From IDG Insider Brands

The best articles from all five enterprise publications

Top Enterprise Stories

October 03, 2022

The dirty little secret about edge computing

Some people say edge is the next revolution, but the gap between promised performance and actual results needs to be discussed.

Image: Sponsored by Palo Alto Networks: The Future of Machine Learning in Cybersecurity

Sponsored by Palo Alto Networks: The Future of Machine Learning in Cybersecurity

Why has machine learning become so vital in cybersecurity? This article answers that and explores several challenges that are inherent when applying machine learning.

P&G turns to AI to create digital manufacturing of the future

The consumer goods multinational company, with help from Microsoft, is adopting the industrial internet of things, digital twin, AI, and machine learning to transform manufacturing at scale.

Most hackers need 5 hours or less to break into enterprise environments

A new survey of 300 ethical hackers provides insight into not only the most common means of initial access but how a complete end-to-end attack happens.

Image: Apple’s enterprise IT pitch: Management, security, identity

Apple’s enterprise IT pitch: Management, security, identity

And it envisions all of these wrapped up in user interfaces that just work, as an Apple exec explained at the world's biggest Apple admins event.

About a third of you cloud users need to learn resiliency lessons from Ian

While the Florida hurricane damage has your attention, plan for and implement redundant cloud and on-prem network infrastructure, and backup and recovery now.

Malware builder uses fresh tactics to hit victims with Agent Tesla RAT

A new malware campaign uses the recently discovered Quantum Builder and sophisticated tactics to deliver malicious payload.

Enterprises embrace devsecops practices against supply chain attacks

Healthy developer-team culture and adherence to devsecops best practices to protect against supply chain attacks are surprisingly commonplace in today’s security environment, according to a report from Google and Chainguard

Facebook Twitter LinkedIn
© 2022 Computerworld
140 Kendrick Street, Building B
Needham, MA 02494