News

News

  • September 19, 2014 19 Sep'14

    Apple privacy policy puts consumers before advertisers to ensure sales

    Apple's privacy policy eased user privacy concerns and laid the groundwork for Apple Pay, Apple Watch and health data. Also in Searchlight: former Home Depot workers say the company settled for low-level security; and are 'thinkables' on the horizon?

  • September 16, 2014 16 Sep'14

    Tech skills gap means adapt or leave your IT staff in the lurch

    Constant changes in the IT industry mean certain tech skills are falling by the wayside. In this tweet chat recap, find out which skills you should hone to move up the ranks.

  • September 12, 2014 12 Sep'14

    Get the best of the tech talent crisis: Collaborate with the business

    Finding first-rate talent isn't solely the IT department's job -- and it shouldn't be. Learn how to work with the business to tackle the tech talent crisis.

  • September 12, 2014 12 Sep'14

    iPhone 6, Apple Watch start another mobile revolution in the enterprise

    The new iPhone 6 and iWatch force CIOs to up their mobile app game and steel themselves for the wearable wave. Also in Searchlight: Home Depot and Google's data breach troubles; Netflix protests the FCC's net neutrality proposal.

  • September 05, 2014 05 Sep'14

    Use Apple iCloud hack to sell employees on security culture

    Apple's much-hyped iCloud leak of celebrity photos is a golden opportunity for CIOs to sell security culture to employees, says a customer experience expert. Also in Searchlight: Home Depot suffers a breach; Samsung unveils a two-screen Galaxy Note.

  • Sponsored News

    • September 02, 2014 02 Sep'14

      The Perfect Storm in Cybersecurity: A 3-Step Plan to Maximize Protection

      The cyberthreat landscape is becoming more sophisticated and coordinated. According to the Symantec 2014 Internet Security Threat Report, 2013 was “The Year of the Mega Data Breach.”

    • August 29, 2014 29 Aug'14

      Frequently Asked Questions: Why You Need Multi-Layer Protection

      Viruses have given way to targeted attacks designed to exploit any and all vulnerabilities within an enterprise. Attacks can come from anywhere at any time, directed at your weakest points, including email accounts, commonly used websites, social media and mobile devices, among others.

    • August 28, 2014 28 Aug'14

      How to Enable Employee Productivity with Apps

      One of the key byproducts of IT consumerization and the bring-your-own-device trend is the increasing incidence and diversity of work applications for mobile devices. From document readers/editors to collaboration and communication apps, mobile users now have a wealth of software literally at their fingertips.

    • August 28, 2014 28 Aug'14

      5 Must-Haves for an Enterprise Mobility Management Solution

      Mobility has become an increasingly important part of how organizations not only deploy technology, but also do business. Trends such as bring your own device (BYOD), telecommuting, mobile application development and anywhere/anytime connectivity have redefined IT architectures and reshaped infrastructure decisions from the data center to the network’s edge. IT consumerization has altered the boundaries between work and personal use: Research indicates that 88% of people use smartphones for work while they are on personal time.

    View All Sponsored News
  • September 04, 2014 04 Sep'14

    How to combat the tech talent shortage

    Finding a candidate with the right combination of skills to meet modern enterprise needs is no mean feat. In this tweet jam recap, get tips on how to develop a hiring strategy that can tackle today's tech talent shortage.

  • August 29, 2014 29 Aug'14

    What do the new Samsung, Ralph Lauren wearables augur for CIOs?

    When Samsung, Apple and Ralph Lauren jump on the wearables trend, can enterprise employees be far behind? Also in Searchlight: Dropbox toughs it out as Google, Amazon offer cloud on the cheap; Uber tricks Lyft and other rivals.

  • August 22, 2014 22 Aug'14

    Health system's Heartbleed hack of patient data underscores need for speed

    Heartbleed resurfaces in a Tennessee health system's breach, and UPS customers' data is in danger. Is assuming the worst enough? Also in Searchlight: Steve Ballmer signs off from Microsoft's board; Twitter, Facebook tinker with more experiments.

  • August 15, 2014 15 Aug'14

    How to develop a clear cloud contract with your provider

    Crafting a specific, clearly defined cloud contract with your provider is crucial to staving off security problems and SLA breaches. In this tweet jam recap, participants shared tips on how to best communicate needs to cloud providers.

  • August 15, 2014 15 Aug'14

    While SpiderOak canary defies NSA, CIOs ponder their privacy bind

    CIOs battle their own privacy demons as SpiderOak and other vendors attempt to protect customer data from NSA snooping. Also in Searchlight: Cisco cuts 6,000 jobs and the Internet could grow too large for its gear.

-ADS BY GOOGLE

SearchCompliance

SearchHealthIT

SearchCloudComputing

SearchMobileComputing

SearchDataCenter

Close