Features

disaster recovery plan ts
Data matrix networking connections system

big data certification

14 big data certifications that will pay off

Data scientists and data analysts as well as engineers and developers with the skills to work with big data technologies are in demand and well-compensated. Want an extra edge looking for your next job? Get big data certified.

jw fullstack

Full-stack software for cutting-edge science

Find out how open source Java- and Python-based tools power the UK's national synchrotron

Microsoft Office 365 logo

Office 365: A guide to the updates

Get the latest info on feature, bug fix and security updates for Office 365 for Windows as they roll out from Microsoft. Now updated for Version 1706 (Build 8229.2103), released on July 19, 2017.

collaboration public domain

How to pick the right collaboration tools

IT pros say collaboration is a high priority to their organization, so it's important to choose wisely

The dark web goes corporate

It's just as shady and dangerous as ever, but something has changed in the way the dark web does business, and it will look very familiar to IT buyers.

construction building crane architecture

How to write an information security architect job description

A good information security architect straddles the business and technical worlds. Writing a solid, clear job description ensures that both sides understand the role.

vpn hub 960

Best VPN services of 2017: Reviews and buying advice

Surfing the web through a virtual private network (VPN) can keep your identity and data safe and secure online. We show you what to look for in a VPN and help you pick the best one for your needs.

digital transformation

ServiceMaster goes digital to stave off Amazon.com

The home service giant has tapped digital dispatching to connect technicians with homeowners and has embraced agile as part of a broad digital transformation to deliver software faster.

hottest and coldest outsourcing trends city globe

7 hot IT outsourcing trends — and 7 going cold

The days of low-cost commodity services are waning, as IT organizations seek stronger strategic partnerships with IT outsourcing providers in the era of digital transformation.

best home security cameras

Best home security camera: Our favorite tools for keeping an eye on the home front

A boom in wireless security cameras is inspiring a movement in DIY home surveillance. Follow our buying guide and read our reviews to find the best option for you.

hiring software developers

Four ways to use open data sources to find cybersecurity candidates

Publicly available data from government and other sources can help you find the right security talent.

The 5 fundamentals of effective cloud management

The rising complexity of today’s cloud environments can catch your company off guard — at great cost. Here are five functional areas CIOs should focus on as you get your cloud strategy off the ground.

Black Hat 2015

The best of Black Hat: The consequential, the controversial, the canceled

Over the past two decades, the annual Black Hat conference has had its share of controversy. CSO looks back at the most significant talks and demonstrations.

01 intro prediction

Predictive analytics: Your key to preventing network failures

Powerful new tools replace crystal ball predictions with deep and actionable insights.

Developer secrets that will sink your business

9 developer secrets that could sink your business

In today’s tech world, the developer is king — and we know it. But if you’re letting us reign over your app dev strategy, you might be in for some surprises, thanks to what we aren’t saying.

we're hiring sign jobs careers public domain

Six entry-level cybersecurity job seeker failings

More cybersecurity job openings mean more entry-level candidates are entering the market. These are the common mistakes they make when apply and interviewing for an opening.

ransomware

Who is a target for ransomware attacks?

While any enterprise is a possible ransomware target, some are more likely than others to be caught in a cybercriminal’s crosshairs.

citrix pt2
video

Interview: Tim Minahan, SVP & CMO, Citrix - part 02

Tim Minahan, Chief Marketing Officer and SVP of Citrix, discusses how Citrix uses data to predict customer needs and engagement readiness, Citrix’s content marketing approach and the importance of industry events in building...

Load More