A curated technology Newsletter with no Company or Product reviews

Published twice weekly to keep you informed

 

IT Weekly Newsletter July 7, 2020

Articles Added from 7-3-2020 to7-7-20-2020

 

"We don't know who we are until we see what we can do."

Martha Grimes, Writer

 

An API to access our SQL repository of article links and metadata can be added to your internal or external website that would assist in keeping your staff up to date and/or visitors on your site.  Call us at 602-463-6558 for pricing. Imagine the productivity if we can save one hour per staff per week in staying current.

 

In addition to these recent articles added since the last Newsletter search over 16,570+ archived articles using the SEARCH box with a keyword or keywords.

 

SECURITY

 

Why Securing Endpoints Is the Future of Cybersecurity

The Key to Stopping Cyberattacks? Understanding Your Own Systems Before the Hackers Strike

Introducing 'Secure Access Service Edge'

Forensic Investigation: Extract Volatile Data (Manually)

Multiple Ways to Banner Grabbing

Tre:1 Vulnhub Walkthrough

Using Deception to Improve Cyber Resilience By Turning the Tables On Attackers

How Have I Been Pwned Became the Keeper of the Internets Biggest Data Breaches

 

CLOUD TECHNOLOGY

 

Why Cloud First Is Not a Security Problem

How Liberty Mutuals Cloud Journey Led to Going Serverless

 
MANAGEMENT and LEADERSHIP

 

Why Are Real IT Cyber Security Improvements So Hard to Achieve?

 

NETWORKS and CONNECTIVITY

 

What's the Difference Between Wi-Fi and the Internet?

What to Know About VPN Termination

SD-WAN Explained: The Ultimate Guide to SD-WAN Architecture

Unsecured Satellite Communications Present a Gateway to Hackers

Getting the Big Picture: Auditing Your Network

Warning: IT Professionals are No Longer Able to Make Changes to Their Network Infrastructure

The Five Most Common Security Mistakes Made in SD-WAN Implementations

 

DEVOPS and AGILE DEVELOPMENT

 

DATA PROTECTION and ANALYTICS

 

What Ethical Models for Autonomous Vehicles Don't Address, and How They Could Be Better

The Largest Cyber Attack of All Time Is Coming. And AI Could Help Stop It.

Using Embedded Analytics in Software Applications Can Drive Your Business Forward

 

DATA CENTER OPERATIONS

 

GEEK STUFF

 

Atomic 'Swiss Army Knife' Precisely Measures Materials for Quantum Computers

This Early Flip Phone Cost an Astonishing $1,000 and Proves Just How Far We've Come

Coordinating Complex Behaviors Between Hundreds of Robots

Spintronics: Faster Data Processing Through Ultrashort Electric Pulses

 

SERVER ADMINISTRATION

 

Top 5 Skills for Systems Admins To Learn

Energy-Saving Servers: Data Storage 2.0

 

STORAGE TECHNOLOGIES

 

AUDIT and COMPLIANCE

 

Considerations for Seamless CCPA Compliance

Taking Steps to Boost Automated Cloud Governance

 

POTPOURRI

 

We do not use cookies or collect, store or save any information on visitors.  The only items we collect are that someone visited and the articles viewed. We never share or sell our subscriber list.

 

 

Feel free to forward the Newsletter to your staff, associates, peers and anyone involved in IT

 

Warren Avery

602-463-6558

wavery@ITWeeklyNewsletter.com

http://www.linkedin.com/in/wavery

 

If you would like to advertise with us, give me a call.

 

If you would prefer not to receive further newsletters:

 

1. Click on the Reply button.

2. Replace the Subject field with the word REMOVE.

3. Click the Send button.

 

URL links, link contents and Trademarks are copyright of their respective owners.