Marketing technology has changed the way marketers identify and interact with their customers and prospects. Using intent data, top marketers are using predictive technologies to spotlight their best prospects, identify the next logical step in the p...
Executives at cloud services vendor Akamai -- David Lewis, global security advocate; Andy Ellis, CSO; and Charlie Gero, CTO -- talk with host Steve Ragan about the evolving role of security in the enterprise.
One of the biggest topics in IT right now involves blockchain, the distributed ledger tech that underpins Bitcoin and cryptocurrency. Here's a look at what it is, what it does, and how companies are already using it.
Concerned about your network defense? Watch this short video to learn the 7 stages of the cyber kill chain, a framework created by Lockheed Martin to outline the phases of a targeted cyberattack.
In this episode, host Maryfran Johnson and Ron Guerrier, CIO at Farmers Insurance, discuss building an IT innovation ecosystem, and the impact of next-generation technologies on the insurance industry.
Salted Hash looks at recent Office 365 phishing examples, discussing why they work and what can be done about them.
A few simple swipes, and you're on your way to accessing the files and folders on your Android phone from your PC or Apple computer. JR Raphael walks you through these easy steps.
Our tech panel looks at how Uber (secretly) handled last year's hack and the controversy around Google's decision to track Android users' locations. Then it's time to discuss why AWS is selling off hardware in China and what Mozilla is up to with its...
Get your desktop at your fingertips with these easy, step-by-step instructions for setting up Google's Chrome Remote Desktop.
A solid backup policy and frequent awareness training can reduce the risk of ransomware, but unintentional breaches by insiders are still a worry for administrators. Watch as Steve Ragan and Michael Nadeau talk security strategy.
Alexa is the helpful voice in the Echo and Echo Dot that comes with a wide range of skills already available. But with a little coding, it can be made to do much more. IDG's Sharon Machlis explains.
The Matrix Banker malware, first found in Latin America, is now gaining a foothold in diversified targets. Steve Ragan breaks down the threat with Justin Fier, director for cyber intelligence and analysis at Darktrace.
Watch this instructional video to understand how a scrum master can help a team learn agile development and follow a scrum process to develop new applications
Would you give up a customer's data or credentials if that was the demand in a ransomware attack? That's just one of the nightmare scenarios that Steve Ragan and Rick McElroy talk about on this week's episode.
Apple's expensive new iPhone X has a lot going for it: Face ID security, an OLED display and, of course, iOS 11 – making it a top-notch option for enterprise users. But is it worth $1,149?
Learn about the latest networking technology, SD-WAN, which uses policy-based rules to orchestrate applications routing in the cloud. Jerry Kennelly, CEO of Riverbed, describes the functionality and benefits.
In this lively hourlong discussion, Maryfran Johnson, executive director of CIO programs for CIO Events and the CIO Executive Council, talks with Bernie Gracy, Chief Digital Officer of Agero, the largest provider of roadside assistance services to ca...
Whether it's from the loss of privacy from Alexa or Google Home, fake news on social media or A.I., the future could be a tech dystopia. Our tech panel looks at where we are, where we're going, what what keeps us up at night.
Get up to speed quickly on newcomer Rust, designed to create fast, system-level software. This two-minute animated explainer shows how Rust bypasses the vexing programming issues of memory and management.
Computerworld Windows expert Preston Gralla walks you through the steps needed to easily repair a corrupted hard disk using the command line or PowerShell.
If you don't yet have the latest version of Windows 10, you eventually will. Computerworld's Windows expert, Preston Gralla, details what to look for – and look out for – in the Fall Creators Update.
The Robo R2 3D printer, at a starting price of $1,500, combines a few excellent features with a fairly long list of downsides.
Get up to speed quickly on the potential use cases for blockchain technology, in industries such as healthcare, with Esmond Kane, deputy CISO at Partners Healthcare.
From Conficker to Zeus, these four malware threats continue to impact enterprises today. Watch this short video to learn where they're still lurking.
Google's new Pixel 2 smartphone is out and our reviewer, Dan Rosenbaum, has the details on what it's like to use – and whether it might tempt an iPhone user to switch.
Look ahead to Europe's rollout of the the General Data Protection Regulation in May 2018, and its expected impact on data handling, with expert insights from Gary Southwell, vice president and general manager, products division, at CSPI.
The networking industry's hottest new buzzword -- intent-based networking -- is the next evolution of network software management. Get up to speed fast with this visual explainer.
With the Equifax breach still making waves, the new Apple Watch now on wrists and A.I. seemingly everywhere, our panel digs into what's happening in the IT world.
Put your old Android device to work -- as a universal smart remote or remote camera, for example -- with these easy step-by-step instructions from Computerworld blogger JR Raphael.
Don't have an Android device? With the right set of apps, you can get Oreo-like features on just about any device with this step-by-step advice from Computerworld blogger JR Raphael.
Speed up your interactions with your Android phone using these easy slides and swipes, courtesy of Computerworld blogger and Android expert JR Raphael. (Tips in this video apply to devices with Android 8.0 Oreo or earlier.)
From notifications to picture-in-picture mode, walk step by step through the new features of Android's latest update with Computerworld blogger and Android expert JR Raphael.
Android blogger JR Raphael and Apple expert Michael deAgonia get ... animated, shall we say ... as they tackle the basics of which mobile OS is better when it comes to security, updates, app stores, customization and innovation. Can there really be o...
Android blogger JR Raphael gives us a rundown on the cool and useful new features in Android 8.0, better known as Oreo.
Apple on Tuesday unveiled its long-awaited smartphone line-up, with the new iPhone 8 and 8 Plus available later this month. But the flagship iPhone X – the one techies will really want – won't arrive until November.
Get a look at how the key features of Samsung's Galaxy S smartphone have evolved from its debut in 2010 to today's Galaxy S8 and S8+.
Reporters Fahmida Rashid and Steve Ragan talk about the latest ransomware threats, the holes in IT security and the burdens on enterprises.
Reporters Steve Ragan and Fahmida Rashid discuss the implications of the U.S. Cyber Command's recent elevation in status, putting it on the same level as the military’s other functional combatant commands.
Reporters Steve Ragan and Fahmida Rashid unpack the hottest topics in the security realm: Kaspersky Lab's Russia connection, the new status for the U.S. Cyber Command, Hollywood's hacking woes and ransomware.
Reporters Fahmida Rashid and Steve Ragan talk about hacks of Sony and more recently, HBO, and what lessons enterprises can learn from the entertainment industry's mistakes.
Reporters Fahmida Rashid and Steve Ragan talk about antivirus vendor Kaspersky Lab, a Russian-based company that various U.S. agencies have flagged as untrustworthy. Should you use it?
Our panel looks at whether smartwatch makers blew it by not focusing on the enterprise, why intent-based networking is the next big thing, whether GPS spoofing is real, and how high is too high when it comes to iPhone prices.
The panelists talk about their pricing predictions for the newest iPhone. Will this be the Apple device that gives consumers sticker shock?
The panelists break down Cisco's intent-based networking strategy, which brings machine learning to the networking realm. Plus, they hash out the ramifications for the security industry.
The panelists talk about GPS spoofing, and rumors about hacking as a factor in recent ship collisions. Plus, they sort out the difference between GPS spoofing and GPS jamming.
Ahead of the latest Apple smartwatch rollout, the panelists debate whether vendors made a mistake introducing smartwatches to consumers first, rather than pursuing the enterprise market.
See what puts the top 10 heavyweights in the enterprise networking space at the very top of their market.
Heading out on a trip? Check out these tips for keeping your data safe when you travel with a Mac.
Travelers carrying confidential or privileged corporate information need to take steps ahead of time to ensure that private data stays private. Watch this video for 6 quick tips.
The collaboration tool offers forward-thinking ways of sharing information, but never gained traction. Although it's being shuttered, some of those features met yet show up in other Microsoft products.
Sponsored Links