VMware CEO Pat Gelsinger talks about the company's recent cloud announcements, as well as future global availability.
VMware CEO Pat Gelsinger talks about edge computing, including a consistent and secure management strategy.
VMware CEO Pat Gelsinger talks about distributed encryption between virtual machines and the concept of app defense.
VMware CEO Pat Gelsinger talks with IDG Enterprise Editor-in-Chief Eric Knorr about the company's strategy, future initiatives and new partnerships.
Watch this short video to see how easy it is to scan documents with an Android device.
While 3D printing was little more than a toy for engineers 20 years ago, today Ford Motor Co. could not develop new cars without it. New technologies ensure it's coming to a production line near you.
Apple's iOS has long had the reputation of being more secure than Android, but that may not necessarily be the case. Here's how to evaluate each side's claims about mobile security.
In the second of two parts, Meir Machlin of Trust Digital continues his demonstration of a smartphone hack. In this demonstration, Machlin turns of security settings remotely and wipes the device.
Meir Machlin of Trust Digital demonstrates how to hack a smartphone using SMS.
From customization to voice assistants to battery life -- a quick look at the key differences between Apple's iPhone devices and Android phones.
Follow these eight steps, and your Android phone will be primed for productivity and ready for business.
Tony Gauda, CEO of ThinAir, talks with CSO senior writer Steve Ragan about how the ThinAir system tracks which users within an organization have seen each piece of data, spotting anomalous information and quickly finding the source of a leak.
They certainly do, according to Sarah Gibson, application security consultant at Veracode, who talks with CSO senior writer Fahmida Rashid about the issues around application security, and how having a collaborative security team is key to writing go...
An inside look at the Cisco Nexus 9516 data center core switch.
CSO senior writer Steve Ragan talks with cybersecurity experts Krypt3ia and Kodor about how the pair seek out passwords, schematics and other sensitive documents on SCADA control system architectures that shouldn't be available online, passing along ...
Kelly Shortridge and CSO senior writer Fahmida Y Rashid talk about using behavioral game theory to take advantage of hackers’ mistakes and manipulate the data they think they're receiving. People generally make decisions by either thinking ahead to...
Stories are the most powerful communication devices available. Tell better stories, and you’ll become a better CIO.
Your next corporate computer may not be a traditional computer at all: it may well be a tablet or a hybrid laptop/tablet combo. Here's why.
CSO security reporters Fahmida Rashid and Steve Ragan share some easy ways to keep your data and devices secure while traveling, even at the Black Hat conference, where active scanning is the norm. (And check out the built-in Faraday cage in Fahmida'...
Some criminals on the dark web are taking their cues from the practices of corporate IT. Illicit offerings run the gamut from code that buyers have to implement themselves to turnkey solutions and consulting services.
Is Apple about to replace Touch ID in its next iPhone?
Zane Lackey, CSO and co-founder of Signal Sciences, talks with CSO senior writer Fahmida Rashid about how DevOps and cloud can help organizations embed security into their technology structures, enabling business to move faster.
Does the message to users about security need to change? Or does IT need to rebuild infrastructure so users can worry less about security? Wendy Nather, principal security strategist at Duo Security, talks with CSO senior writer Fahmida Rashid about ...
Get the details on Microsoft's new Azure Stack, why cyberattacks never seem to end, the fate of Apple's Touch ID and why QWERTY keyboards are now tech relics.
IDG editors talk about the common misperceptions about public cloud storage, including who's ultimately responsible for data security.
Phil McKinney, president and CEO of CableLabs, Inc., offers up advice about the new set of skills required to be a successful leader.
Confused by the jumble of acronyms surrounding mobile device management? This video simply defines three key concepts: Mobile application management (MAM), enterprise mobility management (EMM) and unified endpoint management (UEM).
Sara Spivey, Chief Marketing Officer of Bazaarvoice, discusses how Bazaarvoice uses segmentation to reach the right audience, the importance of data in delivering personalized customer experiences and why face-to-face events are still valuable for bu...
Lauren Flaherty, EVP and CMO of CA Technologies, discusses the changing role of the CMO, the importance of mapping the buyer journey, launching CA's Modern Software Factory and reaching the right tech buyers and decision-makers.
Tim Minahan, Chief Marketing Officer and SVP of Citrix, discusses how Citrix uses data to predict customer needs and engagement readiness, Citrix’s content marketing approach and the importance of industry events in building credibility and long-te...
When it comes to tracking down the bad actors behind malware and ransomware, cybersecurity firms are turning to linguists.
Some of the largest companies in the U.S. have been targets of hackers, including Yahoo, JP Morgan Chase and TJX. Watch as we detail the top 16 breaches and their overall impact on customers or employees.
Martha Heller offers advice for how to develop the courage to become an enterprise leader.
Tom Soderstrom talks about the cutting-edge work happening at Jet Propulsion Lab in the evolving field of internet of things.
Apple's desktop operating system, Mac OS X, has been a staple for its iMacs and MacBooks. Watch as we spotlight its transformation from Cheetah through the upcoming High Sierra.
In this snappy video, watch as Apple's mobile operating system gains a growing list of features over the past decade.
Technology leaders share their tips for hiring a diverse IT workforce.
Bringing in multiple points of view is critical to business and IT success.
From the first iPhone, introduced in 2007, to the upcoming iPhone 8 — a look at the features, functions and pricing of Apple's popular device.
Learn how organizations including Case Western Reserve University, Deakin University and Idaho National Lab are taking advantage of augmented reality and virtual reality technology to further their business goals.
Network World's Brandon Butler checks in from Las Vegas, where this week's Cisco Live is under way. The big story: Cisco's efforts to move from hardware to software, security and "intent-based networking."
Watch as Apple's laptop transforms from the PowerBook 100, introduced in 1991, through the 2008 MacBook Air, to today's MacBook Pro.
From the Macintosh 128K, released in 1984, through today's iMac Pro, watch Apple's iconic computer change in form and function.
A graphical look at the technology behind software-defined networking.
Apple's top-end tablet hardware was already workplace worthy, but iOS still required some workarounds for things to go smoothly. iOS 11 may change that when it arrives later this year.
Cisco CEO Chuck Robbins on intent-based networking
Alex Kassirer, senior intelligence analyst at Flashpoint, and Jamesha Fisher, security operations engineer at GitHub, talk about how being part of a diverse IT team can help drive ideas and empower workers.
Martha Heller showcases what it takes to create an IT investment culture.
How CIOs can shift their approach to shadow IT.
Do you know your MDM from MAM and EMM? It's all about BYOD, and how companies can keep data safe while making it easier for workers to be productive with their own devices.