At some point this summer, ARIN will no longer be able to fulfill requests for IPv4 addresses. But that's not a huge problem if ISPs continue working toward IPv6. More >
SEC Consult has identified a vulnerability in NetUSB, which could allow hackers to exploit routers and other IoT devices on the network. More >
Good Technology this week announced that users of its Good Work secure mobile email application can now both view and edit Microsoft Office attachments. More >
Perhaps part of the problem is that no one seems sure about who is in charge of security. More >
BYOD may be a convenient and inexpensive way to bring mobile tech to SMBs, but owners must realize that these devices can be dangerous and need high-level protection. More >
Despite what the executives of several carriers said prior to the FCC ruling, most are still investing in new broadband deployments. More >
Dell conducted a study to fully understand exactly how technology is shaping the workforce and help its customers respond to these challenges and opportunities.More >
The Global Evolving Workforce Study revealed new attitudes toward productivity, mobility and sneaking personal devices into work.More >
An entrepreneur who's been designated as one Stanford grad who might change the world is working on a wearable device to capture and analyze health data.More >
Enterprise software development is a massive undertaking. Yet, surveys show that more than half of businesses are flat-out terrible at getting users to adopt new software.
HP is failing because the folks who run it don’t know how to run a company like HP. Board members could save it, but maybe they are part of the problem.
Quick, name a horrible boss you've had (or have). Unless you've yet to hold a job, it's unlikely that you had any trouble bringing a name or two (or three) to mind.
A motivated attacker will get into your network. The key is how quickly and accurately you are able to find the active breach.More >
This document analyzes approaches to identity management for public safety networks in an effort to assist individuals dev...
The purpose of this document is to help organizations understand the process for vetting the security of mobile applicatio...
This guide provides an in-depth look into mobile devices and explains technologies involved and their relationship to fore...
This excerpt from chapter 6 looks at the use of Wi-Fi-enabled mobile medical devices in health care settings....