Features

Tesla coil
00 title

crime scene digital

The cybercrime economy personified

The cybercrime economy is entrenched in digital fox holes and hoodlum hideouts the world over. It’s not going away. Your best bet is to be the hardest target on the battlefield.

enterprise cloud thinkstock

Why the enterprise cloud needs shadow IT to succeed

Who is really responsible for cloud initiatives in the enterprise? Some say central IT, but studies show that is most certainly not the case. Enter shadow IT, which is very much alive and well in the enterprise.

big data risks

7 IT career risks worth taking

Whether you're just starting out in your tech career or you’re a seasoned IT veteran, knowing when to take risks can mean the difference between success and failure. Here are seven chances worth taking at any stage of your career.

app malware

Attackers clone malware-laden copies of popular apps

Criminal hackers have hacked/cloned most of the top 100 paid apps and top 20 free apps for Android and iOS, according to data from Arxan’s State of Mobile App Security report, 2014.

startux

The 11 people you meet on (nearly) every open source project

Which kind are you? Choose wisely!

wasting money

Is your security software sitting unused on the shelf?

Your security software isn't working? It could be because your company is one of the many that doesn't actually use the products they buy.

police inpectors

Who 'owns' an investigation into a security breach?

When things go wrong, as they inevitably will in any organization, the way to resolve those problems starts with an effective investigation. But an advisory council says too often those investigations are plagued with confusion and...

00 7spies title

7 of the most famous spies

Real world spies are continually at work, grabbing government top secrets and business trade secrets. Here are seven of the most famous / infamous spies.

IT certifications that will pay more

IT certification hot list 2015: 10 that deliver higher pay

Not all IT certifications are created equal. Here are those that will result in the most financial gain.

00 title

6 tips to secure your Android device

What you need to know to secure your Android phone.

mobile world congress

6 Linux-y announcements from Mobile World Congress

Linux is enabling hardware and software vendors to create new markets. Here are some of the major announcements from MWC.

1 mwc smartphones

Best new Android & Windows smartphones at MWC 2015

Samsung, HTC, Sony and others debut brand new smartphones at Mobile World Congress (MWC) in Barcelona.

march cover

CIOs have to learn the new math of analytics

Today's data-driven business runs on the almighty algorithm. But if you're not careful, those geeky formulas can stir up legal and ethical trouble.

trends data chart growing ladder cloud

CIOs share lessons learned from the journey to the cloud

Shifting your organization's services and infrastructure to the cloud can bring unexpected perils. These are lessons learned from CIOs who have successfully navigated the journey.

micromanagement damaging your it team

How to tell if you're a micromanager (and how to stop)

Micromanagement may seem harmless, but it's sabotaging your teams, your productivity and morale from within, and stifling your business's ability to grow. Here's how to tell if you're a micromanager, and some steps you can take to...

romania thinkstock

Why offshoring your software development to Romania makes sense

A software maker and a food and recipe website turned to Romania for IT outsourcing. Here’s a look at how TechSmith and Yummly are successfully outsourcing with Gemini Solutions.

7 warning signs of could-be rogue employees

7 warning signs an employee has gone rogue

Trust and IT go hand in hand. Here are the red flags to watch for before you get burned.

close encounters

6 blunders to avoid when dealing with end users

How IT pros can avoid blunders when interacting with end users.

Load More