Computerworld

IDG’s Top Enterprise Stories

April 06, 2020

Image: Are you overengineering your cloud apps?

Are you overengineering your cloud apps?

Just because you can does not mean you should. Think twice before making solutions more complex than they need to be Read more ▶

Your Must-Read Stories

•

Zoom pauses new feature development to focus on privacy, security

•

FCC wants to add a new swath of bandwidth to Wi-Fi 6

•

C++ proposal dismisses backward compatibility

•

How to protect yourself from coronavirus phishing threats

•

Pandemic leads to surge in video conferencing app downloads

•

New coronavirus-era surveillance and biometric systems pose logistical, privacy problems

•

What is phishing? How this cyber attack works and how to prevent it

Miscellaneous: Optiv & Palo Alto Networks

Security Program Foundational Assessment

Does Your Security Program Secure Your Company and All Your Remote Workers? Read more ▶

Image: Zoom pauses new feature development to focus on privacy, security

Zoom pauses new feature development to focus on privacy, security

'Zoom-bombing' has become an unwelcome phenomenon as the video conferencing vendor gains users now that work-from-home has become commonplace. Read more ▶

Image: Prep for an AWS Solutions Architect Associate cert for just $20

DEALPOST

Prep for an AWS Solutions Architect Associate cert for just $20

This 17-hour web course, geared towards current IT pros, provides an easy way to train from anywhere. Read more ▶

Image: FCC wants to add a new swath of bandwidth to Wi-Fi 6

FCC wants to add a new swath of bandwidth to Wi-Fi 6

If approved, a Federal Communications Commission proposal would add the 6GHz band to the unlicensed spectrum used by Wi-Fi 6, making room to support more devices from a single Wi-Fi access point. Read more ▶

 
 
Image: C++ proposal dismisses backward compatibility

C++ proposal dismisses backward compatibility

Proposal to the C++ standards committee would give up backward and binary compatibility for safety and simplicity Read more ▶

Image: How to protect yourself from coronavirus phishing threats

How to protect yourself from coronavirus phishing threats

The worst disease of the century brings out the worst in people as phishing attacks increase to unprecedented levels. Here's how to spot and COVID-19 phishing attacks and five ways to avoid them. Read more ▶

Image: Pandemic leads to surge in video conferencing app downloads

Pandemic leads to surge in video conferencing app downloads

As the COVID-19 outbreak continues to disrupt business, employees are turning to mobile business apps to ensure productivity remains high. Read more ▶

Image: New coronavirus-era surveillance and biometric systems pose logistical, privacy problems

New coronavirus-era surveillance and biometric systems pose logistical, privacy problems

Governments and companies are using biometrics and geolocation to identify and track potential coronavirus victims in the name of public safety. Read more ▶

Image: What is phishing? How this cyber attack works and how to prevent it

What is phishing? How this cyber attack works and how to prevent it

Phishing is a method of trying to gather personal information using deceptive e-mails and websites. Here's what you need to know about this venerable, but increasingly sophisticated, form of cyber attack. Read more ▶

eBook: Panda Security

2019: A Record-Breaking Year For Ransomware

So what did ransomware in 2019 actually look like? Read on to learn about the biggest attacks of the year, how companies bounced back from them, and how you can stay protected in 2020. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to IDG's Top Enterprise Stories as newsletter@newslettercollector.com.
Learn more about
Insider Pro
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.
© 2020 | Computerworld | 492 Old Connecticut Path | Framingham, MA 01701 | www.computerworld.com