
Enthusiasm for the benefits of cloud-based services has been tempered only by lingering concerns regarding cloud computing security.
Read MoreEnthusiasm for the benefits of cloud-based services has been tempered only by lingering concerns regarding cloud computing security.
Read MoreI have attended a lot of events, panels, customer meetings and round table discussions recently about consumerization and the effects that it is going to have on the enterprise. To be frank, I keep hearing a lot of “How are we going to manage these devices?” or “How are we going to protect our data…
Read MoreBy: Jennifer Burns Being contacted by the Internal Revenue Service(IRS) is scary. So when I opened my inbox this week to see an email from them, I about fell over. What in the heck! I thought, “Why is the IRS contacting me?” And before I knew it, a Facebook friend received the same email and…
Read MoreMy spelling-crazy son is also a collector, which means that he likes to collect words with unique spellings, such as examples of supervocalics. A supervocalic is a word that contains all of the vowels – think “sequoia” – and they turn up in unlikely places. One day he heard me say the word “consumerization” in…
Read MoreThere’s always two-sides to a story. Which do you agree with? Key into the first in a series of lively “Beerside Chats” — this one between Cesare Garlati, Director, Consumerization & Patrick Wheeler Mobile PMM as they debate the issues surrounding security, innovation & growth of mobile apps for the Enterprise. Which is best iPhone or…
Read MoreFor all its hype iCloud does not represent a fundamentally new problem. Employees are already bringing personal devices to work and wanting to use them in their jobs, and these unmanaged devices are mixing personal and corporate data on a system that is outside the control of the security and IT teams. There are already…
Read MoreRather than resist it, organizations should embrace Consumerization to unlock its business potential. This requires a strategic approach, flexible policies and appropriate security and management tools. The Consumerization of IT is the single most influential technology trend of this decade. Companies are already well aware of it, as they wrestle with the growing influx and…
Read MoreThe Middle East has long been viewed as an important region strategically, as well as a hotspot for a variety of security-related issues.
Read MoreAccording to data security blogger Andrew Brandt of Webroot, a new piece of spyware has been discovered in the coding of apps related to the popular Angry Birds mobile game for Android devices.
Read MoreThe Payment Card Industry Security Standards Council recently published a new guidance report designed to provide businesses with a better understanding of how to implement virtualization in a secure way.
Read More