Mobile
Mobile | News, how-tos, features, reviews, and videos
Mobile security failings putting enterprises at risk
A typical mobile security breach in a large organization can cost millions of dollars. Mobile Security can be a daunting task with many potential pitfalls to protect against. Knowing the key security exposure mechanisms can help you...
15 hot tech skills getting hotter -- no certification required
Employers are apt to invest more often in cash premiums for noncertified tech skills compared to certifications. Here are a few they’re coveting the most now and going forward.
Domestic 5G development at core of US communications security plan
New NTIA document outlines White House 5G security goals, which promote home-grown R&D and call for continuous risk assessment and management.
Amid the pandemic, using trust to fight shadow IT
With most workers scattered at home and trying to come up with their own ad-hoc IT workarounds, there’s an easy way for IT shops to build trust: communicate.
Telecommuting in a post-COVID U.S. will be radically different. And that's a very good thing.
IT execs need to start talking with other C-levels now and figure out what they want their post-COVID company to look like.
3 ways COVID-19 is changing CISO priorities
The scramble to enable remote workers changes security strategies, priorities, and workflows for 2020.
video
MWC cancellation: What does it mean for the future of tech trade shows?
One of the largest tech trade shows, Mobile World Congress, canceled its convention just a few weeks before it was scheduled to begin. GSMA, the organization that puts on MWC, decided to cancel after a number of high profile vendors...
Is technology killing globalization?
What you need to know -- and do -- about the tech-driven deglobalization trend and how it’s effecting change. Your career depends on understanding how nationalism and regulations impact business.
video
The problem with mobile and app voting
It's the day after the 2020 Iowa caucuses, and the Iowa Democratic Party has yet to announce the winner. The app that precinct leaders were supposed to use to report final tallies recorded inconsistent results. Party leaders blamed a...
video
Android in 2020: Trends and predictions
Foldables, 5G, new Android phone options – watch as Computerworld blogger (and Android expert) JR Raphael joins IDG TECH(talk) hosts Ken Mingis and Juliet Beauchamp to discuss what we can expect for Android phones in 2020.
Inspecting TLS-encrypted traffic with mitmproxy
The free, open-source mitmproxy tool makes it easy to inspect TLS-encrypted app and web traffic to see exactly who your phone is talking to.
video
What we can expect from Apple in 2020
2019 was a big year for Apple, with the arrival of the Apple Card, the iPhone 11, the new Mac Pro and and a new MacBook Pro. What can we expect from the company in 2020? Macworld’s Michael Simon and Computerworld’s Ken Mingis offer...
Will spam die in 2020?
The problem with spam isn't that it's a time-wasting annoyance, but that it drives us away from phone calls and emails to bad media.
Most popular tech stories of 2019
Insider Pro subscribers pick the Top 10 articles published in our debut year.
video
Top tech stories of 2019
The new Apple Card, the battle for cryptocurrency dominance, cybersecurity skills shortage – just a few of the stories that made headlines in 2019. Watch as IDG TECH(talk) hosts Ken Mingis and Juliet Beauchamp discuss the top tech...
video
What's on our 2019 holiday wish list | TECH(talk)
Computerworld's Ken Mingis is joined by PCWorld's Michael Simon to discuss what they're wishing for this holiday season. From existing smart home gadgets and the Mac Pro to the yet-to-be-announced 5G iPhone, Ken and Michael hash out...
video
How to get the most out of your Chromebook
If you have a Chromebook, you probably know there isn't a lot to figure out when you first start using it. You sign in with your Google account and you're pretty much good to go. But there's plenty of tips and shortcuts you might not...
7 mobile security threats that may catch you by surprise
Even if you're usually savvy about cybersecurity, anyone can have a vulnerable moment (in our writer's case, it was his mother's funeral).
-
White Paper
-
White Paper
-
Analyst Report
Sponsored -
Data Sheet
Sponsored -
White Paper
BrandPosts
Learn more-
Sponsored by HP, Inc