I know what you are thinking. Something that is three feet wide, four feet tall and weighs 320 pounds doesn't sound like a "mobile" device. But in the world of construction, Knaack's new DataVault Mobile is pretty handy, certainly compared to the non-mobile version.
Mobility can be a frustrating experience for employees and a security nightmare for enterprises, according to data compiled by Cisco.
The popular LogMeIn remote access service announced on Tuesday that it will be discontinuing the free version. As a pioneer that first introduced its free remote access software 10 years ago, this abrupt announcement caught many by surprise, especially given the short lead time involved.
A new variant of the well-known Shiz remote access trojan has been tweaked to search for the existence of SAP client applications.
A former system administrator from popular web hosting company Hostgator has been arrested for unauthorized computer access using a backdoor that he secretly installed before getting fired.
Within three years, three-quarters of companies in the United Kingdom and Ireland think operations in their organization will be structured on the basis of the most efficient use of skills and resources, regardless of location, according to Cisco's TechWatch 2013 report.
Only 60 percent of enterprises track who is accessing their network remotely and how long they spend on the network, according to a survey from earlier this year of 250 IT asset managers who are members of the International Association of IT Asset Managers.
Just about every organization these days needs to protect its network and data from risks associated with BYOD, and the Mississippi Department of Corrections is no exception.
In an interview with FierceCIO, Bill Dickerson, network security administrator, shared how he was able to implement remote access technology that enables his team of just six IT pros to support the agency's work.
Even a fully patched pcAnywhere installation is vulnerable to remote attacks, according to a security researcher. As reported by InformationWeek, Jonathan Norman, director of security research at