Use these basic settings to make it harder for attackers to Windows hardware.
Today's episode delves into Amazon's revenue, Facebook and Apple's dispute, and more.
J.M. Porup, senior writer at CSO online, joins Juliet on this week's episode of TECH(talk) to discuss trends in ransomware, IoT security and enterprise cybersecurity roles.
In this tip, we look at the pstree command. It allows you to get a listing of running processes that clearly indicates the relationship between them.
Today's episode features more on Apple’s first-quarter report, news that Google and the Internet Advertising Bureau are profiling users, collaboration software spending, and more problems for Huawei.
Configure Office 365 to detect email-delivered malware.
Today's episode explores blockchain payments, smartphone sales and Google's fine from the European Union.
The year started off with a bang for several companies that make collaboration software. Here's what's been going on with Microsoft Teams, G Suite and others since the start of 2019.
Guest host Juliet Beauchamp and CSO senior writer J.M. Porup talk about the challenges around securing the systems and networks used to control industrial plants and infrastructures.
This RStudio Addins tutorial shows step by step how to create an addin for the RStudio IDE
Following the Center for Internet Security’s benchmarks and checklists, here’s how to configure Microsoft Office 365 for the security level you need.
Google's foray into cellular networking lets it deliver wireless access that can undercut rivals like AT&T and Verizon. Here's an explainer on what Google Fi is and does.
See how well you’re achieving daily goals with a color-coded calendar made in R
When some new iPad owners found their devices were bent, Apple acknowledged the issue and said, in essence, 'no problem.' Then the company announced revenues would fall short of expectations. What the heck is going on?
Make sure Microsoft Office 365 logging and auditing is set up properly so forensic data is available when needed.
Guest host Juliet Beauchamp talks with senior writer J.M. Porup about the newly created cybersecurity insurance industry, and how a policy could fit into an organization's overall security strategy to help minimize risk.
In 2018, blockchain boosters touted the distributed ledger technology as a game-changer. Maybe so, but not yet. Here's how it evolved last year and where it's going in 2019.
Find security scripts, compliance and other Windows resources.
Set data loss prevention policies in Windows 10 to prevent data leakage.
Set Office 365 Advanced Threat Protection policies to block known malicious URL addresses.
Discover an easy way to use key-value pairs in R
Follow these steps to enable multi-factor authentication in Office 365 for more secure log-ins.
Set up Office 365 to defend against hackers who use hidden Outlook rules to forward emails.
In this episode, host Maryfran Johnson talks with Elizabeth Hackenson, CIO at Schneider Electric, about talent acquisition, Schneider Electric's new capabilities on mobile devices, and the value of having a "healthy paranoia" about potential industry...
Allow devices to share and distribute updates across a network without having to rely on Windows Software Update Services.
Learn an easy method to use key-value pairs in R
Learn how to create a script that will install security and other feature updates at a specific time
IDC analyst Joe Pucciarelli shares insights on the most relevant global trends and key predictions impacting CIOs, IT professionals and their organizations.
In this episode, host Maryfran Johnson talks with Vince Kellen, CIO, University of California at San Diego, about data science, cloud computing and the future of the online learning space.
Windows 10 update settings are varied and at times confusing. Here is an exact list of the settings that control when updates will automatically run.
In this tip, we look at commands that identify the version of Linux in use on a Linux system – the lsb_release and uname commands.
In this Linux tip, we look at the shred command, which removes a file from a disk in a manner that is far more thorough than the rm (remove) command.
Learn how to store credentials in an encrypted, secure keyring within R
Here’s how to tell what patches and security improvement are in Windows 10 updates before you install them.
How to forecast the future with accuracy and confidence.
Learn how to add sparklines to HTML tables in R with the DT and sparkline packages
In just a few days, Apple's eagerly-awaited iPhone XR finally arrived and the company rolled out new tablets, laptops and even a Mac mini. Here's what matters.
In this episode, host Maryfran Johnson talks with Bask Iyer, CIO and EVP at VMware, and general manager of Edge Computing/IOT for Dell Technologies, about digital transformation, edge computing, talent engagement and more.
See how to create an interactive HTML table with one line of code. Plus, plenty of customizations
Shodan, a search engine for all ports within the internet, can help enterprises identify and lock down security vulnerabilities. Senior writer J.M. Porup and content producer Juliet Beauchamp talk through the security scenarios.
The Pixel 3 (and the larger Pixel 3 XL) arrive this week, and after a few days of hands-on time with the new device, Computerworld's Dan Rosenbaum has some thoughts. He joins Executive Editor Ken Mingis and IDGE video producer Chris Hebert to discuss...
In this episode, host Maryfran Johnson talks with Sreelakshmi Kolli, CIO of Align Technology, about how the orthodontics provider is attracting top IT talent and using emerging technologies such as blockchain and 3D printing to expand its market.
Host Martha Heller discusses the challenges and opportunities in organizing the enterprise for digital transformation with her guests Dave Castellani, SVP, Business Information Officer at New York Life Insurance, and Kim Snipes, CIO at USAA.
See how the new graphical user interface for ggplot2 works, thanks to the esquisse R package
Steve Ragan and J.M. Porup catch up post-DerbyCon conference to discuss psychological issues in the infosec community, supply chain security and whether it's time to make China the boogeyman again, as well as Google's recent data breach.
Security expert and author Bruce Schneier talks with senior writer J.M. Porup about that widespread use of connected chips -- allowing hackers to access cars, refrigerators, toys and soon, even more home consumer items.
With the midterm elections looming, electronic voting machines are getting increased scrutiny. J.M. Porup, senior writer at CSO, sits in the hosts chair this episode, breaking down the security risk with content producer Juliet Beauchamp.
Facebook and Google recently acknowledged data breaches affecting millions of users. This won't be the last time that happens. CSO's J.M. Porup and Computerworld's Ken Mingis examine what's really going.
Loren Jarrett, CMO of Progress, has assembled a team of “doers” to help create the “best-next” experience for customers. In a conversation with Rob O’Regan, global content director with IDG Communications, Loren details how her team is usin...
Given the changes in how work gets done these days – in remote offices, by workers on the go, at global companies with employees scattered around the world – collaboration is more important than ever. Here's a look at where things stand, and what...
Sponsored Links