I once co-wrote a book on enterprise email where I likened email encryption to a "sucking chest wound." That was in 1997, when you had to do all the encryption key management on your own, a daunting task to say the least.
Security / Reviews
The old days of straightforward antivirus software packages are gone -- victim of a changing threat scene in which the dangers are more complex than ever and come from multiple sources.
Once upon a time, Symantec's brand of Norton security software had one of the most confusing lineups around -- products included Norton 360, <a href="http://www.computerworld.com/article/2488677/application-security/7-all-in-one-security-suites-anti-malware-for-all-your-devices.html?nsdr=true&page=5">Norton 360 Multi-Device</a>, Norton Anti-Virus and Norton Internet Security. Trying to decide which product was the best for you -- not to mention the best priced -- was no picnic.
McAfee LiveSafe is the best product in McAfee's sizable security portfolio. Its suite offers protection for an unlimited number of Windows PCs, Macs and Android and iOS devices, along with a Web dashboard. There's 1TB of cloud-based storage as well. The whole thing is available for $60 per year.
Our Amazon Echo, a voice-controlled appliance--for want of a better word--arrived on May 17 and we've been using it all week. As Prime members, we paid $100 for ours, but the list price is $200. While some parts are beautifully done, the information services at the back end have a long way to go before the Echo is more than a novelty.
When I bought my iPhone 6 earlier this year, I also purchased a simple, transparent case to protect it; the case cost me $35.
The number and complexity of cyber threats leveled against enterprises of all sizes these days is staggering. There's everything from advanced persistent threats created by well-sponsored nation states to disgruntled <a href="http://www.networkworld.com/article/2692093/security0/data-protection-165097-disgruntled-employees-lash-out.html">insiders</a> looking to make a fast buck or enact revenge for some perceived wrongdoing.
Back in January 2013, BlackBerry gave me its first BlackBerry 10 smartphone, the Z10, for review. It also gave me a "reviewer's kit" composed of a number of accessories: a case, screen cleaner cloth and a "battery charger bundle," among other things.
It's no stretch to say that ads are what make the Web go 'round. The content you're reading right now? Paid for by ads. Google, Facebook, Pandora, YouTube? Driven by ads. This is not a new concept: TV and radio have relied on commercials since their earliest days. Because, let's face it, <em>something</em> has to pay for all the free programming and services.
In the real estate world, the mantra is location, location, location. In the network and server administration world, the mantra is visibility, visibility, visibility. If you don't know what your network and servers are doing at every second of the day, you're flying blind. Sooner or later, you're going to meet with disaster.
Whatever your primary OS, Linux distro Tails 1.0 offers a plethora of security features to help you work online without worrying about privacy issues.
Linux users who want to avoid browser-based Twitter apps can try out these five local clients -- including one that still uses a command-line interface.
You can't see some malware until it's too late. Sophisticated attacks arrive in pieces, each seemingly benign. Once these advanced attacks reassemble, the target is already compromised.
If you are ultra paranoid, what could be better than hiding your network traffic in such a way that no one could possibly intercept it? This is what Unisys is offering with its new Stealth appliance, which could make man-in-the-middle attacks and keylogger exploits obsolete, or at least more difficult to mount.
Everyone needs a Wi-Fi spectrum analyzer, but there are times when analyzing cellular spectrum is also essential. Fluke Networks' new AirMagnet Spectrum ES provides a broad range of capability at a very attractive price. Spectral analysis, a longstanding fixture in electronics and manufacturing test, and, more recently as a valuable tool for understanding coverage, interference, and other elements of Wi-Fi, is the art and science of extracting meaning and insight from wireless systems at Layer 1 -- radio waves.
Enterprise mobility management (EMM) can encompass a broad range of functions, from managing mobile devices, to applications, expenses, personnel, and policies. But perhaps the most important aspect is mobile information/data/content management, tracking the distribution and usage of sensitive organizational data, as well as ensuring appropriate security and policy compliance.
Looking for a laptop with serious processing power? CIO.com put three high-end laptops -- the Soni Vaio Flip 15, the HP ZBook 15 and the Acer Aspire V3 -- to the photo- and video-editing test to see which offers the best bang for the buck.
PowerCloud Systems has released a cloud-based Wi-Fi solution that fills the gaps between residential products that lack management and features, and enterprise systems that can be overkill in smaller organizations.
Flexible PKard Reader and elegant Tactivo bring smart card authentication to your favorite mobile device
Earlier this year we tested several consumer-level 802.11ac routers. Here, we take a look at two enterprise-level access points. They're a part of the so-called "Wave 1" phase of the 802.11ac standard: both access points support up to three spatial streams and 80 MHz wide channels, offering theoretical data rates up to 1.3Gbps. But just as we saw with the 802.11ac routers, you won't get throughput rates nearly that fast.
- Check out the Log Rhythm's NEW Resource centre | New content, infographics, white papers and research
- Gartner Symposium/ITxpo – The World’s Most Important Gathering of CIOs and Senior IT Executives 26-29 October 2015 on the Gold Coast, Australia
- Only Citrix securely delivers everything you need for a truly mobile workspace wherever you go
- Firefox coming to iOS this year, Mozilla says
- Amazon snaps up Elemental to boost video on AWS
- Ex-Tesla engineer could face prison for hacking former manager's email, FBI says
- Microsoft will release its hackathon help tool to the world
- US DOJ tightens policies on use of simulated cells for surveillance
- AOL acquires Millennial Media to bolster in-app and mobile smarts
- The 7 common mistakes marketing leaders are still making
- How Greenstone is uniting IT/marketing in the name of audience management
- Rakuten Marketing chalks up rapid Aussie digital advertising growth
- Paid endorsements get Xbox One marketer in trouble with FTC