Computerworld

IDG’s Top Enterprise Stories

September 12, 2019

Image: 6 biggest healthcare security threats for 2020

6 biggest healthcare security threats for 2020

Healthcare continues to be a popular target for ransomware, cryptomining, data theft, phishing, and insider threats. Read more ▶

Your Must-Read Stories

•

Coming to grips with Microsoft’s P#

•

IoT vendors ignore basic security best practices, CITL research finds

•

Security and compliance considerations for Microsoft Teams

•

Rust vs. Go: How to choose

•

How to take full advantage of Android 10's privacy-reclaiming powers

•

New NetCAT CPU side-channel vulnerability exploitable over the network

•

The evolution of Apple's iPhone

White Paper: Ping Identity

The IT Director's Guide to Multi-Factor Authentication

Multi-factor authentication begins with the notion that you can and should provide multiple factors for authentication, not just a single static means. MFA goes beyond 2FA by requiring users to authenticate via two or more different authentication factors. Read more ▶

Image: Coming to grips with Microsoft’s P#

Coming to grips with Microsoft’s P#

Microsoft’s tools for building reliable distributed applications are beginning to gain traction Read more ▶

Image: Lemonade is changing the way we insure our homes

DEALPOST

Lemonade is changing the way we insure our homes

Read more ▶

Image: IoT vendors ignore basic security best practices, CITL research finds

IoT vendors ignore basic security best practices, CITL research finds

New measurements by the CITL mass fuzzing project show just how bad things really are--and how IoT device makers could radically increase binary security with one day of engineering work. Read more ▶

 
 
Image: Security and compliance considerations for Microsoft Teams

Security and compliance considerations for Microsoft Teams

Admins will need to make these decisions around security and governance when porting from Office 365 Pro Plus to Microsoft Teams. Read more ▶

Image: Rust vs. Go: How to choose

Rust vs. Go: How to choose

Do you want execution speed or developer speed? Memory safety or easy concurrency? How to decide between Rust and Go Read more ▶

Image: How to take full advantage of Android 10's privacy-reclaiming powers

How to take full advantage of Android 10's privacy-reclaiming powers

Attention, Android device owners: Follow these fast steps to make sure you get the full benefits from one of Android 10's most important additions. Read more ▶

Image: New NetCAT CPU side-channel vulnerability exploitable over the network

New NetCAT CPU side-channel vulnerability exploitable over the network

NetCAT takes advantage of Intel DDIO technology to remotely execute keystroke timing attacks. Read more ▶

Image: The evolution of Apple's iPhone

The evolution of Apple's iPhone

As the iPhone ages, it's important to look at how the now-iconic device has matured since its arrival in 2007. Read more ▶

White Paper: Getronics, a Hewlett Packard Enterprise Platinum Partner

Hyperconvergence: The Key to a Simple, Efficient Data Center

Read the White Paper to learn how HPE SimpliVity, powered by Intel® Xeon® Scalable processors, goes further with built-in deduplication, all-flash storage, backup software and data replication. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to IDG's Top Enterprise Stories as newsletter@newslettercollector.com.
Learn more about
Insider
Copyright © 2019 Computerworld, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.