Laden...
Top Enterprise Technology Stories
The best articles from Foundryâs B2B publications
July 01, 2025
Cybercriminals take malicious AI to the next level
Fraudsters are optimizing illicit models with underground datasets, while criminal vendors roll out increasingly sophisticated deepfake generation and prompt engineering services.
Read more
Patch now: Citrix Bleed 2 vulnerability actively exploited in the wild
Security researchers warn of session hijacking and MFA bypass via a critical NetScaler flaw, urging immediate mitigation steps.
Online learning in 2025: Whatâs next for higher ed & AI?
Five years after the pandemic forced schools online, what's the real future of distance education in a world shaped by AI, hybrid models, and evolving student needs? In this episode of Today in Tech, host Keith Shaw speaks with Evan Kropp, Executive Director of Distance Education at the University of Floridaâs College of Journalism and Communications.
The essential office apps for Android
Create an optimal Android office app power-pack with these thoroughly researched recommendations.
Download the âAI-ready data centersâ spotlight report
In this issue: There are lots of great reasons for running AI applications in your own data centers â provided theyâre up to the task. AI puts new demands on virtually every aspect of data centers from servers and networks to power grids and more. Learn what it takes to build and run an AI-ready data center.
Watch First Person and meet the most interesting people in IT
Today Computerworld is excited to launch a brand new podcast series: First Person. Subscribe, watch, and listen now to meet the most interesting people in IT.
Who should really be driving business transformation today?
CIOs often take the lead over transformative initiatives, but thereâs debate over whether thatâs the best approach for ensuring true business transformation rather than just a technical one.
Microsoft hints at revoking access to the Windows kernel â eventually
A new Microsoft announcement suggests it has found a way to deliver kernel-level visibility and capabilities to apps running in user mode. Experts conclude a ban on kernel access for cybersecurity tools could be forthcoming.
HPE-Juniper deal clears DOJ hurdle, but settlement requires divestitures
DOJ green-lights HPE's $14 billion acquisition of Juniper, but the settlement requires the combined company to divest HPE's Instant On wireless networking business and license the source code for Juniper's Mist AI software.
© 2025