From IDG Insider Brands

The best articles from all five IDG enterprise publications

IDG's Top Enterprise Stories

December 28, 2020

10 lies CIOs tell themselves

If Achilles had been a CIO, self-deception would be his heel. He’d be sure business-IT alignment is tight, information security bulletproof, and all projects come in on time. CIOs set the stage for disaster by fooling themselves. Read more ▶

Image: What happens when you open source everything?

What happens when you open source everything?

Many open source software companies embraced the open core model to increase revenues. Yugabyte found greater rewards leaving open core behind.

How to avoid subdomain takeover in Azure environments

Active but unused subdomains in Microsoft Azure give attackers the opportunity to use them for malicious purposes. Here's how to identify and delete vulnerable subdomains before attackers do.

5 IFTTT alternatives worth trying

Casting a roving eye beyond IFTTT in search of an alternative that makes more sense for you? Here are five worthy workflow automation competitors.

SolarWinds roundup: Fixes, new bad actors, and the company knew

A roundup of events from what is emerging as the biggest security breech ever.

How to bring zero-trust security to microservices

Why we must use a zero-trust security model in microservices and how to implement it using the Kuma universal service mesh.

Facebook Twitter LinkedIn
© 2020 IDG Enterprise
492 Old Connecticut Path
Framingham, MA 01701