This week in tech, BlackBerry to buy out Good Technology, AppLock security app filled with vulnerabilities, and cellphone use on planes still up in the air. More >
Lenovo has revealed a new series of laptops and desktops aimed at satisfying the needs and budgets of small to midsize businesses. More >
Everything comes at the expense of Microsoft’s Internet Explorer, which formerly was dominant. That trend line continues. And, to add insult to injury, not even Microsoft is onboard with it anymore. More >
Security firm, G DATA uncovered issues with malware being installed on mobile phones in China while in route within the supply chain. This brings big questions about supply chain security. More >
Every organization should be prepared for an emergency event--be it weather related or otherwise. Having a detailed plan is key to keeping employees and the business safe. More >
The early (or, arguably, not so early) vendor and carrier activity is not limited to research and development. There also will be efforts to gain favorable position with regulators. More >
An Appster executive chimes in on smartwatches and how they might fare in the market. He also discusses how apps and interconnectivity will contribute to their success or demise.More >
Dell conducted a study to fully understand exactly how technology is shaping the workforce and help its customers respond to these challenges and opportunities.More >
The Global Evolving Workforce Study revealed new attitudes toward productivity, mobility and sneaking personal devices into work.More >
More companies are making this major change in order to benefit all employees and the bottom line.
It finally feels as though we're about to hit the point of no return with IoT. IT departments must now consider and address the security implications.
Starting a new job is a chance to start fresh with a brand-new group of colleagues. It's an opportunity to build on the skills you learned at your last job and develop additional areas of expertise.
By focusing security resources on detection and containment, with a strong emphasis on network visibility, enterprises can turn the tables on cyber criminals.More >
This document analyzes approaches to identity management for public safety networks in an effort to assist individuals dev...
The purpose of this document is to help organizations understand the process for vetting the security of mobile applicatio...
This guide provides an in-depth look into mobile devices and explains technologies involved and their relationship to fore...
This excerpt from chapter 6 looks at the use of Wi-Fi-enabled mobile medical devices in health care settings....