The creation of Android malware is now mature enough for there to be development cycles that mimic those of the legitimate software world, a report from Juniper Networks has concluded.
Cisco executive outlines Top 5 tips for mitigating the threat of device sharing
Martin Lee, EMEA Lead for Cisco Talos, outlines his 5 top tips to mitigate the ongoing threat of device sharing, … 0 325Most CIOs admit their firms don’t value them
Less than a third of businesses think IT contributes to strategic business objectives, admit CIOs.
Internet of Everything to generate $613bn profits in 2013
The ‘Internet of Everything’ (IoE) is expected to enable global private-sector businesses to generate at least $613 billion in global …
Gartner: BI software market growth rate slowed in 2012
The BI (business intelligence) software market cooled off a bit in 2012 after “a few historic banner years” of spending …
89% of IT managers believe their role will change: Aruba study
BYOD, cloud and virtualisation will transform the role of the IT manager from technical specialist to central business communicator, according …
Commission wants to turn tables on IP thieves by crippling PCs
Buried in a 100-page report issued last week by the Commission on the Theft of American Intellectual Property was a …
R&M announces reductions in ecological footprint
R&M recently claimed that it has significantly reduced its ecological footprint over the past year, citing a new CSR report …
UAE cloud security market poised for growth, says Frost & Sullivan
According to the latest report from Frost & Sullivan, the United Arab Emirates (UAE) is showing a greater demand for …
Syria disappears from the Internet again
Internet traffic to and from Syria, a country engulfed by civil war, again came to a halt on Wednesday, according …
Spammers reverting to old tricks in Q1 2013, says Kaspersky
According to Kaspersky Lab’s latest spam report, spammers are reverting to old tricks in order to avoid detection from spam …