Insider

Get exclusive access to premium articles, product guides, reviews, how-tos, and more from CIO, CSO, Computerworld, InfoWorld, ITworld, and Network World - the best enterprise tech publications in the business. Learn more!

07 insider
eliminate insider threats 1

primary hp

The top 8 new open source projects

From blockchain to SDN to container management, these rookies made big waves in open source

Making the switch to functional programming with F#

Get started with functional programming and F#

Working with functional programming requires a shift in your thinking, but has benefits in productivity for programmer and maintainer alike

rsa

Oldies but goodies make presence felt amid glitzy startups at RSAC

Three of the original anti-virus vendors – Symantec, McAfee and Trend Micro – were out in full force at the show as well, scoffing at the unproven point products of the startups and touting their own reorganizations, renewed focus and...

sha

Replace SHA-1. It’s not that hard.

Now that SHA-1 has been broken it’s time for enterprises that have ignored its potential weakness for years to finally act, and it’s not that hard.

trump thoughful

Trump expected to cut federal IT spending

President Donald Trump said this week that the federal budget is a "mess" and is promising to make it leaner. This means that federal IT spending -- now at $81.6 billion -- is likely to see cuts, analysts said.

R programming

Create your own Slack bots -- and web APIs -- in R

Make your own API and connect it to a Slack custom slash command -- all in R. This step-by-step tutorial will show you how to find a current stock price, but the basic framework can be used for all sorts of data.

digital data surveillance eye

The future of biometrics and IoT

Many people are familiar with biometrics as a security measure at airports or police stations, where they often use a fingerprint as a form of identification, but there are many other uses outside of law enforcement.

ransomware data laptop

Ransomware 'customer support' chat reveals criminals' ruthlessness

Finnish security vendor F-Secure released 34 pages of transcripts from the group chat used by the crafters of the Spora ransomware family. The transcripts give a whole new meaning to tech support.

cleaning sponges detergent wash rinse chores

How to scrub your private data from 'people finder' sites

The internet has your number—among many other deets. Prevent identity theft and doxxing by erasing yourself from aggregator sites like Spokeo and PeekYou

apple ipad (public domain)

iPad smackdown: Microsoft Office vs. Apple iWork vs. Google G Suite

Your iPad can largely function like a laptop with two of the three main office productivity suites

Tesla Autopilot

Here's why self-driving cars may never really be self-driving

Even as self-driving car technology quickly evolves, technologists and lawmakers are still grappling with a big problem: In the event of an accident, who's to blame?

cloud providers battle

Battle of the clouds: Amazon Web Services vs. Microsoft Azure vs. Google Cloud Platform

With more and more workloads going to the cloud, and the top vendors being as competitive as they’ve been, deciding on which provider to go with isn’t getting any easier. This handy guide will outline the pros and cons of each...

innovation digital transformation ts

How to create IT innovation

Exclusive research from the CIO Executive Council shines a light on how IT leaders are defining and driving IT innovation. Register now to download the free report.

green light in madrid go proceed traffic

The best Go language IDEs and editors

Among dozens of options for developing Go programs, Gogland, Visual Studio Code, and Cloud9 rise to the top

Computer monitor with pixelated locks for security breach

7 Wi-Fi vulnerabilities beyond weak passwords

Using strong encryption and passwords is only the first step in protecting your wireless network. Make sure you’re not exposed in these other ways.

bug bounty

Why you need a bug bounty program

If you’re ready to deal with the volume of reports, a bug bounty program can help you can find the holes in your system — before attackers do.

3 bitcoin

Would killing Bitcoin end ransomware?

Bitcoin and ransomware seem to go hand-in-hand, but experts explain that doing away with the cybercurrency would just force cybercriminals to find another anonymous way to extort money.

windows 10 ui

Who needs Gmail? 5 built-in Windows 10 apps that do the job (with video)

These 5 built-in Windows apps -- Mail, Calendar, Maps, People and OneNote -- were once denounced as inadequate, but have grown into highly useful tools.

Load More