When it comes to security risks, BYOD is the gift that keeps on giving. But what about the devices that your employees used to use, gave up on and, months later, finally dug out of the closet to sell? That's another issue to wrestle with.
Before rushing into allowing employees to do their jobs on their personal devices, organizations need to diligently address the unique risks of that practice, cautioned a report by an international cybersecurity information organization.
The past year has seen its share of newly emerging or persistent threats that security and IT executives need to be aware of and in many cases defend against.
Moving to an as-a-service computing model is inevitable and the discussion across enterprises is no longer just about risk but rather the speed by which services can be delivered to achieve competitive advantage.
A steady increase in corporate purchasing through the first three quarters of the year hints that enterprises are already rethinking how far BYOD programs will be allowed to expand, according to Strategy Analytics.
Many organisations have no formal plan for coping with DDoS attacks, lack up to date network maps, and probably depend on old technology to defend against the threat, a survey by Corero Network Security has suggested.
Cloud adopters face serious risk in the next two years because of the strong possibility that their provider will be acquired or forced out of business, the research agency says.
"We're seeing a significant amount of traction today in the hybrid world," said Kerry Bailey, an HP senior vice president for HP cloud services.
Dell Software has introduced a suite of software and services for enterprise mobility management, including a "secure workspace" for mobile devices that lets enterprise IT managers separate work from data apps.
Oracle has launched the fifth version of its Exadata database appliance, claiming the release provides in many areas double the performance of previous-generation machines.
Businesses are moving fast to address the demand for both employee- and customer-facing mobile apps. However, there is a danger in rushing. Here are five ways to avoid pushing out a mobile app too soon.
Being able to lock your mobile device is important because, in many cases, it's your first line of defense. It may not be the strongest form of security but it's a start until mobile device management measures like remote wiping are put into play.
IT managers facing the task of explaining the business value of IT to the C-suite don't necessarily have an easy time of it. But eBay believes it has fixed this problem with a metric that translates IT resources into key business metrics
The ever-increasing complexity of data about IT environments is making it increasingly difficult for organizations to make effective IT decisions.
Humavox unveiled Eterna, a new platform that uses RF signals to wirelessly power the Internet of Things, especially medical and wearable devices such as hearing aids, smart watches and augmented-reality glasses.
Google has trashed its plan to build a data center in Hong Kong, according to a report by the Wall Street Journal on Tuesday.
Oracle is now a corporate sponsor of the OpenStack Foundation and plans to weave parts of the open-source infrastructure platform into its own products, saying it will give customers more flexibility and options for managing clouds.