- Tor points finger at US researchers after possible compromise of service
- CISOs still struggle for respect from peers
- Attackers use domino effect to compromise your accounts
- Tor hints at possible U.S. government involvement in recent attack
- Great privacy essay: Fourth Amendment Doctrine in the Era of Total Surveillance
enterprise - News, Features, and Slideshows
The BlackBerry PlayBook is nearing its final build with fully working tablets on public show at Mobile World Congress and one stand representative going so far as to refer to a PlayBook as "my own". All that's left, we're told, is battery optimisation - something that's actively being worked on.
Once ugly, slow and purely functional, the smartphone has become sleek, fast and at the forefront of technology. And the devices aren’t just for the enterprise — ever since Apple released it's ever-popular iPhone in 2007, more and more consumers have forgone their candybar phones in favour of mobile computers.
Users love the iPhone, but IT does not. The biggest complaints: The iPhone can't be managed for security and access policies like a BlackBerry can. Businesses can buy a BlackBerry Enterprise Server or Motorola Good for Enterprise server to manage user profiles over the air, ensuring that users conform to password policies, encryption policies, app-installation restrictions, and so on, as well as have their e-mail, VPN, and other settings preconfigured to reduce hands-on deployment effort.