12 top resolutions for 2019
Tech teams need to lose the grunt work, go on a dev diet, and exercise more strategic thinking.
Tech teams need to lose the grunt work, go on a dev diet, and exercise more strategic thinking.
IT departments want to control the devices employees bring into the workplace. Employees say, 'my device, my rules.' It's an epic battle that promises to rage on, but who's winning right now? Check out this infographic for a BYOD scorecard.
After giving away the farm, some IT departments are bringing select outsourced services back in-house. Here's how they're doing it.
This paper explores how enterprises can move beyond the password (something the user ‘knows’) to an intelligent authentication process that eliminates the risk of weak and vulnerable passwords. It works by cross-validating with other authentication methods like a physical item such as a token or smartphone (something the user ‘has’) and/or a personal attribute like a fingerprint or retina scan (something the user ‘is’). Two-factor (2FA) authentication and multifactor authentication (MFA) are now possible with intelligent authentication across corporate software, Cloud services and smart device apps.