Open Haus: Wi-Fi and Seamless Roaming for Mobile Workers
When you hear the term "mobile worker," what image comes to mind? Is it the employee who is constantly taking his laptop into different corners of the office, working from their desk, conference rooms...
How to Manage Secure Communications in M2M Environments
For all the talk of the Internet of Things (IoT) and machine-to-machine (M2M) communications making our lives easier, there always seems to be a cautionary tale involving security of these devices...
Europe: More than Just 'Stumbling Forward' to Improved Cybersecurity
[caption id="attachment_5673" align="alignright" width="200"] Image via Creative Commons/Xavier Hape (CC BY 2.0)[/caption]
White House Turns Attention to Cybersecurity
Cyberattackers and hackers operate in the shadows, lurking away from where conventional law enforcement can easily identify and investigate them. They prefer secrecy and anonymity.