A curated technology Newsletter with no Company or Product reviews

Published twice weekly to keep you informed

 

IT Weekly Newsletter May 26, 2020

Articles Added from 5-22-2020 to 5-26-2020

 

"Diversity is being invited to the party; inclusion is being asked to dance."

Verna Myers (1960 - ) Author and Speaker

 

An API to access our SQL repository of article links and metadata can be added to your internal or external website that would assist in keeping your staff up to date and/or visitors on your site.  Call us at 602-463-6558 for pricing. (We are also open to Ads)

 

In addition to these recent articles added since the last Newsletter search over 16,300+ archived articles using the SEARCH box with a keyword or keywords.

 

 

SECURITY

 

Automated Attacks Surge as Malicious Bots Take Center Stage

Abusing Microsoft Outlook 365 to Capture NTLM

Lateral Movement: Pass the Cache

Darkside of the Threat Intelligence Platform

Ransomware Deploys Virtual Machines to Hide Itself from Antivirus Software

Guide to Enterprise Telework, Remote Access, and Bring Your Own Device (BYOD) Security

Guidelines for Managing the Security of Mobile Devices in the Enterprise

'Zero Trust' Requires IT and the Mission Side to Collaborate

 

CLOUD TECHNOLOGY

 

MANAGEMENT and LEADERSHIP

 

Inside the Armys Rapid IT Response to COVID-19, with Lt. Gen. Bruce Crawford

CISOs are Critical to Thriving Companies: Heres How to Support Their Efforts

The Service Desk KPIs Top MSPs Rely on for Success & How to Use Them in Your Business

Three Ways to Have Kinder Workplaces, and Why It Matters

Cybersecurity and Remote Work: How Workers Are Handling the Shift

 

NETWORKS and CONNECTIVITY

 

World's Fastest Internet Speed from a Single Optical Chip (44Tbs)

 

DEVOPS and AGILE DEVELOPMENT

 

DATA PROTECTION and ANALYTICS

 

GDPR Wholly Inappropriate to Govern Contact-Tracing Data

How Data Intelligent Organizations Mitigate Risk

Good Policies Are Not Enough: Reading Between the Lines of the SECs Security Guidance

Cybersecurity and Resiliency Observations (SEC Whitepaper)

DATA CENTER OPERATIONS

 

What is Single Sign-On and How Does it Work?

DRaaS vs. cloud DR: What are the differences?

The Definitive Guide to Managed Detection and Response (MDR)

Datacentre Liquid Cooling: What Needs to Happen for It to Become Commonplace In Colocation?

 

GEEK STUFF

 

A Look at IoT Security and Potential Issues

Quantum leap: Photon Discovery Is a Major Step Toward at-Scale Quantum Technologies

 

SERVER ADMINISTRATION

 

5 Core Components of Microservices Architecture

Meet ScrAPIr, MIT's Swiss Army-Knife for Non-Coders to Shake Data Out of APIs (It's Useful for Pro Devs, Too)

 

STORAGE TECHNOLOGIES

 

AUDIT and COMPLIANCE  

Who Owns Privacy?

The CCPAs Enforcement Date is Fast Approaching Are You Ready?

The Need for Compliance in a Post-COVID-19 World

 

POTPOURRI

 

4 Tactics to Speak Up and Hold the Floor Long Enough to Make Your Point

Communicate & Connect: How to Develop Your Presentation Skills

 

We do not use cookies or collect, store or save any information on visitors.  The only items we collect are that someone visited and the articles viewed. We never share or sell our subscriber list.

 

 

Feel free to forward the Newsletter to your staff, associates, peers and anyone involved in IT

 

Warren Avery

602-463-6558

wavery@ITWeeklyNewsletter.com

http://www.linkedin.com/in/wavery

 

If you would like to advertise with us, give me a call.

 

If you would prefer not to receive further newsletters:

 

1. Click on the Reply button.

2. Replace the Subject field with the word REMOVE.

3. Click the Send button.

 

URL links, link contents and Trademarks are copyright of their respective owners.