BWGConnect: Work Smarter, Not Harder: Overcoming Cloud Security (July 12th)
Most popular articles of current edition:
  1. What Defines A High-Performing IT Team? 5 CIOs Speak Out
  2. 2022 IT Trends And Statistics
  3. One Of The Best Things You Can Do As A CIO
  4. What Leaders Overlook After An ERP Overhaul
  5. 4 Stories All CIOs Should Be Able To Tell
  6. Digital Transformation: 5 Steps To Boost Your Progress
  7. How Should CIOs Respond To Inflation?
  8. Why Choose NAS Over Tape For Your Data?
  9. Protecting Organizations From 5G Threats
  10. 10 Major Database Security Threats And How To Prevent Them
  11. Mozilla Thunderbird 102 Released With New Address Book, Import/Export Wizard
  12. The 8 Best Data Mining Tools And Software To Consider For 2022
  13. What's New In HPC Research: Exa2Pro, Dqra, And HiCMA-PaRSE Frameworks & More
  14. 6 Ways Cloud Networking Teams Can Up Their Game
  15. DevOps, Present And Future
  16. Top Storage Virtualization Providers
  17. Top 5 Myths Of Cyber Security Debunked
  18. Your Company Executives Could Still Be The Weakest Cybersecurity Link
  19. What You Need To Know About PCI 4.0: Requirements 10, 11 And 12
  20. 9 Bash Script Examples to Get You Started on Linux
  21. It's A Race To Secure The Software Supply Chain - Have You Already Stumbled?
  22. Top Six Security Bad Habits, And How To Break Them
  23. Top PHP Hardening Security Tips For Linux Servers
  24. NVMe: Driving Changes In Traditional Media & Entertainment (M&E) Storage Hierarchy
  25. Zero Trust: What Does It Actually Mean - And Why Would You Want It?
  26. Top ERP System Examples
  27. The Dark Side Of Digital Transformation: Massive Fraud
  28. Shifting The Cybersecurity Paradigm From Severity-Focused To Risk-Centric
  29. 3 Ways CIOs Should Approach IT Team Accountability
  30. Why Understanding The IT And Business Operating Model Is Critical For Change

Most Popular Articles in Vol 291 Issue 5, Grouped into Sections


CxO


What Defines A High-Performing IT Team? 5 CIOs Speak Out #1

Leading CIOs discuss what sets top teams apart - and how to foster these qualities on your own team

2022 IT Trends And Statistics #2

In today's ever-changing digital world, at a certain point, many organizations find that they have an overabundance of tools and software that each department has purchased over time.

One Of The Best Things You Can Do As A CIO #3

Stay in Business or Go Bankrupt: Where is Your Data Security Strategy Leading You?

What Leaders Overlook After An ERP Overhaul #4

Leaders must make sure end users - employees and customers - are on board with modernization.

4 Stories All CIOs Should Be Able To Tell #5

. and one common element that all stories must have.

Digital Transformation: 5 Steps To Boost Your Progress #6

Has your digital transformation initiative slowed - or stalled? Consider this expert advice to get things moving again

How Should CIOs Respond To Inflation? #7

As consumers and businesses worldwide continue to feel the impact of inflation, it is emerging as a top concern among senior executive leaders.

Your Company Executives Could Still Be The Weakest Cybersecurity Link #18

C-Suite often ask to bypass security measures

3 Ways CIOs Should Approach IT Team Accountability #29

Holding others accountable is an essential aspect of leadership, but it isn't always easy. Consider these tips to keep teams - and projects - on track

Why Understanding The IT And Business Operating Model Is Critical For Change #30

How often do you hear about operational readiness and business readiness in the programmes that are running in your business? Are these aspects at the heart of the most successful change programs? I wonder?

How Tech Leaders Can Earn C-Suite Trust

Do corporate boards of directors see the CIO as a trusted advisor? More often than not, the answer is no.

Security


Top 5 Myths Of Cyber Security Debunked #17

Myths of Cyber Security : We work online. We live online. As our fast-paced lives get exponentially dependent on digital services, the urgency to protect our information from being misused is crucial.

What You Need To Know About PCI 4.0: Requirements 10, 11 And 12 #19

As we continue our review of the 12 Requirements of PCI DSS version 4.0, one has to stop and consider, is it possible to have a favorite section of a standard?

It's A Race To Secure The Software Supply Chain - Have You Already Stumbled? #21

If you haven't properly addressed the issue, you're already behind. But even if you've had a false start, it's never too late to get back up.

Top Six Security Bad Habits, And How To Break Them #22

Shrav Mehta, CEO, Secureframe, outlines the top six bad habits security teams need to break to prevent costly breaches, ransomware attacks and prevent phishing-based endpoint attacks.

Zero Trust: What Does It Actually Mean - And Why Would You Want It? #25

'Narrow and specific access rights after authentication' wasn't catchy enough

The Dark Side Of Digital Transformation: Massive Fraud #27

A holistic approach to combatting the growing problem of fraud requires an analytics strategy that draws data from multiple internal and external sources.

Shifting The Cybersecurity Paradigm From Severity-Focused To Risk-Centric #28

Embrace cyber-risk modeling and ask security teams to pinpoint the risks that matter and prioritize remediation efforts.

The Strange Business Of Cybercrime

How modern cybercrime syndicates adopt the ways of enterprise business, reaping the gains and suffering the difficulties.

How Much Can Delaying A Cyber Threat Assessment Cost Your Business?

Between cyber-criminal groups, Lazarus (North Korea), Conti (Russia), and Mustang Panda (China), almost every business in every sector is on the radar of hackers.

Microsoft 365 Security: How CDR Integration Boosts Email Security

Employees in every enterprise regularly receive emails with content and attachments from within and outside the organization, involving multiple business units, vendors, partners, and other third parties.

Security Audit

A security audit is a systematic evaluation of the security of a company's information system by measuring how well it conforms to an established set of criteria.

Cloud Security Risks Remain Very Human

Most of us picture cloud security threats as bad actors in some hostile country. More often, it's you and your coworkers

Storage


Why Choose NAS Over Tape For Your Data? #8

Even if this comparison is made by a vendor of NAS, it's interesting to read it as the analysis is excellent on tape and can be apply to any NAS. Editor.

Top Storage Virtualization Providers #16

Storage virtualization streamlines storage administrators' management of all storage solutions within an enterprise infrastructure, allowing them to more efficiently tier data for applications

NVMe: Driving Changes In Traditional Media & Entertainment (M&E) Storage Hierarchy #24

Becoming essential element for many post-production, animation and VFX workflows

Cloud


6 Ways Cloud Networking Teams Can Up Their Game #14

Many cloud networking teams believe that achieving excellence will be too costly and too difficult. But that's not actually the case.

How Cloud Is Disrupting IT Operation

The rapid evolution of cloud services is forcing IT organizations to scramble to attract the right skills and fight fires reactively rather than taking time to devise a proper cloud-first strategy.

Innovations In 5G Technology Create New Possibilities For Cloud Computing

The implementation of 5G continues to grow quickly. The two main factors contributing to the swift adoption of the technology are the constant construction of 5G infrastructure and the growing use of smartphones around the world and particularly in developing economies.

Cloud Security Best Practices: A Summer School District To-Do List

With summer break upon us, it's just about time to punch your ticket and take a vacation. But before you do - or even after you return - be sure you take the time to revisit cloud data security.

Careers


9 Hiring Trends For The Most In-Demand IT Jobs Of 2022

From a renewed focus on employee retention to the importance of certifications, here are nine important trends to know when it comes to filling IT roles this year

Worried About Burnout? Few Enterprises Are Set Up To Fight The Real Causes

C-level execs argue a fine game about caring about their employees - but those platitudes somehow never make it into the HR meetings about bonus benchmarks.

Storage Certifications To Bolster Your Skills

Storage admins looking to gain new skills or make better use of their vendor-supplied storage systems can look to certification and qualification courses.

Do This Before Accepting A Job Offer!

It's always a relief when I get a job offer, but that's also when I think I'm most vulnerable to accepting a job that maybe I should not. Face it, after 7, 8 or 9 interviews (common today), you just want to get it over with and start the job!

ERP


Top ERP System Examples #26

Enterprise resource planning (ERP) consists of tools intended to facilitate the management of all information that impacts a company's business decisions

Maximizing ERP Systems With AI And Wide Data

In the current business landscape, traditional enterprises are looking for agile technologies to accelerate growth and digital transformation.

How To Avoid Unrealistic ERP Implementation Timelines: 9 Tips

Determining the length of an ERP implementation can be difficult but doing so is a crucial part of planning. Learn how to avoid an unrealistic timeline.

Best ERP Software: Top 10 To Manage Day-To-Day Operations For 2022

The term 'enterprise resource planning' was coined in 1990 by Gartner.

AI


5 Top Deep Learning Trends In 2022

The safety and compliance firm J. J. Keller & Associates is working with Hewlett Packard Enterprise (HPE) to power its cloud transformation.

AI Ethical Decision Making: Is Society Ready

With the accelerating evolution of technology, artificial intelligence (AI) is playing a growing role in decision-making processes.

MLOps: The New Role In Data Science

The demand for consistent, reliable insights in-house has brought about a new role - the machine learning operations (MLOps) analyst.

5 Surprising Cyberattacks AI Stopped This Year

See how these novel, sophisticated, or creative threats used techniques such as living off the land to evade detection from traditional defensive measures - but were busted by AI.

Linux


9 Bash Script Examples to Get You Started on Linux #20

If you're starting out with Bash scripting on Linux, getting a solid grasp of the basics will stand you in good stead. They're the foundation of deeper knowledge and higher scripting skills.

Top PHP Hardening Security Tips For Linux Servers #23

It's no brainier that PHP is one of the most used server scripting programming languages. It makes sense for an attacker to find various ways by which he can manipulate PHP as it is often paired with MySQL and enable access to the private data of your users.

8 Ways to Secure SSH Server Connections on Linux

SSH is a globally-used protocol used to access remote servers. Here's how you can strengthen your SSH connections on Linux for maximum security.

Email


Mozilla Thunderbird 102 Released With New Address Book, Import/Export Wizard #11

The Mozilla Thunderbird open-source, cross-platform, and free email and calendaring client has been updated today to version 102, a major release that adds many new features and enhancements.

What's New In Mozilla Thunderbird 102

Mozilla Thunderbird is having a resurgence right now, armed with an expanded team of developers and a plan to take over the email world (including Android).

Big Data


The 8 Best Data Mining Tools And Software To Consider For 2022 #12

Solutions Review's listing of the best data mining tools and software is an annual mashup of products that best represent current market conditions, according to the crowd

11 Dark Secrets Of Data Management

A solid data management strategy can reap rewards for any business seeking to capitalize on the value of data. Still, the road to data-driven decision-making remains rife with challenges and conundrums.

Networks


Protecting Organizations From 5G Threats #9

The industry is buzzing about 5G technology and its potential. For example, almost every new smartphone is advertised as '5G compatible,' with the majority of mobile subscriptions switching to 5G over the next five years. With its promise of improved speed, reliability and connectivity, 5G offers a wealth of benefits.

Database


10 Major Database Security Threats And How To Prevent Them #10

Data is a crucial asset of your company. Companies gather a lot of data daily from their customers and daily operations.

IoT


IoT And Machine Identity Management In Financial Services

IoT has already positively impacted the financial sector and will only continue to in the future

IoT Use Cases in 2022

The Internet of Things (IoT) a broad term that describes a wide range of devices that can connect and process data via an Internet connection.

HPC


What's New In HPC Research: Exa2Pro, Dqra, And HiCMA-PaRSE Frameworks & More #13

In this regular feature, HPCwire highlights newly published research in the high-performance computing community and related domains. From parallel programming to exascale to quantum computing

DevOps


DevOps, Present And Future #15

The verdict is in: DevOps isn't just a trendy term or shiny new thing. It's real, and it delivers real results.

Encryption


Evaluating The Use Of Encryption Across The World's Top One Million Sites

A new report from security researcher and TLS expert Scott Helme, evaluates the use of encryption across the world's top one million sites over the last six months and reveals the need for a control plane to automate the management of machine identities in increasingly complex cloud environments.

HR


4 New IT Workforce Realities

Does the 'battle for talent' have to be a forever war?

Blockchain


No Matter The Price, The Message Of Bitcoin Has Already Won

Bitcoin has conveyed an important message to the world since its inception. It is the message of liberation from corrupt governments and financial intermediaries

Developer


Over A Decade In Software Security: What Have We Learned?

Shifting Right Towards Resilience, Quality, and Security with Synopsys & BSIMM

CxO Podcasts


How Will Data Science And Ai Transform Healthcare?

Data science, machine learning, and artificial intelligence have the potential to transform healthcare in profound ways.