Screen Shot 2015-07-28 at 9.37.57 AM.png

Tata’s research identifies the best ways to realize the benefits of IoT

Larger companies are starting to change the way that they operate as the Internet of Things (IoT) takes hold, a...

July 28th, 2015 Danny Bradbury
android

Most Android devices can easily be hacked with MMS file: Vendor

Allowing staff to use their own devices is a challenge for CISOs as some operating systems aren't as locked down...

July 27th, 2015 Howard Solomon
Business building cloud

The Fundamental Five: What Businesses Must Have in Place to Extract Maximum Value from the Cloud

In the enterprise, cloud computing is continuing to evolve from The Next Big Thing to The Here and Now. In...

Sponsored By: IBM
Image from Shutterstock.com

SentinelOne extends its endpoint protection platform, adds remediation

CISOs have known for years that stopping the barbarians at the gate -- the endpoint -- isn’t enough to defeat...

July 27th, 2015 Howard Solomon
droneit

IT departments must prepare for the impact of commercial drone deployment

A great deal of the discussion of drones has revolved around the privacy, safety and security of the general public,...

July 27th, 2015 Gary Hilson
Gartner EFSS MQ 2015

Gartner Magic Quadrants: Know what to read and where to look

"If a vendor’s 5 best references (out of their entire customer base) state that there are stability and scalability issues,...

July 26th, 2015 Brian Clendenin