! Here are the latest Insider stories.
Windows Server 2016 licensing and servicing options explained
First look: Google Cloud Machine Learning soars
Blockchain: You’ve got questions; we’ve got answers
6 Slack alternatives worth a look
Suggestions for you
All Application Development
All Cloud Computing
All Data Center
Internet of Things
All Operating Systems
See All Technologies
BYOD news, analysis, research, how-to, opinion, and video.
FBI backdoors force a rethink of BYOD
Slack + Skype: The fine line between convenience and coercion
Containerization moves beyond the full erase
The latest containerization technologies enable IT to create separate, protected areas for work apps and data on employees' personal devices. The challenge is to maintain security
Half of U.S. businesses have no formal BYOD policy for security
Emergence of biometric smartphone security is rare, survey finds
What is the surveillance software module in Citrix? How do I know if it is installed on my laptop (owned by me, not by the employer)?
Microsoft's Surface Pro 4, the tablet that can finally replace your laptop
With the Surface Pro 4, Microsoft builds on the previous generations of the Surface line, getting them closer than ever to their goal of creating a tablet that will replace your laptop.
BYOD is as entrenched (and complicated) as ever
The bring-your-own-device (BYOD) trend has been around for years now, and even though it's become a fixture at many companies, some IT shops are still grappling with how to make it work.
IBM tackles shadow IT with a new cloud security tool
Hosted on IBM Cloud, Cloud Security Enforcer can scan a corporate network, find the apps employees are using, and provide a more secure way to access them
Is machine certificate (PKI) based authentication a good approach for allowing BYOD enrolled devices to connect to the Enterprise Network?
5 ways to shore up security in your BYOD strategy
Many security leaders are still wary about BYOD. Here are five ways to combine security and privacy
Split your smartphone bill -- but beware the risks
Hidden costs and technology limitations can vaporize your savings -- and breed unhappiness
IDC cuts forecast for mobile management software sales
Sales of mobile management software are expected to slow, but will still top $2.9 billion in 2019
How to use Google Voice with your Cell phone to be able to make calls with your cell phone without being charged by your cell phone company. What say you?
The messy truth about BYOD
It's jeopardizing your business! It's already a passing fad! It's the standard in business today! Why the claims don't add up
Google IDs are creeping into your identity management
Microsoft and Google are both expanding their policy management tools' reach, and IT may be caught in the middle
How IT can manage the Apple Watch
There's only one explicit Apple Watch MDM policy, but more controls than you might realize
4 barriers blocking enterprise adoption of Android
The fact remains: iPhones and iPads are a better fit for business use than even the best Android devices
Hillary Clinton's email problem is everyone's problem
The mixing of work and personal lives, legitimate needs for secrecy, and 24/7 availability combine to create a challenge every company faces
Samsung's security twist: Protect yourself from IT
Walling off corporate data with from personal data via My Knox protects IT from you -- and vice versa
A big step for BYOD: Separate billing for smartphones is finally here
AT&T Work Platform is a major step toward separating work and personal communications in a sensible way
BYOD? Start here: A draft reimbursement policy for mobile users
Many companies still struggle with reimbursement and access policies for employees on the go
Cheapest tablets pose biggest security risks for enterprises
Kohl's special Black Friday deal tablet includes a security backdoor and four major vulnerabilities
How to create seamless mobile security for employees
If your organization’s security procedures are disruptive and clunky, frustrated employees will figure out how to get around them. Here’s how three companies created a secure and seamless experience for end users.
You Might Also Like
Advanced Attacks: What They Are and Why You Should Care
Blue Hill Research: IBM Cognos Analytics: Converged and Governed Analytics for the Masses
Does Your Cloud Strategy Deliver in the Application Economy?
IT that Creates Value-Delivery Model for Secure Productivity
The Value of Content Platform APIs for Application Development
Popular on InfoWorld
FBI backdoors force a rethink of BYOD
This ad will close in 20 seconds. Continue to site »