Features

2016 software predictions
graduate thinking

Open Source sign in yellow field against blue sky

Open source security risks persist in commercial software [Infographic]

Black Duck’s second annual Open Source Security and Risk Analysis report shows that commonly used infrastructure components have high-risk vulnerabilities.

computer problems troubleshooting toolbox stock

12 free utilities that can give you more control over your PC

There are a slew of free third-party utilities for Windows that let you monitor and manage all aspects of your PC.

cutout paper people showing teamwork cooperation boost lift

How Myers-Briggs can create a stronger IT team

Personality assessment tests, like Myers-Briggs, have their limitations, but they can be a powerful team-building and productivity tool.

waze vs. google maps

Google Maps vs. Waze: Which should be your go-to map app?

Each app offers unique features to help you conquer survive the commute home. Which should you use, and when?

samsung apple

Enterprise showdown: 5 ways the iPhone beats the Galaxy S8

The Galaxy S8 and iPhone 7 Plus are two of the best smartphones you can buy. While the Galaxy S8 is the hottest new mobile device, there are reasons IT will want to stick with the iPhone 7 Plus.

Amazon Echo

What life after the smartphone will look like

Alexa, evolved.

lg g6 vs google pixel

Smartphone camera showdown: Google Pixel vs. LG G6

It's a tight race, but LG takes the Best Smartphone Camera crown from Google.

dsc04877
video

LG G6 vs Google Pixel Camera Showdown

Can the LG G6 dethrone the Google Pixel for the best camera in a smartphone?

hiring leaders in tech

6 leadership qualities to look for when hiring

The best worker isn't always the best leader and leaders aren't always where you'd expect to find them. Here are six tips to identifying and hiring leaders.

computer ports secure issue

Securing risky network ports

CSO examines risky network ports based on related applications, vulnerabilities, and attacks, providing approaches to protect the enterprise from malicious hackers who misuse these openings.

future what is next

11 technologies developers should explore now

From machine learning to digital twins, opportunities abound in emerging (and converging) tech trends

Best Android Phone hub primary image

Best Android phones: What should you buy?

Picking an Android phone can be difficult, but we're here to help. These are the top Android phones you should consider bringing home.

Cartoon from 2013: Hiring manager looking for applicants

CW@50: A look at life on the job in IT through cartoons

Unforgiving boom-and-bust cycles, skills that go stale overnight, outsourcing: IT careers aren't all signing bonuses, Ping-Pong tables and beanbag chairs. Here’s a look at life on the job in IT through the years, from the pen of...

alexa products 800x600

Got Alexa? 12 devices that extend its reach

Got Alexa? Want Alexa? These 12 interesting devices work with Amazon's personal assistant to provide news, information and other services.

galaxy s8 primary

5 underrated features of the Samsung Galaxy S8

After a week with the Samsung Galaxy S8, CIO.com senior writer, Sarah White, finds a lot to love about the device besides it's stunning design and impressive display.

Family in silhouette waving goodbye at airport

Are we ready to bid the SIEM farewell?

SIEM technology is old, and possibly not properly configured making it vulnerable to attacks.

Zombie Cloud Data

Don't get bit by zombie cloud data

Data you thought you had deleted from the cloud can come back to haunt you. Get to know your provider’s data deletion policy

1 transform phone payment

10 ways Trusted Identities are used

It is always a struggle to control who gets into your network. A third-party might need access for the contractual work they are doing. HID Global runs through some ways trusted identities are used.

Load More