11 ways ransomware is evolving

Email not displaying correctly? View it in your browser.

IDG’s Top Enterprise Stories

Our top picks from IDG's editors
Apr 02, 2018
IDG
Featured Image

8 IT management productivity killers

From neglecting to prioritize key strategic initiatives to failing to adjust project estimates, weak IT management practices are threatening IT’s ability to get the job done. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

11 ways ransomware is evolving
What is GitHub? More than Git version control in the cloud
Leaving your job: what you can and can’t take with you
The cloud continues to drive network evolution
Want to hack a voting machine? Hack the voting machine vendor first
Should software developers have a code of ethics?
10 ways to get more from Spotlight Search on the Mac
The most interesting things from Nvidia's GPU Technology Conference

White Paper: Carbonite

Carbonite: A cornerstone for Ransomware Protection & Recovery

Mitigating ransomware risk exposure begins with a diligent and comprehensive security strategy, inclusive of a business continuity and data recovery strategy. Read More

Thumbnail Image

11 ways ransomware is evolving

Ransomware creators are getting more sophisticated in how they infect systems, avoid detection, and foil decryption efforts. Read More

Thumbnail Image

What is GitHub? More than Git version control in the cloud

GitHub is the host with the most for open source projects and programmers who want to share and collaborate on code. Here’s why Read More

Thumbnail Image
INSIDER

Leaving your job: what you can and can’t take with you

Outright theft is an obvious no-no, but there are still some gray areas when it comes to what you can take with you when you leave a job and what you could land you in legal hot water. Read More

Thumbnail Image

The cloud continues to drive network evolution

Arista’s new line of network switches provides greater performance and scale to meet the demands of cloud providers and cloud-first businesses. Read More

Thumbnail Image

Want to hack a voting machine? Hack the voting machine vendor first

How password reuse and third-party breaches leave voting machine vendors vulnerable to attack. Read More

Thumbnail Image

Should software developers have a code of ethics?

With great power comes great responsibility. As the details of the Facebook and Cambridge Analytica scandal reveal, the IT industry is still grappling with the question of how to deal with ethical dilemmas. Read More

Thumbnail Image

10 ways to get more from Spotlight Search on the Mac

Spotlight Search (Command + Space) is the easiest way to get around on your Mac – you can use it to do things, as well as find them. Read More

Thumbnail Image

The most interesting things from Nvidia's GPU Technology Conference

At Nvidia's GTC, CEO Jensen Huang made several announcements, including NVSwitch, DGX-2 Server, and increased memory for Tesla V100 GPU. Read More

eBook: Carbonite

Carbonite: Complete Data Protection

Learn about the strategic tools necessary to protect any type of data. Read More

Get more from the experts at these enterprise websites from IDG:

CIO | Computerworld | CSO | InfoWorld | Network World

You are currently subscribed to IDG’s Top Enterprise Stories as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Privacy Policy

Learn more about INSIDER

Copyright © 2018 IDG Communications, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.