Will RIM survive?
As Mike Lazaridis and Jim Balsillie step down as co-CEOs at Research in Motion, the company is at a cross roads. Thorsten Heins steps into the CEO chair with many daunting obstacles ahead of him and...
View ArticleMacs take on the enterprise
Change can often be slow. It took many years for the Mac to begin to even threaten the PC in the enterprise. It is still a slow process, but Apple is making up ground on Microsoft.To read this article...
View ArticleWindows 8: What you need to know
Just when you got used to Windows 7, Microsoft is threatening to ship Windows 8. The first public beta is slated to be released at the end of this month, with a final ship date rumored to be in...
View ArticleThe ultimate tips box
Got problems with insider threats? Need help securing your wireless LAN because of employees bringing their own devices on to your network? Know how to protect your Android device?To read this article...
View ArticleBYOD: There is no stopping employees' devices on your network
It used to be the IT department's answer was always no when an employee asked to use a personal device for work. IT often felt the risk was far too great to the company's network security to allow...
View ArticleiPad 3 could blow away competitors
There has been wide speculation on what Apple's next iteration of its tablet will look like, feature and be named. Network World editor John Cox is even able to write a weekly story on the wild rumors...
View ArticleCisco's big comeback
Just a year ago, Cisco's stock was taking a beating after the sales failed to meet Wall Street expectations.The company wasn't exactly reeling, but CEO John Chambers knew something had to be done to...
View ArticleCan you handle Big Data?
Big Data is the latest industry buzzword. It's just another way of saying you as a network manager are being inundated with data and you better figure out a way to manage, secure and analyze it.To read...
View ArticleMacs under attack, who is safe?
It was always thought that as Apple products increased in popularity, so would the target on its back placed by cybercriminals. Always looking to take down the king of the hill, cybercriminals finally...
View ArticleInside the Google v. Oracle courtroom drama
The trial pitting Google vs. Oracle on the claim of intellectual property infringement by Google in Android has reached almost a tabloid like feel. Outside the courtroom feels like the red carpet as...
View ArticleA checklist for secure employee departures
Employee exitImage by ThinkstockA certain amount of employee turnover is a natural part of any organization’s life cycle. With each departure, whether the employee was entry-level or an executive,...
View Article7 reasons users have trust issues
Uneasy usersImage by Georgie PauwelsAlmost every month there are headlines splashed across the Internet indicating another business has been breached. It is no surprise then that employees are unnerved...
View ArticleSeven security and privacy concerns at the polls
Presidential raceImage by ReutersA recent poll by Wakefield Research delved into the psyche of the American voter asking them many questions about who will lead them through cyberspace the next four...
View ArticleLooking back: Viruses that led to a path of destruction
VirusesImage by BixentroThe world of computer viruses has changed drastically over the last 25 years or so. In the early days, Internet users were very naïve towards email attachments, contributing to...
View ArticleWhat CSOs should do in their first days
It used to be common for new chief security officers to come in with guns blazing. The security personality stereotype was a machismo type who wanted to be seen as the hero in saving the company’s...
View ArticleIn an IT security job hunt, experience matters
The end of the year always brings about thoughts of what changes should occur in the coming year. If a change of job is in your thoughts, security executives say they look at prospective employees’...
View ArticleHow to stop shadow IT
Stopping the armchair IT folksImage by Mette1977 What do complex IT policies, outdated software and lack of IT-supported services have in common? They all contribute to shadow IT, which occurs when...
View ArticleHow to respond to ransomware threats
Don't jumpImage by ThinkStockRansomware is obviously analogous to kidnapping, and dealing with the perpetrators can feel much like negotiating with a jumper standing on the edge of high-rise roof. The...
View ArticleWhere to cut corners when the security budget gets tight
Whenever creating a budget, there is always the rainy day fund or the contingency account in case of unexpected circumstances. But what if those circumstances are a data breach that is bigger than you...
View Article
More Pages to Explore .....