Apple on Tuesday unveiled its long-awaited smartphone line-up, with the new iPhone 8 and 8 Plus available later this month. But the flagship iPhone X – the one techies will really want – won't arrive until November.
Get a look at how the key features of Samsung's Galaxy S smartphone have evolved from its debut in 2010 to today's Galaxy S8 and S8+.
Reporters Fahmida Rashid and Steve Ragan talk about the latest ransomware threats, the holes in IT security and the burdens on enterprises.
Reporters Steve Ragan and Fahmida Rashid discuss the implications of the U.S. Cyber Command's recent elevation in status, putting it on the same level as the military’s other functional combatant commands.
Reporters Steve Ragan and Fahmida Rashid unpack the hottest topics in the security realm: Kaspersky Lab's Russia connection, the new status for the U.S. Cyber Command, Hollywood's hacking woes and ransomware.
Reporters Fahmida Rashid and Steve Ragan talk about hacks of Sony and more recently, HBO, and what lessons enterprises can learn from the entertainment industry's mistakes.
Reporters Fahmida Rashid and Steve Ragan talk about antivirus vendor Kaspersky Lab, a Russian-based company that various U.S. agencies have flagged as untrustworthy. Should you use it?
Our panel looks at whether smartwatch makers blew it by not focusing on the enterprise, why intent-based networking is the next big thing, whether GPS spoofing is real, and how high is too high when it comes to iPhone prices.
The panelists talk about their pricing predictions for the newest iPhone. Will this be the Apple device that gives consumers sticker shock?
The panelists break down Cisco's intent-based networking strategy, which brings machine learning to the networking realm. Plus, they hash out the ramifications for the security industry.
The panelists talk about GPS spoofing, and rumors about hacking as a factor in recent ship collisions. Plus, they sort out the difference between GPS spoofing and GPS jamming.
Ahead of the latest Apple smartwatch rollout, the panelists debate whether vendors made a mistake introducing smartwatches to consumers first, rather than pursuing the enterprise market.
See what puts the top 10 heavyweights in the enterprise networking space at the very top of their market.
Heading out on a trip? Check out these tips for keeping your data safe when you travel with a Mac.
Travelers carrying confidential or privileged corporate information need to take steps ahead of time to ensure that private data stays private. Watch this video for 6 quick tips.
The collaboration tool offers forward-thinking ways of sharing information, but never gained traction. Although it's being shuttered, some of those features met yet show up in other Microsoft products.
Perfect for IT, Python simplifies many kinds of work, from system automation to working in cutting-edge fields like machine learning
Watch how to safeguard corporate and personal data when traveling with recent Android-based phones and tablets, using the Chrome browser.
VMware CEO Pat Gelsinger talks about open source and container technology.
VMware CEO Pat Gelsinger talks about the company's recent cloud announcements, as well as future global availability.
VMware CEO Pat Gelsinger talks about edge computing, including a consistent and secure management strategy.
VMware CEO Pat Gelsinger talks about distributed encryption between virtual machines and the concept of app defense.
VMware CEO Pat Gelsinger talks with IDG Enterprise Editor-in-Chief Eric Knorr about the company's strategy, future initiatives and new partnerships.
Watch this short video to see how easy it is to scan documents with an Android device.
While 3D printing was little more than a toy for engineers 20 years ago, today Ford Motor Co. could not develop new cars without it. New technologies ensure it's coming to a production line near you.
Apple's iOS has long had the reputation of being more secure than Android, but that may not necessarily be the case. Here's how to evaluate each side's claims about mobile security.
In the second of two parts, Meir Machlin of Trust Digital continues his demonstration of a smartphone hack. In this demonstration, Machlin turns of security settings remotely and wipes the device.
Meir Machlin of Trust Digital demonstrates how to hack a smartphone using SMS.
From customization to voice assistants to battery life -- a quick look at the key differences between Apple's iPhone devices and Android phones.
Follow these eight steps, and your Android phone will be primed for productivity and ready for business.
Tony Gauda, CEO of ThinAir, talks with CSO senior writer Steve Ragan about how the ThinAir system tracks which users within an organization have seen each piece of data, spotting anomalous information and quickly finding the source of a leak.
They certainly do, according to Sarah Gibson, application security consultant at Veracode, who talks with CSO senior writer Fahmida Rashid about the issues around application security, and how having a collaborative security team is key to writing go...
An inside look at the Cisco Nexus 9516 data center core switch.
CSO senior writer Steve Ragan talks with cybersecurity experts Krypt3ia and Kodor about how the pair seek out passwords, schematics and other sensitive documents on SCADA control system architectures that shouldn't be available online, passing along ...
Kelly Shortridge and CSO senior writer Fahmida Y Rashid talk about using behavioral game theory to take advantage of hackers’ mistakes and manipulate the data they think they're receiving. People generally make decisions by either thinking ahead to...
Stories are the most powerful communication devices available. Tell better stories, and you’ll become a better CIO.
Your next corporate computer may not be a traditional computer at all: it may well be a tablet or a hybrid laptop/tablet combo. Here's why.
CSO security reporters Fahmida Rashid and Steve Ragan share some easy ways to keep your data and devices secure while traveling, even at the Black Hat conference, where active scanning is the norm. (And check out the built-in Faraday cage in Fahmida'...
Some criminals on the dark web are taking their cues from the practices of corporate IT. Illicit offerings run the gamut from code that buyers have to implement themselves to turnkey solutions and consulting services.
Is Apple about to replace Touch ID in its next iPhone?
Zane Lackey, CSO and co-founder of Signal Sciences, talks with CSO senior writer Fahmida Rashid about how DevOps and cloud can help organizations embed security into their technology structures, enabling business to move faster.
Does the message to users about security need to change? Or does IT need to rebuild infrastructure so users can worry less about security? Wendy Nather, principal security strategist at Duo Security, talks with CSO senior writer Fahmida Rashid about ...
Get the details on Microsoft's new Azure Stack, why cyberattacks never seem to end, the fate of Apple's Touch ID and why QWERTY keyboards are now tech relics.
IDG editors talk about the common misperceptions about public cloud storage, including who's ultimately responsible for data security.
Learn the ins and outs of Microsoft's upcoming private cloud offering, Azure Stack, as editors discuss its expected benefits and drawbacks.
QWERTY keyboards are so 1860 -- but that hasn't stopped most people from relying on them when using desktops and laptops. Multi-touch, VR and AR could soon change that. Computerworld's Ken Mingis, Network World's Brandon Butler, CSO's Fahmida Rashid ...
Phil McKinney, president and CEO of CableLabs, Inc., offers up advice about the new set of skills required to be a successful leader.
Confused by the jumble of acronyms surrounding mobile device management? This video simply defines three key concepts: Mobile application management (MAM), enterprise mobility management (EMM) and unified endpoint management (UEM).
Sara Spivey, Chief Marketing Officer of Bazaarvoice, discusses how Bazaarvoice uses segmentation to reach the right audience, the importance of data in delivering personalized customer experiences and why face-to-face events are still valuable for bu...
Lauren Flaherty, EVP and CMO of CA Technologies, discusses the changing role of the CMO, the importance of mapping the buyer journey, launching CA's Modern Software Factory and reaching the right tech buyers and decision-makers.