Security Think Tank: Patching is vital and essentially a risk management exercise

Computer Weekly

How should organisations address the need to keep software up to date with security patches without it costing too much or being too labour intensive

A “Powerful” Board: How to Exercise “Supervisory” Power Effectively

Future of CIO

A “powerful” board can exercise supervisory power and co-determine of which powers are retained by the governing body and which are delegated to management, along with constraints that may apply. The “sovereign” power: Generally, the shareholders of the company exercise this third power.

Security Think Tank: How to maximise the value or red team exercises

Computer Weekly

How can organisations use red teaming to identify security gaps

Security Think Tank: How to get the best out of red team exercises

Computer Weekly

How can organisations use red teaming to identify security gaps

British navy sends robots to sea in military exercise

Network World

The Royal Navy is testing just how much robot craft can do by themselves in military exercises off the British coast. Operation Unmanned Warrior 16 is a chance for allied nations and the defense industry to show off their latest maritime autonomous systems, as part of a broader military exercise called Joint Warrior.

Is A “Walk And Talk” The Best Way To Connect With Your Direct Reports?

The Accidental Successful CIO

Communication daily step counts exercise meetings mental moderate-intensity aerobic activity more active obesity physical set route type 2 diabetes walk and talkThe best kind of meetings are the ones that leave you breathless Image Credit: Pero Kvrzica.

Flawed GoDaddy security certificates show need for control

Computer Weekly

Vulnerabilities in digital security certificates highlight the need for organisations to be able to exercise more control over those certificates

AWS Outage that Broke the Internet Caused by Mistyped Command

Data Center Knowledge

Amazon says Tuesday’s mayhem resulted from mistake during a routine debugging exercise. Read More. Amazon Cloud Computing Downtime

Europol hosts simulated cyber attack on retail sector

Computer Weekly

Europol and MasterCard hold a retail cyber attack simulation exercise to raise awareness of the issue and how to respond to attacks, as well as promote information sharing in the sector

Retail 189

EU-backed fund to encourage data-sharing between startups and enterprises launches

Computer Weekly

Three-year project seeks to encourage enterprises to embark on information-sharing exercises with startups and SMEs to bolster data-led innovation

“Right-Sizing” The Data Center: A Fool’s Errand?

Data Center Knowledge

For many, the quest to right-size turns into an exercise akin to a dog chasing its tail. So, we constantly ask ourselves the question: Is right-sizing a fool’s errand? Read More. Data Center Design Featured Resources

Twitter adds USB key verification, Florida names first Crypto Officer, Comcast’s data breach, WPA3 is finally here and why rebranding cybersecurity is necessary

CTOvision

Twitter said that the above exercise was a part of a two-factor authentication process and will protect Twitter accounts from being hacked. [.]. Twitter adds support for login verification with a USB key Twitter has taken a step towards providing better security by adding support for login verification through physical USB security keys, such as YubiKey.

TIBER-EU Framework Offers An Opportunity To Improve FinServ Cyber Resilience

Forrester IT

In short, there is a new voluntary framework for threat intelligence-led red-teaming exercises that has been published by the European Central Bank (the Central Bank for eurozone economies). The European Central Bank yesterday launched its TIBER-EU (Threat Intelligence-Based Ethical Red Teaming for the European Union) framework for financial institutions regulated within the EU.

Zero Trust Technology Works, Excuses Don’t

Forrester IT

I have done a few exercises on implementing Zero Trust and ZTX in enterprises. The impetus for the strategy days was that those organizations had leaders that are Forrester clients and had read, or at least breezed through, the research that has been published on the topic of Zero Trust, and they are bought in […]. security & risk cybersecurity digital strategy digital transformation S&R pros Security & Risk

Choosing the Right CRM for SMB

IT Toolbox

Selecting the right CRM system for a small or medium size business is essentially an exercise in reduction. You need to decide which features are important to you and limit yourself accordingly. The modern CRM landscape is crowded with CRM systems with various prices and capabilities. Winnowing down the field is an important part of choosing the right system.

SMB 122

Understanding Collaboration - Disrupt, or be Disrupted

IT Toolbox

This could well be a futile exercise since the scope keeps expanding with everyThere are many scenarios to consider for collaboration, and I’ve been writing about this lately, both for internal use cases among workers, and external use cases to support end customers. A big challenge facing decision-makers is building a fence around collaboration so everyone understands what’s involved.

Victus pro Scientia Opus -- Food for the Knowledge Worker: New Years Resolution

Victus pro Scientia Opus -- Food for the Knowledge

2006 » January 01, 2007 New Years Resolution Normally, I make a resolution that is centered on improving a behavior I dont like about myself: e.g., exercise more, swear less, organize better, throw my curveball for strikes more, etc.

Using webinar metrics to blast CRM data to the next level

IT Toolbox

Frequently, that vital information is distilled into a simple e-mail-harvesting exercise, with customer details folded into an automated email routine. Webinars are becoming a highly popular component of the digital marketing tool box, but harnessing the rich customer data they yield is still a missed opportunity. Yet, there are more effective outcomes available.

Paxata: Adaptive Data Preparation

CTOvision

The company’s technology dramatically reduces the most painful and manual steps of any analytic exercise, turning raw data into ready data for analytics, and empowering analysts to drive greater value for the business.

Data 247

Simplicity is a strategy that works.

Forrester IT

This last week I was fortunate enough to be invited out to Hollywood to participate in a large exercise for the entertainment industry focusing on cyber security planning and threat management.

Governments and nation states are now officially training for cyberwarfare: An inside look

Tech Republic Security

Europe, Canada, USA, Australia, and others are now running training exercises to prepare for the outbreak of cyberwar. Locked Shields is the largest simulation and we take you inside

Do you collaborate more than 25%?

IT Toolbox

I've been wanting to get back into riding my bike as a way to break up my day, get a little exercise andIt's Sunday night and I just finished reviewing the week ahead at work. I have no unread emails, but I also have no unencumbered lunches. Just about every day something is going on that pinches into what should be my lunch hour.

Corporate IT: 5 Mistakes to Avoid in Your 2017 Strategic Plan

CEB IT

” Too often, the strategic planning exercise is limited to a tightly bounded vacuum known as the leadership offsite. Done well, IT strategic planning does two things.

IT Enterprise Architecture: How to Become a Digital Strategy Consultant to the Business

CEB IT

EA’s goal in this exercise is to document a wide range of possibilities, rather than trying to pick which assumptions are most likely to occur (see chart 1). In this exercise, EA specifically avoids grouping the most popular assumptions into a single scenario.

Some server storage I/O benchmark tools, workload scripts and examples

IT Toolbox

There are various tools and workloads for server I/O benchmark testing, validation and exercising different storage devices (or systems and appliances) such as Non-Volatile Memory (NVM This is part one of a two-part series of posts about using some common server storage I/O benchmark tools and workload scripts. View part II here which includes the workload scripts and where to view sample results.

Digital Risk of Data Increases When Employees Leave

CTOvision

Ultimately, the company may decide to pursue legal action against the former employee, a costly and unwanted exercise for everyone involved. Crystal Lister.

Step-by-Step: Deploying Windows 8 Apps with System Center 2012.

IT Pros Rock!

After building your lab environment, follow these steps to configure boundaries, boundary groups and the Application Catalog site system roles prior to beginning the exercises below. As part of this process, we’ll organize the steps into the following exercises: Exercise 1: Create Application for an internal Windows 8 app package (.appx Exercise 2: Create Application for a published Windows Store app ( deep link on Windows Store ). Sign in. IT Pros ROCK!

System 159

Corporate IT: Why Your IT Scorecard Isn’t Impressing People

CEB IT

This refocusing exercise doesn’t mean that IT teams need to spend time and money identifying and tracking new metrics, but rather creating composite metrics that measure outcomes, instead of inputs.

Top Local Apps - Get a Great Workout Anywhere with Bodeefit!

IT Pros Rock!

Bodeefit – Step-by-Step Workouts with Prescriptive Exercises and Videos. It seems like I’m always traveling in my current role, and getting to the gym for a real workout is always a challenge.

Hotels 139

Growing in a Down Economy

SPF13

This exercise of fat trimming should be an ongoing exercise, quarterly. Trimming the Fat I am all in favor of trimming the fat. Every company has inefficiencies and employees that aren’t adding value to the company. If a company larger than 200 employees is firing 10% or more of their employees they have a serious management issue. No well run company can operate efficiently with 10%+ of “fat”, and no company can expect to grow while letting go 10%+ of their staff

Back-to-Basics Weekend Reading - Experience with Grapevine: The Growth of a Distributed System

All Things Distributed

It was built at the famous Xerox PARC (Palo Alto Research Center) Computer Science Laboratory as an exercise in discovering what is needed as the fundamental building blocks of a distributed system; messaging, naming, discovery, location, routing, authentication, encryption, replication, etc.

FCC Releases New Net Neutrality Rules

CTOvision

Congress could not have imagined… nearly 4 million Americans would exercise their right to comment on proposed rulemaking.” By Shannon Perry. Net neutrality became a buzzword in 2014, as many media sources and public figures voiced their opposition to the FCC’s “fast lanes.”

.Net 236

Hortonworks DataFlow 1.2 Released

CTOvision

Microsoft Band Screen: On or Off During Exercise? Katie Kennedy. Last month, Hortonworks announced their release of their Hortonworks DataFlow 1.2 , a data-source agnostic, real time data collection and dataflow management platform that makes data movement fast, easy and secure. HDF 1.2

National Cybersecurity = Cloud Computing Security

Cloud Musings

This self-paced training exercise provides an introduction to securing your information. A recent article Inc.com article claimed that the percentage of U.S.

Creating a consistent online voice and identity

Trends in the Living Networks

The workshop starts with a big picture view and then runs through detailed guidance on establishing a presence, building engagement, and driving success, interspersed with group exercises to set objectives, think through stratgies, and set action plans. One of the exercises I take the participants through in the workshops is thinking through their online voice and identity. This simple exercise can help people and companies to create a consistent online voice and identity.