What do if your public cloud is hacked

Email not displaying correctly? View it in your browser.

IDG Enterprise Top Stories

Our top picks of the week from IDG
Aug 29, 2017
IDG Enterprise

VMware embraces cloud during VMWorld, CEO Gelsinger says

VMware is rolling out services worldwide in the AWS cloud over the next 15 months, starting in the U.S. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

What do if your public cloud is hacked
12 bad habits that slow IT to a crawl
How to get started with Akka.Net
As Apple preps for the iPhone 8, wireless charging option seems more likely
Researchers find a way to stop ISPs from spying on you via your smart devices
Security firms team up to neutralize WireX botnet after multiple DDoS attacks
History of computers, part 1 — The bulletin board system

eBook: Forcepoint

Advanced Evasion Techniques for Dummies

Welcome to Advanced Evasion Techniques For Dummies, your guide to the security evasion techniques that have become a serious preoccupation of the IT industry. This isn't to say that IT security hasn't been a major source of worry in the past; on the contrary, the last decade has been witness to growing security threats, cybercrime and compliance regulations. Read More

Thumbnail Image

What do if your public cloud is hacked

In the unlikely event your cloud provider has a breach, there are several things you should do—and not do—to protect yourself Read More

Thumbnail Image

12 bad habits that slow IT to a crawl

Bottlenecks always seem born of the best intentions, but they must be rooted out — and broken. From governance to manual provisioning, here's what's holding up your IT organization's ability to deliver results. Read More

Thumbnail Image

How to get started with Akka.Net

Take advantage of Akka.Net to build concurrent, fault tolerant, event-driven applications using the high-level abstractions of the actor model Read More

Thumbnail Image

As Apple preps for the iPhone 8, wireless charging option seems more likely

Although its smartphone rivals have offered wireless charging for years, Apple may finally be ready to roll out the technology in the upcoming iPhone. Read More

Thumbnail Image

Researchers find a way to stop ISPs from spying on you via your smart devices

ISPs can use your IoT devices to spy on you, but researchers from Princeton University came up with a way to fight back. Read More

Thumbnail Image

Security firms team up to neutralize WireX botnet after multiple DDoS attacks

Researchers from Akamai, Cloudflare, Flashpoint, Google, Oracle (Dyn), RiskIQ, Team Cymru, and others worked to take down an Android-based botnet responsible for DDoS attacks this month. Read More

Thumbnail Image

History of computers, part 1 — The bulletin board system

Before we had always-available, fast connections to multiple servers, we had dial-up modems and bulletin board systems (BBS). And it wasn’t even that long ago. Read More

eBook: Forcepoint

All Clouds Are Not Equal

In the early days of cloud computing, security concerns prevented many organizations from moving their data, applications, and infrastructure off premises. Today, however, that thinking has come full circle, and most organizations realize that the cloud offers the potential to be a safe place for all three. Read More

Get more from these IDG Enterprise brands:

CIO | Computerworld | CSO | InfoWorld | Network World

You are currently subscribed to IDG Enterprise Top Stories as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Privacy Policy

Learn more about INSIDER

Copyright (C) 2017 Computerworld, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@idgenterprise.com.