CxO, Security, CxO Podcasts, AI, ERP, Linux, Email, Datacore, Dell, Red Hat (292.1.3)
John J. McLaughlin
Editor-In-Chief, Board Member, Professional Services Engineer, Community leader
Each week, IT News And Events (ITNE) selects articles from mainstream IT publications, press releases and blogs from major IT vendors, and webinar announcements of interest to senior IT professionals, all to be published in the websites and newsletters of “IT News and Events” for our 45,000+ email subscribers and 5,200+ LinkedIn Newsletter subscribers
From career advice to artificial intelligence and everything in between, these HBR articles cover the critical topics IT leaders care about most
Each month, through our partnership with Harvard Business Review, we refresh our resource library with five new HBR articles we believe CIOs and IT leaders will value highly. Check out the curated pieces below, available to readers through the end of the month.
Read on for details. ...?more
The pandemic has motivated IT leaders to rethink their approach to business continuity to ensure organizational resilience in the face of any future business existential event
If there's one thing the pandemic has taught IT leaders, it's that their business continuity plans were not as hardened as they thought...?more
From digital transformation to the future of work, these are the hot topics CIOs should brush up on
As many of us dip our toes back in the water of travel and in-person events this year, those hours at the airport could be a great time to brush up on some reading. Or maybe you have an actual vacation planned and need a beach read. If you're a CIO or IT leader looking to spruce up your leadership skills, we've rounded up seven books that should be on your radar this summer ...?more
Given that data breaches cost USD 4.24 million on average, website security threats cannot be taken lightly.
Besides the obvious financial losses from customer attrition, downtime, and work disruptions, website security attacks cause loss of trust among customers, being blocked on search engines, gaining a negative image that the organization is lax about security, etc.
The number, volume, size, sophistication, and impact of website security threats are fast increasing, making their prevention imperative.
This article delves into 5 of the most common threats today and ways to prevent them. ...?more
The new PCI DSS Standard, version 4.0, contains all the steps, best practices, and explanations required for full compliance.
In fact, even an organization that does not process cardholder data could follow the PCI Standard to implement a robust cybersecurity program for any of its important data.
In our series about how the new standard differs from the previous version, we examined some of the most important changes, including some nuanced differences, such as the subtle linguistic modifications that have a broad impact. As the concluding part of the series, we continue to look at the wider meanings of the new standard. ...?more
These seven types of data security technologies -- from encryption to masking -- will better protect customer and enterprise data from inappropriate and unauthorized access and use.
The most important aspect of any company's cybersecurity strategy revolves around how to keep enterprise data protected and how to prevent data loss. This includes data at rest, in transit and in use...?more
Much is made of the multitude of outside security risks and vulnerabilities faced by enterprises, and rightly so.
That said, though, many organizations may be overlooking their potentially most harmful threat: their employees and other trusted insiders ...?more
领英推荐
Mitch Ashley: Ryan, welcome to another episode of CISO Talk. My name is Mitch Ashley. I'm CTO with Techstrong Group and also, principal with Techstrong Research
So, let's get to our topic today. I think it's a great time to be talking about it 'cause we're all living it in so many ways. The topic is - how the changing nature or changing role of the CISO - I mean, a lot of jobs have changed in recent history, but I can't think of any that's changing more than a CISO's job. Well, let me first introduce our esteemed panel of guests - repeat guests. Glad to have you both bac. ...?more
Let's put this dumpster fire out, shall we?
There are two realities when it comes to artificial intelligence. In one, the future's so bright you need to put on welding goggles just to glance at it. AI is a backbone technology that's just as necessary for global human operations as electricity and the internet. But in the other reality, winter is coming ...?more
In this post-pandemic world, large enterprises are looking to streamline and improve business processes within a storm of marketplace constraints.
Companies in asset-heavy industries such as oil and gas, energy, retail, or distribution and logistics have especially been working to reconfigure their supply chain processes to better manage inventory and operations. The focus in the market has shifted from supply chain optimization to supply chain resiliency, creating efficiencies that will help them best survive current delays and rising costs. ...?more
Oracle announced the general availability of its enterprise OS, Oracle Linux 9, for x86_64 and aarch64 architectures.
Oracle Linux is a high-performance and secure operating system for application development and deployment. It is the second one of the 'big three' RHEL-based forks (AlmaLinux, Rocky Linux, and Oracle Linux) that is releasing a stable version of the recently released Red Hat Enterprise Linux 9 ...?more
Microsoft continues to supplement its Windows and cloud platforms with more of its own 'borrowed' Linux roots.
The developing symbiotic 'WindLux' integration could spawn an open-source hybrid of Windows on Linux. Might this be a new pathway for the growing popularity of cross-platform applications and cloud-based computing? ...?more
This detailed Docker tutorial covers the essential Docker commands, such as how to create a new container, run the container, remove a container and so on.
In addition, this guide also explains how to build your own custom Docker image from an existing container and how to remove containers and images. Without further ado, let us get started with Docker basics usage! ...?more
The novel threat steals data and can affect all processes running on the OS, stealing information from different commands and utilities and then storing it on the affected machine.
A sneaky malware for Linux is backdooring devices to steal data and can affect all the processes running on a particular machine, researchers have found ...?more
You may have received a message like this or know someone who has.
'URGENT - Are you available? I need you to take care of a pending invoice from one of our contractors. I'm in a meeting and can't talk, but we have to handle it ASAP.'
You may have received a message like this or know someone who has. This is an example of a specific type of spear-phishing attack known as Business Email Compromise (BEC) that targets individuals with access to sensitive or financial data ...?more
When configuring an email client application or an email server to send to relay emails, many questions come to one's mind, such as which SMTPs should be used, what is the purpose of each of these ports, which are standard ports, which ports allow secure communication and many more.
In this article, we will cover everything that is to know about SMTP ports and protocols ...?more
This maxim generally holds good in life, but more so in a business.
Especially when it comes to making sure data is available and accessible all the time, there can be many uncertainties that cause interruptions to data access, affect data integrity, and even result in data loss - which all have a direct detrimental impact on business continuity...?more
Secure, isolate and recover critical data from cyberattacks with PowerProtect Cyber Recovery. Available on the Azure Marketplace.
As critical data expands across multiple platforms and multiple clouds, it becomes an easy target for cyberattacks. Regardless of your data location, you still need strategies to reduce the impact of cyberattacks and improve cyber resiliency. Ransomware continues to wreak havoc on businesses no matter the size, industry, or location. Recently at Dell Technologies World, customers expressed their concerns about being more cyber-resilient. This supports that many organizations still lack confidence in their data protection solutions in the face of cyberthreats. The 2021 Global Data Protection Index reported that 67% of IT decision makers are not confident that all business-critical data can be recovered after a destructive cyberattack. ...?more
As-a-Service solutions that bring order to chaos offer an intriguing alternative to the multi-cloud confusion.
Technology trends ebb and flow like the tides, but if you had to pick one that has staying power over the last decade-plus, it's cloud computing. Your job as an IT leader; managing that cloud deployment-intentionally ...?more
JPMorgan Chase and Dell Technologies join forces on e-waste reduction.
JPMorgan Chase (JPMC) and Dell Technologies recently came together to do more than business by partnering for the greater good. The two companies leveraged Dell Trade In to provide JPMC employees with an easy way to trade in old personal electronic devices for reuse and to help reduce e-waste through responsible recycling...?more
You might be asking: What is this vulnerability, and what has Red Hat done to address this concern for customers?
Ravie Lakshmanan's recent article CISA warns of active exploitation of 'PwnKit' Linux vulnerability in the wild articulates the vulnerability in Polkit (CVE-2021-4034) and recommends "to mitigate any potential risk of exposure to cyberattacks. that organizations prioritize timely remediation of the issues," while "federal civilian executive branch agencies, however, are required to mandatorily patch the flaws by July 18, 2022." ...?more
The recent implementation of the CableLabs 10G Lab environment facilitates the service provider's relentless "innovation journey" and surmounts a myriad of technical and logistical challenges while propelling the industry forward.
Additionally, it embraces open and co-compatible configurations to provide a successful proof of concept (POC) and vendor collaboration ...?more
Navigating the ever-evolving landscape of IT can truly be like exploring uncharted waters. Remember, as Steve Jobs once said - Innovation distinguishes between a leader and a follower. ?? Keeping up with trends in AI, cybersecurity, and ERP like you're doing is paramount in steering your enterprise in the right direction. ?? #Innovation #Leadership #TechTrends