Computerworld

IDG’s Top Enterprise Stories

January 24, 2019

Image: The three most important ways to defend against security threats

The three most important ways to defend against security threats

Patching, security training programs and password management will thwart attacks more effectively than anything else. You're already doing them. Here's how to do them better. Read more ▶

Your Must-Read Stories

•

How to hire a developer: The 7 essential steps

•

How to monitor activity on your Linux server

•

Multi-vector attacks target cloud-hosted technologies

•

Linux’s Hyperledger to give developers supply chain building blocks

•

Jackson Health System taps data flows to improve care

•

Do frog croaks hold the key to creating the perfect IoT network?

•

Apple’s ‘Everyone Can Code’ courses are now available in braille

White Paper: BAE Systems

The Intelligence Network: A Running Start

Over the course of the two-hour meeting, The Intelligence Network Steering Committee kicked off what is to be a regular and vital coming together of cross-industry minds, each filled with ideas about how we can meaningfully improve cyber security between now and 2025. Read more ▶

Image: How to hire a developer: The 7 essential steps

How to hire a developer: The 7 essential steps

While evaluating skills is certainly a very important part of evaluating job candidates, there’s much more you need to do to hire the right developer Read more ▶

Image: Get 3 Years of NordVPN Service for Just $2.99 Per Month - Deal Alert

FROM OUR BUSINESS PARTNERS

Get 3 Years of NordVPN Service for Just $2.99 Per Month - Deal Alert

Safeguard yourself against snoops, and access blocked content with this no-log VPN service. NordVPN is just $2.99 per month for 3 years, if you sign up right now. Read more ▶

Image: How to monitor activity on your Linux server

How to monitor activity on your Linux server

The watch, top, and ac commands provide some effective ways to oversee what is happening on your Linux servers. Read more ▶

 
 
Image: Multi-vector attacks target cloud-hosted technologies

Multi-vector attacks target cloud-hosted technologies

Securonix report outlines the threat posed by automated multi-vector, multi-platform attacks against cloud infrastructure. Read more ▶

Image: Linux’s Hyperledger to give developers supply chain building blocks

Linux’s Hyperledger to give developers supply chain building blocks

Grid, a new project from the Linux Foundation, will offer developers tools to create supply chain-specific applications running atop distributed ledger technology. Read more ▶

Image: Jackson Health System taps data flows to improve care

Jackson Health System taps data flows to improve care

Homegrown data-as-a-service platform helps one of the largest public health systems in the country better serve patients while cutting costs. Read more ▶

Image: Do frog croaks hold the key to creating the perfect IoT network?

Do frog croaks hold the key to creating the perfect IoT network?

Studying how tree frogs regulate their communications, so each amphibian in the colony can hear everything, could provide ideal data traffic routings, scientists say. Read more ▶

Image: Apple’s ‘Everyone Can Code’ courses are now available in braille

Apple’s ‘Everyone Can Code’ courses are now available in braille

Apple teams with blind advocacy groups to make coding skills more accessible Read more ▶

White Paper: BAE Systems

The Intelligence Network: Safeguarding Society in the Digital World

We need to talk about cyber. To meet the challenges of our highly-connected world, we have to stop giving cyber security the silent treatment. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to IDG's Top Enterprise Stories as newsletter@newslettercollector.com.
Learn more about
Insider
Copyright © 2019 Computerworld, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.