People make much of technical matters in security, but the most important force behind malware is social engineering, not some vulnerability or bad design....
/images/stories/70x50/bug_knowledgecenter_70x70_(2).jpgLet's assume that today's CIOs, along with their IT staff, are not viewing smart phones as just another "cell phone" that has little more...
/images/stories/70x50/bug_knowledgecenter_70x70_%282%29.jpgPeople often wonder what technology has to do with corporate governance, and how any piece of software can assist in matters of ethics and...
Traditionally, the area of information security has been purely defensive. Classic examples of the defensive mechanisms used to protect communication networks include firewalls, encryption...
/images/stories/knowledge_center/analysts_corner.gif
I am grateful to have been invited by the GSM Association to lead a session on the future of mobile location-based services, or...
Customer experience (CX) became the top brand differentiator in 2018, outpacing price, product quality and everything else. Businesses that offer a superior and differentiated...
The trickle-down effect of enterprise IT is as old as business technology. Vendors have long aimed new innovations at enterprises whose deep pockets and...