Just a few days after Equifax settled with the FTC over its 2017 data breach, Capital One announced it was the target of a March attack. Identifying information and bank account numbers are among some of the data breached in the attack that affects 1...
There are a number of ways attackers can exploit public information about your organization's employees. CSO Online's Susan Bradley walks through how an attacker can gain access to your organization's Office 365 accounts and how you can protect your ...
The Internet of things isn't all about self-driving cars or drone deliveries. IoT has plenty of practical use cases in urban and suburban settings alike. In this episode of TECH(talk), Network World's Jon Gold joins Juliet to discuss how IoT is makin...
As the push for sustainability across all businesses intensifies, so too will the push for greener IT infrastructure. Data centers are notorious for giving off thermal energy and being somewhat energy inefficient. Researchers at Rice University are l...
IPv6 is the latest version of the main communications method that identifies and locates computers and other devices on the internet. It provides more efficient packet handling, improving performance and security. Yet despite this, the rest of the in...
Apple is reportedly in talks to purchase Intel’s smartphone modem business -- and therefore all the intellectual property that comes with it. This move suggests Apple may eventually make its own 5G chips, but we’re likely still years away from th...
It's already been a big summer for Apple. At the annual WWDC conference in June, the company unveiled the long-awaited Mac Pro, along with a myriad of software updates. But recent news that Apple may buy Intel's smartphone modem business is just as i...
See how easy it is to make your own functions using ggplot2, dplyr, and other tidyverse package functions – without worrying about quoted and unquoted column names! Thanks to the latest version of the rlang package, tidy evaluation is now as easy a...
You have several options to set up alerts in Azure Active Directory to help spot risky user behavior.
The Trump administration levied tariff on many Chinese-made goods, including lots of tech hardware. Tech industry leaders have come out in opposition to the tariffs, which may result in higher prices. In this episode of TECH(feed), Juliet discusses h...
The dark web may sound ominous, but it’s really a catch-all term for the part of the internet that isn't indexed by search engines. Stay tuned for a guided tour of the web's less mainstream regions.
President Trump reversed his ban on all business transactions between the U.S. and Chinese tech giant Huawei a few weeks ago. Now, some U.S. companies will soon be able to sell their tech to Huawei once again--but not without jumping through a hoop o...
See how to use the special .SD symbol in the R data.table package.
Use these techniques to inventory your network to determine which devices have BitLocker.
In this Linux tip, learn how to use the setfacl and getfacl commands. They allow you to establish and report on file permissions that reach beyond the traditional read, write and execute permissions on Linux systems.
Last week, the Federal Trade Commission hit Facebook with a $5 billion fine for mishandling user data. The fine comes after the FTC’s investigation following the Cambridge Analytica scandal. On this episode of TECH(feed), Juliet discusses the impli...
In this Linux tip, learn the command that reverses text – the rev (reverse) command. At first glance, this command may not seem helpful. But, there are times that it can be quite useful.
This new add-on will let you set up alerts about suspicious sign-on activity for Office 365 and other cloud apps.
In this Linux Tip, learn how to read and understand basic file permissions. Once you understand file permissions, you can analyze and reassign them.
It was long speculated President Trump could use the Huawei ban as a bargaining chip in trade talks with China. And during the G20 summit, he did just that. Now that the Huawei ban has been reversed, what does this mean for tech companies? And how ca...
Upinder Phanda, CIO at Unisys, and host Maryfran Johnson sit down to discuss IT strategy, leadership, workforce development and much more.
In this Linux Tip, learn how to use the awk command. You can use it to select one or more pieces of text from lines of input.
Despite the U.S. ban on transactions between American companies and Chinese tech giant Huawei, some chip makers have found a way to continue to supply the company with their products. If these chips are used in future iterations of Huawei devices, it...
CSO senior writer Lucian Constantin and Computerworld Executive Editor Ken Mingis talk database security and how MongoDB's new field-level encryption takes security to the next level.
See various ways to calculate month-over-month, week-over-week, and year-over-year comparisons in R using dplyr and lubridate.
In this Linux tip, Sandra will show you how to use the stat command. It provides a lot of the same information as ls -l, but in a very different format. It also includes some useful additional information.
You asked (questions about Windows 10) and we answered (with advice from Windows expert Preston Gralla). We cover everything from the pace of annual updates, how to find better Windows apps and why you should change your default browser.
It looks like 5G tension between the U.S. and China may get worse. Following a U.S. ban on business transactions with Chinese telecom giant Huawei, the Trump Administration has proposed a ban on any 5G equipment made in China. This would affect any 5...
5G deployment is a hot topic, especially as many countries race to build next-generation networks. The U.S. has banned Huawei from contributing to its network construction, but will that really set the U.S. back? Amid all of the hype surrounding 5G, ...
Facebook’s announcement of its new cryptocurrency, Libra, and digital wallet, Calibra, means we all might be a step closer to adopting blockchain tech. The ability to carry around fiat-backed, digital currency in your pocket could disrupt the finan...
Apple may be prepping to turn your iPhone into a digital wallet, and has already announced plans for an Apple credit card. Now, Facebook expects to roll out its own cryptocurrency in 2020. So just what's going on?
In this episode of Do More With R, Sharon shows you how to send Slack messages using R. It may not seem helpful at first, but there's plenty of uses. You can even use it to notify yourself or others when a lengthy R script finishes running.
We’ve already talked about how the Huawei ban may affect business, but how will it affect security? Google has already warned of security threats should the company be unable to send updates to Huawei’s Android-powered devices. And even if Huawei...
What’s it like to work at a Best Place to Work in IT? We take you inside Kaiser Permanente, CarGurus, and Kronos and reveal what they’re looking for in new hires.
Computerworld's annual "Best Places to Work in IT" special report details how leading organizations successfully attract, and keep, top-notch IT workers. Val Potter, managing editor for features, and Ken Mingis, Computerworld's executive editor, talk...
Want to attract top tech talent to your company? Find out what benefits the 100 organizations on Computerworld’s Best Places to Work in IT list are offering.
In this Linux tip, learn how to use the /dev/null tool. You can send your outputs to /dev/null and it simply disappears. This is helpful when a command’s output isn’t interesting and you don't need to see it.
The merger of the third- and fourth-largest wireless carriers in the U.S. might hit a delay following a lawsuit brought forth by 10 state attorneys general. T-Mobile and Sprint say this merger would advance 5G development, but critics say it would vi...
First the Trump Administration banned business transactions between Huawei and U.S. companies. But now, the White House’s budget director has called for a two-year delay on the ban. If this ban does go into effect, how hard will Huawei be hit? In t...
This year, Apple announced a ton of changes and updates to its products at WWDC. Those announcements also included brand new hardware from Apple in the form of a new Mac Pro, the new Pro Display XDR and the new Pro Stand. This new tech was certainly ...
Apple's recent developer conference, WWDC, had the longest keynote in recent memory. From Memojis to the new Mac Pro, Apple unveiled all types of new tech. But what updates are most important for enterprises? TECH(talk) host Juliet Beauchamp talks to...
See how to automate sending email with the R programming language and Gmail.
The U.S. ban on Huawei business has already affected small telecom carriers in rural areas. And, unsurprisingly, Huawei responded to the ban with increased legal pressure. This fight is far from over, and Juliet has the latest updates in today’s ep...
Sharding is one of several methods being tested by start-ups, developers and current blockchain platforms to see if it can help developers finally address blockchain's scalability problem.
Recently released public SAP exploits (dubbed 10KBLAZE) could pose a security risk for thousands of businesses. Computerworld executive editor Ken Mingis and CSO Online's Lucian Constantin discuss the fallout of 10KBLAZE, and how businesses using SAP...
A few weeks after settling a lawsuit with Apple, Qualcomm faces a ruling from a federal judge indicating a violation of antitrust laws. What will these mean for Qualcomm and its traditionally high licensing fees? In this episode of TECH(feed), Juliet...
In this Linux tip, learn how to use the nslookup command. This command provides information on naming services and demonstrates how your system looks up hostnames prior to connecting to them.
With the arrival of Windows 10 1903, users will be allowed to delay installation of the upgrade for up to about 18 months. That's a big change in how Microsoft has done updates in the past.
Huawei has been under fire from the U.S. government for some time now. But a new move by the Trump administration targets Huawei and other companies accused of “posing an unacceptable risk” and bans Huawei from doing business in the U.S. On this ...
In this episode of 2-Minute Linux Tips, Sandra demonstrates the last command. It that shows recent logins – such as the last time you logged in but with the logins in reverse order.