Technology Industry

Technology Industry | News, how-tos, features, reviews, and videos

Insider Pro | Computerworld  >  Salary Survey [2020]
audience listens to speaker lecture at a conference presentation

tt20 014 thumb
video

Technology we love

In honor of Valentine’s Day, we’re talking about technology we love. AI, 5G, edge computing, collaboration tools – all have people’s hearts racing. Watch as Michael Simon, writer for Macworld and PCWorld, and IDG TECH(talk) hosts Ken...

crystal globe with binary code

Is technology killing globalization?

What you need to know -- and do -- about the tech-driven deglobalization trend and how it’s effecting change. Your career depends on understanding how nationalism and regulations impact business.

Tiny figures are drawn toward a big, glowing lightbulb with a security shield. [idea/opportunity]

Next-generation endpoint security goes beyond the endpoint

AI and behavioral analysis are key to elevating the level of security for devices and back-end systems and are a prerequisite for IoT devices and services. Is your vendor moving in the right direction?

Computerworld - Scary Tech [Slide-05] - Encryption systems with backdoors

Securing the IoT is a nightmare

Currently, we have over 26-billion IoT devices running in our workplaces, offices and homes. If you're looking for an IoT security scorecard, it looks something like this: Security Threats: 26,000,000,000, IoT Secure Devices: 0.

'I Voted' sticker / abstract data encryption / secure voting in elections

Why manipulation campaigns are the biggest threat facing the 2020 election

This era of political espionage is rooted in manipulative ads, fake news articles and other forms of digital content. It's one of the nation’s greatest threats, especially as we approach the 2020 presidential election.

ip welcome to insider pro primary by Laurence Dutton getty

Welcome to Insider Pro

For more than 50 years, IDG has earned the trust of its readers with authoritative coverage of the technology industry. Insider Pro is the natural evolution of the insightful coverage our publications have produced for decades.

facial recognition - biometric security identification

3 reasons you can’t fight facial recognition

The biometric backlash is but a brief blip. Resistance is futile. You WILL be identified. But is that good or bad?

CSO slideshow - Insider Security Breaches - Spam email identified

Will spam die in 2020?

The problem with spam isn't that it's a time-wasting annoyance, but that it drives us away from phone calls and emails to bad media.

Encrypted blocks of multicolored data cubes rolling out.

Has the quantum crypto break already happened?

Better quantum algorithms and a strange silence since last year from quantum computing researchers suggest that we are closer to breaking traditional encryption than most people believe.

business travel / airport terminal walkway / traveller

What you need to know about new data-security rules for business travel

From U.S. Customs agents to cybercriminals, everyone wants to copy the data on your phone and laptop. Here’s how to protect your rights and also avoid industrial espionage.

easy simple pixel hand computer pointer

Attention cybersecurity entrepreneurs: CISOs want simplicity!

The cybersecurity market has matured from reactive to proactive cybersecurity technology integration. Top CISOs and industry experts weigh in on how new entrants into the cybersecurity marketplace can shape their value propositions to...

youtube thumbnails template
video

How robotics (and AI) are changing how we work and live | TECH(talk)

Robotics and AI play increasingly important roles in a variety of industries and no, they're not here to take over mankind. Keith Shaw, editor-in-chief of Robotics Business Review, joins Ken Mingis and Juliet Beauchamp to discuss the...

product 29010 product shots1

Train to be an in-demand DevOps pro for just $39

Tech companies are always looking for more ways to increase efficiency, and today, DevOps is the way they're doing it.

k61frs3

DiversyFund makes real estate investment accessible to everyone

Take advantage of this unique opportunity to build a real estate portfolio with DiversyFund starting at just $500.

Cybersecurity awareness  >  A weary businessman holds hand to forehead at security training.

Cybersecurity Awareness Month: Increasing our self-awareness so we can improve security

With the increased prominence of cybersecurity in organizations due to many crippling cyberattacks, the emphasis is now on continual engagement, as it should be. It’s also important to address the tunnel vision that has plagued the...

budget piggy bank spending savings security spending

Security spending up, but adoption of cutting-edge tools is slow

While security budgets are expected to increase over the next year, it’s not clear that spending is aimed at the right problems or that IT is up-to-date on the latest security practices. (Download our research report.)

thumb photo
video

What is IT governance?

IT governance is a formal way to align IT strategy with business strategy. Watch this video to learn tips for successfully implementing a governance framework.

tools or toolkit surrounding a lightbulb on a chalkboard to build, develop or repair

How to build a startup evaluation toolkit

In the first installment of our startup evaluation guide, we cover five essential tools you need to ensure you are heading in the right direction.

Load More