James A. Martin

James A. Martin is a seasoned tech journalist and blogger based in San Francisco and winner of the 2014 ASBPE National Gold award for his CIO.com blog. He writes CIO.com's Living the Tech Life blog and is also a content marketing consultant.

The 25 worst passwords of 2019, and 8 tips for improving password security

The best Google Chrome extensions for business pros

The best Google Chrome extensions for business pros

From email tamers to scheduling aids to privacy protectors, these 20 Chrome extensions make the most popular web browser even more powerful and useful for business.

Best Android antivirus? The top 11 tools

Best Android antivirus? The top 11 tools

There are plenty of antivirus tools for Android. Here's how the top 11 measure up in protection, usability and features.

7 reasons Chromebooks are ideal for enterprises

7 reasons Chromebooks are ideal for enterprises

New data shows Chrome OS on target to become the No. 2 operating system among PCs. Is it time for your business to replace Windows or macOS devices with Chromebooks?

Top cloud security controls you should be using

Top cloud security controls you should be using

Human error is one of the top reasons for data breaches in the cloud, as administrators forget to turn on basic security controls. Whether it is Amazon Web Services, Microsoft Azure, or Google Cloud Platform, keep these rules in mind...

20 Slack tips, tricks and hacks for power users

20 Slack tips, tricks and hacks for power users

Slack is a powerful collaboration tool with many hidden ways of doing things. Here’s how to get the most from it from users who know it best.

Top 10 file-sharing options: Dropbox, Box, Google Drive, OneDrive and more

Top 10 file-sharing options: Dropbox, Box, Google Drive, OneDrive and more

Most file-sharing services have evolved into full-blown collaboration platforms. We look at 10 online services ranging from basic to enterprise-level.

What is access control? A key component of data security

What is access control? A key component of data security

Access control is a method of guaranteeing that users are who they say they are and that they have the appropriate access to company data. It is a vital aspect of data security, but it has some significant enforcement challenges.

Top 10 global cybersecurity hubs for 2019

Top 10 global cybersecurity hubs for 2019

Many cities and regions are vying for the title of Cybersecurity Capital. Here are 10 of the leading and emerging contenders.

What is IFTTT? How to use If This, Then That services

What is IFTTT? How to use If This, Then That services

With 11 million users running more than a billion applets a month, IFTTT hopes to become a service that connects pretty much everything — though some users say it still has room for improvement.

How to get a cutting-edge web browser

How to get a cutting-edge web browser

From Chrome Canary to Microsoft Insider Preview, you can experience tomorrow’s browser features today — if you don’t mind the risks of pre-release software.

What’s quantum computing [and why enterprises need to care]

What’s quantum computing [and why enterprises need to care]

Quantum computing is moving from science fiction to reality. Here’s what enterprise IT planners should know.

Load More