Smartphones and tablets have moved from executive toys to essential work tools, according to customers on a panel at the AirWatch Connect conference in Melbourne. However, smart mobile devices have not replaced laptops in all cases, they said.
Cisco fixes critical remote command execution vulnerability in Secure Access Control Server
Cisco Systems released security patches for Secure Access Control Server (Secure ACS) for Windows to address a critical vulnerability that …
Apps drive business productivity, respect for IT
Mobile applications have streamlined business processes and increased the capabilities of Swisse Wellness, Stockland and Eastern Tree Services (ETS), the companies said on a customer panel at the AirWatch Connect conference in Melbourne.
Asia Pacific to account for 25% of global data centre infrastructure spending by 2016
The Asia Pacific (APAC) region will account for 25 percent of global data centre infrastructure spending by 2016, according to …
Mobile device management shifts to the cloud
New cloud-based software lets employees register, secure, and manage their personal devices without IT department involvement. And a simplified Web interface automates a lot of management tasks.
New York Times site hack shifts attention to registry locks
One way that owners of major websites can mitigate the risk of their domains being hijacked like The New York Times’ site was on Tuesday is to apply what is known as a registry lock on the domain, security researchers say.
How to deal with different types of DNS attacks
DNS servers work by translating IP addresses into domain names. This is why you can enter cnmeonline.com into the browser …
If you sell 36 million Samsung or Apple smart watches, are you successful?
Sales of so-called “smart watches” will surge from 1 million to 36 million in five years, according to a speculative new report from Juniper Research. But whether that defines “success” remains an open question.
Twitter acquires Trendrr to get a better handle on tweets about TV
Twitter has acquired Trendrr, a data analysis company, to better leverage users’ tweets about television to draw in more advertisers.
Developers hack Dropbox, show how to access to user data
Two developers have cracked Dropbox’s security, even intercepting SSL data from its servers and bypassing the cloud storage provider’s two-factor authentication, according to a paper they published at USENIX 2013.
IBM starts restricting hardware patches to paying customers
Following through on a policy change announced in 2012, IBM has started restricting availability of hardware patches to paying customers, …
VMware spotlights key NSX security tool for deploying security software and services
VMware’s NSX network virtualization platform, expected out by year end, will have a key security tool for deploying security software and services to VMware-based virtual machines.
VMware's virtualization quest could help shake up storage, too
The jam-packed VMworld show this week in San Francisco has been VMware’s launchpad for flights deeper into storage, an area …
The evolving media landscape in Singapore
How different is the media scene in Singapore and this region and how are companies coping with the challenges? Sameer Kanse, Business Head of Tata Communications’ Media Services, has some answers.