Technology Industry

Technology Industry | News, how-tos, features, reviews, and videos

covid 19 coronavirus global pandemic by smartboy10 getty images binary tunnel by robertiez gettyima

Don’t let the coronavirus make you a home office security risk

Congratulations. You're now the chief security officer of your company’s newest branch office: Your home. Here's how to manage your new job.

COVID-19 coronavirus [abstract concept]

Post-coronavirus planning calls for more (not less) investment in tech

The coronavirus crisis is just beginning. But it will end. And how you fare after the pandemic depends on what you do right now. Here are four areas to focus on.

telecommuting corona virus surgical mask remote worker 5g wi fi by mediaphotos getty images and wyn

How the coronavirus is changing tech and 5 things to do about it

Due to the Covid-19 virus, some tech-culture trends are radically accelerating. Others are being reversed. And it's happening all at once. Here's what you need to know.

ip welcome to insider pro primary by Laurence Dutton getty

Welcome to Insider Pro

For more than 50 years, IDG has earned the trust of its readers with authoritative coverage of the technology industry. Insider Pro is the natural evolution of the insightful coverage our publications have produced for decades.

certification college degree education graduation by cole keister via unsplash

IT Salary Survey: Do tech certifications pay off?

In our recent survey, we asked IT professionals if certifications helped them land a job, earn a promotion or get a pay raise, and which certifications they’re planning to pursue. Here’s what we learned.

Insider Pro | Computerworld  >  Salary Survey [2020]

IT Salary Survey 2020: The results are in

Insider Pro reveals the current salaries for dozens of tech titles, details about IT workers' top concerns, the state of the tech hiring and the tech specialties raking in the biggest compensation.

crystal globe with binary code

Is technology killing globalization?

What you need to know -- and do -- about the tech-driven deglobalization trend and how it’s effecting change. Your career depends on understanding how nationalism and regulations impact business.

Tiny figures are drawn toward a big, glowing lightbulb with a security shield. [idea/opportunity]

Next-generation endpoint security goes beyond the endpoint

AI and behavioral analysis are key to elevating the level of security for devices and back-end systems and are a prerequisite for IoT devices and services. Is your vendor moving in the right direction?

Computerworld - Scary Tech [Slide-05] - Encryption systems with backdoors

Securing the IoT is a nightmare

Currently, we have over 26-billion IoT devices running in our workplaces, offices and homes. If you're looking for an IoT security scorecard, it looks something like this: Security Threats: 26,000,000,000, IoT Secure Devices: 0.

'I Voted' sticker / abstract data encryption / secure voting in elections

Why manipulation campaigns are the biggest threat facing the 2020 election

This era of political espionage is rooted in manipulative ads, fake news articles and other forms of digital content. It's one of the nation’s greatest threats, especially as we approach the 2020 presidential election.

facial recognition - biometric security identification

3 reasons you can’t fight facial recognition

The biometric backlash is but a brief blip. Resistance is futile. You WILL be identified. But is that good or bad?

CSO slideshow - Insider Security Breaches - Spam email identified

Will spam die in 2020?

The problem with spam isn't that it's a time-wasting annoyance, but that it drives us away from phone calls and emails to bad media.

business travel / airport terminal walkway / traveller

What you need to know about new data-security rules for business travel

From U.S. Customs agents to cybercriminals, everyone wants to copy the data on your phone and laptop. Here’s how to protect your rights and also avoid industrial espionage.

easy simple pixel hand computer pointer

Attention cybersecurity entrepreneurs: CISOs want simplicity!

The cybersecurity market has matured from reactive to proactive cybersecurity technology integration. Top CISOs and industry experts weigh in on how new entrants into the cybersecurity marketplace can shape their value propositions to...

product 29010 product shots1

Train to be an in-demand DevOps pro for just $39

Tech companies are always looking for more ways to increase efficiency, and today, DevOps is the way they're doing it.

k61frs3

DiversyFund makes real estate investment accessible to everyone

Take advantage of this unique opportunity to build a real estate portfolio with DiversyFund starting at just $500.

Cybersecurity awareness  >  A weary businessman holds hand to forehead at security training.

Cybersecurity Awareness Month: Increasing our self-awareness so we can improve security

With the increased prominence of cybersecurity in organizations due to many crippling cyberattacks, the emphasis is now on continual engagement, as it should be. It’s also important to address the tunnel vision that has plagued the...

tools or toolkit surrounding a lightbulb on a chalkboard to build, develop or repair

How to build a startup evaluation toolkit

In the first installment of our startup evaluation guide, we cover five essential tools you need to ensure you are heading in the right direction.

holiday security have i been pwned

‘Have I Been Pwned’ is for sale, but what is it worth and who will buy it?

The question in my mind about Have I Been Pwned has always been about the value of the service aside from the brilliant analysis and PR generated by its creator, Troy Hunt.

The U.S. Capitol building in Washington

Federal cybersecurity agency on the way?

As human activity migrates into the online space, keeping the bad guys from mucking it all up becomes paramount. Does that mean it’s time for a federal cybersecurity agency?

Load More
You Might Also Like