Computerworld

IDG’s Top Enterprise Stories

February 21, 2020

Image: APIs are becoming a major target for credential stuffing attacks

APIs are becoming a major target for credential stuffing attacks

New research shows that attackers use APIs to automate credential stuffing attacks. The financial sector is particularly vulnerable. Read more ▶

Your Must-Read Stories

•

The CIO’s chief of staff: A role to bridge business and IT

•

IBM puts Power Systems in SAP’s cloud

•

Alpine.js mixes Vue, React, and minimalism

•

Cisco: IoT traffic is taking over; 5G, WiFi 6 are ascending

•

The 11 most interesting takeaways from Android 11 (so far)

•

Recent ransomware attacks define the malware's new age

•

How to build a collaboration environment for a changing workforce

White Paper: PerimeterX

Magecart Attacks: The Biggest Threat to Online Transactions

Attacks often go undetected for weeks, months, even years and can result in severe financial losses, compliance penalties and brand damage. Read more ▶

Image: The CIO’s chief of staff: A role to bridge business and IT

The CIO’s chief of staff: A role to bridge business and IT

The chief of staff role is taking on prominence in companies looking to bolster their IT leadership benches. Amanda Clarke discusses her experience in the role at Newport News Shipbuilding. Read more ▶

Image: Train to become a skilled AWS expert for less than $50

DEALPOST

Train to become a skilled AWS expert for less than $50

This expert-led e-training package is ideal for anyone who wants to expand their skill set Read more ▶

Image: IBM puts Power Systems in SAP’s cloud

IBM puts Power Systems in SAP’s cloud

SAP and IBM offer a new (certified) home for big databases in SAP HANA Enterprise Cloud. Read more ▶

 
 
Image: Alpine.js mixes Vue, React, and minimalism

Alpine.js mixes Vue, React, and minimalism

New JavaScript framework lets developers keep their DOM and declaratively add behavior in markup Read more ▶

Image: Cisco: IoT traffic is taking over; 5G, WiFi 6 are ascending

Cisco: IoT traffic is taking over; 5G, WiFi 6 are ascending

Cisco Internet Report prognosticates M2M, 5G, WiFi, broadband impact by 2023 Read more ▶

Image: The 11 most interesting takeaways from Android 11 (so far)

The 11 most interesting takeaways from Android 11 (so far)

From big behavioral changes to small interface enhancements, our first look at Android 11 reveals some promising new shifts. Read more ▶

Image: Recent ransomware attacks define the malware's new age

Recent ransomware attacks define the malware's new age

By 2018, the ransomware boom seemed to have peaked. But over the past 24 months, shifts in hacker tactics have resulted in a resurgence of ransomware attacks. Read more ▶

Image: How to build a collaboration environment for a changing workforce

How to build a collaboration environment for a changing workforce

By 2025, most workers will be millennials. These ‘digital natives’ will have a major impact on how collaboration takes place – and it won’t involve walking next door to an office to collaborate. Read more ▶

White Paper: SelectHub

Business Intelligence Tools: Top 10 Picks for 2020

This report covers the key criteria and features to consider when acquiring a BI tool, along with analysis of our top 10 picks for 2020. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to IDG's Top Enterprise Stories as [email protected].
Learn more about
Insider Pro
Please do not reply to this message.
To contact someone directly, send an email to [email protected].
© 2020 | Computerworld | 492 Old Connecticut Path | Framingham, MA 01701 | www.computerworld.com