Recently we sat down with visionary security evangelist John Britton to ask him all about enterprise mobility. In part of of the series we asked him about the use of connected devices to enhance business.
Recently we sat down with visionary security evangelist John Britton to ask him all about enterprise mobility and the use of mobile apps to enhance business. Here’s what he had to say. Enterprises building their
In part 1, we covered the brilliance of biometrics including increased security and convenience. There’s a lot of biometric data out there already and loads of research in this area making it more of a
A vast portion of the CIA’s computer hacking arsenal was exposed on Tuesday by WikiLeaks. The anti-secrecy organization posted thousands of files revealing known exploits and device vulnerabilities used by the CIA to convert devices
Let’s face it, we live in an online world now. Avoiding crime is no longer a matter of positioning yourself away from risky locations, holding more tightly onto your wallet or locking your doors. Anyone,
Are we are ready to start moving towards biometrics as a viable alternative to the good old trusty username and password? It’s an interesting area to look at for lots of reasons. For us at
Humans and electricity have something in common. They’re both inherently lazy, at least in some ways. Security for example. People, just like electric currents, will always seek to take the path of least resistance. If
A recent report states mobile internet usage has surpassed desktop for the first time. Many of us thought this happened some time ago, but regardless, the evidence is clear – we love our mobile phones.