Everything related to Computer Security - Security Audits, Security Vulnerabilities, Intrusion Detection, Incident Handling, Forensics and Investigation, Information Security Policies, and a whole lot more.
Agile isn't just for software developers -- the methodology has applications and makes a positive impact anywhere it's applied in your business. Here are six agile principles you can use almost anywhere. READ MORE
With financial losses estimated to be at least $400 millionand security incidents grew up to 66%. But, don't allow fear to stifle growth. The "Data Theft Prevention," report focuses on how to stay secure while you innovate, from a broader, in-scope, more intelligent in application perspective. Learn More
126 types of cars have been hackable for years and can be stolen thanks to a keyless security flaw; Volkswagen spent two years suing the researchers and trying to keep the vulnerabilities a secret. READ MORE
Google has confirmed the name of Android M -- Marshmallow. The new version will first make it to the expected new Nexus devices due for release later this year. Soon after, it'll be available for OTA upgrades for older pure-Android shinies. But after that, who knows? READ MORE
Because accessing productivity software from the cloud is so different from running it locally, many IT decision-makers approach the move to Office 365 as a major enterprise technology migration. As a result, they often defer implementation until they believe they have the wherewithal to switch all users over in one fell swoop Learn More
Peruse our library of free digital magazines! Choose from a collection of smartly designed digital magazines, which include our most popular departments -- News Analysis, Features, Opinions and Shark Tank -- all free for download with registration. These digital magazines also feature Computerworld signature packages, including our IT Careers 2015 Special Report, with the latest on hot skills and hiring trends, and our Forecast 2015 report, with unique insights into the IT budgets, project priorities and staffing strategies of top IT leaders.
The IDG Contributor Network is a collection of blogs written by leading IT practitioners about the technology, business opportunities and challenges you face everyday. We invite you to participate by applying to be a contributor today.
Internet of Things: Get the latest news! Our bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the Internet of Things (IoT). Subscribe now and stay up to date!
Subscribe to Computerworld Daily News Sign up for our popular, twice-daily tech news newsletter. You'll get Computerworld's up-to-the-minute top stories of the day, both first thing in the morning and late in the afternoon (ET). We deliver breaking news on topics like the latest security threats and the newest mobile devices, in-depth features about enterprise technologies and IT careers, and authoritative analyses of moves made by tech companies like Google, Microsoft, Apple, IBM and HP.