Type your search and hit enter

freemium - News, Features, and Slideshows


  • Symantec to encrypt the internet by 2018

    ​Symantec has announced its ambition for all websites to be protected by SSL encryption within two years. The cybersecurity giant’s Encryption Everywhere drive will “encrypt 100 per cent of all sites by 2018”.

    Written by George Nott02 June 16 16:39
  • Avira wins German case over adware blocking

    A lawsuit alleging that security software from Avira improperly blocked downloads of a software bundle that presented itself primarily as an Angry Birds-style game has been dismissed.

    Written by Jeremy Kirk29 June 15 11:34
  • IT Resumes: Lies, Half-truths and Embellishments

    As the old saying goes, a lie may take care of the present, but it has no future. Nowhere is this truer than when conducting a job search. In a hyper-competitive talent market, it can be tempting to embellish your work history, exaggerate your IT skills or even claim to hold advanced degrees if it'll give you an edge over other job seekers. Unfortunately however, even if these lies manage to go unnoticed at first, they'll many times catch up with; potentially landing you back among the ranks of the unemployed with a bad reputation according to Tracy Cashman, senior vice president and partner of Information Technology Search at WinterWyman.

    Written by Sharon Florentine22 Oct. 14 03:14
  • How Lenovo plans to crack the server market

    Known for its ThinkPad laptops, Lenovo is trying to find its way into the data center, despite the dominance of the Big 3: IBM, HP and Dell

    Written by Agam Shah26 Nov. 13 14:28
  • Zero-day attacks: How to fight back

    With cybercrime hitting more than 500 million victims globally and costing $100 billion annually, it's clear that security breaches are a problem very far from being solved. One particularly dangerous threat that doesn't seem to be getting its fair share of attention is zero-day attacks.

    Written by Dirk A. D. Smith19 Aug. 13 12:00
  • BYOD decision points: Who pays?

    As enterprises implement BYOD initiatives, IT managers have some key decisions to make: who purchases the devices, who pays for data plans and carrier contracts, and how does the company manage a mix of corporate and personal access to data on the devices.

    Written by John S. Webster17 June 13 13:47
  • Ten best practices for the cloud

    According to the IT industry trade association CompTIA, "over 80% of companies now claim to use some form of cloud solution, whether that be virtual machines that can be spun up on demand or applications that can be easily procured and put into use."

    Written by James Careless14 June 13 14:58
  • Why password-only authentication is passe

    The rapid growth of mobile devices that can access corporate networks and data, the expanding use of cloud-based IT services, and the increasing popularity of apps such as online banking mean that IT needs to pay closer attention to authentication.

    Written by Bob Violino10 June 13 13:56
  • IT résumé makeover: Make your messaging clear

    Whether you work in IT or any competitive field, a résumé that doesn't quickly illustrate who you are, what you do and why an employer needs you will be summarily dismissed.

    Written by Rich Hein04 June 13 14:14
  • How Fortune 500 companies are managing BYOD

    Like it or not, IT departments are accepting the fact that employees are bringing smartphones, tablets, and personal laptops to work – and that they will use these devices while on the job.

    Written by James Careless03 June 13 13:39
  • Smartphones take center stage in two-factor authentication schemes

    We all know that relying on a simple user ID and password combination is fraught with peril. One alternative is to use one of the single sign-on solutions we reviewed last year, but there are less expensive options that could also be easier to install.

    Written by David Strom20 May 13 14:30
  • eBay's CIO succeeds by innovating and 'connecting the dots'

    eBay CIO Scott Seese says he and his team are using technology and innovation to drive the company's mission of connected commerce. He explains how the ecommerce giant taps into the power of social and mobile to help customers find and purchase exactly what they seek from among millions of sellers. Seese also discusses his strategy for success and why it's important to connect the dots.

    Written by John Gallant16 May 13 21:01
  • Mobile devices: Too much of a good thing?

    Most of us have apparently decided we can't live without our favorite mobile device. Whether on public transportation, shopping or just walking down the street, you're more likely than not to be surrounded by people swiping screens, adjusting their earbuds or typing on a virtual screen.

    Written by Mary Brandel06 May 13 13:00
  • Security tools can't keep hackers at bay

    Credit card data of customers of Schnucks supermarkets was exposed for months in a breach that was not closed until weeks after a card processing company issued an alert about fraudulent activity. Insider (registration required)

    Written by Jaikumar Vijayan06 May 13 12:41