Quantcast
Channel: Computerworld Ryan Francis
Browsing all 110 articles
Browse latest View live

Will RIM survive?

As Mike Lazaridis and Jim Balsillie step down as co-CEOs at Research in Motion, the company is at a cross roads. Thorsten Heins steps into the CEO chair with many daunting obstacles ahead of him and...

View Article



Macs take on the enterprise

Change can often be slow. It took many years for the Mac to begin to even threaten the PC in the enterprise. It is still a slow process, but Apple is making up ground on Microsoft.To read this article...

View Article

Windows 8: What you need to know

Just when you got used to Windows 7, Microsoft is threatening to ship Windows 8. The first public beta is slated to be released at the end of this month, with a final ship date rumored to be in...

View Article

The ultimate tips box

Got problems with insider threats? Need help securing your wireless LAN because of employees bringing their own devices on to your network? Know how to protect your Android device?To read this article...

View Article

BYOD: There is no stopping employees' devices on your network

It used to be the IT department's answer was always no when an employee asked to use a personal device for work. IT often felt the risk was far too great to the company's network security to allow...

View Article


iPad 3 could blow away competitors

There has been wide speculation on what Apple's next iteration of its tablet will look like, feature and be named. Network World editor John Cox is even able to write a weekly story on the wild rumors...

View Article

Cisco's big comeback

Just a year ago, Cisco's stock was taking a beating after the sales failed to meet Wall Street expectations.The company wasn't exactly reeling, but CEO John Chambers knew something had to be done to...

View Article

Can you handle Big Data?

Big Data is the latest industry buzzword. It's just another way of saying you as a network manager are being inundated with data and you better figure out a way to manage, secure and analyze it.To read...

View Article


Macs under attack, who is safe?

It was always thought that as Apple products increased in popularity, so would the target on its back placed by cybercriminals. Always looking to take down the king of the hill, cybercriminals finally...

View Article


Inside the Google v. Oracle courtroom drama

The trial pitting Google vs. Oracle on the claim of intellectual property infringement by Google in Android has reached almost a tabloid like feel. Outside the courtroom feels like the red carpet as...

View Article

Image may be NSFW.
Clik here to view.

A checklist for secure employee departures

Employee exitImage by ThinkstockA certain amount of employee turnover is a natural part of any organization’s life cycle. With each departure, whether the employee was entry-level or an executive,...

View Article

Image may be NSFW.
Clik here to view.

7 reasons users have trust issues

Uneasy usersImage by Georgie PauwelsAlmost every month there are headlines splashed across the Internet indicating another business has been breached. It is no surprise then that employees are unnerved...

View Article

Image may be NSFW.
Clik here to view.

Seven security and privacy concerns at the polls

Presidential raceImage by ReutersA recent poll by Wakefield Research delved into the psyche of the American voter asking them many questions about who will lead them through cyberspace the next four...

View Article


Image may be NSFW.
Clik here to view.

Looking back: Viruses that led to a path of destruction

VirusesImage by BixentroThe world of computer viruses has changed drastically over the last 25 years or so. In the early days, Internet users were very naïve towards email attachments, contributing to...

View Article

What CSOs should do in their first days

It used to be common for new chief security officers to come in with guns blazing. The security personality stereotype was a machismo type who wanted to be seen as the hero in saving the company’s...

View Article


In an IT security job hunt, experience matters

The end of the year always brings about thoughts of what changes should occur in the coming year. If a change of job is in your thoughts, security executives say they look at prospective employees’...

View Article

Image may be NSFW.
Clik here to view.

How to stop shadow IT

Stopping the armchair IT folksImage by Mette1977 What do complex IT policies, outdated software and lack of IT-supported services have in common? They all contribute to shadow IT, which occurs when...

View Article


Image may be NSFW.
Clik here to view.

How to respond to ransomware threats

Don't jumpImage by ThinkStockRansomware is obviously analogous to kidnapping, and dealing with the perpetrators can feel much like negotiating with a jumper standing on the edge of high-rise roof. The...

View Article

Where to cut corners when the security budget gets tight

Whenever creating a budget, there is always the rainy day fund or the contingency account in case of unexpected circumstances. But what if those circumstances are a data breach that is bigger than you...

View Article

Top 10 ways to retain IT security talent

(Insider Story)

View Article
Browsing all 110 articles
Browse latest View live




Latest Images