Popular IT Articles, Week of March 8th Vol 276 Issue 1
IT News and Events Vol 276 Issue1

Popular IT Articles, Week of March 8th Vol 276 Issue 1

Each week I curate 60-80 articles from a large number of mainstream IT publications. I publish a newsletter with those articles to an audience of 40k+ IT professionals and I track which are the most clicked articles. This is a report of the most popular articles in the current issue.

CxO


5 Must-Read Harvard Business Review Articles In March

Check out these five thought-provoking HBR articles, curated especially for CIOs and IT leaders

7 Ways COVID-19 Has Changed IT Forever

Things will never be the same. Here's a look at what IT will look like as the COVID-19 threat recedes

Why IT Is Shifting Gears And Priorities In 2021

2020 was a SHIFT show - yes, I said 'shift.' Whole organizations had to abruptly shift to remote work in the spring. And although vaccinations are being injected into arms as we speak, it doesn't mean things will return to 'normal' in 2021

12 Service Level Agreement (SLA) Best Practices For IT Leaders

Service Level Agreements (SLAs) help IT leaders get the most from technology vendors and service providers. Are your best practices for SLAs up to date?

How To Deliver IT Resilience While Adapting To The New Normal

Leveraging networks in the new normal

What Are The Advantages And Disadvantages Of RPA?

While RPA offers several benefits in the enterprise, there are also a few drawbacks. According to experts, these are the top eight pros and five cons of RPA for organizations to consider

Companies Overestimate Ability To Manage Remote Worker Security

Companies in the U.S. and U.K. overestimated their ability to handle remote work, with 73% reporting new challenges in IT security

Accelerating Digital Transformation: The CIO Role And Why It's Important

Cybersecurity. Supply chains. Archaic legacy systems. High-risk acquisitions. Outdated infrastructure. The federal government faces significant challenges when it comes to delivering secure information technology operations and mission outcomes

6 IT Leadership Lessons For The Future, From New York CIO Of The Year Winners

Churchill said, "Never let a good crisis go to waste."

Why Businesses Lacking It Flexibility Risk Being Left Behind

If businesses don't posses IT system flexbility, they will ultimately be left behind.

Digital Transformation: 5 New Realities For CIOs

After the upheaval of 2020, are you cultivating employee loyalty? Baking security in from the start? CIOs leading digital transformation in 2021 face new risks and opportunities


CxO Events


CSO Virtual Roundtable: Implement Insider Risk Management Without Compromising Business Speed (Mar. 10th)

Learn and network with IT executives on the topic of implementing insider risk management without compromising business speed

2021 HMG Live! Florida CIO Executive Leadership Summit (March 11th)

Courageous Leadership And Fearless Reinvention: Guiding The Modern Enterprise In Turbulent Times

CIO: Making hybrid cloud a reality: An HCI game plan (March 9th)

Join us to learn and network with IT executives on how and why HCI is a key catalyst for making hybrid cloud a reality

CIO: Transforming IT Organization to Manage the SAP Ecosystem in Hybrid Cloud Environments (March 10th)

Join CIO contributing editor Lane Cooper and subject-matter experts from our roundtable sponsor, IBM, for a private, interactive, virtual roundtable to discuss this study and more

CIO: Improve Business Growth With AI-Powered Automation (March. 10th)

Capitalize on AI and Automation and reclaim employee time, boost productivity and support innovation

CIO: Creating a Single Source of Customer Insight in a Multi-Channel World (March 9th)

Join CIO contributing editor Julia King and subject-matter experts from our roundtable sponsor, CallMiner, Inc., for a private, interactive, virtual roundtable.

CIO: Emerging Enterprise Application Strategies for Optimizing Business Transformation (March 11th)

According to analysts at IDC, competitive differentiation will increasingly require digital transformation initiatives that harness intelligent enterprise applications.

CIO: Strategies for Future Proofing Business Process Automation (March 17th)

Join CIO contributing editor Lane Cooper, and subject-matter experts from our roundtable sponsor, IBM, for a private, interactive, virtual roundtable.

FutureCon: Eastern/Atlanta CyberSecurity Conference (April 8th)

Join us as we talk with a panel of C-level executives who have effectively mitigated the risk of Cyber Attacks.

CSO: Cybersecurity Summit (March 16-18)

New Year, New Risks, New Strategies

Future:NET2021: A Premier Networking Event (March 23rd)

The new normal of networking is a constantly evolving, always-on, anywhere and everywhere reality. Engage with us at Future:NET 2021 as we set the coordinates.

CSO: The Evolving Approach to Risk Analysis - Threat Modeling Through Digital Transformation (March 23rd)

Join Bob Bragdon, SVP/Managing Director Worldwide, CSO and subject-matter experts from our sponsor, OpenText, for a private, interactive, virtual roundtable

DDN invites you to a Virtual Trivia and Networking Event. (March 17th)


Security


Seven Out Of 10 Organizations Report Facing New Security Challenges As A Result Of The Pandemic, Though Only A Third Consider Cybersecurity A Top Priority For 2021

Tanium survey of IT decision makers finds that enterprises are observing uptick in risky behaviors since shift to remote work, including mishandling of confidential data, phishing and Shadow IT

What Is End-To-End Encryption & How Does It Work?

Over the past few years, the vulnerability of social networks like Facebook or messaging apps like Chat has given rise to using end-to-end encrypted platforms to protect communications.

Top Trends In IT Security And Networking In 2021

One of the most prominent realizations in the post-pandemic world was that everyone had to be prepared for all the outcomes of the sudden digital transformation

CrowdSec - Open Source Security Automation Tool

CrowdSec is a massively multiplayer firewall designed to protect Linux servers, services, containers, or virtual machines exposed on the internet with a server-side agent. It was inspired by Fail2Ban and aims to be a modernized, collaborative version of that intrusion-prevention tool

Week In Review: Exchange Servers Under Attack, Disinformation Economics, Patch Tuesday Forecast

Here's an overview of some of last week's most interesting news and articles:

Cybersecurity Top 5 Lessons Learned From COVID-19

In the minds of many people, this transition from physical to digital is inevitable, unstoppable, and irrevocable, even though cash is still used for most retail purchases globally (COVID-19 influence aside).

It's An Amazing Time To Be In Digital Identity

ForgeRock has a rich history of transforming the digital identity experiences for the most successful companies on the planet

Gartner And The Top Strategic Technology Trends For 2021

For organizations the world over, COVID-19 led to drastic operational changes overnight

Detecting Privilege Escalation

During the first half of 2020 alone, over 36 billion records were exposed through various data breaches, with the FBI reporting an increase of 300% in reports since the onset of the COVID-19 pandemic

Edge Computing Growth Drives New Cybersecurity Concerns

Edge computing is proving to be more than just a trend. Research giant Gartner predicts that by 2025, some 75% of enterprise-generated data will be created and processed outside of the traditional data center or cloud.

Cybersecurity Trends And Emerging Threats In 2021

The year 2021 is finally here, bringing with it the promise of a brighter future - but a long road ahead


FOSS


IT Leaders See Open Source As Higher Quality

Top benefits of using open source are higher quality and innovation, while barriers include support and compatibility, according to recent Red Hat survey

LibreOffice 7.1 Office Suite Gets First Point Release, Over 90 Bugs Were Fixed

The Document Foundation announced today the general availability of the first point release to its latest LibreOffice 7.1 open-source and cross-platform office suite series

Enterprises Embraced Open Source During The Pandemic

The pandemic may have left an indelible mark on cloud infrastructure and enterprise open source software, according to a new report commissioned by Red Hat, the purveyor of enterprise open source software products IBM picked up for $34 billion in 2018


Technology


HDMI 2.1: What The New Cable Standard Means For Your TV

HDMI 2.1 is bringing faster gaming and even 8K to your TV

RISC-V Is On a Roll. Is It Ready to Take a Seat Alongside Intel, AMD, and Arm?

RISC-V International's CTO says the open source ISA is bound for the data center as CPU in everything from IoT to HPC


AI


5 Ways In Which AI Is Revolutionizing Finance & Insurance

Finance is a diverse field that encompasses different functions. Rapid technological advances over the past decade have changed the way finance teams work

How To Meet The Enterprise-Grade Challenge Of Scaling AI

Organizations that have made a commitment to developing AI projects and have experienced some success next face the challenges around successfully scaling the project for the enterprise

Artificial Intelligence (AI) Tools Realities: 5 Questions To Ask Your Developers

IT leaders need to understand some hard truths of Artificial Intelligence tools in order to shape AI strategy. Consider these key questions to discuss with your developers


Cloud


5 Steps For A Successful Multicloud Strategy

Most of the customers I speak with today are dealing with two distinct yet related challenges. First, they're having to store, manage, and make sense of more data than ever before. Second, they have more options than ever before to do this.

Decentralizing Cloud Security Management

People are right to be concerned about cloud security risks. The agility, flexibility, scalability and affordability of cloud, while addressing many IT infrastructure challenges, also introduces a host of security risks and potential vulnerabilities

Why Cloud Security Risks Have Shifted To Identities And Entitlements

Traditional security tools focus on the network perimeter, leaving user and service accounts vulnerable to hackers


BI


Decision Intelligence: The New BI

Business intelligence systems and strategies are being augmented with AI and machine learning to provide decision-making context and recommendations across the enterprise


Operations


9 Must-Do Security Protocols Companies Must Embrace To Stem Remote Work Risks

Technology advancements have made it relatively easy for many employees to carry out their regular job duties from the comfort of their home

Gain Control Of Enterprise's Great Energy Hog: The Data Center

What do CIOs need to know about the changing profile of data center energy usage?


ERP


How To Successfully Implement An ERP System

Enterprise resource management systems are large, with a lot of moving parts. A thoughtful management strategy can help ensure your deployment goes off without a hitch


Server


Why The Mainframe Is Alive And Thriving

Mainframes entered the market in the early 1950's when IBM and the seven dwarfs (Burroughs, Unisys, NCR, Control Data, Honeywell, GE, and RCA) created the computing age and competed for critical applications, sophisticated modeling, and large-scale transactions and workloads among the largest of organizations


Email


The Top Email Clients And Apps Of 2021

We've all been there - struggling to send a perfectly-targeted campaign, trying to figure out which clients our audience uses, and wondering how we can make sure our email looks and sounds great no matter where and how they're viewing it. What can possibly solve these problems?


Backup


Compare File Sync vs. Backup For Data Protection

The use of both file syncs and backups could be beneficial for enterprises, as each has its advantages. Pay particular attention to security and point-in-time recovery.


IoT


How To Build A Secure Future On The Edge

Why you should harden your edge infrastructure

Edge Computing Set To Explode Alongside Rise Of 5G

Organizations have been deploying code on edge computing platforms for years. With the rise of 5G wireless networking, the size and scope of those efforts are about to dramatically expand.


Encryption


What Is Encryption Key Management And KMS Implementation?

This article examines the challenges associated with encryption key management while demonstrating how our ARIA KMS solution can overcome them

Contrasting The Different Data Encryption Techniques For Optimal Security

Proper data encryption is vital to modern data security and protection


DR


Five Ways That Disaster Recovery Changes In A Pandemic

COVID-19 has changed IT. Previously, working remotely was a business continuity measure, but now it is the norm. That means disaster recovery has to adapt to new risks and new ways to respond


DevOps


DevOps Myths Debunked

Leaders need not be DevOps experts, but they need to distinguish DevOps myths and realities to lead their digital transformation projects


Storage


Flash Memory Summit 2020 Sessions From Day Three

In this FMS on-demand content library, delve into storage trends and updates -- from computational storage to artificial intelligence and machine learning and more

IT News and Events


To view or add a comment, sign in

Insights from the community

Others also viewed

Explore topics