints

Network World

investigators are exercising a broad legal authority to force suspects to unlock their smartphones. In a recent case, they demanded that anyone found inside a California residence comply by surrendering their fingerprints. In May, the federal prosecutors made the request as part of a search warrant, according to a court filing uncovered by Forbes. Those fingerprints were crucial to unlocking the smartphones, the Department of Justice argued.

Back-to-Basics Weekend Reading - Experience with Grapevine: The Growth of a Distributed System

All Things Distributed

It was built at the famous Xerox PARC (Palo Alto Research Center) Computer Science Laboratory as an exercise in discovering what is needed as the fundamental building blocks of a distributed system; messaging, naming, discovery, location, routing, authentication, encryption, replication, etc.

Machine learning risks are real. Do you know what they are? 

Eric D. Brown

Output interpretation – Just like any other type of modeling exercise, how you use and interpret the model can be a huge risk. Similar approaches should be taken in other model building exercises.

FCC Releases New Net Neutrality Rules

CTOvision

Congress could not have imagined… nearly 4 million Americans would exercise their right to comment on proposed rulemaking.” By Shannon Perry. Net neutrality became a buzzword in 2014, as many media sources and public figures voiced their opposition to the FCC’s “fast lanes.”

.Net 228

National Cybersecurity = Cloud Computing Security

Cloud Musings

This self-paced training exercise provides an introduction to securing your information. A recent article Inc.com article claimed that the percentage of U.S.