February, 2023

article thumbnail

6 Worthless Security Tactics That Won't Go Away

Information Week

Trusting a security placebo never makes sense. Don't let your organization fall victim to a discredited security approach that provides little or no protection.

Security 206
article thumbnail

3 Ways the Cloud Will Shape AI in 2023

Information Week

Cloud advances will enable AI breakthroughs, shape cybersecurity and compliance strategies, and provide opportunities for the financially savvy and nimble.

Cloud 218
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Bringing Calm to Chaos as an IT Project Manager

Association of Information Technology Professional

Gina Marbury Akinjo always knew she wanted a career that made an impact on people’s lives. Her desire to help others led her to her first job as an emergency medical technician, but after many years in such a high-stake field, she decided it was time to make a change.

article thumbnail

The DDoS Attack on German Airport Websites and What IT Leaders Can Learn

Information Week

A DDoS attack recently took down the websites for several German airports. We compare this incident with other recent attacks against airports and explain how companies can protect against future DDoS attacks.

Company 207
article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

IBM: Most ransomware blocked last year, but cyberattacks are moving faster

Tech Republic Security

A new study from IBM Security suggests cyberattackers are taking side routes that are less visible, and they are getting much faster at infiltrating perimeters. The post IBM: Most ransomware blocked last year, but cyberattacks are moving faster appeared first on TechRepublic.

IBM 217
article thumbnail

PMP vs. CompTIA Project+: It’s Not One Size Fits All

Association of Information Technology Professional

Both CompTIA Project+ and PMP require extensive preparation. Before you dive in, take some time to decide which certification is right for you.

293
293

More Trending

article thumbnail

Preparing for Compliance With AI, Data Privacy Laws

Information Week

With individuals set to gain new rights over how businesses use automated decision-making, businesses will have to ensure they're compliant with data privacy and AI regulations.

Data 216
article thumbnail

Pen testing report: IT budgets should focus on entire security stack

Tech Republic Security

With nearly 90% of companies reporting cyberattacks, pen testing budgets are on the rise, with cloud infrastructure and services a key focus area, according to a new report. The post Pen testing report: IT budgets should focus on entire security stack appeared first on TechRepublic.

Budget 204
article thumbnail

The headache of changing passwords

Tech Republic Security

Change Your Password Day — an annual reminder of just how bad passwords really are. The post The headache of changing passwords appeared first on TechRepublic.

article thumbnail

2022 Breaches And Fines Offer Lessons To Security Leaders

Forrester IT

2022 didn’t let up on the security incidents – according to Forrester’s 2022 Security Technographics Survey, 74% of security decision makers experienced at least one data breach at their firm in the previous twelve months.

Security 370
article thumbnail

2024 Salary Guide

Procom’s 2024 Salary Guide provides critical insights into the latest hiring trends, in-demand IT roles, and competitive pay rates across Canada and the U.S. It highlights key market dynamics such as the growing demand for remote work, skills-based hiring, and flexible staffing solutions. With detailed pay rate data for top IT positions like Cybersecurity Consultants, Cloud Engineers, and Salesforce Developers, this guide is an essential resource for companies looking to stay competitive in toda

article thumbnail

How Digital Innovation Is Transforming the Customer Experience for Manufacturers

IT Toolbox

Here’s how digital commerce is reshaping customer experience in manufacturing. The post How Digital Innovation Is Transforming the Customer Experience for Manufacturers appeared first on Spiceworks.

360
360
article thumbnail

How to Think About ChatGPT and the New Wave of AI

Association of Information Technology Professional

ChatGPT is big news right now. You might be asking yourself where you can use it. But the better question is how can you use it?

How To 276
article thumbnail

The Problem With Facial Recognition Systems

The Accidental Successful CIO

What’s wrong with facial recognition technology? Image Credit: Kal Omari As a CIO you have probably already heard about face recognition technology. This is the technology that can allow your firm to do away with things that don’t seem to work like passwords , fingerprints, and security fobs. Instead, all an employee has to do to gain access to an area or an application is to show a computer their face and then they are in.

System 246
article thumbnail

AI Will Drive Faster and More Powerful Marketing Transformation Than You Think

Social, Agile and Transformation

Over the last few years, we’ve entered a new wave of AI-enabled marketing capabilities. What were easy-to-implement point solutions for generating headlines, prioritizing advertisement keywords, or automating A-Z testing are now mainstream.

article thumbnail

Guide to Centralizing IT Operations: How to Link Tasks and Tools with an Automation Platform

For many IT admins, business as usual is a juggling act. Job schedulers and scripts run on autopilot, applications and operating systems can’t speak the same language, and other tools—like RPA or MFT solutions—operate in isolation. On a good day, everything runs smoothly. But good days are rare; more often than not, something goes wrong and you’re stuck putting out fires.

article thumbnail

AI: It's the New Security Frontier

Information Week

IT has principally focused its security on transactions, but with more artificial intelligence applications coming onboard. Is IT ready for data poisonings and other new AI threats?

article thumbnail

The Future Of Banking Requires Tech-Driven Innovation

Forrester IT

Over three quarters of banks are increasing their spending on emerging technologies, creating the potential for hype and fear of missing out. Forrester identified nine emerging technologies that should be on the list of every bank, either now or later. We then organized them according to when firms can expect return on investment and provided details about the technologies and their use cases.

Banking 370
article thumbnail

How AI Is Transforming Industries With Smart Inventory Management

IT Toolbox

Smart inventory management could lead to greater efficacy for industries. Find out other ways AI is enabling transformation. The post How AI Is Transforming Industries With Smart Inventory Management appeared first on Spiceworks.

Industry 279
article thumbnail

CompTIA Certifications: The Antidote to Imposter Syndrome

Association of Information Technology Professional

Earning CompTIA Security+ helped cybersecurity specialist Vina Ta squash imposter syndrome, deepen her knowledge of IT security and reinforce her passion for working with people.

Security 254
article thumbnail

HR Meets AI: The New Way of Keeping Large Workforces Connected and Engaged

Speaker: Miriam Connaughton and Donald Knight

As organizations scale, keeping employees connected, engaged, and productive can seem like a monumental task. But what if AI could help you do all of this and more? AI has the power to help, but the key is implementing it in a way that enhances, rather than replaces, human connection. Join us for an exploration into how industry trailblazers are using AI to transform employee experience at scale while addressing both the potential and the pitfalls.

article thumbnail

Cryptocurrency users in the US hit by ransomware and Clipper malware

Tech Republic Security

Learn how to protect your business and staff from the MortalKombat ransomware and Laplas Clipper malware. The post Cryptocurrency users in the US hit by ransomware and Clipper malware appeared first on TechRepublic.

Malware 215
article thumbnail

New Feature in Intune Service Release 2302 February Update Intune Brand Change

Anoop

Hello - Here is the new HTMD Blog Article for you. Enjoy reading it. Subscribe to YouTube Channel [link] and Facebook Page to get the latest updates [link]. Read More The post New Feature in Intune Service Release 2302 February Update Intune Brand Change appeared first on HTMD Community Blog #1 Modern Device Management Guides by Jitesh Kumar.

article thumbnail

Digital Transformation Is a Must Have in Financial Markets

Information Week

While greater organizational efficiency is a byproduct, the real advantage is in better data protection and increased consumer confidence.

Financial 217
article thumbnail

Drive Growth With Digital Accessibility: Best Practices From Three Retailers

Forrester IT

With a turbulent and unprecedented current economy, most retailers are trying to shore up revenue wherever they can. One way to do this is through making your company’s websites and mobile apps more accessible. Annually, the disability community has a disposable income of $1.9 trillion and an accessible digital storefront gives you access to this market.

Retail 370
article thumbnail

Launching LLM-Based Products: From Concept to Cash in 90 Days

Speaker: Christophe Louvion, Chief Product & Technology Officer of NRC Health and Tony Karrer, CTO at Aggregage

Christophe Louvion, Chief Product & Technology Officer of NRC Health, is here to take us through how he guided his company's recent experience of getting from concept to launch and sales of products within 90 days. In this exclusive webinar, Christophe will cover key aspects of his journey, including: LLM Development & Quick Wins 🤖 Understand how LLMs differ from traditional software, identifying opportunities for rapid development and deployment.

article thumbnail

For the Love of Network Security: How Safe Is Your Business?

IT Toolbox

With the scope of networks changing across the board, network security must keep up. The post For the Love of Network Security: How Safe Is Your Business? appeared first on Spiceworks.

Network 264
article thumbnail

Get Started With the Principle of Least Privilege

Association of Information Technology Professional

The principle of least privilege grants users as little access to resources as possible within their role. Learn 3 ways this principle helps secure your environment.

Resources 248
article thumbnail

Why Your Old Performance Management Sucks – The Overhaul Needed for Agile Digital Transformations

Social, Agile and Transformation

I despise the yearly performance management process. Once a year, managers and leaders care enough about their employees’ goals and development plans and must ceremonially record objectives in HR’s performance management system.

Agile 210
article thumbnail

How IT jobs and recruiting on the dark web might trick you

Tech Republic Security

A new Kaspersky report sheds light on why some tech pros look for jobs on the dark web and how to spot suspicious and likely illegal positions from recruiters in that environment. The post How IT jobs and recruiting on the dark web might trick you appeared first on TechRepublic.

Report 207
article thumbnail

An Architect’s Guide for Selecting Scalable, Data-Layer Technologies

There’s no getting around it: selecting the right foundational data-layer components is crucial for long-term application success. That’s why we developed this white paper to give you insights into four key open-source technologies – Apache Cassandra®, Apache Kafka®, Apache Spark™, and OpenSearch® – and how to leverage them for lasting success. Discover everything you’ll want to know about scalable, data-layer technologies: Learn when to choose these technologies and when to avoid them Explore h

article thumbnail

Is It Time to Start Worrying About Quantum Computing Security?

Information Week

Quantum computing's dark side is the threat the technology could pose to cybersecurity. Here's what you need to know.

Security 216
article thumbnail

What Consumers Like – and Detest – About Subscriptions

Forrester IT

Consumers shared their attitudes towards subscriptions - see key highlights.

Retail 370
article thumbnail

Why Vulnerability Management Needs A Patch In The Modern Tech Stack

IT Toolbox

The modern tech stack is diverse, with an attack surface that is difficult to manage. Here’s how vulnerability management needs to improve. The post Why Vulnerability Management Needs A Patch In The Modern Tech Stack appeared first on Spiceworks.

264
264
article thumbnail

IT Pro Reinvigorates his Career With CompTIA A+

Association of Information Technology Professional

Nearly three decades into a tech career, this IT pro found himself laid off. But what he did in that moment, reinvigorated his career and changed his life for the better.

237
237
article thumbnail

IT Leadership Agrees AI is Here, but Now What?

IT leaders are experiencing rapid evolution in AI amid sustained investment uncertainty. As AI evolves, enhanced cybersecurity and hiring challenges grow. This whitepaper offers real strategies to manage risks and position your organization for success.