Features

vpn hub 960
Microsoft Office 365 logo

human capital software recruiting crm selection

12 most difficult IT jobs for employers to fill

The 2020 State of the CIO research reveals organizations struggling to fill cybersecurity, data science and AI roles.

Ransomware

Recent ransomware attacks define the malware's new age

By 2018, the ransomware boom seemed to have peaked. But over the past 24 months, shifts in hacker tactics have resulted in a resurgence of ransomware attacks.

real time os nautilus clock against the clock future by raspirator getty

How to use asyncio in Python

Take advantage of the high-level async functions in Python’s asyncio library to write more efficient Python applications

agile retraining cross train crossfit jumping athletic excel

Reskilling IT for digital success

CIOs cross-train employees in a variety of ways to round out their staffs’ skills for digital success. CIOs share their reskilling strategies and lessons learned.

CSO > Password elimination [conceptual password security lock in a trash bin]

The 25 worst passwords of 2019, and 8 tips for improving password security

Blacklist these 25 passwords now and use these tips to improve enterprise password security.

leading fistful of dollars budgets money

Best cheap laptops: We rate the best-sellers on Amazon and Best Buy

If you have $500 (or less), we've found the best cheap laptops on Amazon and Best Buy. The ones that give you the best bang for buck. Keep reading to find our top picks.

cyber security lock padlock firewall code breach password

The OPM hack explained: Bad security practices meet China's Captain America

How the OPM hack happened, the technical details, and a timeline of the infiltration and response.

Marriott data breach  >  Marriott logo + binary data stream through the fingers of a hacker

Marriott data breach FAQ: How did it happen and what was the impact?

In late 2018, the Marriott hotel chain announced that one of its reservation systems had been compromised, with hundreds of millions of customer records, including credit card and passport numbers, being exfiltrated by the attackers....

Equifax breach  >  Equifax logo amid broken, disrupted binary code

Equifax data breach FAQ: What happened, who was affected, what was the impact?

In 2017, personally identifying data of hundreds of millions of people was stolen from credit reporting agency Equifax. Here's a timeline of what happened, how it happened, and the impact.

china flag

Entering the Chinese market? Here’s how to do it cloud-first

To extend your business inside China – and actually compete – you’ll need to set up shop behind the Great Firewall. Here’s how to choose a Chinese cloud provider and navigate the regulatory and privacy complexities

windows 10 logo

Windows 10: A guide to the updates

Here's what you need to know about each update to the current version of Windows 10 as it's released from Microsoft. Now updated for KB4532693, released Feb. 11, 2020.

IDG Tech Spotlight  >  Security  >  Balancing security and innovation

Security vs. innovation: IT's trickiest balancing act

An innovative initiative is only as successful as it is secure. Here’s how CIOs are balancing risk-taking with risk aversion.

IDG Tech Spotlight  >  Security  >  UEM/unified endpoint management and security

UEM to marry security — finally — after long courtship

Machine learning will be key in evaluating whether a mobile device and its user should be allowed to connect to a corporate application or data silo, as user behavior becomes a part of overall endpoint security.

cia triad security triangle glowing binary process by nolimit46 getty 2400x1600

The CIA triad: Definition, components and examples

The CIA (Confidentiality, Integrity, Availability) triad is a widely used information security model that can guide an organization's efforts and policies aimed at keeping its data secure.

Antivirus digital syringe and virus/biohazard symbol in binary matrix

Best antivirus software: 13 top tools

These top-ranking Windows 10 client antivirus products were tested on three primary criteria: protection, performance and usability.

securitycamera hub image 2019

Best home security camera: Keep an eye on the home front

A boom in wireless security cameras is inspiring a movement in DIY home surveillance. Follow our buying guide and read our reviews to find the best option for you.

Chrome extensions/support for Gmail

The best Google Chrome extensions for business pros

From email tamers to scheduling aids to privacy protectors, these 20 Chrome extensions make the most popular web browser even more powerful and useful for business.

dashcam hub

Dash cam reviews: Catch the maniacs and meteors of daily driving

We review the best 1080p and 4K dash cams. They record what's ahead (and sometimes what's behind), and ideally mark it with GPS, too. Exactly what you need on today's mean streets.

Load More