There's a lot of confusion, disruption and even turbulence in the market for enterprise mobility management software, which is used to manage smartphones and tablets and the data and apps running on them.
An Israeli company has developed a product it says can detect if a mobile device connects to a fake cellular base station or Wi-Fi access point, potentially protecting critical data from falling into the hands of hackers.
The recent Supreme Court 6-3 ruling on the Affordable Care Act (ACA) allows health insurance consumers to receive federal subsidies regardless of their state’s role in running their insurance market makes healthcare insurance
Everyone I spoke to at the Informatica World 2015 last month wants to build a Data Lake, but are afraid that the Lake will end up as a Swamp. Based on where we are heading, I don’t think using words like Lakes, Swamps,
Good Technology is hoping its cloud-based Management Suite will help IT departments that don't want to rely on multiple vendors' products to manage the various phones and tablets employees bring to work.
The SilentText secure messaging application bundled with Blackphone had a serious vulnerability that would have allowed attackers to decrypt messages, read contact information, gather location data and even execute malicious code on...
A scathing report from the DHS accuses the U.S. border patrol of wasting more than $240 million on Predator drones with such bad planning it often lacked places to land, equipment to fix them or bad guys to catch.