Tag Archives: security

Hacking Sand Hill: How the cloud will help security startups lure VCs

Originally posted on Gigaom:
The computer security industry is far from an easy place to build a successful startup. Security has traditionally been controlled by a small group of established firms that maintain a vice-like grip on the major IT…

Posted in byod, cloud computing, networking, Security | Tagged , , , | Leave a comment

So NBC.com got hacked. So what?

Always enjoy reading stuff like this and figuring out how something works. It makes technology fun!

Posted in byod, cio, cloud computing, consumer, EUC, Security | Tagged , , , | Leave a comment

Cyber-rattling is a Convenient Excuse for Security Vendor Failures

Posted in asset management, byod, Productivity, Security, virtualization | Tagged , , , , | Leave a comment

Mac Automation Tutorials

Mac Automation Tutorials http://www.ienticement.com/how-to/mac-automation-tutorials/

Posted in Amazon, Apple, Productivity, Security, virtualization | Tagged , , , , | Leave a comment

Find out which mobile apps are stealing your identity #BYOD #infosec

Find out which mobile apps are stealing your identity http://www.techrepublic.com/blog/security/find-out-which-mobile-apps-are-stealing-your-identity/8956

Posted in byod, cloud computing, consumer, Security | Tagged , , | Leave a comment

In A Connected World, A Corporate BYOD Strategy Eliminates The USB Drive

The USB flash drive is the splinter in the hands of many corporations. A USB drive is used by end users to bridge a gap in the mobility of data. Bridging that gap without impeding productivity is possible with the correct alignment of corporate … Continue reading

Posted in byod, cio, cloud computing, consumer, Productivity, Security | Tagged , , , , , | Leave a comment

Extending Enterprise Storage Services To Make Them BYOD Friendly

BYOD is not going away soon and the adoption rate is accelerating. Virtualization is now a standard technology in the data centre.  The question comes up is how do you extend enterprise storage services to non IT devices? Content creation … Continue reading

Posted in Apple, byod, dr, Security, virtualization | Tagged , , , , , | Leave a comment