February, 2023

article thumbnail

6 Worthless Security Tactics That Won't Go Away

Information Week

Trusting a security placebo never makes sense. Don't let your organization fall victim to a discredited security approach that provides little or no protection.

Security 189
article thumbnail

3 Ways the Cloud Will Shape AI in 2023

Information Week

Cloud advances will enable AI breakthroughs, shape cybersecurity and compliance strategies, and provide opportunities for the financially savvy and nimble.

Cloud 208
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The DDoS Attack on German Airport Websites and What IT Leaders Can Learn

Information Week

A DDoS attack recently took down the websites for several German airports. We compare this incident with other recent attacks against airports and explain how companies can protect against future DDoS attacks.

Company 193
article thumbnail

IBM: Most ransomware blocked last year, but cyberattacks are moving faster

Tech Republic Security

A new study from IBM Security suggests cyberattackers are taking side routes that are less visible, and they are getting much faster at infiltrating perimeters. The post IBM: Most ransomware blocked last year, but cyberattacks are moving faster appeared first on TechRepublic.

IBM 216
article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

PMP vs. CompTIA Project+: It’s Not One Size Fits All

Association of Information Technology Professional

Both CompTIA Project+ and PMP require extensive preparation. Before you dive in, take some time to decide which certification is right for you.

293
293
article thumbnail

Preparing for Compliance With AI, Data Privacy Laws

Information Week

With individuals set to gain new rights over how businesses use automated decision-making, businesses will have to ensure they're compliant with data privacy and AI regulations.

Data 186

More Trending

article thumbnail

The headache of changing passwords

Tech Republic Security

Change Your Password Day — an annual reminder of just how bad passwords really are. The post The headache of changing passwords appeared first on TechRepublic.

article thumbnail

How Digital Innovation Is Transforming the Customer Experience for Manufacturers

IT Toolbox

Here’s how digital commerce is reshaping customer experience in manufacturing. The post How Digital Innovation Is Transforming the Customer Experience for Manufacturers appeared first on Spiceworks.

360
360
article thumbnail

New Feature in Intune Service Release 2302 February Update Intune Brand Change

Anoop

Hello - Here is the new HTMD Blog Article for you. Enjoy reading it. Subscribe to YouTube Channel [link] and Facebook Page to get the latest updates [link]. Read More The post New Feature in Intune Service Release 2302 February Update Intune Brand Change appeared first on HTMD Community Blog #1 Modern Device Management Guides by Jitesh Kumar.

article thumbnail

How to Think About ChatGPT and the New Wave of AI

Association of Information Technology Professional

ChatGPT is big news right now. You might be asking yourself where you can use it. But the better question is how can you use it?

How To 276
article thumbnail

2024 Salary Guide

Procom’s 2024 Salary Guide provides critical insights into the latest hiring trends, in-demand IT roles, and competitive pay rates across Canada and the U.S. It highlights key market dynamics such as the growing demand for remote work, skills-based hiring, and flexible staffing solutions. With detailed pay rate data for top IT positions like Cybersecurity Consultants, Cloud Engineers, and Salesforce Developers, this guide is an essential resource for companies looking to stay competitive in toda

article thumbnail

AI: It's the New Security Frontier

Information Week

IT has principally focused its security on transactions, but with more artificial intelligence applications coming onboard. Is IT ready for data poisonings and other new AI threats?

article thumbnail

Cisco security upgrades strengthen access control, risk analysis

Network World

Cisco has strengthened some of its key security software packages with an eye toward better protecting distributed enterprise resources. Specifically, Cisco added more intelligence to its Duo access-protection software and introduced a new application called Business Risk Observability that can help enterprises measure the impact of security risks on their core applications.

Analysis 179
article thumbnail

Cryptocurrency users in the US hit by ransomware and Clipper malware

Tech Republic Security

Learn how to protect your business and staff from the MortalKombat ransomware and Laplas Clipper malware. The post Cryptocurrency users in the US hit by ransomware and Clipper malware appeared first on TechRepublic.

Malware 210
article thumbnail

How AI Is Transforming Industries With Smart Inventory Management

IT Toolbox

Smart inventory management could lead to greater efficacy for industries. Find out other ways AI is enabling transformation. The post How AI Is Transforming Industries With Smart Inventory Management appeared first on Spiceworks.

Industry 279
article thumbnail

Guide to Centralizing IT Operations: How to Link Tasks and Tools with an Automation Platform

For many IT admins, business as usual is a juggling act. Job schedulers and scripts run on autopilot, applications and operating systems can’t speak the same language, and other tools—like RPA or MFT solutions—operate in isolation. On a good day, everything runs smoothly. But good days are rare; more often than not, something goes wrong and you’re stuck putting out fires.

article thumbnail

How to Block macOS Enrollment in Intune

Anoop

Hello - Here is the new HTMD Blog Article for you. Enjoy reading it. Subscribe to YouTube Channel [link] and Facebook Page to get the latest updates [link]. Read More The post How to Block macOS Enrollment in Intune appeared first on HTMD Community Blog #1 Modern Device Management Guides by Snehasis Pani.

How To 205
article thumbnail

How to transition from traditional system administration to cloud administration

Tech Republic Cloud

With the majority of enterprise infrastructure now cloud based, IT professionals should become familiar with cloud administration. Learn some tips to help with the process. The post How to transition from traditional system administration to cloud administration appeared first on TechRepublic.

article thumbnail

GoDaddy Hit with Multiyear Breach

Information Week

Domain registrar GoDaddy disclosed that it is the victim of a multiyear campaign. How does an attack go undiscovered so long, and how is the risk of other attacks like it?

177
177
article thumbnail

Network-as-a-service lets a shoe retailer take steps toward Zero Trust

Network World

Nigel Williams-Lucas, director of Information Technology at Maryland-based footwear retailer DTLR, faced a challenge that most IT execs will recognize: the business was pushing hard on digital transformation, and the IT infrastructure was struggling to keep pace. Store managers were seeking better data analytics and business intelligence from backend systems like inventory and sales.

Retail 179
article thumbnail

HR Meets AI: The New Way of Keeping Large Workforces Connected and Engaged

Speaker: Miriam Connaughton and Donald Knight

As organizations scale, keeping employees connected, engaged, and productive can seem like a monumental task. But what if AI could help you do all of this and more? AI has the power to help, but the key is implementing it in a way that enhances, rather than replaces, human connection. Join us for an exploration into how industry trailblazers are using AI to transform employee experience at scale while addressing both the potential and the pitfalls.

article thumbnail

How IT jobs and recruiting on the dark web might trick you

Tech Republic Security

A new Kaspersky report sheds light on why some tech pros look for jobs on the dark web and how to spot suspicious and likely illegal positions from recruiters in that environment. The post How IT jobs and recruiting on the dark web might trick you appeared first on TechRepublic.

Report 199
article thumbnail

Why Advertisers Should Switch to Immersive Advertising

IT Toolbox

Discover the advantages of immersive advertising and why brands should consider it. The post Why Advertisers Should Switch to Immersive Advertising appeared first on Spiceworks.

article thumbnail

Enable Language Interpretation in Teams Meetings | Real-Time Translation

Anoop

Hello - Here is the new HTMD Blog Article for you. Enjoy reading it. Subscribe to YouTube Channel [link] and Facebook Page to get the latest updates [link]. Read More The post Enable Language Interpretation in Teams Meetings | Real-Time Translation appeared first on HTMD Community Blog #1 Modern Device Management Guides by Vidya M A.

Meeting 205
article thumbnail

Dell partners with Red Hat as part of MWC 2023 announcement slate

Tech Republic Data Center

New rugged PowerEdge servers, Dell and Red Hat telecom infrastructure as a service and a private 5G wireless portfolio will roll out throughout the year. The post Dell partners with Red Hat as part of MWC 2023 announcement slate appeared first on TechRepublic.

Dell 161
article thumbnail

Launching LLM-Based Products: From Concept to Cash in 90 Days

Speaker: Christophe Louvion, Chief Product & Technology Officer of NRC Health and Tony Karrer, CTO at Aggregage

Christophe Louvion, Chief Product & Technology Officer of NRC Health, is here to take us through how he guided his company's recent experience of getting from concept to launch and sales of products within 90 days. In this exclusive webinar, Christophe will cover key aspects of his journey, including: LLM Development & Quick Wins 🤖 Understand how LLMs differ from traditional software, identifying opportunities for rapid development and deployment.

article thumbnail

What Ukraine's IT Industry Can Teach CIOs About Resilience

Information Week

War has tested Ukraine's cyber resilience in unimaginable ways. Yet, by rising to the challenge, the Ukrainian IT industry has emerged as a leader in the country’s new economy. Data shows growth in the tech sector and suggests further reasons for optimism in the coming year.

Industry 173
article thumbnail

NTT, Palo Alto partner for managed SASE with AIOps

Network World

A new offering from IT services provider NTT combines Palo Alto Networks' Prisma SASE offering with NTT's managed network services and AIOps infrastructure. SASE – secure access service edge – has been gaining interest for its potential to reduce networking complexity while improving security. It combines SD-WAN with security services, including secure web access gateway (SWG), cloud access security broker (CASB), zero-trust network access ( ZTNA ), and firewall-as-a-service (FWaaS), in a sing

WAN 179
article thumbnail

New cybersecurity data reveals persistent social engineering vulnerabilities

Tech Republic Security

Ransomware was down last year, though LockBit led threat actors and employees opened a third of the toxic emails in the last six months of 2022. The post New cybersecurity data reveals persistent social engineering vulnerabilities appeared first on TechRepublic.

article thumbnail

For the Love of Network Security: How Safe Is Your Business?

IT Toolbox

With the scope of networks changing across the board, network security must keep up. The post For the Love of Network Security: How Safe Is Your Business? appeared first on Spiceworks.

Network 264
article thumbnail

An Architect’s Guide for Selecting Scalable, Data-Layer Technologies

There’s no getting around it: selecting the right foundational data-layer components is crucial for long-term application success. That’s why we developed this white paper to give you insights into four key open-source technologies – Apache Cassandra®, Apache Kafka®, Apache Spark™, and OpenSearch® – and how to leverage them for lasting success. Discover everything you’ll want to know about scalable, data-layer technologies: Learn when to choose these technologies and when to avoid them Explore h

article thumbnail

How to Install Bluebeam Using Intune

Anoop

Hello - Here is the new HTMD Blog Article for you. Enjoy reading it. Subscribe to YouTube Channel [link] and Facebook Page to get the latest updates [link]. Read More The post How to Install Bluebeam Using Intune appeared first on HTMD Community Blog #1 Modern Device Management Guides by Abhinav Rana.

How To 202
article thumbnail

10 ways to accelerate digital transformation

CIO Business Intelligence

The pandemic-era push to quickly boost digital touchpoints and services proved that transformation can happen fast. That has left a lasting legacy: Even as the pandemic recedes, enterprise executives continue to expect CIOs and their IT departments to deliver transformative capabilities at a rapid-fire pace. If you think you’re keeping up, think again: One recent study from research firm Gartner found that the majority of CEOs (59%) say digital initiatives take too long and 52% take too long to

Agile 145
article thumbnail

Pairing AI with Tech Pros: A Roadmap to Successful Implementation

Information Week

The main challenge for experienced developers and other IT pros is to integrate artificial intelligence tools in their workflow to improve the quality and the performance of their work.

article thumbnail

Cisco observability: What you need to know

Network World

Observability may be the latest buzzword in an industry loaded with them, but Cisco will tell you the primary goal of the technology is to help enterprises get a handle on effectively managing distributed resources in ways that have not been possible in the past. The idea of employing observability tools and applications is a hot idea. Gartner says that by 2024, 30% of enterprises implementing distributed system architectures will have adopted observability techniques to improve digital-business

article thumbnail

IT Leadership Agrees AI is Here, but Now What?

IT leaders are experiencing rapid evolution in AI amid sustained investment uncertainty. As AI evolves, enhanced cybersecurity and hiring challenges grow. This whitepaper offers real strategies to manage risks and position your organization for success.