April 22, 2016
Experts face off in Congress over 'going dark' encryption debate, stake out positions on security, privacy and government access; polls show support for strong encryption.
February 26, 2016
The Apple-FBI case is igniting an enterprise-wide discussion on privacy versus security. What CIOs need to know. Also in Searchlight: Facebook's population map; Intel's latest diversity push.
December 30, 2015
Just in time for the New Year, we've rounded up our top Searchlight columns. Read about the year's top technology stories on 2015 big data trends, Windows 10, the Apple Watch and more.
December 29, 2015
Just in time for the new year, we've rounded up our top Searchlight columns. Read about the year's top technology stories on 2015 big data trends, Windows 10, the Apple Watch and more.
Bring yourself up to speed with our introductory content
Learn about the growing risk of madware in mobile applications, as well as what enterprises should do to prevent security issues. Continue Reading
Microsoft HealthVault, which launched in October 2007, is a free personal health record (PHR) service offered by Microsoft that allows individuals to store personal health and fitness information in a central location. The Web-based service is available to anyone with a Microsoft account. Continue Reading
Weigh the pros and cons of technologies, products and projects you are considering.
The U.S. government has been criticized for its lack of updated privacy regulations. Expert Mike Chapple advises enterprises that want to bolster their privacy policies. Continue Reading
Mobile security gaps stretch from distributed architecture to data leaks. Address security and privacy concerns before any coding starts. Continue Reading
Learn to apply best practices and optimize your operations.
A new research programming language looks to make it easier to enforce security and privacy policies in applications. Expert Michael Cobb explains how it works. Continue Reading
As companies increasingly deploy predictive analytics tools to model employee and customer behavior, they're having to set new data privacy policies to help build trust both internally and externally. Continue Reading
A new generation of workers has brought mobile privacy to the forefront of security conversations. Organizations need to create privacy policies now or risk losing out on valuable employees. Continue Reading
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
When implementing BYOD, employee privacy is often overlooked. Here's how to craft an enterprise BYOD policy that avoids potential legal complications. Continue Reading
It's important to respect end users' BYOD privacy, but balancing their rights and your organization's security can be a tricky task. Continue Reading