How online merchants are building armies of fake Twitter accounts to sell to users, businesses, and maybe even presidential candidates.
Websites covering the U.S. presidential election must prepare not only for heavy traffic but also vandals and hackers.
Microsoft's announcement of a next-generation Windows Phone 8 smartphone OS raises questions of the role of its mobile partner Nokia.
The meteoric rise in the smartphone market is creating a dangerous vulnerability in smartphone security - one that may not be patched until the problem expands.
Consumerization trends in the enterprise shifted dramatically in the first quarter of 2012, with mobile devices running Apple's iOS operating system showing more activity in the workplace than those running Google's Android, as well as end users migrating from Facebook and toward Twitter.
This week brings a Patch Tuesday of seven security fixes -- three critical -- plus an end to a breach that raised other security concerns.
Mimecast CEO Peter Bauer recently found himself at the intersection of consumerization and IT management.
Several companies will be exhibiting new products of interest to small businesses at the tradeshow/conference.
Four of the six security bulletins being released on Patch Tuesday are rated "critical" and will address both operating system and application vulnerabilities.
Just as enterprise network managers brace for the flood of bandwidth-consuming content stemming from the NCAA men's basketball tournament, content delivery providers put in a significant amount of time preparing to meet the meteoric rise in demand.
For all the hype surrounding Microsoft's upcoming Windows 8 operating system, significant adoption isn't expected to come from anyone but consumers.
With the last-minute Valentine's Day shoppers increasingly turning to the Internet to make up for lost time, e-commerce companies are doing everything they can to stand out from the pack.
The second Patch Tuesday of 2012 will see nine security bulletins, four of which are deemed critical.
Today's realities are forcing businesses to prepare their networks for a continued onslaught of authorized and unauthorized access from a slew of consumer devices, led by iPhones and iPads.
Articles by Colin Neagle