Security Feature

What Makes a Business Notebook a Business Notebook?

The term \"business notebook\" meant something ten years ago. Even though the lines have been blurred, there are still features that device a business laptop. Read full article

Security News

DARPA Seeking to Identify Backdoor Security Threats In Tech

The Defense Advanced Research Projects Agency (DARPA) is growing increasingly concerned with the possibility of supply-chain IT tech being deliberately built with backdoors for attackers to illegally get a hold[...] Read full article

Security News

Samsung Printers Have Hidden Security Exploit

The United States Computer Emergency Readiness Team (US-CERT) has reported a security vulnerability in various Samsung printers and Dell-branded printers manufactured by Samsung that could allow an attacker to remotely[...] Read full article

Security News

U.S. Senate Panel Approves Amendment to Digital Privacy Bill

The U.S. Senate Judiciary Committee has approved a privacy bill that would amend the laws set forth in 1986\’s Electronic Communications Privacy Act (ECPA), which many in the technology arena[...] Read full article

Security Feature

What Does 802.11ac Mean For Business?

802.11ac is the latest Wi-Fi standard, which promises blazingly fast Wi-Fi speeds. TechnologyGuide looks to separate its promise from reality, and figure out what it means for businesses. Read full article

Security News

Smartphones Now Used More Than Laptops to Access Wi-Fi Hotspots, Study Finds

For the first time, smartphones are reportedly the most used device to access a wireless hotspot, according to a report released by the Wireless Broadband Alliance (WBA). Results showed that[...] Read full article

Security Feature

The Great Reinventors: Best & Worst Tech Company Rebranding Efforts

A brand defined as a complex set of inter-related components that overall set an expectation for a customer experience. A brand involves the name the logo, the colors, the tone,[...] Read full article

Security Feature

BYOD and Cloud Storage: A One Two Punch to Enterprise Security

Today, the advent of the cloud and the proliferation of inexpensive hand-held mobile devices has changed everything. And corporate security personnel are scrambling for ways to make sure these[...] Read full article

Security News

Google Simplifies Enterprise Search

Since its launch as a search engine in 1998, Google has branched out of the cyber world and taken some bold steps into the physical one. But long before Google\’s[...] Read full article

Security News

The Technologies of Tomorrow: EmTech 2012 at MIT

We\’ve seen the future… or at least what the engineers and innovators at the companies that will be driving it in areas such as energy, communications, entertainment, and data think[...] Read full article

Security News

Businesses Might Wait Another Year for Windows 8 Migration

Many corporations are still in the middle of upgrading to Windows 7, and with the release of Windows 8, DesktopReview reports that analysts predict businesses will wait until next year,[...] Read full article

Security Feature

BYO Security Threat: Empowered Employees Able to Ignore Policies in BYOD Era

The self-empowered BYO employee is as compelling to businesses as the proposition is terrifying. With a massive BYO movement afoot, organizations are scrambling to figure out how to reap the[...] Read full article