Ryan Francis

Managing Editor

Ryan Francis is managing editor of Computerworld and has been in the tech publishing field for 17 years.

Pitfalls of identity access management

Pitfalls of identity access management

Whether dealing with a third parties access or tracking an insider through your network, action needs to be taken to see who goes where. Too few organizations treat IAM as the crucial, secure connective tissue between businesses'...

How to strike ransomware out

How to strike ransomware out

Carbonite created this list of 10 important ransomware prevention tips and best practices.

False positives still cause threat alert fatigue

False positives still cause threat alert fatigue

How you set up and prioritize which alerts to look at and act on is the basis for an effective threat management strategy.

Believe your employer doesn’t know about your legal problems? Think again

Believe your employer doesn’t know about your legal problems? Think again

Companies hire a third party to scour public databases to make sure employees are not getting into legal trouble that would impact their jobs. But is it ethical? Experts explain.

New products of the week 5.1.17

New products of the week 5.1.17

Our roundup of intriguing new products from companies such as Red Hat and Kaspersky Lab.

Users have little confidence their company can protect their mobile device

Users have little confidence their company can protect their mobile device

A survey sponsored by Check Point found that 64 percent of respondents are doubtful that their organization can prevent a mobile cyberattack. What can be done to combat that?

10 ways to achieve ROI on a network solution

10 ways to achieve ROI on a network solution

Setting up and protecting the network infrastructure is a major challenge and needs to be even more sophisticated and dynamic than ever before. Here are 10 points that need to be considered to achieve ROI and deliver payback

9 tips to turn your data center green

9 tips to turn your data center green

Jeff Biggs, executive vice president of Operations & Technology at Peak 10, provides a few steps data center providers can take to improve their energy efficiency model overall.

What to ask when selecting application security solutions

What to ask when selecting application security solutions

Organizations need to determine the right tools to stay relatively risk free. Open source security vendor Black Duck explains why asking these key questions can help you determine the right mix of application tools and capabilities...

Healthcare records for sale on Dark Web

Healthcare records for sale on Dark Web

A clinic in Baltimore is just one example of a healthcare provider having its records stolen, only to find them on the Dark Web for less than one cent per record.

New products of the week 4.24.17

New products of the week 4.24.17

Our roundup of intriguing new products from companies such as Sophos and FireEye.

What's in the fine print of your disaster recovery vendor agreement?

What's in the fine print of your disaster recovery vendor agreement?

Make sure these points are in your service-level agreements with DRaaS vendorsWhen considering DRaaS vendors, ask your potential partner how far they are willing to go in protecting your business and your data, and if these promises...

Cybersecurity companies to watch

Cybersecurity companies to watch

CBInsights created a list of startups that its metrics showed has early-to mid-stage high-momentum companies pioneering technology with the potential to transform cybersecurity. 

How to prevent your mobile app from getting hacked

How to prevent your mobile app from getting hacked

TriviaCrack may be addicting to users, but criminals are hooked on getting your personal information from other apps you use

New products of the week 4.17.17

New products of the week 4.17.17

Our roundup of intriguing new products from companies such as ForeScout Technologies and Veriato.

Detecting insider threats is easier than you think

Detecting insider threats is easier than you think

Security experts weigh in on stopping the danger from your own employees. Access and security awareness training are the main themes to finding the danger that is within your own walls.

Predictive analytics can stop ransomware dead in its tracks

Predictive analytics can stop ransomware dead in its tracks

Predictive analytics is a necessity because the malware of tomorrow is unknown and will surely evolve to our detriment. Find out how it finds traces of ransomware before the network goes down.

New products of the week 4.10.17

New products of the week 4.10.17

Our roundup of intriguing new products from companies such as Quest Software and Barracuda.

What enterprises can learn in the aftermath of a phishing attack

What enterprises can learn in the aftermath of a phishing attack

Tychon’s Chief Technology Officer Travis Rosiek offers tips for enterprises on how to analyze former phishing attacks to improve defenses against future attacks, such as creating a database of captured phishing emails to learn...

What home products are most susceptible to cyber burglars?

What home products are most susceptible to cyber burglars?

In the matter of the Dyn situation, it was those Internet of Things devices that created the voluminous distributed denial of sevice attack. A DVR was used to attack Dyn’s network. To reduce the impact of such attacks, officials at...

Load More