Latest articles from Bill Detwiler
From BYOD and social media to ergonomics and encryption, Tech Pro Research has dozens of ready-made, downloadable IT policy templates.
The wearable tech revolution is upon us, and businesses should prepare now by crafting an effective policy for managing wearable devices.
From organized criminals and state-sponsored actors to your own employees and IT staff, this field guide fills you in on the people who are attacking your network, and provides tips on how to fight back.
- Geek lit: Microsoft's Mark Russinovich and his Rogue Code
- North Korea denies hacking South's nuclear power operator
- My top 10 predictions for 2015, by @SDenecken
- Bad, bad Internet news: Internet Systems Consortium site hacked
- Tor users 'not at risk' after failed attack by PlayStation, Xbox Live hackers
- Top iOS news of the week: Dual SIM, insomnia, Apple TV and iPad