A curated technology Newsletter with no Company or Product reviews

Published twice weekly to keep you informed

 

IT Weekly Newsletter August 12, 2020

Articles Added from 8-8-2020 to 8-11-2020

 

"Good leadership consists of showing average people how to do the work of superior people."

John D. Rockefeller (1839 -1937) American Industrialist and Philanthropist

 

Weekly Podcast with Small World Big Data

 

An API to access our SQL repository of article links and metadata can be added to your internal or external website that would assist in keeping your staff up to date and/or visitors on your site.  Call us at 602-463-6558 for pricing. Imagine the productivity if we can save one hour per staff per week in staying current.

 

In addition to these recent articles added since the last Newsletter search over 16,570+ archived articles using the SEARCH box with a keyword or keywords.

 

SECURITY

 

Broken 2020: 1 Vulnhub Walkthrough

Forensic Investigation: Examine Corrupt File Metadata

Embedding Cyber Security Into Your Structure and Objectives

Ransomware: These Warning Signs Could Mean You Are Already Under Attack

How Was Reddit Defaced?

CISA Finalized Directive on Vulnerability Disclosure Policies, Congressman Says

Bypassing Biometric Scanners with 3D Printed Fingerprints

4 Steps to Help You Plan a Cyber Resilience Roadmap

CISO Role <> Evolution Map

 

CLOUD TECHNOLOGY

 

Simplify Cloud Migrations to Avoid Refactoring and Repatriation

When Cloud Is Not Reliable: 4 Tips to Deal with Cloud Outages

What Are the Benefits of Cloud Managed Services?

How to Choose a Cloud Machine Learning Platform

 

MANAGEMENT and LEADERSHIP

 

Cyber Insurance: Seven Questions You Need to Consider Before Buying

7 Questions to Ask Before Implementing New Technology

The One Question You Have to Answer Correctly Every Time

Hacking It as a CISO: Advice for Security Leadership

How To Become a Better Storyteller: 3 Key Points

Digital Transformation: 5 Truths of Successful Leadership

4 Interview Questions to Avoid Hiring Toxic Employees

Pandemic Elevates Security Chiefs to Corporate Leadership Roles

 

NETWORKS and CONNECTIVITY

 

NIST's SAMURAI Measures 5G Communications Channels Precisely

 

DEVOPS and AGILE DEVELOPMENT

 

DevOps is Transforming Database Development In the Healthcare Sector

6 Lessons Learned from 'The Phoenix Project'

 

DATA PROTECTION and ANALYTICS

 

Conversational AI Comes of Age

Whats Wrong With This Picture? Teaching AI to Spot Adversarial Attacks

 

DATA CENTER OPERATIONS

 

What Are the Benefits of Automated, Cloud-Native Patch Management?

How AI can Create Self-Driving Data Centers

 

GEEK STUFF

 

Grasshopper Jumping on Bloch Sphere Finds New Quantum Insights

Security in IoT Why It Matters

 

SERVER ADMINISTRATION

 

What is Container Management and Why Is It Important?

 

STORAGE TECHNOLOGIES

 

AUDIT and COMPLIANCE

 

Data Privacy in 2020: An Update on CCPA

Good Security Governance Is Not a Piece of Useless Consultant Jargon

4 Ways to Prepare for Cybersecurity Maturity Model Certification

 

POTPOURRI

 

  We do not use cookies or collect, store or save any information on visitors.  The only items we collect are that someone visited and the articles viewed. We never share or sell our subscriber list.

 

 

Feel free to forward the Newsletter to your staff, associates, peers and anyone involved in IT

 

Warren Avery

602-463-6558

wavery@ITWeeklyNewsletter.com

http://www.linkedin.com/in/wavery

 

If you would like to advertise with us, give me a call.

 

If you would prefer not to receive further newsletters:

 

1. Click on the Reply button.

2. Replace the Subject field with the word REMOVE.

3. Click the Send button.

 

URL links, link contents and Trademarks are copyright of their respective owners.