December 30, 2015
Just in time for the New Year, we've rounded up our top Searchlight columns. Read about the year's top technology stories on 2015 big data trends, Windows 10, the Apple Watch and more.
December 29, 2015
Just in time for the new year, we've rounded up our top Searchlight columns. Read about the year's top technology stories on 2015 big data trends, Windows 10, the Apple Watch and more.
October 16, 2015
Jean Yang, who created the Jeeves software language, explains why the industry needs to do a better job of enforcing security and privacy policies in its applications.
August 07, 2015
Bring yourself up to speed with our introductory content
Learn about the growing risk of madware in mobile applications, as well as what enterprises should do to prevent security issues. Continue Reading
Microsoft HealthVault, which launched in October 2007, is a free personal health record (PHR) service offered by Microsoft that allows individuals to store personal health and fitness information in a central location. The Web-based service is available to anyone with a Microsoft account. Continue Reading
Weigh the pros and cons of technologies, products and projects you are considering.
The U.S. government has been criticized for its lack of updated privacy regulations. Expert Mike Chapple advises enterprises that want to bolster their privacy policies. Continue Reading
Mobile security gaps stretch from distributed architecture to data leaks. Address security and privacy concerns before any coding starts. Continue Reading
Learn to apply best practices and optimize your operations.
As companies increasingly deploy predictive analytics tools to model employee and customer behavior, they're having to set new data privacy policies to help build trust both internally and externally. Continue Reading
A new generation of workers has brought mobile privacy to the forefront of security conversations. Organizations need to create privacy policies now or risk losing out on valuable employees. Continue Reading
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
When implementing BYOD, employee privacy is often overlooked. Here's how to craft an enterprise BYOD policy that avoids potential legal complications. Continue Reading
It's important to respect end users' BYOD privacy, but balancing their rights and your organization's security can be a tricky task. Continue Reading