Retail Articles
-
Morphing Enfal Malware Remains Dangerous
8/1/2016
New report finds that Enfal is still evolving with a new API name obfuscation technique By Christine Kern, contributing writer
-
Mobile Investment Rests On Collaboration Between IT Decision Makers And Operations Technology
7/28/2016
The next phase of enterprise mobile investment hinges on better collaboration between IT and execs. By Christine Kern, contributing writer
-
POS, Payment Processing, And Data Collection News
7/26/2016
Getac recently announced its new B300, an ultra-rugged notebook designed for the most extreme, mission-critical environments found in military and law enforcement applications, as well as with certain field service technicians.
-
As Researchers Predicted, We May Be Seeing The End Of The Password
7/20/2016
ForgeRock’s Identity Platform Ushers in New Era of the Frictionless User Experience By Christine Kern, contributing writer
-
Management Is Most Vulnerable To Attacks
7/19/2016
As cyberattacks escalate, enterprises need to be aware of vulnerabilities and protect accordingly. By Christine Kern, contributing writer
-
Regulations For Commercial Drone Use Released By FAA
7/11/2016
Regulations create new opportunities for business and government to use drones By Christine Kern, contributing writer
-
Roddy Launches VAR/ISV Consulting Business
7/5/2016
I typically fill our blog with advice on tech trends and business topics. Today’s post is of a more personal nature. After more than 17 years with Jameson Publishing (formerly Corry Publishing), Jim Roddy, president of Business Solutions, speaker, and author of Hire Like You Just Beat Cancer, has left the magazine to pursue a new business venture.
-
Helping CISOs Overcome Cybersecurity Solution Fatigue
7/5/2016
Report provides strategic recommendations to ensure optimal security.
-
CEOs Say Security Execs Are At Risk Of Losing Their Jobs Over Poor Reporting
6/30/2016
Cyber risk reduction transcends identification by IT execs and must include clear communication.
-
Helping Enterprises Battle Ransomware
6/30/2016
Holistic approaches to cybersecurity threats helps protect data better.