| | | INSIDER Alert | | Your guide to the top content posted this week for Insider members | | | | Computerworld Whether you're an IT student or have been in the field for many years, the learning never stops, especially in regards to security. Hackers are discovering vulnerabilities in our software and systems 24/7. They'll always find new ways to steal data, infect computers and wreak havoc in the digital world.Even if security isn't your IT specialty, security awareness is crucial in any technology position. There is no better way to learn than to get hands-on experience, so here I share several projects you can do. All can be performed at home on your personal devices or at work—if (and only if) you have an appropriate position and full authorization from management.That bears repeating: Always get full permission before performing these projects on someone else's computer or network, or else stick to using your own equipment. Several of the techniques covered here are used by hackers and could land you in hot water if you try them without authorization. That said, they have good purposes as well, giving you the ability to audit the security of your network and other tech equipment. | | Network World There’s nothing like the winter doldrums to make many of us seek a little inspiration, especially when it comes to making a career change. Should you sign up for certification class, brush up your resume, find a mentor, enter a hackathon? All of those activities have merit, but if your motivation only takes you so far, you might start with a TED talk. Of the hundreds available online, many are geared toward helping people view life in a new way, which can reshape how they approach work. We’ve collected a handful of talks that could help you approach your career in a new light. READ MORE | | CSO Some information spies navigate the hiring process with every intention to steal corporate secrets for a competitor or foreign state once inside. Others turn against an employer when angered and leave, lured by job offers and incentives to haul out as much data as they can when they go.Meanwhile, enterprise efforts to spot traitors and limit their access to sensitive data may not be enough. With the right job and the right access, operatives posing as janitors, mailroom employees, or IT staff can skirt efforts to defend data, using their broad access to walk data out the door. READ MORE | | Computerworld Relationships with vendors seldom last forever. Here's how some IT managers have approached change-ups with their cloud providers. READ MORE | | Computerworld Scientists announced last month that 2014 was the planet's warmest year on record, sparking renewed debate in Washington about the causes of global warming and what to do about it. But global warming isn’t just a political issue, it’s an IT issue as well. No matter what your personal beliefs are, IT execs would be remiss if they didn’t think about global warming in the context of disaster recovery, just as you would if your company were located in a region prone to hurricanes or earthquakes. And beyond that, global warming could present an opportunity for you to lead your company into new growth areas. READ MORE | | InfoWorld The world of storage is in the throes of a significant upheaval, as the increasing affordability of flash and the ubiquity of virtualization spark new and innovative approaches to the back-end storage array. Among the new storage companies at the forefront of this revolution is Tintri, whose founders came out of companies such as VMware and Data Domain. READ MORE | | | |
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.