Security Think Tank: Patching is vital and essentially a risk management exercise

Computer Weekly

How should organisations address the need to keep software up to date with security patches without it costing too much or being too labour intensive

Security Think Tank: How to maximise the value or red team exercises

Computer Weekly

How can organisations use red teaming to identify security gaps

A “Powerful” Board: How to Exercise “Supervisory” Power Effectively

Future of CIO

A “powerful” board can exercise supervisory power and co-determine of which powers are retained by the governing body and which are delegated to management, along with constraints that may apply. The “sovereign” power: Generally, the shareholders of the company exercise this third power.

Security Think Tank: How to get the best out of red team exercises

Computer Weekly

How can organisations use red teaming to identify security gaps

British navy sends robots to sea in military exercise

Network World

The Royal Navy is testing just how much robot craft can do by themselves in military exercises off the British coast. Operation Unmanned Warrior 16 is a chance for allied nations and the defense industry to show off their latest maritime autonomous systems, as part of a broader military exercise called Joint Warrior.

Is A “Walk And Talk” The Best Way To Connect With Your Direct Reports?

The Accidental Successful CIO

Communication daily step counts exercise meetings mental moderate-intensity aerobic activity more active obesity physical set route type 2 diabetes walk and talkThe best kind of meetings are the ones that leave you breathless Image Credit: Pero Kvrzica.

Flawed GoDaddy security certificates show need for control

Computer Weekly

Vulnerabilities in digital security certificates highlight the need for organisations to be able to exercise more control over those certificates

AWS Outage that Broke the Internet Caused by Mistyped Command

Data Center Knowledge

Amazon says Tuesday’s mayhem resulted from mistake during a routine debugging exercise. Read More. Amazon Cloud Computing Downtime

Tech’s Next Imperative Must Be Physical Security

CTOvision

This foresight exercises […]. Physical security has always taken a back seat for IT professionals. With growing attacks read why Alan Cohen says that it is imperative for the IT pros to focus on physical security on Forbes : I believe our Founding Fathers knew that the American experiment would be sorely pressed, sorely challenged over time.

Europol hosts simulated cyber attack on retail sector

Computer Weekly

Europol and MasterCard hold a retail cyber attack simulation exercise to raise awareness of the issue and how to respond to attacks, as well as promote information sharing in the sector

Retail 189

Nineteen In ’19: New Year’s Resolutions For The Data-Driven Marketer

Forrester IT

Every New Year, I find myself making lofty goals: eat better, exercise more, spend less time on social media. By mid-February, those goals are a distant blip in my rearview mirror; the reality of life gets into the way and I just fail at tracking progress. But this year is different (I swear). I created […

EU-backed fund to encourage data-sharing between startups and enterprises launches

Computer Weekly

Three-year project seeks to encourage enterprises to embark on information-sharing exercises with startups and SMEs to bolster data-led innovation

“Right-Sizing” The Data Center: A Fool’s Errand?

Data Center Knowledge

For many, the quest to right-size turns into an exercise akin to a dog chasing its tail. So, we constantly ask ourselves the question: Is right-sizing a fool’s errand? Read More. Data Center Design Featured Resources

Twitter adds USB key verification, Florida names first Crypto Officer, Comcast’s data breach, WPA3 is finally here and why rebranding cybersecurity is necessary

CTOvision

Twitter said that the above exercise was a part of a two-factor authentication process and will protect Twitter accounts from being hacked. [.]. Twitter adds support for login verification with a USB key Twitter has taken a step towards providing better security by adding support for login verification through physical USB security keys, such as YubiKey.

Is Your Organization Customer Centric?

CEB IT

As organizations strive to become customer centric, Gartner has identified 10 common habits of organizations exercising customer centricity in the age of digital business. Gartner predicts that, by 2020, poor customer experiences will destroy 30% of digital business projects.

TIBER-EU Framework Offers An Opportunity To Improve FinServ Cyber Resilience

Forrester IT

In short, there is a new voluntary framework for threat intelligence-led red-teaming exercises that has been published by the European Central Bank (the Central Bank for eurozone economies). The European Central Bank yesterday launched its TIBER-EU (Threat Intelligence-Based Ethical Red Teaming for the European Union) framework for financial institutions regulated within the EU.

Zero Trust Technology Works, Excuses Don’t

Forrester IT

I have done a few exercises on implementing Zero Trust and ZTX in enterprises. The impetus for the strategy days was that those organizations had leaders that are Forrester clients and had read, or at least breezed through, the research that has been published on the topic of Zero Trust, and they are bought in […]. security & risk cybersecurity digital strategy digital transformation S&R pros Security & Risk

Victus pro Scientia Opus -- Food for the Knowledge Worker: New Years Resolution

Victus pro Scientia Opus -- Food for the Knowledge

2006 » January 01, 2007 New Years Resolution Normally, I make a resolution that is centered on improving a behavior I dont like about myself: e.g., exercise more, swear less, organize better, throw my curveball for strikes more, etc.

Understanding Collaboration - Disrupt, or be Disrupted

IT Toolbox

This could well be a futile exercise since the scope keeps expanding with everyThere are many scenarios to consider for collaboration, and I’ve been writing about this lately, both for internal use cases among workers, and external use cases to support end customers. A big challenge facing decision-makers is building a fence around collaboration so everyone understands what’s involved.

Choosing the Right CRM for SMB

IT Toolbox

Selecting the right CRM system for a small or medium size business is essentially an exercise in reduction. You need to decide which features are important to you and limit yourself accordingly. The modern CRM landscape is crowded with CRM systems with various prices and capabilities. Winnowing down the field is an important part of choosing the right system.

SMB 122

Using webinar metrics to blast CRM data to the next level

IT Toolbox

Frequently, that vital information is distilled into a simple e-mail-harvesting exercise, with customer details folded into an automated email routine. Webinars are becoming a highly popular component of the digital marketing tool box, but harnessing the rich customer data they yield is still a missed opportunity. Yet, there are more effective outcomes available.

Paxata: Adaptive Data Preparation

CTOvision

The company’s technology dramatically reduces the most painful and manual steps of any analytic exercise, turning raw data into ready data for analytics, and empowering analysts to drive greater value for the business.

Data 243

Simplicity is a strategy that works.

Forrester IT

This last week I was fortunate enough to be invited out to Hollywood to participate in a large exercise for the entertainment industry focusing on cyber security planning and threat management.

Governments and nation states are now officially training for cyberwarfare: An inside look

Tech Republic Security

Europe, Canada, USA, Australia, and others are now running training exercises to prepare for the outbreak of cyberwar. Locked Shields is the largest simulation and we take you inside

Linux security: Cmd provides visibility, control over user activity

Network World

There's a new Linux security tool you should be aware of — Cmd (pronounced "see em dee") dramatically modifies the kind of control that can be exercised over Linux users. It reaches way beyond the traditional configuration of user privileges and takes an active role in monitoring and controlling the commands that users are able to run on Linux systems. Provided by a company of the same name, Cmd focuses on cloud usage.

Linux 66

Recipes don’t always work

Eric D. Brown

I hear people say you have to meditate or get up at 4AM or get 10 hours of sleep or exercise every day.

Do you collaborate more than 25%?

IT Toolbox

I've been wanting to get back into riding my bike as a way to break up my day, get a little exercise andIt's Sunday night and I just finished reviewing the week ahead at work. I have no unread emails, but I also have no unencumbered lunches. Just about every day something is going on that pinches into what should be my lunch hour.

Transform Your Portfolio with 2 Key Product Management Practices

CEB IT

Setting pricing and sales models is not an isolated exercise. Product managers at technology service providers are challenged to update their product portfolios to remain aligned to the needs of a rapidly evolving market. Current and prospective customers too often seek the latest digital technologies that merely hold the promise of improving organizational processes.

Growing in a Down Economy

SPF13

This exercise of fat trimming should be an ongoing exercise, quarterly. Trimming the Fat I am all in favor of trimming the fat. Every company has inefficiencies and employees that aren’t adding value to the company. If a company larger than 200 employees is firing 10% or more of their employees they have a serious management issue. No well run company can operate efficiently with 10%+ of “fat”, and no company can expect to grow while letting go 10%+ of their staff

A Data and Analytics Leader’s Guide to Data Literacy

CEB IT

Make sure to capture lessons learned and then repeat the exercise, ensuring that participants use others’ languages. Imagine an organization where the marketing department speaks French, the product designers speak German, the analytics team speaks Spanish and no one speaks a second language. Even if the organization was designed with digital in mind, communicating business value and why specific technologies matter would be impossible.

Data 138

Some server storage I/O benchmark tools, workload scripts and examples

IT Toolbox

There are various tools and workloads for server I/O benchmark testing, validation and exercising different storage devices (or systems and appliances) such as Non-Volatile Memory (NVM This is part one of a two-part series of posts about using some common server storage I/O benchmark tools and workload scripts. View part II here which includes the workload scripts and where to view sample results.

Corporate IT: 5 Mistakes to Avoid in Your 2017 Strategic Plan

CEB IT

” Too often, the strategic planning exercise is limited to a tightly bounded vacuum known as the leadership offsite. Done well, IT strategic planning does two things.

Building a Three Node Kubernetes Cluster | Quick Guide

Linux Academy

Here are a few fun exercises to get you started. I hope you enjoyed this fun exercise. There are many ways to build a Kubernetes Cluster. One of them is using a tool called kubeadm. Kubeadm is the official tool for “first-paths” when creating your first kubernetes cluster.

Linux 65

Digital Risk of Data Increases When Employees Leave

CTOvision

Ultimately, the company may decide to pursue legal action against the former employee, a costly and unwanted exercise for everyone involved. Crystal Lister.

Step-by-Step: Deploying Windows 8 Apps with System Center 2012.

IT Pros Rock!

After building your lab environment, follow these steps to configure boundaries, boundary groups and the Application Catalog site system roles prior to beginning the exercises below. As part of this process, we’ll organize the steps into the following exercises: Exercise 1: Create Application for an internal Windows 8 app package (.appx Exercise 2: Create Application for a published Windows Store app ( deep link on Windows Store ). Sign in. IT Pros ROCK!

System 159