Thursday, April 02, 2015

9 security gadgets for mobile devices

Big data collection makes it hard for you to remain anonymous | What happens with data from mobile health apps?

Follow CITEworld

Twitter
Facebook
Google+
BY IDG ENTERPRISE
April 02, 2015
InCITE Your weekly digest of the most important developments in the consumerization of IT

9 security gadgets for mobile devices

If you use your smartphone or tablet for work, you need to keep your data secure when you're on the go. We look at nine gadgets that try to keep your important data out of the hands of others.

Resource compliments of: JAMF

Are your Apple devices managed as tightly as your PCs?

Ensure data security, improve employee productivity, save on labor costs and help desk headaches with the tool built to manage Apple – the Casper Suite by JAMF Software. We'll make sure they are.

Big data collection makes it hard for you to remain anonymous

One of the challenges of Big Data collection is maintaining personal privacy. One way to do that is with 'de-identification' - eliminating personally identifiable information. It can be done effectively if those doing the collection use rigorous methods. But experts say that is a very big 'if'.

What happens with data from mobile health apps?

Health IT experts caution of lax cyber hygiene in the medical community, urge policymakers to address privacy issues.

First look: Project Spartan, Microsoft's next-generation Web browser

Microsoft's new browser combines a minimalist look and feel with a rendering engine designed to keep pace with a rapidly evolving Web.

7 reasons why frameworks are the new programming languages

Thanks to powerful tools, the need for speed, and the shifting nature of programming itself, your next nerd fight will be over framework APIs, not syntax

Windows 10 Preview coming to more phones: Is yours on the list?

Microsoft expects the next preview build of Windows 10 to support 36 Nokia Lumia smartphones.

Monitoring more than just wearables

From turkey hatcheries to prawn farms, users are finding unique ways to use technology to monitor their situations.

Microsoft adds MDM capabilities to Office 365

Leveraging Microsoft Intune and Azure Active Directory, Microsoft extends built-in mobile device management capabilities to Office 365 commercial plans at no additional cost.

The things end users do that drive security teams crazy

To protect users from public embarrassment their identities have been withheld in these true stories of failures to follow security protocol.

Follow CITEworld

Twitter
Facebook
Google+

You are currently subscribed to citeworld_weekly_update as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

Copyright (C) 2015 CITEworld, 492 Old Connecticut Path, Framingham MA 01701

**Please do not reply to this message. To contact someone directly, send an e-mail to online@citeworld.com.**

No comments:

Post a Comment