IDG’s Top Enterprise Stories |
|
| Our top picks from IDG's editors |
| |
| |
How can you tell the difference between a legitimate email and a phishing attack? Host Steve Ragan shows what an Apple phishing attack looks like, screen by screen, showing the difference between the real and the fake. Watch Now ▶ |
|
| Video/Webcast: Sophos On average, 60% of Network traffic is unidentifiable by network firewalls*. Which means ransomware, advanced threats, and active adversaries are happily entering your network. Why? Because every firewall on the market uses application signatures to identify traffic passing through the firewall. In this webcast, we'll look at the top problems with firewalls today and what you should be looking for in your next firewall. Read More ▶ | Here are the most common uses for the cloud and which Microsoft Azure components you need for them Read More ▶ |
| IT security is of major concern to all organizations, and they're willing to pay to get top talent. Are you being paid what you are worth? Take a minute to check. Read More ▶ |
| | From containers to PaaS to IaaS, cloud skills still command a premium. Here are the 10 that pay the best. Read More ▶ |
| Commercial and open source honeypot tools are now effective deception solutions. Here's what you need to know before implement them. Read More ▶ |
| In this first episode of Do More with R, Sharon Machlis, director of Editorial Data & Analytics at IDG Communications, demonstrates how easy it is to use the R language to create an interactive scatter plot with multiple trendline choices Watch Now ▶ |
| The top IT initiatives of enterprise network managers are cloud and software-defined data centers, overcoming server virtualization’s dominance for the past 10 years, according to Enterprise Management Associates. Read More ▶ |
| While blockchain holds the promise of creating a secure global network over which anyone can exchange data for a myriad of business or personal transactions, the encryption behind the distributed ledger also means if you lose your private key, you lose your data. Read More ▶ |
| Video/Webcast: ServiceNow Inc Major data breaches are headline news, but well-publicized breaches are only the tip of the iceberg. To better understand why large scale breaches continue to occur, ServiceNow conducted a survey of more than 2,900 security professionals that are involved in vulnerability response across 9 countries. Read More ▶ |
|
|
|