A clear-eyed guide to Android's actual security risks
If you're an Android user -- or want to be -- you've likely heard about all the security risks of Google's mobile operating system. But how real are these threats, and how much damage can they do?...
View ArticleWhich vendors will be on target in the era of New IT
The major technology shifts under way -- the move to cloud-based services and reduced importance of the data center, the growth of mobile devices and apps and related decline in use of traditional PCs,...
View ArticleA clear-eyed guide to Mac OS X's actual security risks
Apple's Mac computers and its OS X operating system have enjoyed a reputation of being relatively secure over the years. But in fact, experts say, the Apple OS has had security issues that might have...
View Article9 signs you should jump ship to a new job
If leading job indicators are to be believed, many tech workers are enjoying high demand for their services these days, making this the prime time to assess whether your current employer is a good fit...
View ArticleDeveloping a smart approach to SMAC security
Few security executives at global enterprises -- or even at smaller organizations -- have not had to deal with issues related to social media, mobile technology, big data/analytics, or cloud...
View ArticleBYOD morphs from lockdown to true mobility
Many companies that have had BYOD policies for a while have matured their thinking. They've grown from looking at employees' personal devices as something to lock down to allowing them in a limited...
View ArticleSDS still young, but very much on the rise
Anything "software-defined"-- networks, storage, data centers--is grabbing a lot of attention these days. Security is no exception. Software-defined security (SDS) is an emerging model in which...
View ArticleBetting big on the 'SMAC stack'
The concept of creating an IT infrastructure that supports and integrates social, mobile, analytics and cloud is gaining ground, and some industry experts and IT executives are convinced that the next...
View ArticleYou’ve been hacked. Now what?
What should a company do after it’s been hacked? It’s a question Target, Home Depot, Sony Pictures Entertainment and others have had to ask over the past year or so. And it’s likely that other...
View ArticleMDM features and functions compared
Mobile device management tools are transforming into enterprise mobility management (EMM), which includes app and data security, among many other things. And while all the major offerings in this...
View ArticleMobile device management continues to broaden
Mobile device management (MDM) products continue to evolve as mobility takes on an increasingly important role in the enterprise, and as vendor consolidation continues.To read this article in full or...
View ArticleRobotic process automation: The new IT job killer?
A quiet revolution with a potential impact on the IT workforce reminiscent of outsourcing may be under way in the form of robotic process automation.Geared toward automating a variety of business and...
View ArticleAntivirus doesn’t work. So why are you still using it?
For years, companies have relied on antivirus (AV) software to help detect, prevent and remove malicious code before it becomes a problem.To read this article in full or to leave a comment, please...
View ArticleThe real dirt on programming certifications
With programmers and developers in such high demand these days, it may be tempting to think that a decision as stodgy as pursuing a certification is a waste of time. After all, doesn’t it all come...
View ArticleCrowdsourcing your security
The formal security programs at most companies include a finite number of managers and staffers. But the fact is, everyone within an organization should be responsible on some level for contributing...
View ArticleRoad warriors are prime targets for hackers
Many executives -- particularly senior business leaders -- frequently travel worldwide as part of their jobs. Hackers and cyber criminals know this, and that adds a risk factor that companies should...
View ArticleThe hidden pitfalls of going freelance in IT
The life of an independent IT contractor sounds attractive enough: the freedom to choose clients, the freedom to set your schedule, and the freedom to set your pay rate while banging out code on the...
View ArticleIdentifying the security pitfalls in SDN
Software-defined networks can be a boon to savvy organizations, offering opportunities to cut administrative costs while increasing network agility. But SDN technology can also create security risks,...
View Article7 steps to biometric bliss
Every time you access your phone via fingerprint reader, you're using biometric identification technology. So, while biometrics on the consumer side has become commonplace, a number of barriers have...
View ArticleReal-world devops failures -- and how to avoid them
Everything about devops sounds great. It's a practice that emphasizes collaboration and communication between software developers and other IT staffers and management, while automating tasks such as...
View Article
More Pages to Explore .....