- Integrate encryption with device management to overcome key-management issues: LANDESK
- Plex hacker demands Bitcoin ransom for return of data
- Telcos, government agencies least trusted to protect Australians' privacy
- Australia is world's fourth-largest holder of network-security patents, analysis finds
- How a burglar can make a copy of your door key, from a Facebook picture
policy management - News, Features, and Slideshows
A string of high-profile data breaches in 2012, from LinkedIn to Global Payments, have kept enterprise data security in the limelight. But most organizations still tend to be reactive and focus on firefighting when it comes to data security, rather than implementing a more effective long-term strategy. Let's examine the four most common pitfalls of this short-sighted approach.
Cisco this week announced its intent to acquire BroadHop, a developer of network management servers and software for carriers.
Procter & Gamble Co. (P&G), which is ranked 20th on the Fortune 500 list, can afford to buy its employees laptops. But it is instead letting several hundred of its workers use their own laptops as part of a workplace experiment.
Whitepapers about policy management
When implementing a new BYO program, you might need to modify existing policies and create new user agreements that help obtain employee acceptance of new policies. This whitepaper looks at the best practices for creating these policies that can help you construct your own successful user agreement for Desktop Workspace or another BYO solution.
- UXC Oxygen appoints Craig Stevenson as business manager
- Ransomware in Australia has seen a steady growth in the past six months: Bitdefender
- Canon opens the doors on new headquarters in Brisbane (+14 photos)
- Gartner explains how businesses can simplify the mid-market datacentre
- Cisco launches Internet of Everything Innovation Centre in WA