Everything related to Computer Security - Security Audits, Security Vulnerabilities, Intrusion Detection, Incident Handling, Forensics and Investigation, Information Security Policies, and a whole lot more.
Search This Blog
Wednesday, July 29, 2015
Microsoft delivers Windows 10 .iso files, free eval of Enterprise edition
Savvy corporate boards are more informed about emerging technology and often have a view on the ideal time to adopt new technology for maximum benefit. To facilitate better conversation, this paper includes seven questions proactive directors should consider when "talking tech" with their management teams. Learn More
With Windows 8 trying the patience of both consumers and enterprises, original equipment manufacturers are hoping Windows 10 will reinvigorate the market for PCs, laptops and all-in-one devices. READ MORE
The skills gap is real, but debate over its root causes continues. IT executives blame a shortage of skills, but IT professionals looking for work say exaggerated requirements are the issue. Could a simple tweak in writing your job postings be the answer? READ MORE
Computer fires severe enough to prompt a 911 call are so unusual that when it does happen, local media sometimes takes note. That was the case in Arlington, Va. recently, when firefighters found a computer burning on the balcony of an apartment complex. READ MORE
Even in a hot job market, taking the next step in your career requires thought, planning and patience. Here are five steps experts say you need to take before you begin your job search to better position yourself for your next career move. READ MORE
Learn about the rapidly evolving cyber threat landscape and the Security Intelligence Maturity Model (SIMM). The SIMM provides organizations with a framework for continuous reduction in their mean-time-to-detect and mean-time-to-respond to threats. Learn More
Congress can't grasp modern tech, so Operation FaxBigBrother will turn your emails and hashtagged tweets into faxes -- tech they do understand -- and bury Senators under mountains of paper devoted to stopping the CISA cyber spying bill. READ MORE
When you're a hacker, time is on your side. Time to find a soft spot in your armor, to evade defenses, to seek out your most critical data. Increasingly, today's advanced threats circumvent traditional defenseseven sandboxing. You need a new approach. Learn more >>
Peruse our library of free digital magazines! Choose from a collection of smartly designed digital magazines, which include our most popular departments -- News Analysis, Features, Opinions and Shark Tank -- all free for download with registration. These digital magazines also feature Computerworld signature packages, including our IT Careers 2015 Special Report, with the latest on hot skills and hiring trends, and our Forecast 2015 report, with unique insights into the IT budgets, project priorities and staffing strategies of top IT leaders.
The IDG Contributor Network is a collection of blogs written by leading IT practitioners about the technology, business opportunities and challenges you face everyday. We invite you to participate by applying to be a contributor today.
Internet of Things: Get the latest news! Our bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the Internet of Things (IoT). Subscribe now and stay up to date!
Subscribe to Computerworld Daily News Sign up for our popular, twice-daily tech news newsletter. You'll get Computerworld's up-to-the-minute top stories of the day, both first thing in the morning and late in the afternoon (ET). We deliver breaking news on topics like the latest security threats and the newest mobile devices, in-depth features about enterprise technologies and IT careers, and authoritative analyses of moves made by tech companies like Google, Microsoft, Apple, IBM and HP.