Slideshows

primary hp
industrial iot 1

digital data surveillance eye

The future of biometrics and IoT

Many people are familiar with biometrics as a security measure at airports or police stations, where they often use a fingerprint as a form of identification, but there are many other uses outside of law enforcement.

cool cars 1

11 low-tech, decidedly cool cars

Ferrari, Mercedes, BMW, James Bond, Aston Marton

1 recovering days

Why DRaaS is a better defense against ransomware

Dean Nicolls, vice president of marketing at Infrascale, shares some tangible ways disaster recovery as a service (DRaaS) can pay big dividends and quickly restore systems in the wake of a ransomware attack.

1 oscar intro

And the Oscar goes to… Cybersecurity!

Imagine if the Oscars’ categories applied to cybersecurity.

0 shadow it intro

8 steps to regaining control over shadow IT

Learn how to discover those employees who went roaming for outside services.

Self driving truck

Ride along to solve these data breaches

Verizon’s recently released annual breach report that examines some of its cases where the RISK Team was called in to hunt down culprits. The “ride –along edition” of Verizon’s report gets a first-person perspective of the company...

long war 2

10 influential game mods that truly changed PC gaming

These legendary total conversion mods completely overhauled their games—and some changed all of PC gaming forever.

1 byod

7 ways MDM threatens employee privacy

To understand the extent to which MDM solutions could monitor and control BYOD devices, the Bitglass research team installed MDM software on several employees’ personal mobile devices with their permission. The outcome? Complete...

The far-out office of the future is (almost) here

Behold the awesome office of the future

From shape-shifting furniture to holographic displays, the workplace of the future promises more than just another day at the office

week in ios apps

The Week in iOS Apps: Help the FBI track down fugitives

This week's roundup includes a new app from the FBI, an update from Flipboard, and several cool new games.

phone gimmicks main

The 12 worst Android phone gimmicks once hailed as 'innovations'

These were heralded as impressive new gotta-have-it features. In hindsight, they're pretty useless.

01 worms

Heartbreaking hacks

Every year hackers take advantage of cupid’s sharp arrow to trip-up unsuspecting online users.

01 intro crowd conference

Hot products at RSA 2017

RSA, the world’s largest security conference, is underway this week in San Francisco with attendees from around the world gathering to hear the latest strategies for fighting cyberattacks.

01 network

How to lock down your security system

The most important, but least recognized, steps organizations must take to make their security systems more cyber secure.

1999: Y2K could be blamed for just about anything

CW@50: A look back at Y2K in cartoons

One of the biggest events we've covered in our first 50 years was IT's response to the infamous 'Year 2000 bug.' Here's a wry look at the hysteria from the pen of Computerworld's editorial cartoonist, John Klossner.

2 not sick

Your personal info might be as sick as you

Moshe Ben-Simon, co-founder and vice president of TrapX Security, runs through how hospitals can shore up your data so that cybercriminals can’t get at it.

cso50 intro

CSO50 2017: 50 forward-thinking security projects

The annual CSO50 conference in May will showcase cutting-edge technologies.

01 challenges

What cyberinsurance gotchas companies must be ready for

CipherLoc Vice President Mike Salas details six challenges companies will face as the insurance industry begins to expand its presence in the cybersecurity industry.

Load More