How will the impending Brexit decision impact data privacy, sharing and regulations? IDG U.S. and U.K. Editorial director Matt Egan talks with TECH(talk) hosts Ken Mingis and Juliet Beauchamp about the March 29 deadline -- the politics, the planning ...
What should you expect at this year's RSA Conference? Security reporter J.M. Porup and TECH(talk) host Juliet Beauchamp talk about the hot topics and sessions to look for at the March 4 to 8 gathering in San Francisco.
Cryptocurrency is headed for the enterprise, data breaches are down and Apple will soon launch video streaming platform. Want to learn more about any of these topics?
While R is a useful language, Python is also great for data science and general-purpose computing. See how to run Python code within an R script and pass data between Python and R
Use these Windows registry key changes and fixes to protect your systems from known side channel vulnerabilities.
The yearly release of a new version of Android always causes a hopeful stir among users. But most of them have to wait months, or even longer, to get the update on their devices.
An Android security flaw could leave your phone vulnerable to hackers while viewing images. And yes, we're talking more about Huawei's battle with the U.S. government. All that and more mobile news on today's episode of TECH(feed).
How to keep your business running in the event of an emergency or disaster.
5G networks are coming soon, but what obstacles will companies face while building the necessary infrastructure? And what will be the next start-up to reach unicorn status? All that and more on today’s episode of TECH(feed).
What's ahead for Internet of Things technology in 2019? Prepare for more location-based advertising, warehouse robotics, and concepts such as the no-line, no-checkout Amazon Go store.
In this Linux tip, we look at the hostnamectl command. It’s a command that provides information on a particular system – including but not limited to its hostname – and even allows you to make some changes.
Slack preps for IPO, Google’s quarterly report, and how the spread of false information online could be a threat to all of us. All that and a bit more on today’s episode of TECH(feed).
With smartphone sales slowing – even for the iconic iPhone – have we reached 'peak smartphone'? And if so, how does the industry innovate its way out of the funk?
Use these basic settings to make it harder for attackers to Windows hardware.
Today's episode delves into Amazon's revenue, Facebook and Apple's dispute, and more.
J.M. Porup, senior writer at CSO online, joins Juliet on this week's episode of TECH(talk) to discuss trends in ransomware, IoT security and enterprise cybersecurity roles.
In this tip, we look at the pstree command. It allows you to get a listing of running processes that clearly indicates the relationship between them.
Today's episode features more on Apple’s first-quarter report, news that Google and the Internet Advertising Bureau are profiling users, collaboration software spending, and more problems for Huawei.
Configure Office 365 to detect email-delivered malware.
Today's episode explores blockchain payments, smartphone sales and Google's fine from the European Union.
The year started off with a bang for several companies that make collaboration software. Here's what's been going on with Microsoft Teams, G Suite and others since the start of 2019.
Guest host Juliet Beauchamp and CSO senior writer J.M. Porup talk about the challenges around securing the systems and networks used to control industrial plants and infrastructures.
This RStudio Addins tutorial shows step by step how to create an addin for the RStudio IDE
Following the Center for Internet Security’s benchmarks and checklists, here’s how to configure Microsoft Office 365 for the security level you need.
Google's foray into cellular networking lets it deliver wireless access that can undercut rivals like AT&T and Verizon. Here's an explainer on what Google Fi is and does.
See how well you’re achieving daily goals with a color-coded calendar made in R
When some new iPad owners found their devices were bent, Apple acknowledged the issue and said, in essence, 'no problem.' Then the company announced revenues would fall short of expectations. What the heck is going on?
Make sure Microsoft Office 365 logging and auditing is set up properly so forensic data is available when needed.
Guest host Juliet Beauchamp talks with senior writer J.M. Porup about the newly created cybersecurity insurance industry, and how a policy could fit into an organization's overall security strategy to help minimize risk.
In 2018, blockchain boosters touted the distributed ledger technology as a game-changer. Maybe so, but not yet. Here's how it evolved last year and where it's going in 2019.
Find security scripts, compliance and other Windows resources.
Set data loss prevention policies in Windows 10 to prevent data leakage.
Set Office 365 Advanced Threat Protection policies to block known malicious URL addresses.
Discover an easy way to use key-value pairs in R
Follow these steps to enable multi-factor authentication in Office 365 for more secure log-ins.
Set up Office 365 to defend against hackers who use hidden Outlook rules to forward emails.
In this episode, host Maryfran Johnson talks with Elizabeth Hackenson, CIO at Schneider Electric, about talent acquisition, Schneider Electric's new capabilities on mobile devices, and the value of having a "healthy paranoia" about potential industry...
Allow devices to share and distribute updates across a network without having to rely on Windows Software Update Services.
Learn an easy method to use key-value pairs in R
Learn how to create a script that will install security and other feature updates at a specific time
IDC analyst Joe Pucciarelli shares insights on the most relevant global trends and key predictions impacting CIOs, IT professionals and their organizations.
In this episode, host Maryfran Johnson talks with Vince Kellen, CIO, University of California at San Diego, about data science, cloud computing and the future of the online learning space.
Windows 10 update settings are varied and at times confusing. Here is an exact list of the settings that control when updates will automatically run.
In this tip, we look at commands that identify the version of Linux in use on a Linux system – the lsb_release and uname commands.
In this Linux tip, we look at the shred command, which removes a file from a disk in a manner that is far more thorough than the rm (remove) command.
Learn how to store credentials in an encrypted, secure keyring within R
Here’s how to tell what patches and security improvement are in Windows 10 updates before you install them.
How to forecast the future with accuracy and confidence.
Learn how to add sparklines to HTML tables in R with the DT and sparkline packages
In just a few days, Apple's eagerly-awaited iPhone XR finally arrived and the company rolled out new tablets, laptops and even a Mac mini. Here's what matters.