A growing number of organizations are embracing cloud computing, but those that already have say managing security is still a major challenge.
CurrentC, the retailer-based mobile payment system competing with Apple Pay and Google Wallet, was hacked by unauthorized third parties this week, AppleInsider reports.
Challenging the common perception that the public cloud is insecure, Gartner says that there have been "very few security breaches in the public cloud," with most breaches involving on-premises environments.
Both Apple and Google are turning on data encryption by default in their latest mobile operating systems, iOS 8 and Android L (Lollipop), respectively. While the FBI might not like it, enterprises IT managers are thrilled, particularly those worried about BYOD security.
Data from mobile phones offers real-time, empirical evidence that can greatly aid researchers' work in stopping the spread of contagious diseases ranging from ebola and flu to polio and measles. If, that is, researchers can get their hands on call data records.
In light of the recent spate of high-profile data breaches, the security of wireless local access networks has become the number one concern of IT departments, according to a survey of IT purchase decision makers at 163 medium and large North American enterprises by Infonetics Research.
The top news stories for Oct. 23, 2014.
While BYOD was originally supposed to save companies money on mobile devices, it has become a source of costs and risk.To explore these issue in depth, FierceMobileIT is holding a webinar this afternoon (Oct. 22) at 2 pm Eastern time.
According to Steven Koonin, 4% of Manhattanites go to bed before 7:30 PM and only 6% turn their home lights off after midnight. New Yorkers nod off early, but I doubt they want to be studied in their sleep, or while they're awake either.
Eisenhower Medical Center and Sutter Health, two of California's largest healthcare providers, have successfully fended off law suits following data breaches that now set precedence on limiting damages that can be awarded after a data breach.