Black Hat Trainings (June 13-16)
Most popular articles of last 6 editions:

Popular Articles Last 4 Weekly Issues, Grouped into Sections


6 Smart Practices For Better Business-IT Alignment

From ride-alongs to reverse-embedded IT, CIOs are establishing new approaches to bridging the business-IT divide - and devising inventive strategies with business alignment top of mind.

CIO, April 25th, 2022

7 Leadership Traits Major Enterprises Look For In A CIO

Are you ready to make the move to a big company? Better stretch yourself now to ensure you have what top-tier enterprises seek in a top-post IT leader.

CIO, April 27th, 2022

What's Next For Digital Transformation?

Thirty-plus years is a long time to be stuck on something. Is it time we move on?

CIO, May 2nd, 2022

What Will A Digital-First World Look Like In The Future?

Help your clients deliver on their digital strategies through scale, trust and customer and business impact.

IDC, May 18th, 2022

What Sustainable Data Storage Means For Your Data Center

Storage sustainability requires commitment from the entire organization. Don't put it on the back burner -- these tips can help the environment and keep the issue top of mind.

SearchStorage, May 16th, 2022

8 Free IT Strategic Planning Templates And Examples For CIOs

As technology becomes a business differentiator, a well-thought-out IT strategy plan is more crucial than ever. These IT strategy templates help CIOs make IT a business driver.

SearchCIO, May 18th, 2022

CISOs Worried About Material Attacks, Boardroom Backing

CISOs are also less concerned about ransomware attacks, but many says their organizations are still not properly prepared for them.

CSO Online, May 17th, 2022

What IT Leaders From Blackberry, CN And Microsoft Canada And More Predict For The Future Of Infosec

The Canadian CSO Future of Information Security Summit will address the fallout of Russia's invasion of Ukraine, crisis management, open-source vulnerabilities, and other vital issues.

CIO, May 16th, 2022

Amazon Cloud Services: 5 Things CIOs Should Know

Exploring the many options and technologies around cloud services can be daunting. Navigate Amazon Web Services with this expert advice in mind

The Enterprisers Project, April 26th, 2022

Big Data

Benefits Of Using Big Data To Assist With Digital Adoption

Big data technology can help immensely with developing a digital adoption strategy.

SmartDataCollective, April 25th, 2022

Top DataOps Tools 2022

Businesses have always been data-driven. The ability to gather data, analyze it, and make decisions based on it has always been a key part of success. As such, the ability to effectively manage data has become critical.

IT Business Edge, April 26th, 2022

The Future Of Data Management: It's Already Here

Analysts such as Gartner are claiming that data fabric is the future of data management. But, in fact, the future is already here.

datanami, May 5th, 2022

The Next Data Revolution Is Here - AI Will Understand What Isn't Being Said

In this special guest feature, Ran Margaliot, COO and VP R&D for Affogata, discusses how analyzing and sorting through unstructured data saves countless hours and recognizes patterns in seconds that even skilled data professionals may never uncover.

insideBIGDATA, May 19th, 2022


Storage Facing Trillion-Row Database Apocalypse

A new era of large-scale analytics and storage is opening up ahead of us. Ocient, Imply, VAST Data, and WEKA are four startups positioned to store and access data among hundreds of petabytes or trillions of database rows in seconds.

Blocks & Files, April 28th, 2022

2022-23 DCIG Top 5 Multi-Cloud SDS Object Storage Solutions

DCIG is pleased to announce the 2022-23 DCIG TOP 5 Multi-Cloud SDS Object Storage Solutions. These products represent the TOP 5 SDS-based object storage solutions organizations should consider for multi-cloud deployments.

DCIG, April 28th, 2022

Failure Rate Of HDDs And SSDs Based On 207,478 Running Units In 1Q22

6TB Seagate ST6000DX000 HDDs to defy time with zero failure despite average of nearly 7 years

Gestalt IT, May 16th, 2022

All The Sources And Sinks Going To Object Storage

The vocabulary of sources and sinks are beginning to appear in the world of data storage as we witness the new addition of data processing frameworks and the applications in this space.

Stoarge Gaga, April 25th, 2022

How Enterprises Can Ensure NVMe Security In 2.0

Today's world demands airtight security more than ever. Key NVMe security features, such as namespaces, the Lockdown command and TLS in NVMe over TCP, keep data safe.

SearchStorage, April 28th, 2022

The 12 Best Object Storage Solutions And Distributed File Systems In 2022

Solutions Review's listing of the best Object Storage solutions and Distributed File Systems is an annual mashup of products that best represent current market conditions, according to the crowd.

Solutions Review, May 17th, 2022

Storage As A Service Can Drive Transformation - If It's Agile Enough For All Workloads

'STaaS for all' drives transformation by delivering as-a-service agility and flexibility. Before you invest, make sure your STaaS solution can power every workload across the infrastructure lifecycle.

CIO, April 26th, 2022

Trench 3D NAND: The Solid-State Future?

Like any solid-state technology, 3D NAND will reach a point when it can't meet demand for increased density, and replacement technology will come along. Semiconductor and nanotechnology research powerhouse IMEC reckons the answer will lie with Trench 3D NAND.

Blocks & Files, April 26th, 2022

The 28 Best Enterprise Data Storage Solutions For 2022

Solutions Review's listing of the best enterprise data storage solutions is an annual sneak peek of the solution providers included in our Buyer's Guide and Solutions Directory. Information was gathered via online materials and reports, conversations with vendor representatives, and examinations of product demonstrations and free trials.

Solutions Review, May 17th, 2022


10 Security Technologies To Secure Remote Work

The recent global pandemic forever changed the way people work. These days, more and more people are working remotely, but much of that remote access technology is exposed to external threats.

Security Boulevard, April 27th, 2022

Best Practices For Creating An Insider Threat Program

A thorough insider threat program includes plan preparation, threat assessment, and plan review and renewal. Learn how to implement this three-step model to protect your company.

SearchSecurity, April 28th, 2022

Security Tools Fail To Stop Significant Security Incidents

The security industry is failing to keep pace with evolving cybercrime tactics, techniques and procedures as security and IT teams face mounting expectations to keep their organizations protected from such threats.

Security Boulevard, April 27th, 2022

Best Identity And Access Management (IAM) Software 2022

Identity and access management tools play a critical role in an enterprise's security infrastructure, requiring users to pass authentication tests for each session.

CIOinsight, April 26th, 2022

Identity And Access Management: The Pursuit Of Invisible Value

The speed versus risk balance is always in question while considering identify and access management in enterprise transformation scenarios

CIO, April 27th, 2022

5 Questions To Ask About Your Endpoint Detection And Response (EDR) - Response

This is part 3 in a series on some of the capabilities you should be looking for in your Endpoint Detection and Response solution.

Security Boulevard, May 19th, 2022

A Breath Of Fresh Air For A Busy CISO

We've all been there. As Chief Information Security Officer (CISO), your team, your management, and your board are all clamoring for your time.

HolistiCyber, April 27th, 2022

Cyber-Attack Defense: CIS Benchmarks + CDM + MITRE ATT&CK

Six trillion dollars. That's how much global cybercrime cost the world's economy in 2021, according to Cybersecurity Ventures.

HelpNet Security, April 27th, 2022

Future- Proofing Cloud Security: 5 Things Every CISO Needs To Know

As a CISO, necessary visibility is required to continuously monitor threats and ensure compliance in the cloud. These five considerations will help you to embrace cloud security and its benefits.

CSO Online, May 17th, 2022


New SDP 2.0 Specification Facilitates Zero-Trust Maturity

The Cloud Security Alliance's Software-Defined Perimeter 2.0 specification creates a path to a zero-trust approach through strong access controls.

CSO Online, April 26th, 2022

Who Is Right About Edge Computing?

Edge will ultimately succeed (or fail) based on its ability to address the operational experience of those tasked with deploying and operating the its workloads.

NETWORKComputing, April 28th, 2022

Cloud-First Strategy Forces Big Shift On IT Infrastructure, Skills

More and more, IT infrastructure is in the cloud. As organizations adopt cloud-first strategies, forward-looking CIOs are refocusing their teams on new roles and tasks.

SearchCIO, April 27th, 2022

The Cloud Security Emperor Has No Pants

'Shared responsibility' usually means that no one is responsible for minding the gap. Don't fall in.

CSO Online, April 26th, 2022

9 Cloud Cost Optimization Best Practices

In recent years, the cloud has become a primary option for IT departments, with many companies moving to public cloud offerings due to their lower operating costs, scalability, and elasticity.

Enterprise Networking Planet, May 20th, 2022

AWS Lightsail vs EC2: Which Amazon Cloud Server is Better for You?

Choosing between services on the comprehensive AWS platform can take a toll on users. This article will help you make an informed decision about which cloud server, the AWS EC2 or the AWS Lightsail, is better for you.

Geekflare, May 20th, 2022

Report: Only 13.6% Of Tech Leaders Believe They've 'Mastered' Cloud Security

A new report by Canonical highlights the growth of hybrid cloud and multicloud solutions, with more than 83% of respondents reporting that they are using either hybrid or multi-cloud.

VentureBeat, May 19th, 2022

How To Think About Threat Detection In The Cloud

In this post, we will share our views on a foundational framework for thinking about threat detection in public cloud computing.

Security Boulevard, May 20th, 2022

Why Your Business Should Be Implementing A Hybrid Cloud Storage Strategy

As public cloud adoption matures, the generally accepted consensus of the long-term trend for technology will be the development of hybrid and multi-cloud operations.

architectingIT, May 17th, 2022


11 Enterprise AI Trends To Know

AI adoption continues to expand across the globe, with Gartner predicting that organizations over the next five years will 'adopt cutting-edge techniques for smarter, reliable, responsible and environmentally sustainable artificial intelligence applications.'

Dataversity, May 20th, 2022

AI Is Garnering A Bigger Role In Intel's Future

Intel is moving the focus from its server CPUs to a growing roster of adjacent chips that are driving a fundamental shift in computing to AI in which answers are derived from associations and patterns found in data.

EnterpriseAI, May 19th, 2022

Enterprise Guide To Robotic Process Automation

RPA is a fast-growing category of software, driven by global enterprise digital transformation efforts. Is it ready for prime time? This guide covers the benefits, best practices and use cases today.

InformationWeek, April 26th, 2022

AIOps - The Future Is Here

The term Artificial Intelligence for IT Operations (AIOps) combines big data and machine learning to automate IT operations processes, including event correlation, anomaly detection, and causality determination, April 25th, 2022

How To Use AI In Storage Management

Organizations can use AI for storage management and AIOps to learn where to make improvements in their storage infrastructure. However, take note of the benefits and drawbacks.

SearchStorage, April 29th, 2022

This 1,000-Core RISC-V Processor Is Generating Buzz In The AI Space

New AI chip hold promise for machine learning recommendation, April 25th, 2022

To Be AI-First, Do AI Last

Artificial intelligence has become a buzzword in the tech industry. Companies are eager to present themselves as 'AI-first' and use the terms 'AI,' 'machine learning,' and 'deep learning' abundantly in their web and marketing copy.

TechTalks, April 25th, 2022


Linux Security Study Reveals When, How You Patch Matters

Computer security only happens when software is kept up to date. That should be a basic tenet for business users and IT departments.

LinuxIInsider, April 25th, 2022

Openssh Security Hardening Guide For Linux

SSH is one of the most widely used protocols for system administration on Linux platforms.

HowtoForge, April 27th, 2022

How To Use Screen Command On Linux

Screen is a very useful command which gives us the ability to use multiple Shell(SSH) Sessions from a single SSH session

HowtoForge, May 17th, 2022

How The CIO Can Become A Board Ally

CIOs can lead the charge on digital business strategy while tackling enterprise risk, transformation and DEI among other top-down priorities.

CIO Dive, May 18th, 2022

Windows Subsystem For Linux Gets Bleeding-Edge Ubuntu

'This is not recommended for production development. It may be unstable and it will have bugs'

The Register, May 16th, 2022

How To Set Up Passwordless SSH Login With SSH Keys

Many novice users to Linux are surprised to learn that the most secure method to connect to another server with SSH is using keys.

ByteXD, May 6th, 2022

10 Big Announcements From Red Hat Summit 2022

RHEL 9 will feature new capabilities around edge computing, security and automation.

CRN, May 10th, 2022

Is Linux Really The Most Secure Operating System? Facts And Myths About Linux Security

In the coming Micropocalypse, millions of perfectly good 3-5-year-old Microsoft Windows computers may dump because their hardware can't be upgraded to Windows 11. It's no surprise that people are starting to look for other options, like Linux.

Linux Stans, May 18th, 2022


What Is DisplayHDR

High dynamic range (HDR) monitors are becoming mainstream, but their performance can vary widely. So how do you know what HDR performance level you are getting with a particular monitor? The VESA DisplayHDR certification hopes to solve this issue.

How-To Geek, April 25th, 2022

Defining The Next Cycle Of Technology

We're in the middle of what we at ScyllaDB dubbed The Next Tech Cycle. Not 'The World of Tomorrow' nor 'The Shape of Things to Come' nor 'The Wave of the Future'-because it's already here today., April 26th, 2022

More Than 5 Billion People Now Use The Internet

63 percent of all the people on Earth are now online

The Next Web, April 25th, 2022

Tabor Communications Launches Quantum Computing Publication

QCwire, which will cover the Quantum Computing explosion.

HPCWire, April 26th, 2022

Intel Plans for 800 Gbps IPUs : Gestalt IT Rundown: May 18, 2022

Intel is ready to ramp up the market for add-on cards. Their roadmap for Infrastructure Processing Units, which is what Intel calls a DPU, are focusing on a combination of ASICs and FPGAs

Gestalt IT, May 18th, 2022

Hybrid Work: 3 Technology Questions CIOs Should Be Asking

Adopting a hybrid work model? Consider these practical, real-world questions to ensure that your teams stay engaged and productive

The Enterprisers Project, May 19th, 2022


70 Data Center Companies Join The Infrastructure Masons Climate Accord

The initiative is looking to develop a standard methodology for measuring and reporting carbon emissions in data center power, materials, and products.

DataCenter Knowledge, April 27th, 2022

How To Calculate Data Center Cooling Requirements

Data center cooling requirements are affected by several factors, including the equipment's heat output, the floor area, facility design and electrical system power rating

SearchDataCenter, April 28th, 2022

Growing Prospects For Edge Datacentres

Although the value that edge datacentres provide is not in question, for many companies, the journey to adoption is far from fixed

ComputerWeekly, April 25th, 2022

What Makes A Data Center Secure?

The data center is the heart of an organization's IT infrastructure. It houses the servers, storage, networking and other equipment that powers an organization's applications and services.

Security Boulevard, April 25th, 2022


5 Agile Mistakes I've Made And How To Solve Them

Take agile to your organization, don't be afraid of enduring a few mistakes for the benefit of making your teams better., April 26th, 2022

Five Emerging Trends In Enterprise Data Management

In its fourth year, the Upskilling IT report highlights the need to close the DevOps skills gap and identifies emerging job roles within the industry.

datanami, May 18th, 2022

DevOps Institute Releases Upskilling IT 2022 Report

DevOps Institute, a professional member association working to advance the humans of DevOps, announced the release of its Upskilling IT 2022 report., May 18th, 2022

5 Tips To Avoid These Common Agile Mistakes

Invest time in training, incorporate agile into individual interactions, and write modular code designed for flexibility., April 29th, 2022


Linkedin Just Received A Small But Very Useful Upgrade

Content creators can now add a link to their LinkedIn profiles, May 2nd, 2022


Busting Three Myths About The Future Of Work

These false beliefs emerged early in our thinking about the post-pandemic workplace. It's time to get real.

Computerworld, May 12th, 2022

Secrets To Hiring Top Tech Talent

To hire best-in-class IT talent, your company must have interesting technical problems to solve.

InformationWeek, April 25th, 2022

Gartner Says HR Leaders Are Struggling To Adapt Current Organizational Culture To Support A Hybrid Workforce

Only 24% of Hybrid and Remote Knowledge Workers Report Feeling Connected to Their Organization's Culture

Gartner, May 17th, 2022


The Top Five Myths About CRM Integration Debunked

Customer relationship management (CRM) software has been helping companies manage, monitor, and improve the customer experience since the mid-1990s.

CIOinsight, May 16th, 2022

8 Of The Best CRM Certifications To Get In 2022

Customer relationship management (CRM) certifications are specialized, professional credentials that major CRM vendors offer a variety of professionals from sales to IT.

CIOinsight, May 20th, 2022

Top 6 CRM Software Solutions In 2022

Customer relationship management (CRM) software is a critical component of any sales or marketing team's lead generation, nurturing, and converting strategies.

CIOinsight, May 19th, 2022


Python Is Now Top Programming Language - But Shouldn't Be

Python may be the top programming language in the world right now, but its popularity won't last. Here's why.

ItproToday, April 26th, 2022

Top 13 Types Of Testing In Software Engineering You Need To Know About

Software testing is a fundamental pillar of modern technology development initiatives. Did you know that there are over 15 types of testing categories available today for enterprises to take note of?

Security Boulevard, April 28th, 2022


Sender Policy Framework (SPF)

Sender Policy Framework (SPF) is a protocol designed to restrict who can use an organization's domain as the source of an email message. SPF blocks spammers and other attackers from sending email that appears to be from a legitimate organization

SearchSecurity, April 28th, 2022

$43 Billion Stolen Through Business Email Compromise Since 2016, Reports FBI

Over US $43 billion has been lost through Business Email Compromise attacks since 2016, according to data released this week by the FBI.

Security Boulevard, May 5th, 2022


Why MFA Alone Isn't Enough For True Cybersecurity

Multi-factor authentication (MFA) was once a foreign terminology, but today, with the myriad of hacks and data breaches dominating headlines, it's fair to say that most individuals now see MFA as a no-brainer - for now.

Cyber Defense Magazine, April 28th, 2022

What Is Multi-Factor Authentication (MFA)?

You've heard of two-factor authentication (2FA) and its many benefits, but what about multi-factor authentication (MFA)? MFA can go beyond a simple text or authentication app, and might even happen without you knowing it.

How-To Geek, April 28th, 2022


88% Of Organizations Are Still Behind In Keeping Open Source Updated

How Does Your Organization Stack Up When It Comes to Updating Open Source Data?

CIO, April 26th, 2022

Fantastic Open Source Cybersecurity Tools And Where To Find Them

Open source software plays a key role in keeping data centers secure. Here are just a few projects making a difference.

Data Center Knowledge, May 19th, 2022


DNS Over HTTPS: Facts You Should Know

A new protocol, DNS over HTTPS (DoH), is a sensation in modern times, designed for enterprise security products and policies

Security Boulevard, May 19th, 2022

Top Enterprise 5G Networks In 2022

All over the globe, enterprises in various industries are developing enterprise 5G infrastructure and services to meet new operational use cases.

Datamation, April 29th, 2022


8 Words You Should Never Use To Describe Yourself In An Interview (And What To Say Instead)

Stuffing your resume and LinkedIn profile with generic buzzwords can be off-putting to potential employers, but it's far worse when you recite them during an interview.

Fast Company, May 16th, 2022

5 Skills A Cloud Architect Needs To Succeed

If your goal is to build a successful cloud architect career, it is critical that you value and grow in technical competency, business acumen, leadership, sales, and communication.

InformationWeek, May 9th, 2022


Managing Hidden Project Costs For Better ROI

The most common argument for outsourcing is cost savings. And in the face of a challenging economic climate, cost figures largely in the decision to outsource IT projects and business processes.

ProjectSmart, April 28th, 2022

CxO Podcasts

Technology Strategy 2023: Into The Metaverse

Enterprise technology is moving rapidly toward the metaverse, a world composed of real and virtual businesses, people, and things operating in a hyperconnected environment.

CXOTalk, April 26th, 2022


The 14 Best Business Intelligence Tools For Mac To Consider In 2022

Solutions Review's listing of the best business intelligence tools for Mac is an annual mashup of products that best represent current market conditions, according to the crowd

Solutions Review, April 26th, 2022


5 Top Mobile Device Management (MDM) Trends In 2022

Mobile Device management (MDM) is a process and technology that provides the mobile workforce with productivity tools and applications as well as security.

Datamation, April 25th, 2022


Proactive Data Backup vs. Reactive Disaster Recovery; Which One Wins?

This is part of Solutions Review's Premium Content Series, a collection of contributed columns written by industry experts in maturing software categories.

Solutions Review, April 25th, 2022


4 Customer Engagement Tactics That Work, According To Marketing Execs

'The bottom-line impact of improving customer engagement at every touchpoint is significant,' stated Hiver in its company blog.

CMSWiRE, April 26th, 2022


Modern Java Delivery: Java 17, 18 And Open JDK

Java has been around for as long as I have in this industry, which is. quite a long time.

RedMonk, April 28th, 2022