Careers | News, how-tos, features, reviews, and videos
The Sony breach, among others, revealed the unsurprising fact that users choose weak passwords. So why do providers allow them?
The future of IT rests on supporting 'single-actor practices' performed in collaboration, not in isolation
In these two tech stories, overlooked details yield solutions to users' IT problems
Survey shows IT workers expect a rapid adoption of the cloud and a change in, not loss of, IT roles
The arrest in the U.K. is the first blow by law enforcement against the hacking collective
Amazon Web Services customers often have poor security practices, inadvertently publishing security keys and passwords
Qualys and McAfee lead the way in six-vendor test of automated tools that scan and report on vulnerabilities
Few events can cripple an IT organization like an admin gone rogue. Here's how to spot them and how to minimize the fallout
A conversation with InfoWorld security expert Roger Grimes reveals why the latest burst of attacks is just business as usual
It's getting harder and harder to secure an Internet-connected network. In fact, it's no longer possible