Insider

Get exclusive access to premium articles, product guides, reviews, how-tos, and more from CIO, CSO, Computerworld, InfoWorld, ITworld, and Network World - the best enterprise tech publications in the business. Learn more!

R programming
apple ipad (public domain)

Computer monitor with pixelated locks for security breach

7 Wi-Fi vulnerabilities beyond weak passwords

Using strong encryption and passwords is only the first step in protecting your wireless network. Make sure you’re not exposed in these other ways

bug bounty

Why you need a bug bounty program

If you’re ready to deal with the volume of reports, a bug bounty program can help you can find the holes in your system — before attackers do

green light in madrid go proceed traffic

The best Go language IDEs and editors

Among dozens of options for developing Go programs, Gogland, Visual Studio Code, and Cloud9 rise to the top

snail rocket fast speed

Three technologies that could demolish slow internet

New last-mile solutions could bring fast broadband to millions around the world

3 bitcoin

Would killing Bitcoin end ransomware?

Bitcoin and ransomware seem to go hand-in-hand, but experts say that doing away with the cybercurrency would just force cybercriminals to find another anonymous way to extort money

ransomware data laptop

Tips for negotiating with cyber extortionists

Whether you are opposed to it or not, enterprises need to have a plan for negotiating with people who take their data hostage

H-1B visa man entering U.S. with briefcase

Should security pros get special H-1B visa consideration?

Only 0.3 percent of H-1B visas were issued to information security analysts

paper documents files

3 enterprise-strength file sync services to check out

Popular file-sync services are great for individuals, but can lack controls for access, encryption and other services that enterprises require

wrestling wrestlers competition match fight

Smackdown: Office 365 vs. G Suite productivity

Can you really use Google’s G Suite instead of Microsoft Office? Here's how they compare on Windows, MacOS, iOS, Android, and Chrome OS

Processor - Pixabay

Smartphone CPUs put desktops to shame

The latest smartphones sport multicore processors of dizzying complexity

gary hayslip san diego 1

How San Diego fights off 500,000 cyberattacks a day

What it takes to protect San Diego’s complex network of smart city and legacy technology

paper boat riding the crest and at risk [Computerworld, Jan-Feb 2017 - Helming IT]

10 tips for helming IT through ups and downs

Impending mergers, ultrafast growth and sharp dips all put pressure on IT leaders to make quick decisions about tech plans and priorities. Here’s how to make IT shine during times of change

professional development intro

10 ways tech pros can take charge of their professional development

With technology constantly changing, so must your job skills

Computerworld, January-February 2017 - Does your data discriminate?

How to root out bias in your data

Analytics is a top priority for savvy CIOs. But if implicit biases are hiding within your most trusted data sets, your algorithms could be leading you to make bad decisions

Network servers datacenter

Review: Microsoft's Nano Server offers mega advantages

Microsoft’s stripped-down Windows Server 2016 deployment option reduces the ops burden, but supports only a limited number of server roles

Virtual assistant voice apps

3 ways AI assistants improve enterprise productivity

Siri and Alexa are fun to use, but some specialized AI assistants offer real workplace productivity gains

buyers remorse cloud computing

How to prevent a bad case of cloud buyer’s remorse

Nearly 40% of organizations with public cloud experience have moved at least some of those workloads back to on premises, mostly due to security and cost concerns

kaboom election hacking

Hacking the 2016 election: A timeline

Russian interference in the 2016 U.S. election played out in a series of hacks taking place over several months. Here’s how the attacks unfolded.

Load More