Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Connected Government
- Consolidating Mission-critical Systems
- Constituent Servicing
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Eliminating the Pitfalls: Steps to Virtualization in Government
- Federal Executive Forum
- Federal Tech Talk
- Government Cloud Brokerage: Who, What, When, Where, Why?
- Government Mobility
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mobile Device Management
- The Modern Federal Threat Landscape
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- Satellite Communications: Acquiring SATCOM in Tight Times
- Transformative Technology: Desktop Virtualization in Government
- Understanding the Intersection of Customer Service and Security in the Cloud
Shows & Panels
Search Tags: Computer World
Kim Hancher, the chief information officer at the Equal Employment Opportunity Commission, will hsare her ideas on mobile device management
August 6, 2013
Tags: technology , mobile devices , mobile device management , enterprise tablets , cloud computing , BlackBerry , Bring your own device , information technology , mobile security , mobile strategy , Kim Hancher , EEOC , Federal Tech Talk , John Gilroy
Alexander says the cloud not only cuts IT costs but makes it easier to protect assets, according to Computer World.
The malware was originally written for Linux nearly ten years ago, but hackers are recompiling the code to make it run on Mac OS X.
Expect a wave of spear-phishing e-mails looking for personal information and log-on credentials. This after Epsilon, an online marketing firm, was hacked. Thieves harvested millions of valid e-mail addresses.
Social media and applications are now part of the emergency first-responders' toolkit.