IDG’s Top Enterprise Stories |
|
| Our top picks from IDG's editors |
| |
| |
Here’s what’s changed with the Fall Creators Update. Step 1: Understand that there are updates, and then there are updates. Read More ▶ |
|
| Research/Infographic: ITS Partners Many organizations are caught between two worlds - on-prem and the cloud. Use these seven key factors to evaluate when it's time to extend your security to the cloud. Read More ▶ | There’s a sunk cost to being in the cloud, and you need a certain percentage of workloads migrated to get the value you actually seek Read More ▶ |
| Health care continues to be a popular target for ransomware, cryptomining, data theft, phishing, and insider threats. Read More ▶ |
| | A a proof-of-concept hack at the Kaspersky Security Analyst Summit showed how robots could be infected with ransomware. Read More ▶ |
| A distributed denial of service (DDoS) attack is when attackers attempt to make it impossible for a service to be delivered, typically by drowning a system with requests for data. They have been part of the criminal toolbox for twenty years, and are only growing more prevalent and stronger. Read More ▶ |
| The move riles enterprise users who still rely on older apps to access email because Outlook apps don't cut it for them. Read More ▶ |
| Microsoft has two IoT-specific operating systems Windows 10 IoT Core for low-power devices and Windows 10 IoT Enterprise for more demanding devices Read More ▶ |
| Information cards step outside the traditional chat format, to display formatted text and images, and even add interactions Read More ▶ |
| The new Galaxy S9 smartphones may not be exciting, but some exclusive enterprise features do make them stand out among other Android rivals. Read More ▶ |
| Research/Infographic: ITS Partners Most everyone knows that as cloud adoption increases, the maturity of cloud security must also increase. But, before investing in the latest and greatest tools, we always recommend that CISOs start by defining what outcomes are important to them - defining what they want their cloud security system to accomplish. Download the infographic to uncover and evaluate the 11 critical outcomes you will need from your cloud defense solution. Read More ▶ |
|
|
|