Everything related to Computer Security - Security Audits, Security Vulnerabilities, Intrusion Detection, Incident Handling, Forensics and Investigation, Information Security Policies, and a whole lot more.
Search This Blog
Thursday, July 23, 2015
Hacker: 'Hundreds of thousands' of vehicles are at risk of attack
View this on-demand webcast to learn how the proliferation of data from multiple sources is opening opportunities across other domains for it to extend its expertise and influence - to the benefit of the business. Learn More
For iPhone users who took the plunge into the iOS 9 beta program and have now decided they prefer the more stable iOS 8, there's good news. You can roll back your iPhone's operating system. Here's how. READ MORE
Need something to watch on a flight? You can download an episode of your favorite show in less than a minute and a half on Verizon Wireless at Atlanta's airport or spend 13 hours doing the same over T-Mobile USA at Los Angeles International. READ MORE
How do you know what the right storage set up is for you? How do you ensure that you're using best practices when implementing? Download now and learn how to select and size the best storage array for your VMWare deployment to maximize your VM density and increase ROI. Learn More
Silver Peak made its name as a top provider of wide-area network optimization capabilities. But the company has its sights set on a loftier goal today: Completely changing the way you build your entire WAN. READ MORE
Last year, Twitter sought to broaden the reach of its software by giving outside developers new tools at its first Flight conference. This year the company will try again, as the pressure on it to grow its user base has only increased. READ MORE
Yesterday wasn't a good day for Apple's streaming music service. A consumer watchdog group, a U.S. senator, and a popular blogger weren't praising Apple Music, they were, in effect, burying it. READ MORE
Download now and learn how to validate a provide VDI configuration across NexGen N5 Hybrid Flash Array, VMWare Horizon View, Cisco Unified Computing System(UCS), and Cisco Nexus Switches. Learn More
Peruse our library of free digital magazines! Choose from a collection of smartly designed digital magazines, which include our most popular departments -- News Analysis, Features, Opinions and Shark Tank -- all free for download with registration. These digital magazines also feature Computerworld signature packages, including our IT Careers 2015 Special Report, with the latest on hot skills and hiring trends, and our Forecast 2015 report, with unique insights into the IT budgets, project priorities and staffing strategies of top IT leaders.
The IDG Contributor Network is a collection of blogs written by leading IT practitioners about the technology, business opportunities and challenges you face everyday. We invite you to participate by applying to be a contributor today.
Internet of Things: Get the latest news! Our bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the Internet of Things (IoT). Subscribe now and stay up to date!