Thirty most popular articles of current edition:

Most Popular Articles in Vol 280 Issue 3, Grouped into Sections


CxO Events


InformationWeek: Leveraging Infrastructure as Code to Streamline Security and Operations (Aug. 3rd)

Join us to see how Infrastructure as Code (IaC) can augment your security program, working with your pipelines and AST tools to ensure the most critical exploitable risks never get deployed.

CIO: Building an Enterprise-wide Framework for Containerization Across Hybrid Multi-Cloud Environments (August 4th)

Join CIO contributing editor Lane Cooper and subject-matter experts from our roundtable sponsor, IBM, for a private, interactive, virtual roundtable that will assist you in solidifying your business case for the additional level of complexity and cost associated with deploying containers in production.

Recorded Future: Tip of the Iceberg: Mapping the Threat Landscape from China (Aug 1st)

CIO: Optimizing Migration to SAP HANA 2.0 with a 360 degree Process (August 10th)

Join CIO contributing editor Aaron Goldberg and subject-matter experts from our roundtable sponsor, Clear Technologies, for a private, interactive, virtual roundtable.

CIO: Think Tank on Data and Analytics at Scale (July 27th)

You'll join a panel of top-tier IT executives along with Ritu Jyoti, IDC's Program Vice President, Worldwide Artificial Intelligence and Automation Research Practice, IDG's top US editor Eric Knorr, and senior executives from our exclusive partner Hewlett Packard Enterprise for a candid discussion exploring every aspect of Data and Analytics at Scale.

South Florida VMUG UserCon IN-PERSON (Sept. 14th)

Back and better than ever with a NEW hybrid approach, find two ways to attend and engage at the South Florida UserCon on September 14th!

Tintri: Demo Wednesdays (July 28th)

Weekly Demo Day

InformationWeek: Monitoring Critical Cloud Workloads (July 29th)

How to determine if a specific access request or data transfer is standard - or malicious; Why it's important to develop KPIs for measuring the effectiveness of your cloud monitoring efforts

InformationWeek: Using Cyber Underground & Blockchain Intel to Stop Cyber Attacks (July 28th)

Register for this webinar to learn how Intel 471 and Chainalysis can help you leverage this intel to better protect your organization

FutureCon Virtual Eastern: CyberSecurity Conference (July 28th)

FutureCon Events brings high-level Cyber Security Training discovering cutting-edge security approaches, managing risk in the ever-changing threat of the cybersecurity workforce.

South Florida IT Sales and Marketing Professionals: In-Person Meetup for (July 26th)

BizHack: Leveraging LinkedIn to Enhance Your Business Profile (July 27)

During COVID, with trade shows and conferences shut down, LinkedIn became an essential networking tool for business owners looking to find new customers

Supermicro: Second Open Storage Summit (July 27-29)

Supermicro CEO, Nutanix CEO, and Intel VP Highlight the Latest Storage System Innovations and Software-Defined Storage Solutions for Enterprise, Data Center, and Cloud Deployments

DARKReading: Unifying Your Enterprise's Endpoint Security Strategy (July 27th)

For enterprises that support many users and endpoints, building and maintaining a consistent security strategy was a major challenge even before 2020

CIO: Establishing Comprehensive Resilience Frameworks for Ransomware Recovery (July 27th)

Join CIO Contributing Editor Lane Cooper, subject matter experts from our partner, IBM, and a select group of IT executives from across the country to share strategies at an intimate, off-the-record discussion.

CxO


7 Toxic Team Behaviors IT Leaders Must Root Out

When an IT team member begins behaving poorly, performance and productivity will likely suffer. Here's how to detect and eradicate destructive attitudes before they take root

Gartner Announces Rankings Of The 2021 Supply Chain Top 25

Cisco Systems Retains Top Position; Four New Companies Join Ranking

5 IT Leadership Mistakes To Avoid: Alabama CIO Of The Year Winners Share

What moves must rising IT leaders and seasoned CIOs alike avoid as they nurture individuals? Award-winning CIOs share their advice

The Quotable CIO: Wit And Wisdom From Top Technology Leaders, 9th Edition

Enjoy our ninth collection of CIO quotes that are worth reading and sharing.

The CISO: The Enabler Of Innovation

Myles Bray, senior vice-president EMEA at Forcepoint, discusses how the role of the chief information security officer (CISO) has changed, to enable innovation

Zoom CIO: Hybrid Work Demands Fresh Thinking

Both how we work and the purpose of the office will change dramatically as organizations begin to adopt hybrid work environments. Technology leaders have an important role to play

Digital Transformation At The San Francisco Opera

The San Francisco Opera is one of the world's leading performing arts organizations, with an annual operating budget of $30 million. How did this renowned company use digital technology to adapt its business models and performances during the last year?

Security


7 Hot Cyber Threat Trends To Expect At Black Hat

A sneak peek of some of the main themes at Black Hat USA next month.

Deepfakes: The Next Big Threat

A number of mobile apps give anyone with a smartphone and a few minutes of time on their hands the ability to create and distribute a deep fake video

The Top 7 Identity And Access Management Risks

An IAM system introduces risks to the enterprise, but the consensus is the benefits of IAM outweigh the drawbacks. What are some of the issues that might arise?

How NIST Is Changing Password Creation In 2021

We're living in an era where almost everything is just a few clicks away, and the internet is becoming the second home for all of us.

How AI Will Transform Data Security

I've often wondered whether artificial intelligence (AI) in cybersecurity is a good thing or a bad thing for data security.

Even Highly Skilled IT Professionals Fall Prey To Phishing Attacks

Remote working led to a steep rise in the number of successful phishing attacks, finds survey

Windows 10 And Linux Security Flaws Could Let Hackers Hijack Your Work Machine

Linux bug has been patched even as Microsoft has its under investigation

How Long-Term Hybrid Work Is Changing Security Strategies

CISOs across industries are revisiting the stopgap security tools and the temporary policies they enacted to quickly enable remote work to replace them with stronger permanent solutions. But the old rules no longer apply.

Cloud


Google Cloud Rolls Out New Security Tools As Threat Landscape Heats Up

New tools for the public sector will help agencies comply with President Joe Biden's cybersecurity executive order, while other tools give Google Cloud customers more automated security operations and access to Palo Alto Networks' threat detection technologies

3 Steps To Boost Your Enterprise Cloud Security

Organizations must keep a check on security implications associated with multiple cloud environments. Companies should build robust cloud security policies to defend against evolving cloud risks.

4 Best Practices For Big Data Security In Cloud Computing

When dealing with vast amounts of data in the cloud, enterprises need to be proactive with security. Don't wait for a threat to happen; apply these best practices first.

Hybrid Cloud Success: 5 Things To Forget About, 4 Things To Remember

Prepping for hybrid cloud relies on essentials like developing in-house expertise and careful analysis that proves out what the cost benefits will be

It's Time To Double Down On Cloud Adoption

Jack Watts, EMEA leader, AI at NetApp, discusses the need to double down on cloud deployments when it comes to the AI journey

Windows 365: The Vision For Delivering A CloudPC

The news of Windows 365 and the CloudPC piqued my interest this week. For some time I have been hoping for a persistent virtual desktop experience in the cloud that is unique for me.

Cloud Security Could Be The Biggest Risk Your Workplace Faces

Most malware is now delivered via cloud, report warns

New AWS Volumes Promise Ultra-Low Latency And Mega Durability

New volume supports some SAN features with more under development

AI


What AI Experts Fear from AI

Rogue AIs. Algorithmic bias. Job losses. These are some of the outcomes that AI developers fear will come from their work, according to a new report issued today by the Deloitte AI Institute and the U.S. Chamber of Commerce.

3 Ways To Make Conversational Ai Work For Your Organization

There's little doubt that conversational AI is gaining momentum. The question is this: How can you use it to deliver real business value?

7 Ways AI And ML Are Helping And Hurting Cybersecurity

In the right hands, artificial intelligence and machine learning can enrich our cyber defenses. In the wrong hands, they can create significant harm

Top 10 AIops Platforms

Infrastructure monitoring tools injected with artificial intelligence and machine learning algorithms can anticipate and analyze events and alerts, keeping your enterprise stack humming.

Artificial Intelligence (AI) Strategy: 10 Questions To Ask About Yours

Goodbye AI theater, hello to solving real operations and revenue challenges. Artificial intelligence and data experts say so much has happened in the past two years that it's time to reexamine your AI strategy

Storage


Storage-As-A-Service: Consumption Models From The Big Six

We look at the big six storage makers' consumption model offers, which allow customers to pay for on-prem hardware and cloud storage capacity on a pay-per-use basis, within limits

Apply Hyperscale Data Center Design Principles To IT Storage

Storage admins in large enterprises can borrow infrastructure design principles from the major hyperscale cloud providers to optimize their own storage systems and operations

Are You Ready For The Unstructured Data Explosion?

Over the last decade, unstructured data has exploded - and so have the use cases for this treasure trove of information

Technology


A Little Bigger Than The Raspberry Pi, But A Lot More Powerful (And Expensive!)

Most of the time, the Raspberry Pi is enough, but there are times when you need a lot more power.

DNA Storage Promises 10 Million X Storage Capacity Boost

A datacentre that fits in the palm of your hand? However, right now, DNA storage is an expensive chemical process that researchers are trying to make a practical proposal

Backup


Magic Quadrant For Enterprise Backup And Recovery Software Solutions

The move toward public cloud, heightened concerns over ransomware along with complexities associated with backup and data management are forcing I&O leaders to rearchitect their backup infrastructure and explore alternative solutions

Blockchain


Blockchain Gets Real Across Industries

Blockchain use cases are exploding across industries because these days trust is 'a thing.' Here are 11 examples
``