G7 sets financial sector cyber defence guidelines as attacks grow

Computer Weekly

G7 countries have agreed cyber security guidelines in response to concerns about the safety of interconnected global financial systems that are increasingly coming under attack, according to Symantec

5 Essential Guidelines for Secure Online Shopping

IT Toolbox

The internet has become an integral part of our lives today. It has significantly changed our lifestyle by making it easy to it easy to search and find things online from the comfort of our homes

Trending Sources

Government announces digital apprenticeship service as part of apprenticeship levy guidelines

Computer Weekly

The government has released guidelines for the upcoming apprenticeship levy, including how businesses can access funds to train apprentices

U.S. Department of Defense sets its cloud security guidelines

Cloud Musings

By Jodi Kohut Those watching federal cloud security in the defense space were pleased to learn the Defense DOD Cloud Computing Security Requirements Guide (v1) (SRG) last month.

Dealing with NIST's about-face on password complexity

Network World

NIST's new guidelines for password complexity have reversed many of rules on what defines a good password

Many UK local councils still unprepared for GDPR, ICO survey shows

Computer Weekly

The ICO fines the Norfolk Council as it publishes GDPR guidelines for local councils after a survey revealed not all were up to speed in preparations to comply with the new data protection law

Four Common Password Practices You Might Want To Reconsider


Every few years, the National Institute of Standards and Technology revises its Digital Identity Guidelines, which include password best practices. The revisions are greeted with consternation by some because the guidance can run counter to long-cherished beliefs about what constitutes a good password and a good authentication system. NIST takes into consideration both the theoretical […]. CTO Cyber Security News

Putting Pen to Paper – Four Essential Factors to Calculating TCO on UPS Equipment

Data Center Knowledge

Learn how to make your UPS - with up to a 20-year lifespan - as efficient as cost-effective as possible by following four guidelines. Read More. Industry Perspectives

Why most of what we know about passwords is wrong, and how businesses should respond

Tech Republic Security

Bill Burr, who wrote the guidelines for modern password standards, claims that he gave the wrong advice on how people should go about creating passwords

Government Clouds: What is a FedRAMP?

Data Center Knowledge

Actually, the guidelines can help everyone because the FedRAMP. What is FedRAMP? It''s a secure government cloud that meets specific requirements.

The New Book “100 Digital Rules - Setting Guidelines to Explore the Digital New Normal” Chapter 5 Digital Transformation Rules

Future of CIO

The digital organization should set the guidelines and rules to empower employees at all levels within an organization to unlock creativity, understand and develop their creative capacity to solve problems and exploit opportunities in new and innovative ways.

The New Book Preview "100 Digital Rules: Setting Guidelines To Explore Digital New Normal"

Future of CIO

The purpose of “ 100 Digital Rules: Setting Guidelines to Explore Digital New Normal “ is to establish digital principles and update business policies that can be applied holistically and guide the digital transformation systematically.

The New Book “100 Digital Rules - Setting Guidelines to Explore the Digital New Normal” Conclusion The Multitude of Digital Maturity

Future of CIO

It could mean less restrictive rules or silo setting, but it also means that the guiding digital principles and updated rules become more crucial to be defined as core decision criteria and behavior guidelines.

Email Etiquette

IT Toolbox

My past experience tells me that these are guidelines on how to compose, respond and basically how to use email as a communication tool. What is email etiquette? Another question is should this be taught at some point and time to everyone

Oversight of intelligence agencies’ data sharing has ‘failed’, court hears

Computer Weekly

UK’s intelligence services lack adequate oversight and written guidelines when sharing databases of sensitive information, Privacy International argues in secret court

Vendors approve of NIST password draft

Network World

A recently released draft of the National Institute of Standards and Technology’s (NIST's) digital identity guidelines has met with approval by vendors. The draft guidelines revise password security recommendations and altering many of the standards and best practices security professionals use when forming policies for their companies. NIST said this guideline was suggested because passwords should be changed when a user wants to change it or if there is indication of breach.

Building a More Effective and Successful ERP Team

IT Toolbox

While preparing to assemble your team, keep these five guidelines in mind. Building a more effective and successful enterprise resource planning (ERP) team is more complicated than asking friends co-workers or seeing who’s available. To ensure project success, you must create a healthy, productive structure while assembling a group of people who can work together well. Common

The New Book “100 Digital Rules - Setting Guidelines to Explore the Digital New Normal” Chapter IV Problem-Solving Rules

Future of CIO

We all develop reputations for being problem-creators, problem definers or problem-solvers. Fundamentally, every work is to deal with problems big or small both from long-term perspectives or on the daily basis.

The New Book “100 Digital Rules - Setting Guidelines to Explore the Digital New Normal” Chapter 3 Digital Innovation Rules

Future of CIO

Innovation is the art in the eyes of the artist, innovation is the science in the mind of the scientist; innovation is the bridge between the art and science. Innovation is to transform novel ideas and achieve their business value.

The New Book “100 Digital Rules - Setting Guidelines to Explore the Digital New Normal” Chapter 2 Digital Change Rules

Future of CIO

Change is a digital continuum. Close to reality is that “change” is continuously happening in the environment of a company. Change Management, in fact, is a complex management discipline due to “VUCA” digital new normal.

The New Book “100 Digital Rules - Setting Guidelines to Explore the Digital New Normal” Chapter 1 Digital Thinking Rules

Future of CIO

Mindset is the most valuable thing to shape every progress, but also the root cause of all mankind problems. Digitalization doesn’t mean just tearing down all the old things in the previous era. It means to strike the right balance between the new way and the old way to do things.

Putting Together Your LAN Troubleshooting Toolkit

IT Toolbox

Here are some guidelines After seeing this smorgasbord of equipment available for helping you to test and troubleshoot your network, the next logical question is, "Which tools should I purchase for my network?"

ERP and the Adoption of Lean Production

IT Toolbox

Information technology is rapidly changing the production guidelines mapped out by decades of mass production. With the emergence of ERP, resource management and all assignments related to project management invariably fall under the purview of IT departments. This often creates a chasm between the actual requirements of the shop floor and IT department, resulting in waste of both time and resources.

Open Group Publishes Guidelines on Cloud Computing ROI

Cloud Musings

Open Group Publishes Guidelines on Cloud Computing ROI. Open Group Publishes Guidelines on Cloud Computing. Cloud Musings by Kevin L. Jackson. Personal comments and insight on cloud computing related technologies and their use in the public sector to support net-centric operations. Pages. Cloud Musings on Forbes. NJVC Cloud Computing. GovCloud Daily. GovCloud Presentations. GovCloud on Facebook. Get "Cloud Musings" by RSS. Posts. Posts. Comments. Comments. Thursday, April 29, 2010.

IDG Contributor Network: IoT security principles from Homeland Security

Network World

Department of Homeland Security (DHS) recently published guidelines to “provide a strategic focus on security and enhance the trust framework that underpins the IoT ecosystem.” Power grids were bombed in World War II to cripple industrial output. Today, attacks against Internet of Things (IoT) infrastructure causes even broader disruptions—without bombs. The danger is real. The U.S.

Frame Relay Physical Layer Options and Frame Formats

IT Toolbox

In addition to these guidelines, the UNI IA acknowledges that other interfaces, such as ISDN, may be used as appropriate. For example, MCI currently offers frame relay as a switched digital service at 56/64 Kpbs, and also as a fractional T1 service, Nx56 or Nx64 Kpbs

How to diagnose cloud performance issues

David Linthicum

Here are some quick guidelines for diagnosing the root cause of most performance issues. Is your public cloud-based workload too slow? You don’t know where to look first? I’ve found that many people in IT who can quickly diagnose issues with traditional systems have trouble diagnosing cloud-based system. Because they don’t have a deep understanding of what’s in a public cloud, such as Amazon Web Services or Microsoft Azure, and believe that it’s a black box.

8 steps to regaining control over shadow IT

Network World

These services act as extensions of the corporation but are steered entirely by groups that lack the knowledge or process to ensure they follow necessary guidelines, introducing security, compliance, and brand risk throughout the enterprise.

Be pragmatic, not dogmatic

Eric D. Brown

The most successful project managers out there are those that know when to follow guidelines and when to deviate from said guidelines.

Congress just dismantled FCC rules protecting web browsing history: What it means

Tech Republic Security

Republicans in Congress just voted to strip away guidelines protecting web browsing data for consumers, in a landmark victory for ISPs including AT&T, Verizon, and Comcast

Fed Tech Roundup August 3


DISA updates draft cloud security guidelines - GCN.com. Help Us Add Resources to the Updated Mobile User Experience Guidelines! The following are some of the hot topics in the federal technology ecosystem (from FedTechTicker.com and TopTechTicker.com ): Fed Tech Ticker. The Technical Limitations of Lloyd’s Cyber Report on the Insurance Implications of Cyberattack on the US Grid. Banks And Insurance Companies Aware Of Cyber Risks: Opportunities Remain To Become More Resilient.

30 ways to improve IoT privacy

Network World

A demonstration of this new aspect of privacy and compliance is the Privacy Guidelines for Internet of Things: Cheat Sheet, Technical Report (pdf) by Charith Perera, researcher at the Newcastle University in the U.K. Much work still must be done before the industrial and municipal Internet of Things (IoT) becomes widely adopted outside of the circle of innovators.

Corporate IT: How to Get the Most From an IT Roadmap


Following three simple guidelines can improve communication across IT. For over 50 years the advertising industry has proved that images are a far more effective way to get a message across that using words alone.