Computerworld

IDG’s Top Enterprise Stories

June 04, 2019

Image: Public SAP exploits could enable attacks against thousands of companies

Public SAP exploits could enable attacks against thousands of companies

A recently released exploit takes advantage of a known configuration vulnerability that persists among many on-premise and cloud SAP instances. Here's what companies using SAP should do. Read more ▶

Your Must-Read Stories

•

How to make sense of Microsoft's new Windows release dashboard

•

It’s time for the IoT to 'optimize for trust'

•

What is vendor management? The key to productive vendor partnerships

•

Phishing attacks that bypass 2-factor authentication are now easier to execute

•

IoT success stories: Reaping value from sensor data

•

Static site generator pros and cons

•

TypeScript 3.5 fixes ‘unbearably slow’ type-checking bug

White Paper: Open Text

Safeguarding External Digital Data: Consider an ‘outside-in’ approach

In today’s connected world, data has no boundaries. Organizations depend on data flowing between partners, customers, suppliers and others. But what about security? This exclusive IDG study from OpenText shows 70% of large enterprises have serious concerns about the security of data accessed by external partners. Read the report to learn what you can do to assure both security and access to this essential data. Read more ▶

Image: How to make sense of Microsoft's new Windows release dashboard

How to make sense of Microsoft's new Windows release dashboard

Microsoft's new Windows release health dashboard is a one-stop shop for Windows 10 users seeking information on the status of upgrades and ongoing problems. Read more ▶

Image: This Blazing Fast VPN Is Now Available For Just $1/mo

DEALPOST

This Blazing Fast VPN Is Now Available For Just $1/mo

With Ivacy VPN, you can finally browse and stream securely and lag-free. Get complete peace-of-mind while you surf the web with its built-in security and anonymity features. Read more ▶

Image: It’s time for the IoT to 'optimize for trust'

It’s time for the IoT to 'optimize for trust'

If we can't trust the internet of things (IoT) to gather accurate data and use it appropriately, IoT adoption and innovation are likely to suffer. Read more ▶

 
 
Image: What is vendor management? The key to productive vendor partnerships

What is vendor management? The key to productive vendor partnerships

Vendor management helps organizations take third-party vendor relationships from a passive business transaction to a proactive collaborative partnership. Read more ▶

Image: Phishing attacks that bypass 2-factor authentication are now easier to execute

Phishing attacks that bypass 2-factor authentication are now easier to execute

Researchers released two tools--Muraen and NecroBrowser--that automate phishing attacks that can bypass 2FA. Most defenses won't stop them. Read more ▶

Image: IoT success stories: Reaping value from sensor data

IoT success stories: Reaping value from sensor data

The internet of things is helping CIOs collect more data than ever. Here IT leaders share how IoT is helping to transform manufacturing, agriculture, and museums. Read more ▶

Image: Static site generator pros and cons

Static site generator pros and cons

4 reasons you should use a static site generator—and 4 reasons you shouldn‘t Read more ▶

Image: TypeScript 3.5 fixes ‘unbearably slow’ type-checking bug

TypeScript 3.5 fixes ‘unbearably slow’ type-checking bug

New release addresses regression in TypeScript 3.4 that impacted both build times and editor operations Read more ▶

Data Sheet: Enterprise Cyber Security

ECSA: Architecture-as-a-Service / Architecture on Demand

At ECSA, we do architecture. That’s it. We don’t do IT management, IT Operations, or project management. We do one thing and we do it very well. Now, we want to provide you what we call “Architecture-as a-Service” or “Architecture on Demand”. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to IDG's Top Enterprise Stories as [email protected].
Learn more about
Insider
Copyright © 2019 Computerworld, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to [email protected].