CSO's collection of videos on topics ranging from cryptocurrency to data breaches to security leadership, as well as IT security-related videos from some of Foundry's most popular virtual summits,
Phil McKinney, president and CEO of CableLabs, Inc., offers up advice about the new set of skills required to be a successful leader.
Confused by the jumble of acronyms surrounding mobile device management? This video simply defines three key concepts: Mobile application management (MAM), enterprise mobility management (EMM) and unified endpoint management (UEM).
Some of the largest companies in the U.S. have been targets of hackers, including Yahoo, JP Morgan Chase and TJX. Watch as we detail the top 16 breaches and their overall impact on customers or employees.
Tom Soderstrom talks about the cutting-edge work happening at Jet Propulsion Lab in the evolving field of internet of things.
Bringing in multiple points of view is critical to business and IT success.
Technology leaders share their tips for hiring a diverse IT workforce.
Learn how organizations including Case Western Reserve University, Deakin University and Idaho National Lab are taking advantage of augmented reality and virtual reality technology to further their business goals.
From the Macintosh 128K, released in 1984, through today's iMac Pro, watch Apple's iconic computer change in form and function.
A graphical look at the technology behind software-defined networking.
Alex Kassirer, senior intelligence analyst at Flashpoint, and Jamesha Fisher, security operations engineer at GitHub, talk about how being part of a diverse IT team can help drive ideas and empower workers.
Cisco CEO Chuck Robbins on intent-based networking
Internet of tractors: how sensors and software improve farming accuracy
If you're a multi-core fan but could never afford it, think again. AMD's new Ryzen 5 and Ryzen 7 makes powerful multi-core CPUs within reach to all
In this far-ranging interview from 2001, "Father of the Internet" Vinton Cerf recalls having to "shove TCP down people's throats" and lobby for government permission to commercialize the 'Net.
Chief Digital Officer Ganesh Bell describes how GE Power followed the "digital exhaust" of its customers to capture $4 billion in new business. Exclusive 40-minute session.
Chief Digital Officer Ganesh Bell shares the three keys to a successful digital transformation and explains how GE Power turned "digital exhaust" to $4 billion in new business.
BlackBerry's new KEYone Android phone, complete with a real keyboard, could win back some of its enterprise customers.
Is it time to trade in your mobile device? If you're considering an Android smartphone, Samsung's Galaxy S8 seems to be the popular favorite but is it the right phone for you? Here, CIO.com senior writer Sarah White takes a more in-depth look at Samsung's newest offering.
Network World Cool Tools columnist Keith Shaw shows off four gadgets (two sleep trackers, two noise machines) that can help you get more or better sleep at night.
In the latest episode of Security Sessions, CSO Editor-in-Chief Joan Goodchild speaks via Skype with Michael A. Davis, the CTO of behavioral analytics company CounterTack. The two discuss why machine learning is so important to CSOs and CISOs, even if they themselves are not particularly investing in such technology for their own security systems.
Employees are often the weakest link in your company's security chain. But with a little knowledge and foresight you can mitigate the risks. In this video, CIO.com senior writer Sharon Florentine explains the anatomy of a phishing scam and how you and your workers can avoid becoming a victim.
CIO.com writer, Sarah White looks at 6 portable keyboards for IT pros that want a light easy-to-use keyboard that can go anywhere.
The Galaxy S8+ is Samsung's first major phone release since the Note7 debacle, but does it live up to the hype?
With the market of fitness wearables growing fast, CIO.com contributor Jim Martin looks at the Fitbit Alta HR to see where this device fits.
In the latest episode of Security Sessions, CSO Editor-in-Chief Joan Goodchild sits down with Sanjay Raja from Lumeta, a network and performance monitoring company. The two discuss how CSOs and CISOs can get a handle on the explosion of new devices entering the network and how to make sure those devices are secured.
In this animation, Network World explains some of the concepts of serverless computing, and how it represents the next phase of cloud computing for Internet of Things applications and products.
Follow the beeps to find your missing AirPods.
The BeatsX are more comfortable than the AirPods, and last longer...but do they look as cool?
CSO Online's Steve Ragan and Joan Goodchild chat about the hot security news of the week, including their take on the recent WikiLeaks revelations around the CIA, and how Cisco, Samsung and Apple have responded to the information.
By the time Computerworld was born in 1967, IBM was well established as the kingpin for computer storage. But over the next five decades, that changed dramatically as new companies rose and fell, storage capacities soared and costs plummeted.
In the latest episode of Security Sessions, CSO Editor-in-Chief Joan Goodchild sits down with Jeff Fagnan from Accomplice, a venture capital and private equity firm in Cambridge, Mass. The two discuss the current state of VC funding in security companies and where the money is going (and not going), and why CSOs should "follow the money."
Network World editors Keith Shaw and Brandon Butler compete against each other to see who can recite more digits of Pi in honor of Pi Day. Which editor wins and gets to put a pie in the face of the loser?
CSO’s Fahmida Rashid and Zscaler's Senior Director of Security Research, Deepen Desai, take a deep dive into the recent rise of malware using SSL/TLS to encrypt their activities.
CIO.com senior writer Sarah White demonstrates what it takes to get your mobile hotspot access working so you can hit the open road.
On the road and need to connect for work? No worries, because CIO.com senior writer Sarah White, has you covered. In this video she demonstrates what it takes to turn your 4G enabled Android device into a a mobile wireless hotspot.
To celebrate the 2017 Pi Day, Network World editors Brandon Butler and Keith Shaw are preparing for the Network World Pi Day Challenge. Who can recite more digits of Pi? The winner gets to put a pie into the face of the loser. Streaming live on Facebook and YouTube at 2 pm ET on March 14, 2017.
Every year on March 14, math geeks and others celebrate Pi Day. Here are the basics of the beginnings of the celebration and other interesting facts around this new holiday.
Computerworld's Premier 100 tech leaders share pointers on how to sell digital transformation within IT and across the organization (hint: say goodbye to hierarchies).
CIO.com senior writer, Sarah White digs into recent research to look at the impact employee engagement has on your business and the economy as a whole.
Venerable smartphone brands Motorola, Nokia and BlackBerry got new life at Mobile World Congress 2017, largely due to the influence of Chinese and Finnish manufacturers that licensed the names.
Matt Gangwer, CTO of Rook Security and Ryan O'Leary, VP of Threat Research Center and Tech Support at WhiteHat Security join CSO Online's Steve Ragan to talk about the evolution of ransomware, and what companies need to do to combat it.
Porsche Design's Book One turns a laptop into an expression of beauty, money, and power.
CIO contributor Jim Martin tries out three of the easier to use fitness trackers for those who want something that doesn't require a steep learning curve.
At RSA 2017, security expert Konstantin Karagiannis (CTO at BT North America) gives Network World an overview of blockchain security and how it could help shape the future of cybersecurity.
Does Dell's XPS 13 2-in-1 have what it takes to get you through you a full day of demanding work, streaming video and social media posting? CIO.com senior writer Sarah White runs Dell's newest hybrid through the paces to find out the answer.
Tech leaders face mounting uncertainties in cybersecurity and Generative AI. This panel session offers vital insights for tech leaders to protect their organizational data. Drawing upon real-world experiences and industry expertise, our panelists will underscore the imperative for adaptability and proactivity in the face of dynamic threats. With tech and cyber talent shortages exacerbating vulnerabilities, the stakes have never been higher. Panelists will discuss warning signs, stressing adaptability and proactivity against evolving threats. Join us for actionable guidance on cybersecurity infrastructure and resilience in a digital era.
After infecting a system with Locky Ransomware, CSO attempted to recover it using basic tools and backups
The ongoing saga between the LockBit ransomware gang and law enforcement officials feels like a made-for-TV movie with back-and-forth ‘trolling’, while at the same time the FBI provides warnings about ransomware aimed at hospitals. Paul Desmond joins the crew for another week of guest co-hosting on the show, where they also talk about ongoing AI mishaps from Microsoft and Google, as well as whether they’ll ever wear a smartphone bracelet (no) or use a transparent laptop screen (possibly).
If you're hunting for compact laptop with solid performance, HP’s revamp of its excellent convertible is a great option.
The AirPods sound great, work well, and stay put—we put them to the headbanging test.