IDG Insider Pro

IDG Insider Pro Insights

May 12, 2020

Image: Rowhammer memory attacks close in on the real world

Rowhammer memory attacks close in on the real world

This theoretical security problem is becoming all too real. Expect to see a major Rowhammer security exploit within the next year as attackers tap GPUs, FPGAs and more to accelerate the process. Here's how to protect yourself. Read more ▶

Image: Conspiracy theories slow public 5G adoption (but private 5G gets a boost)

Conspiracy theories slow public 5G adoption (but private 5G gets a boost)

When radio waves, viruses and tin foil hats collide. How the coronavirus crisis is changing how, where and why 5G is being deployed. Read more ▶

Image: 5 lessons companies should learn about working at home

5 lessons companies should learn about working at home

Companies now have the opportunity to learn from what is and isn’t working during the coronavirus crisis. Use this time to build out a strategy so you won’t have to use band aids and duct tape next time. Read more ▶

Image: Best practices for selecting software composition analysis tools

Best practices for selecting software composition analysis tools

SCA tools automate the process of identifying and classifying open source code used in a development environment, identifying security, licensing and quality issues. Here's how to pick a product. Read more ▶

Image: Technology winners and losers in the days of COVID-19

Technology winners and losers in the days of COVID-19

The coronavirus pandemic is revealing just where our technology is up to the challenge and where it's failing. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to Insider Pro Insights as [email protected].
Learn more about
Insider Pro
Copyright © 2020 IDG Insider Pro, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to [email protected].