Features

Black Hat 2015
01 fortified

scream wheelbarrow nightmare

How to wake the enterprise from IoT security nightmares

Solutions present and future for IoT security scares that keep you up at night.

video

6 startups from CES to watch in 2017

6 innovative new companies showed off their products in the Eureka Park section of CES 2017.

beach tide summer sand

Passwords: A long goodbye

There is no debate about the reality that passwords are a “fundamentally broken” method of authentication. But it is still expected to take time – likely years – for the replacement model to become mainstream.

01 holes

Tips on where to start in managing risk

What is risk management? Anytime you have something of value (like a corporate network, a website, or a mobile application), there will be risk to manage in order to protect it. Traditional approaches and controls are no longer good...

backlit keyboard

How to handle security vulnerability reports

There are people out there willing to help with your company’s security issues. Isn’t it time your company had its own ‘see something, say something’ policy?

01 detection

When real-time threat detection is essential

There are times when an organization will be especially vulnerable if they don’t have real-time detection capabilities, and in preparation for these events it’s a good idea to reevaluate tools and strategies. Mike Paquette, director...

android privacy

How to set up your Android phone for ultimate privacy

Here's how to replace all of those data-hungry apps and services with ones that don't need to know so much about you.

00 titel cost

How much is a data breach going to cost you?

A recent IBM study found that the average cost of a data breach has hit $4 million—up from $3.8 million in 2015. There are countless factors that could affect the cost of a data breach in your organization, and it’s virtually...

boardroom presentation

Bringing boards up to cyber speed

The exponential growth of cyber risk has impacted roles for the CISO and the CEO, among others, but it has also left board members a little in the dark when it comes to understanding the risks associated with cybersecurity.

valentine hero

How White Hat hackers do bad things for good reasons

Some companies are love struck with social engineering. White hat hackers are used to poke holes in your network and physical building.

iphone touchid panic button

How to protect your data, and yourself

Suppose you're a dissident. How do you keep your data safe on your iPhone, iPad, and Mac, not to mention online? Glenn Fleishman explains, in the first of a series.

1 bullet

5 reasons why Web gateways aren’t bulletproof

Like the threat landscape itself, web gateways have changed over the years. Today, web gateways do much more than enforce regulatory compliance and HR policies – organizations rely on web gateways to thwart internet-borne threats....

servers network

Dangerous assumptions that put enterprises at risk

Trusting that the solutions won't fail and users won't click could lead to a breach

video

Smart Cities: New York

New York's smart city strategy centers around multiple small pilot projects. Computerworld pounded the Manhattan pavement to see how citizens are taking to the tech changes around them.

video

Natufia brings the farmers' market straight to your home with its Kitchen Garden

This in-home system takes all the work out of growing produce.

video

From solar panels to a cloud-based AI, Vivint's smart home gear has you covered

Vivint's smart home ecosystem works together to keep your home, well, smart—run by its AI system, Sky.

video

How EVGA is taking over your PC

At this point, EVGA has basically everything you need to build your own PC—except for storage and a processor.

video

The weirdest smart home devices at CES

A talking fridge, a Wi-Fi trash can, and a bed for hacking your sleep. Welcome to the home of the future.

Load More