Articles
Should Apple let the government break encryption, asks every other e-mail Scott has received this week? The premise behind that question is the product of misinformation.
Continue reading...
Security is a priority for vendors moving onto the Internet of Things (IoT) — a fact that explains why Webroot just released new tools to protect IoT connected devices.
Continue reading...
Xerox likes to do things in a big way. At least that's the message it sent today by launching ten apps to automate document related processes, and, in the process, push many of them into the mobile world.
Continue reading...
At the crux of many management decisions today is the tradeoff between control and simplicity. Brands like to boast about simplicity. "We’re really simple to use, simple to do business with." Nobody boasts about their complexity. "We’re really complex to use, complex to do business with.
Continue reading...
Back in 1975, singer-songwriter Paul Simon told us there must be 50 ways to leave your lover. But that was before we all had perpetual connectivity to every person, place and thing we ever knew or imagined through smartphones, tablets and other assorted Internet-connected devices.
Continue reading...
How can small- and medium-sized businesses (SMBs) protect themselves against cyberthreats? A recent report from security firm Lookout, written for Californians, is useful for SMBs in any state. The report, "Cybersecurity in the Golden State," was published by the California Attorney General's office.
Continue reading...
Everything goes better with Internet. Deep down, that’s probably what’s allowed the Internet of Things to transform from being a visionary concept to an integral part in the product plans of major manufacturers and service providers in less than three years.
Continue reading...
Your email is blowing up. Your phone is buzzing. You are not even done with your commute and you've already lined up two conference calls, a chat session and a cooperative exchange of Google Docs.
Continue reading...
SharePoint connecting to FileLocker Bring-Your-Own-Device (BYOD) strategies are starting to dovetail with SharePoint, as enterprises struggle to balance a need for security with demand for access. Platform-as-a-Service vendor Infrascale has released a possible solution with the availability of SharePoint connectors for its FileLocker enterprise collaboration solution.
Continue reading...
If you're struggling to manage mobile at work, you may need to look at all the ways that mobile has infiltrated the lives of your employees. It's no longer just about which device they use, but also about the types of apps they use.
Continue reading...
We talk a lot about the mobile enterprise and the different elements that define it -- security, device management, business processes and more.
Continue reading...
Over 80% of IT professionals don't know how much of their organization's regulated data is stored on a mobile device or in the cloud, a survey has found, and even the data known to be on a device often remains weakly secured. Supposedly Secure Data Goes Unprotected Mobile data is
Continue reading...
Mobile devices have truly grown up. Security firm Symantec has found what it believes is the first ransomeware threat that targets mobile devices.
Continue reading...
As with the rapid adoption of any trend, mobile in the enterprise has generated its share of myths. It seems that for every solution enabled by mobility, there is a common misconception about user privacy, security and compliance. For instance, though Android malware generates headlines, a recent survey found that
Continue reading...