Companies often rely on mobile-device management systems as a key element in their protection strategy. But they also need deep and broad visibility across mobile devices combined with the capability to… Read more »
Android is teeming with malware-tainted apps, according to a series of recent stories in the tech media. But common sense and user education can be more powerful weapons than the security… Read more »
Cisco’s VNI graph shows mobile data growing 18 times over the next five years, and it makes a strong case for the need of mobile networks to evolve to reflect the… Read more »
There will be over 700 million cellular-enabled machine-to-machine (M2M) device adoption and system deployments in the U.S. by 2017. As the volume of M2M devices and associated data increases, so too… Read more »
When cybercriminals hit a wall on one type of attack they try another and another until they eventually find a hole and get through. Rarely do they pack up their bags… Read more »
But HDBaseT can deliver video in cable lengths exceeding 300 feet, and TVs located anywhere in the home can be connected to a computer and the Internet with HDBaseT. Read more »
If the third quarter told us anything, it was that IT M&A activity is alive and well, particularly in the big data space. When a company can store or analyze large… Read more »
A worm that uses a Microsoft Windows vulnerability to penetrate control systems for the not-so-smart grid is just the beginning of how increasingly sophisticated cyber attacks could target the power grid… Read more »
I spent last week at a conference in San Francisco with many of my colleagues and community members from around the world, but the giant volcanic ash cloud over Europe put… Read more »
NIST’s Cyber Security Coordination Task Group has released its draft report, “Smart Grid Cyber Security Strategy and Requirements” (PDF). On page 30 is an AMI diagram that by its very complexity… Read more »