A curated technology Newsletter with no Company or Product reviews

Published twice weekly to keep you informed

 

IT Weekly Newsletter June 6, 2020

Articles Added from 6-3-2020 to 6-9-2020

 

"When you come out of the storm, you won't be the same person who walked in.

That's what this storm's all about."

Haruki Murakami (1949 - ) Japanese Writer

 

An API to access our SQL repository of article links and metadata can be added to your internal or external website that would assist in keeping your staff up to date and/or visitors on your site.  Call us at 602-463-6558 for pricing. (We are also open to Ads)

 

In addition to these recent articles added since the last Newsletter search over 16,300+ archived articles using the SEARCH box with a keyword or keywords.

 

 

SECURITY

 

What Usability Means to Security Pros

Beginners Guide to Threat Intelligence

Study: Breach Victims Rarely Change Passwords

Cybersecurity: Four Ways You Can Keep the Hackers Away

Lean into Zero Trust to Ensure Security In Times of Agility

Octopus Scanner Sinks Tentacles into GitHub Repositories

What the World's Elite Protectors Teach Us about Cybersecurity (Parts 1 & 2

Top Ransomware Attack Vectors: RDP, Drive-By, Phishing

Why is SDP the Most Effective Architecture for Zero Trust Strategy Adoption?

Millions are on Contact-Tracing Apps with Poor Privacy Safeguards

When SOCs Never Stop: How to Fill the Intelligence Gaps in Security

 

CLOUD TECHNOLOGY

 

How to Build a Cloud Data Restore and Recovery Plan

The Enterprise Guide to Cloud Security Essentials

 

MANAGEMENT and LEADERSHIP

 

Communication Tips From the World of Entertainment

What Government Contractors Need to Know About NIST, DFARS Password Reqs

Remote Teams: How to Build a Culture of Accountability

What HR Professionals Need to Know About Returning Employees to Work and COVID-19 Testing

Wawa Data Breach Aftermath: Observations from the Legal Side of Things

 

NETWORKS and CONNECTIVITY

 

The 5G Evolution: 3GPP Releases 16-17

5G Adoption, Security and Worldwide Market Trends

 

 

DEVOPS and AGILE DEVELOPMENT

 

Microservices: A Cheat Sheet

 

DATA PROTECTION and ANALYTICS

 

Why The Future of Enterprise Data is Open Source

Everyone Wants to Retire Mainframes But 74% of Modernization Efforts Fail

Your Metrics Are Going Haywire. Now What?

 

DATA CENTER OPERATIONS

 

Archiving vs. Transparent Archiving

Recovery Management on the Rise

Cooking Up Secure Code: A Foolproof Recipe for Open Source

 

GEEK STUFF

 

Breaking the Mold: An Unusual Choice of Material Yields Incredibly Long-Lasting Batteries

Graphene and 2D Materials Could Move Electronics Beyond 'Moore's Law'

From Amazon to Zuckerberg: 25 Years of Technology

 

SERVER ADMINISTRATION

 

This New Ransomware Is Targeting Windows and Linux Pcs With a 'Unique' Attack

 

STORAGE TECHNOLOGIES

 

AUDIT and COMPLIANCE

 

POTPOURRI

 

Do I Have Something in My Teeth? Trust, Candor, and Simplicity in Culture

 

We do not use cookies or collect, store or save any information on visitors.  The only items we collect are that someone visited and the articles viewed. We never share or sell our subscriber list.

 

 

Feel free to forward the Newsletter to your staff, associates, peers and anyone involved in IT

 

Warren Avery

602-463-6558

wavery@ITWeeklyNewsletter.com

http://www.linkedin.com/in/wavery

 

If you would like to advertise with us, give me a call.

 

If you would prefer not to receive further newsletters:

 

1. Click on the Reply button.

2. Replace the Subject field with the word REMOVE.

3. Click the Send button.

 

URL links, link contents and Trademarks are copyright of their respective owners.