Technology Industry
Technology Industry | News, how-tos, features, reviews, and videos
Don’t let the coronavirus make you a home office security risk
Congratulations. You're now the chief security officer of your company’s newest branch office: Your home. Here's how to manage your new job.
Post-coronavirus planning calls for more (not less) investment in tech
The coronavirus crisis is just beginning. But it will end. And how you fare after the pandemic depends on what you do right now. Here are four areas to focus on.
How the coronavirus is changing tech and 5 things to do about it
Due to the Covid-19 virus, some tech-culture trends are radically accelerating. Others are being reversed. And it's happening all at once. Here's what you need to know.
Welcome to Insider Pro
For more than 50 years, IDG has earned the trust of its readers with authoritative coverage of the technology industry. Insider Pro is the natural evolution of the insightful coverage our publications have produced for decades.
IT Salary Survey: Do tech certifications pay off?
In our recent survey, we asked IT professionals if certifications helped them land a job, earn a promotion or get a pay raise, and which certifications they’re planning to pursue. Here’s what we learned.
IT Salary Survey 2020: The results are in
Insider Pro reveals the current salaries for dozens of tech titles, details about IT workers' top concerns, the state of the tech hiring and the tech specialties raking in the biggest compensation.
Is technology killing globalization?
What you need to know -- and do -- about the tech-driven deglobalization trend and how it’s effecting change. Your career depends on understanding how nationalism and regulations impact business.
Next-generation endpoint security goes beyond the endpoint
AI and behavioral analysis are key to elevating the level of security for devices and back-end systems and are a prerequisite for IoT devices and services. Is your vendor moving in the right direction?
Securing the IoT is a nightmare
Currently, we have over 26-billion IoT devices running in our workplaces, offices and homes. If you're looking for an IoT security scorecard, it looks something like this: Security Threats: 26,000,000,000, IoT Secure Devices: 0.
Why manipulation campaigns are the biggest threat facing the 2020 election
This era of political espionage is rooted in manipulative ads, fake news articles and other forms of digital content. It's one of the nation’s greatest threats, especially as we approach the 2020 presidential election.
3 reasons you can’t fight facial recognition
The biometric backlash is but a brief blip. Resistance is futile. You WILL be identified. But is that good or bad?
Will spam die in 2020?
The problem with spam isn't that it's a time-wasting annoyance, but that it drives us away from phone calls and emails to bad media.
What you need to know about new data-security rules for business travel
From U.S. Customs agents to cybercriminals, everyone wants to copy the data on your phone and laptop. Here’s how to protect your rights and also avoid industrial espionage.
Attention cybersecurity entrepreneurs: CISOs want simplicity!
The cybersecurity market has matured from reactive to proactive cybersecurity technology integration. Top CISOs and industry experts weigh in on how new entrants into the cybersecurity marketplace can shape their value propositions to...
Train to be an in-demand DevOps pro for just $39
Tech companies are always looking for more ways to increase efficiency, and today, DevOps is the way they're doing it.
DiversyFund makes real estate investment accessible to everyone
Take advantage of this unique opportunity to build a real estate portfolio with DiversyFund starting at just $500.
Cybersecurity Awareness Month: Increasing our self-awareness so we can improve security
With the increased prominence of cybersecurity in organizations due to many crippling cyberattacks, the emphasis is now on continual engagement, as it should be. It’s also important to address the tunnel vision that has plagued the...
How to build a startup evaluation toolkit
In the first installment of our startup evaluation guide, we cover five essential tools you need to ensure you are heading in the right direction.
‘Have I Been Pwned’ is for sale, but what is it worth and who will buy it?
The question in my mind about Have I Been Pwned has always been about the value of the service aside from the brilliant analysis and PR generated by its creator, Troy Hunt.
Federal cybersecurity agency on the way?
As human activity migrates into the online space, keeping the bad guys from mucking it all up becomes paramount. Does that mean it’s time for a federal cybersecurity agency?