Top Enterprise Technology Stories
The best articles from Foundryâs B2B publications
July 25, 2024
CrowdStrike failure: What you need to know
A flawed update to CrowdStrike Falcon sent Windows servers and PCs across the globe into an endless reboot cycle that IT organizations are still working to remediate. Read more
Hackers leak documents stolen from Pentagon contractor Leidos
Leidos serves prominent clients including the US Department of Defense (DOD), the Department of Homeland Security (DHS), NASA, and various other US and foreign agencies. Read more
20 IT management certifications for IT leaders
IT management requires both technical skills and the ability to lead teams, projects, and processes. These 20 certs will help you hone and showcase your IT management bona fides. Read more
4 cities proving the transformative value of data and IT
âSmart citiesâ are on the rise, laying out technical foundations for data-driven decision-making, efficiencies, and services to the benefit of their citizens. Read more
How attackers evade your EDR/XDR system â and what you can do about it
Attackers make a living evading your EDR/XDR systems. Hereâs how they get around or go undetected by your defenses at three key points along the way. Read more
Full-stack development with Java, React, and Spring Boot, Part 1
React and Java come together seamlessly in this three-part introduction to full-stack development with React and Spring Boot. Part 1 gets you started with a basic application framework that you can customize as needed. Read more
How to create an operational data store with TiDB
Take advantage of an operational data store to consolidate data from across your organization and transform it for use in real time. Read more
Android security checkup: 18 steps to a safer phone
Android security doesn't have to be a source of stress. These level-headed steps are all you need to keep the boogeyman at bay. Read more
FCC post-mortem on AT&T outage uncovers similar QA issues to those that plagued CrowdStrike
A misconfiguration during 'routine night maintenance' caused the 12-hour disruption in mobile network service, suggesting the need for more stringent internal review of system updates before deployment Read more
Microsoft Defender SmartScreen bug actively used in stealer campaign
The vulnerability is being used by threat actors to spread multiple LNK files to download stealer payloads. Read more