October, 2016

article thumbnail

The #1 Barrier To Effective Digital Transformation

Forrester IT

In a recent post, I wrote about how digital experiences shape customer perceptions of value. But it's easy to forget that your organization's culture also shapes your customer's perception of value. Earlier this week I was moderating a panel on digital transformation at a Software AG event in New York. In opening the event, Kevin Niblock , Software AG's North America President and COO, described digital business as "a cultural phenomenon" Organizational culture plays an

IBM 371
article thumbnail

Recovering From a Security Breach

CTOvision

Rick Delgado. There are few things more unsettling for a company than being the victim of a security breach. Simply knowing that hackers have targeted you and gained access to sensitive information is enough to make any organization feel vulnerable. Equally distressing is knowing that such an attack may happen again in the future. While the time after being attacked may lead to a lot of confusion for businesses, it’s vital to the future success of your company to quickly recover from a cyber att

Security 270
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Digital apprentice turns social media into power security tool

Computer Weekly

Social security is not only a source of info for attackers, but a powerful way to raise awareness of security, as a young cyber security worker is demonstrating

Social 273
article thumbnail

“Right-Sizing” The Data Center: A Fool’s Errand?

Data Center Knowledge

For many, the quest to right-size turns into an exercise akin to a dog chasing its tail. So, we constantly ask ourselves the question: Is right-sizing a fool’s errand? Read More.

article thumbnail

Generative AI Deep Dive: Advancing from Proof of Concept to Production

Speaker: Maher Hanafi, VP of Engineering at Betterworks & Tony Karrer, CTO at Aggregage

Executive leaders and board members are pushing their teams to adopt Generative AI to gain a competitive edge, save money, and otherwise take advantage of the promise of this new era of artificial intelligence. There's no question that it is challenging to figure out where to focus and how to advance when it’s a new field that is evolving everyday. 💡 This new webinar featuring Maher Hanafi, CTO of Betterworks, will explore a practical framework to transform Generative AI prototypes into

article thumbnail

What is Data Preparation and understanding Vendor Capabilities

Social, Agile and Transformation

I guessed I missed the memo saying that ETL, Data Integration, and Data Quality are outdated terms (and technologies) and the new term used at least by Gartner and at O'Reilly Strata last week in NYC is Data Preparation. I can't say that I blame the industry because few executives understand data integration, ETL is associated with linear, long running data batch processing, and last.

Data 203
article thumbnail

A must-read IT security handbook: TAG Cyber's massive 2017 guide

Tech Republic Security

TAG Cyber CEO Dr. Edward Amoroso has created a 1,200+ page resource for cybersecurity pros. The handbook includes tech recommendations on 50 controls, interviews, and vendor lists.

Handbook 167

More Trending

article thumbnail

AWS Logstash Setup

CTOvision

Adam Gerhart. This is the second of a two-part post on getting Amazon's version of ElasticSearch set up in AWS. We go over the basics of setting up an AWS ES cluster and then tackle supplying the cluster with data via Logstash. This post assumes that you have already set up an ElasticSearch cluster in AWS. At the end, you should have a working data pipeline into ES that is exploitable with Kibana.

Linux 245
article thumbnail

Time to move on with social engineering training, says Jenny Radcliffe

Computer Weekly

Organisations need to move from awareness of the risk of social engineering to empowering employees to understand and recognise the threat to protect themselves and the company, says Jenny Radcliffe

article thumbnail

Reports: VMware, AWS Join Forces in Battle for Enterprise Cloud Market

Data Center Knowledge

Given their respective dominance in enterprise data center software and cloud, the deal would give Microsoft and Google much to think about. Read More.

article thumbnail

IDG Contributor Network: SoftLayer founder’s new company, StackPath, releases app security product

Network World

It’s always interesting to see what happens when a high-profile CEO sells his company and then finishes up his earn-out period. There are a few different models: some individuals go buy an island, start making films or go on permanent vacation. Others take some time to work out what they’re going to do and maybe take an entrepreneur-in-residence position for a time, while others jump straight back into the shark tank.

Network 166
article thumbnail

Reimagining Cybersecurity Training: Driving Real Impact on Security Culture

Speaker: Speakers:

They say a defense can be measured by its weakest link. In your cybersecurity posture, what––or who––is the weakest link? And how can you make them stronger? This webinar will equip you with the resources to search for quality training, implement it, and improve the cyber-behaviors of your workforce. By the end of the hour, you will feel empowered to improve the aspects of your security posture you control the least – the situational awareness and decision-making of your workforce.

article thumbnail

Delete unused Android apps now, or risk a security nightmare

Tech Republic Security

Your Android device most likely contains unused apps that could still use data or fall prey to vulnerabilities. The solution to this potential security problem: delete those apps.

Security 164
article thumbnail

Drunk History of Your Mobile Strategy

Forrester IT

Everybody can name their favorite apps. But can you name even two mobile websites you love? We can't. So we stared into the awful maw of the mobile web to learn how to fix it. 65 companies signed up to help. Along the way, we found problems stemming from the journey you've taken to be in your customer's pocket. My colleague Danielle Geoffroy brilliantly realized that it was a drunk history, so we wanted to share it with you.

Mobile 341
article thumbnail

What Big Data is Doing for Shipping on a Global Scale

CTOvision

Brigg Patten. While the shipping industry moves along daily without much consideration from the general public, the truth is that it is the lifeline of the global economy. If shipping were to be interrupted for any significant period of time, it would literally devastate the global economy. The quality and performance of shipping companies are driven by a highly competitive market.

Big Data 258
article thumbnail

Mirai IoT botnet code release raises fears of surge in DDoS attacks

Computer Weekly

Organisations with an online presence should prepare for terabit-class IoT botnet-based DDoS attacks that could knock almost any business offline or disable chunks of the internet, warn security experts

Internet 254
article thumbnail

Navigating the Future: Generative AI, Application Analytics, and Data

Generative AI is upending the way product developers & end-users alike are interacting with data. Despite the potential of AI, many are left with questions about the future of product development: How will AI impact my business and contribute to its success? What can product managers and developers expect in the future with the widespread adoption of AI?

article thumbnail

Russia Weighs Replacing IBM, Microsoft With Open-Source Software

Data Center Knowledge

Duma is drafting a bill to restrict government agencies from buying licensed software, giving preference to open-source software. Read More.

article thumbnail

How to run VirtualBox virtual machines from the command line

Tech Republic Data Center

VirtualBox virtual machines can be run without working with the GUI. See how to take advantage of the VBoxManage command to start, pause, and power down your VMs.

article thumbnail

Help wanted: Universities double down on security to help fill 1 million open jobs

Tech Republic Security

Universities are increasingly including cybersecurity majors and concentrations to better prepare students to fill the many open jobs that exist globally in the field.

Security 164
article thumbnail

Your Drunk History of Mobile Strategy

Forrester IT

Everybody can name their favorite apps. But can you name even two mobile websites you love? We can't. So we decided to stare into the awful maw of the mobile web and learn how to fix it. 65 companies signed up to help. Along the way, we found problems stemming from the drunken journey you've taken to be in your customer's pocket. My colleague Danielle Geoffroy brilliantly realized that it was a drunk history, so we wanted to share it with you.

Mobile 313
article thumbnail

7 Leadership Themes for Procurement & Supply Chain Leaders in 2024

Procurement and supply chain leaders are presented with their fair share of challenges, with a host of tools and strategies to resolve them. That said, what’s the best path forward to leverage this year’s trends? In this recap of a recent GEP-WBR webinar, 7 Leadership Themes for Procurement & Supply Chain Leaders in 2024, GEP’s Pramod Sethumadhavan explores seven vital leadership trends that will help guide procurement and supply chain decision-makers.

article thumbnail

Apple iCloud: The smart person's guide

Tech Republic Cloud

Apple's iCloud is a cloud file storage and services platform that provides users with secure ways to store and share files, find lost equipment, and synchronize information across multiple devices.

Apple 155
article thumbnail

Bulk surveillance review is ‘fiction’, claims former NSA technical director

Computer Weekly

Former NSA technical director Bill Binney talks about the Investigatory Powers Bill and the UK government's independent review of bulk surveillance powers

article thumbnail

VMware Sells Its Governments Cloud Business to QTS

Data Center Knowledge

VMware has agreed to sell its government cloud business to QTS Realty Trust, one of the biggest data center service providers in the US. The deal comes about a month after VMware, now majority-owned by Dell, announced a major shift in cloud strategy, choosing to focus more on providing technologies.

Vmware 220
article thumbnail

Hackers can remotely exploit insulin pump for unauthorized insulin injections

Network World

Rapid7 and Johnson & Johnson disclosed three vulnerabilities in the Animas OneTouch Ping insulin pump system, flaws that could be remotely exploited. However, the attack is sophisticated, and both say the risk of exploitation is “relatively low.” OneTouch Ping is a medical device that comes with a wireless remote control patients can use to deliver insulin instead of accessing the device under their clothes.

Wireless 156
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Facebook rolls out encryption for Messenger, but it's not as private as you think

Tech Republic Security

Facebook recently enabled end-to-end encryption for all Facebook Messenger users with an opt-in program called Secret Conversations. Here's what it means and how to use it.

article thumbnail

Vertical clouds - less useful than you're meant to believe, but still useful

Forrester IT

How often have you been told you can't use a mainstream public cloud provider? Quite often, probably, especially if you happen to work in a regulated industry like banking or healthcare. And what justifications are you given? The regulator "won't let you," no doubt? That's a good one. And "it's not secure" is often pretty close behind.

Cloud 311
article thumbnail

A New Chapter: “Cloud Musings en español”

Cloud Musings

Since May 2010, “ Cloud Musings ” has demonstrated, educated and celebrated the use of advanced technology in business. Specific subjects are sometimes varied, but cloud computing and cybersecurity seem to have become our sweet-spot. Over this period, information technology has transformed from a business support arm to being the core of just about every business model.

Cloud 132
article thumbnail

Poor IoT security could take down power grid, warns researcher

Computer Weekly

A security researcher who has exposed a series of vulnerabilities in IoT devices says he is concerned about systemic attacks that could take down parts of the internet or national power grids

Research 248
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

With Microsoft Data Center Deal, EdgeConneX Takes on Wholesale Giants

Data Center Knowledge

Multiple ongoing mega-scale builds in the US and Europe indicate that the company is looking beyond its initial edge-focused strategy. Read More.

article thumbnail

When Mentoring, CIOs Should Look Outside Of Their Own Firm

The Accidental Successful CIO

Perhaps when CIOs mentor, they should think outside of the box Image Credit: Massachusetts Office of Travel & Tourism. As though being the CIO is not a big enough job just by itself. Now we remember that there is that whole mentoring thing that we really should be doing. When we remember to mentor, we generally grab somebody from our company’s IT ranks and then spend some time with them teaching them about the importance of information technology.

Tourism 113
article thumbnail

Infographic: How to identify and avoid phishing attacks

Tech Republic Security

A recently-published infographic from Digital Guardian can help your employees recognize and steer clear of phishing, spear phishing, and social media attacks.

How To 162
article thumbnail

Creepy clown craze actually addressed at White House press conference

Network World

It’s been a week since we looked at the clown hysteria sweeping the nation, including a sheriff consulting with the FBI and Homeland Security over the clown threat, and now creepy clowns have even been addressed during a White House press conference. On Tuesday, Bloomberg’s Justin Sink asked White House press secretary Josh Earnest about the creepy clown craze.

article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.