From IDG Insider Brands

The best articles from all five enterprise publications

Top Enterprise Stories

December 17, 2022

Ransomware: It’s coming for your backup servers

Compromised backup servers can thwart efforts to restore damage done by ransomware and give attackers the chance to extort payments in exchange for keeping sensitive stolen data secret.

Image: Sponsored by Cyara: Devops for Contact Centers: The key to optimizing CX assurance at scale

Sponsored by Cyara: Devops for Contact Centers: The key to optimizing CX assurance at scale

Cyara helps organizations achieve flawless customer experiences through automated testing and monitoring that simulates real world customer interactions across IVR, chatbots, voice and digital channels. Customer smiles. Delivered at scale.

Top 20 enterprise architecture tools

These popular and emerging EA tools offer businesses everything they need to support enterprise architecture and digital transformation.

3 tiny Kubernetes distributions for compact container management

Small is beautiful, and it could be just the antidote you need for Kubernetes' sprawl. Here are three popular, miniaturized Kubernetes distros for managing containers at scale.

Image: European Commission takes step toward approving EU-US data privacy pact

European Commission takes step toward approving EU-US data privacy pact

The EU-US Data Privacy Framework—drafted to allow the flow of data between the US and the European Union—has cleared the first hurdle on its way to approval in the EU, but criticism of the pact makes it far from a done deal.

Cuba ransomware group used Microsoft developer accounts to sign malicious drivers

The ransomware gang was able to use signed malicious drivers to disable endpoint security tools. Microsoft has revoked the certificates.

7 ways to look at network connections on Linux

Linux provides a number of commands for examining network connections and sometimes creates new ones to expand functionality.

New Royal ransomware group evades detection with partial encryption

The tactics used by the Royal ransomware group allow for fast and stealthy encryption and share similarities with the defunct Conti group.

How to choose a network service provider

Finding the best provider can be challenging, time-consuming, and even a little bit scary. Here's some help.

Facebook Twitter LinkedIn
© 2022 Computerworld
140 Kendrick Street, Building B
Needham, MA 02494