A curated technology Newsletter with no Company or Product reviews

Published twice weekly to keep you informed

 

IT Weekly Newsletter June 16, 2020

Articles Added from 6-13-2020 to 6-16-2020

 

"Not everything that can be faced can be changed, but nothing can be changed that is not faced."

James Baldwin (1924 - 1987) American Writer

 

An API to access our SQL repository of article links and metadata can be added to your internal or external website that would assist in keeping your staff up to date and/or visitors on your site.  Call us at 602-463-6558 for pricing. Imagine the savings if we can save one hour per staff per week in staying current.

 

In addition to these recent articles added since the last Newsletter search over 16,300+ archived articles using the SEARCH box with a keyword or keywords.

 

SECURITY

 

Three Years After Wannacry, What have We Learned?

Pandavas Vulnhub Walkthrough

Restructuring of IT Infrastructure to Take Several Months After Ransomware Attack, Says eHealth Saskatchewan

7 Must-Haves for a Rockin' Red Team

Kerberosting and Pass the Ticket Attack Using Linux

WinRM Penetration Testing

 

CLOUD TECHNOLOGY

 

Hybrid Cloud Definition Is Being Redefined

 

MANAGEMENT and LEADERSHIP

 

Structuring the Hiring Interview

Ruthless Project Prioritization in Project Environments

 

NETWORKS and CONNECTIVITY

 

The Impact of SD-WAN for Securing Public Cloud Adoption

Troubleshooting at the Physical Level

Why Traditional Network Perimeter Security No Longer Protects

 

DEVOPS and AGILE DEVELOPMENT

 

DevOps Engineers: Common Misconceptions about the Role

Learn about SecOps: Cybersecurity basics for NetOps teams

5 Application Performance Metrics All Dev Teams Should Track

How Experts Run Shift-Left And Shift-Right Testing

Why DevSecOps Remains a Mirage

5 AIOps Strategies for Overcoming Common IT Obstacles

 

DATA PROTECTION and ANALYTICS

 

Employees Tend to Take Data While Quitting

The Definitive Guide to Enterprise IT Monitoring

 

DATA CENTER OPERATIONS

 

Robotic Process Automation (RPA): 8 habits of Successful Teams

Cloud Backup Ultimately Requires a Cloud Native Architecture

RPA and Test Automation Are More Friends Than Foes

 

GEEK STUFF

 

Ripple20 Vulnerabilities Will Haunt the IoT Landscape for Years to Come

IoT Privacy and Security: Will Product Labels Help Buyers?

 

SERVER ADMINISTRATION

 

What is a Proxy Server and How Does It Work?

 

STORAGE TECHNOLOGIES

 

Pros and Cons of Cloud Storage

 

AUDIT and COMPLIANCE

 

Audits as a Project Management Governance Tool

 

POTPOURRI

 

We do not use cookies or collect, store or save any information on visitors.  The only items we collect are that someone visited and the articles viewed. We never share or sell our subscriber list.

 

 

Feel free to forward the Newsletter to your staff, associates, peers and anyone involved in IT

 

Warren Avery

602-463-6558

wavery@ITWeeklyNewsletter.com

http://www.linkedin.com/in/wavery

 

If you would like to advertise with us, give me a call.

 

If you would prefer not to receive further newsletters:

 

1. Click on the Reply button.

2. Replace the Subject field with the word REMOVE.

3. Click the Send button.

 

URL links, link contents and Trademarks are copyright of their respective owners.