Insider

Get exclusive access to premium articles, product guides, reviews, how-tos, and more from CIO, CSO, Computerworld, InfoWorld, ITworld, and Network World - the best enterprise tech publications in the business. Learn more!

trump thoughful
R programming

digital data surveillance eye

The future of biometrics and IoT

Many people are familiar with biometrics as a security measure at airports or police stations, where they often use a fingerprint as a form of identification, but there are many other uses outside of law enforcement.

ransomware data laptop

Ransomware 'customer support' chat reveals criminals' ruthlessness

Finnish security vendor F-Secure released 34 pages of transcripts from the group chat used by the crafters of the Spora ransomware family. The transcripts give a whole new meaning to tech support.

cleaning sponges detergent wash rinse chores

How to scrub your private data from 'people finder' sites

The internet has your number—among many other deets. Prevent identity theft and doxxing by erasing yourself from aggregator sites like Spokeo and PeekYou

apple ipad (public domain)

iPad smackdown: Microsoft Office vs. Apple iWork vs. Google G Suite

Your iPad can largely function like a laptop with two of the three main office productivity suites

Tesla Autopilot

Here's why self-driving cars may never really be self-driving

Even as self-driving car technology quickly evolves, technologists and lawmakers are still grappling with a big problem: In the event of an accident, who's to blame?

cloud providers battle

Battle of the clouds: Amazon Web Services vs. Microsoft Azure vs. Google Cloud Platform

With more and more workloads going to the cloud, and the top vendors being as competitive as they’ve been, deciding on which provider to go with isn’t getting any easier. This handy guide will outline the pros and cons of each...

innovation digital transformation ts

How to create IT innovation

Exclusive research from the CIO Executive Council shines a light on how IT leaders are defining and driving IT innovation. Register now to download the free report.

green light in madrid go proceed traffic

The best Go language IDEs and editors

Among dozens of options for developing Go programs, Gogland, Visual Studio Code, and Cloud9 rise to the top

Computer monitor with pixelated locks for security breach

7 Wi-Fi vulnerabilities beyond weak passwords

Using strong encryption and passwords is only the first step in protecting your wireless network. Make sure you’re not exposed in these other ways.

bug bounty

Why you need a bug bounty program

If you’re ready to deal with the volume of reports, a bug bounty program can help you can find the holes in your system — before attackers do.

3 bitcoin

Would killing Bitcoin end ransomware?

Bitcoin and ransomware seem to go hand-in-hand, but experts explain that doing away with the cybercurrency would just force cybercriminals to find another anonymous way to extort money.

windows 10 ui

Who needs Gmail? 5 built-in Windows 10 apps that do the job (with video)

These 5 built-in Windows apps -- Mail, Calendar, Maps, People and OneNote -- were once denounced as inadequate, but have grown into highly useful tools.

jan cover

State of the CIO 2017: More challenging, still complicated

The 16th annual State of the CIO report shows that the life of the dual-role CIO is both more challenging and more rewarding. Get used to the new reality.

connected nodes network

Understanding the attack surface to better allocate funds

How CISOs can be better informed and get ahead of attacks

snail rocket fast speed

Three technologies that could demolish slow internet

Broadband internet has opened up almost unlimited possibilities for commerce, distance learning, civic participation, and knowledge sharing. But we are only scratching the surface of what's to come.

stats big data stocks analytics

Data visualization tools: The features users love and hate

It seems like making sense of data is everyone’s job now. Here are the pros and cons of five leading data visualization tools, as reported by enterprise users of the products.

Self driving truck

Ride along to solve these data breaches

Verizon’s recently released annual breach report that examines some of its cases where the RISK Team was called in to hunt down culprits. The “ride –along edition” of Verizon’s report gets a first-person perspective of the company...

smartphone shocked group

The high price of security shaming [Infographic]

Two-thirds of IT security professionals said they would pay an average of $124,000 to avoid public scandals associated with security breaches.

Load More