Artificial intelligence poses a wide range of hidden and unknown dangers for enterprises deploying the technology. Here’s how to guard against the legal and compliance risks of AI.
Stories by Bob Violino
Top execs make big targets, especially when traveling abroad. Here’s how to protect C-level officers from whaling, espionage, and themselves.
As mobile device management continues to morph, consider what EMM features you need right now as well as what you might need in the future -- and don't neglect the user experience.
Without network support, businesses may not be able to reap all the benefits of the data IoT generates.
Enterprise mobility management tools are evolving far past their mobile device management roots. New features include better analytics, integration with Office 365, mobile identity management -- and preparing for the internet of things.
Security executives have taken on much more responsibility and visibility in recent years as threats to corporate information assets and physical resources have increased.
Regulations aimed at protecting the security and privacy of organizations and individuals are well meaning. But sometimes these standards, or how they're interpreted, can be more than a nuisance--they can actually contribute to weaker security.
The past year has seen its share of newly emerging or persistent threats that security and IT executives need to be aware of and in many cases defend against.
If you're an Android user -- or want to be -- you've likely heard about all the security risks of Google's mobile operating system. But how real are these threats, and how much damage can they do? Despite the fears, are Android devices actually a safe bet for an enterprise mobility strategy?
You've probably been hearing a lot lately about the Internet of Things (IoT). The IoT (see: "The IoT: A Primer" at the end of this piece), while still in the early stages of development, is slowly making its way into the mainstream as more objects become connected via technology such as radio frequency identification (RFID) and the iniquitousness of the Internet.
Bland by name and superficially viewed as gee-whiz technology never to be realized, the Internet of things (IoT) has significant potential to transform business. Early forays into Net-enabling physical objects are already pointing the way.
The rapid growth of mobile devices that can access corporate networks and data, the expanding use of cloud-based IT services, and the increasing popularity of apps such as online banking mean that IT needs to pay closer attention to authentication.
When people talk about the Internet of Things (IoT), the most common examples are smart cars, IP-addressable washing machines and Internet-connected nanny cams.
Chances are you've heard about the Internet of Things (IoT)—or you will soon enough. The term carries a number of definitions. But in general, the IoT refers to uniquely identifiable objects, such as corporate assets or consumer goods, and their virtual representations in an Internet-like structure.
Radio-frequency identification (RFID) technology has shown promise as a way to monitor the movement and even the condition of all sorts of objects.