IT News and Events
Feb 10th, 2020 — Feb 16th, 2020 Generate the Custom HTML Email for this Issue
IT News and Events IT News and Events
Volume 263, Issue 2 << Previous Issue | Next Issue >>
IT News - CxO
disable
4 Lessons From The Hertz vs. Accenture IT Disaster
A tremendous amount of information and specific insight can be gleaned by analyzing projects gone wrong
"Here are four lessons IT leaders can apply to any outsourcing agreement," writes John Belden in CIO.

"Project successes tend to result in a lot of the same conclusions that every team identifies (e.g., we had a great team in place, or we had good leadership supporting it). Disasters, on the other hand can offer some of the best learning opportunities.

The Hertz vs. Accenture lawsuit filed last year provides some particularly valuable insights. This case, involving a digital transformation, teaches us that it's important to know best practices for holding your vendors accountable, specifically when you're leveraging agile-at-scale..."

CIO, February 5th, 2020
(Get More Information . .) open to premium members only

8 Dark Secrets Of Organizational Change Management
In the digital era, organizational change management is crucial to business success - far too crucial to be dogged by its misconceptions and false assumptions
"Organizational change management (OCM) has gained visibility, slowly but surely, among those responsible for making change happen, which is to say, just about every manager in just about every business," notes Bob Lewis in CIO.

"It matters because, as you're doubtless tired of hearing, the only constant in business is change. That reality bumps up against a competing one: More often than not, business change efforts fail to satisfy, and that's if they don't fail entirely..."

CIO, February 5th, 2020
(Get More Information . .) open to premium members only

CISOs Face A Range Of Cybersecurity Challenges In 2020
Every company is unique, of course, but certain challenges are widely shared. Learn what security concerns other CISOs and security leaders are focused on in 2020
"The list of cybersecurity challenges will remain unabated in 2020, with both emerging and existing threats and opportunities expected to dominate the CISO agenda in the months ahead," warns Mary K. Pratt in SearchSecurity.

"The list of top concerns is broad. Changes and advances in technology, evolving threats, too few security personnel, emerging essential skills and the increasing number of threats are all top issues, according to the "State of Enterprise Risk Management 2020," from IT governance organization ISACA, the CMMI Institute and Infosecurity Group..."

SearchSecurity, February 3rd, 2020
(Get More Information . .) open to premium members only

IT Leadership: How To Build A Learning Culture
Intrado's CTO shares his team's success building a culture that prizes ongoing learning - using a 'community of practice' program and other creative approaches
"If you're not building a culture of learning into your IT organization, you risk losing the ability to gain efficiencies that new technologies can provide," warns Thomas Squeo in The Enterprisers Project.

"Part of the purpose and goal of an IT organization is to optimize the company's use of technology - evaluating the value add of emerging tech and implementing new tools. Tech-forward organizations like Intrado are constantly exploring new technologies and working models in order to increase operational efficiencies and better serve customers. That means not only integrating them and educating employees, but also educating ourselves..."

The Enterprisers Project, February 6th, 2020
(Get More Information . .) open to premium members only

IT News - MFA
disable
How To Enable Two-Factor Authentication On Facebook, Instagram, And Twitter
This should be the year when you finally stop procrastinating the idea of installing a password manager
Yash Wate writes in TECHPP, "While following good account practices such as using strong passwords, taking advantage of a password manager to create complex and unique passwords for different accounts, and avoiding the use of dictionary passwords, ensures your account security to a greater extent, there are instances when even accounts with strong passwords pose a risk of account compromise.

For such instances, having another layer of security on your account (say, Two-Factor Authentication), in addition to a strong password, further ensures that your account is less susceptible to attacks. So, to help you do that here's a guide on how to enable Two-Factor Authentication across different social platforms like Facebook, Instagram, and Twitter..."

TECHPP, February 7th, 2020
(Get More Information . .) open to premium members only

How Device-Aware 2FA Can Defeat Social Engineering Attacks
While device-aware two-factor authentication is no panacea, it is more secure than conventional SMS-based 2FA. Here's why.
"In the ever-escalating arms race between attackers and defenders, the latest defense to crumble under fire is two-factor authentication (2FA)," writes Markus Jakobsson in Dark Reading.

"Hackers have become increasingly successful in using social engineering techniques that defeat 2FA and let them take control of victim accounts.

Many of these attacks, however, including account takeover using SIM-jacked phone numbers, can be thwarted by restructuring part of the authentication process, using a minor modification to existing methods..."

Dark Reading, February 3rd, 2020
(Get More Information . .) open to premium members only

IT News - Storage
disable
The Hard Disk Is Dead! (But Only In Your Datacenter)
Not Dead, Just Not Made For You Anymore
"During Storage Field Day, one of the most interesting sessions was with Western Digital," writes Enrico Signoretti in Gigaom.

"It was a 4-hour long session, so I won't tell you to watch all the segments (although some of them were particularly enlightening about the future of storage and infrastructure in general - If you have to pick only one watch the part about the gaming industry. I'm not a gamer, but it was really fascinating). Now, let's focus on the hard disk!..."

Gigaom, February 3rd, 2020
(Get More Information . .) open to premium members only

Data Storage 2020: Icebergs Ahead
Data storage has always been a very lucrative market
"In this week's Breaking Analysis we look into the storage market," writes David Vellante in Wikibon.

"Storage has been soft lately, as we've been reporting. Spending has been on the back burner. In this segment we want to highlight those few companies with momentum, understand why there's a softness, drill into the various segments and forecast the outlook for 2020.

Few Storage Companies with Momentum - Rubrik and Cohesity are Standouts Let's get right into it and look at a storage spending snapshot.

We're looking below at Net Score, which is a measure of spending velocity in the ETR data set. We're specifically isolating on storage spending..."

Wikibon, February 3rd, 2020
(Get More Information . .) open to premium members only

IT News - AI
disable
2020s: The Decade Artificial Intelligence Will Dominate
Isaac Asimov, roboticist and science fiction writer, predicted in his novel I, Robot in 1950 that robots and artificial intelligence were going to be banned from Earth in the year 2030
"Instead, we are seeing huge advances in AI and this is likely to continue within the next decade," writes Asheesh Mehra in TechTalks.

"The UK's investment in AI recently reached a record high for 2019, rising from $1.02 billion for the whole of 2018 to $1.06 billion in the first six months of 2019. What's more, the European Commission's new president, Ursula von der Leyen recently made calls for a GDPR-style regulation for the use of AI to be put in place, signaling the predicted mass uptake of the technology amongst businesses across different industries..."

TechTalks, February 5th, 2020
(Get More Information . .) open to premium members only

IT News - Blockchain
disable
How Blockchain Is Changing The Fortune Of Online Gambling
The age of the internet was a game-changer for the gambling industry
"It enabled anyone with an internet connection to play their favorite casino games or engage in sports better from anywhere. Now, despite being heavily regulated in many countries, the online gambling sector is growing at an impressive rate. According to a report from market research firm Mordor Intelligence, the industry can expect further growth of 8.77% CAGR between now and 2020.

However, despite this optimistic projection, the online gambling space also faces several key challenges. There is a lack of trust on the part of users, partly driven out of the fact that there's a low level of transparency into wins and losses..." - NEWSBTC

NEWSBTC, February 6th, 2020
(Get More Information . .) open to premium members only

Is Blockchain The Solution To Internet Insecurity? These Two Projects Say Yes.
The Internet was originally built without concerns for privacy, especially not the complicated security features required by today's standards
"It's far too late to redesign the entire Internet, however, two blockchain projects offer potential security solutions," writes Andrej Kovacevic in Jaxenter. " Blockchain's capabilities of serving as a decentralized payment system could be the secret for the future of internet security.

In the beginning, the internet grew from the idea that multiple, arbitrarily designed networks could combine to create a global digital data interchange system. When the technologies needed to affect that idea were designed, nobody really thought they might eventually be used for everything from sensitive communications to commerce and everything in between. For that reason, it's plain to see that the bedrock technologies that make up today's internet have almost no built-in security features to speak of..."

Jaxenter, February 6th, 2020
(Get More Information . .) open to premium members only

IT News - CRM
disable
The New App Dev CRM Model
CRM is an industry that's been full of turning points, and I think it is at another
Denis Pombriant writes in CRMBuyer, "There have been many smaller turns, like the additions of analytics, social media and process flows. However, to get a sense of this point in time, I think you have to go all the way back to the turn of the century and the rise of cloud computing.

The cloud was important as an economic marker in ways that other turning points were not. When software as a service emerged, it represented a long overdue initiation of a commoditization wave in the whole technology market, and CRM was the test case..."

CRMBuyer, February 5th, 2020
(Get More Information . .) open to premium members only

Five Forces Shape The Modern CRM Landscape
What is CRM? It's not SFA (sales force automation) and it's not marketing automation
Kate Leggett writes in Forrester, 'The business processes and supporting technologies that support the key activities of targeting, acquiring, retaining, understanding, and collaborating with customers.'

. . . that is, to support customers through their entire journey with a company.

Today, companies both large and small widely deploy CRM - not as a singular technology but as a collection of discrete technologies: marketing automation, sales automation (including high-velocity sales), eCommerce, customer service, and field service technologies. These technologies are underpinned by intelligence (analytics, reporting, and AI) and an extensible platform. Read our latest Forrester Wave report to understand the strengths of leading vendors in this space..."

Forrester, February 4th, 2020
(Get More Information . .) open to premium members only

IT News - HR
disable
6 Golden Rules For Managing Remote Employees
Remote work isn't going anywhere, in fact it's growing
"According to Upwork's Future Workforce report, in the next decade 73% of all teams will have remote workers," writes Brennan McEachran in Business 2 Community.

"The road to entirely remote companies has been paved by companies like Buffer, Hotjar, InVision and Gitlab.

With partially or fully distributed teams on the rise, it's important to follow these 6 basic rules when managing remote employees..."

Business 2 Community, February 7th, 2020
(Get More Information . .) open to premium members only

IT News - Security
disable
Why Monitoring Third-Party SSL Certificates Matters
"This week, Microsoft Teams - a workplace collaboration tool similar to Slack - went down for three hours. Users attempting to log in were met with a message stating that the app failed to establish an HTTPS connection.

The problem? An expired SSL certificate, which normally allows users to ensure a secure connection between a web browser and a web server..." - The Recorded Future Team in

Recorded Future, February 5th, 2020
(Get More Information . .) open to premium members only

Best Antivirus Software: 13 Top Tools
These top-ranking Windows 10 client antivirus products were tested on three primary criteria: protection, performance and usability
Maria Korolov writes in CSO Online, "The AV-TEST Institute recently tested the most popular Windows 10 client antivirus products on three primary criteria: protection, performance, and usability. Four of the 15 products tested earned a perfect rating of 6 for each of those criteria:

  • Kaspersky Small Office Security
  • Kaspersky Endpoint Security
  • Symantec Endpoint Protection
  • Symantec Endpoint Protection Cloud

The top 13 antivirus offerings shown here in alphabetical order scored at least 17 points out of a possible 18..."

CSO Online, February 7th, 2020
(Get More Information . .) open to premium members only

Which Vulnerabilities Were Most Exploited By Cybercriminals In 2019?
Which ten software vulnerabilities should you patch as soon as possible (if you haven't already)?
Zeljka Zorz writes in HelpNet Security, "Recorded Future researchers have analyzed code repositories, underground forum postings, dark web sites, closed source reports and data sets comprising of submissions to popular malware repositories to compile a list of the ten most exploited vulnerabilities by cybercriminals in 2019.

The list

The list is comprised of two vulnerabilities in Adobe Flash Player, four vulnerabilities affecting Microsoft's Internet Explorer browser, three MS Office flaws and one WinRAR bug:..."

HelpNet Security, February 6th, 2020
(Get More Information . .) open to premium members only

IT News - Social Media
disable
How To Combat The Top 5 Enterprise Social Media Risks
Learn how social networking sites compound the insider threat risk, and explore how to mitigate the threat with policy, training and technology
Katie Donegan, and Ed Skoudis write in SearchSecurity, "Security professionals have experienced a sharp uptick in the complexity and quantity of challenges in the modern threat landscape. From IoT to BYOD, there are numerous technologies and threats today that did not exist prior to the early 2000s.

Social media is one area where security teams have faced a steep learning curve. Beyond being used by employees connected to corporate networks, platforms such as LinkedIn, Facebook and Twitter have been harnessed by enterprises as toolkits to conduct brand awareness, customer service, advertising and recruitment processes. However, each user on every platform presents a social media risk for security pros to contend with -- and the risks are plenty..."

SearchSecurity, February 6th, 2020
(Get More Information . .) open to premium members only

IT News - DevOps
disable
DevOps Vs Agile: What's The Difference?
The difference between the two is what happens after development
"Early on, software development didn't really fit under a particular management umbrella," writes Taz Brown in opensouce.com.

"Then along came waterfall, which spoke to the idea that software development could be defined by the length of time an application took to create or build.

Back then, it often took long periods of time to create, test, and deploy software because there were no checks and balances during the development process. The results were poor software quality with defects and bugs and unmet timelines. The focus was on long, drawn-out plans for software projects..."

opensouce.com, February 4th, 2020
(Get More Information . .) open to premium members only

IT News - Cloud
disable
7 Cloud Cost Management Tips
As cloud budgets rocket skyward, a growing number of enterprises are looking for ways to cap costs. Check out these tips designed to bring cloud expenditures back to earth
"Many enterprises that once looked to the cloud as a way to curb data center expenditures are now beginning to wonder why they're not saving as much money as they expected," writes John Edwards in CIO.

"There are no guarantees that cloud computing in any form will save you money," observes David Linthicum, chief cloud strategy officer at professional services firm Deloitte. Bringing cloud cost goals back on track is relatively simple, however. "It's a matter of advanced planning and setting realistic expectations," he notes..."

CIO, February 4th, 2020
(Get More Information . .) open to premium members only

IT News - Wireless
disable
It's 2020. Is Using Public Wi-Fi Still Dangerous?
You've probably heard that public Wi-Fi is dangerous. Advice about avoiding it is almost as widespread as public Wi-Fi itself
"Some of this advice is outdated, and public Wi-Fi is safer than it used to be. But there are still risks," writes Chris Hoffman in How-To Geek.

"Is Public Wi-Fi Safe or Not?

This is a complicated topic. It's true that browsing on public Wi-Fi is much safer and more private than it used to be thanks to the widespread embrace of HTTPS on the web. Other people on the public Wi-Fi network can't just snoop on everything you're doing. Man-in-the-middle attacks aren't as trivially easy as they used to be..."

How-To Geek, February 4th, 2020
(Get More Information . .) open to premium members only

IT News - Networks
disable
SD-WAN Requirements For A Multi-Cloud World
With the emergence of a multi-cloud world, SD-WAN vendors must upgrade their platforms to ensure secure and reliable SD-WAN connectivity to cloud services.
"For many IT organizations, software-defined WAN has become the primary on-ramp for branch and edge communications to cloud environments," writes Lee Doyle in SearchNetworking.

"These organizations have also begun to adopt multi-cloud architectures, where applications run on the best platform, regardless of location.

In response, SD-WAN providers aim to rapidly innovate their platforms to enable secure, reliable and high-quality SD-WAN connectivity to leading IaaS cloud platforms. As IaaS cloud providers extend their networks toward the edge -- and their customers -- SD-WAN requirements call for providers to use new means of traffic acceleration to and from cloud environments. New integration opportunities for SD-WAN providers include Microsoft Azure Virtual WAN and AWS Transit Gateway..."

SearchNetworking, February 5th, 2020
(Get More Information . .) open to premium members only

IT News - IoT
disable
Understand IoT Data Management Essentials
The flood of data from IoT devices requires careful planning of infrastructure and data management, and current processes might not be up to the task.
"IoT data management has changed the way organizations must design their infrastructure to gain the most advantages from IoT technology," writes Kristen Gloss in IoT Agenda.

"The changes caused by IoT and demand for real-time analysis may not be intuitive for IT pros when, historically, they secured data in a centralized, on-premises data center.

Jason Carolan, chief innovation officer of Denver-based data center and colocation company Flexential Corp., discussed the best practices for creating secure infrastructure for IoT data management. The organization augments its data centers with network connectivity to reduce latency, provides cloud services and offers security and compliance consulting..."

IoT Agenda, February 6th, 2020
(Get More Information . .) open to premium members only

IT News - Java
disable
Top Java Technologies In 2020 - JVM Programming Languages, IDEs, Tools & More
We compared two current survey reports to find out about this year's top three Java IDEs, frameworks, build tools and the most popular JVM languages
"And, of course, the surveys conducted by Snyk and JRebel didn't miss out on asking about the most used Java versions. The winner was no surprise, but what reasons speak against migrating?" asks Maika Mobus in Jaxenter.

"The security company Snyk has just released its annual JVM Ecosystem Report 2020. We seized the opportunity and compared the survey results to the 2020 Java Developer Productivity Report, published by Java tooling company JRebel in mid-January.

Let's see what IDEs and JVM programming languages are most popular, and whether companies are choosing to upgrade the Java version they use in production..."

Jaxenter, February 6th, 2020
(Get More Information . .) open to premium members only

Sections in this issue:
click to jump to section