Software

Software | News, how-tos, features, reviews, and videos

CSO  >  danger / security threat / malware / biohazard symbol in data center
Linux security shield

sale 19399 primary image

Master data analytics and deep learning with this $35 Python certification bundle

The Complete Python Certification Bootcamp Bundle contains 12 courses on how to use Python for apps, data analysis, deep learning, and more.

yyenio9

Learn how to invest & save for your future with GoBankingRates.com

The average consumer constantly thinks about money, and yet, many misconceptions and unknowns plague our minds when our own personal finances are brought up. Financial literacy is an often neglected topic despite it making a major...

k61frs3

Anyone Can Invest in Real Estate with DiversyFund

Investing in Real Estate Isn’t Just for the 1 Percent

youtube thumbnails template
video

R tip: How to use Git and GitHub with R projects

See how to use Git version control and sync with GitHub -- all right within RStudio

mobile connection endpoint protection laptop shield

Review: How Nyotron Paranoid puts endpoint security worries to rest

Adding an extra layer of endpoint protection isn't just for the overly cautious.

CSO  >  Searching for vulnerabilities  >  Magnifying lens in a virtual interface idnetifies weakness

Review: XM Cyber HaXM makes automated penetration testing more accessible, reliable

HaXM is the next logical evolution of automated pentesting programs. Not only does it offer continuous scanning that is easy to configure, it also provides advice to help fix problems.

free online course education certification book hybrid laptop and book elearning by nosua getty

Free Course: Learn to install and configure Splunk

In partnership with tech training provider Pluralsight, CSO is offering free, limited-time access to the course “Installing and Configuring Splunk.”

detection radar computer bug threats identify breach  by the lightwriter kao studio getty

Review: LogRhythm takes SIEM to the next level

LogRhythm Enterprise offers a lot of protection and assistance for finding and remediating threats … and sometimes even pre-threat actions.

tt19 025 thumb
video

WWDC's biggest enterprise takeaways | TECH(talk)

Apple's recent developer conference, WWDC, had the longest keynote in recent memory. From Memojis to the new Mac Pro, Apple unveiled all types of new tech. But what updates are most important for enterprises? TECH(talk) host Juliet...

thumb
video

Financial services embraces AI | TECH(talk)

With artificial intelligence (and machine learning) showing up in numerous industries, it's no surprise they're now gaining traction in financial services. Coming soon to a banking chatbot near you....

thumb
video

Slack Frontiers 2019 | TECH(talk)

At its Frontiers event this week, Slack rolled out tweaks to its popular collaboration platform – all of them aimed at helping users get their jobs done easier. Most notably, the company is looking to connect Slack with email.

ifcr 024 thumb3
video

How to reshape data with tidyr’s new pivot functions

See examples of tidyr’s new pivot_longer and pivot_wider functions.

Mousetrap and cheese, seen floor-level from the perspective of the mouse.

Review: Fidelis Deception breathes life into fake assets

Today's skilled hackers know, or at least suspect, that deception is in place and won't blindly follow breadcrumbs to fake assets. To combat this, Fidelis Deception creates realistic, living deception assets.

Artificial Intelligence robotic in wheat field

11 questions to ask before buying AI-enabled security software

Infosec is complicated enough. Add AI/ML into your security software mix, and you may be asking for trouble. Or, choose the right vendor, and you could wind up with the best toys on the block. Here's what you need to know to wind up...

tt19 013 thumbnail
video

What's new in Windows 10 version 1903? | TECH(talk)

With the next version of Windows 10 set to appear this spring, it’s a good time to take a look at what’s new and what’s changed in version 1903. (Not much, actually.) But that’s a good thing, according to Computerworld contributing...

security automation robot protects defends from attack intrusion breach

Review: JASK ASOC isn't just another overloaded SIEM

The JASK Autonomous Security Operations Center coordinates various alerts and events into a picture of an ongoing threat or attack — the kinds of techniques that human threat hunters employ, only much faster.

Facebook / privacy / security / breach / wide-eyed fear

Facebook secretly paid users $20 a month to use VPN spying app

After it was revealed that Facebook secretly paid people to use the Facebook Research VPN app, the social media site pulled the iOS version. But the Android version will continue.

tt19 002 thumbnail
video

Collaboration software is on the move in 2019

The year started off with a bang for several companies that make collaboration software. Here's what's been going on with Microsoft Teams, G Suite and others since the start of 2019.

Load More