November, 2019

article thumbnail

How Big Data Keeps Businesses Secure

CTOvision

Read Magnolia Potter explain how big data can be used to keep your business secure on Inside Big Data Big data has become almost ubiquitous in the world of business. From supply chain and inventory management to HR processes like hiring, big data has proven itself to be a valuable tool. However, big data can […].

Big Data 152
article thumbnail

IT Compliance - It's whats for dinner.

CIO Musings

NOTE: Please excuse the format of this, it is from my speaking notes for the Public Technology Institute Fall 2019 CIO Leadership forum. I was asked to speak, briefly, on IT compliance. I figured what the heck, make a blog post out of it. Managing IT Compliance Policy and Privacy IT Compliance can be an enabler and help you deliver better service to your customers.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The top cybersecurity mistakes companies are making (and how to avoid them)

Tech Republic Security

There's not a one-size-fits-all approach to cybersecurity. Learn some of the common mistakes and how you can get on the right path.

Company 544
article thumbnail

Retailers, Prepare Wisely: DDoS Remains A Holiday Threat

Forrester IT

A distributed denial of service attack can turn a retailer's holiday season from merry to miserable. Learn how to protect yourself.

Retail 491
article thumbnail

State of AI in Sales & Marketing 2025

AI adoption is reshaping sales and marketing. But is it delivering real results? We surveyed 1,000+ GTM professionals to find out. The data is clear: AI users report 47% higher productivity and an average of 12 hours saved per week. But leaders say mainstream AI tools still fall short on accuracy and business impact. Download the full report today to see how AI is being used — and where go-to-market professionals think there are gaps and opportunities.

article thumbnail

Cisco Meraki ups security with new switch, software

Network World

Cisco Meraki has introduced new hardware and software the company says will help customers more effectively support and secure a wide variety of distributed network resources. The new products, which include a raft of new security features as well a new class of switches and a cellular gateway will help Meraki address customers who perhaps don’t have the IT expertise nor staffing to support the increasing number of devices that need to be managed, said Lawrence Huang, vice president of product m

Software 415
article thumbnail

Enterprise Guide to Data Privacy

Information Week

Enterprise organizations could be hit with heavy fines if they don't comply with laws (current and upcoming) to protect their customers. CIOs and IT leaders: Are you ready?

More Trending

article thumbnail

Deploy Microsoft Edge Browser with SCCM Endpoint Manager

Anoop

Subscribe YouTube Channel [link]. and Facebook Page to get latest updates. [link]. Let’s see how easy you can deploy New Microsoft Edge browser using Endpoint Manager SCCM. SCCM team created an out of box experience to create an SCCM application for new edge browser (chromium based) deployment (Deploy Microsoft Edge Browser). Related Posts New Microsoft Edge Browser Deployment with Intune MEM Deploy Google Chrome Update with SCCM […].

Microsoft 218
article thumbnail

Cybersecurity in 2020: More targeted attacks, AI not a prevention panacea

Tech Republic Security

As cloud complexity increases, hackers are relying on more targeted attacks, scoping out weak points across a larger attack surface.

Cloud 544
article thumbnail

B2B Marketing And Sales: Combat Digital Sameness With Video

Forrester IT

Video has incredible power for B2B marketing and sales to deliver lots of information in a small, engaging package. Join me and my colleague Cheri Keith at TechX for our session, “Switched On: Four Must-Have Video Technologies,” to find out how to supercharge your campaigns. The session will: Help you understand the various technologies and […].

B2B 484
article thumbnail

IoT in 2020: The awkward teenage years

Network World

Much of the hyperbole around the Internet of Things isn’t really hyperbole anymore – the instrumentation of everything from cars to combine harvesters to factories is just a fact of life these days. IoT’s here to stay. Yet despite the explosive growth – one widely cited prediction from Gartner says that the number of enterprise and automotive IoT endpoints will reach 5.8 billion in 2020 – the IoT market’s ability to address its known flaws and complications has progressed at a far more pedestria

article thumbnail

The Ultimate Contact Center Buyers Guide: A Crucial Decision

Harness the True Power of your Contact Center In today’s fast-paced business environment, selecting the right contact center solution is critical for enhancing customer experience, improving operational efficiency, and optimizing costs. This comprehensive guide will walk you through the essential factors to consider when choosing a contact center software that aligns with your business needs.

article thumbnail

Robotic Process Automation: 4 Key Considerations

Information Week

Project sponsors and managers of automation initiatives should carefully consider building these elements into their projects from the outset.

408
408
article thumbnail

Software Acquisition and Practices in Government: Build or Buy?

CTOvision

This post is the next in our series focusing on building vs buying software for government uses. Also see our CTOvision Study on Build Vs Buy in Government and How Do Leaders In Government Decide GOTS or COTS? The issue of building or buying software for government uses is one of the oldest discussion topics […].

article thumbnail

Learn How to Sysprep Capture Windows 10 Image using DISM

Anoop

Subscribe YouTube Channel [link]. and Facebook Page to get latest updates. [link]. My name is Jitesh Kumar and I have more than 3 years experience in IT Domain, having expertise on Windows 10 deployment, including the various microsoft tools (ConfigMgr ,MDT) and deployment solutions. I’ll have more posts in the future. In this post, you will learn details about running sysprep capture Windows 10 Image using DISM […].

Windows 218
article thumbnail

How credential stuffing attacks work, and how to prevent them

Tech Republic Security

Credential stuffing attacks pose a significant risk to consumers and businesses. Learn how they work and what you can do about them.

How To 535
article thumbnail

How to Achieve High-Accuracy Results When Using LLMs

Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage

When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m

article thumbnail

Enterprise Security Vendors Need An Infusion Of Open Source Culture

Forrester IT

This week, I attended IBM’s fifth annual Security Summit in New York City, an exclusive event for a who’s who of IBM’s security customers. This is my third year attending, and I always look forward to going for a few reasons: 1) This is a small, targeted half-day security conference — perfect for a forced […].

article thumbnail

IBM aims at hybrid cloud, enterprise security

Network World

IBM is taking aim at the challenging concept of securely locking-down company applications and data spread across multiple private and public clouds and on-premises locations. IBM is addressing this challenge with its Cloud Pak for Security, which features open-source technology for hunting threats, automation capabilities to speed response to cyberattacks, and the ability integrate customers’ existing point-product security-system information for better operational safekeeping – all under one r

IBM 362
article thumbnail

GPUs Continue to Dominate the AI Accelerator Market for Now

Information Week

As enterprises embark on AI and machine learning strategies, chip makers like NVIDIA, Intel and AMD are battling to become the standard hardware providers.

Intel 405
article thumbnail

Amazon Dives Deep into Reinforcement Learning

CTOvision

Read Ronald Schmelzer’s article in Forbes about moves Amazon is making to expand the use of Reinforcement Learning: Reinforcement learning (RL) has generally been applied to solve games and puzzles. From early AI applications in checkers and chess to more recent RL-based solutions that have learned how to play some of the most difficult games […].

article thumbnail

Future-Proof IT: Cost-Saving Strategies Every IT Leader Needs in 2025

With IT budgets projected to grow 9.8% in 2025, leaders must invest wisely—not just cut blindly. This whitepaper introduces The Future-Proof IT Cost Optimization Model, a framework to reduce costs while maintaining service quality. Learn how Cloud Efficiency, AI-Powered Workforce Automation, Vendor Optimization, Cybersecurity Resilience, and Unified Communications can drive savings and improve efficiency.

article thumbnail

The best Software as a Service (SaaS) companies of the 2010s decade

Tech Republic Cloud

Thousands of SaaS companies provide cloud services to customers all over the world, but some stood out from the crowd during the decade that started with 2010.

Company 217
article thumbnail

Security pros explain Black Friday best practices for consumers and businesses

Tech Republic Security

Consumers have to make sure not to fall prey to fraudulent coupons or deceptively spoofed retailer websites.

Retail 533
article thumbnail

Finding “Friendlies” And Other Tips For Data Insights Leaders  

Forrester IT

In a recent inquiry, a new Chief Data Officer asked where to start. And, wanted to know how to build a community around data and analytics, particularly with a limited budget to hire. Finding “Friendlies” My first suggestion was to look at the case study I did a few years ago on Seattle Children’s Hospital. […].

article thumbnail

SASE is more than a buzzword for BioIVT

Network World

It seems the latest buzzword coming from those analysts at Gartner is SASE (pronounced “sassy”), which stands for “Secure Access Service Edge.” Network World has published several articles recently to explain what SASE is (and perhaps isn’t). See Matt Conran’s The evolution to Secure Access Service Edge (SASE) is being driven by necessity as well as Zeus Kerravala’s article How SD-WAN is evolving into Secure Access Service Edge.

WAN 275
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

When Planets Align: Edge Computing's Game-Changing Potential

Information Week

Emerging technologies that leverage edge computing will take years -- potentially decades -- to emerge. The smart move is to wait for the hype to settle.

405
405
article thumbnail

Google’s plan to collect health data on millions of Americans faces federal inquiry

CTOvision

The US Department of Health and Human Services has launched an inquiry into Google’s partnership with giant US Catholic healthcare non-profit Ascension. The healthcare deal is a major win for Google’s cloud business, Google Cloud, but it has immediately raised concerns over the level of access Google will have to patient data. Ascension, a faith-based healthcare provider, […].

article thumbnail

What is SCCM Cloud Attach Tenant Attach Client Attach WOW MECM

Anoop

Subscribe YouTube Channel [link]. and Facebook Page to get latest updates. [link]. I hope you already heard about the SCCM cloud attach (wait, MECM Cloud Attach) many times before. Let me tell you cloud attach is a bit different now! All the details are taken from Jason Githens & Rob York session in MS Ignite 2019. More information about the Ignite session below.

Cloud 216
article thumbnail

Business Email Compromise: 5 ways this fraud could happen and what can be done to prevent it

Tech Republic Security

Millions of dollars and loads of personal information is being stolen through a growing threat known as Business Email Compromise (BEC).

524
524
article thumbnail

The 2025 Annual ProcureCon CPO Report

Procurement leaders are at a pivotal moment. With CPOs playing an increasingly strategic role, it’s time to leverage innovation and technology to drive resilience and efficiency. Download The 2025 Annual ProcureCon CPO Report to uncover key insights to thrive in a dynamic procurement landscape. What’s Inside: How CPOs are driving strategic decision-making and technology adoption The top priorities and challenges for procurement in 2025 Why AI, sustainability, and data analytics are essential for

article thumbnail

Benchmark Omnichannel Retail And Digital Store Capabilities In Singapore

Forrester IT

We just published two retail benchmark reports for Singapore, assessing retailers’ omnichannel retail capabilities and digital store capabilities, respectively. For both evaluations, we selected six multichannel retailers that operate both online and offline stores and provide “buy online, pick up in store” services in Singapore: Charles & Keith, Decathlon, Harvey Norman, Marks & Spencer, Uniqlo, […].

Retail 418
article thumbnail

VMware amps security with in-house, Carbon Black technology

Network World

VMware is moving quickly to meld its recently purchased Carbon Black technology across its product lines with an eye toward helping users protect their distributed enterprises. VMware just closed the $2.1 billion buy of cloud-native endpoint-security vendor Carbon Black in October and in the process created a new security business unit that will target cybersecurity and analytics to protect networked enterprise resources.

Vmware 240
article thumbnail

How IT Supports the Data Science Operation

Information Week

Data science and IT no longer are separate disciplines. Think of it as a partnership.

Data 392
article thumbnail

Google Confirms Android Camera Security Threat: ‘Hundreds Of Millions’ Of Users Affected

CTOvision

The security research team at Checkmarx has made something of a habit of uncovering alarming vulnerabilities, with past disclosures covering Amazon’s Alexa and Tinder. However, a discovery of vulnerabilities affecting Google and Samsung smartphones, with the potential to impact hundreds of millions of Android users, is the biggest to date. What did the researchers discover?

Google 56
article thumbnail

The GTM Intelligence Era: ZoomInfo 2025 Customer Impact Report

ZoomInfo customers aren’t just selling — they’re winning. Revenue teams using our Go-To-Market Intelligence platform grew pipeline by 32%, increased deal sizes by 40%, and booked 55% more meetings. Download this report to see what 11,000+ customers say about our Go-To-Market Intelligence platform and how it impacts their bottom line. The data speaks for itself!