Computerworld

IDG’s Top Enterprise Stories

September 23, 2019

Image: How to decommission a data center

How to decommission a data center

Decommissioning a data center is lot more complicated than shutting down servers and switches. Here’s what you should keep in mind. Read more ▶

Your Must-Read Stories

•

The arrival of 'multicloud 2.0'

•

Software jobs pay twice the national average

•

What is OAuth? How the open authorization framework works

•

3 ways to improve PC security

•

Why Wells Fargo plans to pilot its own cryptocurrency

•

Senator Warner seeks "grand alliance" to protect against surveillance threat from China’s tech dominance

•

Samsung introduces SSDs it claims will 'never die'

White Paper: IBM

5 Epic Fails in Data Security

Data security is on everyone’s mind these days, and for good reason. The number of successful data breaches is growing thanks to the increased attack surfaces created by more complex IT environments, widespread adoption of cloud services and the increasingly sophisticated nature of cyber criminals. This paper looks at five of the most prevalent – and avoidable – data security missteps organizations are making today, and how these “epic fails” open them up to potentially disastrous attacks. Read more ▶

Image: The arrival of 'multicloud 2.0'

The arrival of 'multicloud 2.0'

As our thinking evolves around multicloud, we could be moving into a new, 'open' era Read more ▶

Image: Arcadia Power Can Help You Go Green & Lower Your Power Bill

DEALPOST

Arcadia Power Can Help You Go Green & Lower Your Power Bill

Read more ▶

Image: Software jobs pay twice the national average

Software jobs pay twice the national average

Software.org report finds software jobs not only pay twice as much, but are growing at twice the rate of US jobs overall Read more ▶

 
 
Image: What is OAuth? How the open authorization framework works

What is OAuth? How the open authorization framework works

OAuth is an open-standard authorization protocol or framework that describes how unrelated servers and services can safely allow authenticated access to their assets. It is widely accepted, but be aware of its vulnerabilities. Read more ▶

Image: 3 ways to improve PC security

3 ways to improve PC security

Insider Pro columnist Jack Gold writes that organizations must focus on three key areas if they want to protect their PCs -- and ultimately the entire organization -- from security breaches. Read more ▶

Image: Why Wells Fargo plans to pilot its own cryptocurrency

Why Wells Fargo plans to pilot its own cryptocurrency

The world's fourth-largest bank said cryptocurrency will allow near real-time money movement and cut out settlement middlemen, thus reducing costs from fees. Read more ▶

Image: Senator Warner seeks

Senator Warner seeks "grand alliance" to protect against surveillance threat from China’s tech dominance

The senator believes Chinese companies will be required to aid surveillance of the US, especially as 5G networks roll out. Read more ▶

Image: Samsung introduces SSDs it claims will 'never die'

Samsung introduces SSDs it claims will 'never die'

Samsung introduced a new generation of SSD memory chips that have fail-in-place technology, which allows the chips to gracefully recover from chip failure. Read more ▶

White Paper: Akamai Technologies Inc

5 Reasons Enterprises Need a New Application Access Model

The average cost of a breach is $3.86 million. With so much at stake, why do so many enterprises grant access based on an outdated model of assumed trust? And why do businesses rely on antiquated access technologies such as traditional VPNs and remote proxies to provide this application access? Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to IDG's Top Enterprise Stories as newsletter@newslettercollector.com.
Learn more about
Insider
Copyright © 2019 Computerworld, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.