A curated technology Newsletter with no Company or Product reviews

Published twice weekly to keep you informed

 

IT Weekly Newsletter June 29, 2020

Articles Added from 6-23-2020 to 6-20-2020

 

"There's always room at the top."

Daniel Webster (1782 1852) American Statesman and Lawyer

 

An API to access our SQL repository of article links and metadata can be added to your internal or external website that would assist in keeping your staff up to date and/or visitors on your site.  Call us at 602-463-6558 for pricing. Imagine the productivity if we can save one hour per staff per week in staying current.

 

In addition to these recent articles added since the last Newsletter search over 16,570+ archived articles using the SEARCH box with a keyword or keywords.

 

SECURITY

 

Hacker Group Stole $200 Million From Cryptocurrency Exchanges

More Than 75% of All Vulnerabilities Reside in Indirect Dependencies

7 Tips for Effective Deception

Another Record-Breaking DDoS Attack Signals Shift in Criminal Methods

Evil Corp's 'WastedLocker' Campaign Demands Big Ransom

Tax Software Spies on Companies Doing Business in China

10 Cyberattacks on the Rise During the Pandemic

Average Cost of a Data Breach: $116M

GitRoot: 1 Vulnhub Walkthrough

Ransomware Perspectives: The Shape of Things to Come

Hackers Use Java to Hide Malware on the Data Center Network

Corporate Governance in the Era of Offsite Employees

80,000 Printers are Exposing Their IPP Port Online

 

CLOUD TECHNOLOGY

 

Cloud Threats and Priorities as We Head Into the Second Half of 2020

Eight Steps to Cloud-Native Application Development

5 Steps for Implementing Multicloud Identity

Shadow IT: It's A Bigger Threat Than You Think

 
MANAGEMENT and LEADERSHIP

 

Project Assumptions: You Must Be a Project Manager If You Like Swiss Cheese

How to Wring Every Last Drop Out of Your Security Budget

5 Unnecessary Security Risks Your Employees are Taking from Home

 

NETWORKS and CONNECTIVITY

 

A Glossary of the VPN Terminology You Need to Know

A Deep Dive into the Differences Between 5G and Wi-Fi 6

SASE Model Aims to Boost Network Security, Performance

Understanding the Kubernetes Networking Model

The Rise of 5G Connectivity

 

DEVOPS and AGILE DEVELOPMENT

 

Better Collaboration Between Security & Development

How to Secure Software In a DevOps World

 

DATA PROTECTION and ANALYTICS

 

Marred By Garbage: Striking A Balance for Security Data

From Visibility to Insights

How Insurance Data Science is Like Gelato

How to Secure Machine Learning

 

DATA CENTER OPERATIONS

 

GEEK STUFF

 

Connected Devices and Security: Where Do We Stand?

New Insights into the Energy Levels In Quantum Dots

Best Long Range RFID Manufacturers

 

SERVER ADMINISTRATION

 

STORAGE TECHNOLOGIES

 

AUDIT and COMPLIANCE

 

Debunking the Myth That Greater Compliance Makes IT More Secure

French Court Upholds $56 Million Google GDPR Fine

 

POTPOURRI

 

We do not use cookies or collect, store or save any information on visitors.  The only items we collect are that someone visited and the articles viewed. We never share or sell our subscriber list.

 

 

Feel free to forward the Newsletter to your staff, associates, peers and anyone involved in IT

 

Warren Avery

602-463-6558

[email protected]

http://www.linkedin.com/in/wavery

 

If you would like to advertise with us, give me a call.

 

If you would prefer not to receive further newsletters:

 

1. Click on the Reply button.

2. Replace the Subject field with the word REMOVE.

3. Click the Send button.

 

URL links, link contents and Trademarks are copyright of their respective owners.