InformationWeek: The Business Value of Technology

InformationWeek: The Business Value of Technology
InformationWeek Big Data Coverage
= Member Content

Commentary

Apple Suggests iMessage As SMS Bug Work-Around
Rather than fixing a security problem discovered last week, Apple tells users concerned with SMS spoofing to use its iMessage product instead of...

| Read Article »

What Sophos Brings To MDM Table
Security vendors are rushing to fill gaping holes in IT's ability to manage mobile devices. But if you expect perfection, you'll wait too long.

| Read Article »

Apple Security Talk Suggests iOS Limits
Apple rightly earned plaudits for delivering a presentation on iOS security at Black Hat. But what was left unsaid may have revealed new details...

| Read Article »

When Hackers Meet Girlfriends: Readers Judge Our Theory
My modest proposal to deter law-breaking hackers by helping them get girlfriends sparked condemnation, support, and even marriage advice.

| Read Article »

One Secret That Stops Hackers: Girlfriends
The majority of hackers "age out" of hacking as they get older and find girlfriends, families, and other responsibilities. Why not invest in...

| Read Article »

Most Smartphones Lost At Night
LookOut Mobile says two-thirds of lost devices vanish from pubs and bars at night.

| Read Article »

More »

By The Numbers

What Keeps Us Awake
We polled 1,084 security pros about their mobile security nightmares:

Chart

Note: Three responses allowed

News

7 Enterprise Mobility Predictions For 2013
Smartphones and tablets fueled the rise of BYOD in 2012, but better management of those devices is top of mind in 2013.

| Read Article »

CTIA To Merge U.S. Trade Shows In 2014
U.S. mobile and wireless industry's main lobbying group will combine its two yearly shows into one larger event in a bid to remain relevant.

| Read Article »

10 Biggest Information Security Stories Of 2012
From John McAfee's escape from Belize to the privacy debacle that compromised CIA director Petraeus' career, 2012 had no shortage of security...

| Read Article »

More Stories:

More »

InformationWeek Reports

report Mobility's Next Challenge: 8 Steps to a Secure Environment
Taking your company's mobile capabilities to the next level--whether on personally or company-owned devices-requires a lifecycle management plan that encompasses application security, development, distribution, support and enhancement. We show you how to get there and provide insight into five mobile application development options.

report Buyer's Guide: Mobile Device Management
Want the lowdown on nine top MDM products? Our InformationWeek Buyer's Guide is your one-stop guide for choosing an MDM system that match your requirements. ZIP file includes: Detailed comparison charts on security, administration, and platform and reporting features; our full questionnaire; and responses from Absolute Software, AirWatch, Fiberlink Communications, JAMF Software, MobileIron, Odyssey Software, Symantec, Tangoe, and Zenprise.

report Dark Side of Mobile Apps
Companies are rushing headlong to develop applications for Android, Apple and BlackBerry devices. But IT must maintain its secure development lifecycle process or risk a black eye.

report Reducing Mobile Device Risks to Enterprise Data
Innovative IT shops are turning the mobile device management challenge into a business opportunity--and showing that we can help people be more connected and collaborative, regardless of location. We offer a framework of four possible strategies to secure the mobile environment.