Editors' Picks
-
Enterprise app store encryption: Lessons to learn from Apple
After the Apple App Store's security mishap, expert Michael Cobb details the minimum enterprise app store encryption requirements.09 Aug 2013
-
Junipers' Mobile Threats Report: Mobile malware attacks grew over 600%
Juniper Networks' third annual Mobile Threats Report reveals mobile malware grew 614% in 2012, most of it aimed at Android users.06 Aug 2013
-
Apple iOS device management cheat sheet
Managing iPhones, iPads and their apps can get tricky. Sometimes it's good to take a step back and look at the basics of iOS device management.01 Aug 2013
-
Apple iOS devices and VDI: Connecting the cult and the corporation
If your organization wants to access virtual desktops from Apple iOS devices, keep these tips in mind to make the transition smooth.10 Jul 2013
-
Patent for self-destructing email could be a real 'boom' for security
This week's Searchlight rejoices at the prospect of self-destructing email, plus iWatch rumors, an MIT project that lets you play spy, and more.05 Jul 2013
-
Business tablet forecast for VARs: Looks good in early innings
With a good tablet forecast among businesses on the horizon, industry observers say VARs should plan for more apps and more devices.28 Jun 2013
-
Developers and users both have cause to celebrate BYOA and BYOC
Executive Editor Jan Stafford explores the benefits and challenges of the 'bring your own applications' and 'bring your own cloud' trends.17 Jun 2013
-
The personalization trend turns a corner and goes too far
In this week's Searchlight: Google's next move in personalization, what's on Tim Cook's mind, new challenges to Net neutrality and more.31 May 2013
-
Data science: A crash course
Is your organization practicing good data science? Contributor Phil Simon examines how data scientists are transforming big data into 'the new oil.'17 May 2013
-
Android versus iOS in the enterprise: A whole new ballgame in 2013
Android has taken steps to address its poor security reputation. These improvements will help Android compete against iOS in the enterprise.01 Apr 2013
-
With social networking layer, Amazon flexes digital-disruption muscle
In this week's Searchlight: Amazon plays disruptor once again with its buy of social networking site Goodreads, cyberattacks get scarier and more.29 Mar 2013
-
How CIOs can use game mechanics to build better engagement
Game mechanics are more than just rewarding badges. This primer on game design theory offers insight on building customer and user engagement.20 Mar 2013
-
Windows tablet development may be best for mobile businesses
Although Windows 8 tablets might not be what most Java developers have in mind, some experts say it's the right way to get enterprises mobile.18 Mar 2013
-
Apple VPP makes it easier to buy iOS business apps
The Apple Volume Purchasing Program lets organizations buy public iOS business apps for employees who use iPhones and iPads for work.22 Feb 2013
-
Putting a price tag on IT innovation
In this Searchlight, money can't buy happiness, but it might help cure diseases and promote IT innovation. Plus, cyberattacks hit major targets.22 Feb 2013
-
What risk does the Apple UDID security leak pose to iOS users?
Expert Michael Cobb details Apple's Unique Device Identifiers, plus why iOS users should be concerned about the Anonymous UDID security leak.12 Feb 2013
-
How iOS encryption and Data Protection work
With Apple's iOS encryption and Data Protection, you can take advantage of strong data security. But first make sure users enable the right settings.11 Feb 2013
-
Long tail: Where has it gone?
A popular topic not too long ago, find out how long tail is frequently used today by companies selling niche apps.08 Feb 2013
-
Comparing mobile operating systems' manageability and security
Each of the popular mobile operating systems has different security and management features. Compare them to see which ones might fit in your company.28 Jan 2013
-
The list: Top information technology trends, news and 2013 predictions
This week's SearchCIO.com Searchlight wraps the year with top information technology trends and news and 2013 predictions in handy list form!28 Dec 2012
Security Management Strategies for the CIO