Fragmentation Still Dogs Android

The reality is that fragmentation is a bigger deal in the enterprise than the consumer sector. More >

Expectations vs. Reality: Five Ways to Improve Cybersecurity Awareness

Security experts can take steps to bridge the gap and help to reinforce best practices among their colleagues. More >

Cybersecurity Awareness Month Off to a Rocky Start

Several major data breaches may be part of a ripple effect. More >

5 Lessons to Brush Up Your Cloud Security Knowledge

Classes are officially in session. What better time than the start of a new school year to brush up on your cloud security knowledge? More >

GE Predix Seeks to Do Something with All that IoT Data

News this week included general availability of GE Predix for data analytics, a large Android vulnerability, Nest's Weave application layer and quantum computing. More >

Present and Future Applications of the Internet of Things

A surprisingly diverse number of opinions were revealed about the current status of IoT adoption, where it will be in the future, and how to leverage it today. More >

More Articles >


Collaboration Between HR, IT Essential to Prevent Data Breaches, HR Exec Says

As the HR director for a data loss prevention company, Jacqui Summons has learned a thing or two about how HR and IT need to interact for the best data security outcome.

More >

MacKeeper Has More Work to Do to Clean Up Its Act

A spokesperson from Kromtech Alliance explains how MacKeeper ended up with a tarnished reputation and what the company is doing to fix it.

More >

A Conversation About Symantec’s 2015 Internet Security Threat Report

A Symantec exec breaks down the three main categories of cybersecurity threats.

More >

More Interviews >

Most Popular Features

The 2015 Nominees for Best Business Smartphone App Are…

In their fourth year, the Tabby Awards are introducing a new category specifically for the best business smartphone apps -- the Mobby Awards/Business.

Riverbed to Unleash Project Tiger to Kill Branch Routers

Riverbed CTO Hansang Bae says that rather than requiring IT to deploy and manage complex infrastructure inside the branch, Project Tiger will become the foundation through which storage and security services are provided in the branch office.

How to Be a Winner: 5 Keys to Achieving Big Goals

Everyone wants to do great things, but few actually do. Why? Most people are either afraid to think big, believe they don't have what it takes, or don't want to commit to putting in the kind of effort required to accomplish anything truly great.

Related IT Downloads

Security35-290x195.jpg Secrets: Managing Information Assets in the Age of Cyberespionage

In this excerpt, Pooley focuses on managing your information assets, specifically looking at how to keep them safe, stay o...

Security28 Web Security: A WhiteHat Perspective

This excerpt from chapter 2 focuses on major browser security issues, including same-origin policy, sandboxing, malicious ...

Misc29 Interfaces for Personal Identity Verification

This document contains the technical specifications to interface with the smart card to retrieve and use the PIV identity ...

Security7 Risk Management for Replication Devices

This publication provides guidance on protecting the confidentiality, integrity, and availability of information processed...

More IT Downloads>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


Thanks for your registration, follow us on our social networks to keep up-to-date