In this episode, host Steve Ragan talks with Phil Grimes, Professional Services Lead at RedLegg, about the challenges of educating customers — and building a partnership with them — to create successful red team engagements.
BlackBerry's latest smartphone has a full-featured physical keyboard – no surprise there – and is aimed at users who want to really want to get work done, says reviewer Dan Rosenbaum.
Improved customer relations, increased employee productivity, new revenue streams — big benefits await those who breathe new life into their business intelligence strategies.
In this episode, host Maryfran Johnson talks with Douglas Blackwell, senior vice president and CIO at Horizon Blue Cross Blue Shield of New Jersey, about digital transformation in the healthcare industry, including voice enablement and cutting-edge d...
Geared toward continuous improvement, the agile methodology can greatly increase your project’s prospects for success. Here is everything you need to know about agile project management, from certification to training to software and more.
In today’s Linux tip, we’re going to look at top – a favorite tool for examining performance on a Linux system. Want to pinpoint why your Linux system is running slowly? Top can shed a lot of light on that.
The organizations that make Computerworld's annual list go far beyond competitive salaries and healthcare benefits to woo, and then retain, employees. Here's what they're doing right.
The offerings run deep at Computerworld's 2018 Best Places to Work in IT. Comprehensive health insurance is just table stakes.
Host Steve Ragan is joined on the RSA 2018 show floor by Bryson Bort, CEO and founder of SCYTHE, to talk about the ICS Village, where attendees can learn how to better defend industrial equipment through hands-on access to the equipment.
Frank Gens, IDC’s senior vice president and chief analyst, presents the analyst firm's annual outlook for the next several years in IT, including the top 10 worldwide IT industry predictions and how they will impact every enterprise’s ability to ...
In this fifth episode of Do More with R, Sharon Machlis, director of Editorial Data & Analytics at IDG Communications, shows how code snippets work in RStudio—and how you can make your own
Six Sigma streamlines quality control in an effort to improve current processes, products or services. Here are the methodologies, roles and certifications central to this quality management methodology.
Host Steve Ragan reports from the RSA 2018 conference, talking with Liv Rowley, an intelligence analyst at Flashpoint, about Spanish cybercrime, an underground community that poses persistent security risks.
In this fourth episode of Do More with R, Sharon Machlis, director of Editorial Data & Analytics at IDG Communications, shows how to create dashboards in the R language with the flexdashboard package.
In this episode, host Maryfran Johnson talks with James Rinaldi, CIO at NASA's Jet Propulsion Lab, about opening up data silos and driving data transformation; having a seat at the table to lead change; and using technology to explore the universe.
Apple on Monday unveiled a variety of software updates, tweaks and features for the upcoming iOS 12, macOS 'Mojave,' watchOS 5 and tvOS. Here's a look at what's coming, what we liked and what we didn't.
From data scientists to data security pros, the battle for the best in IT talent will wage on next year. Here’s what to look for when you’re hiring for the 7 most in-demand jobs for 2018 — and how much you should offer based on experience.
Host Steve Ragan reports from RSA 2018 conference, talking with Wendy Nather, director, advisory CISOs at Duo Security, about how organizations can build a zero trust model, including consistently authenticating users.
In this episode of Do More with R, learn how to automate testing your R functions with Hadley Wickham’s testthat package.
With blockchain technology showing up in everything from global shipping to cloud storage and real estate transactions, it's no surprise that it's now seen as a way to help companies trade and sell carbon credits.
TSB customers in the U.K. were already frustrated by the bank's technical problems, but now the situation has gotten worse as criminals take advantage of the chaos. Host Steve Ragan looks at recent TSB phishing attacks and the kit that powers them.
The data scientist role varies depending on industry, but there are common skills, experience, education and training that will give you a leg up in starting your data science career.
Network virtualization pioneer Martin Casado explains the concept behind network virtualization, how the technology works and why it was created.
In this episode, host Maryfran Johnson talks with Cynthia Stoddard, SVP and CIO at Adobe. Their hour-long conversation covers a range of topics, including IT innovation and ROI, data strategy, automation, machine learning and AI, and the new IT ro...
Cutting back on your Android data use can make your phone bill plummet, and it's easy to do with a few key tweaks. Ready to start saving?
In this second episode of Do More with R, Sharon Machlis, director of Editorial Data & Analytics at IDG Communications, shows how dplyr's case_when() function helps avoid a lot of nested ifelse statements
Host Steve Ragan reports from the show floor at RSA 2018, where talks with Chris Roberts, chief security architect at Acalvio Technologies, about the benefits and misconceptions of deception technologies.
Brendan Eich, creator of the JavaScript programming language, explains how the language is used, and why it's still a favorite among programmers for its ease of use.
CSO's Michael Nadeau and Steve Ragan join Computerworld's Ken Mingis and IDG Communications' Mark Lewis to look at what the new EU privacy rules mean. They offer insights on how companies can prepare – and what happens if they don't.
Cryptocurrency such as Bitcoin has garnered most of the media coverage and hype to date, but keep your eye on blockchain – this new technology is poised to change IT in much the same way open-source software did a quarter century ago.
How can you tell the difference between a legitimate email and a phishing attack? Host Steve Ragan shows what an Apple phishing attack looks like, screen by screen, showing the difference between the real and the fake.
Reporting from RSA 2018, host Steve Ragan helps dispel the hype and confusion surrounding the dark web, as he talks with Alon Arvatz, co-founder at IntSights.
Host Steve Ragan reports from the show floor at RSA 2018, taking with Oliver Tavakoli, CTO at Vectra Networks, and author of the Thinking Security blog on CSOonline.com, about the types of IT security work that can be off-loaded to artificial intelli...
In this first episode of Do More with R, Sharon Machlis, director of Editorial Data & Analytics at IDG Communications, demonstrates how easy it is to use the R language to create an interactive scatter plot with multiple trendline choices
In this episode of CIO Leadership Live, host Maryfran Johnson talks with Jack Clare, CIO and chief strategy officer at Dunkin' Brands, about the company's mobile payment, ordering and loyalty apps, and how it's striving to improve customers' drive-th...
This year's RSA security conference focused on a variety of cybersecurity topics – everything from blockchain to the looming GDPR rules. CSO's Steve Ragan was there and offers insights on what he learned.
Host Steve Ragan reports from the RSA 2018 show floor, talking with Greg Reber, founder and CEO at AsTech Consulting, about the looming GDPR deadline and what IT security professionals should be getting done now.
Not getting any bites on your resume? You might be making one or more of these eight common resume mistakes.
From multi-cloud strategies to cost containment and container orchestration, CIOs are getting more pragmatic and prudent when taking advantage of the cloud’s economies of scale.
The all-screen design of Apple's iPhone X necessitated a 'notch' at the top of the display for various cameras and sensors. Now, Android phone makers are going with the same design. But why?
In this Q&A, host Maryfran Johnson talks one-on-one with Sanjay Shringarpure, CIO at E.& J. Gallo Winery, about the changing landscape of IT and innovation technologies in the agriculture industry, the challenges of recruiting talent, and more.
What are the current dangers in mobile technology and what are the strategies to keep yourself protected? Join host Steve Ragan from the show floor at RSA 2018, where he talks with Will LaSala, director of Security Solutions and security evangelist a...
Firewalls have become ubiquitous across the enterprise IT landscape because of their proven ability to stop bad traffic from entering corporate networks and protect a company’s most valuable assets. So how have firewalls evolved over the years and ...
Google's Android Oreo release is full of fresh flavor for your phone. But some of its most useful touches are all too easy to overlook. Whether you've had Oreo for months or are just now getting a taste, it's time to learn something new about what yo...
With the right set of apps, you can turn your Android phone into a collaboration hub — and then stay connected and productive -- wherever you might be.
Android's practically overflowing with options, and it's easy to lose track of some useful features along the way. Here are a few handy but hidden capabilities you probably forget to use.
In today’s Linux tip, we’re going to look at the mtr command and see what it can tell us about network connections. Mtr stands for “my traceroute” and displays the route that a connection to a particular system takes by providing a continuous...
In today’s tip, I’m going to show you how to terminate processes on Linux systems using kill, pkill and killall and show you why it makes a difference which command you choose.
In today’s Linux tip, we’re going to look at the adduser and deluser commands. As the names suggest, they are used to add and delete user accounts on Linux systems.
Google's Android OS sometimes gets unfairly maligned as being weak on security. Computerworld blogger JR Raphael explains why that's a misconception and how users can keep their devices safe.
Sponsored Links