Not long ago, data security was a relatively predictable IT responsibility left in the hands of mid-level associates and administrators. Now that threats are coming in greater volume and variety, however, a number of CIOs are having to fundamentally rethink their protection of sensitive information ...
News headlines may make it sound like there's always an organized cybercriminal syndicate waiting to break down the firewall and steal everything in the corporate network. Flashy headlines and referencing scary hacktivist groups may be good for the media, but those strategies also take attention awa...
Effective cybersecurity is a highly mobile target, which makes threat information highly valuable for IT professions as they plan for which safeguards to implement. As eWeek columnist Robert Lemos recently noted, it can also serve as a justification for increases in data security spending. However, ...
Bring-your-own-device has complicated the data security ecosystem significantly, as information moves from company-provisioned and managed devices to personal smartphones and tablets. The trend has afforded workers extended mobility and access to corporate resources from anywhere, but it has also gi...
Mobile application development is quickly evolving from pet project to business necessity within corporate IT departments. But whether it's constructing an enterprise app store that caters to the demands of digital native employees, or a slate of customer-facing convenience tools, companies must kee...