Everything related to Computer Security - Security Audits, Security Vulnerabilities, Intrusion Detection, Incident Handling, Forensics and Investigation, Information Security Policies, and a whole lot more.
Microsoft today issued an "out-of-band" security update to patch a vulnerability in Windows -- including the yet-to-be-released Windows 10 -- uncovered by researchers sifting through the emails leaked after a breach of Italian firm Hacking Team. READ MORE
Struggling with fragmented data sources from your digital marketing and analytics applications? Download our Forrester Research Report to learn how tag management is becoming widely recognized as a foundational element to unifying data and fueling omni channel marketing programs. View now
Wisconsin Gov. Scott Walker, one of the polling leaders in the race for the Republican presidential nomination, is still a cipher on offshore outsourcing and the H-1B issue. But Wisconsin lawmakers have introduced anti-outsourcing legislation that could shed light on Walker's views, if the bill makes it to his desk. READ MORE
The leaked files from surveillance software maker Hacking Team have proved to be a great resource for cyberespionage groups, which have used at least two Flash Player exploits from the company's arsenal. READ MORE
The Obama administration negotiated an historic nuclear deal with Iran and reached an agreement to normalize relations with Cuba. Now comes the hard part winning over Silicon Valley when it comes to sharing cyber security information. READ MORE
On Sunday, a group calling itself Impact Team leaked documents and other data taken from Avid Life Media, the company behind the adult playgrounds of Ashley Madison, Cougar Life, Established Men, and others. READ MORE
Visual Studio 2015 provides a way for a developer to write a single application to run across multiple Windows platforms, such as mobile, desktop and even Microsoft's experimental HoloLens environment. READ MORE
37 million married cheaters may be worried since Ashley Madison was breached and customer data may be released if the hackers' demands aren't met, but a security pro warned, "your affairs were never discrete" because "Ashley Madison always disclosed customer identities." READ MORE
View this on-demand webcast to learn how the proliferation of data from multiple sources is opening opportunities across other domains for it to extend its expertise and influence - to the benefit of the business. Learn More
Peruse our library of free digital magazines! Choose from a collection of smartly designed digital magazines, which include our most popular departments -- News Analysis, Features, Opinions and Shark Tank -- all free for download with registration. These digital magazines also feature Computerworld signature packages, including our IT Careers 2015 Special Report, with the latest on hot skills and hiring trends, and our Forecast 2015 report, with unique insights into the IT budgets, project priorities and staffing strategies of top IT leaders.
The IDG Contributor Network is a collection of blogs written by leading IT practitioners about the technology, business opportunities and challenges you face everyday. We invite you to participate by applying to be a contributor today.
Internet of Things: Get the latest news! Our bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the Internet of Things (IoT). Subscribe now and stay up to date!
Subscribe to Computerworld Daily News Sign up for our popular, twice-daily tech news newsletter. You'll get Computerworld's up-to-the-minute top stories of the day, both first thing in the morning and late in the afternoon (ET). We deliver breaking news on topics like the latest security threats and the newest mobile devices, in-depth features about enterprise technologies and IT careers, and authoritative analyses of moves made by tech companies like Google, Microsoft, Apple, IBM and HP.