Opinion: Predicting the tech future
For my recent column of predictions for 2013 I polled a huge number of IT people to see what they are expecting, and ended up getting more than 400 responses.
View ArticleNew Box security features aimed at user, device and content protection
Box is rolling out several new security features aimed at making its 150,000 business customers feel more confident in its cloud storage and file sharing service.
View ArticleGet your company started with Evernote for Business
If your staffers simply need a note-taking application, Evernote is an obvious choice--it's the 800-pound gorilla, having grown in five years to 50 million users. But the program also offers an...
View ArticleLinkedIn is down, then up, then down again Wednesday morning
LinkedIn, the professional social media network, is suffering intermittent service disruptions Wednesday morning.
View Article25 must-have technologies for SMBs
Running a small business isn't easy. I know. I run one. As a freelance writer, I’ve learned that you need to run your writing career as if you were running a business.
View ArticleFacebook 'Trusted Contacts' lets you pester friends to recover account access
Facebook Thursday said it’s making available globally a feature called "Trusted Contacts" that lets users select three to five friends who can help users recover account access such as if they forget...
View ArticleHyundai Australia drives collaboration with secure file sharing
Security has improved at Hyundai Australia since the car manufacturer deployed an enterprise-grade file sharing and collaboration system.
View ArticleWhy CIOs stick with cloud computing despite NSA snooping scandal
Explosive revelations in the past six months about the U.S. government's massive cyber-spying activities have spooked individuals, rankled politicians and enraged privacy watchdogs, but top IT...
View ArticleBrace for change: An interview with Tony Hayes of ISACA
Tony Hayes, ISACA international president, talks about the trends that CIOs should prepare for, and the "inexcusable" high rate of failed ICT projects.
View ArticleTwitter: Attack emails drop from 110 million per day to a few thousand
There used to be a whopping 110 million attack messages per day spoofing the Twitter domain name as cyber-criminals blasted out fake Twitter e-mail at intended victims to try and fool them into opening...
View ArticleGoogle stops scanning Gmail messages for ads in Apps for Education
Google will no longer scan the email messages of students and other school staff who use its Google Apps for Education suite, exempting about 30 million users from the chronically controversial...
View ArticleJohnson & Johnson champion people-based security strategy
Johnson & Johnson champion the people and culture element of its security strategy, believing a more rigorous focus on people and culture acknowledges that having the latest technology and...
View ArticleRelevance, collaboration helping threat intelligence shape the IT security...
As the merciless onslaught of data-security attacks continues to claim success after success, organisations are increasingly warming to the promise of threat intelligence in helping prevent, catch, and...
View ArticleDropbox adds U2F support for better security
Two-factor authentication is often held up as a best practice for security in the online world, but Dropbox on Wednesday announced a new feature that's designed to make it even tougher.
View Article
More Pages to Explore .....