When Unisys CISO John Frymier came in to work on Friday, Sept. 6, the phones were ringing, and continued to ring all day. Customers were panicking over the news headlines of the day before....
Technology corporations around the world are increasingly using hackathons to harness the collaborative power of team-based competitions to help develop new products, but many don’t take into account the potential downsides. ...
What’s the fastest, easiest, low-cost way for your organization to achieve multi-platform enterprise mobility management (EMM) without sacrificing security or performance? Using the cloud, of course. Here are tips to help you on that journey....
Known for its ThinkPad laptops, Lenovo is trying to find its way into the data center, despite the dominance of the Big 3: IBM, HP and Dell...
Hewlett-Packard reported results for the last quarter of its fiscal year on Tuesday, and although sales were down from a year earlier there were some much-needed signs of improvement....
Why are the world’s most IT savvy companies unable to keep attackers out of their networks?...
A survey of 1,000 business and IT decision makers shows a blurring line between the business-to-business and business-to-consumer (B2C) sales process. That is, technology buyers are starting to resemble mall shoppers....
Cloud storage vendor Box has acquired the technology behind a company called dLoop, which it will use to add more controls that give enterprises more features for protecting their content....
Laptop and desktop users can now do a Google search without typing just by speaking aloud, with a Chrome extension that Google made available on Tuesday....
Consider this: If you or an employee is using free Wi-Fi in some local café, in a matter of seconds a hacker can manipulate your machine into a “man-in-the-middle” scenario, where the device is now a conduit that sends data right to the bad guy. Once a device is compromised, login credentials (corporate mail server, bank accounts, LinkedIn.com, Facebook.com, etc.) can be harvested by using SSL Stripping....