The view from the top of IT with TechWorld Editor Rohan Pearce
After acquiring mobile application management company Bitzer Mobile late last year, Oracle today announced that it has taken Bitzer's basic "container" technology for Apple ioS and Google Android and linked it to identity management.
By Ellen Messmer | 26 February, 2014 14:12
Identity theft has been the top consumer complaint to the Federal Trade Commission now for 13 years running.
By Michael Cooney | 26 February, 2013 16:58
Dell can trump Cisco in the information-technology security market, say Dell's executives in describing how the company with its multifaceted approach will hold an edge against some powerful rivals that also include HP and IBM.
By Ellen Messmer | 20 February, 2013 18:01
About 1 in 3 "mission-critical" applications are currently in the cloud, and this is expected to increase to 1 in 2 by 2015, according to a survey of 400 IT and business managers.
By Ellen Messmer | 11 December, 2012 06:58
Amazon Web Services today launched Data Pipeline, a new tool designed to make it easier for users to integrate data stored in multiple disparate spots to manage and analyze it.
By Brandon Butler | 30 November, 2012 00:13
Your identity is like George Costanza's wallet. Really. Think about it. Do you remember the classic Seinfeld episode? The one where George wouldn't give up his ever-expanding wallet filled with store credit cards, Irish money, a coupon for an Orlando Exxon gas station and several Sweet and Low packets. This, in spite of the obvious physical pain it caused and the security threat all of that imposed.
By David Miller | 11 February, 2009 10:53
Today's computing environment demands IT attention to a wide range of security issues. Learn from security practitioners at Google who are on the frontlines of fighting spam, malware and phishing, securing identity management in hosted web apps and monitoring the network and detecting intrusion.