Welcome!


Security

Corporate BYOD growth is prompting enterprises to take a closer look at their networks and their approach to security. As this initiative grows, along with the increased need for keeping the network and its data secure, more IT professionals are reconsidering NAC. In fact, a recent Ogr...
When we talk about online security there’s a school of thought that suggests you can either make it safe, or you can make it easy to use, but you can’t have both. As we see a sharp rise in online fraud and identity theft it seems that traditional passwords are neither. The 2012 Ident...
There is little argument at this point that the mass adoption of mobile technology and bring-your-own-device (BYOD) strategies by enterprises is a true business technology revolution. At the core, the catalysts driving this revolution are the vast array of mobile devices leveraging soa...
As mobile phones become as indispensable as credit cards for purchasing goods and services, mobile payment developments are quickly gaining pace. Many different service providers are competing for their piece of the action. Within the last year, we have witnessed the arrival of mobile ...
Clearly our family had moved to the cloud. But we had done so without giving a thought to any of the ramifications of this move. We had simply moved across the continuum from Cloud what? … to Cloud who? … to what does this mean to me and how do I use it? … to cloud, uh oh, what now? ...
I always say that before you undertake a mobile project you should think about certain aspects, that should not be left until deployment, So I thought I would interject into my Sybase Unwired Platform Article Series with a Friday Bonus Article... Both Management & Security are inter-de...
Growth in cloud computing and in the number of workers who are either mobile or who work at home are co-enabling trends that are bringing increasing headaches for IT security personnel. Many recent reports have drawn attention to the growing security challenges in cloud-based IT. But...
The perceived security risk of granting access from untrusted PCs such as airport kiosks,hotels or even home computers has outweighed the benefits of broad remote access for many enterprises. As a result, those companies typically have IT security policies that dictate only a corporate...