October 16, 2015
Jean Yang, who created the Jeeves software language, explains why the industry needs to do a better job of enforcing security and privacy policies in its applications.
August 07, 2015
July 01, 2015
June 26, 2015
Bring yourself up to speed with our introductory content
Learn about the growing risk of madware in mobile applications, as well as what enterprises should do to prevent security issues. Continue Reading
Microsoft HealthVault, which launched in October 2007, is a free personal health record (PHR) service offered by Microsoft that allows individuals to store personal health and fitness information in a central location. The Web-based service is available to anyone with a Microsoft account. Continue Reading
Weigh the pros and cons of technologies, products and projects you are considering.
Mobile security gaps stretch from distributed architecture to data leaks. Address security and privacy concerns before any coding starts. Continue Reading
Learn to apply best practices and optimize your operations.
As companies increasingly deploy predictive analytics tools to model employee and customer behavior, they're having to set new data privacy policies to help build trust both internally and externally. Continue Reading
A new generation of workers has brought mobile privacy to the forefront of security conversations. Organizations need to create privacy policies now or risk losing out on valuable employees. Continue Reading
This week, Tim Cook delivered strong words on consumer privacy and how other digital companies do business. Also in Searchlight: Caitlyn Jenner beats Obama's Twitter record; Yahoo will live-stream an ESPN game. Continue Reading
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
When implementing BYOD, employee privacy is often overlooked. Here's how to craft an enterprise BYOD policy that avoids potential legal complications. Continue Reading
It's important to respect end users' BYOD privacy, but balancing their rights and your organization's security can be a tricky task. Continue Reading