Most popular articles of current edition:
|
- What Defines A High-Performing IT Team? 5 CIOs Speak Out
- 2022 IT Trends And Statistics
- One Of The Best Things You Can Do As A CIO
- What Leaders Overlook After An ERP Overhaul
- 4 Stories All CIOs Should Be Able To Tell
- Digital Transformation: 5 Steps To Boost Your Progress
- How Should CIOs Respond To Inflation?
- Why Choose NAS Over Tape For Your Data?
- Protecting Organizations From 5G Threats
- 10 Major Database Security Threats And How To Prevent Them
- Mozilla Thunderbird 102 Released With New Address Book, Import/Export Wizard
- The 8 Best Data Mining Tools And Software To Consider For 2022
- What's New In HPC Research: Exa2Pro, Dqra, And HiCMA-PaRSE Frameworks & More
- 6 Ways Cloud Networking Teams Can Up Their Game
- DevOps, Present And Future
- Top Storage Virtualization Providers
- Top 5 Myths Of Cyber Security Debunked
- Your Company Executives Could Still Be The Weakest Cybersecurity Link
- What You Need To Know About PCI 4.0: Requirements 10, 11 And 12
- 9 Bash Script Examples to Get You Started on Linux
- It's A Race To Secure The Software Supply Chain - Have You Already Stumbled?
- Top Six Security Bad Habits, And How To Break Them
- Top PHP Hardening Security Tips For Linux Servers
- NVMe: Driving Changes In Traditional Media & Entertainment (M&E) Storage Hierarchy
- Zero Trust: What Does It Actually Mean - And Why Would You Want It?
- Top ERP System Examples
- The Dark Side Of Digital Transformation: Massive Fraud
- Shifting The Cybersecurity Paradigm From Severity-Focused To Risk-Centric
- 3 Ways CIOs Should Approach IT Team Accountability
- Why Understanding The IT And Business Operating Model Is Critical For Change
Most Popular Articles in Vol 291 Issue 5, Grouped into Sections
Leading CIOs discuss what sets top teams apart - and how to foster these qualities on your own team
In today's ever-changing digital world, at a certain point, many organizations find that they have an overabundance of tools and software that each department has purchased over time.
Stay in Business or Go Bankrupt: Where is Your Data Security Strategy Leading You?
Leaders must make sure end users - employees and customers - are on board with modernization.
. and one common element that all stories must have.
Has your digital transformation initiative slowed - or stalled? Consider this expert advice to get things moving again
As consumers and businesses worldwide continue to feel the impact of inflation, it is emerging as a top concern among senior executive leaders.
C-Suite often ask to bypass security measures
Holding others accountable is an essential aspect of leadership, but it isn't always easy. Consider these tips to keep teams - and projects - on track
How often do you hear about operational readiness and business readiness in the programmes that are running in your business? Are these aspects at the heart of the most successful change programs? I wonder?
Do corporate boards of directors see the CIO as a trusted advisor? More often than not, the answer is no.
Myths of Cyber Security : We work online. We live online. As our fast-paced lives get exponentially dependent on digital services, the urgency to protect our information from being misused is crucial.
As we continue our review of the 12 Requirements of PCI DSS version 4.0, one has to stop and consider, is it possible to have a favorite section of a standard?
If you haven't properly addressed the issue, you're already behind. But even if you've had a false start, it's never too late to get back up.
Shrav Mehta, CEO, Secureframe, outlines the top six bad habits security teams need to break to prevent costly breaches, ransomware attacks and prevent phishing-based endpoint attacks.
'Narrow and specific access rights after authentication' wasn't catchy enough
A holistic approach to combatting the growing problem of fraud requires an analytics strategy that draws data from multiple internal and external sources.
Embrace cyber-risk modeling and ask security teams to pinpoint the risks that matter and prioritize remediation efforts.
How modern cybercrime syndicates adopt the ways of enterprise business, reaping the gains and suffering the difficulties.
Between cyber-criminal groups, Lazarus (North Korea), Conti (Russia), and Mustang Panda (China), almost every business in every sector is on the radar of hackers.
Employees in every enterprise regularly receive emails with content and attachments from within and outside the organization, involving multiple business units, vendors, partners, and other third parties.
A security audit is a systematic evaluation of the security of a company's information system by measuring how well it conforms to an established set of criteria.
Most of us picture cloud security threats as bad actors in some hostile country. More often, it's you and your coworkers
Even if this comparison is made by a vendor of NAS, it's interesting to read it as the analysis is excellent on tape and can be apply to any NAS. Editor.
Storage virtualization streamlines storage administrators' management of all storage solutions within an enterprise infrastructure, allowing them to more efficiently tier data for applications
Becoming essential element for many post-production, animation and VFX workflows
Many cloud networking teams believe that achieving excellence will be too costly and too difficult. But that's not actually the case.
The rapid evolution of cloud services is forcing IT organizations to scramble to attract the right skills and fight fires reactively rather than taking time to devise a proper cloud-first strategy.
The implementation of 5G continues to grow quickly. The two main factors contributing to the swift adoption of the technology are the constant construction of 5G infrastructure and the growing use of smartphones around the world and particularly in developing economies.
With summer break upon us, it's just about time to punch your ticket and take a vacation. But before you do - or even after you return - be sure you take the time to revisit cloud data security.
From a renewed focus on employee retention to the importance of certifications, here are nine important trends to know when it comes to filling IT roles this year
C-level execs argue a fine game about caring about their employees - but those platitudes somehow never make it into the HR meetings about bonus benchmarks.
Storage admins looking to gain new skills or make better use of their vendor-supplied storage systems can look to certification and qualification courses.
It's always a relief when I get a job offer, but that's also when I think I'm most vulnerable to accepting a job that maybe I should not. Face it, after 7, 8 or 9 interviews (common today), you just want to get it over with and start the job!
Enterprise resource planning (ERP) consists of tools intended to facilitate the management of all information that impacts a company's business decisions
In the current business landscape, traditional enterprises are looking for agile technologies to accelerate growth and digital transformation.
Determining the length of an ERP implementation can be difficult but doing so is a crucial part of planning. Learn how to avoid an unrealistic timeline.
The term 'enterprise resource planning' was coined in 1990 by Gartner.
The safety and compliance firm J. J. Keller & Associates is working with Hewlett Packard Enterprise (HPE) to power its cloud transformation.
With the accelerating evolution of technology, artificial intelligence (AI) is playing a growing role in decision-making processes.
The demand for consistent, reliable insights in-house has brought about a new role - the machine learning operations (MLOps) analyst.
See how these novel, sophisticated, or creative threats used techniques such as living off the land to evade detection from traditional defensive measures - but were busted by AI.
If you're starting out with Bash scripting on Linux, getting a solid grasp of the basics will stand you in good stead. They're the foundation of deeper knowledge and higher scripting skills.
It's no brainier that PHP is one of the most used server scripting programming languages. It makes sense for an attacker to find various ways by which he can manipulate PHP as it is often paired with MySQL and enable access to the private data of your users.
SSH is a globally-used protocol used to access remote servers. Here's how you can strengthen your SSH connections on Linux for maximum security.
The Mozilla Thunderbird open-source, cross-platform, and free email and calendaring client has been updated today to version 102, a major release that adds many new features and enhancements.
Mozilla Thunderbird is having a resurgence right now, armed with an expanded team of developers and a plan to take over the email world (including Android).
Solutions Review's listing of the best data mining tools and software is an annual mashup of products that best represent current market conditions, according to the crowd
A solid data management strategy can reap rewards for any business seeking to capitalize on the value of data. Still, the road to data-driven decision-making remains rife with challenges and conundrums.
The industry is buzzing about 5G technology and its potential. For example, almost every new smartphone is advertised as '5G compatible,' with the majority of mobile subscriptions switching to 5G over the next five years. With its promise of improved speed, reliability and connectivity, 5G offers a wealth of benefits.
Data is a crucial asset of your company. Companies gather a lot of data daily from their customers and daily operations.
IoT has already positively impacted the financial sector and will only continue to in the future
The Internet of Things (IoT) a broad term that describes a wide range of devices that can connect and process data via an Internet connection.
In this regular feature, HPCwire highlights newly published research in the high-performance computing community and related domains. From parallel programming to exascale to quantum computing
The verdict is in: DevOps isn't just a trendy term or shiny new thing. It's real, and it delivers real results.
A new report from security researcher and TLS expert Scott Helme, evaluates the use of encryption across the world's top one million sites over the last six months and reveals the need for a control plane to automate the management of machine identities in increasingly complex cloud environments.
Does the 'battle for talent' have to be a forever war?
Bitcoin has conveyed an important message to the world since its inception. It is the message of liberation from corrupt governments and financial intermediaries
Shifting Right Towards Resilience, Quality, and Security with Synopsys & BSIMM
Data science, machine learning, and artificial intelligence have the potential to transform healthcare in profound ways. |
|
|
|