Videos
In today’s Linux tip, we look at the apropos command – a command that helps you locate and identify commands even when you can’t remember their names.
Learn how to help your career, your organization and the IT community by sharing your expert knowledge with others.
In this episode, host Steve Ragan talks with Charles Henderson, global managing partner at IBM's X-Force Red, about smart cities and the potential vulnerabilities in IoT, as well as Daniel Crowley, research director at X-Force Red.
This 3-minute video explains how to use continuous integration and continuous development to deliver apps faster and with higher quality
In today’s Linux tip, we’re going to look at the dstat command that provides important information on system resources — notably CPU usage, disk activity, network traffic, paging and system internals (interrupts and context switches).
In this eighth episode of Do More with R, learn how to animate data over time with R and the gganimate and ggplot2 packages.
In this episode, host Steve Ragan talks with Engin Akyol, CTO at Distil Networks at the Black Hat 2018 conference, about bot account takeovers and how they can be detected.
In this episode of True Technologist, Brendan Eich, creator of the JavaScript language and cofounder of Mozilla, describes the hectic and challenging early days of bringing JavaScript to market, as well as his new company, Brave Software
Host Steve Ragan talks to Munin, a staffer at the DEF CON Blue Team Village about what's happening and what you can expect.
Host Steve Ragan is joined by Lookout’s Jeremy Richards, who manages the @PhishingAI account on Twitter, as well as a good friend and fellow reporter from Ars Technica.
In this episode, Steve Ragan shows what a hybrid phishing attack looks like as it starts off on one service, and quickly moves to another.
What is a phishing kit? In this video, Steve Ragan offers an answer and a look at some of the kits Salted Hash has collected.
Kit Hunter, a basic Python script written by host Steve Ragan, searches on common tag elements to find hidden phishing kits on a web server.
Troy Gill, manager of security research at AppRiver, explains conversation hijacking attacks, or CHAs, with host Steve Ragan, including who is typically targeted and how to prevent them.
The ability to charge hardware over distances of several meters has always seemed to be something of a pipe dream. But Wi-Charge says the technology works – and actual product shipments could begin early in 2019.
Asaf Cidon, vice president of email security at Barracuda Networks, talks with host Steve Ragan about a recent uptick in phishing attacks, including a spike in business email compromise (BEC) attacks.
Choosing the right project management methodology for the job is essential. Our guide to evaluating project management methodologies will ensure you pick the perfect fit for your next project.
Paul Vixie, CEO of Farsight Security, explains how global Internationalized Domain Names, or global IDNs, sparked the emergence of confusingly similar website addresses with nefarious goals -- and how to combat them.
From advanced authentication to new privacy controls, Windows 10 offers users solid security reasons to upgrade.
Believe it or not, a large number of businesses haven’t upgraded to Windows 10 yet. Here’s why they should.
Breaking through the hype around machine learning and artificial intelligence, our panel of Ken Mingis, Michael Simon and Serdar Yegulalp talk through the definitions and implications of the technology.
In this episode, Michael Feiertag, CEO and co-founder of tCell, joins host Steve Ragan to talk about why application security is more critical than ever and why it's just now getting more attention from security teams.
In this seventh episode of Do More with R, learn how to create maps in R—it’s easier than you think, thanks to new and updated packages like sf, tmap, and ggplot2
In today’s Linux tip, we’re going to look at pipes, which take the output of the command on the left side and pass it to the command on the right to use as input.
In today’s Linux tip, we’re going to look at the od command, which allows you to look at the content of files.
In the IT world, virtualization has revolutionized the way we think about data and where it lives, moving us closer to a completely on-demand data world.
Sponsored by Centrify -- Bob Bragdon, Publisher of CSO, gives his impressions of the status of Zero Trust Security and where enterprises stand in their adoption of the model today.
Oracle joins other major tech vendors by rolling out its blockchain-as-a-service offering, and two smartphone makers plan to include the technology in new devices this year. Get the latest on the blockchain craze.
Business analyst help guide businesses in improving processes, products, services and software through data analysis. These agile workers straddle the line between IT and the business to help bridge the gap and improve efficiency.
Here are the top five languages for creating AI-enabled apps, according to InfoWorld contributor and deep learning architect Ian Pointer.
Sponsored by Centrify -- Kris Howitt, Director, Information Security Architecture, Live Nation Entertainment, and Ruben Marquez, Manager, Information Security Projects, Live Nation Entertainment, provide an overview of how Live Nation Entertainment u...
In this sixth episode of Do More with R, learn how to apply a function to a vector of values and return a data frame
Sponsored by Centrify -- Mark Hopkins, Information Security Operations Manager, YapStone, discusses the immediate nature of cyber attacks and how a Zero Trust Security model assists his organization with reducing risk.
In today’s Linux tip, we look at the find command – a tool that will prove very useful when you’re trying to locate a file or set of files based on almost any criteria.
Sponsored by Centrify -- Abhilasha Bhargav-Spantzel, Principal Engineer, Intel, explains why password policies are often ineffective in securing access.
Sponsored by Centrify -- Garret Grajek, CISSP, VP, Identity, Cylance and Bill Mann, SVP, Products & Chief Product Officer, Centrify, dig into the most common reason for data breaches and why it’s time to approach identity and access with a Zero Tru...
In this episode, host Steve Ragan talks with Phil Grimes, Professional Services Lead at RedLegg, about the challenges of educating customers — and building a partnership with them — to create successful red team engagements.
Sponsored by Centrify -- Tom Kemp, CEO of Cetrify, explains why traditional approaches to access management and security have failed, and why enterprises need to embrace a Zero Trust Security model.
Sponsored by Centrify -- John Kindervag, Zero Trust founder and former analyst at Forrester Research, and Dr. Chase Cunningham, Principal Analyst, Forrester Research, discuss why investing in new technology for security will not mitigate risk alone a...
BlackBerry's latest smartphone has a full-featured physical keyboard – no surprise there – and is aimed at users who want to really want to get work done, says reviewer Dan Rosenbaum.
Improved customer relations, increased employee productivity, new revenue streams — big benefits await those who breathe new life into their business intelligence strategies.
In this episode, host Maryfran Johnson talks with Douglas Blackwell, senior vice president and CIO at Horizon Blue Cross Blue Shield of New Jersey, about digital transformation in the healthcare industry, including voice enablement and cutting-edge d...
Geared toward continuous improvement, the agile methodology can greatly increase your project’s prospects for success. Here is everything you need to know about agile project management, from certification to training to software and more.
In today’s Linux tip, we’re going to look at top – a favorite tool for examining performance on a Linux system. Want to pinpoint why your Linux system is running slowly? Top can shed a lot of light on that.
The organizations that make Computerworld's annual list go far beyond competitive salaries and healthcare benefits to woo, and then retain, employees. Here's what they're doing right.
The offerings run deep at Computerworld's 2018 Best Places to Work in IT. Comprehensive health insurance is just table stakes.
Host Steve Ragan is joined on the RSA 2018 show floor by Bryson Bort, CEO and founder of SCYTHE, to talk about the ICS Village, where attendees can learn how to better defend industrial equipment through hands-on access to the equipment.
Frank Gens, IDC’s senior vice president and chief analyst, presents the analyst firm's annual outlook for the next several years in IT, including the top 10 worldwide IT industry predictions and how they will impact every enterprise’s ability to ...
In this fifth episode of Do More with R, Sharon Machlis, director of Editorial Data & Analytics at IDG Communications, shows how code snippets work in RStudio—and how you can make your own
Six Sigma streamlines quality control in an effort to improve current processes, products or services. Here are the methodologies, roles and certifications central to this quality management methodology.