Cyberwar fundamentally changes how government must handle security. Faced with increasingly sophisticated attacks from gangs of cyber criminals and foreign governments probing systems for sensitive data, threats frequently go undetected for days, weeks, and even months. And it’s not just financial data being stolen. Terrorists and rogue governments may steal confidential data, including intelligence information,…

At a recent Mobile World Congress held in Barcelona, Spain, the old and obsolete Nokia mobile phone took center stage. A small French firm explained that this type of cellular phone is being used for mobile banking in areas where smart phones aren’t popular. Most technological firms are geared towards producing sophisticated mobile products for…

By Nelson Nahum Many people look at the cloud as a way of reducing costs (no capital expenses, no real estate, no hardware management, etc.) While the cloud does offer real advantages when it comes to cost reduction, the real game-changers in the cloud are how expenditures are used and the agility the Cloud imparts…

For those who follow the latest technology news, it is very common to read “BYOD” or Bring-Your-Own Device. The term has become popular due to the proliferation of mini-laptops, tables, and smartphones in the market today. Business owners are even mulling the idea of implementing their own Bring-Your-Own Device policy because a lot of people…

The US Department of Defense had recently announced that it plans to provide its employees with mobile devices, computer tablets, as well as smartphones for them to be able to share protected and classified data quickly. With the latest mobile technologies, the military will be equipped with the necessary secured devices. Due to this announcement,…