What is NetDevOps and how can it help IT meet business goals?

What is NetDevOps and how can it help IT meet business goals?

Most IT executives are probably familiar with the concepts of DevOps and DevSecOps. There’s a new model generating considerable buzz that is particularly relevant to networking professionals: NetDevOps. As with other emerging technologies, the definition of NetDevOps varies depending on who is providing it. But at a basic level, the term refers to the application of DevOps principles to computer networking. “NetDevOps is a pretty hot [and] hyped topic,” says Andrew Lerner, research vice president…

Read More

Review: RHEL 9 delivers better security, management

Review: RHEL 9 delivers better security, management

RHEL 9.0, the latest major release of  Red Hat Enterprise Linux, delivers tighter security, as well as improved installation, distribution, and management for enterprise server and cloud environments. The operating system, code named Plow, is a significant upgrade over RHEL 8.0 and makes it easier for application developers to test and deploy containers. Available in server and desktop versoins, RHEL remains one of the top Linux distributions for running enterprise workloads because of its stability,…

Read More

Why CIOs are increasingly vital to African supply chains

Why CIOs are increasingly vital to African supply chains

CIO Africa: What is your sense of the current trade landscape in Africa in light of supply chain issues that arose from the pandemic and war in Ukraine? Typically in supply chains, there are three parameters that are important: cost, reliability, and length of the supply chain, or the time it takes to connect from one market to another. During COVID-19, all three of these were affected quite significantly by air, sea, and land. Trucks were…

Read More

6 ways UK CIOs can help to begin closing the IT skills gap

6 ways UK CIOs can help to begin closing the IT skills gap

Skills shortages continue to plague the IT sector, causing UK technology job vacancies to shoot up by almost 200% since 2020, according to BCS. Not having the right skills or team is the third biggest worry among senior IT decision-makers in the UK, with two-thirds of technology executives (66%) highlighting that their organisation’s digital transformation projects are being stalled due to struggles in recruiting IT professionals with the skills they need. Cybersecurity is the UK…

Read More

Transitioning from public to private sector security

Transitioning from public to private sector security

Transitioning from public to private sector security | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

Future-proofing your organization against the unknown

Future-proofing your organization against the unknown

Future-proofing your organization against the unknown | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy…

Read More

5 tips for an effective security awareness program

5 tips for an effective security awareness program

5 tips for an effective security awareness program | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

The True Cost of a Security Breach | The State of Security

The True Cost of a Security Breach | The State of Security

There have been many articles about the cost of a security breach. With the emergence of privacy regulations that assign penalties based on a business’ profit, or those that calculate a value for each compromised record, it is possible to calculate the cost of a breach based on those metrics. However, it would seem that these hard numbers are not detailed enough to placate many security professionals. Too many cybersecurity professionals take the unnecessarily broad…

Read More

Why A “Group of Rivals” Developed A Cybersecurity Taxonomy, And What It Buys You

Why A “Group of Rivals” Developed A Cybersecurity Taxonomy, And What It Buys You

Advancing Risk Management and Stemming the River of Risk by Adopting the Consistent Taxonomy of Cybersecurity Threats – Cybersecurity’s “Lingua Franca.” By Charlie Miller, Senior Advisor, Shared Assessments, CTPRP, Distinguished Ponemon Fellow Companies have been assessing their risks for ages so that they can mitigate them. When companies began to outsource, they faced new risk challenges because they didn’t have much visibility into the control adequacy of the third parties they used. Technology, digital transformation,…

Read More

Data Distribution Service: Exploring Vulnerabilities and Risks Part 2

Data Distribution Service: Exploring Vulnerabilities and Risks Part 2

Data Distribution Service: Exploring Vulnerabilities and Risks Part 2 Privacy & Risks In part two of our series, we’ll highlight both known and new DDS vulnerabilities and what they mean for mission critical operations. By: Trend Micro July 06, 2022 Read time:  ( words) In part one, we have an exhaustive overview of Data Distribution Services (DDS). We also highlighted where this middleware software is used, which includes systems that drive systems such as railways,…

Read More
1 2,854 2,855 2,856 2,857 2,858 4,066