From IDG Insider Brands

The best articles from all five enterprise publications

Top Enterprise Stories

April 14, 2022

Q&A: What tech firms can do to grow their Black workforce

Research firm Jobs for the Future surveyed more than 1,000 Black adults and analyzed 200 organizations with successful strategies for hiring Black tech workers. JFF vice president and report lead author Michael Collins discusses the problems — and solutions. Read more ▶

Image: Sponsored by Protiviti: Securing Edge Cloud and 5G: How to Do It and Why It Matters

Sponsored by Protiviti: Securing Edge Cloud and 5G: How to Do It and Why It Matters

The shift to 5G and the growth of edge cloud computing will present new security risks. Prepare to approach the edge (without tumbling over it) using these security tips.

15 most misused buzzwords in IT

The tech industry is rife with overhyped jargon. Here IT leaders discuss buzzy terms all too often misapplied by vendors and colleagues alike.

Cisco SD-WAN software gains broader application access, enhanced analytics

Cisco upgraded its SD-WAN Cloud OnRamp for SaaS service to provide secure connectivity to a wider range of cloud-based apps and greater visibility into network metrics.

Image: Who is your biggest insider threat?

Who is your biggest insider threat?

Phishing simulations aren't enough for identifying your organization’s most vulnerable insiders or minimizing their risk.

Neo4j’s new AuraDS brings managed data science services to Google Cloud

Neo4j's new managed service works with the company’s cloud-based graph database offering, AuraDB, providing a library of graph algorithms, machine learning pipelines, and data science methodologies for data scientists and developers.

Ukraine energy facility hit by two waves of cyberattacks from Russia’s Sandworm group

Sandworm succeeded in planting a new version of the Industroyer malware to disrupt ICS infrastructure at multiple levels, but was thwarted from doing serious damage.

What is phishing? Examples, types, and techniques

Phishing is a type of cyberattack that uses disguised email to trick the recipient into giving up information, downloading malware, or taking some other desired action.

Facebook Twitter LinkedIn
© 2022 Enterprise
140 Kendrick Street, Building B
Needham, MA 02494