IT Pro Today is part of the Informa Tech Division of Informa PLC
INFORMA PLC
|
ABOUT US
|
INVESTOR RELATIONS
|
TALENT
This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.
Documents
Online Events
Advertise
About
Newsletter Sign-Up
Newsletter Sign-Up
Cloud
Related Topics
Cloud Services
Hybrid Cloud
Private Cloud
Public Cloud
Recent in
Cloud
SEE ALL Cloud
Microsoft office building
Azure Cloud
Microsoft Dodges EU Antitrust Probe in Deal with Cloud Lobby
Microsoft Dodges EU Antitrust Probe in Deal with Cloud Lobby
by
Bloomberg News
Jul 10, 2024
2 Min Read
finger pressing an ERP button on a keyboard
Cloud Computing
3 Reasons Why Your Business Should Switch to a Cloud-Based ERP System
3 Reasons Why Your Business Should Switch to a Cloud-Based ERP System
by
Industry Perspectives
Jul 5, 2024
3 Min Read
OS
Related Topics
Microsoft Windows
Windows Server
PowerShell
Linux OS
SQL Server
MacOS
Android OS
ChromeOS
Ubuntu
Red Hat OS
Recent in
OS
See All OS
padlocks on top of coce
Networking & Security
How AI Can Improve Network Security
How AI Can Improve Network Security
by
Network Computing
Jul 5, 2024
2 Min Read
illustration of a soundwave
PowerShell
How To Make PowerShell Speak (Text-to-Speech .NET Tutorial)
How To Make PowerShell Speak (Text-to-Speech .NET Tutorial)
by
Brien Posey
Jul 5, 2024
8 Min View
IT Mgmt
Related Topics
IT Operations
DevOps
Ops and More
IT Sustainability
IT Automation
Recent in
IT Mgmt
See All IT Mgmt
businessperson working on digital tablet
IT Operations
5 Questions To Ask Your Network Provider To Ensure Uptime
5 Questions To Ask Your Network Provider To Ensure Uptime
by
Industry Perspectives
Jul 9, 2024
4 Min Read
SRE under a magnifying glass
IT Operations
Nanotechnology and SRE: Pioneering Precision in Performance
Nanotechnology and SRE: Pioneering Precision in Performance
by
Industry Perspectives
Jul 9, 2024
5 Min Read
Career
Related Topics
Career Tips
Certifications
Training
Recent in
Career
See All Career Mgmt
manager shaking hands with a team member
IT Management
Meaningful Ways to Reward Your IT Team and Its Achievements
Meaningful Ways to Reward Your IT Team and Its Achievements
by
InformationWeek
Jul 8, 2024
2 Min Read
female employee working on a computer
Career Management
Beyond a Bunch of Guys: How One IT Company Boosted Women's Representation
Beyond a Bunch of Guys: How One IT Company Boosted Women's Representation
by
Joe Milan
Jul 8, 2024
9 Min Read
Storage
Related Topics
Cloud Storage
High Speed Storage
Data Backup
Disaster Recovery
Recent in
Storage
See All Data Storage
data floating
IT Operations
How IT Operations Can Play a Critical Role in Data Management
How IT Operations Can Play a Critical Role in Data Management
by
Christopher Tozzi
Jun 21, 2024
4 Min Read
virtual data stack
Data Storage
How to Build a Data Stack That Actually Puts You in Charge of Your Data
How to Build a Data Stack That Actually Puts You in Charge of Your Data
by
Industry Perspectives
Jun 14, 2024
8 Min Read
Security
Related Topics
Vulnerabilities & Threats
Attacks & Breaches
Regulatory Compliance
Data Privacy
Cloud Security
Endpoint Security
Identity Mgmt & Access Control
Recent in
Security
See All IT Security
digital art of a skull, a key, and the word ransomware
Vulnerabilities & Threats
Eldorado Ransomware Cruises Onto the Scene to Target VMware ESXi
Eldorado Ransomware Cruises Onto the Scene to Target VMware ESXi
by
Nathan Eddy,
Dark Reading
Jul 9, 2024
3 Min Read
elementary students in classroom raising hands
Vulnerabilities & Threats
What Cybersecurity Defense Looks Like for School Districts
What Cybersecurity Defense Looks Like for School Districts
by
Dark Reading
Jul 2, 2024
4 Min Read
Dev
Related Topics
Cloud Native
Programming Languages
No-Code/Low-Code
Software Development Techniques
Recent in
Dev
See All Software Dev
stand-up meeting around a desk
Software Development Techniques
The Great Stand-Up Debate: Are Daily Developer Meetings Beneficial?
The Great Stand-Up Debate: Are Daily Developer Meetings Beneficial?
by
Christopher Tozzi
Jul 10, 2024
4 Min Read
fintech applications
Software Development Techniques
Building Finance Apps: Best Practices and Unique Challenges
Building Finance Apps: Best Practices and Unique Challenges
by
Christopher Tozzi
Jul 4, 2024
5 Min Read
DX
Related Topics
AI & Machine Learning
Edge Computing
IoT
Recent in
DX
See All Digital Transformation
three drones flying in the sky
IoT
Could Drones Call Each Other Using 5G?
Could Drones Call Each Other Using 5G?
by
Light Reading
Jul 10, 2024
3 Min Read
robot hand on one hundred dollar bill
AI & Machine Learning
Will AI Ever Pay Off? Those Footing the Bill Are Worrying Already
Will AI Ever Pay Off? Those Footing the Bill Are Worrying Already
by
Bloomberg News
Jul 10, 2024
5 Min Read
Infrastructure
Related Topics
High Performance Computing
Containerization
Server Virtualization
See All Infrastructure
More
Related Topics
Newsletters
How To…?
Industry Perspectives
Business Resources
Reports/Research
Online Events
Live Events
Videos
White Papers
Advertise With Us
About Us
Resource Library
Home
Jeffrey Burt
Jeffrey Burt
https://www.itprotoday.com/author/Jeffrey-Burt
Latest from Jeffrey Burt
Moving Toward a Password-less Authentication Future
Identity Management & Access Control
Moving Toward a Password-less Authentication Future
Moving Toward a Password-less Authentication Future
by
Jeffrey Burt
Apr 18, 2019
9 Min Read
Facing the Cybersecurity Skills Gap
IT Security
Facing the Cybersecurity Skills Gap
Facing the Cybersecurity Skills Gap
by
Jeffrey Burt
Apr 16, 2019
10 Min Read
All from Jeffrey Burt
Vulnerabilities & Threats
Recent Security Breaches, IoT Vulnerabilities Make Top Stories of 2018
Recent Security Breaches, IoT Vulnerabilities Make Top Stories of 2018
Dec 26, 2018
|
6 Min Read
by
Jeffrey Burt
Attacks & Breaches
Ransomware Attack Victim: Once Bitten, Twice Shy
Ransomware Attack Victim: Once Bitten, Twice Shy
Dec 17, 2018
|
7 Min Read
by
Jeffrey Burt
Vulnerabilities & Threats
Navigation Apps May Be Following You
Navigation Apps May Be Following You
Dec 6, 2018
|
5 Min Read
by
Jeffrey Burt
Vulnerabilities & Threats
Threat Actors Are Exploiting IT Networks to Attack Energy, Utilities
Threat Actors Are Exploiting IT Networks to Attack Energy, Utilities
Nov 16, 2018
|
5 Min Read
by
Jeffrey Burt
Attacks & Breaches
Natural Disasters, Other Major Events Draw Cyberscams and Phishing Exploits
Natural Disasters, Other Major Events Draw Cyberscams and Phishing Exploits
Nov 1, 2018
|
5 Min Read
by
Jeffrey Burt
Attacks & Breaches
Recent Security Breaches Come at Great Cost--Including Jobs
Recent Security Breaches Come at Great Cost--Including Jobs
Oct 26, 2018
|
5 Min Read
by
Jeffrey Burt
Attacks & Breaches
Cold Boot Attack Method Leaves Laptops Vulnerable
Cold Boot Attack Method Leaves Laptops Vulnerable
Oct 4, 2018
|
5 Min Read
by
Jeffrey Burt
Vulnerabilities & Threats
When It Comes to Fantasy Football Today, Cyber Risks Could Sack Companies
When It Comes to Fantasy Football Today, Cyber Risks Could Sack Companies
Sep 30, 2018
|
4 Min Read
by
Jeffrey Burt
Vulnerabilities & Threats
Microsoft Offers Threat Detection Technology for Overworked Security Teams
Microsoft Offers Threat Detection Technology for Overworked Security Teams
Sep 25, 2018
|
5 Min Read
by
Jeffrey Burt
Attacks & Breaches
Artificial Intelligence Risk: Get Ready for AI-Powered Malware
Artificial Intelligence Risk: Get Ready for AI-Powered Malware
Sep 12, 2018
|
6 Min Read
by
Jeffrey Burt
Attacks & Breaches
Malware Types Multiplying: Attackers Reuse Old Ransomware for Cryptocurrency Malware
Malware Types Multiplying: Attackers Reuse Old Ransomware for Cryptocurrency Malware
Sep 5, 2018
|
5 Min Read
by
Jeffrey Burt
Attacks & Breaches
Add This to the List of 'New' Malware Types You Need to Look Out For: Snail Mail
Add This to the List of 'New' Malware Types You Need to Look Out For: Snail Mail
Aug 21, 2018
|
4 Min Read
by
Jeffrey Burt
MacOS
Google, Apple Put Protections in Place Against Malicious Cryptocurrency Mining Software
Google, Apple Put Protections in Place Against Malicious Cryptocurrency Mining Software
Aug 5, 2018
|
4 Min Read
by
Jeffrey Burt
Vulnerabilities & Threats
Geopolitics of Russia, China, U.S. Increasingly Affect IT Security
Geopolitics of Russia, China, U.S. Increasingly Affect IT Security
Jul 30, 2018
|
6 Min Read
by
Jeffrey Burt
Android OS
Scammers Use Fake Links to Entice Anxious Android Fortnite Fans
Scammers Use Fake Links to Entice Anxious Android Fortnite Fans
Jul 10, 2018
|
4 Min Read
by
Jeffrey Burt
Endpoint Security
World Cup Soccer 2018 Draws Fans and Cybercriminals Alike
World Cup Soccer 2018 Draws Fans and Cybercriminals Alike
Jun 14, 2018
|
5 Min Read
by
Jeffrey Burt
Attacks & Breaches
The Rise of Cryptojacking: Virtual Currency Mining Malware Gets More Sophisticated
The Rise of Cryptojacking: Virtual Currency Mining Malware Gets More Sophisticated
May 29, 2018
|
4 Min Read
by
Jeffrey Burt
Editor's Choice
robot and human fingers touching
Career Management
Employees Beginning to See Benefits of AI Autonomy in the Workplace
Employees Beginning to See Benefits of AI Autonomy in the Workplace
by
Nathan Eddy
Jul 3, 2024
4 Min Read
cloud-native
Cloud Native
How Cloud-Native Development Benefits SaaS
How Cloud-Native Development Benefits SaaS
by
Forrester Blog Network
Jun 28, 2024
3 Min Read
abstract string backgroud
PowerShell
Advanced String Manipulation Techniques in PowerShell
Advanced String Manipulation Techniques in PowerShell
by
Brien Posey
Jun 28, 2024
3 Min Read
Sign up for the ITPro Today newsletter
Stay on top of the IT universe with commentary, news analysis, how-to's, and tips delivered to your inbox daily.
Newsletter Sign-Up