- AusCERT 2013: Four dissenters to spur next year's security debates
- AusCERT 2013: Kill the password, says Mozilla
- AusCERT 2013: Unmanaged, unknown privileged logins opening the door for APTs: Cyber-Ark
- AusCERT 2013: Companies unaware of IPv6 security risk even if they’re not using it
- In pictures: AusCERT 2013 roundup
Strong executive desire to use iPhones led the Department of Sustainability, Environment, Water, Population and Communities to start looking for solutions that would separate government from personal information.
Despite the abundance of expert opinion, commentary and debate surrounding BYOD and mobile device use in the enterprise, there are still few clear answers to some of the biggest problems out there, according to a panel of experts that spoke at Interop.
Cloud computing and a "bring your own device" (BYOD) strategy aren't technology approaches typically associated with running an airport's information-technology operations. But London Gatwick, the U.K.'s second largest airport, is pushing heavily into both.
BYOD brings out the classic problem between control of corporate information and individual freedom. It kicks it up to a whole new level because the devices belong to the users, but at least some of the apps and information belong to the company and as such need protection and policy enforcement.
Perhaps nowhere else in IT is the opportunity to innovate as rich as it is with enterprise mobility. Smartphones and tablets offer the chance to improve everything from employee productivity to how you interact with customers and achieve competitive advantage. But most enterprises are trying to implement modern mobility strategies using existing IT organizational structures.
Whitepapers about BYOD
Key mobile trends and analysis on how performance testers must change their testing methodologies to ensure they are accounting for the changes caused by mobile usage. Download today.
This research paper intends to provide a brief summary of the cybercriminal underground and shed light on the basic types of hacker activity in Russia. It discusses fundamental concepts that Russian hackers follow and the information they share with their peers. It also examines prices charged for various types of services, along with how prevalent the given services are in advertisements. The primary features of each type of activity and examples of associated service offerings are discussed as well. Read this paper.
When you think Open Source software, you may think of half-baked programs too hard to use, or perhaps lacking power. Well, think again. This Open ...
Allianz Shared Infrastructure Services SE (ASIC) wanted to replace its current suite of management tools, some of which had been developed in-house, with a standard solution for the management of 600 network components in its data centre, in order to reduce costs and further improve quality. Find out what approach they took download today.
- FTTest EngineerVIC
- FTTechnical Business AnalystNSW
- FTJob Title: Mac Systems/ Enterprise Systems EngineerNZ
- FTTechnical Consulting ManagerNSW
- FTOS Web Applications DeveloperNSW
- FTLead Software EngineerSA
- FTWeb Analyst - WebTrendsVIC
- FTQuality ManagerSA
- FT.NET - Sitecore Developer - Melbourne - PermNSW
- FTSenior Python DeveloperNSW
- FTFlash / ActionScript Developer - ContractNSW
- FTR&D EngineerSA
- Analytics and personalisation drive leading marketer behaviour: Report
- Innovation and big data take centre stage during CMO panel
- Twitter targets second screen interaction with Amplify advertising partnerships
- Facebook talks hyper-targeting, analytics and cross-platform at AANA event
- Tapping into social experience: Tourism Australia