Jen A. Miller

Jen A. Miller is a freelance journalist from New Jersey who writes for the New York Times, Philadelphia Inquirer and Runner's World, among others.

Malvertising: The new silent killer?

Mobile device management has become alphabet soup

Mobile device management has become alphabet soup

The BYOD movement, once looked on as the holy grail of employee satisfaction and IT mobile device security, is increasingly being supplanted by a number of options – such as COBO, CYOD, COPE – that draw a thicker line between personal...

Is a lack of enterprise apps killing BYOD?

Is a lack of enterprise apps killing BYOD?

Bring-your-own-device policies in the workplace often pit employee satisfaction and privacy against corporate security. And as the number of employees and companies participating in BYOD programs continues to fall, can enterprise apps...

4 new cybercrime trends threaten your business

4 new cybercrime trends threaten your business

A mid-year report shows that people aren’t necessarily getting smarter about security, even in the face of increased attacks from cybercriminals.

How the tech industry is greening its data centers

How the tech industry is greening its data centers

The desire to be masters of their own energy domains has helped fast-track a growing community of self-generating – and increasingly green – data center power consumers.

How the tech industry is greening its data centers

How the tech industry is greening its data centers

The desire to be masters of their own energy domains has helped fast-track a growing community of self-generating – and increasingly green – data center power consumers.

How to deploy tablets to your mobile workforce

How to deploy tablets to your mobile workforce

Wakefield Canada needed a new tablet PC for use in the field. Who better to ask then the very folks who’d have to use the mobile devices? Here’s what they chose and why.

How tech protects victims by monitoring inmates

How tech protects victims by monitoring inmates

The Victim Information Notification Everyday system is used across the country to track the movement of two million criminals, alerting victims when their attackers are released. Here’s how VINE decided on an upgrade strategy for its...

Is your security software sitting unused on the shelf?

Is your security software sitting unused on the shelf?

Your security software isn't working? It could be because your company is one of the many that doesn't actually use the products they buy.

Watch out for these 3 holiday shopping scams

Watch out for these 3 holiday shopping scams

The holiday shopping season is also the holiday scamming season. Whether you shop online or at the mall, be mindful of these three types of scams.

PCI compliance under scrutiny following big data breaches

PCI compliance under scrutiny following big data breaches

Should PCI standards do more than set a baseline for security -- and should they be given teeth for when companies don’t comply?

Today's security hacks are after more than bank info

Customers cringe every time they hear about a bank, retail or healthcare hack that puts personal or financial data at risk. Today's hackers are after much more that credit card numbers, though -- and most firms are powerless to stop...

Load More