From IDG Insider Brands

The best articles from all five enterprise publications

Top Enterprise Stories

May 11, 2023

7 enterprise cloud strategy trends for 2023

The cloud’s outlook is bright but rapidly changing. Here are the top trends to follow concerning the cloud market and how enteprises are evolving their use of the cloud.

Image: Make them pay: Hackers devise new tactics to ensure ransomware payment

Make them pay: Hackers devise new tactics to ensure ransomware payment

Payouts from ransomware victims declined by 38% in 2022, which has prompted hackers to adopt more professional and corporate tactics to ensure higher returns.

7 awesome Java projects you should know about

The Java ecosystem is bursting with tools and frameworks for just about every programming need. Here are seven open source Java projects you don't want to miss.

AI push or pause: CIOs speak out on the best path forward

Recent advances have highlighted AI’s incomparable potential and not yet fully fathomed risks, placing CIOs in the hot seat for figuring out how best to leverage this increasingly controversial technology in business. Here’s what they have to say about it.

Image: Microsoft adds M365 Copilot to more apps, extends customer trial to 600 firms

Microsoft adds M365 Copilot to more apps, extends customer trial to 600 firms

Hundreds of customers will be able to access Copilot in a paid early access trial as the generative AI assistant is rolled out more widely across the Microsoft 365 app suite.

Evil digital twins and other risks: the use of twins opens up a host of new security concerns

Digital twins are incredibly useful tools for a range of industries. But they also come with intrinsic risk factors and could create new avenues for attacks unless security is involved when they’re created.

How to use Excel formulas and functions

Formulas are powerful tools for performing calculations and analyzing data in Excel. In this beginner’s guide, you’ll learn how to use formulas and explore some popular built-in functions.

International security agencies warn of Russian “Snake” malware threat

Snake’s custom communications protocols employ encryption and fragmentation for confidentiality and are designed to hamper detection and collection efforts.

Facebook Twitter LinkedIn
© 2023 Computerworld
140 Kendrick Street, Building B
Needham, MA 02494