2020

article thumbnail

Is a Ransomware Attack a Reportable Data Breach?

CTOvision

Read Mark Rasch take a look at whether a ransomware attack can be classified as a data breach on Security Boulevard : One question that vexes security engineers, incident responders […].

Data 372
article thumbnail

Coronavirus Cybercrimes: Are These the Lowest?

Information Technology Zone Submitted Articles

The coronavirus and pandemic cyberattacks.

246
246
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Artificial intelligence is hopelessly biased - and that's how it will stay

Information Technology Zone Submitted Articles

The issue is mired in complexity

article thumbnail

SolarWinds attack explained: And why it was so hard to detect

Network World

A group believed to be Russia's Cozy Bear gained access to government and other systems through a compromised update to SolarWinds' Orion software. Most organizations aren't prepared for this sort of software supply chain attack.

article thumbnail

The Ultimate Contact Center Buyers Guide: A Crucial Decision

Harness the True Power of your Contact Center In today’s fast-paced business environment, selecting the right contact center solution is critical for enhancing customer experience, improving operational efficiency, and optimizing costs. This comprehensive guide will walk you through the essential factors to consider when choosing a contact center software that aligns with your business needs.

article thumbnail

2020 Tech Towns Resilient Amid Uncertainty as Remote Work Grows

Association of Information Technology Professional

If 2020 has taught us anything, it’s to expect the unexpected—except, perhaps, when it comes to CompTIA's Tech Town Index. The 3rd annual report ranks the top 20 places in the US for IT pros to live and work, providing guidance on where opportunity intersects with affordability for both tech workers and tech companies. The 2020 report also covers remote work and how this trend is impacting the landscape of Tech Towns across the country.

Trends 339
article thumbnail

3 Things That Are More Important to IT Employers Than a College Degree

Association of Information Technology Professional

Those who don’t have a degree shouldn’t disqualify themselves from an IT career. Here are a few ways you can get into IT without going to college.

330
330

More Trending

article thumbnail

Top 5 tech skills to master in 2021

Tech Republic Security

If you want to improve or expand your current skill set, there are a few options you can focus on. Tom Merritt lists five tech skills to master in the coming year.

545
545
article thumbnail

It’s Time To Put Security And Privacy Front And Center For Virtual Care

Forrester IT

(Written with Benjamin Corey, senior research associate at Forrester) Telehealth (virtual care) usage has skyrocketed during the pandemic. When you roll back the tape a few months, healthcare providers were able to (very quickly) stand up virtual care capabilities without having to go through the intensive HIPAA compliance protocols required in the healthcare industry.

article thumbnail

How Data, Analytics & AI Shaped 2020, and Will Impact 2021

Information Week

Artificial intelligence and automation were key tools in the IT enterprises' pandemic war effort in 2020. Here's how they will continue to change the game in every organization in 2021.

article thumbnail

How Data, Analytics & AI Shaped 2020, and Will Impact 2021

Information Week

Artificial intelligence and automation were key tools in the IT enterprises' pandemic war effort in 2020. Here's how they will continue to change the game in every organization in 2021.

article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

10 IT Trends to Watch for in 2021

Information Week

Here's how the dramatic events of 2020 are likely to shape enterprise IT teams in the coming year, according to analysts from firms like Gartner, IDC, and Forrester.

Trends 545
article thumbnail

Phone scammers were able to get 270% more personal information in 2020 than in 2019

Tech Republic Security

The COVID-19 crisis enabled scammers to take advantage of the guileless, as bad actors were able to extract personal information from targets, according to a new report from First Orion.

Report 545
article thumbnail

Designing Your Roadmap for Rapid Digital Transformation

Information Week

While business and IT leaders are under pressure to boost their digital transformation plans, they should stop, rethink, and assess before fully diving into a roadmap.

545
545
article thumbnail

Quantum computing: A cheat sheet

Tech Republic Security

IBM, Honeywell, and Intel are just three companies leading the way in building quantum machines as well as the algorithms and controls to run them. Learn about possible business use cases for quantum.

IBM 546
article thumbnail

The 2025 Annual ProcureCon CPO Report

Procurement leaders are at a pivotal moment. With CPOs playing an increasingly strategic role, it’s time to leverage innovation and technology to drive resilience and efficiency. Download The 2025 Annual ProcureCon CPO Report to uncover key insights to thrive in a dynamic procurement landscape. What’s Inside: How CPOs are driving strategic decision-making and technology adoption The top priorities and challenges for procurement in 2025 Why AI, sustainability, and data analytics are essential for

article thumbnail

Linux: How to recover deleted files with testdisk

Tech Republic Security

If you've had files deleted by a hacker or you've accidentally removed them, Jack Wallen shows you how to recover that missing data with a handy tool called testdisk.

Linux 545
article thumbnail

4 phishing scams to watch out for during the holidays

Tech Republic Security

Fake shipping notices and charity frauds are two scams cited by the security company GreatHorn, which offers tips to consumers on how to avoid them.

Security 545
article thumbnail

How to Approach Your Mission-Critical Big Data Strategy

Information Week

Across industries, big data has joined traditional, structured data as a mission-critical element. Here's some advice for CIOs and big data leaders on how to get started.

Big Data 545
article thumbnail

The Ever-Expanding List of C-Level Technology Positions

Information Week

IT professionals are gaining more opportunities to move up the corporate ladder. Here are 10 C-level IT titles that we know of right now, along with salary averages for those roles.

545
545
article thumbnail

Enterprise ABM Marketing Tools: A Marketers Guide

Savvy B2B marketers know that a great account-based marketing (ABM) strategy leads to higher ROI and sustainable growth. In this guide, we’ll cover: What makes for a successful ABM strategy? What are the key elements and capabilities of ABM that can make a real difference? How is AI changing workflows and driving functionality? This Martech Intelligence Report on Enterprise Account-Based Marketing examines the state of ABM in 2024 and what to consider when implementing ABM software.

article thumbnail

Machine learning: A cheat sheet

Tech Republic Security

From Apple to Google to Toyota, companies across the world are pouring resources into developing AI systems with machine learning. This comprehensive guide explains what machine learning really means.

Apple 545
article thumbnail

Predictions 2021: The Path To A New Normal Demands Increased Cybersecurity Resilience

Forrester IT

In 2021, culture issues, budgets, and vendor shifts will be top priorities for cybersecurity leaders. Learn more in our 2021 cybersecurity predictions.

Budget 545
article thumbnail

Gartner: Top strategic technology trends for 2021

Network World

Companies need to focus on architecting resilience and accept that disruptive change is the norm, says research firm Gartner, which unveiled its annual look at the top strategic technology trends that organizations need to prepare for in the coming year. Gartner unveiled this year's list at its flagship IT Symposium/Xpo Americas conference, which is being held virtually this year.

Trends 546
article thumbnail

Why ransomware has become such a huge problem for businesses

Tech Republic Security

Ransomware has evolved into a significant threat for all types of organizations. How and why is it such a pervasive issue, and how can organizations better defend themselves against it?

545
545
article thumbnail

4 HR Priorities for 2025 to Supercharge Your Employee Experience

Speaker: Carolyn Clark and Miriam Connaughton

Forget predictions, let’s focus on priorities for the year and explore how to supercharge your employee experience. Join Miriam Connaughton and Carolyn Clark as they discuss key HR trends for 2025—and how to turn them into actionable strategies for your organization. In this dynamic webinar, our esteemed speakers will share expert insights and practical tips to help your employee experience adapt and thrive.

article thumbnail

Predictions 2021: Technology And Customer Obsession Help Firms Emerge From Crisis Mode

Forrester IT

It has never been more important for organizations to anticipate change, strengthen resilience, and become truly customer obsessed. Heading into 2021, technology — both new and existing — will help firms achieve these aims and emerge from the crisis on sound footing.

Trends 546
article thumbnail

Reducing Security Talent Attrition by Increasing Diversity

Information Week

CIOs and other IT leaders must attract, retain and hire professionals with broad cybersecurity skills, but that's not as easy as it sounds. Here's some advice.

Security 545
article thumbnail

5 strategies for CISOs during a time of rapid business transformation

Tech Republic Security

A survey of business leaders by PwC finds the pandemic is causing rapid changes in the roles CISOs play, and offers five tips for ensuring that security remains stable as we enter a new normal.

article thumbnail

Digital Transformation Strategies Are Failing. Here's Why.

Information Week

Every company's digital transformation plans got sidetracked by COVID-19, but there are additional reasons why their strategies are not full steam ahead.

Strategy 545
article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

How the enterprise can shut down cyber criminals and protect a remote staff

Tech Republic Security

Hackers accidentally allowed into company software by security noncompliant employees cost businesses millions annually; we asked experts to weigh in on best safety practices.

article thumbnail

IT Employment Looks Up; Data, Cybersecurity Skills in Demand

Information Week

There's a light at the end of the tunnel for IT pros who have been keeping a close eye on the job market. Plus, here are the skills that employers want in 2021.

Data 545
article thumbnail

Phishing emails: More than 25% of American workers fall for them

Tech Republic Security

A new global report on phishing attempts shows how the workforce has responded to security threats since COVID-19, and the new vulnerabilities that have resulted from the remote work landscape.

Report 544
article thumbnail

Still not dead: The mainframe hangs on, sustained by Linux and hybrid cloud

Network World

The mainframe has been declared “dead”, “morphed” and “transformed” so many times over the years sometimes it’s sometimes hard to believe the Big Iron still has an identity in the enterprise world. But clearly it does and in a major way, too. [ Lessons on diversity in IT: 10 professional organizations focused on diversity in tech • Being Black in IT: 3 tech leaders share their stories • Gender gapped: The state of gender diversity in IT • M?

IBM 545
article thumbnail

Improving the Accuracy of Generative AI Systems: A Structured Approach

Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage

When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.