Insights
Red Hat embraces hybrid cloud for internal IT
Step 1: Reducing data center sprawl Palermo and team began project Open Hybrid Cloud roughly 18 months ago. They recently finished the first phase, which...
OpenAI’s ChatGPT app for iPad, iPhone hits 500K downloads
OpenAI shipped its ChatGPT app for iPads and iPhones just a week ago, but it has already become one of the most popular applications in...
10 most popular IT certifications for 2023
4. Project Management Professional (PMP) Offered by the Project Management Institute, the Project Management Professional (PMP) certification is designed for advanced project management professionals. The...
Stepping up to the challenge of a global conglomerate CIO role
Dr. Amrut Urkude, CIO of Reliance Polyester (more…)
State of the CIO, 2023: come costruire una strategia aziendale di successo
Allo stesso modo, le priorità IT del CIO nel 2023 saranno rafforzare la collaborazione tra il dipartimento tecnologico e il business, migliorare la sicurezza IT...
Ecco come i CIO devono evolvere per evitare le minacce esistenziali al loro ruolo
Per reggere il confronto, sostiene Sharma, i CIO non possono fermarsi a coltivare le sole competenze di business ma, anzi, devono sviluppare le loro capacità...
Trending News
How an innocuous app morphed into a trojan – Week in security with Tony Anscombe | WeLiveSecurity
ESET research uncovers an Android app that initially had no harmful features but months later turned into a spying tool This week, ESET malware researcher...
Shedding light on AceCryptor and its operation | WeLiveSecurity
ESET researchers reveal details about a prevalent cryptor, operating as a cryptor-as-a-service used by tens of malware families In this blogpost we examine the operation...
Digital security for the self‑employed: Staying safe without an IT team to help | WeLiveSecurity
Nobody wants to spend their time dealing with the fallout of a security incident instead of building up their business Approximately one in seven people...
Android app breaking bad: From legitimate screen recording to file exfiltration within a year | WeLiveSecurity
ESET researchers discover AhRat – a new Android RAT based on AhMyth – that exfiltrates files and records audio ESET researchers have discovered a trojanized...
The real cost of a free lunch – Week in security with Tony Anscombe | WeLiveSecurity
Don’t download software from non-reputable websites and sketchy links – you might be in for more than you bargained for Chances are good that you...
5 useful search engines for internet‑connected devices and services | WeLiveSecurity
A roundup of some of the handiest tools that security professionals can use to search for and monitor devices that are accessible from the internet...