From IDG Insider Brands

The best articles from all five enterprise publications

Top Enterprise Stories

July 03, 2023

Creating a unified cyber incident reporting framework will be no easy feat

Comments submitted to CISA regarding its creation of cyber incident and ransom payment reporting requirements underscores how tough it will be for the agency to create a one-size-fits-all framework.

Image: Sponsored by HPE Aruba Networking: Talking Zero Trust and SASE with CISOs at the Summit

Sponsored by HPE Aruba Networking: Talking Zero Trust and SASE with CISOs at the Summit

The emergence of SaaS and cloud-based workloads and services requires a broader approach to Zero Trust.

The CAA CIO’s 5 building blocks to support teams

Kin Lee-Yow, CIO, CAA Club Group of companies, speaks with CIO.com Canada editor Lee Rennick about key components of technology leadership including putting AI innovation in perspective and the five building blocks of collaboration.

US weighs further restrictions on chip exports to China

The Biden administration is reportedly considering placing new restrictions on the export of AI chips to China, in a move that could specifically target products previously compliant with the rules.

Image: AI requirements exceed infrastructure capabilities for many IT teams, study finds

AI requirements exceed infrastructure capabilities for many IT teams, study finds

The demands of AI are too much for current IT infrastructure, according to 42% of respondents to an Equinix survey.

Rust language project revamps governance

Rust Leadership Council established in the wake of community complaints of governance shortcomings and a fork of the language to escape bureacracy.

Cisco firewall upgrade boosts visibility into encrypted traffic

The Cisco Encrypted Visibility Engine can identify threats and applications in encrypted traffic without requiring decryption.

How to work with Azure Key Vault in .NET Core

Azure Key Vault is a safe and secure place to store the tokens, keys, passwords, certificates, and other sensitive data used in your .NET Core applications. Here’s how to work with it in C#.

New ransomware group starts to wreak havoc

The 8Base ransomware group is now among the top two performing ransomware groups within the past month, marginally behind the infamous Lockbit ransomware group.

Facebook Twitter LinkedIn
© 2023 Computerworld
140 Kendrick Street, Building B
Needham, MA 02494