Your browser is incompatible with this site. Upgrade to a different browser like Google Chrome or Mozilla Firefox to experience this site.
1016 Results Found
Cloud adoption continues to soar. In fact, worldwide Infrastructure-as-a-Service (IaaS) public cloud services grew by 29.5 percent in 2017, according to Gartner. If it’s not in a company’s current plans to utilize cloud technology, it most certainly will be (or should be) in the next couple of years.
The Cyber Risk landscape is rapidly evolving leaving Cybersecurity professionals dazzled and lost in prioritizing their cybersecurity needs. Limited budget and low cyber resilience lead organizations in adopting re-active defensive measures. In this webinar, we will go through a methodological approach for assessing top cyber-risks a typical enterprise might encounter. And will address different scenarios for mitigating, transferring, or avoiding encountered risks.
A firewall is a security tool which may be a hardware or software solution that is used to filter network traffic. Understand the basic functionality of a firewall where traffic is blocked or allowed to enter the network.
An incident is an event that could lead to loss of, or disruption to, an organization's operations, services or functions. Understand how an incident response team prepares, plans, and responds to a security breach.
The goal of risk management is to reduce risk down to an acceptable or tolerable level. Understand countermeasures, safeguards, and security controls that can be selected to eliminate or reduce risk.
We asked for your top IT horror stories, and you delivered. Read the most unexpected and cringe-worthy IT nightmares from fellow IT professionals.
Networks are under attack as hackers try to access systems to compromise or steal sensitive data and information. Understand the threats posed by malware, ransomware and social engineering.
ITIL® 4 reflects new ways of working that have accompanied the digital revolution. Service Management, and ITIL in particular, is still an important toolset but you are now integrating its adoption and use with a vast array of new ways of working (DevOps, Agile, SIAM, Site Reliability Engineering). Since ITIL v3 was released in 2006, a large number of new and updated technologies (Cloud, Serverless Computing, Software-Defined Networking, AI, etc.) have emerged that now need managing. ITIL 4 reflects these changes. Here are some frequently asked questions about ITIL 4, as well as answers that explain what it entails, why we need it and how it differs from ITIL v3.
Experience the best of instructor-led and on-demand learning. Blended Live from Global Knowledge combines the expert direction of instructor-led training and the flexibility of on-demand learning and will enable you to close critical skills gaps more effectively while maintaining your day to day responsibilities.
The idea of building and running applications without thinking about the servers (AKA serverless computing) is a developers dream come true. Watch expert Rich Morrow to understand: The benefits of using serverless computing Different architectures that use serverless computing How AWS services, like Lambda, S3, API Gateway and DynamoDB work together to enable faster and more flexible application deployment and management. This video also features a live demo: Building a web app with only serverless components.