Features

it salary information 2016
simple home screen

hilary clinton stage

Hillary Clinton’s email has vanished but why can’t yours?

Experts agree that recent high-profile cases demonstrate that emails can be permanently destroyed. But they also warn against complacency. They still recommend treating emails as if they really are “forever.”

5 checklist

What’s in your code? Why you need a software bill of materials

When developers and suppliers carefully list the tools used to build an application and what third-party components are included, IT can improve software patching and updates

ignobels 2016 intro

Here are the 2016 Ig Nobel Prize 'winners'

Let’s say you’re a scientist, and you’ve worked your entire adult life at your discipline. You do a sort of offbeat study, for valid scientific reasons, and figure, hey, this’ll get a laugh in whatever journal is relevant to your...

gift guide preview

Sneak peek: 15 gadgets to put on your holiday wish list

Sure, it's the start of fall, but it's never too early to start thinking about what you want for the holidays.

twitter logo app icon

Were Apple's 'leaked' iPhone 7 tweets really a mistake?

The recent iPhone 7 launch presented Apple with a fresh opportunity to tackle Twitter, but the company's first iPhone-related tweets came a half-hour before it officially announced the phone.

00 intro kahn

Security is no fiction: Infosec on TV, film—and in space

Has film and TV depiction of IT security gotten any better since the '80s? We quizzed some tech pros hear their favorites and learn about the worst offenders.

managed security service providers

Lockdown! Harden Windows 10 for maximum security

To make the most of Windows 10's security improvements, you must target the right edition and hardware for your needs

01 social media mistakes

The 10 nastiest social media marketing mishaps of 2016

There is not necessarily a right way to use social media for corporate marketing or branding, but there sure are many wrong ways. These 10 organizations provide real-world examples of how NOT to use social.

blind skills challenges

How blind skills challenges can close the skills gap

Blind skills challenges are one way to remove both overt and unconscious bias from the technical hiring process.

htc nexus mockup

Google's Pixel phones: 7 essential technical upgrades we want to see

It looks like "Nexus" is out, and "Pixel" is in. This is what we hope to see as Google updates its flagship phones.

outsource

Why (and when) outsourcing security makes sense

Offloading security strategy and day-to-day operations to a managed security service provider can free up IT resources. But be prepared: It’s not an entirely hands-off proposition.

candy strangers

Five social engineering scams employees still fall for

You’ve trained them. You’ve deployed simulated phishing tests. You’ve reminded your employees countless times with posters and games and emails about avoiding phishing scams. Still, they keep falling for the same ploys they’ve been...

flexible

How flexible should your infosec model be?

Organizations need to stay on top of a fast-shifting threat landscape by updating their security policies -- without badgering users into a state of noncompliance.

muddy waters

Navigating the muddy waters of enterprise infosec

Information security finally has executives’ attention, but aligning with business needs is still challenging.

windows 10 updates 1

How we test Windows system performance

A quick rundown of how we assess the performance of Windows computers.

google photos android

Five Google Photos tips for finding, organizing, and sharing all your pictures

Can't find that one photo you're looking for? Google’s smart photo app can make it easy.

01 intro situations

These ransomware situations can result in colossal outcomes

These real-life scenarios show how sneaky perpetrators can be.

smart city c level execs introb

Smart cities: The rise of new C-level executives

Smart cities are creating new types of C-level executives, including chief bicycle officer, chief innovation officer and chief data officer.

Load More