With a partner network numbering thousands, PC maker Lenovo turned to the cloud for secure, time-sensitive access authorisation.
Showing results 1 to 20 of 422
The acquisition will help bolster McAfee's position in network security, which could be a further in-road to the enterprise where such solutions are absolutely vital. It also gives Intel a lucrative side project away from the ailing PC market.
In addition to jumping on the Windows Phone 8 bandwagon, the mobile carrier is trying its hand at hawking Windows 8 slates.
Organizations tend to trust manufacturers to ensure hardware in one's IT infrastructure stay safe, but more impetus needed to develop tools to safeguard device integrity, watchers urge.
Apple releases patch Thursday to curb Flashback malware, but one analyst says platform likely to come under "deep scrutiny" by cybercriminals and this could lead to more attacks in future.
Microsoft has released mobile versions of its core Office products, Word, Excel and PowerPoint, for Symbian smartphone users.Although they are not yet in the Nokia Store, the apps became available for download via the Nokia software update tool and the PC-based Nokia Suite on Tuesday.
What is a Raspberry Pi, and why is it so deliciously priced? Is the new Conficker worm coming for your PC? What is Vodafone's network guarantee, and why are we all enemies of the internet?
With many commercial antivirus providers facing a shrinking market share as free software gain in popularity, observers advise that they will need to focus on marketing their level of protection and support.
Amid criticisms current privacy policies to protect users are lacking, industry watchers note tighter rules may do more harm, and what is needed is a holistic approach.
Over the years no other software tool has helped my daily work as much as Microsoft Excel. I don't use Excel for financial work, but rather I use it for all kinds of computing tasks:It's very handy for doing network bandwidth computation.
Industry insiders share key takeaways from past year and how these can guide companies' security strategies in evolving IT landscape.
Launched in partnership with U.K. Citizens Advice Bureau, search giant backs new campaign which aims to educate users by simplifying online risks and security issues.
NYU prof Clay Shirky said that it will fall to the IT department to make social networking strategic---just like the PC, laptop and email.
As long-term evolution (LTE) networks, such as Telstra's new 4G network, bring about super fast mobile broadband to consumers across the globe, they could also potentially open up smartphones, tablets and other devices to hacks that previously only concerned PC users, according to network vendor Alcatel-Lucent.
Disallowing admin rights of employees' endpoint devices not realistic solution to preventing malware threats in today's self-service IT business climate, observers say.
HP will bank on integration of functionalities targeted at consumers and business users for its mobile operating system and build up ecosystem, exec says, adding developer interest is growing.
Users show lack of discipline by persisting in unsafe Web habits despite knowing risks involved, say security experts, who highlight the most common online mistakes.
Onus of securing smart devices should not be on employees and education-only method will not work, executive says, noting security of smart devices is becoming as important as PC security.
In new age of whistle-blowing where sites modeled after WikiLeaks allow anyone to disclose classified information, organizations must rethink enterprise security and risks, reveal observers.
In another life and another time, I ran the network testing program at PC Magazine. Back then, Mag (as it was called) evaluated application and device performance primarily on 10Mbps (gasp) or later a 100Mbps Ethernet link -- pretty much the state of the art then.