Quantcast
Channel: InfoWorld Bob Violino
Browsing all 126 articles
Browse latest View live

A clear-eyed guide to Android's actual security risks

If you're an Android user -- or want to be -- you've likely heard about all the security risks of Google's mobile operating system. But how real are these threats, and how much damage can they do?...

View Article



Which vendors will be on target in the era of New IT

The major technology shifts under way -- the move to cloud-based services and reduced importance of the data center, the growth of mobile devices and apps and related decline in use of traditional PCs,...

View Article

A clear-eyed guide to Mac OS X's actual security risks

Apple's Mac computers and its OS X operating system have enjoyed a reputation of being relatively secure over the years. But in fact, experts say, the Apple OS has had security issues that might have...

View Article

9 signs you should jump ship to a new job

If leading job indicators are to be believed, many tech workers are enjoying high demand for their services these days, making this the prime time to assess whether your current employer is a good fit...

View Article

Developing a smart approach to SMAC security

Few security executives at global enterprises -- or even at smaller organizations -- have not had to deal with issues related to social media, mobile technology, big data/analytics, or cloud...

View Article


BYOD morphs from lockdown to true mobility

Many companies that have had BYOD policies for a while have matured their thinking. They've grown from looking at employees' personal devices as something to lock down to allowing them in a limited...

View Article

SDS still young, but very much on the rise

Anything "software-defined"-- networks, storage, data centers--is grabbing a lot of attention these days. Security is no exception. Software-defined security (SDS) is an emerging model in which...

View Article

Betting big on the 'SMAC stack'

The concept of creating an IT infrastructure that supports and integrates social, mobile, analytics and cloud is gaining ground, and some industry experts and IT executives are convinced that the next...

View Article


You’ve been hacked. Now what?

What should a company do after it’s been hacked? It’s a question Target, Home Depot, Sony Pictures Entertainment and others have had to ask over the past year or so. And it’s likely that other...

View Article


MDM features and functions compared

Mobile device management tools are transforming into enterprise mobility management (EMM), which includes app and data security, among many other things. And while all the major offerings in this...

View Article

Mobile device management continues to broaden

Mobile device management (MDM) products continue to evolve as mobility takes on an increasingly important role in the enterprise, and as vendor consolidation continues.To read this article in full or...

View Article

Robotic process automation: The new IT job killer?

A quiet revolution with a potential impact on the IT workforce reminiscent of outsourcing may be under way in the form of robotic process automation.Geared toward automating a variety of business and...

View Article

Antivirus doesn’t work. So why are you still using it?

For years, companies have relied on antivirus (AV) software to help detect, prevent and remove malicious code before it becomes a problem.To read this article in full or to leave a comment, please...

View Article


The real dirt on programming certifications

With programmers and developers in such high demand these days, it may be tempting to think that a decision as stodgy as pursuing a certification is a waste of time. After all, doesn’t it all come...

View Article

Crowdsourcing your security

The formal security programs at most companies include a finite number of managers and staffers. But the fact is, everyone within an organization should be responsible on some level for contributing...

View Article


Road warriors are prime targets for hackers

Many executives -- particularly senior business leaders -- frequently travel worldwide as part of their jobs. Hackers and cyber criminals know this, and that adds a risk factor that companies should...

View Article

The hidden pitfalls of going freelance in IT

The life of an independent IT contractor sounds attractive enough: the freedom to choose clients, the freedom to set your schedule, and the freedom to set your pay rate while banging out code on the...

View Article


Identifying the security pitfalls in SDN

Software-defined networks can be a boon to savvy organizations, offering opportunities to cut administrative costs while increasing network agility. But SDN technology can also create security risks,...

View Article

7 steps to biometric bliss

Every time you access your phone via fingerprint reader, you're using biometric identification technology. So, while biometrics on the consumer side has become commonplace, a number of barriers have...

View Article

Real-world devops failures -- and how to avoid them

Everything about devops sounds great. It's a practice that emphasizes collaboration and communication between software developers and other IT staffers and management, while automating tasks such as...

View Article
Browsing all 126 articles
Browse latest View live




Latest Images