dcsimg

Security

Articles

Top Mobile Device Management Tools for the Enterprise

Mobile device management (MDM) is a major element of the fight to secure devices and there are many ambitious options in the MDM sector. More >

Mobile Device Management and the Enterprise

Mobile device management (MDM) deals with the basics of securing devices. It was the first response once the mobile ecosystem figured out that people were doing real work with real data from mobile devices. MDM is a foundational element of security mobility. More >

BlackBerry and Cylance: Moving Aggressively to Secure the Coming IoT World

BlackBerry is working hard to become the go-to vendor for IoT security, including with a Cylance acquisition. More >

ERP Faces New Security Threats

ERP usually touches some of the most mission-critical data and services in the enterprise, making it a tempting target for wrongdoers. But there are ways to protect yourself. More >

Bringing Cybersecurity and Privacy Together

The intersection of privacy and security is not as bumpy as some believe, one expert says. More >

Apple’s Interest in a National Privacy Law: Promoting Consumer Protection or Self-Serving?

Will the states be the movers and shakers of data privacy regulations and seemingly keep consumer interests as the priority or will Apple and other tech companies take the lead to benefit themselves? More >

More Articles >

Interviews

CEO Shares Insights on Preventing Data Loss, Handling Data Breaches

Datacastle CEO Ron Faith discusses mitigating the risk around employees walking out the door with sensitive company data.

More >

Citrix CSO: Treating IT Security Symptoms Is the Problem, Not the Solution

Stan Black, chief security officer at Citrix Systems, says companies need to be focused on data analytics, machine learning, and an understanding of individuals’ roles.

More >

‘Security Operations Center’ Approach Is Fail-Safe Against Cyberattacks, CEO Says

A key line of defense will take the form of “security operations centers,” or SOCs. And with SMBs expected to be targeted more aggressively by the bad guys, making the SOC approach affordable is going to be essential.

More >

More Interviews >

Most Popular Features

The Secrets of HP’s Success: A New Standard Emerges

HP success is tied to an executive staff that works as a team and has priorities that are in line with its customers, employees and investors.

How to Create a Digital Transformation Strategy

A digital transformation strategy can be created in one of two ways: in a bottom-up approach that relies on initiative of business units or in a top-down approach involving the CEO and board of directors.

Editor's Choice

Productivity Suites Are Getting Smarter

The newest wave of productivity suite solutions appears poised to launch another generational shift in the business world in the form of intelligent processes and smart digital assistants.

 More >

Apple Adds Mandatory Privacy Policy to the App Store

Univa Survey Finds Wide Chasm for AI to Cross

GDPR Compliance Is Lagging. What Can American Legislation Learn?

The Best New-Collar Job: A Mainframe Technician?

 

Articles  |  Interviews  |  Guest Opinions  | Slideshows

Related IT Downloads

Compliance2 Building a GRC Program: Assessing Stakeholder Needs and Readiness

This table outlines the top needs of each stakeholder group that can help guide your conversations on priorities and needs...

Security95-290x195.jpg Guide to Cyber Threat Information Sharing

This publication provides guidelines for establishing and participating in cyber threat information sharing relationships....

email9 Trustworthy Email

This document provides recommendations and guidelines for enhancing trust in email, including transmission and content sec...

Infra81.jpg Software Quality Assurance: Integrating Testing, Security, and Audit

This excerpt focuses on the conceptual aspects of defect management, including the basic concepts of a defect, how to mana...

More IT Downloads>

Subscribe Daily Edge Newsletters

Sign up now and get the best business technology insights direct to your inbox.