A curated technology Newsletter with no Company or Product reviews

Published twice weekly to keep you informed

 

IT Weekly Newsletter May 29, 2020

Articles Added from 5-26-2020 to 5-29-2020

 

"Practice what you know, and it will help to make clear what now you do not know."

Rembrandt (1606 1669) Painter, Printmaker, Draftsman

 

An API to access our SQL repository of article links and metadata can be added to your internal or external website that would assist in keeping your staff up to date and/or visitors on your site.  Call us at 602-463-6558 for pricing. (We are also open to Ads)

 

In addition to these recent articles added since the last Newsletter search over 16,300+ archived articles using the SEARCH box with a keyword or keywords.

 

 

SECURITY

 

Cyber Essentials - Overview

Cyber Essentials Toolkit - Essential Element: Yourself, the Leader

Dont Get Stumped by Deception: Busting 4 Myths About Distributed Deception Platforms

Ransomware Gangs' Ruthlessness Leads to Bigger Profits

Security 101: SQL Injection

3 SMB Cybersecurity Myths Debunked

Spotting Zero-Day Ransomware

Mercedes-Benz Data Leak Lesson: Lock Down Code Repositories

5 Tips for Fighting Credential Stuffing Attacks

 

CLOUD TECHNOLOGY

 

Moving to the Cloud Too Fast Wastes Time and Effort

Reexamining Cloud On-Ramp: Access to Your Cloud Applications May Not Be as Direct as You Think

Cloud Strategies aren't Just About Digital Transformation Anymore

 

MANAGEMENT and LEADERSHIP

 

HRs Response to Racism in Viral Form

How to Pay a Ransom: A Step-By-Step Guide for Something You'd Never Do

Why You Need to Revisit Your IT Policies

Talk or Write? A Critical Communication Decision (Part 1)

How CIOs Can Support a Gradual Return to the Office

Akamai CTO on How Bots Are Used Online In Legal and Illegal Ways

Top 5 COVID-19 Litigation Risks for Employers: Is Your Company Prepared?

 

NETWORKS and CONNECTIVITY

 

T-Mobile Sub-6 5G Vs. mmWave: Capabilities Comparison

 

DEVOPS and AGILE DEVELOPMENT

 

How Could Using Agile Project Management Techniques Change the Way We Conduct BIAs?

 

DATA PROTECTION and ANALYTICS

 

DATA CENTER OPERATIONS

 

Debunking Six Disaster Recovery Automation Myths

Four Paths on the Journey to Automated Enterprise Infrastructure

The Dunk Tank Reconsidered: How OCP May Yet Immerse Your Servers

 

GEEK STUFF

 

SERVER ADMINISTRATION

 

A Rogues' Gallery of MacOS Malware

 

STORAGE TECHNOLOGIES

 

AUDIT and COMPLIANCE  

POTPOURRI

 

Supercomputer Simulates he Impact of the Asteroid That Wiped Out Dinosaurs

How to Look Better on Zoom (and Other Video-Calling Apps)

 

We do not use cookies or collect, store or save any information on visitors.  The only items we collect are that someone visited and the articles viewed. We never share or sell our subscriber list.

 

 

Feel free to forward the Newsletter to your staff, associates, peers and anyone involved in IT

 

Warren Avery

602-463-6558

wavery@ITWeeklyNewsletter.com

http://www.linkedin.com/in/wavery

 

If you would like to advertise with us, give me a call.

 

If you would prefer not to receive further newsletters:

 

1. Click on the Reply button.

2. Replace the Subject field with the word REMOVE.

3. Click the Send button.

 

URL links, link contents and Trademarks are copyright of their respective owners.