Mobile/Wireless


A New Approach to Mobile Encryption

Piecemeal efforts only resolve some threats while burdening IT resources. Enterprises need to take an entirely new perspective for managing mobile security.

Q&A: Preventing Mobile Vulnerabilities

Best practices for keeping mobile devices safe.

Tablets Having Big Impact on IT Budgets

This year, demand for tablet computers will actually help lift worldwide IT spending.

Slowly but Surely, IT Addresses Mobile Security Threats

Nine out of ten enterprises say they plan to invest in new endpoint security technologies to help them better manage mobile devices

How Mobile Computing, Not Windows Desktop, Will Transform Cybercrime

As mobile devices become more ubiquitous, they and not the Windows desktop will become Ground Zero for attacks and exploits.

Next-Gen Solutions for Your Mobile Workforce

This year could be a tipping point for enterprise mobile applications.

Remotely Manage Hardware with Embedded Technology

Organizations must be cautious to ensure they can manage their embedded devices as their population grows.



Q&A: Data Protection Strategies for Mobile Computing

Best practices for protecting your mobile and enterprise assets.

7 IT Trends to Watch in 2011 and How to Prepare for Them

A look at the top security, storage, and data center trends facing organizations in the New Year.

The Enterprise Year That Was

From powerful mainframes to small smartphones, it was a year filled with change and challenges, contradiction and contrast for enterprise IT.

The Less Productive Mobile Workforce

Mobile users are more likely to get themselves into trouble -- but not the kind you'd expect.

Google and Verizon Push Tiered Broadband Services

Google and Verizon issued a statement on U.S. broadband policy, describing an approach that would permit differentiated services.

Q&A: The State of IT Security

Recommendations for making data safer that won’t decimate your IT budget.

Google Deemed "Most Disruptive" in Mobile Market

Google is set to disrupt the mobile communications industry with its mobile operating system, according to Strategy Analytics.

Q&A: Mobilizing System i Data

IBM's System i has long been a trusted computing platform, but it's 24 x 80 column data layout is out of touch with today's Internet and mobile devices. Here's how to bring its data into the 21st century.

Mobile Computing's Tipping Point

Mobile security products fared better than did the broader security market in a very tough 2009. Look for that trend to continue.

The Sleeper Cellular Issue

IT organizations are highly exposed to security breaches through their information worker's mobile devices.

Q&A: Managing Mobile Devices

From security issues to integrating heterogeneous devices, mobile device management is fraught with challenges.

Security Focus in 2010: Internal Threats, Cloud Computing, and Mobile Devices

CA’s chief security architect discusses the three key areas for security professional’s attention this year.

The Enterprise's Achilles' Heel: Cellular Security

IT shops aren't doing enough to secure their cellular communications. This leaves them wide open to attack. The stakes are high -- and likely to get even higher.