Piecemeal efforts only resolve some threats while burdening IT resources. Enterprises need to take an entirely new perspective for managing mobile security.
Best practices for keeping mobile devices safe.
This year, demand for tablet computers will actually help lift worldwide IT spending.
Nine out of ten enterprises say they plan to invest in new endpoint security technologies to help them better manage mobile devices
As mobile devices become more ubiquitous, they and not the Windows desktop will become Ground Zero for attacks and exploits.
This year could be a tipping point for enterprise mobile applications.
Organizations must be cautious to ensure they can manage their embedded devices as their population grows.
Best practices for protecting your mobile and enterprise assets.
A look at the top security, storage, and data center trends facing organizations in the New Year.
From powerful mainframes to small smartphones, it was a year filled with change and challenges, contradiction and contrast for enterprise IT.
Mobile users are more likely to get themselves into trouble -- but not the kind you'd expect.
Google and Verizon issued a statement on U.S. broadband policy, describing an approach that would permit differentiated services.
Recommendations for making data safer that won’t decimate your IT budget.
Google is set to disrupt the mobile communications industry with its mobile operating system, according to Strategy Analytics.
IBM's System i has long been a trusted computing platform, but it's 24 x 80 column data layout is out of touch with today's Internet and mobile devices. Here's how to bring its data into the 21st century.
Mobile security products fared better than did the broader security market in a very tough 2009. Look for that trend to continue.
IT organizations are highly exposed to security breaches through their information worker's mobile devices.
From security issues to integrating heterogeneous devices, mobile device management is fraught with challenges.
CA’s chief security architect discusses the three key areas for security professional’s attention this year.
IT shops aren't doing enough to secure their cellular communications. This leaves them wide open to attack. The stakes are high -- and likely to get even higher.