A clear-eyed guide to Mac OS X's actual security risks
Apple has improved its security in recent years, but is it enough?
Apple has improved its security in recent years, but is it enough?
The major technology shifts under way -- the move to cloud-based services and reduced importance of the data center, the growth of mobile devices and apps and related decline in use of traditional PCs, and the greater emphasis on big data/analytics rather than traditional analytics -- are having a huge impact on corporate IT.
There's a trend underway in the information security field to shift from a prevention mentality--in which organizations try to make the perimeter impenetrable and avoid breaches--to a focus on rapid detection, where they can quickly identify and mitigate threats.
If you're an Android user -- or want to be -- you've likely heard about all the security risks of Google's mobile operating system. But how real are these threats, and how much damage can they do? Despite the fears, are Android devices actually a safe bet for an enterprise mobility strategy?
Bland by name and superficially viewed as gee-whiz technology never to be realized, the Internet of things (IoT) has significant potential to transform business. Early forays into Net-enabling physical objects are already pointing the way.
The rapid growth of mobile devices that can access corporate networks and data, the expanding use of cloud-based IT services, and the increasing popularity of apps such as online banking mean that IT needs to pay closer attention to authentication.
When people talk about the Internet of Things (IoT), the most common examples are smart cars, IP-addressable washing machines and Internet-connected nanny cams.
Failed expectations, increased costs, unnecessary legal risks -- going blind into a big data project doesn’t pay
Social media mania is having a huge impact on traditional business applications. Companies that are leveraging this trend are seeing significant benefits, including collaboration and data sharing in ways they've not experienced before.
Security pros and government officials warn of a possible cyber 9/11 involving banks, utilities, other companies, or the Internet
Radio-frequency identification (RFID) technology has shown promise as a way to monitor the movement and even the condition of all sorts of objects.
If you travel to China or Russia, assume government or industry spooks will steal your data and install spyware. Here's how to thwart them
Poor communication, shortsighted contracts -- don't get derailed by an IT outsourcing agreement gone awry
If you're CIO at a large enterprise -- or a small one, for that matter -- chances are good that you're seeing a steady rise in the number of employees using smartphones and tablets at work.
Increased flexibility, faster delivery, and -- yes -- reduced cost can be yours if you approach insourcing with these five tips in mind