CIO Leadership Live with Douglas Blackwell, CIO at Horizon Blue Cross Blue Shield of New Jersey | Ep 12

Email not displaying correctly? View it in your browser.

IDG’s Top Enterprise Stories

Our top picks from IDG's editors
Jun 26, 2018
IDG
Featured Image

5 reasons the IoT needs its own networks

Carriers are rolling out new low-power, narrow-band networks for the Internet of Things. Here are 5 reasons why, and one big potential issue with this strategy. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

CIO Leadership Live with Douglas Blackwell, CIO at Horizon Blue Cross Blue Shield of New Jersey | Ep 12
Akamai: DDoS attacks on the rise, become more specialized
What is Quick Base? A low-code database platform for citizen developers
Windows Update Survey: What do you think about Microsoft’s patching regime?
How to debug web apps outside the browser
Serverless cloud computing is the next big thing
What’s new in Rust 1.27

Video/Webcast: EMA Analyst Research

LIVE WEBINAR: Using Digital Threat Intelligence Management (DTIM) to Combat Threats

Is the time right for your organization to purchase a threat intelligence platform? Join leading IT analyst firm EMA and IntSights for a research-based webinar to find out if DTIM is right for your organization. You will also get key insights into new research, including the methodology behind platform evaluation and an overview of key players in the market. Read More

Thumbnail Image
Video

CIO Leadership Live with Douglas Blackwell, CIO at Horizon Blue Cross Blue Shield of New Jersey | Ep 12

In this episode, host Maryfran Johnson talks with Douglas Blackwell, senior vice president and CIO at Horizon Blue Cross Blue Shield of New Jersey, about digital transformation in the healthcare industry, including voice enablement and cutting-edge digital tools. Watch Now

Thumbnail Image

Akamai: DDoS attacks on the rise, become more specialized

Akamai's new State of the Internet/Security: Web Attack report says DDoS attacks increased 16% since 2017. It also says China and Russia launch the most credential abuse attacks on the hospitality industry. Read More

Thumbnail Image

What is Quick Base? A low-code database platform for citizen developers

Filling the gap between shared spreadsheets and IT-oriented development tools, Quick Base aims to let business users quickly create their own applications. Read More

Thumbnail Image

Windows Update Survey: What do you think about Microsoft’s patching regime?

If you’re involved in patching Windows, spend a few minutes to give your feedback. Read More

Thumbnail Image
INSIDER

How to debug web apps outside the browser

If a web app doesn’t use the browser, how can you test it? Microsoft’s Edge Dev Tools brings the familiar F12 tools to the desktop Read More

Thumbnail Image

Serverless cloud computing is the next big thing

Here’s why serverless computing is breaking out of the datacenter and becoming a key part of the pubic cloud. Read More

Thumbnail Image
INSIDER

What’s new in Rust 1.27

Feature-packed Rust 1.27 delivers SIMD support and improved syntax and APIs Read More

White Paper: Webroot Software

Why Efficacy is Paramount

Malware detection itself is not the only factor to consider when choosing an endpoint security solution. In addition to initial detection, comprehensive endpoint security must a number of things. Read more to find out. Read More

Get more from the experts at these enterprise websites from IDG:

CIO | Computerworld | CSO | InfoWorld | Network World

You are currently subscribed to IDG’s Top Enterprise Stories as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Privacy Policy

Learn more about INSIDER

Copyright © 2018 IDG Communications, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.