Computerworld

IDG Insider Alert

March 05, 2020

Image: How to write an effective information security policy

How to write an effective information security policy

An information security policy is a high-level view of what should be done within a company in regard to information security. Here's how to create one that is an effective tool for improving your security posture. Read more ▶

Your Must-Read Stories

•

What is Azure confidential computing?

•

4 data analytics trends that will dominate 2020

•

The CIO Ones to Watch Awards honor rising stars in IT

•

HHS takes low-code approach to healthier legacy apps

•

8 lies project managers tell themselves

•

How Target evolved its threat hunting program: 3 key steps

•

Do you trust your admins? 5 tips to manage administrator access

•

11 reasons users still hate your software

White Paper: Velocity Technology Solutions

How Midsize Enterprise CIOs Fund Legacy Modernization

For a growing midsize business, legacy infrastructure is paralyzing. Getting buy-in to modernize your system, however, is equally challenging. That’s because many CEOs don’t realize how legacy systems hold them back. Here’s how to build a winning business case that’ll jumpstart your modernization. Read more ▶

Image: What is Azure confidential computing?

What is Azure confidential computing?

Microsoft and Intel are working on protecting your data while it’s being used in the cloud Read more ▶

Image: A lifetime of CompTIA certification training is now just $50

DEALPOST

A lifetime of CompTIA certification training is now just $50

Prepare for a successful IT career for a fraction of what you'd normally spend. Read more ▶

Image: 4 data analytics trends that will dominate 2020

4 data analytics trends that will dominate 2020

Modernizing data management, democratization of analytics, and the need to establish trust will be of critical importance this year, as data strategy becomes a key digital business enabler. Read more ▶

 
 

The CIO Ones to Watch Awards honor rising stars in IT

50 future C-level executives have the right mix of technology and management skills to maintain continuity, drive innovation and lead solutions teams. Read more ▶

Image: HHS takes low-code approach to healthier legacy apps

HHS takes low-code approach to healthier legacy apps

The Dept. of Health and Human Services is leveraging agile and low-code dev tools to cut down tech debt, moving some of its 100-plus legacy apps to the cloud. Read more ▶

Image: 8 lies project managers tell themselves

8 lies project managers tell themselves

From overvaluing milestones to assuming everyone has a unified vision of project success, don’t let these common PM self-deceptions sink your project. Read more ▶

Image: How Target evolved its threat hunting program: 3 key steps

How Target evolved its threat hunting program: 3 key steps

Target decided to re-evaluate its successful threat hunting program and found it could do better. This is what they did. Read more ▶

Image: Do you trust your admins? 5 tips to manage administrator access

Do you trust your admins? 5 tips to manage administrator access

The access rights that internal and external network admins possess carry the potential for abuse and errors that can expose systems and data. These practices can help avoid that. Read more ▶

Image: 11 reasons users still hate your software

11 reasons users still hate your software

Major consumer software, apps and websites give your business users outsize expectations of what your small dev team can do. Here’s how to tackle their (often valid) complaints. Read more ▶

Miscellaneous: Core Security

Healthcare Identity Governance 101: Six Proven Strategies for Tackling the Biggest Healthcare Information Security Challenges

Healthcare organizations today face extraordinary challenges in a complex landscape. With increasing regulations, the acceleration of technology, and the demand to do more with less, health systems must address these issues head on, while staying focused on delivering quality patient care. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to IDG Insider as newsletter@newslettercollector.com.
Learn more about
Insider Pro
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.
© 2020 | Computerworld | 492 Old Connecticut Path | Framingham, MA 01701 | www.computerworld.com