Popular IT Articles, Week of March 8th Vol 276 Issue 1
Each week I curate 60-80 articles from a large number of mainstream IT publications. I publish a newsletter with those articles to an audience of 40k+ IT professionals and I track which are the most clicked articles. This is a report of the most popular articles in the current issue.
CxO
5 Must-Read Harvard Business Review Articles In March
Check out these five thought-provoking HBR articles, curated especially for CIOs and IT leaders
7 Ways COVID-19 Has Changed IT Forever
Things will never be the same. Here's a look at what IT will look like as the COVID-19 threat recedes
Why IT Is Shifting Gears And Priorities In 2021
2020 was a SHIFT show - yes, I said 'shift.' Whole organizations had to abruptly shift to remote work in the spring. And although vaccinations are being injected into arms as we speak, it doesn't mean things will return to 'normal' in 2021
12 Service Level Agreement (SLA) Best Practices For IT Leaders
Service Level Agreements (SLAs) help IT leaders get the most from technology vendors and service providers. Are your best practices for SLAs up to date?
How To Deliver IT Resilience While Adapting To The New Normal
Leveraging networks in the new normal
What Are The Advantages And Disadvantages Of RPA?
While RPA offers several benefits in the enterprise, there are also a few drawbacks. According to experts, these are the top eight pros and five cons of RPA for organizations to consider
Companies Overestimate Ability To Manage Remote Worker Security
Companies in the U.S. and U.K. overestimated their ability to handle remote work, with 73% reporting new challenges in IT security
Accelerating Digital Transformation: The CIO Role And Why It's Important
Cybersecurity. Supply chains. Archaic legacy systems. High-risk acquisitions. Outdated infrastructure. The federal government faces significant challenges when it comes to delivering secure information technology operations and mission outcomes
6 IT Leadership Lessons For The Future, From New York CIO Of The Year Winners
Churchill said, "Never let a good crisis go to waste."
Why Businesses Lacking It Flexibility Risk Being Left Behind
If businesses don't posses IT system flexbility, they will ultimately be left behind.
Digital Transformation: 5 New Realities For CIOs
After the upheaval of 2020, are you cultivating employee loyalty? Baking security in from the start? CIOs leading digital transformation in 2021 face new risks and opportunities
CxO Events
CSO Virtual Roundtable: Implement Insider Risk Management Without Compromising Business Speed (Mar. 10th)
Learn and network with IT executives on the topic of implementing insider risk management without compromising business speed
2021 HMG Live! Florida CIO Executive Leadership Summit (March 11th)
Courageous Leadership And Fearless Reinvention: Guiding The Modern Enterprise In Turbulent Times
CIO: Making hybrid cloud a reality: An HCI game plan (March 9th)
Join us to learn and network with IT executives on how and why HCI is a key catalyst for making hybrid cloud a reality
CIO: Transforming IT Organization to Manage the SAP Ecosystem in Hybrid Cloud Environments (March 10th)
Join CIO contributing editor Lane Cooper and subject-matter experts from our roundtable sponsor, IBM, for a private, interactive, virtual roundtable to discuss this study and more
CIO: Improve Business Growth With AI-Powered Automation (March. 10th)
Capitalize on AI and Automation and reclaim employee time, boost productivity and support innovation
CIO: Creating a Single Source of Customer Insight in a Multi-Channel World (March 9th)
Join CIO contributing editor Julia King and subject-matter experts from our roundtable sponsor, CallMiner, Inc., for a private, interactive, virtual roundtable.
CIO: Emerging Enterprise Application Strategies for Optimizing Business Transformation (March 11th)
According to analysts at IDC, competitive differentiation will increasingly require digital transformation initiatives that harness intelligent enterprise applications.
CIO: Strategies for Future Proofing Business Process Automation (March 17th)
Join CIO contributing editor Lane Cooper, and subject-matter experts from our roundtable sponsor, IBM, for a private, interactive, virtual roundtable.
FutureCon: Eastern/Atlanta CyberSecurity Conference (April 8th)
Join us as we talk with a panel of C-level executives who have effectively mitigated the risk of Cyber Attacks.
CSO: Cybersecurity Summit (March 16-18)
New Year, New Risks, New Strategies
Future:NET2021: A Premier Networking Event (March 23rd)
The new normal of networking is a constantly evolving, always-on, anywhere and everywhere reality. Engage with us at Future:NET 2021 as we set the coordinates.
CSO: The Evolving Approach to Risk Analysis - Threat Modeling Through Digital Transformation (March 23rd)
Join Bob Bragdon, SVP/Managing Director Worldwide, CSO and subject-matter experts from our sponsor, OpenText, for a private, interactive, virtual roundtable
DDN invites you to a Virtual Trivia and Networking Event. (March 17th)
Security
Seven Out Of 10 Organizations Report Facing New Security Challenges As A Result Of The Pandemic, Though Only A Third Consider Cybersecurity A Top Priority For 2021
Tanium survey of IT decision makers finds that enterprises are observing uptick in risky behaviors since shift to remote work, including mishandling of confidential data, phishing and Shadow IT
What Is End-To-End Encryption & How Does It Work?
Over the past few years, the vulnerability of social networks like Facebook or messaging apps like Chat has given rise to using end-to-end encrypted platforms to protect communications.
Top Trends In IT Security And Networking In 2021
One of the most prominent realizations in the post-pandemic world was that everyone had to be prepared for all the outcomes of the sudden digital transformation
CrowdSec - Open Source Security Automation Tool
CrowdSec is a massively multiplayer firewall designed to protect Linux servers, services, containers, or virtual machines exposed on the internet with a server-side agent. It was inspired by Fail2Ban and aims to be a modernized, collaborative version of that intrusion-prevention tool
Week In Review: Exchange Servers Under Attack, Disinformation Economics, Patch Tuesday Forecast
Here's an overview of some of last week's most interesting news and articles:
Cybersecurity Top 5 Lessons Learned From COVID-19
In the minds of many people, this transition from physical to digital is inevitable, unstoppable, and irrevocable, even though cash is still used for most retail purchases globally (COVID-19 influence aside).
It's An Amazing Time To Be In Digital Identity
ForgeRock has a rich history of transforming the digital identity experiences for the most successful companies on the planet
Gartner And The Top Strategic Technology Trends For 2021
For organizations the world over, COVID-19 led to drastic operational changes overnight
Detecting Privilege Escalation
During the first half of 2020 alone, over 36 billion records were exposed through various data breaches, with the FBI reporting an increase of 300% in reports since the onset of the COVID-19 pandemic
Edge Computing Growth Drives New Cybersecurity Concerns
Edge computing is proving to be more than just a trend. Research giant Gartner predicts that by 2025, some 75% of enterprise-generated data will be created and processed outside of the traditional data center or cloud.
Cybersecurity Trends And Emerging Threats In 2021
The year 2021 is finally here, bringing with it the promise of a brighter future - but a long road ahead
FOSS
IT Leaders See Open Source As Higher Quality
Top benefits of using open source are higher quality and innovation, while barriers include support and compatibility, according to recent Red Hat survey
LibreOffice 7.1 Office Suite Gets First Point Release, Over 90 Bugs Were Fixed
The Document Foundation announced today the general availability of the first point release to its latest LibreOffice 7.1 open-source and cross-platform office suite series
Enterprises Embraced Open Source During The Pandemic
The pandemic may have left an indelible mark on cloud infrastructure and enterprise open source software, according to a new report commissioned by Red Hat, the purveyor of enterprise open source software products IBM picked up for $34 billion in 2018
Technology
HDMI 2.1: What The New Cable Standard Means For Your TV
HDMI 2.1 is bringing faster gaming and even 8K to your TV
RISC-V Is On a Roll. Is It Ready to Take a Seat Alongside Intel, AMD, and Arm?
RISC-V International's CTO says the open source ISA is bound for the data center as CPU in everything from IoT to HPC
AI
5 Ways In Which AI Is Revolutionizing Finance & Insurance
Finance is a diverse field that encompasses different functions. Rapid technological advances over the past decade have changed the way finance teams work
How To Meet The Enterprise-Grade Challenge Of Scaling AI
Organizations that have made a commitment to developing AI projects and have experienced some success next face the challenges around successfully scaling the project for the enterprise
Artificial Intelligence (AI) Tools Realities: 5 Questions To Ask Your Developers
IT leaders need to understand some hard truths of Artificial Intelligence tools in order to shape AI strategy. Consider these key questions to discuss with your developers
Cloud
5 Steps For A Successful Multicloud Strategy
Most of the customers I speak with today are dealing with two distinct yet related challenges. First, they're having to store, manage, and make sense of more data than ever before. Second, they have more options than ever before to do this.
Decentralizing Cloud Security Management
People are right to be concerned about cloud security risks. The agility, flexibility, scalability and affordability of cloud, while addressing many IT infrastructure challenges, also introduces a host of security risks and potential vulnerabilities
Why Cloud Security Risks Have Shifted To Identities And Entitlements
Traditional security tools focus on the network perimeter, leaving user and service accounts vulnerable to hackers
BI
Decision Intelligence: The New BI
Business intelligence systems and strategies are being augmented with AI and machine learning to provide decision-making context and recommendations across the enterprise
Operations
9 Must-Do Security Protocols Companies Must Embrace To Stem Remote Work Risks
Technology advancements have made it relatively easy for many employees to carry out their regular job duties from the comfort of their home
Gain Control Of Enterprise's Great Energy Hog: The Data Center
What do CIOs need to know about the changing profile of data center energy usage?
ERP
How To Successfully Implement An ERP System
Enterprise resource management systems are large, with a lot of moving parts. A thoughtful management strategy can help ensure your deployment goes off without a hitch
Server
Why The Mainframe Is Alive And Thriving
Mainframes entered the market in the early 1950's when IBM and the seven dwarfs (Burroughs, Unisys, NCR, Control Data, Honeywell, GE, and RCA) created the computing age and competed for critical applications, sophisticated modeling, and large-scale transactions and workloads among the largest of organizations
The Top Email Clients And Apps Of 2021
We've all been there - struggling to send a perfectly-targeted campaign, trying to figure out which clients our audience uses, and wondering how we can make sure our email looks and sounds great no matter where and how they're viewing it. What can possibly solve these problems?
Backup
Compare File Sync vs. Backup For Data Protection
The use of both file syncs and backups could be beneficial for enterprises, as each has its advantages. Pay particular attention to security and point-in-time recovery.
IoT
How To Build A Secure Future On The Edge
Why you should harden your edge infrastructure
Edge Computing Set To Explode Alongside Rise Of 5G
Organizations have been deploying code on edge computing platforms for years. With the rise of 5G wireless networking, the size and scope of those efforts are about to dramatically expand.
Encryption
What Is Encryption Key Management And KMS Implementation?
This article examines the challenges associated with encryption key management while demonstrating how our ARIA KMS solution can overcome them
Contrasting The Different Data Encryption Techniques For Optimal Security
Proper data encryption is vital to modern data security and protection
DR
Five Ways That Disaster Recovery Changes In A Pandemic
COVID-19 has changed IT. Previously, working remotely was a business continuity measure, but now it is the norm. That means disaster recovery has to adapt to new risks and new ways to respond
DevOps
DevOps Myths Debunked
Leaders need not be DevOps experts, but they need to distinguish DevOps myths and realities to lead their digital transformation projects
Storage
Flash Memory Summit 2020 Sessions From Day Three
In this FMS on-demand content library, delve into storage trends and updates -- from computational storage to artificial intelligence and machine learning and more