A hot desking strategy allows employees to sit wherever they want, creating more flexibility for workers and more complexity for IT managers.
With more businesses turning to SaaS and cloud-based systems, CIOs often lack a proper understanding of the organization's application portfolio.
Co-working spaces can help companies maximize productivity, but they can also introduce security concerns if employees are not trained to connect securely.
Mobile technology buffs and analysts are hoping Apple will revolutionize the smartphone market once again 10 years after it released the first iPhone.
X-Force researchers disclosed several Android vulnerabilities that could enable cybercriminals to use custom boot modes to take over Nexus 6 and 6P modems.
For companies with a bring-your-own-device policy, IT managers should create security requirements that address BYOD risks without denting productivity.
Consumers are buying new devices at a slow rate, but users who avoid the latest technology upgrade risk missing out on critical security updates.
Many employees are sure to return to work after the holiday with brand new mobile devices, creating a variety of BYOD policy challenges for IT managers.
I learned a lot while online shopping for Christmas — including some of the major warning signs signaling false or malicious mobile apps.
Experts believe the new iteration of Tordow malware, which targets root access to take total control of infected devices, could become a worldwide threat.