How long does it take to build a custom app?
Thanks to advances in app-building technology and a changing mindset, the answer may surprise you.
Thanks to advances in app-building technology and a changing mindset, the answer may surprise you.
From wearables to appliances to e-readers, there’s no shortage of possible security holes when almost every device is connected. What’s a CIO to do?
If you’re not testing the performance of the mobile apps your company is deploying, you may be driving your employees into the shadows.
A new study shows that, on average, each computer in every office around the world has about $259 of unnecessary, unwanted or unused software on it. That’s a lot of shelfware – and it’s costing companies big-time.
While a recent study turns the idea of a ‘blockbuster’ app on its head, there’s no doubt that enterprise companies are embracing apps – especially mobility apps – in a big way.
Those fraudulent charges most of us have (hopefully) seen and corrected on our credit or debit cards are costing everyone a lot of money.
It's that time of year: Round ups, hot takes and eulogies for the year abound. We're no different, but we're going to tell the story of 2015 a little differently -- though numbers. Ten of them to be exact. In no particular order, here's how hackers and scammers and the many security flaws they found got us on edge for this year … and the next.
While a certain percentage of them are almost certainly suspect, customer-driven online ratings and reviews are just too powerful to simply ignore. But does anyone really trust them?
The rise of IoT technology brings with it the promise of innovation the likes of which we’ve never seen. But the reality of everything being connected can have unintended consequences, not all of them useful.
The capability to profile potential cybercriminals, along with the implementation of chip-and-pin credit cards, may produce a reduction in the amount of money lost to online fraud each year. But that doesn’t mean the threat will go away entirely.
Malicious ads on the websites you visit aren’t a new phenomenon. The fact that they now avoid detection and don’t need you to click on ‘em to infect your computer is new, and increasingly troublesome.
The BYOD movement, once looked on as the holy grail of employee satisfaction and IT mobile device security, is increasingly being supplanted by a number of options – such as COBO, CYOD, COPE – that draw a thicker line between personal and business uses.
Bring-your-own-device policies in the workplace often pit employee satisfaction and privacy against corporate security. And as the number of employees and companies participating in BYOD programs continues to fall, can enterprise apps be the linchpin of BYOD success in the workplace?
A mid-year report shows that people aren’t necessarily getting smarter about security, even in the face of increased attacks from cybercriminals.
Once upon a time, BYOD and the consumerization of IT was held up as a paragon of productivity and cost savings for enterprises that embraced the concept. Now? Not so much… What happened?