Videos
Companies that are scrambling to support remote workers in the wake of the COVID-19 crisis need to address these security concerns.
All software has bugs, and some of those bugs are security flaws that can be exploited and turned into weapons. A zero day is a security flaw that has not yet been patched by the vendor and can be exploited. Here's what you need to know.
Attackers are using tools and features built into Windows 10 to compromise systems and avoid detection. These tips will help shut them out.
Administrator accounts have wide access to data and systems. Here’s how to protect them from abuse or compromise.
Most phishing campaigns use links to malicious scripts that infect users’ devices. Here’s how to spot and prevent them from doing damage.
Computerworld Windows expert Preston Gralla and Executive Editor Ken Mingis answer viewers' questions about the latest Windows 10 release and other Windows-related topics. If you have a question, post it as a comment.
The U.S. Department of Defense had two final choices to award its Joint Enterprise Defense Infrastructure (JEDI) cloud computing contract: Microsoft and Amazon. Despite perception of Amazon’s frontrunner status, the D.O.D. awarded the $10 billion c...
See how to style your headlines, axis text, and more in your ggplot graphs with the R ggtext package. Download the data from Sharon's associated article: https://www.infoworld.com/article/3527449/add-color-to-your-ggplot2-text-in-r.html
Use these tools and techniques to protect important data from being exfiltrated from your Windows network.
Enforcement of the California Consumer Privacy Act begins this summer, but lawsuits are already being filed. To help you comply and avoid being sued, CSO contributor Maria Korolov joins IDG TECH(talk) host Juliet Beauchamp to discuss critical compone...
In this Linux tip, learn how to use the ls command. The ls command is one of the most basic commands. It’s used to list files and it has some very useful options.
One of the largest tech trade shows, Mobile World Congress, canceled its convention just a few weeks before it was scheduled to begin. GSMA, the organization that puts on MWC, decided to cancel after a number of high profile vendors pulled out due to...
In honor of Valentine’s Day, we’re talking about technology we love. AI, 5G, edge computing, collaboration tools – all have people’s hearts racing. Watch as Michael Simon, writer for Macworld and PCWorld, and IDG TECH(talk) hosts Ken Mingis a...
Knowing where to look for malware lurking on your network gives you a better chance to prevent damage from it.
There's plenty of options to pick from when it comes to selecting a password manager. But why should you use one? Do you want something cloud-based or local? CSO Online writer J.M. Porup joins Juliet to discuss the ins and outs of password managers, ...
We hear the terms "deep web" and "dark web" thrown around a lot... but what do they actually mean? And what's the difference between the two? CSO Online writer J.M. Porup joins Juliet to dispel rumors and discuss what sets the deep web and dark web a...
Use these techniques to see if attackers have harvested authentication credentials from your Windows network.
It's the day after the 2020 Iowa caucuses, and the Iowa Democratic Party has yet to announce the winner. The app that precinct leaders were supposed to use to report final tallies recorded inconsistent results. Party leaders blamed a "coding issue" w...
Is 5G real? When should you upgrade? How will enterprises benefit and what are the costs and ROI? Analyst Jack Gold joins IDG TECH(talk) hosts Juliet Beauchamp and Computerworld's Ken Mingis to answer those questions and more to help you create your ...
IDC analyst and networking expert Brandon Butler joins Ken and Juliet to discuss networking trends, Wi-Fi versus 5G and how artificial intelligence and machine learning can simplify network management. They also discuss how enterprises are beginning ...
Foldables, 5G, new Android phone options – watch as Computerworld blogger (and Android expert) JR Raphael joins IDG TECH(talk) hosts Ken Mingis and Juliet Beauchamp to discuss what we can expect for Android phones in 2020.
Take stock of how people and devices access your network and block potential avenues of attack.
In this Linux tip, learn how to use the ssh-keygen command. It’s used to create a set of public/private keys that you can use in place of passwords to either log into a system or run commands remotely.
Learn how to turn code from Episode 41 into an interactive shiny Web app.
See how to search, filter, and sort tweets using R and the rtweet package. It’s a great way to follow conference hashtags. If you want to follow along with the optional code for creating clickable URL links, make sure to install the purrr package i...
Artificial intelligence and machine learning are being used even more these days. Watch as InfoWorld’s Serdar Yegulalp and IDG TECHtalk hosts Ken Mingis and Juliet Beauchamp discuss how AI and ML are being used and answer viewers’ questions.
Still running Windows 7 or Windows Server 2008? Take these steps to minimize your risk.
Robotics Business Review senior editor Keith Shaw joins Ken and Juliet once again to talk CES 2020 and the future of robotics. Keith debunks the myth that robots will replace humans in jobs, and explains they'll actually be quite helpful in assisting...
In this Linux tip, learn how you can move a running task into the background and what that means. Once you use the bg command, you have the ability to run other commands.
Start the new year off by eliminating common paths for attackers to breach your network.
Computerworld Windows expert Preston Gralla and Executive Editor Ken Mingis answer viewers' questions about the latest Windows 10 release. If you have a question, post it as a comment so it can be answered in a future episode.
In this Linux tip, learn how to use the lsof (list open files) command. To properly list all open files, you should use sudo. Otherwise you’re likely to run into a lot of Permission Denied warnings.
See how to send a text message directly from an R script with Twilio and the Twilio R package.
2019 was a big year for Apple, with the arrival of the Apple Card, the iPhone 11, the new Mac Pro and and a new MacBook Pro. What can we expect from the company in 2020? Macworld’s Michael Simon and Computerworld’s Ken Mingis offer their prognost...
Prevent Windows admin credentials from being exposed in cleartext with this tip.
In this Linux tip, learn about apparmor. It’s a security module that runs by default on certain Linux systems – like newer Ubuntu and Debian. Apparmor enforces restrictions using file system paths while SELinux applies security labels to objects.
Follow these steps to ensure your multi-factor authentication for Office 365 is effective.
In this Linux tip, learn the wget command. It makes downloading pages from web sites – even recursively – very easy. Keep in mind that this command downloads whatever html code defines the page.
The new Apple Card, the battle for cryptocurrency dominance, cybersecurity skills shortage – just a few of the stories that made headlines in 2019. Watch as IDG TECH(talk) hosts Ken Mingis and Juliet Beauchamp discuss the top tech stories of the ye...
This new Microsoft 365 feature can help you stay in compliance with regulations like GDPR and better protect data.
In this Linux tip, we’re going to look at the du command that reports on disk usage – whether individual files or directories.
See how to do GIS calculations in R with this tutorial on finding the ZIP code for a US address.
Michael Salas, SVP, Chief Information & Digital Officer at SUEZ North America, joins Maryfran Johnson for this CIO Leadership Live interview. Watch as they discuss IT strategy, digital transformation and more.
Attackers often take advantage of the holidays to launch attacks. Use these Microsoft settings to deter them.
In this Linux tip, we’re going to look at the split command that breaks files into pieces --according to your instructions if you like -- and gives the pieces sequential names.
A lot has happened since we uploaded our most recent video about the Huawei ban last month. Another reprieve has been issued, licenses have been granted and the FCC has officially barred Huawei equipment from U.S. networks. Our viewers had some great...
Follow these steps to protect your websites at the server and workstation.
Computerworld contributor Preston Gralla answers viewers' questions about Windows 10 (and Windows 7) with Executive Editor Ken Mingis.
In this Linux tip, learn how to use the date command. In its simplest form, it provides the date and time in a nice format, including the time zone.
The hype around artificial intelligence and machine learning is giving way to real use. Join us as InfoWorld’s Serdar Yegulalp and IDG TECHtalk host Ken Mingis discuss how AI and ML have become easier to put into production, how AI and ML are being...