Insider

Get exclusive access to premium articles, product guides, reviews, how-tos, and more from CIO, CSO, Computerworld, InfoWorld, ITworld, and Network World - the best enterprise tech publications in the business. Learn more!

R programming
digital data surveillance eye

apple ipad (public domain)

iPad smackdown: Microsoft Office vs. Apple iWork vs. Google G Suite

Your iPad can largely function like a laptop with two of the three main office productivity suites

cloud providers battle

Battle of the clouds: Amazon Web Services vs. Microsoft Azure vs. Google Cloud Platform

With more and more workloads going to the cloud, and the top vendors being as competitive as they’ve been, deciding on which provider to go with isn’t getting any easier. This handy guide will outline the pros and cons of each...

innovation digital transformation ts

How to create IT innovation

Exclusive research from the CIO Executive Council shines a light on how IT leaders are defining and driving IT innovation. Register now to download the free report.

green light in madrid go proceed traffic

The best Go language IDEs and editors

Among dozens of options for developing Go programs, Gogland, Visual Studio Code, and Cloud9 rise to the top

Computer monitor with pixelated locks for security breach

7 Wi-Fi vulnerabilities beyond weak passwords

Using strong encryption and passwords is only the first step in protecting your wireless network. Make sure you’re not exposed in these other ways.

resume mistakes

How to fix 3 common resume mistakes

Have you made any of these common resume errors? If so, it’s time to revisit, review and update your resume before you apply for your next job.

stats big data stocks analytics

Data visualization tools: The features users love and hate

It seems like making sense of data is everyone’s job now. Here are the pros and cons of five leading data visualization tools, as reported by enterprise users of the products.

connected nodes network

Understanding the attack surface to better allocate funds

How CISOs can be better informed and get ahead of attacks

jan cover

State of the CIO 2017: More challenging, still complicated

The 16th annual State of the CIO report shows that the life of the dual-role CIO is both more challenging and more rewarding. Get used to the new reality.

bug bounty

Why you need a bug bounty program

If you’re ready to deal with the volume of reports, a bug bounty program can help you can find the holes in your system — before attackers do.

3 bitcoin

Would killing Bitcoin end ransomware?

Bitcoin and ransomware seem to go hand-in-hand, but experts explain that doing away with the cybercurrency would just force cybercriminals to find another anonymous way to extort money.

snail rocket fast speed

Three technologies that could demolish slow internet

Broadband internet has opened up almost unlimited possibilities for commerce, distance learning, civic participation, and knowledge sharing. But we are only scratching the surface of what's to come.

Self driving truck

Ride along to solve these data breaches

Verizon’s recently released annual breach report that examines some of its cases where the RISK Team was called in to hunt down culprits. The “ride –along edition” of Verizon’s report gets a first-person perspective of the company...

smartphone shocked group

The high price of security shaming [Infographic]

Two-thirds of IT security professionals said they would pay an average of $124,000 to avoid public scandals associated with security breaches.

H-1B visa man entering U.S. with briefcase

Should security pros get special H-1B visa consideration?

The skills, education and experience that would garner additional merit have not been discussed publicly, but some cybersecurity leaders and industry-watchers say that special consideration should be given to H-1B visa applicants with...

employees technology planning data [Computerworld, January-February 2017 - HR IT]

HR and IT combine efforts on workforce analytics

As more companies depend on information about their employees to make crucial decisions, HR and IT are working closer together than ever before to deliver the data. 

ransomware data laptop

Tips for negotiating with cyber extortionists

Whether you are opposed to it or not, enterprises need to have a plan for negotiating with people who take their data hostage.

bodium castle fortress

How Google reinvented security and eliminated the need for firewalls

In some ways, Google is like every other large enterprise. It had the typical defensive security posture based on the concept that the enterprise is your castle and security involves building moats and walls to protect the perimeter. ...

Load More