How can you make sure your mobile applications are secure? A security expert offers several suggestions.
How a team of five university students developed a cross-platform, mobile, real-time app for managing presentations with no mobile development training.
From BYOD to social media, the trends that are keeping security administrators on their toes.
With the proper process controls, you can now allow access for any class of device and "future proof" yourself from what comes next.
These 6 action steps will help you get the most from outsourcing your remote infrastructure management.
Bring-your-own-device approaches can be a nightmare for security administrators. Identity-based security can help eliminate risks posed by mobile hardware.
Most shops don't yet sanction bring-your-own-device, but it's likely they will in the long term.
The bring-your-own-device movement is a warning to businesses that their core is about to get more complicated. What must IT consider right now?
How to make mobile device management a core part of your security management strategy.
Mobile devices became targets just as more workers were connecting to corporate assets using their personal devices. What's ahead for mobile IT in 2012?
In just three years, mobile workers will account for more than one-third of the global workforce.
Mobile devices will be a way of life for your enterprise users. What changes in mobile IT can you expect and prepare for this year?
From Windows on the mainframe (almost) to Big Iron and tablet growth, plus leadership changes at major tech companies and the passing of a trio of tech titans, it was an interesting year for IT professionals.
A look back at the leading mobility trends of the year, and three predictions for 2012.
Almost half of U.S. information workers already split time between home, office, or other locations
Kindle Fire tablet will sell for just $199.
The future is mobile. That's seemingly a given. What's less certain -- or less obvious -- is that the mobile future is now.
Mobile devices are bombarded by direct attacks and those designed for any Web-connected device. We explain best practices for end users and best practices for IT that can protect against these attacks.
Piecemeal efforts only resolve some threats while burdening IT resources. Enterprises need to take an entirely new perspective for managing mobile security.
Best practices for keeping mobile devices safe.