IT Pro Today is part of the Informa Tech Division of Informa PLC
INFORMA PLC
|
ABOUT US
|
INVESTOR RELATIONS
|
TALENT
This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.
Documents
Online Events
Advertise
About
Newsletter Sign-Up
Newsletter Sign-Up
Cloud
Related Topics
Cloud Services
Hybrid Cloud
Private Cloud
Public Cloud
Recent in
Cloud
SEE ALL Cloud
business people preparing audio visual presentation on collaboration in conference room
Unified Communications
How OpenAI Could Shape the Next Wave of Collaborative Platforms
How OpenAI Could Shape the Next Wave of Collaborative Platforms
by
Eric Krapf,
No Jitter
Jun 28, 2024
3 Min Read
FinOps
Cloud Computing
Optimize Your Cloud Strategy: 6 Key Takeaways From FinOps X 2024
Optimize Your Cloud Strategy: 6 Key Takeaways From FinOps X 2024
by
Industry Perspectives
Jun 28, 2024
4 Min Read
OS
Related Topics
Microsoft Windows
Windows Server
PowerShell
Linux OS
SQL Server
MacOS
Android OS
ChromeOS
Ubuntu
Red Hat OS
Recent in
OS
See All OS
abstract string backgroud
PowerShell
Advanced String Manipulation Techniques in PowerShell
Advanced String Manipulation Techniques in PowerShell
by
Brien Posey
Jun 28, 2024
3 Min Read
pins with words zero trust on a cybernetic board
Linux OS
How To Implement Zero-Trust Security in Linux Environments
How To Implement Zero-Trust Security in Linux Environments
by
Grant Knoetze
Jun 26, 2024
8 Min Read
IT Mgmt
Related Topics
IT Operations
DevOps
Ops and More
IT Sustainability
IT Automation
Recent in
IT Mgmt
See All IT Mgmt
Digital accessibility to-do list
IT Operations
Digital Accessibility: Ensuring Inclusivity in an Online World
Digital Accessibility: Ensuring Inclusivity in an Online World
by
Nathan Eddy
Jun 29, 2024
7 Min Read
green data center
IT Sustainability
AI Obsession Obscures Bigger Promise of Climate Tech
AI Obsession Obscures Bigger Promise of Climate Tech
by
Bloomberg News
Jun 26, 2024
4 Min Read
Career
Related Topics
Career Tips
Certifications
Training
Recent in
Career
See All Career Mgmt
worker frustrated by coworker's loud talking on the phone
Career Tips
The New Work Etiquette: If You Can't Spot the Jerk, It Might Be You
The New Work Etiquette: If You Can't Spot the Jerk, It Might Be You
by
The Washington Post
Jun 27, 2024
6 Min Read
cybersecurity expert on a keyboard
Training
Demand for Better Cybersecurity Fuels a Booming Job Market
Demand for Better Cybersecurity Fuels a Booming Job Market
by
The Washington Post
Jun 24, 2024
12 Min Read
Storage
Related Topics
Cloud Storage
High Speed Storage
Data Backup
Disaster Recovery
Recent in
Storage
See All Data Storage
data floating
IT Operations
How IT Operations Can Play a Critical Role in Data Management
How IT Operations Can Play a Critical Role in Data Management
by
Christopher Tozzi
Jun 21, 2024
4 Min Read
virtual data stack
Data Storage
How to Build a Data Stack That Actually Puts You in Charge of Your Data
How to Build a Data Stack That Actually Puts You in Charge of Your Data
by
Industry Perspectives
Jun 14, 2024
8 Min Read
Security
Related Topics
Vulnerabilities & Threats
Attacks & Breaches
Regulatory Compliance
Data Privacy
Cloud Security
Endpoint Security
Identity Mgmt & Access Control
Recent in
Security
See All IT Security
art featuring padlock and shield icons
Attacks & Breaches
More Microsoft Customers Learn Russian Hackers Saw Their Emails
More Microsoft Customers Learn Russian Hackers Saw Their Emails
by
Bloomberg News
Jun 28, 2024
3 Min Read
an artistic rendering of an outpost on distant planet
Vulnerabilities & Threats
Space: The Final Frontier for Cyberattacks
Space: The Final Frontier for Cyberattacks
by
Jai Vijayan,
Dark Reading
Jun 27, 2024
6 Min Read
Dev
Related Topics
Cloud Native
Programming Languages
No-Code/Low-Code
Software Development Techniques
Recent in
Dev
See All Software Dev
cloud-native
Cloud Native
How Cloud-Native Development Benefits SaaS
How Cloud-Native Development Benefits SaaS
by
Forrester Blog Network
Jun 28, 2024
3 Min Read
blurred programmer behind screen of code
Software Development Techniques
AI-Assisted Development Tools vs. Low-Code/No-Code: What to Use When
AI-Assisted Development Tools vs. Low-Code/No-Code: What to Use When
by
Christopher Tozzi
Jun 27, 2024
4 Min Read
DX
Related Topics
AI & Machine Learning
Edge Computing
IoT
Recent in
DX
See All Digital Transformation
concept art of autonomous tractor scanning agricultural plot
AI & Machine Learning
Robots, Drones and Driverless Tractors Usher In New Age of Farming
Robots, Drones and Driverless Tractors Usher In New Age of Farming
by
Bloomberg News
Jun 27, 2024
6 Min Read
Bill Gates
AI & Machine Learning
Bill Gates Says AI's Green Benefits Will Outweigh Its Emissions
Bill Gates Says AI's Green Benefits Will Outweigh Its Emissions
by
Bloomberg News
Jun 27, 2024
2 Min Read
Infrastructure
Related Topics
High Performance Computing
Containerization
Server Virtualization
Recent in
Infrastructure
See All Infrastructure
Arati Prabhakar, director of the White House's Office of Science and Technology Policy
High Performance Computing
Biden’s Science Adviser Explains the New Hard Line on China
Biden’s Science Adviser Explains the New Hard Line on China
by
The Washington Post
Jun 4, 2024
7 Min Read
More
Related Topics
Newsletters
How To…?
Industry Perspectives
Business Resources
Reports/Research
Online Events
Live Events
Videos
White Papers
Advertise With Us
About Us
Resource Library
Home
Jeffrey Burt
Jeffrey Burt
https://www.itprotoday.com/author/Jeffrey-Burt
Latest from Jeffrey Burt
Moving Toward a Password-less Authentication Future
Identity Management & Access Control
Moving Toward a Password-less Authentication Future
Moving Toward a Password-less Authentication Future
by
Jeffrey Burt
Apr 18, 2019
9 Min Read
Facing the Cybersecurity Skills Gap
IT Security
Facing the Cybersecurity Skills Gap
Facing the Cybersecurity Skills Gap
by
Jeffrey Burt
Apr 16, 2019
10 Min Read
All from Jeffrey Burt
Vulnerabilities & Threats
Recent Security Breaches, IoT Vulnerabilities Make Top Stories of 2018
Recent Security Breaches, IoT Vulnerabilities Make Top Stories of 2018
Dec 26, 2018
|
6 Min Read
by
Jeffrey Burt
Attacks & Breaches
Ransomware Attack Victim: Once Bitten, Twice Shy
Ransomware Attack Victim: Once Bitten, Twice Shy
Dec 17, 2018
|
7 Min Read
by
Jeffrey Burt
Vulnerabilities & Threats
Navigation Apps May Be Following You
Navigation Apps May Be Following You
Dec 6, 2018
|
5 Min Read
by
Jeffrey Burt
Vulnerabilities & Threats
Threat Actors Are Exploiting IT Networks to Attack Energy, Utilities
Threat Actors Are Exploiting IT Networks to Attack Energy, Utilities
Nov 16, 2018
|
5 Min Read
by
Jeffrey Burt
Attacks & Breaches
Natural Disasters, Other Major Events Draw Cyberscams and Phishing Exploits
Natural Disasters, Other Major Events Draw Cyberscams and Phishing Exploits
Nov 1, 2018
|
5 Min Read
by
Jeffrey Burt
Attacks & Breaches
Recent Security Breaches Come at Great Cost--Including Jobs
Recent Security Breaches Come at Great Cost--Including Jobs
Oct 26, 2018
|
5 Min Read
by
Jeffrey Burt
Attacks & Breaches
Cold Boot Attack Method Leaves Laptops Vulnerable
Cold Boot Attack Method Leaves Laptops Vulnerable
Oct 4, 2018
|
5 Min Read
by
Jeffrey Burt
Vulnerabilities & Threats
When It Comes to Fantasy Football Today, Cyber Risks Could Sack Companies
When It Comes to Fantasy Football Today, Cyber Risks Could Sack Companies
Sep 30, 2018
|
4 Min Read
by
Jeffrey Burt
Vulnerabilities & Threats
Microsoft Offers Threat Detection Technology for Overworked Security Teams
Microsoft Offers Threat Detection Technology for Overworked Security Teams
Sep 25, 2018
|
5 Min Read
by
Jeffrey Burt
Attacks & Breaches
Artificial Intelligence Risk: Get Ready for AI-Powered Malware
Artificial Intelligence Risk: Get Ready for AI-Powered Malware
Sep 12, 2018
|
6 Min Read
by
Jeffrey Burt
Attacks & Breaches
Malware Types Multiplying: Attackers Reuse Old Ransomware for Cryptocurrency Malware
Malware Types Multiplying: Attackers Reuse Old Ransomware for Cryptocurrency Malware
Sep 5, 2018
|
5 Min Read
by
Jeffrey Burt
Attacks & Breaches
Add This to the List of 'New' Malware Types You Need to Look Out For: Snail Mail
Add This to the List of 'New' Malware Types You Need to Look Out For: Snail Mail
Aug 21, 2018
|
4 Min Read
by
Jeffrey Burt
MacOS
Google, Apple Put Protections in Place Against Malicious Cryptocurrency Mining Software
Google, Apple Put Protections in Place Against Malicious Cryptocurrency Mining Software
Aug 5, 2018
|
4 Min Read
by
Jeffrey Burt
Vulnerabilities & Threats
Geopolitics of Russia, China, U.S. Increasingly Affect IT Security
Geopolitics of Russia, China, U.S. Increasingly Affect IT Security
Jul 30, 2018
|
6 Min Read
by
Jeffrey Burt
Android OS
Scammers Use Fake Links to Entice Anxious Android Fortnite Fans
Scammers Use Fake Links to Entice Anxious Android Fortnite Fans
Jul 10, 2018
|
4 Min Read
by
Jeffrey Burt
Endpoint Security
World Cup Soccer 2018 Draws Fans and Cybercriminals Alike
World Cup Soccer 2018 Draws Fans and Cybercriminals Alike
Jun 14, 2018
|
5 Min Read
by
Jeffrey Burt
Attacks & Breaches
The Rise of Cryptojacking: Virtual Currency Mining Malware Gets More Sophisticated
The Rise of Cryptojacking: Virtual Currency Mining Malware Gets More Sophisticated
May 29, 2018
|
4 Min Read
by
Jeffrey Burt
Editor's Choice
cybersecurity operator or hacker works with data in dark room
IT Security
Master AI Cybersecurity: Protect and Enhance Your Network
Master AI Cybersecurity: Protect and Enhance Your Network
by
Brien Posey
May 21, 2024
5 Min Read
business person stamping a document
IT Operations
How to Get Executive Buy-In for IT Projects
How to Get Executive Buy-In for IT Projects
by
Christopher Tozzi
May 28, 2024
6 Min Read
yellow block stuck in between blue cog wheels
PowerShell
Using ChatGPT as a PowerShell Debugging Tool
Using ChatGPT as a PowerShell Debugging Tool
by
Brien Posey
Jun 4, 2024
4 Min Read
Sign up for the ITPro Today newsletter
Stay on top of the IT universe with commentary, news analysis, how-to's, and tips delivered to your inbox daily.
Newsletter Sign-Up