gig economy How the Gig Economy Is Changing the Tech Industry

27 Oct, 2017

The gig economy is clearly disrupting the tech industry, both in positive and negative ways....More >

HCI 10 Reasons Why the Enterprise Is Turning to Hyperconverged Infrastructure

26 Oct, 2017

While HCI is certainly innovative in design, its true measure lies in the practical benefits it brings to data center management and operations....More >

Classroom tech Ten New Technologies Transforming the Classroom

27 Sep, 2017

Here are 10 ways that college professors are taking advantage of the technology students currently use and adding new technologies to enhance the teaching and learning experiences....More >

hurricanes How Communications, Preparation and Willingness to Help Were Keys in Hurricane Crises

20 Sep, 2017

Entrepreneurial thinking, innovation and selflessness can make things better during crises. Here is a look at how organizations reacted and telecommunications products helped during recent hurricane crises....More >

PAM PAM Solutions: Critical to Securing Privileged Access

25 Aug, 2017

To protect the company from those insiders who abuse their privileged access and from hackers with stolen credentials, many companies are turning to a privileged access management (PAM) solution....More >

Fake news How Can We Fix the Fake News Problem?

24 Aug, 2017

Is fake news a security issue? Some say yes, as it can be used as a social engineering tool to spread disinformation and conceivably to get unsuspecting users to click on malicious links....More >

blockchain The World According to Blockchain

09 Aug, 2017

Blockchain comes with many costs and is surrounded by confusion. Here, we examine realistic use cases, drawbacks and the potential of blockchain....More >

IoT challenges IoT: Top 7 Challenges

19 Jul, 2017

The IoT represents a unique set of challenges that pose a real threat to its utility as an engine of economic growth. Fortunately, the problems encountered so far are solvable, although it will probably take some time to determine exactly how to handle them and what level of optimization is needed for the multiple IoT services that are certain to arise....More >

biometrics Biometrics: Moving Far Beyond Fingerprints

28 Jun, 2017

Biometrics are changing the way we think about security. Here are some of the more innovative ways biometrics are being used and what we can expect in the future....More >

bots How Bots Are Going to Work to Increase Efficiency

20 Jun, 2017

Businesses are adopting bots to enhance business practices, in everything from procurement to marketing to sales to recruiting....More >

Remote wipe 10 Steps Your Organization Should Take to Keep Mobile Device Data Secure

26 Apr, 2017

In the wake of new reports of serious breaches of mobile devices and data, security professionals share their tips for securing mobile devices and their favorite security solutions....More >

Privacy rollback Security Pros Give Their Opinions on ISP Data Privacy Rollback

26 Apr, 2017

IT staff, organization leaders, and the average citizen have all expressed levels of concern over the FCC about-face in regard to ISP privacy. Here’s what the security experts say....More >

IBM Watson How and Why Companies Are Incorporating the Power of IBM Watson

31 Mar, 2017

Watson continuously learns from previous interactions, gaining in value and knowledge over time. Learn how companies are harnessing that AI power to create and improve products and services....More >

Wearables How Wearable Devices Are Creating Innovation in the Workplace

28 Mar, 2017

Wearables are revolutionizing the workplace, with innovations that create a safer work environment or enhance the way professionals are able to go about their job....More >

IT security skills 7 Top Skills for Security Pros

27 Feb, 2017

Executives at several top tech firms outline the skills they need now and in the near future, including IaaS and IoT security expertise. Other skills listed may surprise you....More >

IT security careers The Most In-Demand Security Jobs and How to Get Them

31 Jan, 2017

Security professionals are in demand right now, and entry-level security jobs generally fall into either an engineer or analyst role. Find out more about required skills and career paths....More >

142x105itbeusasecurity2.jpg 9 Predictions for Cybersecurity’s Role in Government and Politics in 2017

17 Jan, 2017

Experts predict how cybersecurity will affect and involve our government, policies and politics in 2017....More >

Shadow IT Security How Risky Behaviors Hurt Shadow IT Security

12 Dec, 2016

Examine some of the concerns involving shadow IT security and some of the riskiest behaviors, applications and devices....More >

BitSightRansomware0x Ransomware: The Rising Face of Cybercrime

04 Nov, 2016

Ransomware is a legitimate threat, with estimates from the U.S. Department of Justice showing that over 4,000 of these attacks have occurred every day since the beginning of the year....More >

Pages:   1 23Next »  Last
Subscribe Daily Edge Newsletters

Sign up now and get the best business technology insights direct to your inbox.