Editors' Picks
-
Apple VPP makes it easier to buy iOS business apps
The Apple Volume Purchasing Program lets organizations buy public iOS business apps for employees who use iPhones and iPads for work.22 Feb 2013
-
Putting a price tag on IT innovation
In this Searchlight, money can't buy happiness, but it might help cure diseases and promote IT innovation. Plus, cyberattacks hit major targets.22 Feb 2013
-
What risk does the Apple UDID security leak pose to iOS users?
Expert Michael Cobb details Apple's Unique Device Identifiers, plus why iOS users should be concerned about the Anonymous UDID security leak.12 Feb 2013
-
How iOS encryption and Data Protection work
With Apple's iOS encryption and Data Protection, you can take advantage of strong data security. But first make sure users enable the right settings.11 Feb 2013
-
Long tail: Where has it gone?
A popular topic not too long ago, find out how long tail is frequently used today by companies selling niche apps.08 Feb 2013
-
Comparing mobile operating systems' manageability and security
Each of the popular mobile operating systems has different security and management features. Compare them to see which ones might fit in your company.28 Jan 2013
-
The list: Top information technology trends, news and 2013 predictions
This week's SearchCIO.com Searchlight wraps the year with top information technology trends and news and 2013 predictions in handy list form!28 Dec 2012
-
Remote wipe 101: Policy and how-tos for protecting mobile data
Most mobile devices have native remote wipe capabilities. If those features aren't enough for your company, supplement them with MDM and the cloud.21 Dec 2012
-
Top 10 consumerization of IT news stories of 2012
The consumerization of IT really took off this year. Take a look back at the mobile devices, cloud services and trends that made headlines in 2012.14 Dec 2012
-
In creating mobile applications, perfection sometimes beats speed
This week SearchCIO.com Searchlight considers whether MySpace deserves a third act, and if it's better to be fast or good with mobile applications.14 Dec 2012
-
Why smartphone security policy is more effective than MDM tools
Video: Expert Aaron Turner explains why sound smartphone security policy is more effective than MDM tools for securing enterprise mobile devices.10 Dec 2012
-
Top 5 holiday tech gifts coming to the workplace
All your end users want for Christmas is the latest smartphones and tablets. Now's the time to prepare for the post-holiday onslaught of tech gifts.07 Dec 2012
-
Top 10 consumerization and BYOD tips of 2012
This year's most popular tips will help you get a handle on major consumerization of IT trends, including BYOD and cloud file-sharing.06 Dec 2012
-
Channel sees potential in Windows Phone for business customers
With Windows Phone 8 out the door, channel organizations cite management and BlackBerry's decline as positives for enterprise, BYOD as a negative.04 Dec 2012
-
Four approaches to mobile device protection
From MDM agents to use agreements, here are four steps to consider for mobile device protection.20 Nov 2012
-
Malware identified as latest Mac Trojan targeting activists
Apple platform security firm Intego has discovered OSX/Imuler.E, a new variant of the Imuler Trojan.14 Nov 2012
-
Mobile inventory management keeps business 'alive'
For Bell Nursery, mobile inventory management will keep business from withering on the vine.14 Nov 2012
-
Mobile inventory management keeps business 'alive'
For Bell Nursery, mobile inventory management will keep business from withering on the vine.13 Nov 2012
-
Where do women fit in the culture of IT? WITI founder addresses a gap
Is the culture of IT doing women a disservice? WITI founder Carolyn Leighton weighs in with this exclusive CIO podcast.26 Oct 2012
-
Scare up a mobility strategy now, before sales start to rot
This week's SearchCIO.com Searchlight treats you to tales of the importance of a mobility strategy, why no one can hide from 'big data,' and more.26 Oct 2012
Security Management Strategies for the CIO