Getting employees to take security seriously can be a game that everyone wins.
By Lamont Wood | 17 July, 2014 14:05
The new Apple-IBM partnership seems sure to help Apple sell more iPads to businesses, but it may also be setting off alarm bells at mobile device management companies large and small.
By Matt Hamblen | 17 July, 2014 02:57
Companies including MITRE are looking at privileged access and how to better lock it down -- without stopping employees from doing their jobs.
By Sandra Gittlen | 14 July, 2014 20:33
In these lean times, backups aren't what they used to be; it's inevitable that IT staffers will be called to help, especially when an important issue is brewing.
By Esther Shein | 10 July, 2014 21:23
Plans by smart thermostat maker Nest Labs to share some customer data with corporate parent Google means the search engine giant will be fending off privacy concerns as it expands into home automation.
By Jaikumar Vijayan | 27 June, 2014 04:58
Google will provide enterprise-focused security and management features to its entire Android showcase of mobile devices, including features reserved only for Samsung devices running Samsung security software called Knox, a Google executive announced during the Google I/O keynote address Wednesday.
By Matt Hamblen | 26 June, 2014 06:59
Two months after Microsoft ended support for Windows XP, the catastrophic wave of exploits security experts expected to wash over the aged operating system have failed to materialize.
By Gregg Keizer | 09 June, 2014 04:53
Insecure by design and trusted by default, embedded systems present security concerns that could prove crippling
By Paul Roberts | 02 June, 2014 20:10
With hidden malware on the rise, the online advertising industry may finally have to get its governance act together.
By Robert L. Mitchell | 29 May, 2014 21:13
With Europe's top court ordering Google to allow people to basically edit their online personal histories, some wonder what this will mean for finding the truth online.
By Sharon Gaudin | 15 May, 2014 06:23
Beware bold promises from a multibillion-dollar industry that can't prevent your IT systems from being routinely hacked
By Roger A. Grimes | 12 May, 2014 20:03
Massive leaps in computing power, hidden layers, hardware backdoors -- encrypting sensitive data from prying eyes is more precarious than ever
By Peter Wayner | 05 May, 2014 20:03
IT can never take all the risk out of a supply chain, but it can help organizations minimize their vulnerability in a world of new threats.
By Howard Baldwin | 30 April, 2014 20:04
Microsoft may be prepping to ship a mini version of its Surface tablets within a month, based on an Amazon.com listing for a case custom made for the device.
By Tim Greene | 25 April, 2014 04:09
The U.S. commercial drone industry is still struggling to get off the ground more than two years after President Obama signed into law a bill that permits the civilian use of unmanned aerial vehicles (UAV) over the country's airspace.
By Jaikumar Vijayan | 18 April, 2014 21:36
Let's face it: No matter what device you use, you're in danger. Security threats and malware lurk on Windows PCs, Macs, and Android and iOS devices. If you use more than one device -- like most of us do -- that makes it even more difficult and expensive to be vigilant and keep yourself safe.
By Preston Gralla | 04 April, 2014 01:00
Online tracking is on the rise, but efforts to create a practical Do Not Track policy have slowed to a crawl. Meanwhile, users and browser companies are taking matters into their own hands.
By Robert L. Mitchell | 02 April, 2014 22:19
Microsoft has pulled out the big guns - a fear-of-God approach - to scare users into dumping Windows XP, telling them the most popular tasks done on a PC will put them in the crosshairs of cyber criminals.
By Gregg Keizer | 26 March, 2014 16:06
Companies that suffer major data breaches almost always portray themselves as victims of cutting edge attack techniques and tools. The reality, though, is often much more mundane.
By Jaikumar Vijayan | 14 March, 2014 10:27
Apple has improved its security in recent years, but is it enough?
By Bob Violino | 10 March, 2014 11:04
If you’re looking for your first ERP system or looking to upgrade from an existing system, the evaluation, selection and implementation process is a long-term strategic decision for your organization. To help you through this process, here are eight simple steps for a successful ERP system selection.
In this report From Infrastructure to Applications: The Future of IT is On-Demand Network World evaluates how IT departments are employing disruptive virtualisation and cloud computing approaches to support business growth and move IT into a value-adding profit centre.
- How Microsoft's CEO sees growth for Windows Phone and Lumia
- Thanks to NASA, you can now 3D print models of satellites, probes and planets
- Russian government offers money for identifying Tor users
- EU, Google, Microsoft, Yahoo meet on 'right to be forgotten' but questions remain
- The Pirate Bay makes searching for torrents easier on mobile devices
- Changes afoot as DARPA challenge robots prep for upgrade
- Apple faces privacy suit following Chinese TV report
- Government pushes website blocks to fight piracy
- New guide aims to remove the drama of reporting software flaws
- 'Canvas fingerprinting' tracking is sneaky but easy to halt
- Baidu reports strong mobile ad sales, echoing Facebook
- ASX-listed Bitcoin miner hails results
- UNSW researchers see future for Oculus Rift in engineering
- IoT inspires new components for energy, wireless
- Bitcoin: Addressing concerns over a 51% attack