8 essential roles for a successful digital transformation

Email not displaying correctly? View it in your browser.

IDG’s Top Enterprise Stories

Our top picks from IDG's editors
Mar 01, 2018
IDG
Featured Image

Why developers focus on ‘loser’ iOS over ‘winner’ Android

Linux has beat closed-source operating systems in every hardware category, but in mobile its Android derivative just can’t win in the ecosystem competition Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

8 essential roles for a successful digital transformation
Introduction to metaprogramming in C++
What is Slack? How the popular collaboration tool works
10 security buzzwords that need to be put to rest
Best security software: How 5 cutting-edge tools tackle today's threats
Review: The enSilo platform traps threats that bypass traditional endpoint defenses
14 top tools to assess, implement, and maintain GDPR compliance
Microsoft Patch day brings bug warnings, another Office CtR, and the return of KB 2952664

Sponsor Article: BlueCat

Gartner Report: Addressing the Cyber Kill Chain

The Cyber Kill Chain model describes how attackers use a common cycle of methods to compromise an organization. IT security leaders can use this research to align security programs to adversaries and improve their ability to predict, prevent, detect and respond to threats. Read More

Thumbnail Image

8 essential roles for a successful digital transformation

CIOs scouring the earth to fill technical roles are likely ignoring the "medium digital" skills required to round out their digital transformations. Here are the lesser-known digital roles CIOs should target. Read More

Thumbnail Image
INSIDER

Introduction to metaprogramming in C++

This book excerpt from “C++ Templates, Second Edition” explains how to get more functional, more efficient, and more easily maintained code where user-defined computation happens at translation time Read More

Thumbnail Image

What is Slack? How the popular collaboration tool works

Though it's only four years old, Slack has evolved to become a leading cloud-based workplace collaboration app. Here's what it does, how to use it and why your company may not need email in the future. Read More

Thumbnail Image

10 security buzzwords that need to be put to rest

Having trouble getting your message across? Banning these buzzwords may help. Read More

Thumbnail Image

Best security software: How 5 cutting-edge tools tackle today's threats

In these security software reviews, we go hands-on with some of the most innovative, useful and, arguably, best security software from today's most important cybersecurity technology categories. Read More

Thumbnail Image
INSIDER

Review: The enSilo platform traps threats that bypass traditional endpoint defenses

The enSilo platform offers traditional endpoint protection alongside the ability to offer post-infection protection. It can also trap threats, holding them in place and rendering them harmless until a threat hunter can arrive to investigate. Read More

Thumbnail Image

14 top tools to assess, implement, and maintain GDPR compliance

Running behind on meeting the EU’s new GDPR privacy rules? These tools can help you meet the requirements and stay in compliance by deadline. Read More

Thumbnail Image

Microsoft Patch day brings bug warnings, another Office CtR, and the return of KB 2952664

This month’s fourth-Tuesday patches includes a bevy of bug notices and a warning to uninstall old Previews, the fourth “Monthly Channel” update this month for Office 365, and our old snooping friend KB 2952664. Read More

White Paper: BugSnag

Speed vs. Stability: Meeting the pressures of modern application development

The success of an application is connected to stability and continuous improvements in capabilities. It's a difficult task for DevOps: rapid, innovative product releases, while maintaining software stability. This white paper explains how to leverage visibility and actionable intelligence to optimize for short development cycles while identifying and correcting errors before they become problems. Read More

Get more from the experts at these enterprise websites from IDG:

CIO | Computerworld | CSO | InfoWorld | Network World

You are currently subscribed to IDG’s Top Enterprise Stories as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Privacy Policy

Learn more about INSIDER

Copyright © 2018 IDG Communications, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.