Computerworld

IDG’s Top Enterprise Stories

December 12, 2019

Image: 2020 cybersecurity trends: 9 threats to watch

2020 cybersecurity trends: 9 threats to watch

Here's how your biggest threats of 2019 will likely trend for 2020 and how you might change your defensive strategy for them. Read more ▶

Your Must-Read Stories

•

How to develop IT leaders into future CIOs

•

How to secure your domain name services

•

11 tools that make Kubernetes easier

•

Keys to a successful flexible IT staffing strategy

•

Secure SD-WAN: The security vendors and their SD-WAN offerings

•

Microsoft Teams comes to Linux

•

How to modernize enterprise web applications

White Paper: IBM

A Forrester Opportunity Snapshot: Unlock Open Source Technology’s Full Value

The results were clear: enterprises need help unlocking the full potential of large-scale open source software adoption. Read more ▶

Image: How to develop IT leaders into future CIOs

How to develop IT leaders into future CIOs

Steve Faas, CIO of Aleris, reflects on his strong record of turning up-and-comers into CIOs. Read more ▶

Image: 4 eLearning deals you can get for 60% off this Cyber Monday

DEALPOST

4 eLearning deals you can get for 60% off this Cyber Monday

These are the top 4 Cyber Monday deals that you can get for 60% off using offer code CMSAVE60 Read more ▶

Image: How to secure your domain name services

How to secure your domain name services

Follow these steps to protect your websites at the server and workstation. Read more ▶

 
 
Image: 11 tools that make Kubernetes easier

11 tools that make Kubernetes easier

Take advantage of these Kubernetes companions to improve monitoring, command line ops, multi-cluster management, and more Read more ▶

Image: Keys to a successful flexible IT staffing strategy

Keys to a successful flexible IT staffing strategy

With specialized skills in short supply, CIOs are increasingly turning to contingent workers to supplement in-house talent. Here’s how to ensure your workforce mix is on target and productive. Read more ▶

Image: Secure SD-WAN: The security vendors and their SD-WAN offerings

Secure SD-WAN: The security vendors and their SD-WAN offerings

A networking vendor simply can’t jump into this space. Some SD-WANs add stateful packet filters and call this security. Read more ▶

Image: Microsoft Teams comes to Linux

Microsoft Teams comes to Linux

The launch of the highly requested Linux desktop client is designed to help Microsoft appeal to developers. Read more ▶

Image: How to modernize enterprise web applications

How to modernize enterprise web applications

Five guiding principles for building, managing, monitoring, and maintaining state-of-the-art web applications Read more ▶

Video/Webcast: IBM

CIO Playbook: Real examples of integrating the data center and cloud

IBM can be your single support partner for your journey to cloud. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to IDG's Top Enterprise Stories as newsletter@newslettercollector.com.
Learn more about
Insider Pro
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.
© 2019 | Computerworld | 492 Old Connecticut Path | Framingham, MA 01701 | www.computerworld.com