Simply wiping things clean may work wonders for your kitches appliances, but it is a crude--at best--policy for mobile device security.
Now that all the flashy stuff with the iPhone 6 and Apple Watch launch is through, Apple is getting down to business with its new iOS 8 mobile operating system that includes some useful features for enterprises.
Containerization, which separates corporate and personal data on a BYOD device, is one approach that enterprises are taking to provide security in a BYOD environment. But is it the best approach to BYOD security?
Amazon unwittingly reintroduces a security flaw that was fixed last year, highlighting the challenge of maintaining secure code.
CIOs looking to hire IT pros this quarter can expect to pay more for certain top in-demand skills, including those involving big data, cybersecurity and cloud computing, a new Dice study finds.
Researchers have discovered that people tend to choose only a few hundred 4-digit combinations from 10,000 possible PINs. Knowing what those popular combinations are aids hackers greatly in tapping their victims' bank accounts.
There was a legal fight over a statement in Yahoo's own terms of service (ToS). Yahoo lost and the government won.
Security skills are in high demand in 2014. But transitioning from the role of an IT pro to that of an IT security pro will take more than just a few extra certifications.
With the proliferation of machine-to-machine (M2M) devices and connections, some estimates putting the number as high as 50 billion devices by 2020, security pros are trying to come to grips with the security implications of all those endpoints.
As part of its effort to focus on enterprise services and technology, BlackBerry is releasing the next iteration of its BlackBerry Enterprise Server platform, the BES 12, in November, complete with the ability to manage Internet of Things devices.