Features

maingear closeup 1
gearvrvsdaydream lead

3 auditors

The most common errors identified in professional DNS audits

Chris Roosenraad, director of DNS Services at Neustar, shares some of the most common errors observed during audits of its customer’s DNS infrastructure and the best practices you can take to ensure you are maximizing your DNS...

healthcare it conferences

The 4 biggest healthcare IT headaches

Experts in healthcare IT and compliance discuss the top challenges for hospitals and healthcare facilities and what CIOs can do to address them.

future

5 ways retail CIOs can future-proof their business

You don't need to predict the future to prepare for it. The strategies outlined here will help you keep your organization’s eye on the prize.

7 artificial intelligence

Why you should invest in AI talent now

Get HR involved now in finding people with AI skills and talent or risk being left behind, warns Mark Minevich, a leading business and government consultant.

tech spending to rise

Don't worry CIOs: You still control tech spending

In the digital era, business executives are becoming more involved in acquiring corporate technologies. But the CIO still largely has the final say for most technology purchasing decisions.

veterans fill cybersecurity gap2

Companies ramp up recruiting veterans as cybersecurity urgency grows

Many veterans have the cybersecurity skills and attitude to be successful in the public sector with the right support.

ball and chain debt depression weight problem

New tool tallies your big data debt

The free Dremio Big Data Debt Calculator is a new tool from data analytics startup Dremio designed to help enterprises estimate the unplanned cost that stems from the use of non-relational data management technologies.

The modern guide to staying safe online

The modern guide to staying safe online

Keeping safe and productive online requires smart decision-making and just the right preventive measures to fit the level of risk you can live with.

it dev in north america

Why IT service providers are investing in North America

IT outsourcing providers have been opening more service centers in the U.S. with Seattle, San Francisco and Toronto emerging as hot spots for digital services.

ryan benson

A day in the life of a threat researcher

After leaving Exabeam at the end of the workday, Ryan Benson’s mind doesn’t shut off when it comes to thinking about designing new defenses against Black Hats. See what his day looks like.

pc antivirus

Yes, you still need endpoint malware protection

While operating systems and apps are more secure, the need for endpoint security remains.

windows 10 working

Windows 10: The best tricks, tips, and tweaks

Windows 10 is chock-full of handy, hidden new features worth exploring, especially after the massive Anniversary Update. Check out the best tips and tricks here.

compass tools architect builder

Why you need an enterprise architect

Large organizations are increasingly turning to enterprise architects to help bridge the divide between IT and the business and drive digital transformation.

shadowy attacker hooded (public domain)

How to maintain data oversight to avoid ‘shadow data’

As more companies take a liberal approach to cloud app provisioning, they need to make sure that all apps – including vetted ones – are carefully secured, optimized and monitored. Al Sargent, senior director at OneLogin, offers the...

template c100.00 00 06 25.still001
video

Watch: Vint Cerf on inventing the Internet, defending Al Gore

In this far-ranging interview from 2001, "Father of the Internet" Vinton Cerf recalls having to "shove TCP down people's throats" and lobby for government permission to commercialize the 'Net.

trojan horse virus

Blackmoon banking trojan returns with new framework

Fidelis Cybersecurity describes the new way Blackmoon was delivered to South Korean financial institutions and offers advice for preventing future attacks.

struggle to cultivate digital primary2

Why companies struggle to cultivate digital strategies

Companies that find themselves digital laggards are suffering from strategic decisions they made nearly 20 years ago. Here's how to battle back.

tatu ylonen

Unmanaged, orphaned SSH keys remain a serious enterprise risk

There are many ways attackers can try to infiltrate an enterprise, but many times enterprises make it so easy that the attackers don’t have to try too hard. Consider the current state of orphan SSH (Secure Shell) keys and how...

Load More