Sat.Jul 04, 2020 - Fri.Jul 10, 2020

article thumbnail

Are Your Managers Asking The Right Questions?

Forrester IT

Growing up, my father framed all of our chores in the form of a question. “How would you like to mow the lawn?” Of course, it wasn’t really a question. The lawn was going to get mowed, and I was going to do it. When great individual contributors are first promoted to management roles, they […].

Course 300
article thumbnail

How much malware tools sell for on the Dark Web

Tech Republic Security

A low-quality batch of malicious tools can sell for as low as $70, while a premium set can go as high as $6,000, according to the security research site Privacy Affairs.

Tools 532
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Magellan Health Data Breach Victim Tally Reaches 365K Patients

CTOvision

The extent of the ransomware attack that hit Arizona-based Magellan Health in April became clear this week, with eight Magellan Health affiliates and healthcare providers reporting breaches stemming from the […].

article thumbnail

Robotics Will Prevail Over Other Tech Sectors Post-Pandemic

Information Week

The COVID-19 pandemic has highlighted the importance of robotics in roles normally reserved for susceptible humans, but which robotics applications will thrive once we get ahead of the virus?

article thumbnail

Going Beyond Chatbots: Connecting AI to Your Tools, Systems, & Data

Speaker: Alex Salazar, CEO & Co-Founder @ Arcade | Nate Barbettini, Founding Engineer @ Arcade | Tony Karrer, Founder & CTO @ Aggregage

If AI agents are going to deliver ROI, they need to move beyond chat and actually do things. But, turning a model into a reliable, secure workflow agent isn’t as simple as plugging in an API. In this new webinar, Alex Salazar and Nate Barbettini will break down the emerging AI architecture that makes action possible, and how it differs from traditional integration approaches.

article thumbnail

Juniper targets security portfolio at SASE race

Network World

The conga line around secure-access service edge (SASE) , continues to grow with Juniper this week becoming the latest to join the dance. Just as other big networking players with extensive security portfolios including Cisco and VMware have recently done, Juniper says it will build off its offerings to address the SASE blueprint. Read about edge networking.

Security 464
article thumbnail

US Secret Service warns about increased cyberattacks against MSPs

Tech Republic Security

The US Secret Service has warned organizations about a rise in hacks of MSPs and offers advice on how to beef up security.

Security 545

More Trending

article thumbnail

3 Tips to Recognize Hidden Costs of the Cloud

Information Week

Cloud usage and demand has spiked, but businesses must be wary of hidden cloud "gotchas" when it comes to modernizing and scaling their cloud infrastructure.

Cloud 516
article thumbnail

Juniper aligns its security portfolio with the SASE model

Network World

The conga line around secure-access service edge (SASE) , continues to grow with Juniper this week becoming the latest to join the dance. Just as other big networking players with extensive security portfolios including Cisco and VMware have recently done, Juniper says it will build off its offerings to address the SASE blueprint. Read about edge networking.

Security 378
article thumbnail

Phishing attack spoofs Twitter to steal account credentials

Tech Republic Security

A new phishing campaign spotted by Abnormal Security attempts to trick people with a phony Twitter security notification.

Security 545
article thumbnail

The Podcast Wars Have Begun

Forrester IT

Marvel vs. DC Gets A Podcast Reboot, With Spotify And SiriusXM Choosing Sides In October 2019, SiriusXM announced a partnership with Marvel for exclusive podcasts on its platforms, SiriusXM and Pandora. And just two weeks ago, Spotify answered with its own super-partnership: a slate of original, exclusive podcasts from DC and Warner Bros. This isn’t […].

423
423
article thumbnail

The AI Race Isn’t Just About Tech Superiority – Its the Supply Chain, Stupid!

The race to dominate AI is no longer about who has the smartest algorithms — it's about who can build and scale faster. Behind every AI breakthrough lies a battle for resources: data centers, compute hardware, power, and telecom infrastructure. And right now, even tech giants are hitting a wall. Our latest white paper reveals the six critical supply chain elements that are increasingly separating AI leaders from the rest.

article thumbnail

Deploying and Managing Hybrid IT Architectures

Information Week

Here are three steps IT teams can take to create a strategy for a unified IT architecture as they deal with surges in cloud adoption and greater demands for cloud services.

article thumbnail

Connecting The Industrial Internet Of Things With Smart AI Objects

CTOvision

Read John Clemons’ article about connecting industrial Internet Of Things with smart AI objects on Forbes : Smart manufacturing, Industry 4.0 and the industrial internet of things (IIoT) are discussed […].

Internet 319
article thumbnail

BYOD: A trend rife with security concerns

Tech Republic Security

Researchers explored the implications of allowing employees to bring their own devices for sensitive work tasks.

Trends 540
article thumbnail

Forecasting In Uncertainty: IMF World Forecasts Of Deeper 2020 Pandemic Recessions Foreshadow Weaker Tech Markets

Forrester IT

On June 24, the International Monetary Fund (IMF) released its updated forecasts for global and country economic growth (World Economic Outlook Update, June 2020). The updates to its April 2020 report show a deeper recession in 2020 and a shallower recovery in 2021 for the world economy as a whole, as well as for most […].

Report 357
article thumbnail

Automation, Evolved: Your New Playbook for Smarter Knowledge Work

Speaker: Frank Taliano

Documents are the backbone of enterprise operations, but they are also a common source of inefficiency. From buried insights to manual handoffs, document-based workflows can quietly stall decision-making and drain resources. For large, complex organizations, legacy systems and siloed processes create friction that AI is uniquely positioned to resolve.

article thumbnail

3 Key Stages for Effective Data Modernization

Information Week

Don't get stuck in a room going nowhere. Follow the Plan-Build-Execute model, and your data modernization initiative will lead to success.

Data 498
article thumbnail

Ransomware + Exfiltration + Leaks = Data Breach

CTOvision

Read why Mathew J. Schwartz says that when organizations get hit by crypto-locking malware, preceded by data exfiltration, is it right to still label these incidents as being just ransomware […].

Data 302
article thumbnail

Joker billing fraud malware eluded Google Play security to infect Android devices

Tech Republic Security

A new variant targeted Android users to subscribe them to premium services without their consent, according to Check Point Research.

Malware 537
article thumbnail

Open Banking Implementation Issues Give Rise To A New Breed Of Intermediaries

Forrester IT

For banks, open banking implementation is not straightforward – differing standards, specifications, and deployments result in the need to resolve complexity across interfaces. Open banking intermediaries are forming a new technology segment within financial services, to meet this need and simplify compliance, offering integration and aggregation layers between banks and third-party providers.

Banking 322
article thumbnail

How AI Is Revolutionizing Contact Centers: 2025 Strategy + ROI Playbook

In 2025, contact centers aren’t just changing—they’re being rebuilt by AI. This no-fluff, executive-ready guide shows you how to capitalize on the transformation. Inside: proven ROI calculators, workforce optimization tactics, deflection strategies, and a 90-day AI deployment plan. Built for CIOs, COOs, CX leaders, and contact center strategists, it goes beyond buzzwords into play-by-play implementation.

article thumbnail

How CIOs Can Keep Up with Changing Customer Needs

Information Week

The role of the chief information officer is becoming ever-more important in creating experiences that drive long-term market success.

443
443
article thumbnail

AI and security: Machine learning is a threat detection game-changer

CTOvision

Read why Ramsés Gallego feels that machine learning is a game-changer in threat detection on Tech Beacon : Organizations are deluged with billions of security events every day, far too […].

Security 300
article thumbnail

How expired domain names can redirect you to malicious websites

Tech Republic Security

Pages for inactive domain names can be exploited by cybercriminals to take you to malicious sites, says Kaspersky.

523
523
article thumbnail

DBS Bank followed four design principles when building their enterprise data platform

Forrester IT

I recently had the pleasure to talk with Siew Choo So, Group Head Consumer Banking Technology and Big Data/AI at DBS, on how the bank has set up their enterprise data platform to enable a data driven organization. That session was part of Forrester’s APAC Financial Services Webcast Week 2020, and you can find the […].

Banking 293
article thumbnail

State of AI in Sales & Marketing 2025

AI adoption is reshaping sales and marketing. But is it delivering real results? We surveyed 1,000+ GTM professionals to find out. The data is clear: AI users report 47% higher productivity and an average of 12 hours saved per week. But leaders say mainstream AI tools still fall short on accuracy and business impact. Download the full report today to see how AI is being used — and where go-to-market professionals think there are gaps and opportunities.

article thumbnail

Taking Steps To Boost Automated Cloud Governance

Information Week

ONUG's recent whitepaper outlines how establishing uniform event reporting could lead to improved transparency from cloud providers.

Cloud 416
article thumbnail

The CSA IoT Security Controls Framework

CTOvision

Read Anastasios Arampatzis make a case for IoT Security Framework on Tripwire : The Internet of Things (IoT) is growing in technical, social, and economic significance. ENISA defines the increasingly […].

Security 295
article thumbnail

Cloud environments are making the security alert overload problem worse

Tech Republic Security

Companies say that automation helps ease the burden but most have a long way to go to reach full implementation, according to new survey.

Survey 496
article thumbnail

FORRward: A Weekly Read For Tech And Marketing Execs

Forrester IT

Walmart Takes The Lead In The Race To Fix Healthcare With New Health Supercenters As healthcare clinics start to reopen, many patients continue to put off necessary care. For some, cost is a major barrier to care. While the hurdle is not new, rising unemployment and financial uncertainty make it harder, if not impossible, to overcome. At the same time, providers also face a dire financial situation.

article thumbnail

Conquering Tail Spend in 2025: New AI-Powered Tools and Strategies for Success

Tail spend — often unmanaged, fragmented and costly — can account for as much as 80% of total transaction volume. Without the right strategy, enterprises face hidden risks and unnecessary spend. It’s time to shift from fragmented, ad hoc purchasing to a strategic, technology-driven approach. Download this GEP-sponsored Everest Group research for insights on how your competitors are upping their tail spend management game.

article thumbnail

The Best Way to Get Started with Data Analytics

Information Week

As data analytics matures, it's attracting a wider range of adopters. Here's how your organization can tap into this essential business technology.

Data 369
article thumbnail

OODA Launches New On Demand Video Series Aimed At Executive Development

CTOvision

The latest OODA Network member benefit is a video on demand series that provides expert context from our analysts. Current titles in our on demand video library include: A Practitioner’s View of […].

Video 283
article thumbnail

Microsoft warns organizations of consent phishing attacks

Tech Republic Security

In this type of phishing campaign, attackers trick people into giving a malicious app consent to access sensitive data, says Microsoft.

Microsoft 492
article thumbnail

Natural language processing: A cheat sheet

Tech Republic Cloud

Learn the basics about natural language processing, a cross-discipline approach to making computers hear, process, understand, and duplicate human speech.

218
218
article thumbnail

The Ultimate Contact Center Buyers Guide: A Crucial Decision

Harness the True Power of your Contact Center In today’s fast-paced business environment, selecting the right contact center solution is critical for enhancing customer experience, improving operational efficiency, and optimizing costs. This comprehensive guide will walk you through the essential factors to consider when choosing a contact center software that aligns with your business needs.