Safeguarding your biggest cybersecurity target: Executives

Email not displaying correctly? View it in your browser.

IDG’s Top Enterprise Stories

Our top picks from IDG's editors
Jan 15, 2018
IDG
Featured Image

20 years on, open source hasn’t changed the world as promised

Most code remains closed and proprietary, even though open source now dominates enterprise platforms. How can that be? Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Safeguarding your biggest cybersecurity target: Executives
SQL unleashed: 17 ways to speed your SQL queries
2018 state of resilience: the pressure is on
Are mass transit systems the next cybersecurity target? | Salted Hash Ep 14
How AI could revolutionize project management
Serverless computing with AWS Lambda, Part 1
About Computerworld's Best Places to Work in IT
Mirai Okiru: New DDoS botnet targets ARC-based IoT devices

White Paper: Software AG Inc

Gartner MQ for Enterprise Architecture

Enterprise architecture and technology innovation leaders face unprecedented change and will likely require an EA tool to enable them to manage complexity more effectively. This research informs them of the main EA tool vendors in an evolving marketplace driven by the dynamics of digital business. Read More

Thumbnail Image

Safeguarding your biggest cybersecurity target: Executives

Top execs make big targets, especially when traveling abroad. Here’s how to protect C-level officers from whaling, espionage, and themselves. Read More

Thumbnail Image
INSIDER

SQL unleashed: 17 ways to speed your SQL queries

It’s easy to create database code that slows down query results or ties up the database unnecessarily—unless you follow these tips Read More

Thumbnail Image

2018 state of resilience: the pressure is on

Recent surveys suggest that IT leaders are under increased pressure to shore up their defenses against severe threats Read More

Thumbnail Image
Video

Are mass transit systems the next cybersecurity target? | Salted Hash Ep 14

Host Steve Ragan talks with Stan Engelbrecht, director of the cybersecurity practice at D3 Security, about the inherent flaws in security defenses for public transportation systems -- and what can be done. Watch Now

Thumbnail Image

How AI could revolutionize project management

Estimation, resource management and KPIs are just a few of the key areas where machine learning and predictive analytics can have a positive impact on project outcomes. Read More

Thumbnail Image

Serverless computing with AWS Lambda, Part 1

Serverless computing is no magic carpet, but how does it really work? Get an overview of AWS Lambda's nanoservices architecture and execution model, then build your first Lambda function in Java Read More

Thumbnail Image

About Computerworld's Best Places to Work in IT

Find out about Computerworld's 100 Best Places to Work in IT program, including eligibility, survey contents, deadlines and more. Read More

Thumbnail Image

Mirai Okiru: New DDoS botnet targets ARC-based IoT devices

Meet Mirai Okiru and brace for the DDoS botnet targeting 'billions' of ARC-based IoT devices. Read More

White Paper: Neustar Inc

Get Ahead of Your Next Cyber Attack

Getting bogged down fighting attacks on a daily basis means teams are forced to improvise and react to threats, a temporary tactic that is not a substitute for a long-term strategy. In an era where a growing number of digital devices are accessing network data from an array of entry points, organizations need a forward- thinking security approach that aligns with their broader business goals. Read More

Get more from the experts at these enterprise websites from IDG:

CIO | Computerworld | CSO | InfoWorld | Network World

You are currently subscribed to IDG’s Top Enterprise Stories as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Privacy Policy

Learn more about INSIDER

Copyright © 2018 IDG Communications, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.