Building an MDM program
Creating a mobile device management (MDM) program can be a daunting prospect given the central role smartphones and tablets play in many workplaces.
Creating a mobile device management (MDM) program can be a daunting prospect given the central role smartphones and tablets play in many workplaces.
The Australian mobile device management (MDM) market is forecast to be worth $51.6 million by 2016 as more organisations allow personal smartphones into the workplace, according to a new report by Frost & Sullivan.
Organisations who haven’t done anything about the Privacy Act need to put best practice measures, such as privacy training, in place before Privacy Commissioner Timothy Pilgrim comes knocking, according to IBRS advisor James Turner.
With people handing in their company-supplied smartphone for their own consumer device such as an iPhone, it has become harder for IT managers to keep control of who is accessing their network and what information users have on their phone.
The Australian Communications and Media Authority (ACMA) is celebrating the 10th anniversary of the Spam Act, saying that it has helped reduce the amount of spam emails Australians receive.
Kogan Mobile's recent troubles herald the beginning of a wave of consolidation in the mobile virtual network operator (MVNO) market, according to Amaysim's CEO.
The focus on cyber security in the Department of Defence’s White Paper is a good start but retraining and upgrading skills that are in short supply at present is needed according to one security analyst.
Receiving an email to connect to someone on LinkedIn turned out to be a social engineering experiment that Trend Micro's global field enablement vice president, Blake Sutherland, will never forget.
Prime Minister Julia Gillard has announced that the new Australian Cyber Security Centre (ACSC) will be established in Canberra and draw on the skills of the nation’s best cyber security experts.
Consumer laptops built to Intel's new Ultrabook standard-cum-brand must include Intel Anti-Theft technology. Well, so what?
Part two of <i>Computerworld Australia's</i> look at hacktivism and its consequences.
Like the mutant offspring of Captain Jack Sparrow and French anarchist Pierre Proudhon — famous for his ‘property is theft’ claim — activist hacking group LulzSec surfed the Web spreading debonair charm, chaos and reckless acts of ‘hacktivism’ in equal measure.
SonyPlayStation Network (PSN) customers may be asked to pay for their own account and identity security in 12 months' time following a free year-long trial of a range of CSIdentity's anti-fraud services.
IT managers and CIOs will be treated to a rare series of head-to-head, presidential-style vendor debates between the likes of HP and IBM, and Brocade and Cisco at the forthcoming Implementing Information Infrastructure Symposium (IIIS) to be held in Sydney during August.
Over the last five years, the terms 'server' and 'desktop virtualization' have permeated almost every conversation in the IT arena, with much being said about the wealth of benefits both can offer enterprises.