The privacy maps being created today are primarily designed to avoid lawsuits.
By Thornton A. May | 21 April, 2014 20:33
An approach that has worked for centuries in all sorts of industries is just as applicable to the security field.
By Ira Winkler | 17 April, 2014 04:30
Luckily, gadget-makers understand the cruelty of travel, and are always creating new devices that help the mobile worker/road warrior ease the pain of a hotel room with few outlets, or expensive in-room Wi-Fi. Here are three gadgets I've recently tested that can help you on your next trip:
By Keith Shaw | 16 April, 2014 03:14
If our checks and balances are so fragile that a typo can obliterate all meaningful security, we have some fundamental things to fix.
By Evan Schuman | 15 April, 2014 21:38
Companies are engaged in a kind of arms race with competitors to see how many apps they can get everyone to use. But this aggressive push for more apps is going to end up giving users app fatigue.
By Mike Elgan | 12 April, 2014 21:20
Employees can unintentionally share more than their employers want anyone to know.
By Evan Schuman | 08 April, 2014 21:33
The end of Microsoft support is fast approaching, and the company still has a lot of machines running the old Windows operating system.
By J.F. Rice | 02 April, 2014 02:52
Evan Schuman: Resurrection of Full Disclosure mailing list is great news, if you're not a cyberthief
The alternatives to an independent list like Full Disclosure can't match it for stopping new cyberattack tactics.
By Evan Schuman | 01 April, 2014 23:50
The evidence keeps mounting that companies that put out mobile apps are not paying nearly enough attention to security.
By Evan Schuman | 25 March, 2014 17:13
Thank you, Target! It's a pity that security managers have to capitalize on other organizations' misfortunes to broker change within their own enterprises, but the notorious Target breach of late last year just might get me some things I think my company has needed.
By Mathias Thurman | 24 March, 2014 14:13
And what is going to have to happen before we see that we must set the smartest minds on coming up with newer, safer and less complicated security methods?
By Ron Miller | 24 March, 2014 10:37
When a world that's characterized by ubiquitous data collection and surveillance can lose sight of a jumbo jet, you start to question the worth of all that spying on us.
By Ron Miller | 17 March, 2014 16:31
It offers slightly greater payment convenience, but at what cost?
By Evan Schuman | 11 March, 2014 12:08
As a security manager, I expect my company to be hit by malware infestations, data theft, denial-of-service attacks and attempts at unauthorized access. I deal with them all as they arise, and they do keep things interesting.
By Mathias Thurman | 10 March, 2014 13:49
And without remote management, getting patches onto devices scattered throughout the organization is hit or miss.
By J.F. Rice | 06 March, 2014 14:42
The notebook features a lightweight yet tough finish, and the latest tech specs; up to 16GB of memory; storage options up to 1TB hard drive or 256GB SSD; 802.11ac Wi-Fi.
By Keith Shaw | 05 March, 2014 23:13
Even if a company were willing to expunge personal data that it had been authorized to collect, the realities of IT systems mean it probably could never completely do that.
By Evan Schuman | 04 March, 2014 13:10
Premier 100 IT Leader Stuart Kippelman also answers questions on career growth.
By Stuart Kippelman | 04 March, 2014 12:58
In the past week, two new ultra secure smartphones have been in the news. One is called the Blackphone. The other is called the Black phone. The difference in their names is a space. Here's what we know about the two most secure smartphones ever created.
By Mike Elgan | 01 March, 2014 12:08
Over the past few weeks we've been snowbound several times, which also included a school vacation week. With my kids asking me for the one-millionth time "What can we do, Dad?", fortunately I had two technology-related items for the column to test out, and they would also appeal to the youngsters as well as adults.
By Keith Shaw | 28 February, 2014 17:37
Learn how every business can improve efficiency, compete better, and deliver compelling user experiences with flash. You'll also gain access to Gartner's 2013 Cool Vendor Report Download our ebook and learn how you can: - Improve efficiency - Compete better - Deliver compelling user experiences
- FTMicrosoft Business Intelligence ConsultantNSW
- FTDigital Account Manager X 3 | Display + Video advertisingNSW
- FTDigital Content Manager/Senior Content Manager - CRM/Loyalty FocusNSW
- FTBrand Relationship Manager | RTB Trading Desk | Digital Advertising | SydneyNSW
- FTContent StrategistNSW
- FTMicrosoft Business Intelligence DeveloperNSW
- FTDeliverability SpecialistNSW
The CFO as Technology Evangelist is a research report commissioned by Oracle and Accenture, in collaboration with Longitude Research, that explores how modern CFOs and finance executives are adopting emerging technologies within their finance functions to enable the development of new capabilities and to transform the role of finance.
- Russian SMS Trojan for Android hits US, dozens of other countries
- Enterprise and service provider networking port revenues reach $39B
- FCC adds $9 billion to broadband subsidy fund
- Microsoft's Bing goes ad-free for all U.S. schools
- Android mobile ad traffic beats iOS for first time
- Samsung's Galaxy Tab 4 line-up goes on sale May 1 starting at $199.99
- Apple kicks off public OS X beta testing
- It's the little things that matter in Amazon Redshift upgrade
- Google AdWords cleared in geotagging patent lawsuit
- China's Xiaomi targets ten markets in international expansion
- Toshiba, SanDisk NAND flash memory shrinks to 15-nanometer process
- Bing for schools out of pilot stage, promises ad-free search
- NSA spying revelations have tired out China's Huawei
- Brazil's senate passes Internet legislation ahead of NETmundial conference
- US to vote on sharp increase in broadband subsidies