Slideshows

Network World: IoT Hacks [slide-01] > Strange and Scary IoT Hacks

Strange and scary IoT hacks

The Internet of Things has provided a worldwide digital playground for hackers, pranksters and those who would thwart them and here are 9 of the most unnerving.

business intelligence data visualization tools analytics

10 BI tools for data visualization

Visual analytics is the core of business intelligence. Here are the tools you need to see through the data.

1 the state of it security 2018 intro

The state of IT security, 2018

Who's in charge of IT security? To whom do they report? How big is their budget? We've got answers.

kcd deep games primary
Updated

These 20 deep, absorbing PC games will eat days of your life

These long PC games demanded to be played for days, not hours—and your tenacity will be rewarded.

1 intro slide

8 top-paying process and project management skills

From CMMI to Scrum, certain process and project management skills command a premium. Here are the eight that pay the best.

top cloud skills intro

10 top-paying cloud skills

From containers to PaaS to IaaS, cloud skills still command a premium. Here are the 10 that pay the best.

competition business speed laptop sprint determin leader

Hitting the road? Leave your laptop at home

Here's how to work on the go without all the extra hardware.

intro biggest security startups 2018

The biggest security startup deals of 2018 (so far)

Recent VC investment in cybersecurity has tended to favor companies applying machine learning techniques to security problems. Here are some of the largest dealmakers that will be bringing you the next wave of security technology.

free data analytics tools opener

Best free data analytics tools, 2018

Data analytics software doesn’t have to cost a lot to be effective. These free tools can help businesses uncover new insights and draw valuable predictions from various data sources.

windows 10 surface laptop

Windows 10: The best tricks, tips, and tweaks

Windows 10 is chock-full of handy, hidden new features worth exploring, especially after the recent April 2018 Update. Check out the best tips and tricks here.

Computerworld > The Evolution of the iPad [cover]

The evolution of the iPad

With the release of the sixth-generation 9.7-inch iPad (2018), it’s a good time to take a look at the evolution of Apple’s game-changing tablet.

CSO: Have you met these hackers? [slide 01]

10 types of hackers and how they'll harm you

Understanding the different types of hackers, what motivates them, and the malware they use can help you identify the attacks you are most likely to face and how to properly defend yourself and your organization.

01 hot products at rsa 2018

Hottest cybersecurity products at RSA 2018

Here's a quick run-down of some of the new products announced at the conference, or shown there for the first time.

a team gathers around a table to work

10 spiffy new ways to show data with Excel

Here's how to splash your data in 10 clever ways that make it easy for people to understand what you are talking about.

5 servers that exist thanks to the Open Compute Project

The Open Compute Project shares specifications for servers designed to be cost effective, and here are five that are commercially available.

25 simple tools for mobile apps slide opener

25 simple tools for building mobile apps fast

Low-code and no-code development tools give business users and developers a fast track to mobile app success

01 dice 2018 tech salary report cover

How to get the top IT salary in 2018

We dug into the Dice 2018 Tech Salary Report to find the places, skills and industries that lead to the best information technology salary.

blackduck2018 01

The best open source rookies of 2018

Black Duck by Synopsys’s winners invest their efforts in everything from autonomous driving, scalable blockchain, and VNF orchestration to personal security and relationship management

CSO slideshow - Insider Security Breaches - Two-faced businessman removes his mask in a binary world

Insider threat examples: 7 insiders who breached security

You can build a wall, set up perimeter defenses, and spend massive resources maintaining it all. But if your enemy is within, that wall will do you no good.

SfB slide 0 skype for business

How to use Skype for Business

Hosting a meeting, showing a presentation or holding a Q&A with Skype for Business is easy; attending someone else's meeting is even easier. Here's how to do it.

Load More