Slideshows

primary hp
intro

digital data surveillance eye

The future of biometrics and IoT

Many people are familiar with biometrics as a security measure at airports or police stations, where they often use a fingerprint as a form of identification, but there are many other uses outside of law enforcement.

industrial iot 1

5 things to think about for industrial IoT readiness

John Fryer, senior director of industry solutions for Stratus Technologies, has outlined five things industrial companies should be thinking about in terms of IIoT readiness in order to overcome the barriers to making the transition.

cool cars 1

11 low-tech, decidedly cool cars

Ferrari, Mercedes, BMW, James Bond, Aston Marton

1 recovering days

Why DRaaS is a better defense against ransomware

Dean Nicolls, vice president of marketing at Infrascale, shares some tangible ways disaster recovery as a service (DRaaS) can pay big dividends and quickly restore systems in the wake of a ransomware attack.

0 shadow it intro

8 steps to regaining control over shadow IT

Learn how to discover those employees who went roaming for outside services.

1 small business security

12 steps to small business security

If you’re a small to medium-sized business and you wing it when it comes to network management and security then it’s not a question of if you will have a disaster, it’s merely a question of when. Here are 12 steps that will, in the...

intro

New products of the week 2.20.17

Our roundup of intriguing new products from companies such as Dell and VMware.

Self driving truck

Ride along to solve these data breaches

Verizon’s recently released annual breach report that examines some of its cases where the RISK Team was called in to hunt down culprits. The “ride –along edition” of Verizon’s report gets a first-person perspective of the company...

The far-out office of the future is (almost) here

Behold the awesome office of the future

From shape-shifting furniture to holographic displays, the workplace of the future promises more than just another day at the office

1 byod

7 ways MDM threatens employee privacy

To understand the extent to which MDM solutions could monitor and control BYOD devices, the Bitglass research team installed MDM software on several employees’ personal mobile devices with their permission. The outcome? Complete...

1 primary hp

7 features Linux could borrow from other systems

Linux distributions are great, but adding these seven non-Linux features to them would make the systems even better.

01 worms

Heartbreaking hacks

Every year hackers take advantage of cupid’s sharp arrow to trip-up unsuspecting online users.

phone gimmicks main

The 12 worst Android phone gimmicks once hailed as 'innovations'

These were heralded as impressive new gotta-have-it features. In hindsight, they're pretty useless.

01 intro crowd conference

Hot products at RSA 2017

RSA, the world’s largest security conference, is underway this week in San Francisco with attendees from around the world gathering to hear the latest strategies for fighting cyberattacks.

01 network

How to lock down your security system

The most important, but least recognized, steps organizations must take to make their security systems more cyber secure.

intro

New products of the week 2.13.17

Our roundup of intriguing new products from companies such as Cisco and Forescout.

01 challenges

What cyberinsurance gotchas companies must be ready for

CipherLoc Vice President Mike Salas details six challenges companies will face as the insurance industry begins to expand its presence in the cybersecurity industry.

professional development intro

10 ways tech pros can take charge of their professional development

Innovation continues to create many amazing breakthroughs, and with them, career opportunities. Technologies will always need skilled technicians and engineers to implement them. CompTIA, the technology industry’s leading trade...

Load More