Computerworld

IDG’s Top Enterprise Stories

July 26, 2019

Image: 15 signs you've been hacked -- and how to fight back

15 signs you've been hacked -- and how to fight back

Redirected internet searches, unexpected installs, rogue mouse pointers: Here's what to do when you've been hacked. Read more ▶

Your Must-Read Stories

•

Aetna enlists AI to settle health insurance claims

•

11 top DEF CON and Black Hat talks of all time

•

Reports: As the IoT grows, so do its threats to DNS

•

Public cloud winners take all

•

5 strategies for improving employee experience

•

How to bring HA and DR to SQL Server on Amazon EC2

•

5 smart questions that'll smother most Android security scares

Viewpoint: Okta

Driving Innovation with Technology: Secrets for Success

The adage “every company is a technology company” isn’t new—but for many CIOs, navigating the changes associated with this new business reality are downright challenging. Learn what advice Diya Jolly, Chief Product Officer at Okta, has for senior IT leaders. Read more ▶

Image: Aetna enlists AI to settle health insurance claims

Aetna enlists AI to settle health insurance claims

The health insurer developed an artificial intelligence application to resolve claims, freeing up staff to focus on higher-level tasks, says CTO Claus Jensen, who plans to automate other processes. Read more ▶

Image: There’s finally a communication app tailormade for on-the-go teams. Try it free.

DEALPOST

There’s finally a communication app tailormade for on-the-go teams. Try it free.

This intuitive collaboration platform is made for teams that move. Read more ▶

Image: 11 top DEF CON and Black Hat talks of all time

11 top DEF CON and Black Hat talks of all time

Hacker summer camp in Vegas is almost upon us again. Here are some of the best talks of all time. Will this year's talks measure up to these legends? Read more ▶

 
 
Image: Reports: As the IoT grows, so do its threats to DNS

Reports: As the IoT grows, so do its threats to DNS

ICANN and IBM's security researchers separately spell out how the growth of the internet of things will increase opportunities for malicious actors to attack the Domain Name System with hyperscale botnets and worm their malware into the cloud. Read more ▶

Image: Public cloud winners take all

Public cloud winners take all

CIOs plan big increases in cloud spending in the coming year, with AWS and Azure first in line Read more ▶

Image: 5 strategies for improving employee experience

5 strategies for improving employee experience

A positive employee experience can greatly impact engagement, retention, and productivity. Here’s how to make sure yours is second-to-none. Read more ▶

Image: How to bring HA and DR to SQL Server on Amazon EC2

How to bring HA and DR to SQL Server on Amazon EC2

The pros and cons of the various AWS, Microsoft, and third-party options for protecting mission-critical SQL Server databases in the Amazon cloud Read more ▶

Image: 5 smart questions that'll smother most Android security scares

5 smart questions that'll smother most Android security scares

Start asking the right questions — and stop freaking out. Read more ▶

White Paper: Nehemiah Security

Cyber as a Business Enabler: Operationalizing Cyber Risk Analytics

Cyber and the business have not always seen eye-to-eye. Cyber operators have been operating in survival mode for some time. Now, business executives are demanding more alignment and proactive engagement with the organization. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to IDG's Top Enterprise Stories as newsletter@newslettercollector.com.
Learn more about
Insider
Copyright © 2019 Computerworld, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.