Many organizations are already incorporating IoT technologies into their products, processes and workflows, but 2018 is shaping up to be a breakout year for IoT deployments. Here are six IoT trends to watch in 2018.
Big Data / Features
Monitoring the dark web to see if your data is being sold there is risky, but solutions and services are available to help.
Project managers play a vital role in organizational success. Having the right set of tools to tackle analytics, requirements, change and project progress will help you perform at your best.
When individuals and departments bypass IT to acquire cloud services and apps, IT and security teams are blind to the security vulnerabilities and compliance issues they present.
With 14,000 organizations worldwide using its business collaboration app, Facebook has a foothold in the enterprise, but it faces stiff competition on multiple fronts.
Yes, password length and complexity matter, but only if you apply those qualities to the proper security context.
Understanding the emerging world of 'fake everything' is vital for figuring out what you and your company can do about it.
The company’s Slack rival, launched six months ago, will ‘over time’ become the primary communications client in Office 365.
The era of installing software from a CD or from a datacenter’s server is coming to a close, as internet-delivered software makes applications available anywhere, anytime
With agile fast becoming standard practice at most companies, scrum masters are in great demand. Here is a look at the Scrum master role, relevant certifications, expected salaries, and job listings.
Not every problem can be solved by machine learning, and not every company is poised to apply AI. Here’s how to know whether your IT organization is ready to reap the benefits of artificial intelligence.
Cyber-attack maps can be fun to look at, but are they useful? As usual, when it comes to security context is key, so CSO looked at eight of the web's most popular cyber-attack maps. While the maps themselves are mostly eye candy with limited context, there are some creative ways they can be used.
Whether it's local or from the Web, there are several ways to get data into R for further work.
Amazon promises AWS S3 customers that they will be able to identify and protect sensitive data faster with Macie, but is it enough to catch up to what Microsoft and Google offers?
Microsoft Power BI provides organizations with self-service business intelligence tools that allow users to analyze, visualize and share data using the familiar Microsoft Excel spreadsheet. Here are 12 success stories built on Power BI.
Business analysts have traditionally served as a bridge between an enterprise IT department and the business units to ensure that software has the functions that users need. But the role is evolving to include responsibility for successful adoption of new software applications.
While any enterprise is a possible ransomware target, some are more likely than others to be caught in a cybercriminal’s crosshairs.
One IT professional services firm is meeting increasing demand for U.S.-based skills by training military veterans in key IT domains, from business analysis to devops.
Corporate applications (and their users) are likely to benefit from the intuitiveness of mobile app interfaces.
With tighter post-financial crisis regulation on larger amounts of money, and safer chip-enabled debit and credit cards, fraud has shifted to a new target, gift cards.