Computerworld

IDG’s Top Enterprise Stories

March 04, 2020

Image: This just in: Cloud computing is hard

This just in: Cloud computing is hard

A new study confirms what most of us have said for years: cloud computing has a high degree of difficulty. However, worthwhile endeavors are rarely easy Read more ▶

Your Must-Read Stories

•

4 data analytics trends that will dominate 2020

•

Open source companies are thriving in the cloud

•

Watching activity on Linux with watch and tail commands

•

Windows by the numbers: Remaining Windows 7 users in no rush to move on

•

How Target evolved its threat hunting program: 3 key steps

•

8 PCI DSS questions every CISO should be able to answer

•

Coronavirus prep could prompt better disaster recovery

White Paper: Splunk

Essential Guide to Container Monitoring

In this guide, we'll define the importance and benefits of software container monitoring in container vendors today. Read more ▶

Image: 4 data analytics trends that will dominate 2020

4 data analytics trends that will dominate 2020

Modernizing data management, democratization of analytics, and the need to establish trust will be of critical importance this year, as data strategy becomes a key digital business enabler. Read more ▶

Image: Mitigate your risk of getting hacked with help from with this online academy

DEALPOST

Mitigate your risk of getting hacked with help from with this online academy

Learn the essentials for keeping hackers out of your data. Read more ▶

Image: Open source companies are thriving in the cloud

Open source companies are thriving in the cloud

It turns out open source didn’t need a different license or business model, but to get smarter about cloud computing Read more ▶

 
 
Image: Watching activity on Linux with watch and tail commands

Watching activity on Linux with watch and tail commands

The watch and tail commands can help monitor activity on Linux systems. This post looks at some helpful ways to use these commands. Read more ▶

Image: Windows by the numbers: Remaining Windows 7 users in no rush to move on

Windows by the numbers: Remaining Windows 7 users in no rush to move on

With the Windows 7 end-of-support deadline now receding in the rear view mirror, users of the aged OS no longer seem to be in any rush to upgrade to Windows 10. Read more ▶

Image: How Target evolved its threat hunting program: 3 key steps

How Target evolved its threat hunting program: 3 key steps

Target decided to re-evaluate its successful threat hunting program and found it could do better. This is what they did. Read more ▶

Image: 8 PCI DSS questions every CISO should be able to answer

8 PCI DSS questions every CISO should be able to answer

PCI DSS is a standard backed by all the major credit cards and payment processors that is designed to protect credit card numbers. It specifies a set of cybersecurity controls and business practices and requires either self-assessments or external audits. Here's what CISOs need to know. Read more ▶

Image: Coronavirus prep could prompt better disaster recovery

Coronavirus prep could prompt better disaster recovery

On the chance that the COVID-19 virus forces masses of employees to work from home, this could be the time to review your disaster-recovery plans and address shortcomings Read more ▶

White Paper: Cequence Security

Bulletproof Proxies: The Evolving Cybercriminal Infrastructure

Infrastructure is a necessary component of any cyberattack campaign, and as such many cybercriminal entrepreneurs are trending towards a new type of service for attackers, which we are calling “BulletProof Proxy”. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to IDG's Top Enterprise Stories as [email protected].
Learn more about
Insider Pro
Please do not reply to this message.
To contact someone directly, send an email to [email protected].
© 2020 | Computerworld | 492 Old Connecticut Path | Framingham, MA 01701 | www.computerworld.com