A curated technology Newsletter with no Company or Product reviews
Published twice weekly to keep you informed
IT Weekly Newsletter June 16, 2020
Articles Added from 6-13-2020 to 6-16-2020
"Not everything that can be faced can be changed, but nothing can be changed that is not faced."
James Baldwin (1924 - 1987) American Writer
An API to access our SQL repository of article links and metadata can be added to your internal or external website that would assist in keeping your staff up to date and/or visitors on your site. Call us at 602-463-6558 for pricing. Imagine the savings if we can save one hour per staff per week in staying current.
In addition to these recent articles added since the last Newsletter search over 16,300+ archived articles using the SEARCH box with a keyword or keywords.
Three Years After Wannacry, What have We Learned?
Pandavas Vulnhub Walkthrough
Restructuring of IT Infrastructure to Take Several Months After Ransomware Attack, Says eHealth Saskatchewan
7 Must-Haves for a Rockin' Red Team
Kerberosting and Pass the Ticket Attack Using Linux
WinRM Penetration Testing
Hybrid Cloud Definition Is Being Redefined
MANAGEMENT and LEADERSHIP
Structuring the Hiring Interview
Ruthless Project Prioritization in Project Environments
The Impact of SD-WAN for Securing Public Cloud Adoption
Troubleshooting at the Physical Level
Why Traditional Network Perimeter Security No Longer Protects
DevOps Engineers: Common Misconceptions about the Role
Learn about SecOps: Cybersecurity basics for NetOps teams
5 Application Performance Metrics All Dev Teams Should Track
How Experts Run Shift-Left And Shift-Right Testing
Why DevSecOps Remains a Mirage
5 AIOps Strategies for Overcoming Common IT Obstacles
Employees Tend to Take Data While Quitting
The Definitive Guide to Enterprise IT Monitoring
Robotic Process Automation (RPA): 8 habits of Successful Teams
Cloud Backup Ultimately Requires a Cloud Native Architecture
RPA and Test Automation Are More Friends Than Foes
GEEK STUFF
Ripple20 Vulnerabilities Will Haunt the IoT Landscape for Years to Come
IoT Privacy and Security: Will Product Labels Help Buyers?
What is a Proxy Server and How Does It Work?
Pros and Cons of Cloud Storage
Audits as a Project Management Governance Tool
We do not use cookies or collect, store or save any information on visitors. The only items we collect are that someone visited and the articles viewed. We never share or sell our subscriber list.
Feel free to forward the Newsletter to your staff, associates, peers and anyone involved in IT
Warren Avery
602-463-6558
http://www.linkedin.com/in/wavery
If you would like to advertise with us, give me a call.
If you would prefer not to receive further newsletters:
1. Click on the Reply button.
2. Replace the Subject field with the word REMOVE.
3. Click the Send button.
URL links, link contents and Trademarks are copyright of their respective owners.