From IDG Insider Brands

The best articles from all five enterprise publications

Top Enterprise Stories

April 15, 2023

4 strategies to help reduce the risk of DNS tunneling

An organization’s DNS systems can be a gateway for intruders looking to exfiltrate sensitive data without setting off alarms. Knowing what’s at stake and how to protect against DNS tunneling can thwart attacks before they start.

Image: Sponsored by Zscaler: 3 security challenges a Cloud-Native App Protection (CNAPP) can solve

Sponsored by Zscaler: 3 security challenges a Cloud-Native App Protection (CNAPP) can solve

The security challenges of increased cloud usage are threefold. Cloud-Native App Protection (CNAPP) can solve them all.

Russian cyberspies hit NATO and EU organizations with new malware toolset

The APT29 espionage campaign is ongoing and the Polish military is urging potential targets to mitigate the risk.

Battle could be brewing over new FCC data breach reporting rules

An expanded data breach definition and the telcos’ desire to link notifications to “concrete harm” are among the most controversial aspects of the proposed FCC data breach reporting rules.

Image: OpenAI starts bug bounty program with cash rewards up to $20,000

OpenAI starts bug bounty program with cash rewards up to $20,000

Based on the severity and impact of the reported vulnerability, OpenAI will hand out cash rewards ranging from $200 for low-severity findings to up to $20,000 for exceptional discoveries.

Crafting IT innovation strategies for real-world value

Knowing when to go all in on emerging technologies differs for every organization. IT leaders must establish business-conscious processes for timing innovation right.

5 steps to bringing Kubernetes costs in line

Spending on Kubernetes and container-related infrastructure has soared in the past two years. Follow these steps to eliminate the guesswork and waste.

Global hosting providers help keep key Ukraine web sites available

Providers' distributed hosting sites help dodge DDoS attacks, and security measures intercept application-layer threats, according to an analysis by ThousandEyes.

How Microsoft’s Shared Key authorization can be abused and how to fix it

Orca Security revealed a potential point of entry for attackers through Shared Key authorization that could inadvertently become a gateway to sensitive data.

Cohesity aims an OpenAI-powered chatbot to secure your data sets

Generative AI is coming to both line-of-business data analysis as well as security, as Cohesity deepens its ties to Microsoft.

What is platform engineering? Evolving devops

Platform engineering is a newer way of doing devops that uses centralized tools and data to put developers at the center of the action. Here's how it works.

Facebook Twitter LinkedIn
© 2023 Computerworld
140 Kendrick Street, Building B
Needham, MA 02494