Evan Schuman

Contributing Columnist

Want to Join?
Opinions expressed by ICN authors are their own.

Evan Schuman has covered IT issues for a lot longer than he'll ever admit. The founding editor of retail technology site StorefrontBacktalk, he's been a columnist for CBSNews.com, RetailWeek, Computerworld and eWeek and his byline has appeared in titles ranging from BusinessWeek, VentureBeat and Fortune to The New York Times, USA Today, Reuters, The Philadelphia Inquirer, The Baltimore Sun, The Detroit News and The Atlanta Journal-Constitution. Evan can be reached at eschuman@thecontentfirm.com and he can be followed at twitter.com/eschuman. Look for his blog twice a week.

The opinions expressed in this blog are those of Evan Schuman and do not necessarily represent those of IDG Communications, Inc., its parent, subsidiary or affiliated companies.

University's mobile app streaming idea has enterprise IT potential. But, oh yes, there's that security annoyance.

Mobile security: Worse than you thought

Mobile security: Worse than you thought

The latest Verizon Data Breach Investigations Report eloquently argues that aside from wireless, the form factor of mobile in and of itself poses security risks.

When does protecting privacy morph into invading privacy?

When does protecting privacy morph into invading privacy?

Employees and consumers are being more careful about sharing information that goes beyond strict need-to-know. We ran into one company that seems to not get that.

How bad can text security be? One company just showed us.

How bad can text security be? One company just showed us.

A massive number of text messages were stored in plaintext, with no security at all.

Facebook's iOS 'bug' secretly filmed users. IT, take note.

Facebook's iOS 'bug' secretly filmed users. IT, take note.

And a very different bug, planted by cyberthieves, presents even more frightening camera-spying issues with Android.

Mobile security perceptions don't approach reality. And that's a problem.

Mobile security perceptions don't approach reality. And that's a problem.

The best security approaches — such as continuous authentication — are invisible to the user and therefore frictionless. That's good in practice, but it can be bad in terms of customer perception. If they don't see it, they assume...

A revealing iPhone 11 headache

A revealing iPhone 11 headache

Sometimes, a mobile glitch is indicative of a much more pervasive issue. Our columnist's recent iPhone 11 iTunes headache perfectly illustrates how Apple's heralded focus on customer experience falls apart when doing upgrades.

The courts have ruled: Mobile sites must be accessible. But why did enterprises ever resist?

The courts have ruled: Mobile sites must be accessible. But why did enterprises ever resist?

Although this decision should end the debate and make it clear to companies that sites must be coded to be fully compatible—and, no, throwing in a toolbar option doesn't do it—it's astounding that companies ever resisted it.

IoT dangers demand a dedicated group

IoT dangers demand a dedicated group

The internet of things brings with it a wide range of IT security headaches, along with compliance nightmares — and turf wars.

Can an Apple Watch prevent fatal car accidents? It just might.

Can an Apple Watch prevent fatal car accidents? It just might.

A new study questions the efficacy of car accident-avoidance systems, but it's possible that a simple smartwatch might be part of the solution.

Almost half of tested free Android antivirus apps fail. That might prove very useful to IT.

Almost half of tested free Android antivirus apps fail. That might prove very useful to IT.

In BYOD environments, users tend to supplement corporate security programs with free versions. That is a remarkably bad idea, and one analyst report suggests a way to stop it.

In mobile, does IT want more control or less work?

In mobile, does IT want more control or less work?

Would changing mobile warranty rules be a good or bad thing for enterprise IT?

Load More