News Feed

Actionable advice from senior IT leaders sharing digital transformation strategies that drive value, grow the business, and improve efficiencies through the implementation of enterprise applications.

Episode Cover Image
Episode Cover Image

Security Contractor Blew The Whistle On Support Crew’s Viral Indifference

Who, Me? It's the reader-contributed column in which you share stories of things you did at work that had interesting consequences. This week, meet a reader we'll Regomize as "Brad" who once worked as a security contractor.

Episode Cover Image
Episode Cover Image

The Company’s Biggest Security Hole Lived In The Breakroom

Welcome to Pwned, The Register's new column, where we highlight the worst infosec own goals so you can, hopefully, protect against them. Caffeine is an essential tool for most IT defenders, so, on balance, we're sure it has protected against a lot more exploits than it has caused. But in this case, the desire for everyone's favorite stimulant led to a massive breach.

Episode Cover Image
Episode Cover Image

The Quantum Clock Is Ticking And Your Encryption Is Running Out Of Time

Data is absolutely sacrosanct, and cryptographic systems are the beating heart of data security. Encryption protects financial transactions, secures corporate networks and safeguards healthcare records. Encryption is considered fundamentally reliable, but a technological shift is challenging this assumption.

Episode Cover Image
Episode Cover Image

Breaking The Trade-Off: Full Email Security Without Deployment Friction

For many years, organizations have had to accept a compromise in email security: They've had to balance speed versus depth.

Episode Cover Image
Episode Cover Image

Email Authentication In 2026: What Every Organization Still Gets Wrong

Despite decades of efforts to the contrary, email remains one of the primary means of entry for cyberattacks, with vectors ranging from phishing to business email compromise (BEC). Verizon's 2025 Data Breach Investigations Report shows that most breaches still involve a human element, such as account credentials stolen through phishing.

Episode Cover Image
Episode Cover Image

Email Deliverability Testing: From Single Checks To Continuous Monitoring

Email deliverability is often reduced to a simple question: Did the email send?

Episode Cover Image
Episode Cover Image

Five Tips For Phishing Email Analysis

Phishing emails are no longer easy to spot by bad grammar or obvious fake links. Modern attacks are carefully crafted to pass basic security checks and blend into everyday business communication. This makes phishing email analysis less about instinct and more about understanding the technical details hidden inside an email.

Episode Cover Image
Episode Cover Image

DMARC Troubleshooting Checklist For Enterprise

DMARC failures are usually traceable. The problem is rarely DMARC alone. In most cases, the failure is due to an issue regarding DNS, SPF, DKIM, domain alignment, forwarding, or sender setup. DMARC then exposes that problem because it evaluates whether SPF and/or DKIM passed and aligned with the visible 'From' domain.

Episode Cover Image
Episode Cover Image

The Internal Developer Platform (IDP) Paradox: Why Your IDP Needs a ‘Java-First’ Strategy

The promise of Platform Engineering is seductive: Build an Internal Developer Platform (IDP), abstract away the 'spaghetti' of Kubernetes manifests and CI/CD pipelines, and watch developer productivity soar.

Episode Cover Image
Episode Cover Image

Platform Engineering Drives Merger of Env Zero and CloudQuery

The merger of env zero, a provider of an infrastructure as code (IaC) management platform, and CloudQuery, a provider of a cloud asset management platform, is being driven by an effort to create a platform engineering solution that will make it simpler to programmatically manage IT environments on an end-to-end basis.

Episode Cover Image
Episode Cover Image

How Platform Engineers Should Think About SOC 2 Compliance

Platform engineers should view System and Organization Controls (SOC) 2 compliance as an engineering framework rather than merely a checklist to follow.

Episode Cover Image
Episode Cover Image

World Back Up Day 2026 – What Are The Takeaways?

World Backup Day is often seen as a simple reminder to save your data, but this year, security leaders say backup strategies must evolve into fully tested, secure, and recovery-focused resilience plans.

Episode Cover Image
Episode Cover Image

World Backup Day 2026: Expert Insights From The Field

Solutions Review's Executive Editor Tim King compiled this roundup of World Backup Day quotes from experts for 2026, part of our ongoing coverage of the enterprise storage and data protection market. These insights originally appeared in Insight Jam, a community focused on the human impact of AI and the future of work and learning.

Episode Cover Image
Episode Cover Image

Linux Kernel 7.0 Is Coming Mid-April-Here’s Everything You Need To Know

Kernel version numbers in Linux are famously arbitrary. Linus Torvalds changes the major digit when the minor number feels too big. However, version 7.0 is shaping up to be a substantial release, solving some decade-old annoyances and making the kernel future-ready. Here's a quick look at everything you should know about Linux kernel 7.0.

Episode Cover Image
Episode Cover Image

Top Cybersecurity Programming Languages To Learn In 2026

Build a Future-Proof Career in Cybersecurity by Learning the Most in-Demand Programming Languages of 2026

Episode Cover Image
Episode Cover Image

Database Design Errors: 10 Mistakes And How To Avoid Them

Database Design Mistakes: Critical Errors That Hurt Performance and Scalability

Episode Cover Image
Episode Cover Image

The Leading Companies And Hottest Trends And Technologies In Customer Service, Marketing, And Sales: The 2026 CRM Top 100

Welcome to our eighth annual 'CRM Top 100' issue, where we highlight the hottest trends and technologies in the three pillars of CRM-customer service, marketing, and sales-as well as the 100 leading providers.

Episode Cover Image
Episode Cover Image

Data Center Boom Sparks Labor Shortage In Skilled Trades

While the AI boom is widely understood as a contest for elite engineers and pricey GPUs, behind the headlines a related struggle is unfolding in the skilled trades. As tech companies pour vast sums into building data centers, a shortage of electricians, technicians and machine specialists is emerging as a critical constraint on growth.

QR Code