Top Enterprise Technology Stories
The best articles from Foundryâs B2B publications
December 16, 2024
PUMA creeps through Linux with a stealthy rootkit attack
The multi-stage rootkit targets Linux systems, using advanced stealth techniques to escalate privileges and avoid detection.
Read more
8 reasons why digital transformations still fail
Ineffective communication, faulty data strategies, and shortchanging the people portion of transformation are just a few ways digital journeys take wrong turns or fizzle out.
10 quantum computing milestones of 2024
The quantum computing industry still hasnât settled on a hardware standard and weâre still years away from commercial use. But in 2024, all the major vendors made significant progress in improving capabilities and reducing error rates, and investment hit an all-time high.
Microsoft introduces Phi-4, an AI model for advanced reasoning tasks
The new small language model prioritizes efficiency and reasoning capabilities, leveraging Microsoft's focus on responsible AI development.
4 steps to streamline enterprise cloud spending
With cloud costs on the rise, enterprises need to adopt effective strategies for managing their cloud spend. Take these steps to align cloud investments with their goals and unlock new opportunities for growth and innovation.
18 indispensable Android travel apps
Save yourself time, headaches and even money with these standout Android apps for business travel.
How to turn around a toxic cybersecurity culture
A poor security culture leaves team members confused, angry, and searching for solutions (or the door), while exposing critical systems to attack. Hereâs how to recognize the symptoms and cure this unhealthy environment.
Discoverâs hybrid cloud journey pays off
The financial services company has taken a containerized approach to achieve agility and flexibility with its workloads, while exploring the long-term benefits of generative AI.
Attackers exploit zero-day RCE flaw in Cleo managed file transfer
The exploit takes advantage of a known file upload vulnerability that was not efficiently patched and can still be exploited in up-to-date versions of Cleo LexiCom, VLTrader and Harmony products.
Global internet traffic surges 17% as post-quantum cryptography adoption grows
Persistent threats and post-quantum encryption shape 2024 internet landscape, according to Cloudflare's annual review.