Computerworld

IDG’s Top Enterprise Stories

April 02, 2019

Image: How hackers use ransomware to hide data breaches and other attacks

How hackers use ransomware to hide data breaches and other attacks

Most ransomware is used simply to make money. However, it can also be used as part of an attacker’s exit strategy to wipe out forensic evidence of a more serious breach. Read more ▶

Your Must-Read Stories

•

Top 11 robotic process automation tools

•

How to implement health checks in ASP.Net Core

•

Microsoft Patch Alert: Most March patches look good

•

Sales automation app helps Suddath get its move on

•

Review: OmniSci GPU database lifts huge data sets

•

Meta Networks builds user security into its Network-as-a-Service

•

What is a honeypot? A trap for catching hackers in the act

White Paper: Technologent

6 IT Infrastructure Must-Haves to Become an Agile Enterprise

Agility is fast becoming table stakes. The following are six IT infrastructure attributes that are critical to supporting an agile enterprise. Read more ▶

Image: Top 11 robotic process automation tools

Top 11 robotic process automation tools

Robotic process automation (RPA) can streamline business workflows by eliminating tedious manual tasks without requiring you to completely re-engineer legacy systems. Read more ▶

Image: This free team collaboration app is changing how teams work together

FROM OUR BUSINESS PARTNERS

This free team collaboration app is changing how teams work together

Unlock your team’s full potential with free chat, file sharing, and task management. Read more ▶

Image: How to implement health checks in ASP.Net Core

How to implement health checks in ASP.Net Core

Take advantage of health check middleware in ASP.Net Core to monitor the health of your application, its database connection, and more Read more ▶

 
 
Image: Microsoft Patch Alert: Most March patches look good

Microsoft Patch Alert: Most March patches look good

March was a comparitively light patching month and there don’t appear to be any immediate patching worries. A hopeful sign? Read more ▶

Image: Sales automation app helps Suddath get its move on

Sales automation app helps Suddath get its move on

The commercial moving concern digitized a manual sales process, resulting in reduced administrative overhead and additional revenues. CIO Len O’Neill describes the creation of Suddath’s Estimator software. Read more ▶

Image: Review: OmniSci GPU database lifts huge data sets

Review: OmniSci GPU database lifts huge data sets

GPU acceleration of database, rendering, and visualization enables interactive exploration of data sets with billions of rows Read more ▶

Image: Meta Networks builds user security into its Network-as-a-Service

Meta Networks builds user security into its Network-as-a-Service

Meta Networks has a unique approach to the security of its Network-as-a-Service. A tight security perimeter is built around every user and the specific resources each person needs to access. Read more ▶

Image: What is a honeypot? A trap for catching hackers in the act

What is a honeypot? A trap for catching hackers in the act

A honeypot is a system designed to lure hackers into revealing their origins and techniques, and they're used by security researchers and corporate IT alike. Read more ▶

White Paper: Iron Mountain

10 Steps to Migration Success

When it comes time to move data centers, the actual migration process tends to be one of the most difficult parts. Download this checklist to understand the 10 steps you need to follow in order to successfully migrate from one data center to another. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to IDG's Top Enterprise Stories as [email protected].
Learn more about
Insider
Copyright © 2019 Computerworld, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to [email protected].