Thousands of Bell Canada field technicians this fall will begin doing their jobs of installing and testing telecom and media services connections with help from custom-designed smartphone apps rather than via their laptops. It's all part of what Bell Canada is calling its "One Device" mobile initiative, in essence, a mobility makeover.
Stories by Ellen Messmer
The abrupt discontinuation of the disk and file encryption freeware TrueCrypt by its secretive software developers has left many security experts stunned, some of whom say there now are no viable alternatives left in non-commercial encryption software.
Just because Gates has given up his role as Microsoft's Chairman doesn't mean he's slowing down…
The Linux Foundation today announced the first protocols that it wants to address as part of its open-source code testing and security review. Not surprisingly, OpenSSL, where the infamous Heartbleed bug was discovered, is among them.
Juniper Networks and Palo Alto Networks today agreed to settle their long-running firewall-related patent infringement lawsuits against each other, with Juniper saying Palo Alto Networks has agreed to pay US$175 million in cash and equity as part of the settlement.
While small- to midsized businesses (SMB) don't have the luxury of information security teams and resources that large enterprises can afford, they still face many of the same threats.
Sophos has added file-level encryption to its mobile security software so that users of Android or Apple iOS devices with Sophos Mobile Control 4.0 can share encrypted files.
The Department of Homeland Security (DHS) has launched a Web portal aimed at assisting software developers in vetting their code for weaknesses hackers can exploit. The DHS calls this portal the Software Assurance Marketplace, or SWAMP for short. It's not a ‘marketplace' in the sense that money is changing hands for products and services, but rather more a place to share tools, techniques and information.
The U.S. Department of Justice, working with the FBI, this week took the unprecedented step of indicting five Chinese army officers for allegedly breaking into the networks of American companies and a labor union to steal trade secrets of use to Chinese businesses.
Cisco's Advanced Malware Protection (AMP) technology, known as FireAMP, is already supported in its firewalls and e-mail gateways, but now the company is making AMP available as a standalone product.
Check Point Software Technologies today announced an alliance with seven security firms to make use of their threat-intelligence feeds and fee data from those sources into Check Point security gateways to block attacks.
Everyone wonders about the secret formula for Coke. But at The Coco-Cola Company, whose brands like Minute Maid make it the No. 1 juice maker in the world, there's a secret formula in an internal application called the "Black Book" that tells how to run the company's global juice business.
Google is making available a service to allow its enterprise customers to send and receive encrypted e-mail to users of non-Google mail systems, including Yahoo and Microsoft Exchange.
IBM has broadened its e-commerce offerings with a new range of digital marketing and customer analytics that can be provided through on premises software or via a cloud service that customers appear increasingly open to adopting.
Just because BYOD has become standard operating procedure in most workplaces doesn't mean the practice has stopped causing challenges for IT.