FEATURE Security graphic SHUTTERSTOCK

Ten tips for more secure sofware

The IEEE has just set up a Center for Secure Design to help software architects create applications that don’t have...

September 9th, 2014 Howard Solomon
Image from Shutterstock.com

Six tips for taming Shadow IT

Cloud computing offers advantages to enterprises, but only when done through a well-defined IT strategy. When done by individuals or...

September 2nd, 2014 Howard Solomon
Image from Shutterstock.com

How prepared is your IT infrastructure?

Cloud computing is going to become increasingly important to CIOs as they plan their organization’s IT strategy. However, the on-premise...

August 19th, 2014 Howard Solomon
Image from Shutterstock.com

Six tips to end SQL Injection attacks

These tips are just the tip of the iceberg for what you need to do to stop SQL Injection attacks....

August 12th, 2014 Howard Solomon
Image from Shutterstock.com

Make your organization a digital leader

...

August 5th, 2014 Howard Solomon
Image from Shutterstock.com

Five BYOD best practices

...

July 29th, 2014 Howard Solomon
Image from Shutterstock.com

The IT asset manager as hero

...

July 22nd, 2014 Howard Solomon
Internet of Things Canada IDC

Here comes the Internet of Things

Leading up to our Internet of Things Twitterchat on July 30, here are a few facts and figures gleaned from...

July 15th, 2014 Howard Solomon
BestBusinessTabsWS

Best tablets for business

...

July 8th, 2014 Paolo Del Nibletto