Search

Filter:

Search Results

Real customer appreciation would involve concern for data security

I don't know about you but I'm beginning to doubt the sincerity of these retailers that gush over how much they value thier customers after they suffer massive data breaches. ...

Bitcoin architect's email hacked, advocate starts online bounty program

For more:- read the Forbes rundown on the Nakamoto email address incident- read the CoinDesk story ...

Google stops malicious ad campaign; Security now a 'board-level' issue;

Security now a 'board-sevel' issue: Venture capitalist (eWeek) >> Blackphone gets bug ...

Iliad to beef up bid for T-Mobile; Skippy's mobile Web move;

French carrier going all-or-nothing for T-Mobile >> Report: Iliad to Improve or Drop T-Mobile Bid by mid-October (WirelessWeek) Lyft gets Hitched to ride-sharing service >> Lyft acquires ride-sharing startup Hitch (IDG News Service) Can BlackBerry become relevant once more? >> ...

5 reasons IoT scares your IT department

services Forget IoT: Get ready for the monitoring of things Internet of Things won't be gentle on your ...

First steps to a secure BYOD program

Page One article Related Articles: 5 factors managers need to consider in managing remote workers ...

News Scan: Creating a standard architecture for the IoT; Free coffee is good bait when hiring IT pros; More

of their daily routine that makes it possible for them to get through the day and do their best work." So ...

Annoying in-flight cellphone calls unite Dems and GOP on Capitol Hill

Apparently there is at least one issue that unites Democrats and Republicans on Capitol Hill--annoying cellphone conversations on airplanes. In a rare show of bipartisanship, 77 Democratic and Republican lawmakers sent a letter [.pdf] to a number of federal agencies warning that allowing in-flight ...

Details about next version of Office start to emerge

to download just one day, three days, seven days, or 14 days of email, down from the current minimum of one ...

Lack of trust continues to vex BYOD programs, survey finds

to BYOD security? 5 tips for a successful BYOD strategy 'Soft' benefits of BYOD getting harder ...