If you had a busy week in the office and need to catch up, here’s our recap of tech articles you may have missed the week of 06/03/19!
Special on-Demand webinar!
Begin your digital journey: Sound Strategy Starts with the Right Data and Goals
IT Operations
-
How to fail at digital transformation: 3 pitfalls to avoid at all costs
-
Enterprise storage disaster recovery and container storage
-
Effective data management to combat the coming data apocalypse
-
Where serverless storage fits in the serverless computing world
-
Juniper: Security could help drive interest in SDN
-
Slashing the costs of AI projects with a new platform
-
Maximize application performance with VDI optimization tools
Microsoft
-
Windows 10 passwords won't expire: Why Microsoft says this will make your account safer
-
The June release of Azure Data Studio is now available
-
Dynamics 365 customer insights - June 2019 release notes
Cisco
-
Cisco will use AI/ML to boost intent-based networking
-
Cisco to acquire industrial IoT company Sentryo
VMware
-
How VMware is transforming itself into a multi-cloud company
-
Cloud Automation Services SDK for Python
Dell EMC
-
Q & A: Dell's 'autonomous storage' evolves to meet data demands
AWS
-
At re:MARS, Amazon sells itself as an AI innovator
-
How to securely provide database credentials to Lambda function by using AWS Secrets Manager
-
Updates to Serverless Architectural Patterns and best practices
Security
-
WannaCry exploits healthcare companies with older, unmanaged devices that are difficult to patch
-
11.9M Quest Diagnostics patients potentially exposed to data breach
-
NSA, Microsoft issue BlueKeep vulnerability warnings, call for 'all hands on deck'
-
A botnet is brute-forcing over 1.5 million RDP servers all over the world
-
Cathay Pacific's unpatched decade-old vulnerability led to 2018 breach
-
Cybersecurity: How to get your software patching strategy right and keep the hackers at bay
-
Phishing attacks that bypass 2-factor authentication are now easier to execute
-
From phish to network compromise in two hours: How Carbanak operates
-
5 security problems that annoy CIOs and CISOs the most
-
Hackers tack aim at Fortune 500 companies on the dark web
-
How to protect your organization against modular malware
Thanks for checking out our tech news recap!
By Jake Cryan, Digital Marketing Specialist