Catch a glimpse of what flourishes in the shadows of the internet.
Stories by Josh Fruhlinger
Endpoint security is a rapidly developing category, as organizations look to coordinate control of the PCs, servers and phones on their networks to keep out malware and intruders. Let's look at what the year ahead has in store.
Endpoint security is focused on locking down endpoints — individual computers, phones, tablets and other network-enabled devices — in order to keep networks safe. Of course, as threats evolve, endpoint security suites must evolve as well.
The Chief Security Officer (CSO) is the executive responsible for the organization's entire security posture, both physical and cyber, and has the big picture view of the company's operational risk.
If it ain't broke, don't fix it. If it breaks, buy a replacement part on eBay and stubbornly refuse to upgrade.
Whether you want to lower your cell phone bill or find true love, there's usually a way around your problems
Execs at AOL and Verizon hope their merger will be a story for the ages, not a cautionary tale.
In Pictures: Tech's ticking time bombs - The components you might (and might not) expect to wear out
Your computer's next point of failure might be further up the stack than you think
With big layoffs rumored to be close on the horizon, IBM is going to need to use another regeneration.
You have two options when it comes to beating the automated systems that filter resumes: you can go through them, or you can go around them.
You're definitely going to meet them. Hopefull you aren't one of them.
Proof that no matter how much time, effort, and money you put into something, it may sink like a stone and stay at the bottom
Some buzzwords evolve from the foam of language; others are invented in strokes of evil genius
These scorned IT staffers had their vengeance on their former employers -- but most got their comeuppance in the end.
If you don't like their answer, wait a while, maybe it'll change.