CSO's collection of videos on topics ranging from cryptocurrency to data breaches to security leadership, as well as IT security-related videos from some of Foundry's most popular virtual summits,
Shodan, a search engine for all ports within the internet, can help enterprises identify and lock down security vulnerabilities. Senior writer J.M. Porup and content producer Juliet Beauchamp talk through the security scenarios.
Host Martha Heller discusses the challenges and opportunities in organizing the enterprise for digital transformation with her guests Dave Castellani, SVP, Business Information Officer at New York Life Insurance, and Kim Snipes, CIO at USAA.
The Industrial Internet of Things, or IIoT, is the application of instrumentation and connected sensors and other devices to machinery and vehicles. What that means in practice varies widely. Watch this 2-minute video to get up to speed fast.
This 3-minute video explains how to use continuous integration and continuous development to deliver apps faster and with higher quality
The ability to charge hardware over distances of several meters has always seemed to be something of a pipe dream. But Wi-Charge says the technology works – and actual product shipments could begin early in 2019.
In the IT world, virtualization has revolutionized the way we think about data and where it lives, moving us closer to a completely on-demand data world.
Here are the top five languages for creating AI-enabled apps, according to InfoWorld contributor and deep learning architect Ian Pointer.
The offerings run deep at Computerworld's 2018 Best Places to Work in IT. Comprehensive health insurance is just table stakes.
Frank Gens, IDC’s senior vice president and chief analyst, presents the analyst firm's annual outlook for the next several years in IT, including the top 10 worldwide IT industry predictions and how they will impact every enterprise’s ability to grow and compete. The predictions track one of the biggest IT stories of our time: the digital transformation of modern enterprises and the application of IT to multiply innovation in the new economy.
Network virtualization pioneer Martin Casado explains the concept behind network virtualization, how the technology works and why it was created.
Brendan Eich, creator of the JavaScript programming language, explains how the language is used, and why it's still a favorite among programmers for its ease of use.
Cryptocurrency such as Bitcoin has garnered most of the media coverage and hype to date, but keep your eye on blockchain – this new technology is poised to change IT in much the same way open-source software did a quarter century ago.
Firewalls have become ubiquitous across the enterprise IT landscape because of their proven ability to stop bad traffic from entering corporate networks and protect a company’s most valuable assets. So how have firewalls evolved over the years and what are the latest trends in firewall security?
In this 60-second video, learn how the cloud-native approach is changing the way enterprises structure their technologies, from Craig McLuckie, founder and CEO of Heptio, and one of the inventors of open-source system Kubernetes
In this explainer video, learn several techniques that can improve your Node development experience.
In this 90-second video, learn about Kubernetes, the open-source system for automating containerized applications, from one of the technology's inventors, Joe Beda, founder and CTO at Heptio.
Word is the workhorse of the Microsoft Office 2016 suite, but lots of people don’t know some of its more useful features. Here are three of the best tips.
Microsoft Excel can be tough to use. But you don’t need to be a spreadsheet jockey to get the most out of Excel 2016. Just follow these three tips, which work in Excel 2019 as well.
Everyone seems to be talking about agile software development, but many organizations don't have a firm grasp on how the process works. Watch this 5-minute video to get up to speed fast.
Narrowband IoT is the major wireless carriers' play to capture a significant chunk of the burgeoning enterprise IoT marketplace, even if the standard isn't quite ready for prime time yet. Here's a look at the technology that's coming to a base station near you.
Better understand the evolving role of the CIO in today’s business climate and the 2018 CIO agenda in this video discussion, hosted by Adam Dennison, SVP/General Manager, IDG Events/CEC & Publisher. Ron Guerrier, CIO at Farmers Insurance Group of Companies, and Kristie Grinnell, CIO & VP Information Technology & Supply Chain, General Dynamics Information Technology, share their thoughts on budgetary responsibilities, business and leadership challenges, and the key skills needed for the job today.
Concerned about your network defense? Watch this short video to learn the 7 stages of the cyber kill chain, a framework created by Lockheed Martin to outline the phases of a targeted cyberattack.
Get your desktop at your fingertips with these easy, step-by-step instructions for setting up Google's Chrome Remote Desktop.
Watch this instructional video to understand how a scrum master can help a team learn agile development and follow a scrum process to develop new applications
Learn about the latest networking technology, SD-WAN, which uses policy-based rules to orchestrate applications routing in the cloud. Jerry Kennelly, CEO of Riverbed, describes the functionality and benefits.
Get up to speed quickly on newcomer Rust, designed to create fast, system-level software. This two-minute animated explainer shows how Rust bypasses the vexing programming issues of memory and management.
The Robo R2 3D printer, at a starting price of $1,500, combines a few excellent features with a fairly long list of downsides.
Get up to speed quickly on the potential use cases for blockchain technology, in industries such as healthcare, with Esmond Kane, deputy CISO at Partners Healthcare.
From Conficker to Zeus, these four malware threats continue to impact enterprises today. Watch this short video to learn where they're still lurking.
Look ahead to Europe's rollout of the the General Data Protection Regulation in May 2018, and its expected impact on data handling, with expert insights from Gary Southwell, vice president and general manager, products division, at CSPI.
In this exclusive webcast video, IDG executives outline some insider tips for winning prestigious awards for IT innovation, security or digital leadership.
The networking industry's hottest new buzzword -- intent-based networking -- is the next evolution of network software management. Get up to speed fast with this visual explainer.
Get a look at how the key features of Samsung's Galaxy S smartphone have evolved from its debut in 2010 to today's Galaxy S8 and S8+.
Reporters Fahmida Rashid and Steve Ragan talk about antivirus vendor Kaspersky Lab, a Russian-based company that various U.S. agencies have flagged as untrustworthy. Should you use it?
Reporters Fahmida Rashid and Steve Ragan talk about hacks of Sony and more recently, HBO, and what lessons enterprises can learn from the entertainment industry's mistakes.
Reporters Steve Ragan and Fahmida Rashid discuss the implications of the U.S. Cyber Command's recent elevation in status, putting it on the same level as the military’s other functional combatant commands.
Reporters Fahmida Rashid and Steve Ragan talk about the latest ransomware threats, the holes in IT security and the burdens on enterprises.
See what puts the top 10 heavyweights in the enterprise networking space at the very top of their market.
Heading out on a trip? Check out these tips for keeping your data safe when you travel with a Mac.
Perfect for IT, Python simplifies many kinds of work, from system automation to working in cutting-edge fields like machine learning
VMware CEO Pat Gelsinger talks about the company's recent cloud announcements, as well as future global availability.
VMware CEO Pat Gelsinger talks about open source and container technology.
VMware CEO Pat Gelsinger talks with IDG Enterprise Editor-in-Chief Eric Knorr about the company's strategy, future initiatives and new partnerships.
VMware CEO Pat Gelsinger talks about distributed encryption between virtual machines and the concept of app defense.
VMware CEO Pat Gelsinger talks about edge computing, including a consistent and secure management strategy.
While 3D printing was little more than a toy for engineers 20 years ago, today Ford Motor Co. could not develop new cars without it. New technologies ensure it's coming to a production line near you.
Meir Machlin of Trust Digital demonstrates how to hack a smartphone using SMS.
In the second of two parts, Meir Machlin of Trust Digital continues his demonstration of a smartphone hack. In this demonstration, Machlin turns of security settings remotely and wipes the device.
An inside look at the Cisco Nexus 9516 data center core switch.
Some criminals on the dark web are taking their cues from the practices of corporate IT. Illicit offerings run the gamut from code that buyers have to implement themselves to turnkey solutions and consulting services.